Cloud Fallacy

1. Cloud Platforms

Data is your most important asset – knowing or disclosing just ONE extra piece of data could change your life. Yet currently most of your data is stored remotely on Cloud Platforms, controlled and processed by parties that have DIFFERENT interests and aspirations to you.

Private Cyberspace gives the control of your data back to you, improving every aspect of your digital life.

1.1. What are Clouds ?

The word “Cloud” is just a marketing term that can mean whatever the person trying to sell something wants it to mean, as articulated by Larry Ellison below.

Here we will define Cloud Computing (the "Clouds") as all services and systems that take information from you (crowd-sourced their data) in order to control you or build up their assets at your expenses thus increasing THEIR power and value while reducing YOURS.

2. Cloud Types

There are basically 4 types of Clouds:

White Clouds e.g. Optus, Medibank etc.
Grey Clouds e.g. Google, Facebook etc.
Black Clouds e.g. Bitcoin, Ethereum etc.
Not Clouds e.g. Vultr, OVH etc.

2.1. White Cloud

White Clouds are companies that COLLECTS your data for internal user, they might use it to provide services to you or they might use your data to influence you. Despite not releasing your data to external parties for profit, they do get hacked very often.

2.2. Grey Cloud

Grey Clouds are companies that SELL your data to third parties, despite their exploitive behaviours most do provide SOME useful services to hook you into their services so they can collect your data.

Facebook, Google etc. are well known Grey Clouds that sells your data to buyers so they can to influence your behaviour and using the social network you have built up under their domains to lock you into their platforms.

Loyalty programs that analyse or sell your data are also Grey Clouds, you have no control of what they are doing with your data (e.g. using your data to influence you) and you lose out on potential income from the data they have gathered.

2.3. Black Cloud

Black Clouds are blockchain based companies, that trade on greed and ignorance, providing no useful services at all.

Bitcoin, Ethereum etc. are Black Clouds despite their claim to be decentralised, they are NOT. That deception fuelled by ignorance and greed is burning up the world's energy reserves and need to be stopped.

2.4. Not Cloud

Providers of application independent compute power (like virtual machines e.g. Vultr, AWS etc.) are NOT Clouds, as they do NOT dictate what software you can run of their machines and they do not access your data as part of their business model.

We call these providers Hosters, as they host computers remotely for their customers. Hosters plays an important part within the Citizen Ecosystem.

Grey Cloud Platforms

If you're not paying for something,
you're not the customer,
you're the product being sold.

Andrew Lewis

Although Grey Cloud Platforms do provide useful services to the public, their disadvantages are substantial (see image below), before Private Cyberspaces there was no competition so they just keep growing ... until they dominate every aspect of our lives.

grey_cloud_problems

You have lost control of your data ... you see a world presented by the Cloud, you communicate with people suggested by the Cloud, you develop using Cloud tools, you interact through Cloud interfaces ... you are living your life by Cloud rules.

2. Free Service Delusion

Cloud companies do NOT become massively profitable by providing free services. They take something of value from you (your DATA) and create something of even more value (CONTROL of you) for themselves.

2.1. Distorting World Views

Whether you are using the Cloud for your searches or your videos, you are using THEIR algorithms (they decide what to tell you about the world, what data about you to sell to who, when to insert which advertisement into your view etc.), that is, they control your information environment and thus they also control your life.

Having someone who controls a large part of your life acting against your interests is a problem.

But it is not just the "personalised" video recommendations and search ranking that distort your world view, it is also the constant notifications that interrupts your ability to look further or think deeply.

That repeating of same short sharp messages and preventing you from further investigations, can promote believes and behaviours that are NOT in your interest.

For example, preventing the determination of whether something is is "a need" or "a want" and whether some action is "right" or "wrong".

SOLVED: Private Cyberspace uses algorithms that you select and can change at any time. Whether it is search ranking, video recommendations or instant notifications, you are in control.

2.2. Acting with Impunity

Power tends to corrupt and
absolute power corrupts absolutely.

Lord Acton

It is difficult to find organisations that do NOT act against the interest of its users, even innocent weather channels have problems.

The Clouds can PROMISE all they want in their usage terms and conditions, but they can also DO whatever they want anyway, since they have your data on their infrastructure.

For example, even if you are technical enough to tell Google to explicitly NOT to track you, it stills tracks you anyway against your explicit instruction. Basically, information about you is collected by Google continuously in their interests not yours.

The fines for wrong doings are small compared to the profits being made, there is no reason for Clouds reduce their income voluntarily in the interest of their users.

SOLVED: Private Cyberspace aligns with your interests (instead of Cloud's interests), there is no rule, term nor condition for you, you do whatever is best for you with your data.

2.3. Holding Data Ransom

The above are bad behaviours that the Clouds do not tell you, but even if the Clouds DO tell you about bad things they are going to do to you, what can you do ?

For example, Twitter has disabled some of your ability to control your privacy. But you are not going to uninstall the Twitter app because of such a small thing, are you? And all future changes are probably "small" things too!

The problem is you gave them your data to build their information assets BEFORE these new changes, now those data are locked in.

Giving Clouds your data is easy but exporting or deleting your data ?
What about your social network that you have exposed and donated to the Cloud, so it can control your friends too ? You are probably going to miss that ?

SOLVED: All data are stored in your Private Cyberspace, giving you exclusive access to every bit of data you have collected and every piece of message you have received, only you can decide on when, what, how and who to share them with.

2.4. No Home Privacy

The security problems with Amazon Alexa and Google Assistant are well known.

The situation is getting worse everyday as more "smart" devices are deployed inside of homes, these vulnerable devices (from speakers to cameras to teddy bears) are massive security risks - as they are now making connections to the Cloud "internally" from your local network, your home broadband router is no longer effective in blocking these what really in fact are "external" connections.

So beside seeing and influencing your external world view, with the help of these home devices the Cloud can now see into your local network (which were previously off-limits to scanners and web crawlers). Most of these devices will not even work without an internet connection back to the Cloud - so data from your most private space is now shipped all over the world 24x7.

SOLVED: Private Cyberspace keeps activities in your physical home space private, by locking all of them up (from voice commands to room temperatures to security videos) for your exclusive use.

2.5. Artificial Intelligence Safety

Artificial Intelligence (AI) technologies like Amazon Alexa telling a kid to short an electrical wall outlet is dangerous enough but what about the USA using AI to pick targets to kill instead of just destroying targets humans picked?

The ironic thing is governments do NOT need to install cameras everywhere, when citizens are exposing themselves freely on Instagram, that database has became useful for in identifying enemy soldiers in Ukraine.

SOLVED: With Private Cyberspace both the data and the AI software remain within the control of the owner. From scanning your friends' faces in photos to the voice command you said yesterday, all data inputs and resulting outputs are exclusively yours.

2.6. Exploiting Public Infrastructures

Concentration of the Internet's data processing and storage in these Clouds means the broadband networks funded by EVERYONE is now being used to benefit just a FEW . . . what's worse . . . those public infrastructures are being use to control the citizens that paid for them.

Taxpayers funded a lot of the Internet infrastructure in a country, yet the traditional point to point model has now been replaced with a hub and spoke model. One of the most valuable resources of a country that was built up over decades has become an extension for the Clouds.

The better the citizens build their broadband, the more data the Cloud collects, the more it controls the citizens' lives. The broadband is used to monitor and influence them (e.g. search results, buying habits, meeting people etc.) based on the Cloud's algorithms and the Cloud's interests.

SOLVED: Private Cyberspace communicates with each other directly, ensuring that infrastructure investments in an area benefits the locally population fully instead of some corporations thousands of kilometres away.

2.7. Limitations of Regulations

The difference in nature between government (establishing boundaries) and technology (breaking boundaries) makes them strange bedfellows.

  1. Restricted Processing
    While initiatives like European Union's General Data Protection Regulation are great, the restriction of the Cloud in handling citizen data can reduce the value of those data by preventing innovative and useful computation to be performed on them.
    SOLVED: Instead of restricting what the Cloud can or cannot do to citizen data, may be the governments should also be encouraging the citizens to do more with their own data themselves?

