• 1 Post
  • 5 Comments
Joined 3 years ago
cake
Cake day: July 1st, 2023

help-circle



  • That’s a fair question, and you’re right that it isn’t foolproof.

    The reason it works at all is that the fruit isn’t known in advance. He posts the video first, then updates his site with the correct fruit for that video. Viewers can check after the fact. If someone deep-fakes him, they either have to guess the fruit correctly or regenerate the fake once the real fruit is known.

    That doesn’t make impersonation impossible, but it does make it more expensive and slower.

    And that’s really the point. This isn’t perfect authentication, it’s friction. It raises the cost just enough that casual fakes, reposts, and automated scams stop being worthwhile, even if a determined attacker could still get through.

    Which is also why this is such a telling example. Instead of platforms providing provenance, creators are inventing human-readable ways to increase the cost of lying. Not secure, but legible and effective enough for most people.

    That’s the ambient trust problem in a nutshell. We’re not aiming for mathematically perfect truth, we’re trying to make deception harder than honesty.


  • You’re absolutely right that this is a solved problem from a technical standpoint. Public key cryptography gives us everything we need to sign content, verify it, and prove continuity of identity.

    But that’s how we solve it in technology. It’s not how my 82-year-old father solves it.

    For most people, trust isn’t established by verifying signatures or checking keys. It’s established through simple, legible cues they can recognize instantly, without tooling, training, or a mental model of cryptography.

    That’s why the fruit works.

    It’s a human-scale authentication signal. No UI, no standards, no explanation required. “If you see the fruit, it’s him.” That’s something almost anyone can understand and apply.

    The real problem isn’t that cryptographic solutions don’t exist. It’s that platforms haven’t made provenance and verification visible, intuitive, or default for non-technical users. Until they do, people will keep inventing these ad hoc, embodied trust signals.

    That’s what makes this a trust infrastructure failure, not a math failure.