You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
How about defining 3 layers and the protocols within and across layers:
machine to machine e.g. mobile to mobile, mobile to server, etc.
bitoftrusts / trust networks
application
The bitoftrust “protocol” is the protocol needed to create, update, revoke, and read bitoftrusts (private/restricted/public) to create/exploit trust networks—and we imagined a git-like protocol based on local consensus for updating their contents.
Everything is connected through bitoftrusts, for example, there is a bit of trust between me and my telephone, me and my computer and one between my computer and my telephone (use the Mac address as ID for machines?). The #domain for those bitoftrusts could be #null. We could then create a network of trust across machines for the #null domain…
The machine layer (1) operates using information from the bitoftrust layer (2), e.g. to provide access to resources, storage, etc.
Security: after 3 failed attempts to access the machine, the bitoftrusts containing the ID of the machine are being revoked thus removing the machine from the web of trust.
The application layer (3) operates using the information from the bitoftrust layer (2), e.g. a Linkedin-like app, building representations and interpreting information relative to trust networks. Conversely, applications collect data to feed-in and grow the number of bitoftrusts, i.e. the meaningful connections within (and across) communities of practice (the #null #domain is the community of practice of all the people who own telephones / computers / tablets).
A “new” Linkedin application could move the centre of gravity from the individual to the communities (#domains). Individuals primarily exist in relation to communities (#domains), the “individual profile” being the projection in the “individual space” of a the information contained in the collective space / narrative. This is what gives credibility to individual stories. It makes it very difficult to create a faked story as, to exist, it needs to exist a as a shared story in the first place.
The text was updated successfully, but these errors were encountered:
How about defining 3 layers and the protocols within and across layers:
The bitoftrust “protocol” is the protocol needed to create, update, revoke, and read bitoftrusts (private/restricted/public) to create/exploit trust networks—and we imagined a git-like protocol based on local consensus for updating their contents.
Everything is connected through bitoftrusts, for example, there is a bit of trust between me and my telephone, me and my computer and one between my computer and my telephone (use the Mac address as ID for machines?). The #domain for those bitoftrusts could be #null. We could then create a network of trust across machines for the #null domain…
The machine layer (1) operates using information from the bitoftrust layer (2), e.g. to provide access to resources, storage, etc.
Security: after 3 failed attempts to access the machine, the bitoftrusts containing the ID of the machine are being revoked thus removing the machine from the web of trust.
The application layer (3) operates using the information from the bitoftrust layer (2), e.g. a Linkedin-like app, building representations and interpreting information relative to trust networks. Conversely, applications collect data to feed-in and grow the number of bitoftrusts, i.e. the meaningful connections within (and across) communities of practice (the #null #domain is the community of practice of all the people who own telephones / computers / tablets).
A “new” Linkedin application could move the centre of gravity from the individual to the communities (#domains). Individuals primarily exist in relation to communities (#domains), the “individual profile” being the projection in the “individual space” of a the information contained in the collective space / narrative. This is what gives credibility to individual stories. It makes it very difficult to create a faked story as, to exist, it needs to exist a as a shared story in the first place.
The text was updated successfully, but these errors were encountered: