Skip to main content

Home/ Sensorica Knowledge/ Group items tagged guaranteed

Rss Feed Group items tagged

Tiberius Brastaviceanu

The Baffler - 0 views

  • This tendency to view questions of freedom primarily through the lens of economic competition, to focus on the producer and the entrepreneur at the expense of everyone else, shaped O’Reilly’s thinking about technology.
  • the O’Reilly brand essence is ultimately a story about the hacker as hero, the kid who is playing with technology because he loves it, but one day falls into a situation where he or she is called on to go forth and change the world,
  • His true hero is the hacker-cum-entrepreneur, someone who overcomes the insurmountable obstacles erected by giant corporations and lazy bureaucrats in order to fulfill the American Dream 2.0: start a company, disrupt an industry, coin a buzzword.
  • ...139 more annotations...
  • gospel of individualism, small government, and market fundamentalism
  • innovation is the new selfishness
  • mastery of public relations
  • making it seem as if the language of economics was, in fact, the only reasonable way to talk about the subject
  • memes are for losers; the real money is in epistemes.
  • “Open source software” was also the first major rebranding exercise overseen by Team O’Reill
  • It’s easy to forget this today, but there was no such idea as open source software before 1998; the concept’s seeming contemporary coherence is the result of clever manipulation and marketing.
  • ideological cleavage between two groups
  • Richard Stallman
  • Free Software Foundation, preoccupied with ensuring that users had rights with respect to their computer programs. Those rights weren’t many—users should be able to run the program for any purpose, to study how it works, to redistribute copies of it, and to release their improved version (if there was one) to the public
  • “free software.”
  • association with “freedom” rather than “free beer”
  • copyleft
  • profound critique of the role that patent law had come to play in stifling innovation and creativity.
  • Plenty of developers contributed to “free software” projects for reasons that had nothing to do with politics. Some, like Linus Torvalds, the Finnish creator of the much-celebrated Linux operating system, did so for fun; some because they wanted to build more convenient software; some because they wanted to learn new and much-demanded skills.
  • Stallman’s rights-talk, however, risked alienating the corporate types
  • he was trying to launch a radical social movement, not a complacent business association
  • By early 1998 several business-minded members of the free software community were ready to split from Stallman, so they masterminded a coup, formed their own advocacy outlet—the Open Source Initiative—and brought in O’Reilly to help them rebrand.
  • “open source”
  • The label “open source” may have been new, but the ideas behind it had been in the air for some time.
  • In those early days, the messaging around open source occasionally bordered on propaganda
  • This budding movement prided itself on not wanting to talk about the ends it was pursuing; except for improving efficiency and decreasing costs, those were left very much undefined.
  • extremely decentralized manner, using Internet platforms, with little central coordination.
  • In contrast to free software, then, open source had no obvious moral component.
  • “open source is not particularly a moral or a legal issue. It’s an engineering issue. I advocate open source, because . . . it leads to better engineering results and better economic results
  • While free software was meant to force developers to lose sleep over ethical dilemmas, open source software was meant to end their insomnia.
  • Stallman the social reformer could wait for decades until his ethical argument for free software prevailed in the public debate
  • O’Reilly the savvy businessman had a much shorter timeline: a quick embrace of open source software by the business community guaranteed steady demand for O’Reilly books and events
  • The coup succeeded. Stallman’s project was marginalized. But O’Reilly and his acolytes didn’t win with better arguments; they won with better PR.
  • A decade after producing a singular vision of the Internet to justify his ideas about the supremacy of the open source paradigm, O’Reilly is close to pulling a similar trick on how we talk about government reform.
  • much of Stallman’s efforts centered on software licenses
  • O’Reilly’s bet wa
  • the “cloud”
  • licenses would cease to matter
  • Since no code changed hands
  • So what did matter about open source? Not “freedom”
  • O’Reilly cared for only one type of freedom: the freedom of developers to distribute software on whatever terms they fancied.
  • the freedom of the producer
  • who must be left to innovate, undisturbed by laws and ethics.
  • The most important freedom,
  • is that which protects “my choice as a creator to give, or not to give, the fruits of my work to you, as a ‘user’ of that work, and for you, as a user, to accept or reject the terms I place on that gift.”
