Compute Owner

See More, Do More and Earn More by regaining the control and value of your data. Evolve from a Compute User to a Compute Owner with ONE CLICK.                                                                

Regain Control and Value of your data by evolving from a Compute User into a Compute Owner

Compute User vs Compute Owner

Data is your most important asset – knowing or disclosing just ONE extra piece of data could change your life.

Yet currently most of your data is stored remotely in the Cloud, controlled and processed by people you have never met, all of them having DIFFERENT interests and aspirations to you.

You interact through their interfaces and you play by their rules, basically you have lost control – your most important asset is NO longer yours.

Cloud Compute vs Team Compute

What is "the Cloud" ?

The word “Cloud” is just a marketing term that can mean whatever the person trying to sell something wants it to mean, as articulated by Larry Ellison below.

Here we will define Cloud Platform (the "Cloud") as services that uses their compute power to enslave you instead of empower you.

In exchange for performing compute on your data, Cloud Platforms take away your control of your digital life and the value of your data assets.

Cloud Platforms control your behaviours and use your resources (e.g. Google using your data and Apple using your device without permission nor compensation in order to make money for themselves), building up their assets at your expense, increasing THEIR power and value while reducing YOURS.

2.1. Private Cyberspace Applications

Private Cyberspace is about giving non-technical owners EASY CONTROL of their applications.

Not everyone knows how to cook, but we all know what tastes good. If food taste bad, change the cook instead of going into the kitchen.

The same applies to the private cyberspace application.

All applications inside your Private Cyberspace are under your full control of you only (no one else).

Owners interact with each other through their own private cyberspaces under their own rules without an cloud limitation.

personal application space under the exclusive control of the owner.

There are millions of free and open source applications (many resell by the cloud to you),

all your needs, wants and dreams

Compute Equity gives you ownership of a personal piece of the online world (through private cyberspace applications), so you can see more, earn more and do more in the physical world under your own terms by working directly with other private cyberspaces (through citizen synergy infrastructure) without depending on cloud platforms..

2.2. Citizen Synergy Infrastructures

instead of sending your data into the Cloud, you process data yourself in your Private Cyberspace.

by transferring the control of your data and resulting benefits from Cloud Platforms back to you.

empower individuals to effect real world effects by giving them full control and all benefits from their data:

  1. establish Application Ownership
  2. build Community Infrastructure

, without relying on hegemonic Cloud Platforms, no matter their wealth or knowledge levels.

Information Effects enables you to effect changes in the analog world by owning a piece if the digital world.

Cloud Computing has been lim

The opportunity for individuals to change the world at scale has been limited,

Cloud Compute vs Team Compute

With almost everyone on earth being fed a diet of FREE services by Cloud Computing for so many years, it would be difficult to move people away from the Cloud, unless there is something that is BETTER THAN FREE.

The increasing transfer of the world's information assets (and thus power) from so MANY to so FEW is occurring because the Cloud does bring some benefits to the end users in order to suck them in:

  1. The Cloud is FAST to join and submit your data into BUT have you tried leaving or taking your data out ? Deleting your data is not so fast ?
  2. The Cloud is EASY to use if your follow their rules BUT have you had problems with their operation ? Complaining is not so easy ?
  3. The Cloud is CHEAP when you start BUT what about after you are hooked ? The premium versions are not so cheap ?

Private Cyberspace does not just deliver compute faster, easier and cheaper than Cloud Platform, it totally transforms how compute is being performed.

Instead of PASSIVELY living in a digital environment determined by the Cloud, now you can ACTIVELY shape your own Private Cyberspace.

  • See Clearly - beyond cloud's ranking and recommendation algorithms.
  • Think Deeply - without being interrupted by cloud notifications and advertisements.
  • Interact Privately - without cloud monitoring your activity and selling your data.
  • Act Freely - without following cloud's interests and rules.

Private Cyberspace adds new dimensions to your digital life that are NEVER possible if your live in the Cloud:

  1. Data that were too private for the cloud can now be analysed by you.
  2. Automations that were not profitable for the cloud can now be deployed by you.
  3. Control that was given away to the cloud can now be retained by you.
  4. Interruptions from cloud notifications and advertisements can now be stopped.
  5. Views clouded by commercial rankings and recommendations can now be cleared.
  6. Activities in the interest of users instead of cloud can now be performed.
  7. Income from processing and data that were captured by the cloud can now be received.

