Skip to main content

Home/ Sensorica Knowledge/ Group items tagged trust

Rss Feed Group items tagged

Kurt Laitner

The Energy Efficiency of Trust & Vulnerability: A Conversation | Switch and Shift - 0 views

  • trusting people because of who they are personally vs. who they are professionally
  • also need to trust systems
  • our own resources
  • ...34 more annotations...
  • How much we need to trust others depends on the context,
  • how much we trust ourselves,
  • our ability to understand the context we are in
  • When we trust, we re-allocate that energy and time to getting things done and making an impact
  • the more information and/or experience we have, the better we can decide whether or not to trust
  • Trust is a tool to assess and manage (reduce and/or increase) risk, depending on the situation.
  • Trusting someone implies making oneself more vulnerable
  • When we don’t trust, we exert a lot of energy to keep up our guard, to continually assess and verify.  This uses a lot of energy and time.
  • If the alternative is worse, we might opt for no trust
  • As we let ourselves be vulnerable, we also leave ourselves more open to new ideas, new ways of thinking which leads to empathy and innovation.
  • the more we can focus on the scope and achievement of our goals
  • trusting is efficient….and effective
  • Being vulnerable is a way to preserve energy
  • It lets us reallocate our resources to what matters and utilize our skills and those around us to increase effectiveness…impact.
  • If we are working together, we need to agree on the meaning of ‘done’.  When are we done, what does that look like?
  • “Control is for Beginners”
  • Strategic sloppiness is a way to preserve energy
  • Build on the same shared mental models
  • use the same language
  • As the ability to replicate something has become more of a commodity, we are increasingly seeing that complex interactions are the way to create ‘value from difference’ (as opposed to ‘value from sameness’).
  • allow for larger margins of error in our response and our acceptance of others
  • higher perfection slows down the tempo
  • We can’t minimize the need to be effective.
  • Efficient systems are great at dealing with complicated things – things that have many parts and sequences, but they fall flat dealing with complex systems, which is most of world today.
  • make sure we hear and see the same thing (reduce buffers around our response)
  • timing
  • intuition
  • judgment
  • experience
  • ability to look at things from many different perspective
  • to discover, uncover, understand and empathize is critical
  • focus on meaning and purpose for work (outcomes) instead of just money and profit (outputs)
  • When we have a common goal of WHY we want to do something, we are better able to trust
  • When we never do the same thing or have the same conversation twice, it becomes much more important to figure out why and what we do than how we do it (process, which is a given)
  •  
    spot on conversation on *trust, I see creating a trustful environment quickly among strangers as a key capability of an OVN, we need to quickly get past the need to protect and verify and move on to making purpose and goals happen
Tiberius Brastaviceanu