  • O’Reilly opposed this agenda: “I completely support the right of Richard [Stallman] or any individual author to make his or her work available under the terms of the GPL; I balk when they say that others who do not do so are doing something wrong.”
  • The right thing to do, according to O’Reilly, was to leave developers alone.
  • According to this Randian interpretation of open source, the goal of regulation and public advocacy should be to ensure that absolutely nothing—no laws or petty moral considerations—stood in the way of the open source revolution
  • Any move to subject the fruits of developers’ labor to public regulation
  • must be opposed, since it would taint the reputation of open source as technologically and economically superior to proprietary software
  • the advent of the Internet made Stallman’s obsession with licenses obsolete
  • Many developers did stop thinking about licenses, and, having stopped thinking about licenses, they also stopped thinking about broader moral issues that would have remained central to the debates had “open source” not displaced “free software” as the paradigm du jour.
  • Profiting from the term’s ambiguity, O’Reilly and his collaborators likened the “openness” of open source software to the “openness” of the academic enterprise, markets, and free speech.
  • “open to intellectual exchange”
  • “open to competition”
  • “For me, ‘open source’ in the broader sense means any system in which open access to code lowers the barriers to entry into the market”).
  • “Open” allowed O’Reilly to build the largest possible tent for the movement.
  • The language of economics was less alienating than Stallman’s language of ethics; “openness” was the kind of multipurpose term that allowed one to look political while advancing an agenda that had very little to do with politics
  • highlight the competitive advantages of openness.
  • the availability of source code for universal examination soon became the one and only benchmark of openness
  • What the code did was of little importance—the market knows best!—as long as anyone could check it for bugs.
  • The new paradigm was presented as something that went beyond ideology and could attract corporate executives without losing its appeal to the hacker crowd.
  • What Raymond and O’Reilly failed to grasp, or decided to overlook, is that their effort to present open source as non-ideological was underpinned by a powerful ideology of its own—an ideology that worshiped innovation and efficiency at the expense of everything else.
  • What they had in common was disdain for Stallman’s moralizing—barely enough to justify their revolutionary agenda, especially among the hacker crowds who were traditionally suspicious of anyone eager to suck up to the big corporations that aspired to dominate the open source scene.
  • linking this new movement to both the history of the Internet and its future
  • As long as everyone believed that “open source” implied “the Internet” and that “the Internet” implied “open source,” it would be very hard to resist the new paradigm
  • Telling a coherent story about open source required finding some inner logic to the history of the Internet
  • “If you believe me that open source is about Internet-enabled collaboration, rather than just about a particular style of software license,”
  • everything on the Internet was connected to everything else—via open source.
  • The way O’Reilly saw it, many of the key developments of Internet culture were already driven by what he called “open source behavior,” even if such behavior was not codified in licenses.
  • No moralizing (let alone legislation) was needed; the Internet already lived and breathed open source
  • apps might be displacing the browser
  • the openness once taken for granted is no more
  • Openness as a happenstance of market conditions is a very different beast from openness as a guaranteed product of laws.
  • One of the key consequences of linking the Internet to the world of open source was to establish the primacy of the Internet as the new, reinvented desktop
  • This is where the now-forgotten language of “freedom” made a comeback, since it was important to ensure that O’Reilly’s heroic Randian hacker-entrepreneurs were allowed to roam freely.
  • Soon this “freedom to innovate” morphed into “Internet freedom,” so that what we are trying to preserve is the innovative potential of the platform, regardless of the effects on individual users.
  • Lumping everything under the label of “Internet freedom” did have some advantages for those genuinely interested in promoting rights such as freedom of expression
  • Forced to choose between preserving the freedom of the Internet or that of its users, we were supposed to choose the former—because “the Internet” stood for progress and enlightenment.
  • infoware
  • Yahoo
  • their value proposition lay in the information they delivered, not in the software function they executed.
  • The “infoware” buzzword didn’t catch on, so O’Reilly turned to the work of Douglas Engelbart
  • to argue that the Internet could help humanity augment its “collective intelligence” and that, once again, open source software was crucial to this endeavor.
