Text archives Help


Re: [projectvrm] John Naughton on VRM in The Guardian


Chronological Thread 
  • From: James Pasquale < >
  • To: Phillip Windley < >
  • Cc: "Chasen, Les" < >, Doc Searls < >, StJ Deakins < >, Reuben Binns < >, John Harrison < >, ProjectVRM list < >
  • Subject: Re: [projectvrm] John Naughton on VRM in The Guardian
  • Date: Mon, 02 Feb 2015 17:53:45 -0500

And so goes the notion of having a mixing board to control all that data on the individuals terms along with the ability to management the signal to noise ratio when sharing that data.  Not everybody need to know what kind of underwear one prefers… do they?

/jp

Thank you Les my basis is XDI to.
On Feb 2, 2015, at 11:24 AM, Phillip Windley < " class=""> > wrote:


I concur strongly here. While I love the idea of having a personal box
with my stuff on it under my control, I’m never going to have all my data
in one place. These aren’t competing ideas, but complimentary ones.

On 2/2/15, 7:55 AM, "Chasen, Les" < " class=""> > wrote:

Yes freedom box is an example of maintaining your data in a box that you
control but that is not the only way.  It could also be a hosted service.
The main point is that it is a point where people can own and control how
their data is used.  What i like about freedom box is that i could also
have a hybrid solution.

I think in order for you to control how your data is used first you need
to be able to map it or somehow put a boundary around it.  It will never
be physically aggregated into one centralize place.  But it can be mapped
into a datagraph.  Yes, my bias is towards XDI for this.

From there it can be authorized for use.  UMA is a perfect mechanism for
this step.  I agree with all the sentiments on that.



-----Original Message-----
From: Doc Searls < " class=""> >
Date: Sunday, February 1, 2015 at 2:17 PM
To: Les  Chasen < " class=""> >
Cc: StJ Deakins < " class=""> >, Reuben Binns < " class=""> >,
John Harrison < " class=""> >, ProjectVRM list
< " class=""> >
Subject: Re: [projectvrm] John Naughton on VRM in The Guardian

I don¹t think it is.

The Freedom Box proceeds from the assumption that the individual should
have full control over a box in their possession, and what happens to the
data on it. It¹s context is not the marketplace but the original
peer-to-peer end-to-end Internet. So, while it can be used in the
marketplace, it doesn¹t start there.

The original links for Freedom Box are pretty stale (from 2011):
https://urldefense.proofpoint.com/v2/url?u=http-3A__freedomboxfoundation.
o
rg_&d=AwIFaQ&c=MOptNlVtIETeDALC_lULrw&r=GmIkFYB5mJUePL-AjY1Dc16uEHcEGn7Vg
N
AWW67Dwz0&m=jQEDjAVkk9MCKiTphB7KFfCw6tBtK4L_Es6Itz_QrKU&s=nRJSTy5QsBYndZU
q
hw9-uHoA4uL002eHVvG-bjcSsWU&e=
https://urldefense.proofpoint.com/v2/url?u=http-3A__www.nytimes.com_2011_
0
2_16_nyregion_16about.html-3F-5Fr-3D0&d=AwIFaQ&c=MOptNlVtIETeDALC_lULrw&r
=
GmIkFYB5mJUePL-AjY1Dc16uEHcEGn7VgNAWW67Dwz0&m=jQEDjAVkk9MCKiTphB7KFfCw6tB
t
K4L_Es6Itz_QrKU&s=Q4a4FLMGv-6YFEITa7bPAMxXxC7_nEDmYAxgEo5z4H8&e=