Welcome to the new reputation economy (Wired UK) - 1 views

  • banks take into account your online reputation alongside traditional credit ratings to determine your loan
  • headhunters hire you based on the expertise you've demonstrated on online forums
  • reputation data becomes the window into how we behave, what motivates us, how our peers view us and ultimately whether we can or can't be trusted.
  • ...37 more annotations...
  • At the heart of Movenbank is a concept call CRED.
  • The difference today is our ability to capture data from across an array of digital services. With every trade we make, comment we leave, person we "friend", spammer we flag or badge we earn, we leave a trail of how well we can or can't be trusted.
  • An aggregated online reputation having a real-world value holds enormous potential
  • peer-to-peer marketplaces, where a high degree of trust is required between strangers; and where a traditional approach based on disjointed information sources is currently inefficient, such as recruiting.
  • opportunity to reinvent the way people found jobs through online reputation
  • "It's not about your credit, but your credibility," King says.
  • But this wealth of data raises an important question -- who owns our reputation? Shouldn't our hard-earned online status be portable? If you're a SuperHost on Airbnb, shouldn't you be able to use that reputation to, say, get a loan, or start selling on Etsy?
  • "People are currently underusing their networks and reputation," King says. "I want to help people to understand and build their influence and reputation, and think of it as capital they can put to good use."
  • Social scientists have long been trying to quantify the value of reputation.
  • Using functional magnetic resonance imaging, the researchers monitored brain activity
  • "The implication of our study is that different types of reward are coded by the same currency system." In other words, our brains neurologically compute personal reputation to be as valuable as money.
  • Personal reputation has been a means of making socioeconomic decisions for thousands of years. The difference today is that network technologies are digitally enabling the trust we used to experience face-to-face -- meaning that interactions and exchanges are taking place between total strangers.
  • Trust and reputation become acutely important in peer-to-peer marketplaces such as WhipCar and Airbnb, where members are taking a risk renting out their cars or their homes.
  • When you are trading peer-to-peer, you can't count on traditional credit scores. A different measurement is needed. Reputation fills this gap because it's the ultimate output of how much a community trusts you.
  • Welcome to the reputation economy, where your online history becomes more powerful than your credit history.
  • Presently, reputation data doesn't transfer between verticals.
  • A wave of startups, including Connect.Me, TrustCloud, TrustRank, Legit and WhyTrusted, are trying to solve this problem by designing systems that correlate reputation data. By building a system based on "reputation API" -- a combination of a user's activity, ratings and reviews across sites -- Legit is working to build a service that gives users a score from zero to 100. In trying to create a universal metric for a person's trustworthiness, they are trying to "become the credit system of the sharing economy", says Jeremy Barton, the 27-year-old San Francisco-based cofounder of Legit.
  • His company, and other reputation ventures, face some big challenges if they are to become, effectively, the PayPal of trust. The most obvious is coming up with algorithms that can't be easily gamed or polluted by trolls. And then there's the critical hurdle of convincing online marketplaces not just to open up their reputation vaults, but create a standardised format for how they frame and collect reputation data. "We think companies will share reputation data for the same reasons banks give credit data to credit bureaux," says Rob Boyle, Legit cofounder and CTO. "It is beneficial for one company to give up their slice of reputation data if in return they get access to the bigger picture: aggregated data from other companies."
  • PeerIndex, Kred and Klout,
  • are measuring social influence, not reputation. "Influence measures your ability to drag someone into action,"
  • "Reputation is an indicator of whether a person is good or bad and, ultimately, are they trustworthy?"
  • Early influence and reputation aggregators will undoubtedly learn by trial and error -- but they will also face the significant challenge of pioneering the use of reputation data in a responsible way. And there's a challenge beyond that: reputation is largely contextual, so it's tricky to transport it to other situations.
  • Many of the ventures starting to make strides in the reputation economy are measuring different dimensions of reputation.
  • reputation is a measure of knowledge
  • a measure of trust
  • a measure of propensity to pay
  • measure of influence
  • Reputation capital is not about combining a selection of different measures into a single number -- people are too nuanced and complex to be distilled into single digits or binary ratings.
  • It's the culmination of many layers of reputation you build in different places that genuinely reflect who you are as a person and figuring out exactly how that carries value in a variety of contexts.
  • The most basic level is verification of your true identity
  • reliability and helpfulness
  • do what we say we are going to do
  • respect another person's property
  • trusted to pay on time
  • we will be able to perform a Google- or Facebook-like search and see a picture of a person's behaviour in many different contexts, over a length of time. Slivers of data that have until now lived in secluded isolation online will be available in one place. Answers on Quora, reviews on TripAdvisor, comments on Amazon, feedback on Airbnb, videos posted on YouTube, social groups joined, or presentations on SlideShare; as well as a history and real-time stream of who has trusted you, when, where and why. The whole package will come together in your personal reputation dashboard, painting a comprehensive, definitive picture of your intentions, capabilities and values.
  • idea of global reputation
  • By the end of the decade, a good online reputation could be the most valuable currency in your possession.
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Tiberius Brastaviceanu

How The Blockchain Will Transform Everything From Banking To Government To Our Identities - 1 views

  • The first generation of the Internet was a great tool for communicating, collaborating and connecting online, but it was not ideal for business. When you send and share information on the Internet, you’re not sending an original but a copy. That’s good for information — it means people have a printing press for information and that information becomes democratized — but if you want to send an asset, it’s a problem. If I send you $100 online, you need to be sure you have it and I don’t, and that I can’t spend the same $100 somewhere else. As a result, we need intermediaries to perform critical roles — to establish identity between two parties in a transaction, and to do all the settlement transaction logic, which includes record-keeping.
  • With blockchain, for the first time, we have a new digital medium for value where anyone can access anything of value — stocks, bonds, money, digital property, titles, deeds — and even things like identity and votes can be moved, stored and managed securely and privately. Trust is not established though a third party but with clever code and mass consensus using a network. That’s got huge implications for intermediaries and businesses and society at large
  • And also with government, as a central repository of information an entity that delivers services.
  • ...35 more annotations...
  • There’s an opportunity to disrupt how those organizations work. Intermediaries, though they do a good job, have a few problems — they’re centralized, which makes them vulnerable to attack or failure
  • They tax the system
  • They capture data
  • They exclude billions of people from the global economy
  • internet of value
  • With blockchain, we can go from redistributing wealth to distributing value and opportunity value fairly a priori, from cradle to grave.
  • creating a true sharing economy by replacing service aggregators like Uber with distributed applications on the blockchain
  • unleashing a new age of entrepreneurship
  • build accountable governments through transparency, smart contracts and revitalized models of democracy.
  • The virtual you is owned by large intermediaries
  • This virtual you knows more about you than you do sometimes
  • So there’s a strange phenomenon from the first generation of the Internet where the most important asset class that’s been created is data —and we don’t control it or own it.
  • individuals taking back their identity through your own personal avatar
  • The financial services industry
  • antiquated
  • a complicated machine that does a simple thing
  • settlement
  • an opportunity to profoundly change the nature of the entire industry. The Starbucks transaction should be instant.
  • At the heart of it, the financial services industry moves value.
  • so this is both an existential threat to the financial services industry and an historic opportunity.
  • Banks trade on trust
  • Within the decade, every single financial asset, which is really just a contract
  • will all move to a blockchain-based format
  • In the accounting world, a lot of firms rely on costly audits to drive their profits
  • With blockchain, you could have a third entry time-stamped in a distributed ledger that could be acceptable to any relevant stakeholders from regulators to shareholders, giving you a perfect record of the truth and thus the financial health of an organization.
  • Nobel-winning economist Ronald Coase argued that firms exist because transaction costs in an open market are greater than the cost of doing things inside the boundaries of the corporation.
  • four costs — of search, coordination, contracting and establishing trust
  • Blockchains will profoundly affect all of these.
  • you can now synthesize trust on an open platform and people who’ve never met can trust each other to do certain things. So this results in a whole number of new business models
  • It turns out the Internet of Everything needs a Ledger of Everything, because a lightbulb buying power from your neighbor’s solar panel definitely won’t use banks or the Visa network
  • Right now, governments take tax revenue from corporations, individuals, licenses and so on. All of that can change. We can first of all have transparency in a radical sense because sunlight is the best disinfectant. Secondly, we can open up governments in a different sense of sharing data.
  • governments can enable self-organization to occur in society where companies, civil society organizations, NGOs, academics, foundations, and government agencies and individual citizens ought to use this data to self-organize and create what we used to call services or forms of public value. The third one has to do with the relationship between citizens and their governments.
  • There are more opportunities to create government by the people for the people
  • Electronic voting won’t be delivered by traditional server technology because it won’t be trusted by citizens
Tiberius Brastaviceanu

Partner State - P2P Foundation - 0 views

    • Tiberius Brastaviceanu
       
      we call this a custodian
    • Tiberius Brastaviceanu
       
      we call this a custodian
  • So here we have it, the new triarchy: - The state, with its public property and representative mechanisms of governance (in the best scenario) - The private sector, with the corporation and private property - The commons, with the Trust (or the for-benefit association), and which is the ‘property’ of all its members (not the right word in the context of the commons, since it has a different philosophy of ownership)
    • Tiberius Brastaviceanu
       
      so where is direct democracy in all this?
  • ...39 more annotations...
  • In a first phase, the commons simply emerges as an added alternative.
  • becoming a subsector of society, and starts influencing the whole
  • phase transition and transformation will need to occur.
  • how a commons-dominated, i.e. after the phase transition, society would look like.
  • At its core would be a collection of commons, represented by trusts and for-benefit associations, which protect their common assets for the benefit of present and future generations
  • The commons ‘rents out’ the use of its resources to entrepreneurs. In other words, business still exists, though infinite growth-based capitalism does not.
  • More likely is that the corporate forms will be influenced by the commons and that profit will be subsumed to other goals, that are congruent with the maintenance of the commons.
  • The state will still exist, but will have a radically different nature
  • Much of its functions will have been taken over by commons institutions, but since these institutions care primarily about their commons, and not the general common good, we will still need public authorities that are the guarantor of the system as a whole, and can regulate the various commons, and protect the commoners against possible abuses. So in our scenario, the state does not disappear, but is transformed, though it may greatly diminish in scope, and with its remaining functions thoroughly democratized and based on citizen participation.
  • In our vision, it is civil-society based peer production, through the Commons, which is the guarantor of value creation by the private sector, and the role of the state, as Partner State, is to enable and empower the creation of common value. The new peer to peer state then, though some may see that as a contradictio in terminis, is a state which is subsumed under the Commons, just as it is now under the private sector. Such a peer to peer state, if we are correct, will have a much more modest role than the state under a classic state society, with many of its functions taken over by civil society associations, interlinked in processes of global governance. The above then, this triarchy, is the institutional core which replaces the dual private-public binary system that is characteristic of the capitalist system that is presently the dominant format.
  • fundamental mission is to empower direct social-value creation, and to focus on the protection of the Commons sphere as well as on the promotion of sustainable models of entrepreneurship and participatory politics
  • the state becomes a 'partner state' and enables autonomous social production.
  • the state does exist, and I believe that we can’t just imagine that we live in a future state-less society
  • retreating from the binary state/privatization dilemma to the triarchical choice of an optimal mix amongst government regulation, private-market freedom and autonomous civil-society projects
  • the role of the state
  • “the peer production of common value requires civic wealth and strong civic institutions.
  • trigger the production/construction of new commons by - (co-) management of complexe resource systems which are not limited to local boundaries or specific communities (as manager and partner) - survey of rules (chartas) to care for the commons (mediator or judge) - kicking of or providing incentives for commoners governing their commons - here the point is to design intelligent rules which automatically protect the commons, like the GPL does (facilitator)"
  • the emergence of the digital commons. It is the experience of creating knowledge, culture, software and design commons, by a combination of voluntary contributions, entrepreneurial coalitions and infrastructure-protecting for-benefit associations, that has most tangibly re-introduced the idea of commons, for all to use without discrimination, and where all can contribute. It has drastically reduced the production, distribution, transaction and coordination costs for the immaterial value that is at the core also of all what we produce physically, since that needs to be made, needs to be designed. It has re-introduced communing as a mainstream experience for at least one billion internet users, and has come with proven benefits and robustness that has outcompeted and outcooperated its private rivals. It also of course offers new ways to re-imagine, create and protect physical commons.
  • stop enclosures
  • peer to peer, i.e. the ability to freely associate with others around the creation of common value
  • communal shareholding, i.e. the non-reciprocal exchange of an individual with a totality. It is totality that we call the commons.
  • It is customary to divide society into three sectors, and what we want to show is how the new peer to peer dynamic unleashed by networked infrastructures, changes the inter-relationship between these three sectors.
  • In the current ‘cognitive capitalist’ system, it is the private sector consisting of enterprises and businesses which is the primary factor, and it is engaged in competitive capital accumulation. The state is entrusted with the protection of this process. Though civil society, through the citizen, is in theory ‘sovereign’, and chooses the state; in practice, both civil society and the state are under the domination of the private sector.
  • it fulfills three contradictory functions
  • Of course, this is not to say that the state is a mere tool of private business.
  • protect the whole system, under the domination of private business
  • protector of civil society, depending on the balance of power and achievements of social movements
  • protector of its own independent interests
  • Under fascism, the state achieves great independence from the private sector , which may become subservient to the state. Under the welfare state, the state becomes a protector of the social balance of power and manages the achievements of the social movement; and finally, under the neoliberal corporate welfare state, or ‘market state’, it serves most directly the interests of the financial sector.
  • key institutions and forms of property.
  • The state managed a public sector, under its own property.
  • The private sector , under a regime of private ownership, is geared to profit, discounts social and natural externalities, both positive and negative, and uses its dominance in society to use and dominate the state.
  • civil society has a relative power as well, through its capability of creating social movements and associations
  • Capitalism has historically been a pendulum between the private and the public sector
  • However, this configuration is changing,
  • the endangerment of the biosphere through the workings of ‘selfish’ market players; the second is the role of the new digital commons.
  • participatory politics
  • Peer production gives us an advance picture of how a commons-oriented society would look like. At its core is a commons and a community contributing to it, either voluntarily, or as paid entrepreneurial employees. It does this through collaborative platforms using open standards. Around the commons emerges enterprises that create added value to operate on the marketplace, but also help the maintenance and the expansion of the commons they rely on. A third partner are the for-benefit associations that maintain the infrastructure of cooperation. Public authorities could play a role if they wanted to support existing commons or the creation of new commons, for the value they bring to society.
  • if a commons is not created as in the case of the digital commons, it is something that is inherited from nature or former generations, given in trust and usufruct, so that it can be transmitted to our descendents. The proper institution for such commons is therefore the trust, which is a corporate form that cannot touch its principal capital, but has to maintain it.
Kurt Laitner

A Culture of Distrust - 0 views

  •  
    more useful concepts about trust, in particular "trust is a precursor to loyalty and engagement" which I have to think about re my mapping of *trust +engagement and *contribution recognition - also ties into vision and governance, and communication thereof - some warnings regarding monitoring and its perception
Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
Tiberius Brastaviceanu

Private 'Distributed Ledgers' Miss the Point of a Blockchain | Bank Think - 0 views

  • a new buzzword making waves throughout the financial industry: “distributed ledger.”
  • Some say it's a tool to enable transparency by ensuring that all members of a group receive cryptographically secured messages about participants’ activities
  • Some are even bold enough to predict that distributed ledgers will end the madness of managing multiple database and reconciliation structures.
  • ...13 more annotations...
  • Distributed ledgers have primarily claimed to supplant the need for Bitcoin's mining process by introducing trust requirements among participants. These ledgers also promise users the immutability of Bitcoin without the need for expensive mining operations.
  • the technology powering distributed ledgers predates blockchains by well over 20 years.
  • Proponents of distributed ledgers argue that they can displace centralized providers such as SWIFT,
  • by moving money faster
  • There’s no doubt that blockchain technology will facilitate disruptive innovations in finance
  • But a world of private ledgers sounds eerily similar to a range of “private Internets.”
  • Blockchain technology is useful not because it offers efficiency in a world of message-passing but because it uses a complex process to settle value between untrusted parties.
  • But distributed ledgers do not offer users the ability to easily convert their tokens and messages into fungible units of value. Nor do distributed ledgers escrow value between parties that don't trust each other.
  • If a ledger is not a public resource, it will have the pressures incumbent to existing settlement systems plus the overhead of maintaining a shared database among competitors. What efficiency will remain thereafter remains dubious.
  • Permissioned Blockchains
  • their institutional users will probably find it expedient to hash their private-chain transactions and use those hashes to create bitcoin addresses and then send tiny fractions of a bitcoin to them to register their data at a location that cannot be hacked or changed.
    • Tiberius Brastaviceanu
       
      This is also a problem with access, if an access event needs to be recorded in a way that cannot be altered, in a data location that cannot be altered, it will need to be stored on a block chain. 
  • In other words, all private ledger/blockchains will lead to Bitcoin's Rome, driven there by its low cost and high public accountability.
  •  
    the case against private chains.
Tiberius Brastaviceanu