  2. Wasted Data
    Law that prevent Clouds keeping data, if followed, can prevent
    Instead of removing the data after they have already gone into the Cloud as promoted by the right to be forgotten, what about not giving so much data to the Cloud in the first place ?

  3. Slow Response
    Making laws to regulate technology is. too slow, by the time the government realised that their local industries (e.g. taxi, software etc.) have been negatively affected, market dominance has already been established.

  4. Little Understanding
    From AI to blockchain, technologies can be complex making it difficult for law makers to understand their future impact and implications.

  5. Disadvantage the Small
    Law is a very blunt tool that can stifle innovation, regulations most often make it too expensive for small players to comply yet cost the big players almost nothing to follow (assuming the lobbyists of the big players have not watered down the laws in the favour in the first place).

3. Private Cyberspace

diff1

3.1. Bus and Car Analogy

Cloud Platforms are like a BUS companies using the roads (the Internet) paid for by the citizens to run their restricted bus services. Private Cyberspace is about reclaiming the roads for ourselves and drive on them freely to anywhere in our own CARS.

The FREEDOM that comes with owning your information assets is similar to taking ownership of physical assets, like your own CAR and your own HOME - you can go anywhere at anytime without worrying about bus timetables, you can renovate your room however you like etc. You no longer need to dance to the tune of the owners of the Cloud.

Road utilisation improves (as the whole road network can now be used to carry traffic of everybody from any point to any point instead of just bus traffic) and citizen productivity improves (as they no longer need to follow the dictated bus routes nor the bus timetables).

3.2. Changing the Game

88.io operates at a more fundamental level than other information technology start-ups, which rely on CENTRALISED Cloud platforms (e.g. iOS, ethereum etc.) in order to deliver their products or services to their specific niche markets.

88.io is about lowering the COST of private computing significantly in order to create a paradigm shift from centralised cloud computing towards decentralised private computing.

Just like what the microprocessor did 50 years ago (giving birth to Apple, Microsoft etc.), enabling the massive global DECENTRALISATION of computing.

chnage_game

88.io drives decentralisation by empowering you to build your information asset (via private cyberspace) and shape you digital life (via citizen synergy) ... with just ONE CLICK.

3.3. Internet User to Owner

88.io restores INTERNET to its original distributed power structure and then turn PASSIVE users of information services on the internet into ACTIVE owners of information assets by helping them create their own Private Cyberspaces.

With ONE CLICK on their mobile phones, INDIVIDUALS gain control and ownership of their digital life by managing their information assets without going through third parties. Each private cyberspace zone contains the individual's OWN applications (providing services similar to Facebook, Tencent etc.).

Summary

Expanding the power of many (the citizens) is much more productive then restricting the power of the few (the cloud) - that is what Private Cyberspace computing about:

  1. Enabling everyone to create their own Private Cyberspaces, irrespective of their wealth and skills.
  2. Encouraging Private Cyberspaces to work together to solve the toughest problems facing humankind.

Decentralised Cloud

Despite their claims, public blockchains (e.g. Bitcoin, Ethereum) are neither trustless nor decentralised. Without the underpinning of those 2 fundamental properties, cryptocurrencies and dapps lose their original reasons for existent.

Fiduciary Exchange is based on blockchain's original distributed power structure and replaces greed and ignorance fuelled FAKE value and utility in current public blockchains with productivity and performance driven REAL values and utilities by providing truly decentralised blockchain based ledgers.

Cleaning up the deception based blockchain industry in two steps:

With Fiduciary Exchange, USERS are also OWNERS of the blockchains they use, they gain control of their online transactions by interacting directly with each other without going through existing public blockchains that are controlled by others e.g. bitcoin and ethereum.

1. Centralised Trust

From correct security (e.g. not being hacked) to correct profiting (e.g. no pump and dump) to correct allocation (e.g. their token) ... almost every important aspect of a blockchain is based on TRUSTING that its creator behaves properly as the power in centralised there. If the blockchain uses words like trustless, decentralised etc. then you know it is a big con.

