authentication of information cyber according to knowledge theory the information is fully authenticated if its possible to prove who, when and what Linked References reality of foundation models Local Graph