Authentication Collapse Timeline Model
authentication-collapse-timelineanalysisPath: /knowledge-base/models/authentication-collapse-timeline/
E28Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "authentication-collapse-timeline",
"numericId": null,
"path": "/knowledge-base/models/authentication-collapse-timeline/",
"filePath": "knowledge-base/models/authentication-collapse-timeline.mdx",
"title": "Authentication Collapse Timeline Model",
"quality": 59,
"readerImportance": 75,
"researchImportance": 61,
"tacticalValue": null,
"contentFormat": "article",
"tractability": null,
"neglectedness": null,
"uncertainty": null,
"causalLevel": null,
"lastUpdated": "2026-03-13",
"dateCreated": "2026-02-15",
"llmSummary": "Projects when AI-generated content becomes undetectable across modalities: text detection already at ~50% (random chance), images declining 5-10% annually toward 2026-2028 failure, audio/video following by 2028-2033. Models this as asymmetric arms race with structural advantages favoring generators, estimating 25-35% probability of rapid collapse by 2029-2030 and \\$425B-1.7T global adaptation costs, though counter-arguments suggest 15-25% rapid collapse probability may be more realistic given market incentives.",
"description": "This model projects when digital verification systems cross critical failure thresholds. It estimates text detection already at random-chance levels, with image/audio following within 3-5 years.",
"ratings": {
"focus": 8.5,
"novelty": 5.2,
"rigor": 6.8,
"completeness": 8,
"concreteness": 7.5,
"actionability": 6.5
},
"category": "models",
"subcategory": "timeline-models",
"clusters": [
"ai-safety",
"cyber",
"epistemics"
],
"metrics": {
"wordCount": 6299,
"tableCount": 17,
"diagramCount": 1,
"internalLinks": 8,
"externalLinks": 0,
"footnoteCount": 0,
"bulletRatio": 0.13,
"sectionCount": 53,
"hasOverview": true,
"structuralScore": 12
},
"suggestedQuality": 80,
"updateFrequency": 90,
"evergreen": true,
"wordCount": 6299,
"unconvertedLinks": [],
"unconvertedLinkCount": 0,
"convertedLinkCount": 5,
"backlinkCount": 3,
"hallucinationRisk": {
"level": "medium",
"score": 60,
"factors": [
"no-citations",
"few-external-sources"
]
},
"entityType": "analysis",
"redundancy": {
"maxSimilarity": 23,
"similarPages": [
{
"id": "deepfakes-authentication-crisis",
"title": "Deepfakes Authentication Crisis Model",
"path": "/knowledge-base/models/deepfakes-authentication-crisis/",
"similarity": 23
},
{
"id": "epistemic-collapse-threshold",
"title": "Epistemic Collapse Threshold Model",
"path": "/knowledge-base/models/epistemic-collapse-threshold/",
"similarity": 22
},
{
"id": "fraud-sophistication-curve",
"title": "Fraud Sophistication Curve Model",
"path": "/knowledge-base/models/fraud-sophistication-curve/",
"similarity": 21
},
{
"id": "authoritarian-tools-diffusion",
"title": "Authoritarian Tools Diffusion Model",
"path": "/knowledge-base/models/authoritarian-tools-diffusion/",
"similarity": 20
},
{
"id": "autonomous-weapons-proliferation",
"title": "LAWS Proliferation Model",
"path": "/knowledge-base/models/autonomous-weapons-proliferation/",
"similarity": 20
}
]
},
"coverage": {
"passing": 4,
"total": 13,
"targets": {
"tables": 25,
"diagrams": 3,
"internalLinks": 50,
"externalLinks": 31,
"footnotes": 19,
"references": 19
},
"actuals": {
"tables": 17,
"diagrams": 1,
"internalLinks": 8,
"externalLinks": 0,
"footnotes": 0,
"references": 5,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"llmSummary": "green",
"schedule": "green",
"entity": "green",
"editHistory": "red",
"overview": "green",
"tables": "amber",
"diagrams": "amber",
"internalLinks": "amber",
"externalLinks": "red",
"footnotes": "red",
"references": "amber",
"quotes": "red",
"accuracy": "red"
},
"ratingsString": "N:5.2 R:6.8 A:6.5 C:8"
},
"readerRank": 122,
"researchRank": 213,
"recommendedScore": 177.33
}External Links
No external links
Backlinks (3)
| id | title | type | relationship |
|---|---|---|---|
| epistemic-collapse-threshold | Epistemic Collapse Threshold Model | analysis | — |
| risk-activation-timeline | Risk Activation Timeline Model | analysis | — |
| trust-cascade-model | Trust Cascade Failure Model | analysis | — |