Private Cyberspace has More Than 40 Advantages over Cloud Platforms.

The massive injection of compute power into the whole population improves every aspect of modern life from personal dignity (how you value yourself and how others value you) to national security (wars are won by the industries at the back as much as on the battlefields at the front).

Different Cloud Types

  • Dominant Cloud e.g. Apple, Google, Facebook etc. uses your data and compute resources to control your digital life directly themselves and increasingly letting others control your life as well.

  • Scam Cloud e.g. Bitcoin, Ethereum etc. is a type of Centralised Cloud that pretend to be decentralised when in fact they are not - it still controls you and let others control you like a centralised cloud.

  • Corporate Cloud e.g. Paypal, Resmed etc. is a type of Centralised Cloud that operates at a smaller scale.They are exploitive businesses that share your data or lock up your data, just like bigger centralised clouds.

  • Not Cloud e.g. Vultr, OVH etc. is a business that uses the word "Cloud" in its marketing but it is NOT really a Cloud Platform. It provides non-application specific compute hosting services WITHOUT processing your data for you.

1.1. Dominant Cloud

Power tends to corrupt and
absolute power corrupts absolutely.

Lord Acton

Dominant Clouds use your data and compute resources to control your digital life themselves and increasingly letting others control your life as well.

Facebook, Google etc. are well known Dominant Clouds that profit from the data (e.g. locations, social networks etc.) you have built up under their domains to increase their profits e.g. to lock you into their platforms and to sell your data to buyers so they can influence your behaviour.

Data Ownership

Although Grey Cloud Platforms do provide useful services to the public, their disadvantages are substantial (see image below), before Private Cyberspaces there was no competition so they just keep growing ... until they dominate every aspect of our lives.

dataowner

You have lost control of your data ... you see a world presented by the Cloud, you communicate with people suggested by the Cloud, you develop using Cloud tools, you interact through Cloud interfaces ... you are living your life by Cloud rules.

Free Service Delusion

If you're not paying for something,
you're not the customer,
you're the product being sold.

Andrew Lewis

Cloud companies do NOT become massively profitable by providing free services. They take something of value from you (your DATA) and create something of even more value (CONTROL of you) for themselves.

Distorting World Views

Whether you are using the Cloud for your searches or your videos, you are using THEIR algorithms (they decide what to tell you about the world, what data about you to sell to who, when to insert which advertisement into your view etc.), that is, they control your information environment and thus they also control your life.

Having someone who controls a large part of your life acting against your interests is a problem.

But it is not just the "personalised" video recommendations and search ranking that distort your world view, it is also the constant notifications that interrupts your ability to look further or think deeply.

That repeating of same short sharp messages and preventing you from further investigations, can promote believes and behaviours that are NOT in your interest.

For example, preventing the determination of whether something is is "a need" or "a want" and whether some action is "right" or "wrong".

SOLVED: Private Cyberspace uses algorithms that you select and can change at any time. Whether it is search ranking, video recommendations or instant notifications, you are in control.

2.2. Acting with Impunity

It is difficult to find organisations that do NOT act against the interest of its users, even innocent weather channels have problems.

The Clouds can PROMISE all they want in their usage terms and conditions, but they can also DO whatever they want anyway, since they have your data on their infrastructure.

For example, even if you are technical enough to tell Google to explicitly NOT to track you, it stills tracks you anyway against your explicit instruction. Basically, information about you is collected by Google continuously in their interests not yours.

The fines for wrong doings are small compared to the profits being made, there is no reason for Clouds reduce their income voluntarily in the interest of their users.

SOLVED: Private Cyberspace aligns with your interests (instead of Cloud's interests), there is no rule, term nor condition for you, you do whatever is best for you with your data.

2.3. Holding Data Ransom

The above are bad behaviours that the Clouds do not tell you, but even if the Clouds DO tell you about bad things they are going to do to you, what can you do ?

For example, Twitter has disabled some of your ability to control your privacy. But you are not going to uninstall the Twitter app because of such a small thing, are you? And all future changes are probably "small" things too!

The problem is you gave them your data to build their information assets BEFORE these new changes, now those data are locked in.

Giving Clouds your data is easy but exporting or deleting your data ?
What about your social network that you have exposed and donated to the Cloud, so it can control your friends too ? You are probably going to miss that ?

