Nothing survives unless there is a way to make money. TCP/IP may be free - but you pay for the device to connect to it, and then you pay a monthly fee to communicate using it. Pie is never free at the truck stop.
The V in VRM stands for Vendor - the Vendor cannot supply something for nothing or they will go out of business. The costs of staying in business are born primarily by the consumer who buys something. The notion of VRM is that my data has value that I
exchange with the Vendor for a better service or experience or product.
If you’re saying that money is not the only measure of value then you have to qualify that statement as it applies to your vision of VRM. I will guarantee that money is going to enter the equation somewhere.
Doc - I’m not attacking you personally here - I’m attacking the problem head on. I want to quantify the value in terms that those billionaires who you meet with understand - Money and P&L statements and quarter reports to shareholders. If there’s nothing in
it for them then VRM fails.
Somebody on this list should be able to show real money or some quantifiable measure of value that we can all agree on.
From: Doc Searls <
">
>
Date: Monday, December 16, 2013 at 11:26 AM
To: "Peter J. Cranstone" <
">
>
Cc: ProjectVRM list <
">
>, Jeremie Miller <
">
>, Adriana Cronin-Lukas <
">
>,
John Clippinger <
">
>
Subject: Re: [projectvrm] Fred Wilson's talk
Value is important, obviously. But money is not the only measure of value or the only motivation for creating a protocol or building a code base. If it were we would have approximately nothing.
Consider this. The Net on which Facebook, Instragram, Google and all of e-commerce was built does not have a business model. It was, and still is, a bunch of protocols created for other purposes. From The Intention Economy:
By TCP/IP’s design, the Net has no single purpose—or any purpose at all—other than to move packets of data from any one end to any other end. This pushes toward zero the functional distance between those ends and minimizes the efforts
required to find paths for data between them. While those efforts do have costs, the Internet itself has no interest in those costs. It has no agenda for creating or protecting scarcities, because it is not a business and therefore has no business model. It
is as elemental as oxygen or a pine tree. Those have no business models, either, but are highly use- ful to business. So, thanks to its any-purpose design and absent business model, the Net supports trillions of dollars in business activity, much of which
would not exist if the Net were not there.
What John, Jeremie, Adriana, Markus and many other developers here are doing is creating the oxygen and pine trees we need in an ecosystem that is still in its formative stages, regardless of how well-developed the companies making money there may already
be. Their inventions are tides that will lift economic boats of many kinds. Faulting their inventions for not making money themselves at this early stage is a category error. Money may not be made with those things, but great wealth will be made because of
them.
Doc
On Dec 16, 2013, at 8:52 AM, Peter Cranstone <
">
> wrote:
Doc,
The problem is not outside the Web - or that it’s a heterarchy - the core problem is that the web is a ‘ stateless protocol’ (a communications protocol that treats each request as an independent
transaction that is unrelated to any previous request so that the communication consists of independent pairs of requests and responses) - which means in short that it has Alzheimer’s. Why do you think we need cookies? Because the web forgets without the ability
to read something on the users device. And those cookies are basically enabling the entire Adtech industry. And encrypting everything does NOT solve the Vendor problem of creating value, it simply adds a huge load to the Web.
As for secure communications - that ship has sailed. We NO longer have a decentralized web. A majority of the web runs through just a few service providers which provide the NSA with all they need.
As for this whole Personal Cloud - which I agree with. What people continue to miss in every conversation is the following…
- If you want people to use the Personal Cloud which is going to REQUIRE a behavioral change then you MUST show the value in terms that THEY (I) understand. Everybody keeps telling me that my personal data is worth X - and yet I never see X in a place that
matters to ME
Let me illustrate this point: Instagram just tried something new - so far adoption has been anemic - so you have to ask yourself ‘Why?’ - well it required a behavioral change and the consumer cannot figure out what the VALUE is based on that change. So
they try it and then go back to what they know because it offers them all the value they need.
Personal Clouds are a great idea - but if I’m going to put all my data in them then I have to understand in terms that make sense to ME why this is a good thing. So far there is ZERO validation to prove that there is value in a personal cloud other than
more work for me. If we’re going to get VRM in to the end zone then we have to focus - and we have to PROVE that a Vendor gets value from this personal cloud based on the data I share.
In the Mustard Seed example below - exactly how does it make money? If we can’t answer that question then how do we quantify the value of the secret conversation. 99% of people communicating on the web do NOT require secure conversations. Skype and iMessage
already do a fine job. So exactly who is the customer who is going to use this Mustard Seed approach to secure communication? Again we need a named customer - and then we need to call him/her and find out if they would be willing to pay for this and how much.
RE: The Social Stack.
There are a billion people on FaceBook - lots of value - no value to switching to a new stack.
The reason I hammer on this VALUE proposition is because it’s so darn important. There are a ton of ‘seeds’ sprouting all over the web. We know - but what we cannot answer on this forum is how they provide value and then showcase empirically that value.
If we’re going to offer value to startups who listen to this forum then we need to do them a favor - ask hard questions, drive to empirical measurements and real world customer use cases.
There’s enough smarts here to do just that.
