{"id":1076316,"date":"2024-08-15T17:28:13","date_gmt":"2024-08-16T00:28:13","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&p=1076316"},"modified":"2024-08-15T17:33:59","modified_gmt":"2024-08-16T00:33:59","slug":"personhood-credentials-artificial-intelligence-and-the-value-of-privacy-preserving-tools-to-distinguish-who-is-real-online","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/personhood-credentials-artificial-intelligence-and-the-value-of-privacy-preserving-tools-to-distinguish-who-is-real-online\/","title":{"rendered":"Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online"},"content":{"rendered":"

Anonymity is an important principle online. However, malicious actors have long used misleading identities to conduct fraud, spread disinformation, and carry out other deceptive schemes. With the advent of increasingly capable AI, bad actors can amplify the potential scale and effectiveness of their operations, intensifying the challenge of balancing anonymity and trustworthiness online. In this paper, we analyze the value of a new tool to address this challenge: “personhood credentials” (PHCs), digital credentials that empower users to demonstrate that they are real people — not AIs — to online services, without disclosing any personal information. Such credentials can be issued by a range of trusted institutions — governments or otherwise. A PHC system, according to our definition, could be local or global, and does not need to be biometrics-based. Two trends in AI contribute to the urgency of the challenge: AI’s increasing indistinguishability (i.e., lifelike content and avatars, agentic activity) from people online, and AI’s increasing scalability (i.e., cost-effectiveness, accessibility). Drawing on a long history of research into anonymous credentials and “proof-of-personhood” systems, personhood credentials give people a way to signal their trustworthiness on online platforms, and offer service providers new tools for reducing misuse by bad actors. In contrast, existing countermeasures to automated deception — such as CAPTCHAs — are inadequate against sophisticated AI, while stringent identity verification solutions are insufficiently private for many use-cases. After surveying the benefits of personhood credentials, we also examine deployment risks and design challenges. We conclude with actionable next steps for policymakers, technologists, and standards bodies to consider in consultation with the public.<\/p>\n","protected":false},"excerpt":{"rendered":"

Anonymity is an important principle online. However, malicious actors have long used misleading identities to conduct fraud, spread disinformation, and carry out other deceptive schemes. With the advent of increasingly capable AI, bad actors can amplify the potential scale and effectiveness of their operations, intensifying the challenge of balancing anonymity and trustworthiness online. In this […]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"msr-content-type":[3],"msr-research-highlight":[],"research-area":[13556,13558],"msr-publication-type":[193726],"msr-product-type":[],"msr-focus-area":[],"msr-platform":[],"msr-download-source":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-1076316","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-artificial-intelligence","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_publishername":"","msr_edition":"","msr_affiliation":"","msr_published_date":"2024-8-15","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"","msr_chapter":"","msr_isbn":"","msr_journal":"","msr_volume":"","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"","msr_publicationurl":"","msr_doi":"","msr_publication_uploader":[{"type":"url","viewUrl":"false","id":"false","title":"https:\/\/arxiv.org\/abs\/2408.07892","label_id":"243109","label":0}],"msr_related_uploader":"","msr_attachments":[],"msr-author-ordering":[{"type":"text","value":"Steven Adler","user_id":0,"rest_url":false},{"type":"text","value":"Zoë Hitzig","user_id":0,"rest_url":false},{"type":"user_nicename","value":"Shrey Jain","user_id":42921,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=Shrey Jain"},{"type":"text","value":"Catherine Brewer","user_id":0,"rest_url":false},{"type":"text","value":"Wayne Chang","user_id":0,"rest_url":false},{"type":"text","value":"Renée DiResta","user_id":0,"rest_url":false},{"type":"text","value":"Eddy Lazzarin","user_id":0,"rest_url":false},{"type":"text","value":"Sean McGregor","user_id":0,"rest_url":false},{"type":"text","value":"Wendy Seltzer","user_id":0,"rest_url":false},{"type":"text","value":"Divya Siddarth","user_id":0,"rest_url":false},{"type":"text","value":"Nouran Soliman","user_id":0,"rest_url":false},{"type":"text","value":"Tobin South","user_id":0,"rest_url":false},{"type":"text","value":"Connor Spelliscy","user_id":0,"rest_url":false},{"type":"text","value":"Manu Sporny","user_id":0,"rest_url":false},{"type":"text","value":"Varya Srivastava","user_id":0,"rest_url":false},{"type":"text","value":"John Bailey","user_id":0,"rest_url":false},{"type":"text","value":"Brian Christian","user_id":0,"rest_url":false},{"type":"text","value":"Andrew Critch","user_id":0,"rest_url":false},{"type":"text","value":"Ronnie Falcon","user_id":0,"rest_url":false},{"type":"text","value":"Heather Flanagan","user_id":0,"rest_url":false},{"type":"text","value":"Kim Hamilton Duffy","user_id":0,"rest_url":false},{"type":"text","value":"Eric Ho","user_id":0,"rest_url":false},{"type":"text","value":"Claire R. Leibowicz","user_id":0,"rest_url":false},{"type":"text","value":"Srikanth Nadhamuni","user_id":0,"rest_url":false},{"type":"text","value":"Alan Z. Rozenshtein","user_id":0,"rest_url":false},{"type":"text","value":"David Schnurr","user_id":0,"rest_url":false},{"type":"text","value":"Evan Shapiro","user_id":0,"rest_url":false},{"type":"text","value":"Lacey Strahm","user_id":0,"rest_url":false},{"type":"text","value":"Andrew Trask","user_id":0,"rest_url":false},{"type":"text","value":"Zoe Weinberg","user_id":0,"rest_url":false},{"type":"text","value":"Cedric Whitney","user_id":0,"rest_url":false},{"type":"text","value":"Tom Zick","user_id":0,"rest_url":false}],"msr_impact_theme":[],"msr_research_lab":[],"msr_event":[],"msr_group":[],"msr_project":[],"publication":[],"video":[],"download":[],"msr_publication_type":"unpublished","related_content":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/1076316"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":4,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/1076316\/revisions"}],"predecessor-version":[{"id":1079505,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/1076316\/revisions\/1079505"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=1076316"}],"wp:term":[{"taxonomy":"msr-content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-content-type?post=1076316"},{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=1076316"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=1076316"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=1076316"},{"taxonomy":"msr-product-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-product-type?post=1076316"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=1076316"},{"taxonomy":"msr-platform","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-platform?post=1076316"},{"taxonomy":"msr-download-source","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-download-source?post=1076316"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=1076316"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=1076316"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=1076316"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=1076316"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=1076316"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=1076316"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=1076316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}