Our own decentralized Identity Network
- What does that mean?
- Why would we want it?
- How do we do it?
The phone video is shorter (and smaller)
- Just shows how to contribute to our network and use the apps a little.
- This video has more details about how crypto enables this.
- The website has the zingers and motivation.
- Ridiculous comics
- Melodramatic expressions: "Liberated Trust". "Freedom of Speech 2.0". "Democracy 2.0".
- Internet liberated lies and pornography. Cryptography on the web can liberate trust and repution.
- Respectful, authentic online social experience
- Identities first, decentralized organization to follow
My surroundings
- Demo phone (not my identity), mirrored, ONE-OF-US.NET app already installed
- Big computer, mirrored
- My phone with (not mirrored) proudly displaying my public key and that our network has vouched that this key represents me and that I am human, capable, and acting in good faith.
ONE-OF-US.NET phone app (app links on website)
- Create new key, congrats..
- Turn on FYI - Feature exists specifically for this educational demo
Scan Tom's phone app
- Vouch for Tom's identity (and humanity).
- That's it, by the way — that's how you build our / your network.
- Show receiving invitation in gmail and on big computer (sent by me to this account earlier)
Invite back by sharing vouch link
(Even though Tom's not going to accept.)- you want to share your public key with someone remote
- have them vouch for your humanity and identity
- have them continue to distrbute your public key
2 apps
Both are demo like and go to extreme lengths to highlight the paradigm.- ONE-OF-US.NET phone app: builds network, sufficient (for starters;)
- Nerdster web app: leverages the identity layer puny and weak (not the killer app)
Sign in to Nerdster on big computer
- Turn on Show Crypto and FYI.
Sign in to Nerdster on big computer
- Access https://nerdster.org/app (on phone in other video)
- Sign in using recommended tech
- Submit "Memento, 2000"
Sign and publish a few statements
- Filter for recommended movies and recommend a movie
What happened? How is this different?
Crypto
See boxes on websiteRecognize
Show Crypto (extreme lengths to highlight the paradigm)- Check Andrew's and Tom's rate statements
- Click Andrew, see vouch chain
- Show Tom's vouch for Andrew
- Show all of Andrew's vouches published on the Internet
- Whitelisted content from our network
Complete Cryptographic Digital Signature Chain from your identity key to all the
whitelisted content.
Decentralized from your Point of View, not spam detection or moderation by a service.
Decentralized from your Point of View, not spam detection or moderation by a service.
All activities on the apps sign and publish statements using your keys
Everything shown on the apps comes from these published statements.
- Verifiable - by anyone or anything.
-
Portable - not trusted because of where you found it, but
because of who signed it.
Litter the Interweb with signed content instead of siloed or anonymous content. - Open - Any other app or service can jump in and participate.
Any service can leverage the identity layer as well as content published by using the Nerdster.
Identity Layer
When you vouch for others (scan phones or accept invitations)- You cryptographically sign a statement referencing the other person's public key using your own private key.
- That signed statement is published to a location where everything your key has signed can be found.
Delegate Layer
It wouldn't work out well to give 100's of services your private identity key.When you create and sign in with a delegate key, you:
- Create a new, disposable public/private key pair
- Sign and publish that this key represents you on that service
- Securely transmit that key pair to the service
Open (Heterogeneous)
See boxes on website
Nerdster sample features
Meant to show that any service can do any of these things.
Change PoV
- Demo phone not in network
- names change, decentralized
- content changes
- Anyone can use these PoVs
Follow Andrew, Block Tom
Tom talks too much, and his networks volume overwhelms the content I actually care about, but I want Andrew's network content.Even after blocking Tom, I can still visit. Consider a neighbor or colleague whose views you don't want on your network for your followers, but you still sometimes want to check it out.
- leverage identity layer (any service can)
- Demo phone isn't following Andrew's Nerdster account; it's used its Nerdster delegate key (which represents it) to express that it wants to follow Andrew the person.
- Any service can find, validate, and honor that. (Ditto on blocking Tom)
- WSJ, NYT, Reddit, ...
Real people, Logical subjects
Open (Heterogeneous)... Play nice with others..
People, not accounts
We own our identity keys as well as our delegate keys.What we didn't do:
- Pick a username, password
- Authenticate with a service to do something as ourselves
- Named Tom
- Signed a statement using a tool and our own key
Close accounts
No accounts.- Revoke the Nerdster's delegate key using our identity key and the phone app.
- The demo phone sort of gave the Nerdster an account, not the other way around.
- Demo phone never had an identity or ONE-OF-US.NET account (and it never will, as neither I nor anyone in my network will vouch for its humanity)
- I don't have an identity account with ONE-OF-US.NET or any other service. If anything, I have an account with the folks who've vouched for me.
Nerdster!
Simpsons Bot Farm
- poor choices for monikers (eg. Mom, Wife)
- bad faith actions (eg. Nelson blocks Luanne)
- clowns!
Lisa (capable, acting in good faith)
Clean: Horses, baking.. Very Lisa
Bart
Likes his movies dirty, not poignant. Bart!
Milhouse (confused)
Trust clowns (spammers, bad actors), get clown news. Downright fraudulent!
How to cleaan this up?
Open in bigger screen, show Milhouse to Marge using "permissive", "standard", "strict".- Trust Lisa, who trusts Marge, who blocked the clown
- Use a more restrictive network algorithm (permissive, standard, strict)
- Were you to come in through Milhouse, you'd have a pretty good idea that Marge is real, not too revealing, but maybe just enough to be convincing.
Tough problem
Given a pile of vouches, some legitimate, some bogus, who's legit?So is fighting spam, disinformation, and manipulation online. How can we expect them to solve this for us if we don't help them differentiate ourselves from bots, spammers, and bad actors?
It's easier starting with you for your PoV. But it's still hard. Let the Internet can figure it out.. heterogeneous open competition
Nerdster computes network in very simple way -
- just starts building and notifies when encoutering conflicts.
- suppoerts permissive (single path), standard, strict consistency.
- 'standard': '1-1-2',
- 'strict': '1-2-2-3',
- 'permissive': '1',
- ONE-OF-US.NET doesn't compute it at all, only allows you to express vouch.
- Serious services will compete on how well they compute the network.
Social and Societal
See boxes on websiteSo why do it?
It isn't hard, but they can't do it for us because they can't get along as each seeks dominance
- Our own = everybody's, anybody's
- Decentralized = yours
-
What else is these days?
Are we losing the plot? - Get a crypto key, get recognized. Just in case..
- Make your support visible (do something on the Nerdster, loop someone else in.)
- Check back later..