From: Doc Searls <
">
>
Date: Monday, December 16, 2013 at 9:26 AM
To: ProjectVRM list <
">
>
Cc: Jeremie Miller <
">
>, Adriana Cronin-Lukas <
">
>, John Clippinger <
">
>
Subject: Re: [projectvrm] Fred Wilson's talk
Fred was talking, I believe, about activities outside the Web.
What he and others among us get is a growing sense that giving people control over privacy, identity, permissions, agreements and social interactions is hard or impossible through the Web alone — and instead must be addressed at the level of the Net below
the Web.
That's not just because the Web, or at least its commercial sector, has become corrupted by bad acting. It's also because the Web is client-server, or calf-cow,
in its architecture. It is hierarchy built on heterarchy. This isn't wrong; it's just inadequate. (Adriana Lukas, who has been active around VRM and related issues since before the beginning of this list, has been doing some
great thinking around heterarchy.)
The is what telehash is about, for example: "It works by sending and receiving small encrypted bits of JSON (with optional binary payloads) via UDP using
an efficient routing system based on Kademlia, a proven and popular Distributed Hash Table " Jeremie Miller leads that. He also led development
of Jabber and the XMPP protocol for instant messaging.
A Framework for developing and deploying secure cloud applications to collect, compute on, and share personal data
• Developer support enables rapid creation of cloud based private social mobile applications
• Secured access using OpenID Connect
• Modular structure of service APIs and access control defined using legal constraints
• Automated deployment of Service Components (from hardware to complete cloud-based mobile application deployment)
• Personal Data Service providing cloud storage and secure computation
The Open Mustard Seed project is an open-source framework for developing and deploying web apps in a secure, user-centric personal cloud. The framework provides a stack of core technologies that work together to provide a high level of security and ease of
use when sharing and collecting personal and environmental data, controlling web-enabled devices, and engaging with others to aggregate information and view the results of applied computation via protected services.
The scope of this effort is largely driven by the needs of the Trust Framework architecture for personal data ecosystems being developed at ID3.
Overall, the project aims to contribute a layer of software and methodology for the development, deployment, and management of user-centric, data-intensive, and distributed cloud applications and services.
Within that, there is openPDS:
This is part of the Open Mustard Seed project towards creating a full Trust Network reference platform. openPDS follows the recommendations of the WEF, the US NSTIC and the US Consumer Privacy Bill of Rights. openPDS allows sensitive
data processing to take place within a user’s Personal Data Store. The dimensionality of the data can thus be individually reduced on a per-need basis before being anonymously shared. The framework allows for PDSs to engage in privacy-preserving group computation,
which can be used as a replacement for centralized aggregation.
The core principles of openPDS are:
• Answers, not Data
• Permissions for Sharing
• Auditability
• Governance
It consists of five layers of social technologies, each of which deals with distinct challenges in securing and sharing personal private data in controlled digital contexts. The five layers deal respectively with Core Identity; Identity
Management and Authentication; Trust Frameworks; Core Services; and Applications.
The purpose of the Social Stack is to help establish distributed systems to manage personal identity on open platforms. Together, the five layers can enable trustworthy forms of collaboration, exchange and governance of resources. These technologies are already
actively developing and starting to coalesce fitfully into a more integrated, open software platform. It is a process that ID^3 is actively facilitating in a number of demonstration projects.
The basic goal of the Social Stack is to enable people to develop trusted online social and commercial relationships that can persist and scale. This capacity depends upon people being able to control their own personal information. They must also be able
to efficiently authenticate other people’s identities based on self-selected criteria for mutual association, trust and risk.
If equipped with the proper tools, distributed networks and groups could allocate their resources and privileges among their participant-members as they see fit. The Social Stack would enable sustainable, bottom-up forms of governance to take root and grow.
The system could be used to advance commerce, civic engagement, social purposes or non-market provisioning.
In this sense, the Social Stack has sweeping implications for political governance in both theoretical and practical terms. It could transform the role of the State, by empowering citizens to devise new forms of self-actualized institutions that exhibit greater
social legitimacy, efficacy and adaptability than governments. As a technical and political matter, the Social Stack would not consist of a single, monolithic set of protocols and software systems, but rather an evolving plurality of approaches animated by
users themselves. It would also be completely decentralized and open source, and so the platform could not be “captured” by any single player or group and would always be capable of evolving and innovating.
As Fred said in his talk (and many among us have also been saying), it's still early. We have lots to do.
cc'ing Jeremie, John and Adriana, whose thoughts I welcome on the matter.
Doc
On Dec 15, 2013, at 8:56 PM, Peter Cranstone <
">
> wrote:
We already have a Privacy Protocol - it¹s called HTTP. What we don¹t have
is a way to get rid of cookies which run on top of HTTP.
We need to come up with a way that allows the Vendors web site to still
function without cookies, and for the user to not have to re-type data due
to missing cookies. In the irony of all ironies the intention signal is
the cookie¹s replacement. Because it solves the problem for both consumer
AND vendor by creating NEW VALUE without requiring a change in behavior.
Peter
On 12/14/13, 6:29 PM, "Doc Searls" <
">
> wrote:
http://blogs.law.harvard.edu/doc/2013/12/14/fred-wilsons-talk-at-leweb/
Further thoughts welcome.
Doc
|