Cloud Fallacy

1. What are Clouds ?

The word “Cloud” is just a marketing term that can mean whatever the person trying to sell something wants it to mean, as articulated by Larry Ellison below.

Here we will define Cloud Computing (the "Clouds") as all services and systems that take information from you (crowd-sourced their data) in order to control you or build up their assets at your expenses thus increasing THEIR power and value while reducing YOURS.

1.1. Cloud Examples

Providers of application independent compute power (like virtual machines e.g. Vultr, AWS etc.) are NOT Clouds, as they do NOT dictate what software you can run of their machines and they do not access your data as part of their business model. We call these providers Hosters, as they host computers remotely for their customers.

On the other hand, loyalty programs and credit cards that analyse or sell your data ARE Clouds. You have no control of what they are doing with your data (e.g. using your data to influence you) and you lose out on potential income from the data they have gathered.

Meta, Google, Twitter etc. are Social Clouds that make money from your data by selling them to buyers to influence your behaviour and using the social network you have built to lock you into their platforms.

Bitcoin, Ethereum etc. are Blockchain Clouds despite their claim to be decentralised, they are NOT. That deception fuelled by ignorance and greed is burning up the world's energy reserves and need to be stopped.

2. Free Service Delusion

If you're not paying for something,
you're not the customer,
you're the product being sold.

Andrew Lewis

Cloud companies do NOT become massively profitable by providing free services. They take something of value from you (your DATA) and create something of even more value (CONTROL of you) for themselves.

2.1. Distorting World Views

Whether you are using the Cloud for your searches or your videos, you are using THEIR algorithms (they decide what to tell you about the world, what data about you to sell to who, when to insert which advertisement into your view etc.), that is, they control your information environment and thus they also control your life.

Having someone who controls a large part of your life acting against your interests is a problem.

But it is not just the "personalised" video recommendations and search ranking that distort your world view, it is also the constant notifications that interrupts your ability to look further or think deeply.

That repeating of same short sharp messages and preventing you from further investigations, can promote believes and behaviours that are NOT in your interest.

For example, preventing the determination of whether something is is "a need" or "a want" and whether some action is "right" or "wrong".

SOLVED: Private Cyberspace uses algorithms that you select and can change at any time. Whether it is search ranking, video recommendations or instant notifications, you are in control.

2.2. Acting with Impunity

Power tends to corrupt and
absolute power corrupts absolutely.

Lord Acton

It is difficult to find organisations that do NOT act against the interest of its users, even innocent weather channels have problems.

The Clouds can PROMISE all they want in their usage terms and conditions, but they can also DO whatever they want anyway, since they have your data on their infrastructure.

For example, even if you are technical enough to tell Google to explicitly NOT to track you, it stills tracks you anyway against your explicit instruction. Basically, information about you is collected by Google continuously in their interests not yours.

The fines for wrong doings are small compared to the profits being made, there is no reason for Clouds reduce their income voluntarily in the interest of their users.

SOLVED: Private Cyberspace aligns with your interests (instead of Cloud's interests), there is no rule, term nor condition for you, you do whatever is best for you with your data.

2.3. Holding Data Ransom

The above are bad behaviours that the Clouds do not tell you, but even if the Clouds DO tell you about bad things they are going to do to you, what can you do ?

For example, Twitter has disabled some of your ability to control your privacy. But you are not going to uninstall the Twitter app because of such a small thing, are you? And all future changes are probably "small" things too!

The problem is you gave them your data to build their information assets BEFORE these new changes, now those data are locked in.

Giving Clouds your data is easy but exporting or deleting your data ?
What about your social network that you have exposed and donated to the Cloud, so it can control your friends too ? You are probably going to miss that ?

SOLVED: All data are stored in your Private Cyberspace, giving you exclusive access to every bit of data you have collected and every piece of message you have received, only you can decide on when, what, how and who to share them with.

2.4. No Home Privacy

The security problems with Amazon Alexa and Google Assistant are well known.

The situation is getting worse everyday as more "smart" devices are deployed inside of homes, these vulnerable devices (from speakers to cameras to teddy bears) are massive security risks - as they are now making connections to the Cloud "internally" from your local network, your home broadband router is no longer effective in blocking these what really in fact are "external" connections.