SOLVED: All data are stored in your Private Cyberspace, giving you exclusive access to every bit of data you have collected and every piece of message you have received, only you can decide on when, what, how and who to share them with.

2.4. No Home Privacy

The security problems with Amazon Alexa and Google Assistant are well known.

The situation is getting worse everyday as more "smart" devices are deployed inside of homes, these vulnerable devices (from speakers to cameras to teddy bears) are massive security risks - as they are now making connections to the Cloud "internally" from your local network, your home broadband router is no longer effective in blocking these what really in fact are "external" connections.

So beside seeing and influencing your external world view, with the help of these home devices the Cloud can now see into your local network (which were previously off-limits to scanners and web crawlers). Most of these devices will not even work without an internet connection back to the Cloud - so data from your most private space is now shipped all over the world 24x7.

SOLVED: Private Cyberspace keeps activities in your physical home space private, by locking all of them up (from voice commands to room temperatures to security videos) for your exclusive use.

2.5. Artificial Intelligence Safety

Artificial Intelligence (AI) technologies like Amazon Alexa telling a kid to short an electrical wall outlet is dangerous enough but what about the USA using AI to pick targets to kill instead of just destroying targets humans picked?

The ironic thing is governments do NOT need to install cameras everywhere, when citizens are exposing themselves freely on Instagram, that database has became useful for in identifying enemy soldiers in Ukraine.

SOLVED: With Private Cyberspace both the data and the AI software remain within the control of the owner. From scanning your friends' faces in photos to the voice command you said yesterday, all data inputs and resulting outputs are exclusively yours.

2.6. Exploiting Public Infrastructures

Concentration of the Internet's data processing and storage in these Clouds means the broadband networks funded by EVERYONE is now being used to benefit just a FEW . . . what's worse . . . those public infrastructures are being use to control the citizens that paid for them.

Taxpayers funded a lot of the Internet infrastructure in a country, yet the traditional point to point model has now been replaced with a hub and spoke model. One of the most valuable resources of a country that was built up over decades has become an extension for the Clouds.

The better the citizens build their broadband, the more data the Cloud collects, the more it controls the citizens' lives. The broadband is used to monitor and influence them (e.g. search results, buying habits, meeting people etc.) based on the Cloud's algorithms and the Cloud's interests.

SOLVED: Private Cyberspace communicates with each other directly, ensuring that infrastructure investments in an area benefits the locally population fully instead of some corporations thousands of kilometres away.

2.7. Limitations of Regulations

The difference in nature between government (establishing boundaries) and technology (breaking boundaries) makes them strange bedfellows.

  1. Restricted Processing
    While initiatives like European Union's General Data Protection Regulation are great, the restriction of the Cloud in handling citizen data can reduce the value of those data by preventing innovative and useful computation to be performed on them.
    SOLVED: Instead of restricting what the Cloud can or cannot do to citizen data, may be the governments should also be encouraging the citizens to do more with their own data themselves?

  2. Wasted Data
    Law that prevent Clouds keeping data, if followed, can prevent
    Instead of removing the data after they have already gone into the Cloud as promoted by the right to be forgotten, what about not giving so much data to the Cloud in the first place ?

  3. Slow Response
    Making laws to regulate technology is. too slow, by the time the government realised that their local industries (e.g. taxi, software etc.) have been negatively affected, market dominance has already been established.

  4. Little Understanding
    From AI to blockchain, technologies can be complex making it difficult for law makers to understand their future impact and implications.

  5. Disadvantage the Small
    Law is a very blunt tool that can stifle innovation, regulations most often make it too expensive for small players to comply yet cost the big players almost nothing to follow (assuming the lobbyists of the big players have not watered down the laws in the favour in the first place).

3.3. Internet User to Owner

88.io restores INTERNET to its original distributed power structure and then turn PASSIVE users of information services on the internet into ACTIVE owners of information assets by helping them create their own Private Cyberspaces.

With ONE CLICK on their mobile phones, INDIVIDUALS gain control and ownership of their digital life by managing their information assets without going through third parties. Each private cyberspace zone contains the individual's OWN applications (providing services similar to Facebook, Tencent etc.).

Summary

Expanding the power of many (the citizens) is much more productive then restricting the power of the few (the cloud) - that is what Private Cyberspace computing about:

  1. Enabling everyone to create their own Private Cyberspaces, irrespective of their wealth and skills.
  2. Encouraging Private Cyberspaces to work together to solve the toughest problems facing humankind.