From #blockchain to #BadgeChain - Introduction | Learning Futures - 0 views

  •  
    Badges, also about trusted access.
Tiberius Brastaviceanu

Permaculture Principles | Design Principles - 1 views

  • how the principles of permaculture might apply to business.
  • The shift will be from merely prioritising output to thinking more widely.
  • how to build resilience for business
  • ...64 more annotations...
  • observation
  • A post-peak world will depend on detailed observation and good design rather than energy-intensive solutions.
  • not rely on weather forecasts but to learn to read the clouds,
  • “instead of researching the market, be the market”
  • businesses should be out there observing.
  • larger businesses tend to rely more on surveys and on second-hand information.
  • direct contact with customers.
  • move our idea of ‘capital’ from what we have in the bank, to the resources we have around us
  • not running a business on a constant high speed cash throughput with little or no capital reserves
  • lack of resilience in the just-in-time supply approach
  • a shift to storages of parts and materials, as well as the need to financially not be so dependent on debt financing
  • work slower with more financial reserves and take less risks, not building beyond what the company’s financial resources can support.
  • either to not borrow any money at all, or to borrow so much money that you can’t fail, being bigger than the people you borrow money from, so they have a vested interest in your succeeding!
  • energy efficient
  • long term
  • Looking to make buildings as autonomous as possible in a world entering energy descent is critical
  • see things that are flowing past and through the business that others don’t see as being a resource and having no monetary value as being valuable.
  • any intervention we make in a system, any changes we make or elements we introduce ought to be productive
  • This is instinctive to businesses
  • Obtain a Yield, in this context, is out of balance
  • much of business
  • have taken this to extremes
  • A well-designed system using permaculture principles should be able to self-regulate, and require the minimum of intervention and maintenance, like a woodland ecosystem, which requires no weeding, fertiliser or pest control.
  • moving from “we’re just obeying the law” to being proactive, acting before you get hit over the head with regulation and other vulnerabilities.
  • be able to put a foot on the break, not just going hell for leather on profit maximisation.
  • apply applied restraint, avoiding excessive, overfast growth that hasn’t been consolidated
  • looking for the negative feedbacks, from customers and from the environment in general
  • We need to increase the tightness of feedbacks.
  • Where nature can perform particular functions
  • we should utilise these attributes, rather than thinking we can replace them
  • Where nature can take some work off our hands we should let it.
  • a shift towards renewable resources
  • The emerging opportunities for businesses are things that are renewable. Renewable energy sources are the ones that will ensure a business’s stability in the long run. We can also broaden the concept of renewable resources to include things like goodwill and trust, things which a business can rebuild with good husbandry. Most business doesn’t just depend on law and competition, trust is at the heart of much business and it is very much a renewable resource.
  • The concept of waste is essentially a reflection of poor design. Every output from one system could become the input to another system. We need to think cyclically rather than in linear systems.
  • looking at our work from a range of perspectives
  • wider context
  • keep a clearer sense of the wider canvas on which we are painting, and the forces that affect what we are doing.
  • being strategic is important too
  • ask how is what we are doing part of a bigger picture, the move away from globalisation and towards the local, taking steps back from the everyday.
  • This can be done firstly by allowing space for Devil’s advocates, for black sheep, for hearing the voices of those outside of the dominant culture of the organisation and secondly by looking from a holistic perspective of how things interconnect, rather than just relying on experts who are embedded in detail. It emphasises the need to value the generalist, to give value to holistic thinkers.
  • allowing people to imagine different possibilities.
  • scenario planning
  • Permaculture has been described as the science of maximising beneficial relationships.
  • Solutions are to be found in integrated holistic solutions rather than increased specialisation and compartmentalisation
  • The challenge here is to move to seeing business as being part of the geographical community, as being rooted in place, rather than just part of a globalised community. At the moment for many larger businesses, the local is something one pays lip-service to as a source of good PR, something one is passing through, rather than actually being an integral part of the community.
  • This is a profound structural challenge for large organisations. Part of the resilience of the organisation comes from the degree of lateral integration. Resilience is in all solutions, it is the characteristic of ecological systems. If we apply these principles, resilience is one of the emergent properties
  • the notion that big is best needs to be challenged
  • new opportunities are very hard to understand and exploit from a macro level perspective, and are much better done from small scale perspective. It is here that the idea of appropriateness of scale becomes key.
  • more diverse systems have much more inbuilt resilience
  • have a diversity of small businesses, local currencies, food sources, energy sources and so on than if they are just dependent on centralised systems, globalisation’s version of monoculture.
  • not having all your eggs in one basket.
  • In the short term this kind of diversification could reduce profits, but in the longer term it will be more secure
  • this is about the reverse of specialisation, about having a mixed portfolio, and presents a big culture change for businesses.
  • it is a good strategy for business to keep a diverse portfolio of what sustains the business, keep some things that appear to be peripheral. They may not at this stage appear to be a serious part of how the business is run, but in this new world they will increasingly become so
  • ‘edge’
  • the point where two ecosystems meet is often more productive than either of those systems on their own.
  • overlap systems where possible so as to maximise their potential.
  • recognising that innovation doesn’t come from the centre but from fringe thinkers.
  • giving status to the marginal
  • It is important that the business has as many fingers in as many pies as possible, as many interfaces, and recognises that every person working for the business represents it in the community.
  • Natural systems are constantly in flux, evolving and growing.
  • Remaining observant of the changes around you, and not fixing onto the idea that anything around you is fixed or permanent will help too.
  • be flexible, lean and adaptable
  • A healthy approach is to start with no complete plan, to allow the process to be emergent. This is not a time when we can work to a rigid plan as conditions will change so fast. Organisations will need to stay on their toes, without rigid management.
Kurt Laitner