But Markus has been active in a variety of ways:
<https://urldefense.proofpoint.com/v2/url?u=http-3A__iiw.idcommons.net_ID
-
5FThings-5FYou-5FCan-5FDo-5FWith-5FA-5F-25E2-2580-259CFREEDOM-5FBOX-25E2-
2
580-259D&d=AwIFaQ&c=MOptNlVtIETeDALC_lULrw&r=GmIkFYB5mJUePL-AjY1Dc16uEHcE
G
n7VgNAWW67Dwz0&m=jQEDjAVkk9MCKiTphB7KFfCw6tBtK4L_Es6Itz_QrKU&s=kLzynm232k
C
ENQ6f4Pp2U64HJJUwTx_vHCnRkodqkqg&e=
<https://urldefense.proofpoint.com/v2/url?u=http-3A__blog.gmane.org_gman
e
.linux.debian.freedombox.user_day-3D20141228&d=AwIFaQ&c=MOptNlVtIETeDALC
_
lULrw&r=GmIkFYB5mJUePL-AjY1Dc16uEHcEGn7VgNAWW67Dwz0&m=jQEDjAVkk9MCKiTphB
7
KFfCw6tBtK4L_Es6Itz_QrKU&s=me1CnZVaRkIT98XQEEdqoB-uZdAYBmKGpKZk34uk2kI&e
=


One of those is from IIW. We should talk about it some more there.

As for Databox, this, from
https://urldefense.proofpoint.com/v2/url?u=http-3A__arxiv.org_abs_1501.04
7
37&d=AwIFaQ&c=MOptNlVtIETeDALC_lULrw&r=GmIkFYB5mJUePL-AjY1Dc16uEHcEGn7VgN
A
WW67Dwz0&m=jQEDjAVkk9MCKiTphB7KFfCw6tBtK4L_Es6Itz_QrKU&s=-WUwqeV50oq9YA4w
m
dcfJwzx28jGb9h7fVFm4eh9TIk&e=  sounds similar...

We propose there is a need for a technical platform enabling people to
engage with the collection, management and consumption of personal data;
and that this platform should itself be personal, under the direct
control of the individual whose data it holds. In what follows, we refer
to this platform as the Databox, a personal, networked service that
collates personal data and can be used to make those data available.
While your Databox is likely to be a virtual platform, in that it will
involve multiple devices and services, at least one instance of it will
exist in physical form such as on a physical form-factor computing
device with associated storage and networking, such as a home hub.

But this from
<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.technologyreview
.
com_view_534526_how-2Da-2Dbox-2Dcould-2Dsolve-2Dthe-2Dpersonal-2Ddata-2Dc
o
nundrum_&d=AwIFaQ&c=MOptNlVtIETeDALC_lULrw&r=GmIkFYB5mJUePL-AjY1Dc16uEHcE
G
n7VgNAWW67Dwz0&m=jQEDjAVkk9MCKiTphB7KFfCw6tBtK4L_Es6Itz_QrKU&s=xIN8J7fGgz
j
IQIS_vslGjDKOpvhh3Pm-bgIbFDNQ2EI&e= > lays it in a commercial context:

The basic idea behind the Databox is that it is a networked service
that collates personal information from all of your devices and can also
make that data available to organizations that the owner allows. This
piece of software must have a number of important attributes.

First, it must be trusted by the individual who uses it. That¹s a big
ask. The Databox will gather information about browsing habits, buying
behavior, financial details such as bank statements, e-mail and social
media contacts as well as calendar entries and so on. To allow all this
all to be stored in a single online repository will require remarkable
act of faith for most people. Ensuring the security of a Databox is
therefore a crucial requirement.

But the owner of the data is not the only one who needs to share this
trust. Any company or organization that accesses the data must also have
faith that it is reliable, something that will require third-party
auditors who can verify that the system is operating is expected.

As well as gathering personal information, the Databox must allow
controlled access to it. So third parties must be able to selectively
query any information that the user allows them access to. At the same
time, the user must be able to control how this data is accessed and be
able to change the settings when necessary.

Finally, there must be incentives for all those involved to use the
Databox. For example, ordinary people may be more likely to use the
service if it contains a mechanism that allows third parties to pay for
using the data.