  • Now it was all about Amazon learning from its customers and Google learning from the sites in its index.
  • The idea of the Internet as both a repository and incubator of “collective intelligence”
  • in 2004, O’Reilly and his business partner Dale Dougherty hit on the idea of “Web 2.0.” What did “2.0” mean, exactly?
  • he primary goal was to show that the 2001 market crash did not mean the end of the web and that it was time to put the crash behind us and start learning from those who survived.
  • Tactically, “Web 2.0” could also be much bigger than “open source”; it was the kind of sexy umbrella term that could allow O’Reilly to branch out from boring and highly technical subjects to pulse-quickening futurology
  • O’Reilly couldn’t improve on a concept as sexy as “collective intelligence,” so he kept it as the defining feature of this new phenomenon.
  • What set Web 2.0 apart from Web 1.0, O’Reilly claimed, was the simple fact that those firms that didn’t embrace it went bust
  • find a way to harness collective intelligence and make it part of their business model.
  • By 2007, O’Reilly readily admitted that “Web 2.0 was a pretty crappy name for what’s happening.”
  • O’Reilly eventually stuck a 2.0 label on anything that suited his business plan, running events with titles like “Gov 2.0” and “Where 2.0.” Today, as everyone buys into the 2.0 paradigm, O’Reilly is quietly dropping it
  • assumption that, thanks to the coming of Web 2.0, we are living through unique historical circumstances
  • Take O’Reilly’s musings on “Enterprise 2.0.” What is it, exactly? Well, it’s the same old enterprise—for all we know, it might be making widgets—but now it has learned something from Google and Amazon and found a way to harness “collective intelligence.”
  • tendency to redescribe reality in terms of Internet culture, regardless of how spurious and tenuous the connection might be, is a fine example of what I call “Internet-centrism.”
  • “Open source” gave us the “the Internet,” “the Internet” gave us “Web 2.0,” “Web 2.0” gave us “Enterprise 2.0”: in this version of history, Tim O’Reilly is more important than the European Union
  • For Postman, each human activity—religion, law, marriage, commerce—represents a distinct “semantic environment” with its own tone, purpose, and structure. Stupid talk is relatively harmless; it presents no threat to its semantic environment and doesn’t cross into other ones.
  • Since it mostly consists of falsehoods and opinions
  • it can be easily corrected with facts
  • to say that Tehran is the capital of Iraq is stupid talk
  • Crazy talk, in contrast, challenges a semantic environment, as it “establishes different purposes and assumptions from those we normally accept.” To argue, as some Nazis did, that the German soldiers ended up far more traumatized than their victims is crazy talk.
  • For Postman, one of the main tasks of language is to codify and preserve distinctions among different semantic environments.
  • As he put it, “When language becomes undifferentiated, human situations disintegrate: Science becomes indistinguishable from religion, which becomes indistinguishable from commerce, which becomes indistinguishable from law, and so on.
  • pollution
  • Some words—like “law”—are particularly susceptible to crazy talk, as they mean so many different things: from scientific “laws” to moral “laws” to “laws” of the market to administrative “laws,” the same word captures many different social relations. “Open,” “networks,” and “information” function much like “law” in our own Internet discourse today.
  • For Korzybski, the world has a relational structure that is always in flux; like Heraclitus, who argued that everything flows, Korzybski believed that an object A at time x1 is not the same object as object A at time x2
  • Our language could never properly account for the highly fluid and relational structure of our reality—or as he put it in his most famous aphorism, “the map is not the territory.”
  • Korzybski argued that we relate to our environments through the process of “abstracting,” whereby our neurological limitations always produce an incomplete and very selective summary of the world around us.
  • nothing harmful in this per se—Korzybski simply wanted to make people aware of the highly selective nature of abstracting and give us the tools to detect it in our everyday conversations.
  • Korzybski developed a number of mental tools meant to reveal all the abstracting around us
  • He also encouraged his followers to start using “etc.” at the end of their statements as a way of making them aware of their inherent inability to say everything about a given subject and to promote what he called the “consciousness of abstraction.”
  • There was way too much craziness and bad science in Korzybski’s theories
  • but his basic question
  • “What are the characteristics of language which lead people into making false evaluations of the world around them?”
  • Tim O’Reilly is, perhaps, the most high-profile follower of Korzybski’s theories today.
  • O’Reilly openly acknowledges his debt to Korzybski, listing Science and Sanity among his favorite books
  • It would be a mistake to think that O’Reilly’s linguistic interventions—from “open source” to “Web 2.0”—are random or spontaneous.
  • There is a philosophy to them: a philosophy of knowledge and language inspired by Korzybski. However, O’Reilly deploys Korzybski in much the same way that the advertising industry deploys the latest findings in neuroscience: the goal is not to increase awareness, but to manipulate.
  • O’Reilly, of course, sees his role differently, claiming that all he wants is to make us aware of what earlier commentators may have overlooked. “A metaphor is just that: a way of framing the issues such that people can see something they might otherwise miss,
  • But Korzybski’s point, if fully absorbed, is that a metaphor is primarily a way of framing issues such that we don’t see something we might otherwise see.
  • In public, O’Reilly modestly presents himself as someone who just happens to excel at detecting the “faint signals” of emerging trends. He does so by monitoring a group of überinnovators that he dubs the “alpha geeks.” “The ‘alpha geeks’ show us where technology wants to go. Smart companies follow and support their ingenuity rather than trying to suppress it,
  • His own function is that of an intermediary—someone who ensures that the alpha geeks are heard by the right executives: “The alpha geeks are often a few years ahead of their time. . . . What we do at O’Reilly is watch these folks, learn from them, and try to spread the word by writing down (
  • The name of his company’s blog—O’Reilly Radar—is meant to position him as an independent intellectual who is simply ahead of his peers in grasping the obvious.
  • “the skill of writing is to create a context in which other people can think”
  • As Web 2.0 becomes central to everything, O’Reilly—the world’s biggest exporter of crazy talk—is on a mission to provide the appropriate “context” to every field.
  • In a fascinating essay published in 2000, O’Reilly sheds some light on his modus operandi.
  • The thinker who emerges there is very much at odds with the spirit of objectivity that O’Reilly seeks to cultivate in public
  • meme-engineering lets us organize and shape ideas so that they can be transmitted more effectively, and have the desired effect once they are transmitted
  • O’Reilly meme-engineers a nice euphemism—“meme-engineering”—to describe what has previously been known as “propaganda.”
  • how one can meme-engineer a new meaning for “peer-to-peer” technologies—traditionally associated with piracy—and make them appear friendly and not at all threatening to the entertainment industry.
  • O’Reilly and his acolytes “changed the canonical list of projects that we wanted to hold up as exemplars of the movement,” while also articulating what broader goals the projects on the new list served. He then proceeds to rehash the already familiar narrative: O’Reilly put the Internet at the center of everything, linking some “free software” projects like Apache or Perl to successful Internet start-ups and services. As a result, the movement’s goal was no longer to produce a completely free, independent, and fully functional operating system but to worship at the altar of the Internet gods.
  • Could it be that O’Reilly is right in claiming that “open source” has a history that predates 1998?
  • Seen through the prism of meme-engineering, O’Reilly’s activities look far more sinister.
  • His “correspondents” at O’Reilly Radar don’t work beats; they work memes and epistemes, constantly reframing important public issues in accordance with the templates prophesied by O’Reilly.
  • Or take O’Reilly’s meme-engineering efforts around cyberwarfare.
  • Now, who stands to benefit from “cyberwarfare” being defined more broadly? Could it be those who, like O’Reilly, can’t currently grab a share of the giant pie that is cybersecurity funding?
  • Frank Luntz lists ten rules of effective communication: simplicity, brevity, credibility, consistency, novelty, sound, aspiration, visualization, questioning, and context.
  • Thus, O’Reilly’s meme-engineering efforts usually result in “meme maps,” where the meme to be defined—whether it’s “open source” or “Web 2.0”—is put at the center, while other blob-like terms are drawn as connected to it.
  • The exact nature of these connections is rarely explained in full, but this is all for the better, as the reader might eventually interpret connections with their own agendas in mind. This is why the name of the meme must be as inclusive as possible: you never know who your eventual allies might be. “A big part of meme engineering is giving a name that creates a big tent that a lot of people want to be under, a train that takes a lot of people where they want to go,”
  • News April 4 mail date March 29, 2013 Baffler party March 6, 2013 Žižek on seduction February 13, 2013 More Recent Press I’ve Seen the Worst Memes of My Generation Destroyed by Madness io9, April 02, 2013 The Baffler’s New Colors Imprint, March 21, 2013
  • There is considerable continuity across O’Reilly’s memes—over time, they tend to morph into one another.
Tiberius Brastaviceanu

P2P Foundation » Blog Archive » Ethical Marketing in Age of Horizontal Social... - 0 views

  • the development of marketing is sensible to its environment and is hence already self-limiting itself according to the previously mentioned legal and social framework
  • neuromarketing
  • explore new inner dynamics of marketing, new directions in the field of possibilities offered by the current organology and its articulations between techniques and social organization in order to influence and shape marketing as an associative force – in opposition to its current dissociative force – in the larger psychic, social and technic organology
  • ...70 more annotations...
  • find new ways of efficiency
  • arbitration between efficiency and care
  • a global thinking of the problem
  • Fighting the attention and desire resource shortage: stoping to use advertisement?
  • The question is rather here to think the moderation of the psychopower
  • empower transindividuation, i.e. to make sure that an economic activity creates more possibilities of individuation than it tend to destroy by attempting to capture attention and canalize motivation in a funnel. Empower transindividuation would imply to empowering actors of their own lifestyle, winning back the savoir-vivre prescribing production
  • Should marketing stop using psychopower?
  • marketing ethics guidelines
  • transactions are more likely to be morally defensible if both parties enter it freely and fully informed
  • the goal of marketing should be to increase the likelihood and frequency of free and informed transactions in the marketplace
  • putting freedom as a criteria of morality
  • the industrial use of pycho- and neuropower tend to fall under the category of barriers to freedom
  • neurotechniques – to capture the attention
  • psychotechniques – to attempt to create motivation
  • Most people think commercials are a small price to pay for these benefits
  • advertising
  • denying the schemes of addiction and the fact that we are becoming through the objects of attentions
  • right to avoid attention capture by advertising
  • progress made in cognitive sciences proving that
  • reward system being abnormally stimulated
  • Advertisements exploit
  • vulnerability and reinforce their overconsumption behaviors
  • “if food advertising on TV were banned, significant reductions in the prevalence of childhood obesity are possible.” (Veerman et al. 2009)
  • What is at stake falls to be much more complex than the sole Freedom of Speech invoked for the advertiser
  • liberty of non-reception
  • would mean to guaranty every citizen the right to choose where and when he wants to access the advertising information
  • Change in the industrial and commercial paradigm
  • Economy of contribution and peer production
  • An economy of contribution means that users of a service are contributing to the production of these services.
  • example
  • is open-source software that are contributively build by potentially hundreds of developers organized in communities
  • minimize the gap between the producer and consumer
  • blur the frontier between professionals and amateurs
  • The Copernican revolution of the Vendor Relationship Management paradigm
  • change in the commercial paradigm, described as an Intention Economy i.e. the opposite of the Attention Economy
  • consumers are charged to express and discuss their intention
  • with businesses rather than the usual paradigm in which businesses where fighting for a piece of canalized motivation
  • Implementing such a system would nevertheless imply that marketing departments dispose of a system in which they could value their supplies and where they could be easily found by customers. Doc Searls promotes his answer to this issue: the Vendor Relationship Management system.
  • the belief that free customers are more valuable than captive ones — to themselves, to vendors, and to the larger economy.
  • To be free
  • 1. Customers must enter relationships with vendors as independent actors.
  • 2. Customers must be the points of integration for their own data.
  • 3. Customers must have control of data they generate and gather. This means they must be able to share data selectively and voluntarily.
  • 4. Customers must be able to assert their own terms of engagement.
  • 5. Customers must be free to express their demands and intentions outside of any one company’s control.
  • This is a profoundly game-changing approach
  • big data that is the rush for consumers’ information potentially leading to the same dead-end of attention destruction and affective saturation than the former offline paradigm
  • VRM system working as a marketplace
  • the goal of marketing should be to increase the likelihood and frequency of free and informed transactions in the marketplace
  • less imperfect and less biased information in a cultural context overvaluing transparency, and a bigger atomicity due to the hereafter introduced trend for re-localized peer production.
  • 3.2.2.3 VRM and externalization of the socialization process
  • Promoting the end of advertisement
  • means to find a new way to make the information circulate, what was the primary goal of advertisement
  • Until there is no alternative to massive advertisement campaign for the information circulation, it is indeed hard to ask entrepreneurs and managers to get rid of those successors of propaganda: such a transition process necessarily imply adaptation costs from the producer and the consumer side, and possible competitive disadvantage against competitors still maximizing profit through advertisement means
  • But the internet transformation of the general organology offers new way to think information circuits and potentially constitute an opportunity to externalize the socialization process of products that is to empower citizen-consumers organized in communities
  • Empowering groups of citizen doesn’t annihilate the risks of mis-use or counterproductive interest-taker behaviors but a well-designed system of trust between peers could minimize this risk by creating a dependency to what social capital other peers give you, as it is happening in the sharing economy: the credibility of a contributive peer would be guaranteed through what the P2P Foundation calls Feedback systems and peer-police
  • a strong structuration of products characteristics, allowing customers to personalize their choices according to their desire and constraints: such a “VRM+” system
  • Marketing would then be the art of being as high as possible in this ranking, as it is happening in SEO for search engines, but in this context of criteria explosion, marketing would then be the disciple of listening to customers’ wishes and aspiration needing an attention, in order to kick in the production or to adapt the following series.
  • 3.2.2.4 Toward a possible equi-power
  • Such a system would tremendously re-configure the balance of power and tend toward a form of equi-power i.e. a social organization in which abuses of a “big” would be the potential object of a ranking sanction by the peers
  • self-regulative function
  • a form of economic Darwinism would let to conscious organization the right to curve their path toward a durable configuration in accordance with the social ecosystem.
  • the idea of equi-power is a form of homogenization of the social matter, in which the distortions in the balance of power would be compensated by the gathering of small forces sharing a common interest
  • Such a sanction systems, if successfully implemented, would make value-destructing businesses progressively decline and hopefully bankrupt,
  • long-term valuable strategic choice
  • long term satisfyingly high ranking
  • It would be utopic to think that the “being cool” marketing
  • would disappear, but marketers would have to make those two objectives compose together.
  • This social capital contagion is nevertheless a tool that would need to be controlled in its form of violence by extensive testings and iterations with forms of protections for the smallest peers, that is to say to keep this form of social violence to institutionalized, classic forms of businesses, clearly beyond the line of what should be acceptable in the global village.
  • the goal is here to create an artificial form of majority that is a self-censuring responsible behavior of corporations
Tiberius Brastaviceanu

