Each person can have one or more Private Cyberspaces and each Private Cyberspace can operate under one or more aliases.
Unlike Cloud Platforms which attempt to identify you and target you even across applications and sites, Private Cyberspace encourages you to have different identities for different purposes. Fine grain control allows you to tune each alias for different groups of people and different types of applications.
PRIVATE alias is used to collect raw data privately on your phone and sharing them at your own time and through your own means, there is no interaction with any exchange. In fact, since the Console will not "phone home" to application providers under GUEST alias, you will need to check for new software updates manually, it will not check itself. Basically you are using the Console to built your information assets "off the grid".
GUEST aliases are used for interacting anonymously with exchanges. You will start to see more information (like the name of the local government area you are currently in) and be able to.
Private Cyberspace enables you to EXCHANGE surplus compute power with others in the community e.g. use the others' laptops when they are asleep or backup your data to the unused capacities on their hard disks.
Private Cyberspace enables you to purchase compute power using the data income from the information ASSET you have collected e.g. external data like WiFi signal strengths on the street or personal data like the barcode on the drink you purchased.
Private Cyberspace's barrier to entry for people without a smart phone is approximately AU$39 (WiFi is sufficient no need for mobile SIM), making a nationwide Virtual Vaccine program substantially cheaper than the never ending costs to taxpayers of real vaccines.
Consumer enhanced Productivity adds ability for each consumer to on top of traditional Producer driven Productivity e.g. get rewarded for useful comments you made on public forums, earn from idle bandwidth and unused disk spaces while you sleep.
Australian Government Productivity Submission
A fundamental problem with Cloud security that is impossible to fix is the lack of physical security
Protection get A LOT easier if you don't have to protect your data physically - from the owner of the computer it is on or from the owner of the room it is in - from the Cloud Platforms.
fact that you are putting your data on their computers without encryption
Cybercrimes are causing substantial damages to many individuals and organisations EVERYDAY.
Private Cyberspace mitigates System and Human Vulnerabilities by enabling citizens to block transactions INDEPENDENTLY with their own Private Cyberspaces.
It brings together the compute and data from millions of citizen devices to verify transactions even before illegitimate transactions reach affected systems.
Fix Hardware Secured VM
Cloud Platforms have started to introduce Virtual Machines (VMs) secured by hardware, giving the impression that your data is secure with them.
Google promotes its Confidential Computing services confidently but the AMD SEV technology it is based on has been shown to be insecure:
- Re-volting: AMD Secure Encrypted Virtualization undone by electrical attack • The Register
Microsoft's Confidential Computing based on Intel SGX does not flair much better:
- SGX, Intel’s supposedly impregnable data fortress, has been breached yet again | Ars Technica
- Intel issues patches for SGX vulnerabilities • The Register
Despite the impressive sounding concept of using hardware for protection, dynamic and complex systems are always going to have weaknesses, Private Cyberspace complements Hardware Secured VMs with an independent Citizen driven Security layer.
Collect evidences yourself instead of relying on cloud platforms. From proving your innocence in court to winning an argument with a friend, you have control.
Record every phone call, delete every email, how much data in what situation is all up to you instead of the platform.
- Cloud Platforms have SAME interfaces for all users which are different to other platforms.
- Private Cyberspaces have their OWN interfaces which can be used across multiple systems.
One Click installation of the Private Cyberspace frontend user interface on most phones.
One Command installation of the Private Cyberspace backend compute nodes on most computers.
Local incubators provide customised Private Cyberspace for specific industries or population segments e.g. with localised languages and pretrained voice recognition.
Modular Assist prevents technical support personnel locking in people without technical skills, promotes specialisation, reduces training duration and opens up Private Cyberspace support to quality and price competition.
Private Cyberspace: Follow Local Laws
Cloud Platform: Follow Overseas Laws
We use Australia as an example here to demonstrate some positive impacts that Private Cyberspace can make to a country, however ALL countries will benefit from a population empowered with ubiquitous personal compute capability.
Currently, it is very difficult for Australian laws to regulate activities inside overseas data centres that operate under laws of foreign governments.
- How many Australians use Facebook, Instagram or WhatsApp ?
- How many data centres has Meta (their common platform) got in Australia ?
source: meta data centers
- How many Australians use Youtube, Google Search or Google Maps ?
- How many data centres has Google (their common platform) got in Australia ?
source: google data centers
Private Cyberspace uses existing devices in people's HOMES and OFFICES, neither compute nor data leave the country.
The above is just about the data centres, many other structures of a Cloud Platform (from shareholders to directors) are mostly under Overseas Laws.
Private Cyberspace: more return on investment
Cloud Platform: less return on investment
Broadband like most infrastructures of a country are funded either directly (e.g. Australia's National Broadband Network) or indirectly (e.g. USA's Universal Service) by taxpayers.
Cloud Platforms make use of taxpayer funded broadband to reach their users (e.g. Apple using national broadband to locate Airtags ini realtime) and their data (e.g. OpenAI using data uploaded with national broadband to train ChatGPT) without needing to seek permission and without compensating the taxpayers.
Private Cyberspace removes the SKILL barrier by enabling anyone (from billionaires to refugees) to control and process their data efficiently and easily through mixing and matching computing nodes (like toy bricks) without technical knowledge.
Private Cyberspace removes the SKILL barrier to private cyberspace ownership by enabling application customisation through mixing and matching of computing nodes (like toy bricks) without technical knowledge. Everyone can INNOVATE and shape their digital environments their way via simple interfaces.
Private Cyberspace revolutionises online TRUST by solving the Visibility vs Privacy conundrum so Private Cyberspaces can interact and collaborate safely. It delivers Homomorphic Encryption at scale enabling citizens to solve intractable problems (e.g. COVID) that have challenged all governments.
Instead trusting something (a person, a piece of information etc.) based on its visibility provided by Cloud Platforms, Private Cyberspace enables the matching of the visibility requirements of the send and receiver.
- Cloud Platform provides a SUPERVISED resource exchange for Platform Users under its rules.
- Private Cyberspace provides a TRUSTED resource exchange for Cyberspace Owners directly.
Private Cyberspace removes the TRUST barrier by giving unprecedented visibility into every online transaction (across internet and phone) yet protecting the privacy of all participants with the world's first deployment of homomorphic encryption at scale.
By running the Console, you have created the first Dynamic Alias in your private cyberspace. It is a Guest Alias used to collect data onto your phone only and does NOT communicate with the outside world, you can add Associate and Member Aliases into your Console when you are ready to start sharing some of your data.
Private Cyberspaces can reduce their costs substantially by leveraging latent resources from each other.