Owning Together Is the New Sharing by Nathan Schneider - YES! Magazine - 0 views

  • VC-backed sharing economy companies like Airbnb and Uber have caused trouble for legacy industries, but gone is the illusion that they are doing it with actual sharing
  • Their main contribution to society has been facilitating new kinds of transactions
  • The notion that sharing would do away with the need for owning has been one of the mantras of sharing economy promoters. We could share cars, houses, and labor, trusting in the platforms to provide. But it’s becoming clear that ownership matters as much as ever.
  • ...30 more annotations...
  • Whoever owns the platforms that help us share decides who accumulates wealth from them, and how
  • Léonard and his collaborators are part of a widespread effort to make new kinds of ownership the new norm. There are cooperatives, networks of freelancers, cryptocurrencies, and countless hacks in between. Plans are being made for a driver-owned Lyft, a cooperative version of eBay, and Amazon Mechanical Turk workers are scheming to build a crowdsourcing platform they can run themselves. Each idea has its prospects and shortcomings, but together they aspire toward an economy, and an Internet, that is more fully ours.
  • Jeremy Rifkin, a futurist to CEOs and governments, contends that the Internet-of-things and 3-D printers are ushering in a “ zero marginal cost society“ in which the “collaborative commons” will be more competitive than extractive corporations
  • once the VC-backed sharing companies clear away regulatory hurdles, local co-ops will be poised to swoop in and spread the wealth
  • People are recognizing that doing business differently will require changing who gets to own what.
  • “We’re moving into a new economic age,” says Marjorie Kelly, who spent two decades at the helm of Business Ethics magazine and now advises social entrepreneurs. “It needs to be sustainable. It needs to be inclusive. And the foundation of what defines an economic age is its form of ownership.”
  • It’s a worker-owned cooperative that produces open-source software to help people practice consensus—though they prefer the term “collaboration”—about decisions that affect their lives.
  • From the start Loomio was part of Enspiral, an “open value network“ of freelancers and social enterprises devoted to mutual support and the common good.
  • a companion tool, CoBudget, to help them allocate resources together
  • The team members recently had to come to terms with the fact that, for the time being, only some of them could be paid for full-time work They called the process “participatory downsizing.”
  • And they can take many forms. Loomio and other tech companies, for instance, are aspiring toward the model of a multi-stakeholder cooperative—one in which not just workers or consumers are voting members, but several such groups at once.
  • Loconomics is a San Francisco-based startup designed, like TaskRabbit, to manage short-term freelance jobs
  • “People who have been without for a long time,” she says, “often operate with a mindset that they can’t share what they have, because they don’t know when that resource will come along again.”
  • As Loconomics prepares to begin operations this winter, it’s running out of the pocket of the founder, Josh Danielson
  • The ambition of a cooperative Facebook or Uber—competitive, widespread, and owned by its community—still seems out of reach for enterprises not willing to sell large parts of themselves to investors. Organizations like 
  • His fellow OuiShare founder Benjamin Tincq is concerned that too much fixation on a particular model will make it hard for well-meaning ventures to be successful. “I like the idea that we don’t need to have a specific legal status,” he says. “It’s more about hacking an existing legal status and making these hacks work.”
  • Fenton’s new undertaking, Sovolve, proposes to “create innovative solutions to accelerate social change,” much as CouchSurfing did, but it’s doing the innovating cautiously. All work is done by worker-owners located around the world. Sovolve uses an internal platform—soon to become a product in its own right—through which contributors decide how much they want to be paid in cash and how much in equity. They can see how much others are earning. Their virtual workplace is gamified, with everyone working to nudge their first product, WonderApp, into virality
  • Loomio’s members use a similar system, which they call Loomio Points. But Sovolve is no cooperative; contributors are not in charge.
  • Open-source software and share-alike licenses have revived the ancient idea of the commons for an Internet age. But the “ commons-based peer production“ that Sensorica seeks to practice doesn’t arise overnight. Just as today’s business culture rests on generations of accumulated law, habit, and training, learning to manage a commons successfully takes time
  • It makes possible decentralized autonomous organizations, or DAOs, which exist entirely on a shared network
  • The most ambitious successor to Bitcoin, Ethereum, has raised more than $15 million in crowdfunding on the promise of creating such a network.
  • all with technology that makes collective ownership a lot easier than a conventional legal structure
  • A project called Eris is developing a collective decision-making tool designed to govern DAOs on Ethereum, though the platform may still be months from release.
  • For now, the burden of reinventing every wheel at once makes it hard for companies like Sensorica and Loomio to compete
  • For instance, Cutting Edge Capital specializes in helping companies raise money through a long-standing mechanism called the direct public investment, or DPO, which allows for small, non-accredited investors.
  • Venture funding may be in competition with Dietz’s cryptoequity vision, but it provides a fearsome head start
  • Co-ops help ensure that the people who contribute to and depend on an enterprise keep control and keep profits, so they’re a possible remedy for worsening economic inequality
  • Sooner or later, transforming a system of gross inequality and concentrated wealth will require more than isolated experiments at the fringes—it will require capturing that wealth and redirecting its flows
  • A less consensual strategy was employed to fund the Catalan Integral Cooperative in Spain; over the course of a few years, one activist borrowed around $600,000 from Spanish banks without paying any of it back.
  • In Jackson, Mississippi, Chokwe Lumumba was elected mayor in 2013 on a platform of fostering worker-owned cooperatives, although much of the momentum was lost when Lumumba died just a few months later.
chrisaiki