BASIC
FUNCTION
Traditional
Centralised
Bitcoin
Ethereum
Fiduciary
Exchange
DATA Concentrated Distributed Distributed
CONTROL Concentrated Concentrated Distributed

Proof of Work and Proof of Stake schemes ALL give those that ALREADY HAVE resources increasing control over those that HAVE NOT. Concentration of power allows many to be "played" by a few, the opposite to the "decentralised" benefit they are touting.

Blockchain developers claim that you no longer need a bank,
when in fact THEY want to be your bank.

You use their currencies, you follow their policies ... operation is centralised until there is a problem then the blame is decentralised.

Contrary to blockchain's original DISTRIBUTED ideal, in practice the control of current public blockchains is highly CONCENTRATED in almost every important aspect, from developers to miners to exchanges to so called whales.

Each becomes a building block of their own version of Bitcoin, Ethereum etc.

More references to massive blockchain deception driven by greed and ignorance can be found on the Big Con page.

2. Blockchain Components

Fiduciary Exchange is a complete computing stack with a much larger scope than Public Blockchains, but a very rough feature table may be useful for illustration purposes:

BASIC
COMPONENT
Bitcoin
Ethereum
Fiduciary
Exchange
STORAGE Full Node Infinite Disk
PROCESSOR Crypto Miner Disposable Node
INTERFACE Crypto Exchange Personal Console

STORAGE - unlike public blockchains your data are NOT stored remotely inside so called "full nodes", they are stored on your personal devices (e.g. phones, laptops) and managed by your own Asset Cluster, so you can view, edit, move or sell your data at anytime.

PROCESSOR - unlike public blockchains the processor is NOT some anonymous miner half way around the world, it is selected by you on the Fiduciary Exchange and has verified identity and known physical location, you can use whoever you like to process your data. You know them but they don't know you.

INTERFACE - unlike public blockchains the interface is NOT on some remote exchange you have not control of, it is your own Entity Agent who is trained by you and lives on your personal devices (e.g. phones, laptops) which only you have full control and no one else have access to.

3. Blockchain based Compute

Bitcoin uses opcode scripts to process transactions and that design of running scripts on every node of the blockchain was expanded to OTHER applications in form of "smart contracts".

The idea was by replacing "flawed" humans with "smart" contracts on blockchains, these new "decentralised" applications will somehow be free of human influences - ignoring the fact that those "smart" contracts are were actually written and maintained by same flawed humans they are trying to replace.

Smart Contract developers claim that their software replace humans,
when in fact THEY are replacing other humans.

There are numerous problems like the efficiency of running the same script on every node worldwide, the ability to change a smart contract that has bugs, or whether there is any advantage over non smart contract techniques. But let's just focus on why "smart" contracts are dumb and "decentralised" applications are centralised.

3.1. Maximum Attack Surface

Standard protection mechanisms (like encryption, firewalls, locks on doors etc.) worked well and continue to work well because they LIMIT the attack surface. Decentralised applications exposing everything to everyone increases the attack surface to maximum possible - running counter to that fundamental rule.

Giving your data to someone give them power to abuse those data, letting someone process your data on your behalf give them power to abuse you. With dapps, you are giving both data and processing authority to EVERY node on the blockchain - thus subject your data and yourself to the maximum possibility of being abused.

3.2. Minimum Diversity

The so called "decentralised" applications actually ALL use just ONE centrally design scripting engine. Just ONE hack of that scripting engine and ALL apps on ALL nodes are affected.

There have been and will be centralised weaknesses, like front-running which cannot be fixed no matter how hard people tried.

There have been and will be centralised decisions that go against the fundamental reason for blockchain's existence, like changing the supposedly immutable worldwide ledger due to just ONE dapp.

3.3. Centralised Application

Centralisation of the blockchain and its script engine is just the start, the so called "decentralised" application running on those blockchains are also highly centralised.

Due to the high costs of running "smart" contracts on every node in the world, only a small part of a "decentralised" application is on the blockchain - the rest of the software are actually centrally controlled, so the promoted "decentralised" VALUE of these applications does not actually exist.

3.4. Dumb Contract

A contract cannot be called smart when it executes AGAINST the wishes of the people who drafted up the contract.

