You're looking at Less Wrong's discussion board. This includes all posts, including those that haven't been promoted to the front page yet. For more information, see About Less Wrong.

philh comments on Self-verification - Less Wrong Discussion

6 Post author: Nanashi 19 April 2015 11:36PM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (43)

You are viewing a single comment's thread.

Comment author: philh 20 April 2015 10:49:21AM 3 points [-]

Take a video of me saying something along the lines of:

The current datetime is $whenever [ideally verify this with a clock in a public place], I'm not under duress, but I expect to die soon and for someone else to wake up in this body. You are that person. I'm trying to send you a message, but I expect other people to try to also send you messages pretending to be me. The sha256 hash of my message is $hash.

Here is a sample of your blood. You have a cut on your finger and no other recent injuries. If you do have other recent injuries, this communications channel may not be secure.

Then still (on video) cut my finger and put some blood in a glass vial. Put the video, the vial, and the message in a package and post it to myself.

I don't know how they would verify that that's their own blood, but my guess is that it can be done for a couple of hundred dollars.

Comment author: sentientplatypus 23 April 2015 07:45:19PM 0 points [-]

A video seemed like the obvious solution to me as well, but with no memories I don't think you would know what to do with the blood or even understand why that would identify you. For that matter would someone with no memories be able to even understand the message? I guess we have to assume some procedural memory is kept, but even with that it could be a stretch to understand the message even if the words were remembered.