authentication of information.md cyber process cyber ฯ 0.02% according to knowledge theory the information is fully authenticated if its possible to prove who, when and what Linked References cyber/context/distribution/1400k reality of foundation models Local Graph