These contacts are not only dumb (blindly executing whatever they were told), they are also subjected to conflicting Interpretations just like paper based legal contracts e.g. disputes on whether their executions are illegal hacks or legal transfers.

No software can anticipate every possible operation scenarios, different people looking at the same piece of code can see different possibilities and even different purpose.

3.5. Poor Lineage

Even if Bitcoin has not degraded into a Big Con, retrofitting a single purpose APPLICATION into a general purpose computing PLATFORM is always going to be problematic.

The elegance of the original bitcoin design has been destroyed with numerous parties adding incompatible features e.g. cutting up integrated full node into parts, pushing through unintended volumes, adding privacy to public data, running unsupported applications etc.

Citizen Synergy has been designed from the ground up with novel asset zoning to be a TRUE decentralised computing platform.

  Basic
Features
Smart
Contract
Fiduciary
Exchange
. 1. Consensus
Mechanism
RESOURCE
rich only
IDENTITY
everyone
. 2. Blockchain
Control
DEVELOPER
one
USERS
many
. 3. Provider
Identity
UNKNOWN
nondeterministic
KNOWN
stable
. 4. User
Identity
ADDRESS
fixed
ALIAS
dynamic
. 5. Data
Exposure
UNCONTROLLED
worldwide
CONTROLLED
selected few
. 6. Computation
Exposure
UNCONTROLLED
worldwide
CONTROLLED
selected few
. 7. Reward
System
ONE
gas
ANY
fiat, crypto
. 8. Virtual
Machine
ONE
evm
ANY
x86, arm
. 9. User
Statistics
EXPOSED
worldwide
OPTIONAL
private

Notes:

  1. Equitable consensus mechanism (proof of identity) means consensus is requried from everyone not just from the rich (proof of stake).
  2. On-demand creation of as many blockchains as needed (micro blockchains) means information processing and storage cannot be dominated by any party.
  3. Provider nodes must reveal their owner identity and physical location, as they should.
  4. User accounts are linked to different levels of identification for different applications with dynamic aliases.
  5. User has full control of how data is supplied using progressive fuzzifcation and homomophic encryption.
  6. User has full control of which nodes are to be used for processing with sovereign transactions and disposable nodes.
  7. User statistics are kept privatekly with each user which they can contribute optionally in an encryopted manner.

From fundamentals like proof of work and proof of stake though miners and exchanges up to smart contract and token prices, almost nothing is

Looking beyond the greed and ignorance fuelling public blockchains activities

By distributing the control of the online service to the users, Citizen Synergy prevents market manipulation, promotes innovation and adds unprecedented privacy and value to their data. The bank is still needed, but now you have control of that bank.

4. Blockchain based Storage

Blockchain based storages that claiming to be "decentralised" storage are mostly NOT decentralised and come with numerous blockchain related problems.

  1. Primary Single Point of Failure - themselves.
    If they are gone or hacked or faulty etc. your data is major in trouble.
    With Infinite Disk you have full control, the Storage Nodes you use can die a million times and you will NOT be affected.

  2. Secondary Single Point of Failure - their Cloud.
    A lot of them use others to store their data or their metadata so your data is in trouble if any of them has problem.
    With Infinite Disk you have direct access to the Storage Nodes, no extra layers of complexities there!

  3. Unsubstantiated Distribution - where?
    How many claim they cut your data up into many pieces and store them separately, yet these separate pieces are all within the SAME data centre.
    With Infinite Disk you know where the Storage Nodes are, from your parent's basement to some stranger within 10km radius.

  4. Useless Encryption - they encrypt for you.
    So not only can they decrypt your data at anytime without telling you, if they disappear or lost the key then you data is basically screwed.

  5. Complex Interface - s3 is not a disk
    Storing files in s3 only benefits the Amazon and its copy cats. It makes operating a remote storage at scale much easier, but also makes using that storage much harder.

5. Blockchain based Network

Blockchain based networks that claiming to be "decentralised" are actually NOT decentralised and come with numerous blockchain related problems.

