- Cloud Platforms make impacts based solely on the platform's interests (e.g. valuation or profit).
- Private Cyberspaces can make impacts based on their owners' many different interests..
- Cloud Platform rewards its user based on proprietary platform ALGORITHMS.
- Private Cyberspace rewards its owners based on MUTUALLY perceived value.
Once you have collected some data into your own private cyberspace, you can OPTIONALLY work other cyberspaces in a safe and synergistic manner to solve the most difficult problems facing humankind.
For example, currently you can earn bronze y20coins anonymously (e.g. for helping to locate COVID virus down to meters and cut its legs off within minutes by notifying others).
From the wifi signals on the street to the barcodes on a bottle of milk, you can donate or sell the the data you have collected in your Private Cyberspace immediately on collection or on a later date.
Selling DATA in your Private Cyberspace redirects the funds originally going to the Cloud Platforms to you, however Private Cyberspace also let you sell INSIGHTS by processing your data yourself and then selling the resulting insight, which is substantially safer than exposing your data to others.
You can also use your Private Cyberspace to receive data anonymously, from a pothole on the road in front to an active shooter in the building, from an ambulance coming up behind you to proving you are somewhere else at a certain time in courts ... the possibilities are endless.
Each person can have one or more Private Cyberspaces and each Private Cyberspace can operate under one or more aliases.
Unlike Cloud Platforms which attempt to identify you and target you even across applications and sites, Private Cyberspace encourages you to have different identities for different purposes. Fine grain control allows you to tune each alias for different groups of people and different types of applications.
PRIVATE alias is used to collect raw data privately on your phone and sharing them at your own time and through your own means, there is no interaction with any exchange. In fact, since the Console will not "phone home" to application providers under GUEST alias, you will need to check for new software updates manually, it will not check itself. Basically you are using the Console to built your information assets "off the grid".
GUEST aliases are used for interacting anonymously with exchanges. You will start to see more information (like the name of the local government area you are currently in) and be able to.
Private Cyberspace enables you to EXCHANGE surplus compute power with others in the community e.g. use the others' laptops when they are asleep or backup your data to the unused capacities on their hard disks.
Private Cyberspace enables you to purchase compute power using the data income from the information ASSET you have collected e.g. external data like WiFi signal strengths on the street or personal data like the barcode on the drink you purchased.
Private Cyberspace's barrier to entry for people without a smart phone is approximately AU$39 (WiFi is sufficient no need for mobile SIM), making a nationwide Virtual Vaccine program substantially cheaper than the never ending costs to taxpayers of real vaccines.
Consumer enhanced Productivity adds ability for each consumer to on top of traditional Producer driven Productivity e.g. get rewarded for useful comments you made on public forums, earn from idle bandwidth and unused disk spaces while you sleep.
Australian Government Productivity Submission
A fundamental problem with Cloud security that is impossible to fix is the lack of physical security
Protection get A LOT easier if you don't have to protect your data physically - from the owner of the computer it is on or from the owner of the room it is in - from the Cloud Platforms.
fact that you are putting your data on their computers without encryption
Cybercrimes are causing substantial damages to many individuals and organisations EVERYDAY.
Private Cyberspace mitigates System and Human Vulnerabilities by enabling citizens to block transactions INDEPENDENTLY with their own Private Cyberspaces.
It brings together the compute and data from millions of citizen devices to verify transactions even before illegitimate transactions reach affected systems.
Fix Hardware Secured VM
Cloud Platforms have started to introduce Virtual Machines (VMs) secured by hardware, giving the impression that your data is secure with them.
Google promotes its Confidential Computing services confidently but the AMD SEV technology it is based on has been shown to be insecure:
- Re-volting: AMD Secure Encrypted Virtualization undone by electrical attack • The Register
Microsoft's Confidential Computing based on Intel SGX does not flair much better:
- SGX, Intel’s supposedly impregnable data fortress, has been breached yet again | Ars Technica
- Intel issues patches for SGX vulnerabilities • The Register
Despite the impressive sounding concept of using hardware for protection, dynamic and complex systems are always going to have weaknesses, Private Cyberspace complements Hardware Secured VMs with an independent Citizen driven Security layer.