So beside seeing and influencing your external world view, with the help of these home devices the Cloud can now see into your local network (which were previously off-limits to scanners and web crawlers). Most of these devices will not even work without an internet connection back to the Cloud - so data from your most private space is now shipped all over the world 24x7.

SOLVED: Private Cyberspace keeps activities in your physical home space private, by locking all of them up (from voice commands to room temperatures to security videos) for your exclusive use.

2.5. Artificial Intelligence Safety

Artificial Intelligence (AI) technologies like Amazon Alexa telling a kid to short an electrical wall outlet is dangerous enough but what about the USA using AI to pick targets to kill instead of just destroying targets humans picked?

The ironic thing is governments do NOT need to install cameras everywhere, when citizens are exposing themselves freely on Instagram, that database has became useful for in identifying enemy soldiers in Ukraine.

SOLVED: With Private Cyberspace both the data and the AI software remain within the control of the owner. From scanning your friends' faces in photos to the voice command you said yesterday, all data inputs and resulting outputs are exclusively yours.

2.6. Exploiting Public Infrastructures

Concentration of the Internet's data processing and storage in these Clouds means the broadband networks funded by EVERYONE is now being used to benefit just a FEW . . . what's worse . . . those public infrastructures are being use to control the citizens that paid for them.

Taxpayers funded a lot of the Internet infrastructure in a country, yet the traditional point to point model has now been replaced with a hub and spoke model. One of the most valuable resources of a country that was built up over decades has become an extension for the Clouds.

The better the citizens build their broadband, the more data the Cloud collects, the more it controls the citizens' lives. The broadband is used to monitor and influence them (e.g. search results, buying habits, meeting people etc.) based on the Cloud's algorithms and the Cloud's interests.

SOLVED: Private Cyberspace communicates with each other directly, ensuring that infrastructure investments in an area benefits the locally population fully instead of some corporations thousands of kilometres away.

2.7. Limitations of Regulations

The difference in nature between government (establishing boundaries) and technology (breaking boundaries) makes them strange bedfellows.

  1. Restricted Processing
    While initiatives like European Union's General Data Protection Regulation are great, the restriction of the Cloud in handling citizen data can reduce the value of those data by preventing innovative and useful computation to be performed on them.
    SOLVED: Instead of restricting what the Cloud can or cannot do to citizen data, may be the governments should also be encouraging the citizens to do more with their own data themselves?

  2. Wasted Data
    Law that prevent Clouds keeping data, if followed, can prevent
    Instead of removing the data after they have already gone into the Cloud as promoted by the right to be forgotten, what about not giving so much data to the Cloud in the first place ?

  3. Slow Response
    Making laws to regulate technology is. too slow, by the time the government realised that their local industries (e.g. taxi, software etc.) have been negatively affected, market dominance has already been established.

  4. Little Understanding
    From AI to blockchain, technologies can be complex making it difficult for law makers to understand their future impact and implications.

  5. Disadvantage the Small
    Law is a very blunt tool that can stifle innovation, regulations most often make it too expensive for small players to comply yet cost the big players almost nothing to follow (assuming the lobbyists of the big players have not watered down the laws in the favour in the first place).

3. Private Cyberspace


3.1. Bus and Car Analogy

Cloud Platforms are like a BUS companies using the roads (the Internet) paid for by the citizens to run their restricted bus services. Private Cyberspace is about reclaiming the roads for ourselves and drive on them freely to anywhere in our own CARS.

The FREEDOM that comes with owning your information assets is similar to taking ownership of physical assets, like your own CAR and your own HOME - you can go anywhere at anytime without worrying about bus timetables, you can renovate your room however you like etc. You no longer need to dance to the tune of the owners of the Cloud.

Road utilisation improves (as the whole road network can now be used to carry traffic of everybody from any point to any point instead of just bus traffic) and citizen productivity improves (as they no longer need to follow the dictated bus routes nor the bus timetables).

3.2. Changing the Game operates at a more fundamental level than other information technology start-ups, which rely on CENTRALISED Cloud platforms (e.g. iOS, ethereum etc.) in order to deliver their products or services to their specific niche markets. is about lowering the COST of private computing significantly in order to create a paradigm shift from centralised cloud computing towards decentralised private computing.