For example, Helium claims to be people's network
To show what suckers are the people this is AFTER they have purchased hardware e.g. Helium took the power away from hotspots
As if the original one sided changes changes to Centrai

Better Than Free

With almost everyone on earth being fed a diet of FREE services by Cloud Computing for so many years, it would be difficult to move people away from the Cloud, unless there is something that is BETTER THAN FREE.

The increasing transfer of the world's information assets (and thus power) from so MANY to so FEW is occurring because the Cloud does bring some benefits to the end users in order to suck them in:

  1. The Cloud is FAST to join and submit your data into BUT have you tried leaving or taking your data out ? Deleting your data is not so fast ?
  2. The Cloud is EASY to use if your follow their rules BUT have you tried changing their operation ? Complaining is not so easy ?
  3. The Cloud is CHEAP when you start BUT what about after you are hooked ? The premium versions are not so cheap ?

cloud_platform_private_cyberspace5

Private Cyberspace does not just deliver compute faster, easier and cheaper than Cloud Platform, it totally transforms how compute is being performed.

There is NO manipulating of users' world view NOR selling users' data to start, but the benefits are much more numerous and go much deeper.

Instead of PASSIVELY living in a digital environment determined by the Cloud, now you can ACTIVELY shape your own Private Cyberspace.

  • See Clearly, beyond cloud rankings and recommendations.
  • Think Deeply, without interrupted by cloud notifications and advertisements.
  • Interact Privately, without cloud monitoring.
  • Act Freely, without cloud algorithms and rules.

Private Cyberspace adds new dimensions to your digital life that are never possible if your live in the Cloud:

  1. Data that were too private for the cloud can now be analyzed by you.
  2. Automations that were not profitable for the cloud can now be deployed by you.
  3. Control that was given away to the cloud can now be retained by you.
  4. Interruptions from cloud notifications and advertisements can now be stopped.
  5. Views clouded by commercial rankings and recommendations can now be cleared.
  6. Activities in the interest of users instead of cloud can now be performed.
  7. Income from processing and data that were captured by the cloud can now be received.

There are 6 major advantages of Private Cyberspace over Cloud Platforms:

advantages

Private Cyberspace's unique fiduciary exchange based Security enables Applications and Infrastructures to be built to deliver Insight, Independence and Income that are not possible on Cloud Platforms, resulting in unprecedented Innovation and Productivity.

Information Ownership Improves Everything

Private Cyberspace gives you an exclusive digital space to collect, store and control all your data, transforming you from an information User building up Cloud Platform assets to an information Owner building up Your Own assets.

The benefits of owning your information space are no less than

  • owning your home (instead of staying in a hotel room)
  • driving your car (instead of waiting for the bus)

ALL aspects of your digital life are improved substantially.

Owner
ADVANTAGES
Private Cyberspace
OWNER
Cloud Platform
USER
1. Access you define platform define
2. Artificial Intelligence your model platform model
3. Asset your asset cloud asset
4. Attention controlled interruptions constant interruptions
5. Benefits mostly to you mostly to platform
6. Broadband more return on investment less return on investment
7. Collaboration directly by you only through platform
8. Contacts you know platform knows
9. Control totally exclusive almost none
10. Cost collaborative infrastructure centralised infrastructure
11. Customisation personal wants platform wants
12. Death your beneficiaries unknown beneficiaries
13. Encryption you encrypt platform encrypts
14. Evidence you collect platform collect
15. Hardware cheap devices expensive devices
16. Impact global reach platform reach
17. Income mutual reward algorithm reward
18. Independence your rules platform rules
19. Innovation swappable processes fixed processes
20. Insight processed data raw data
21. Interaction you manage platform manage
22. Leadership easy to lead easy to follow
23. Name your aliases account name
24. Payment your log platform log
25. Profit your compute your data
26. Principle your own platform directors
27. Productivity globally optimised locally optimised
28. Redundancy massive redundancy limited redundancy
29. Reputation you decide platform decides
30. Resource reclaim latent resources waste precious resources
31. Reward value based reward platform based reward
32. Rules mutual agreement platform dictate
33. Safety your boundaries platform boundaries
34. Security trusted interaction supervised interaction
35. Skill mix and match nodes application programming interfaces
36. Software Node Set App Store
37. Sovereignty local laws overseas laws
38. Trust distributed attestation central attestation
39. Usability your interface platform interface
40. Value Add your way platform's way
41. Wastage all data partial data
42. Worldview you control platform controls

Whatever you do with your digital life, you can do it better in your own Private Cyberspace than on Cloud Platforms.