It may also provide an incentive for third parties by reducing their
exposure to sensitive data, such as health records. For example, an
organization may need access to health data but not want the cost and
responsibility of storing it securely. ³An analogy might be the way
online stores use third-party payment services such as PayPal or Google
Wallet to avoid the overhead of Payment Card Infrastructure compliance
for processing credit card fees,² say Haddadi and co.

This is also consistent with the full .pdf of the Databox report:
<https://urldefense.proofpoint.com/v2/url?u=http-3A__arxiv.org_pdf_1501.0
4
737v1.pdf&d=AwIFaQ&c=MOptNlVtIETeDALC_lULrw&r=GmIkFYB5mJUePL-AjY1Dc16uEHc
E
Gn7VgNAWW67Dwz0&m=jQEDjAVkk9MCKiTphB7KFfCw6tBtK4L_Es6Itz_QrKU&s=LuUh29U1s
8
fd-aEtkvbo3zKyDMr__k7gmZLz5rXF6sM&e= >. The authors have also not
designed the platform. They have just outlined the need for one and how
it might work.

Like John Naughton's Guardian piece, the Databox writeup ignores work
already happening in the world, including the Freedom Box, abundant work
going on in the U.K., notably all the PIMS followed by Ctrl-Shift, plus
other efforts such as Aral Balkan's
<https://urldefense.proofpoint.com/v2/url?u=http-3A__ind.ie&d=AwIFaQ&c=MO
p
tNlVtIETeDALC_lULrw&r=GmIkFYB5mJUePL-AjY1Dc16uEHcEGn7VgNAWW67Dwz0&m=jQEDj
A
Vkk9MCKiTphB7KFfCw6tBtK4L_Es6Itz_QrKU&s=ip4l3fhdnXFAaRPYKzwZ9OsPuCrVXKs-g
Q
lNszS1ZN0&e= > ‹ and work happening around the world and listed
(incompletely) here at ProjectVRM:
<https://urldefense.proofpoint.com/v2/url?u=http-3A__cyber.law.harvard.ed
u
_projectvrm_VRM-5FDevelopment-5FWork&d=AwIFaQ&c=MOptNlVtIETeDALC_lULrw&r=
G
mIkFYB5mJUePL-AjY1Dc16uEHcEGn7VgNAWW67Dwz0&m=jQEDjAVkk9MCKiTphB7KFfCw6tBt
K
4L_Es6Itz_QrKU&s=LfSXHshYNY9CIpDb_078ri1vyJiDfz30xTmPN5wFOjs&e= >.
(Ind.ie and Databox are both there, among much else.)

Doc





On Feb 1, 2015, at 10:52 AM, Chasen, Les < >
wrote:

Sounds like the freedom box that markus works on.

From: StJ Deakins < >
Date: Sunday, February 1, 2015 at 9:17 AM
To: Reuben Binns < >, John Harrison
< >
Cc: " " < >
Subject: Re: [projectvrm] John Naughton on VRM in The Guardian

Nice spot Reuben. Will go buy the paper :)

John H, is DataBox linked to your initiative?
StJ

On Sunday, February 1, 2015, Reuben Binns < > wrote:
I was leafing through the Observer (the UK Guardian's sunday edition)
and found this nice little piece from John Naughton which refers to
Doc
and VRM. It's on the front page of the paper's 'Discover' supplement
on
science and technology.


https://urldefense.proofpoint.com/v2/url?u=http-3A__www.theguardian.co
m
_technology_2015_feb_01_control-2Dpersonal-2Ddata-2Ddatabox-2Dend-2Dus
e
r-2Dagreement&d=AwIFaQ&c=MOptNlVtIETeDALC_lULrw&r=GmIkFYB5mJUePL-AjY1D
c
16uEHcEGn7VgNAWW67Dwz0&m=jQEDjAVkk9MCKiTphB7KFfCw6tBtK4L_Es6Itz_QrKU&s
=
oyOJY-G9fs3UQjOhZ6HOtDSGBzEFsxqGsLl20M9NANc&e=











Archive powered by MHonArc 2.6.19.