Is it time to change the way we work? | What Would The Internet Do? - 2 views

  • company culture
  • how important some values are for them to prosper and generate value
  • We are seeing some organization being more successful in creating a culture than others
  • ...24 more annotations...
  • some of the principles of the Internet culture are actually becoming critical in creating successful organizations
  • the Internet culture is setting the foundation for a different way of generating economic and social value.
  • set of values that I believe are relevant for all organization wishing to reinvent their model to be more successful, attract talent and be more sustainable.
  • Resilience
  • more chances to successfully face complexity, speed and unpredictability
  • Bouncing back is more valuable than being tough.
  • resources from your network, from outside, rather than stocking them.
  • establish a circle of trust
  • Compasses (instead of maps)
  • through clear principles and transparency.
  • groups of people can produce a better outcome than single individuals.
  • post-sale structure
  • Portfolios (instead of planning)/ Practice (instead of theory)
  • Prototype, and leverage the ecosystem to fail fast (or scale rapidly).
  • testing less than perfect products into a receptive and responsive ecosystem
  • Systems (instead of objects)
  • the social components, and the interdependence of people, groups and objects.
  • a new set of currency that will merge the intrinsic value with the extrinsic social components associated with it.
  • Pull (instead of push)/ Smart crowd (instead of experts)
  • planning everything excludes the unexpected
  • keeping the eyes open
  • Encourage rebellion (instead of compliance)/Constant learning (instead of education)
  • asking questions and not accepting the traditional answers as given
  • structurally encouraged to question in order to guarantee future development and innovation
Kurt Laitner

Switzerland's Proposal to Pay People for Being Alive - NYTimes.com - 1 views

  •  
    " "basic" income that would go out to everyone, no strings attached; others a means-tested "minimum" income to supplement the earnings of the poor up to a given level."
Kurt Laitner

Introducing Edgeryders: the corporation without permission | Contrordine compagni - 0 views