Access Advantage

Define who has access to what data yourself, instead of letting cloud platforms use it in ways you have not approved or sell it to people you don't know.

How much has Apple paid you to use your phone, your bandwidth, your battery power, your LOCATION at that time to help find an Airtag belonging to some stranger ?

Artificial Intelligence Advantage

Attention Advantage

Benefits Advantage

Contacts Advantage

Control Advantage

Private Cyberspace turns the existing Cloud Control Flow UPSIDE DOWN, by letting the user control application through infrastructure.

control_flow

Cost Advantage

Economies of Scale

Making Private Cyberspace affordable and attractive to all 8 billion on earth requires a PARADIGM SHIFT in economies of scale:

  • from achieving economies of scale through Centralisation (cloud platforms growing as many users as possible). It is about a few planning what might be efficient FOR OTHERS in the future.
  • into achieving economies of scale through Collaboration (private cyberspaces working together as much as possible). It is about many deciding what is efficient FOR THEMSELVES in real-time.

Private Cyberspace removes the COST barrier to RELIABLE infrastructure by leveraging community idle capacities (e.g. unused disks, bored retirees), reusing broken devices (e.g. laptops with faulty screens & keyboards) and taking over data income from the Cloud.

cost

  • Cloud Platform lowers cost by SHARING platform resources between many platform users.
  • Private Cyberspace lowers cost by AGGREGATING the resources of many cyberspace owners.

Currently most people can only collaborate via cloud platforms, with private cyberspace everyone can collaborate directly and benefit from network effects that were only available cloud platforms before.

Digital Equity

Private Cyberspace removes the COST barrier by leveraging community idle capacities (e.g. unused disks, bored retirees), reusing broken devices (e.g. laptops with faulty screens & keyboards) and taking over data income from the Cloud.

Private Cyberspace removes the COST barrier to private cyberspace ownership by aggregating surplus resources from others and taking over data income from the Cloud. Everyone now have RELIABLE infrastructure to operate at any scale, no matter their wealth.

Customisation Advantage

Death Advantage

Encryption Advantage

Impact Advantage

  • Cloud Platforms make impacts based solely on the platform's interests (e.g. valuation or profit).
  • Private Cyberspaces can make impacts based on their owners' many different interests..

Income Advantage

  • Cloud Platform rewards its user based on proprietary platform ALGORITHMS.
  • Private Cyberspace rewards its owners based on MUTUALLY perceived value.

If someone uses your personal data and infrastructure built with your tax dollars to generate massive profits from their AI models, may be they should give you some money in return ?

Instead of money, now that you have you own Private Cyberspace with compute power, may be they can:

  1. Let your cyberspace run the software performing the inferencing and training with your data ?
  2. Let you cyberspace use the resulting models that were trained with your data ?
  3. Let your cyberspace access other data they were used with along with your data in training their model ?

Independence Advantage

Innovation Advantage

Insight Advantage

Once you have collected some data into your own private cyberspace, you can OPTIONALLY work other cyberspaces in a safe and synergistic manner to solve the most difficult problems facing humankind.

For example, currently you can earn bronze y20coins anonymously (e.g. for helping to locate COVID virus down to meters and cut its legs off within minutes by notifying others).

From the wifi signals on the street to the barcodes on a bottle of milk, you can donate or sell the the data you have collected in your Private Cyberspace immediately on collection or on a later date.

Selling DATA in your Private Cyberspace redirects the funds originally going to the Cloud Platforms to you, however Private Cyberspace also let you sell INSIGHTS by processing your data yourself and then selling the resulting insight, which is substantially safer than exposing your data to others.

insight

You can also use your Private Cyberspace to receive data anonymously, from a pothole on the road in front to an active shooter in the building, from an ambulance coming up behind you to proving you are somewhere else at a certain time in courts ... the possibilities are endless.