Scam Clouds

Scam Clouds are blockchain based companies, that trade on greed and ignorance, providing no useful services at all.

cloudtypes

Bitcoin, Ethereum etc. are Scam Clouds despite their claim to be decentralised, they are NOT. That deception fuelled by ignorance and greed is burning up the world's energy reserves and need to be stopped.

Despite their claims, public blockchains (e.g. Bitcoin, Ethereum) are neither trustless nor decentralised. Without the underpinning of those 2 fundamental properties, cryptocurrencies and dapps lose their original reasons for existent.

Fiduciary Exchange is based on blockchain's original distributed power structure and replaces greed and ignorance fuelled FAKE value and utility in current public blockchains with productivity and performance driven REAL values and utilities by providing truly decentralised blockchain based ledgers.

Cleaning up the deception based blockchain industry in two steps:

With Fiduciary Exchange, USERS are also OWNERS of the blockchains they use, they gain control of their online transactions by interacting directly with each other without going through existing public blockchains that are controlled by others e.g. bitcoin and ethereum.

1. Centralised Trust

From correct security (e.g. not being hacked) to correct profiting (e.g. no pump and dump) to correct allocation (e.g. their token) ... almost every important aspect of a blockchain is based on TRUSTING that its creator behaves properly as the power in centralised there. If the blockchain uses words like trustless, decentralised etc. then you know it is a big con.

BASIC
FUNCTION
Traditional
Centralised
Bitcoin
Ethereum
Fiduciary
Exchange
DATA Concentrated Distributed Distributed
CONTROL Concentrated Concentrated Distributed

Proof of Work and Proof of Stake schemes ALL give those that ALREADY HAVE resources increasing control over those that HAVE NOT. Concentration of power allows many to be "played" by a few, the opposite to the "decentralised" benefit they are touting.

Blockchain developers claim that you no longer need a bank,
when in fact THEY want to be your bank.

You use their currencies, you follow their policies ... operation is centralised until there is a problem then the blame is decentralised.

Contrary to blockchain's original DISTRIBUTED ideal, in practice the control of current public blockchains is highly CONCENTRATED in almost every important aspect, from developers to miners to exchanges to so called whales.

Each becomes a building block of their own version of Bitcoin, Ethereum etc.

More references to massive blockchain deception driven by greed and ignorance can be found on the Big Con page.

2. Blockchain Components

Fiduciary Exchange is a complete computing stack with a much larger scope than Public Blockchains, but a very rough feature table may be useful for illustration purposes:

BASIC
COMPONENT
Bitcoin
Ethereum
Fiduciary
Exchange
STORAGE Full Node Infinite Disk
PROCESSOR Crypto Miner Disposable Node
INTERFACE Crypto Exchange Personal Console

STORAGE - unlike public blockchains your data are NOT stored remotely inside so called "full nodes", they are stored on your personal devices (e.g. phones, laptops) and managed by your own Asset Cluster, so you can view, edit, move or sell your data at anytime.

PROCESSOR - unlike public blockchains the processor is NOT some anonymous miner half way around the world, it is selected by you on the Fiduciary Exchange and has verified identity and known physical location, you can use whoever you like to process your data. You know them but they don't know you.

INTERFACE - unlike public blockchains the interface is NOT on some remote exchange you have not control of, it is your own Entity Agent who is trained by you and lives on your personal devices (e.g. phones, laptops) which only you have full control and no one else have access to.

3. Blockchain based Compute

Bitcoin uses opcode scripts to process transactions and that design of running scripts on every node of the blockchain was expanded to OTHER applications in form of "smart contracts".

The idea was by replacing "flawed" humans with "smart" contracts on blockchains, these new "decentralised" applications will somehow be free of human influences - ignoring the fact that those "smart" contracts are were actually written and maintained by same flawed humans they are trying to replace.

Smart Contract developers claim that their software replace humans,
when in fact THEY are replacing other humans.

There are numerous problems like the efficiency of running the same script on every node worldwide, the ability to change a smart contract that has bugs, or whether there is any advantage over non smart contract techniques. But let's just focus on why "smart" contracts are dumb and "decentralised" applications are centralised.

