Longterm Wiki

Authentication Collapse Timeline Model

authentication-collapse-timelineanalysisPath: /knowledge-base/models/authentication-collapse-timeline/
E28Entity ID (EID)
← Back to page3 backlinksQuality: 59Updated: 2026-03-13
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
  "id": "authentication-collapse-timeline",
  "numericId": null,
  "path": "/knowledge-base/models/authentication-collapse-timeline/",
  "filePath": "knowledge-base/models/authentication-collapse-timeline.mdx",
  "title": "Authentication Collapse Timeline Model",
  "quality": 59,
  "readerImportance": 75,
  "researchImportance": 61,
  "tacticalValue": null,
  "contentFormat": "article",
  "tractability": null,
  "neglectedness": null,
  "uncertainty": null,
  "causalLevel": null,
  "lastUpdated": "2026-03-13",
  "dateCreated": "2026-02-15",
  "llmSummary": "Projects when AI-generated content becomes undetectable across modalities: text detection already at ~50% (random chance), images declining 5-10% annually toward 2026-2028 failure, audio/video following by 2028-2033. Models this as asymmetric arms race with structural advantages favoring generators, estimating 25-35% probability of rapid collapse by 2029-2030 and \\$425B-1.7T global adaptation costs, though counter-arguments suggest 15-25% rapid collapse probability may be more realistic given market incentives.",
  "description": "This model projects when digital verification systems cross critical failure thresholds. It estimates text detection already at random-chance levels, with image/audio following within 3-5 years.",
  "ratings": {
    "focus": 8.5,
    "novelty": 5.2,
    "rigor": 6.8,
    "completeness": 8,
    "concreteness": 7.5,
    "actionability": 6.5
  },
  "category": "models",
  "subcategory": "timeline-models",
  "clusters": [
    "ai-safety",
    "cyber",
    "epistemics"
  ],
  "metrics": {
    "wordCount": 6299,
    "tableCount": 17,
    "diagramCount": 1,
    "internalLinks": 8,
    "externalLinks": 0,
    "footnoteCount": 0,
    "bulletRatio": 0.13,
    "sectionCount": 53,
    "hasOverview": true,
    "structuralScore": 12
  },
  "suggestedQuality": 80,
  "updateFrequency": 90,
  "evergreen": true,
  "wordCount": 6299,
  "unconvertedLinks": [],
  "unconvertedLinkCount": 0,
  "convertedLinkCount": 5,
  "backlinkCount": 3,
  "hallucinationRisk": {
    "level": "medium",
    "score": 60,
    "factors": [
      "no-citations",
      "few-external-sources"
    ]
  },
  "entityType": "analysis",
  "redundancy": {
    "maxSimilarity": 23,
    "similarPages": [
      {
        "id": "deepfakes-authentication-crisis",
        "title": "Deepfakes Authentication Crisis Model",
        "path": "/knowledge-base/models/deepfakes-authentication-crisis/",
        "similarity": 23
      },
      {
        "id": "epistemic-collapse-threshold",
        "title": "Epistemic Collapse Threshold Model",
        "path": "/knowledge-base/models/epistemic-collapse-threshold/",
        "similarity": 22
      },
      {
        "id": "fraud-sophistication-curve",
        "title": "Fraud Sophistication Curve Model",
        "path": "/knowledge-base/models/fraud-sophistication-curve/",
        "similarity": 21
      },
      {
        "id": "authoritarian-tools-diffusion",
        "title": "Authoritarian Tools Diffusion Model",
        "path": "/knowledge-base/models/authoritarian-tools-diffusion/",
        "similarity": 20
      },
      {
        "id": "autonomous-weapons-proliferation",
        "title": "LAWS Proliferation Model",
        "path": "/knowledge-base/models/autonomous-weapons-proliferation/",
        "similarity": 20
      }
    ]
  },
  "coverage": {
    "passing": 4,
    "total": 13,
    "targets": {
      "tables": 25,
      "diagrams": 3,
      "internalLinks": 50,
      "externalLinks": 31,
      "footnotes": 19,
      "references": 19
    },
    "actuals": {
      "tables": 17,
      "diagrams": 1,
      "internalLinks": 8,
      "externalLinks": 0,
      "footnotes": 0,
      "references": 5,
      "quotesWithQuotes": 0,
      "quotesTotal": 0,
      "accuracyChecked": 0,
      "accuracyTotal": 0
    },
    "items": {
      "llmSummary": "green",
      "schedule": "green",
      "entity": "green",
      "editHistory": "red",
      "overview": "green",
      "tables": "amber",
      "diagrams": "amber",
      "internalLinks": "amber",
      "externalLinks": "red",
      "footnotes": "red",
      "references": "amber",
      "quotes": "red",
      "accuracy": "red"
    },
    "ratingsString": "N:5.2 R:6.8 A:6.5 C:8"
  },
  "readerRank": 122,
  "researchRank": 213,
  "recommendedScore": 177.33
}
External Links

No external links

Backlinks (3)
idtitletyperelationship
epistemic-collapse-thresholdEpistemic Collapse Threshold Modelanalysis
risk-activation-timelineRisk Activation Timeline Modelanalysis
trust-cascade-modelTrust Cascade Failure Modelanalysis
Longterm Wiki