How will determining and assigning confidence be automated?
Wups, sorry; I missed answering that question by mistake.
The simple answer is to drop the phrase ‘Bayesian analysis’, the same as is used for spam-detection. But that’s not a real answer; in fact, I don’t yet have a complete answer—I’m still focusing on getting the vCard format right. I’m currently thinking along the lines of using one’s social network (eg, Facebook and Twitter friends) as an initial set of seeds, with high levels of confidence, perhaps supplemented by something equivalent to key-signing parties; and from that initial set of high-CONFIDENCE connections, pull a Keven Bacon style expansion of friends-of-friends-of-friends, with each step in the chain applying Bayesian-based math to figure out the appropriate level of confidence based on the values applied by everyone else to their own various connections.
That’s a bit in the future, though; I’m still just barely getting started on the outlines of adapting webfist to use identifiers other than DKIM-confirmed email addresses, let alone working out everything in the previous paragraph.
Wups, sorry; I missed answering that question by mistake.
The simple answer is to drop the phrase ‘Bayesian analysis’, the same as is used for spam-detection. But that’s not a real answer; in fact, I don’t yet have a complete answer—I’m still focusing on getting the vCard format right. I’m currently thinking along the lines of using one’s social network (eg, Facebook and Twitter friends) as an initial set of seeds, with high levels of confidence, perhaps supplemented by something equivalent to key-signing parties; and from that initial set of high-CONFIDENCE connections, pull a Keven Bacon style expansion of friends-of-friends-of-friends, with each step in the chain applying Bayesian-based math to figure out the appropriate level of confidence based on the values applied by everyone else to their own various connections.
That’s a bit in the future, though; I’m still just barely getting started on the outlines of adapting webfist to use identifiers other than DKIM-confirmed email addresses, let alone working out everything in the previous paragraph.