Smart Contracts are self-executing contractual states, stored on the blockchain, which ... - 0 views

  •  
    Smart Contracts are self-executing contractual states, stored on the blockchain, which nobody controls and therefore everyone can trust. Contacted by Christophe may 28th
Tiberius Brastaviceanu

GitHub Has Big Dreams for Open-Source Software, and More - NYTimes.com - 0 views

  • GitHub has no managers among its 140 employees, for example. “Everyone has management interests,” he said. “People can work on things that are interesting to them. Companies should exist to optimize happiness, not money. Profits follow.” He does, however, retain his own title and decides things like salaries.
  • Another member of GitHub has posted a talk that stresses how companies flourish when people want to work on certain things, not because they are told to.
  • Asana bases work on a series of to-do lists that people assign one another. Inside Asana there are no formal titles, though like GitHub there are bosses at the top who make final decisions.
  • ...8 more annotations...
  • For all the happiness and sharing, real money is involved here. In July GitHub received $100 million from the venture capital firm Andreessen Horowitz. This early in most software companies’ lives, $20 million would be a fortune.
  • GitHub’s popularity has also made it an important way for companies to recruit engineers, because some of the best people in the business are showing their work or dissecting the work of others inside some of the public pull requests.
  • Mr. Preston-Werner thinks the way open source requires a high degree of trust and collaboration among relative equals (plus a few high-level managers who define the scope of a job and make final decisions) can be extended more broadly, even into government.
  • “For now this is about code, but we can make the burden of decision-making into an opportunity,” he said. “It would be useful if you could capture the process of decision-making, and see who suggested the decisions that created a law or a bill.”
  • Can this really be extended across a large, complex organization, however?
  • As complex as an open-source project may be, it is also based on a single, well-defined outcome, and an engineering task that is generally free of concepts like fairness and justice, about which people can debate endlessly.
  • Google once prided itself on few managers and fast action, but has found that getting big can also involve lots more meetings.
  • Still, these fast-rising successes may be on to something more than simply universalizing the means of their own good fortune. An early guru of the Information Age, Peter Drucker, wrote often in the latter part of his career of the need for managers to define tasks, and for workers to seek fulfillment before profits.
Tiberius Brastaviceanu

P2P Foundation » Blog Archive » Ethical Marketing in Age of Horizontal Social... - 0 views