  • we are a corporation without permission.
  • Anyone can claim to represent Edgeryders:
  • provided the project is not in contrast with the community’s values
  • ...7 more annotations...
  • gets hired f
  • Edgeryders LBG provides the corporate infrastructure to deploy it: team building, technology, outreach and engagement, invoicing, banking, whatever. This is regulated by ad-hoc agreements between project leaders and the company, because every project is different. Once a contract is signed, the company’s board of directors takes on legal responsibility for delivering on it, just as with any other corporation.
  • self-selection
  • This much openness guarantees a very high rate of idea generation – and an equally high rate of idea rejection by lack of momentum. Anything that lives through this much natural selection has to be very, very good – and clients stand to benefit from it.
  • You can never hire them – they would not get through your HR firewall, because your HR people don’t understand or recognize their qualifications.
  • many of them don’t function well in hierarchies and bureaucracy
  • We provide an interface for them to keep true to themselves while meeting your accountability requirements
  •  
    some interesting parallels, unfortunately not as fully explored as I would like
Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
Kurt Laitner

The basic orientation of p2p theory towards societal reform: transforming civil society... - 1 views

  • under the ‘leadership’ of corporations and those members of our society who have access to capital.
  • Despite all democratic advances, the state forms have clearly been captured by private interests.
  • in a capitalist system, ‘civil society’ is not directly productive of the goods and services that we need to survive, live and thrive
  • ...22 more annotations...
  • everything that needs to be made, has to be designed through collaborative innovation in the first place
  • continuous interchange and dialogue of citizens as they determine their collective life
  • Both civil society and the notion of citizenship can be criticized for being insufficiently inclusionary, and therefore as ‘mechanisms of exclusion’.
  • consisting of shared depositories of knowledge, code and design; the communities of contributors and users of such commons
  • infrastructures of collaboration, which are managed by a new type of ‘for-benefit associations’
  • democratically governed by all participants and stakeholders in such commons
    • Kurt Laitner
       
      hmm
  • which are not derived or secondary from either the private or state forms.
  • civil society is the locus of the shared abundance of value creation, and the place for the continual dialogue regarding the necessities of common life.
  • democratically decide
    • Kurt Laitner
       
      ? our values need be expressed in every action within the matrix, not just when a 'vote' is held, in fact general democratic 'voting' should probably disappear
  • the ‘common good’ of society as a whole
    • Kurt Laitner
       
      there is no such thing
  • The difference is that the commons where the immaterial value is created are positioned in a field of abundance characteristic for non-rival or anti-rival goods; while the for-benefit associations are responsible for the sometimes contentious allocation of rival infrastructures.
    • Kurt Laitner
       
      !!!
  • Whereas the commons themselves are plurarchies based on permissionless contribution, forking and other rights guaranteeing the diversity of contributions and contributors; the for-benefit associations are democratically governed.
  • true reform of the private sector and the corporate form.
    • Kurt Laitner
       
      really?
  • Under conditions of the rule of capital, for-profit corporations are beholden to work for the interests of the shareholders. This format allows for the accumulation of capital, but also indirectly of political power, through the power of money to influence politics and politicians. For-profit corporations are part of a system of infinite growth and compound interest, must continuously compete with other corporations, and therefore, also minimize costs. For-profit corporations are designed to ignore negative environmental externalities by avoiding to pay the costs associated with them; and to ignore positive social externalities, also by avoiding to pay for them. In terms of sustainability, corporations practice planned obsolescence as a rule, because while the market is a scarcity allocation mechanism, capitalism itself is a scarcity maintenance and creation mechanism. Anti-sustainable practices are systemic and part of the DNA of the for-profit corporation.
  • Under conditions of peer production, design and innovation moves to commons-based communitiies, which lack the incentive for unsustainable design; products are inherently design for sustainability, and the production process itself is designed for openness and distribution.
  • designed to make the commoners and the commons themselves sustainable, by not ‘leaking’ surplus value to external shareholders
  • mission-oriented, community supportive, sustainability-oriented corporate forms, that operate in the marketplace but do not themselves reproduce capitalism.
  • surplus value stays within the commons, allows its autonomous social reproduction, and sustains the commoners
  • ethical mechanism that subsumes profit making under the social goal of strengthening the commons.
  • because commons and their communities are themselves specific, and do not automatically take into account the common good of society as a whole .
  • A Partner State functions center around enabling and empowering social production and abandons some of the paternalistic aspects of the welfare state by focusing on strengthening the possibilities of autonomy.
  • mobilization of social forces to obtain a new social contract
  •  
    Good synopsis of the big picture by Michel
Tiberius Brastaviceanu