Just like what the microprocessor did 50 years ago (giving birth to Apple, Microsoft etc.), enabling the massive global DECENTRALISATION of computing.

chnage_game drives decentralisation by empowering you to build your information asset (via private cyberspace) and shape you digital life (via citizen synergy) ... with just ONE CLICK.

3.3. Internet User to Owner restores INTERNET to its original distributed power structure and then turn PASSIVE users of information services on the internet into ACTIVE owners of information assets by helping them create their own Private Cyberspaces.

With ONE CLICK on their mobile phones, INDIVIDUALS gain control and ownership of their digital life by managing their information assets without going through third parties. Each private cyberspace zone contains the individual's OWN applications (providing services similar to Facebook, Tencent etc.).


Expanding the power of many (the citizens) is much more productive then restricting the power of the few (the cloud) - that is what Private Cyberspace computing about:

  1. Enabling everyone to create their own Private Cyberspaces, irrespective of their wealth and skills.
  2. Encouraging Private Cyberspaces to work together to solve the toughest problems facing humankind.

Frequently Asked Questions

  1. WHY Private Cyberspace?
    Reclaim your Information Assets to gain new insights, incomes, impacts.

  2. WHAT is Private Cyberspace?
    Information Ownership through application driven infrastructure.

  3. WHAT is Citizen Application?
    Trustworthy Cyberspace with applications protected by homomorphic encryption and fuzzy blockchain.

  4. WHAT is Crowd Infrastructure?
    Affordable Cyberspace by building infrastructure with surplus resources and data income.

  5. CREATE Private Cyberspace instantly?
    Just One Click - yes - it is really THAT easy!

Unique Advantages

Instead of PASSIVELY living in a digital environment determined by the Cloud, now you can ACTIVELY shape your own Private Cyberspace.

  • See Clearly, beyond cloud rankings and recommendations.
  • Think Deeply, without interrupted by cloud notifications and advertisements.
  • Interact Privately, without cloud monitoring.
  • Act Freely, without cloud algorithms and rules.

Private Cyberspace adds new dimensions to your digital life that are never possible if your live in the Cloud:

  1. Data that were too private for the cloud can now be analyzed by you.
  2. Automations that were not profitable for the cloud can now be deployed by you.
  3. Control that was given away to the cloud can now be retained by you.
  4. Interruptions from cloud notifications and advertisements can now be stopped.
  5. Views clouded by commercial rankings and recommendations can now be cleared.
  6. Activities in the interest of users instead of cloud can now be performed.
  7. Income from processing and data that were captured by the cloud can now be received.

There are 6 major advantages of Private Cyberspace over Cloud Platforms:


Private Cyberspace's unique fiduciary exchange based Security enables Applications and Infrastructures to be built to deliver Insight, Independence and Income that are not possible on Cloud Platforms, resulting in unprecedented Innovation and Productivity.

1. More Innovation

Leaving the innovations of the WHOLE WORLD's information technology to the managers of a handful of Cloud companies does not make sense.

Innovation is about NEW ideas; it is difficult to get the best new ideas if it is always from the same OLD group of people (the Cloud).

Imagine you travelled around the world and the landscapes in every country look the same! The same applies to the domination of the Cloud in the information landscape around the world.

Your own Private Cyberspace enabled you to change your information environment and implement your new ideas at anytime, without the need to wait for the Cloud development nor approval.

The Infrastructure Templates enable non-technical people to create new Application Zones for themselves but mixing and matching modules easily.

Having your own private information assets that you have full control and can experiment with endlessly means innovation without limit, creating amazing applications (for personal use or for the whole community) that were not possible before.

With Private Cyberspace you can build, change or just mix and match Module Nodes to create new services without needing technical skills.

2. More Productivity

A wealth of Information creates a poverty of Attention.
Herbert A. Simon

Time is generally more valuable than money and attention is always MORE VALUABLE THAN TIME. There is no point spending hours with someone who is not paying attention to you.

One of the major ways Cloud Platforms makes money is by taking away this most valuable aspect of your life - constantly interrupting your thoughts by advertisements and notifications.

It takes more than 20 minutes to 30 minutes to return to the original task after a distraction, yes 20 minutes NOT 20 seconds. As shown in Attention Wars both the profits to them and damages to you can be substantial.

Private Cyberspace allows you to CONTROL exactly when you want to focus on ONE thing and when you want to be inspired by DIFFERENT things.

With Private Cyberspace you access the Internet with the protection of satellite servers giving you a fully tunable online experience so you can conserve your attention for more important things.

3. More Insight

Your life should be more interesting to you than any Hollywood star.

With the capacity, reliability and security provided by your Private Cyberspace, your can confidently collect, store and analyse every tiny detail about life and your surroundings.

Collecting every bit of data about yourself and your environment will provide unexpected deep insights into yourself and the world around you - insights that can change your life.

For example through the Personal Console you gain a heighten awareness of your current environment in real-time and by analysing the detailed data it collected about your movements, your purchases, your contacts etc. you can see yourself in a new light.

To increase the value of your location data, you can click on Map Pins and record additional data like shopping receipts, car number plates etc. against any location you have visited.

You can move beyond simply "browsing" your data, you and run Artificial Intelligence programs on your own data to get deeper insights into your life style.

You are the only one to experience your life from your perspective, it is impossible for anyone, not even your mother, to know all your needs and wants, letting Cloud Artificial Intelligence (AI) learn from your data and then influence you is problematic at best.

  1. Unless you are specifically being targeted, Cloud AI is normally trained by the engineers for a lot of people (instead of you, just for you), so WILL get things wrong.
  2. Cloud AI is controlled by someone with DIFFERENT interests to you.
  3. Since the AI is remote, you have ZERO idea what it thinks of you, it might not be favourable or it might be plain wrong.

There is no need for lengthy ethical debates on AI, the only AI you should let near your data is your own AI running in your Personal Zone and may be some AI running in the Fiduciary Zone (where you retain control while sharing your data).

With your Private Cyberspace performing facial recognition on your photos yourself you do not have to expose photos to external parties.

4. More Independence

Gain independence from the Cloud by setting up your own rules instead of following theirs.

Ownership means you have full visibility and control of your data exclusively at any time:

  1. NO need to ask others what data they have on you and hope that they give you the true picture, because with citizen computing you decide what data to give to them in the first place.
  2. NO need to complain that others change their rules of engagement after you have already given them your data, because with citizen computing you set the rules on your data not them.

The problem is not just being forced to view ads when you don't want to view them, another problem is that the ads were NOT there before!

The massive growth of a Cloud service based on no ads has allowed competition to be crushed, so when ad viewing is being forced there is nowhere for the viewers to turn to!

And since you are now forced to view ads, they can now profile your INTERESTS down to how many seconds it takes for you to click the "Skip" button.

With citizen Computing EVERYONE now has access to their OWN computation capabilities and can communicate DIRECTLY with each other using the Internet.

Users NO LONGER need the Cloud to connect with each other, NO LONGER need the Cloud for performance and NO LONGER need the Cloud for free services.

But simple point and click, you control how and which Node to use in your infrastructure, you decide what features, what privacy, what cost, what reliability, what capacity, what speed you want for each application.

Achieve self-determination and prevent undue influence, you no longer need to dance to the tune of the owners of the Cloud.

5. More Income

Earn extra income with your data and from data you collected.

Numerous parties are making a lot of money from your data, whether it is directly as profit or though their increased market valuation.

It is time for you to transfer the money they make from your data back into your own pocket!

One immediate benefit of owning your information asset is the ability to sell it (just like what the Cloud is doing).

You are simply redirecting money for your movements from location data harvesters back to you.

Location data is just a small part of your information asset, other data can be of high value also, for example:

  1. your contact list (your friends' network, your business contacts etc.)
  2. your shopping preferences (both online and real stores)
  3. how long is the wait (e.g. at the hospital emergency department)
  4. your health (diet, exercise, blood pressure, sleep cycles etc.)

if you managed to collect it someone will probably pay for it.

Citizen Computing allows you to CONTROL what data to give out, for how long, to whom, at what resolution, for what purpose, how much to charge etc. etc.

For example, with Citizen Assisted Contact Tracing the data collected for COVID-19 can be used to create income.

6. More Security

Every benefit of the Private Cyberspace must be underpinned by solid security. There is no point collecting assets if they are stolen or making impacts if they are misdirected.