  • the development of marketing is sensible to its environment and is hence already self-limiting itself according to the previously mentioned legal and social framework
  • neuromarketing
  • explore new inner dynamics of marketing, new directions in the field of possibilities offered by the current organology and its articulations between techniques and social organization in order to influence and shape marketing as an associative force – in opposition to its current dissociative force – in the larger psychic, social and technic organology
  • ...70 more annotations...
  • find new ways of efficiency
  • arbitration between efficiency and care
  • a global thinking of the problem
  • Fighting the attention and desire resource shortage: stoping to use advertisement?
  • The question is rather here to think the moderation of the psychopower
  • empower transindividuation, i.e. to make sure that an economic activity creates more possibilities of individuation than it tend to destroy by attempting to capture attention and canalize motivation in a funnel. Empower transindividuation would imply to empowering actors of their own lifestyle, winning back the savoir-vivre prescribing production
  • Should marketing stop using psychopower?
  • marketing ethics guidelines
  • transactions are more likely to be morally defensible if both parties enter it freely and fully informed
  • the goal of marketing should be to increase the likelihood and frequency of free and informed transactions in the marketplace
  • putting freedom as a criteria of morality
  • the industrial use of pycho- and neuropower tend to fall under the category of barriers to freedom
  • neurotechniques – to capture the attention
  • psychotechniques – to attempt to create motivation
  • Most people think commercials are a small price to pay for these benefits
  • advertising
  • denying the schemes of addiction and the fact that we are becoming through the objects of attentions
  • right to avoid attention capture by advertising
  • progress made in cognitive sciences proving that
  • reward system being abnormally stimulated
  • Advertisements exploit
  • vulnerability and reinforce their overconsumption behaviors
  • “if food advertising on TV were banned, significant reductions in the prevalence of childhood obesity are possible.” (Veerman et al. 2009)
  • What is at stake falls to be much more complex than the sole Freedom of Speech invoked for the advertiser
  • liberty of non-reception
  • would mean to guaranty every citizen the right to choose where and when he wants to access the advertising information
  • Change in the industrial and commercial paradigm
  • Economy of contribution and peer production
  • An economy of contribution means that users of a service are contributing to the production of these services.
  • example
  • is open-source software that are contributively build by potentially hundreds of developers organized in communities
  • minimize the gap between the producer and consumer
  • blur the frontier between professionals and amateurs
  • The Copernican revolution of the Vendor Relationship Management paradigm
  • change in the commercial paradigm, described as an Intention Economy i.e. the opposite of the Attention Economy
  • consumers are charged to express and discuss their intention
  • with businesses rather than the usual paradigm in which businesses where fighting for a piece of canalized motivation
  • Implementing such a system would nevertheless imply that marketing departments dispose of a system in which they could value their supplies and where they could be easily found by customers. Doc Searls promotes his answer to this issue: the Vendor Relationship Management system.
  • the belief that free customers are more valuable than captive ones — to themselves, to vendors, and to the larger economy.
  • To be free
  • 1. Customers must enter relationships with vendors as independent actors.
  • 2. Customers must be the points of integration for their own data.
  • 3. Customers must have control of data they generate and gather. This means they must be able to share data selectively and voluntarily.
  • 4. Customers must be able to assert their own terms of engagement.
  • 5. Customers must be free to express their demands and intentions outside of any one company’s control.
  • This is a profoundly game-changing approach
  • big data that is the rush for consumers’ information potentially leading to the same dead-end of attention destruction and affective saturation than the former offline paradigm
  • VRM system working as a marketplace
  • the goal of marketing should be to increase the likelihood and frequency of free and informed transactions in the marketplace
  • less imperfect and less biased information in a cultural context overvaluing transparency, and a bigger atomicity due to the hereafter introduced trend for re-localized peer production.
  • 3.2.2.3 VRM and externalization of the socialization process
  • Promoting the end of advertisement
  • means to find a new way to make the information circulate, what was the primary goal of advertisement
  • Until there is no alternative to massive advertisement campaign for the information circulation, it is indeed hard to ask entrepreneurs and managers to get rid of those successors of propaganda: such a transition process necessarily imply adaptation costs from the producer and the consumer side, and possible competitive disadvantage against competitors still maximizing profit through advertisement means
  • But the internet transformation of the general organology offers new way to think information circuits and potentially constitute an opportunity to externalize the socialization process of products that is to empower citizen-consumers organized in communities
  • Empowering groups of citizen doesn’t annihilate the risks of mis-use or counterproductive interest-taker behaviors but a well-designed system of trust between peers could minimize this risk by creating a dependency to what social capital other peers give you, as it is happening in the sharing economy: the credibility of a contributive peer would be guaranteed through what the P2P Foundation calls Feedback systems and peer-police
  • a strong structuration of products characteristics, allowing customers to personalize their choices according to their desire and constraints: such a “VRM+” system
  • Marketing would then be the art of being as high as possible in this ranking, as it is happening in SEO for search engines, but in this context of criteria explosion, marketing would then be the disciple of listening to customers’ wishes and aspiration needing an attention, in order to kick in the production or to adapt the following series.
  • 3.2.2.4 Toward a possible equi-power
  • Such a system would tremendously re-configure the balance of power and tend toward a form of equi-power i.e. a social organization in which abuses of a “big” would be the potential object of a ranking sanction by the peers
  • self-regulative function
  • a form of economic Darwinism would let to conscious organization the right to curve their path toward a durable configuration in accordance with the social ecosystem.
  • the idea of equi-power is a form of homogenization of the social matter, in which the distortions in the balance of power would be compensated by the gathering of small forces sharing a common interest
  • Such a sanction systems, if successfully implemented, would make value-destructing businesses progressively decline and hopefully bankrupt,
  • long-term valuable strategic choice
  • long term satisfyingly high ranking
  • It would be utopic to think that the “being cool” marketing
  • would disappear, but marketers would have to make those two objectives compose together.
  • This social capital contagion is nevertheless a tool that would need to be controlled in its form of violence by extensive testings and iterations with forms of protections for the smallest peers, that is to say to keep this form of social violence to institutionalized, classic forms of businesses, clearly beyond the line of what should be acceptable in the global village.
  • the goal is here to create an artificial form of majority that is a self-censuring responsible behavior of corporations
Tiberius Brastaviceanu

PeerPoint « Poor Richard's Almanack 2010 - 1 views

  • Each PeerPoint is an autonomous node on a p2p network with no centralized corporate  infrastructure.
  • The PeerPoint will be connected between the user’s pc, home network, or mobile device and the ISP connection.
  • The PeerPoint is designed to Occupy the Internet.
  • ...7 more annotations...
  • provide greater user value
  • For numerous reasons the services provided by the commercial companies do not adequately meet the creative, social, political, and financial needs of the 99%
  • allows self-selected individuals to coalesce into powerful workgroups, forums, and movements.
  • With the PeerPoint approach, each user will own her own inexpensive internet appliance and all the data and content she creates
  • If a FreedomBox were used as a starting platform, the PeerPoint application package would be added on top of the FreedomBox security stack.
  • The common requirements for each PeerPoint app are: world class, best-of-breed open source p2p architecture consistent, granular, user-customizable security management and identity protection integrated with other apps in the suite via a common distributed database and/or “data bus” architecture. consistent, user-customizable large, medium, and small-screen (mobile device) user interfaces ability to interface with its corresponding major-market-share service (Facebook, Twitter, etc.) GPS enabled
  • First tier applications: distributed database social networking  (comparison of distributed social network applications) trust/reputation metrics crowdsourcing: content collaboration & management  (wiki, Google Docs, or better) project management/workflow data visualization (data sets, projects, networks, etc.) user-customizable complementary currency and barter exchange (Community Forge or better) crowd funding (http://www.quora.com/Is-there-an-open-source-crowdfunding-platform) voting (LiquidFeedback or better) universal search across all PeerPoint data/content and world wide web content
1 - 20 of 32 Next ›
Showing 20 items per page