Fostering creativity. A model for developing a culture of collective creativity in science - 0 views

  • Scientific progress depends on both conceptual and technological advances, which in turn depend on the creativity of scientists
  • creative processes behind these discoveries rely on mechanisms that are similar across disciplines as diverse as art and science
  • research into the nature of creativity indicates that it depends strongly on the cultural environment
  • ...48 more annotations...
  • create optimal conditions in a research organization with the aim of enhancing the creativity of its scientific staff
  • Creativity has been traditionally associated with art and literature but since the early twentieth century, science has also been regarded as a creative activity
  • Measuring creativity is a challenging task owing to its complex and elusive nature
  • Measurement of brain activity showed that creativity correlates with two brain states: a quiescent, relaxed state corresponding to the inspiration stage, and a much more active state corresponding to the elaboration stage
  • models of creativity
  • have a common feature: they depend on a balance between analytical and synthetic thinking, and usually describe the creative process as a sequence of phases that alternate between these states
  • Most research on creativity has focused on the individual
  • However, more recent studies suggest that creativity also depends strongly on the social and cultural context
  • breakthroughs depended on collaboration and social support
  • social environment in business organizations affects the creativity of their employees
  • Although creative individuals are essential, the strong link with the environment indicates that creativity might be greatly enhanced by generating a culture that supports the creative process.
  • Many of the interviewees repeatedly emphasized three main qualities necessary to be a good scientist: rigorous intellect, the ability to get the job done and the ability to have creative ideas.
  • almost all interviewees characterized their breakthrough moment as an abrupt leap in understanding
  • Although breakthroughs in science depend on such an ‘internal' conceptual shift, they also rely on ‘external' experimental results. However, most interviewees described their breakthroughs as largely internal:
  • Only two scientists expressed the view that their breakthroughs were purely external events, based on the observation of novel data.
  • intuition
  • must be combined with rational thinking to be effective
  • Although the synthesis of a new concept relies on intuition, which is based on subconscious mental processing, it must be subjected to conscious examination and analysis
  • specific mental skills or attitudes
  • ability to make unexpected connections
  • ability to choose relevant possibilities from an infinite set of irrelevant ones
  • interest in the unknown'
  • enjoyment of the creative process
  • stimulation by interacting with colleagues
  • undoubtedly the most crucial trait for creativity, which thrives on the exchange of ideas
  • The majority felt that the individual and the collective are equally important:
  • what interactions are optimal for creativity
  • The majority of interviewees answered that other people provided them with ‘inspiration to do something new'
  • positive feedback after the emergence of a new idea is almost as important as the inspiration that triggered it
  • collective provides the individual with technical expertise
  • Therefore, scientists would value a culture of interaction and mutual inspiration more highly than access to technology, although the latter is essential for their experiments.
  • At the end of the interviews, each scientist was asked to describe the best possible conditions for generating creativity at a research institute.
  • Cross-fertilization is absolutely essential
  • These results indicate strongly that an interactive environment is the single most important factor for stimulating creativity
  • interacting with people doing very different things
  • interacting with colleagues informally
  • interactions within any institution are strongly affected by its organization
  • Several interviewees described ‘an open hierarchy' as an important factor for creativity
  • hierarchy is based on genuine respect because people are great scientists, but at the same time they're very approachable and open towards what you have to say
  • These results suggest that the best conditions for scientific creativity come with a free-flowing hierarchy and a highly developed culture of interaction to guarantee the exchange of ideas and inspiration.
  • Furthermore, interdisciplinary interactions lead to the generation of new and unusual ideas
  • Finally, because of the freedom to try new things, these ideas can be tested and eventually generate new insights.
  • Creativity can be described as an emergent phenomenon
  • nonlinear phenomena
  • Emergence depends on dynamic interactions between individual agents within the system
  • The importance of a ‘freedom to try new things' and a ‘free-flowing hierarchy' further supports the idea that individual components in an emergent system must be able to interact flexibly without central control
  • During the interviews, it became apparent that although a culture of interaction and creativity exists at EMBL, this itself is not often the subject of discussion. The values on which this culture is based are seemingly implicit rather than explicit
  • Potentially, the EMBL culture of interaction could be strengthened further by consciously expressing and discussing the values on which it is based
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
1 - 9 of 9
Showing 20 items per page