Private Cyberspaces are substantially more secure than traditional Cloud based services as you have full ownership and thus full visibility and control across all your data at all times.

1.1.1. Single Vendor Problems

When a single organisation has control of all your data, it does not matter how much it claims it has done to protect your privacy and security (e.g. uses open sourced software, does not keep logs on servers etc.).

Take the Signal service as an example, which is endorsed by Edward Snowden and Elon Musk:

  1. it needs a PHONE NUMBER from you (which can be used to not just identify you but also everyone you called or called you).
  2. by using Apple and Google PUSH NOTIFICATIONS, it is basically sharing your metadata with Apple or Google.
  3. by being distributed on Apple and Google app stores, its user identity and its software integrity are exposed to Apple and Google .
  4. it is centralised, the outage shows that it is in the middle relaying and has ability to deny ALL CALLS.

We are talking about ONE party getting ALL the phone numbers, ALL the times of call connection, ALL IP addresses of ALL its users worldwide (as well as leaking metadata to Apple and Google).

  1. Even if you can trust the ideas behind Signal, can you trust the directors of Signal always behaving properly forever in the future?
  2. Even if you can trust the directors of Signal, can you trust every staff of Signal always behaving properly forever in the future?
  3. Even if you can trust the staff of Signal, can you trust that the honest actions are so perfectly executed that your information is not leaked?
  4. Even if you can trust that your information will not be leaked accidently, can you trust that the there are no malicious actors coming in and stealing them?

Signal is just an example, these trust problems apply to ANY centralised service that claims to protect "privacy" e.g. your favourite VPN Service or Bitcoin Mixer. And if they ask for payment, which any proper service should, then you just created another attack vector into your identity.

The problem does not only apply to niche small companies that aggregates data, what about the biggest Single Vendor there is, Apple ?

Has Apple ever inform you or asked for your permission before starting to use your phone, your internet bandwidth, your battery power, your person location to help them sell more Air Tags ?

1.1.2. Device Problems

The trust problems above also apply to all devices which are connected to the internet from cameras to teddy bears and of course mobile phones.

1.1.3. Phone Problems

Whether it is remote servers in the cloud or the mobile phone in your hand, centralising data on devices that you have little control is dangerous. From iOS hacks to Android vulnerabilities to methods leaked in Vault 7 the data centralised on the mobile platform are too valuable to be left alone.

1.1.4. Large Target Problems

Large centralised databases (storing your location, contacts etc.) become very high value targets, look at the massive leaks at Facebook which just happened AGAIN after the problem was supposed to have been fixed after the last leak.

1.1.4. Distributes Risk

Citizen Computing has been designed assuming that Nodes will get hacked, that Nodes will be lost, that Nodes will be located with people who turned "bad" etc., so by cutting up an Application into as many Nodes as possible. More importantly you can change the number of Nodes, for some Applications you might want additional Nodes to be extra safe.

There are separations between Zones (e.g. Personal, Fiduciary, Community etc.), there are separations between functions (e.g. Identification, Collection, Distribution, Notification etc.), there are separations based on time (e.g. maximum one day's data), there are separations of networking, processing, storage and the physical location site itself (so they can all keep an eye on each other).

The less amount of data a Node holds, the less data there is to be stolen if that node got hacked and the easier it is to recover if that Node got damaged.
The more Nodes you have, the less damage can be done by one and the more they can check on each other.

1.1.5. Scalable Safety

Citizen Computing lets you specify which Node to use for which Module, so for some Modules you might like to use Nodes from people you actually know and located in places you have actually visited.

7. Universal Encryption

With Citizen Computing everything is encrypted whenever possible, double or even triple in most cases.

8. Aliases Encouraged

People need to behave differently in front of different groups of people, you need them to know different things about you.

Getting everyone you know on the SAME "social" platform to see one view of you or timeline of yours just does NOT make sense!

For different situations, Citizen Computing allows you to disclose different and just enough information about yourself under each identity, leaving out the rest of the data for privacy and profit.

9. Independent Monitoring

Citizen Computing has basic security rules which prevent you doing dangerous things in general (e.g. uploading unencrypted data to Nodes outside of your Personal Zone, blocking known bad IP addresses etc.) all of which you can of course turn off.