3.1. Maximum Attack Surface

Standard protection mechanisms (like encryption, firewalls, locks on doors etc.) worked well and continue to work well because they LIMIT the attack surface. Decentralised applications exposing everything to everyone increases the attack surface to maximum possible - running counter to that fundamental rule.

Giving your data to someone give them power to abuse those data, letting someone process your data on your behalf give them power to abuse you. With dapps, you are giving both data and processing authority to EVERY node on the blockchain - thus subject your data and yourself to the maximum possibility of being abused.

3.2. Minimum Diversity

The so called "decentralised" applications actually ALL use just ONE centrally design scripting engine. Just ONE hack of that scripting engine and ALL apps on ALL nodes are affected.

There have been and will be centralised weaknesses, like front-running which cannot be fixed no matter how hard people tried.

There have been and will be centralised decisions that go against the fundamental reason for blockchain's existence, like changing the supposedly immutable worldwide ledger due to just ONE dapp.

3.3. Centralised Application

Centralisation of the blockchain and its script engine is just the start, the so called "decentralised" application running on those blockchains are also highly centralised.

Due to the high costs of running "smart" contracts on every node in the world, only a small part of a "decentralised" application is on the blockchain - the rest of the software are actually centrally controlled, so the promoted "decentralised" VALUE of these applications does not actually exist.

3.4. Dumb Contract

A contract cannot be called smart when it executes AGAINST the wishes of the people who drafted up the contract.

These contacts are not only dumb (blindly executing whatever they were told), they are also subjected to conflicting Interpretations just like paper based legal contracts e.g. disputes on whether their executions are illegal hacks or legal transfers.

No software can anticipate every possible operation scenarios, different people looking at the same piece of code can see different possibilities and even different purpose.

3.5. Poor Lineage

Even if Bitcoin has not degraded into a Big Con, retrofitting a single purpose APPLICATION into a general purpose computing PLATFORM is always going to be problematic.

The elegance of the original bitcoin design has been destroyed with numerous parties adding incompatible features e.g. cutting up integrated full node into parts, pushing through unintended volumes, adding privacy to public data, running unsupported applications etc.

Citizen Synergy has been designed from the ground up with novel asset zoning to be a TRUE decentralised computing platform.

  Basic
Features
Smart
Contract
Fiduciary
Exchange
. 1. Consensus
Mechanism
RESOURCE
rich only
IDENTITY
everyone
. 2. Blockchain
Control
DEVELOPER
one
USERS
many
. 3. Provider
Identity
UNKNOWN
nondeterministic
KNOWN
stable
. 4. User
Identity
ADDRESS
fixed
ALIAS
dynamic
. 5. Data
Exposure
UNCONTROLLED
worldwide
CONTROLLED
selected few
. 6. Computation
Exposure
UNCONTROLLED
worldwide
CONTROLLED
selected few
. 7. Reward
System
ONE
gas
ANY
fiat, crypto
. 8. Virtual
Machine
ONE
evm
ANY
x86, arm
. 9. User
Statistics
EXPOSED
worldwide
OPTIONAL
private

Notes:

  1. Equitable consensus mechanism (proof of identity) means consensus is requried from everyone not just from the rich (proof of stake).
  2. On-demand creation of as many blockchains as needed (micro blockchains) means information processing and storage cannot be dominated by any party.
  3. Provider nodes must reveal their owner identity and physical location, as they should.
  4. User accounts are linked to different levels of identification for different applications with dynamic aliases.
  5. User has full control of how data is supplied using progressive fuzzifcation and homomophic encryption.
  6. User has full control of which nodes are to be used for processing with sovereign transactions and disposable nodes.
  7. User statistics are kept privatekly with each user which they can contribute optionally in an encryopted manner.

From fundamentals like proof of work and proof of stake though miners and exchanges up to smart contract and token prices, almost nothing is

Looking beyond the greed and ignorance fuelling public blockchains activities

By distributing the control of the online service to the users, Citizen Synergy prevents market manipulation, promotes innovation and adds unprecedented privacy and value to their data. The bank is still needed, but now you have control of that bank.

4. Blockchain based Storage

Blockchain based storages that claiming to be "decentralised" storage are mostly NOT decentralised and come with numerous blockchain related problems.

  1. Primary Single Point of Failure - themselves.
    If they are gone or hacked or faulty etc. your data is major in trouble.
    With Infinite Disk you have full control, the Storage Nodes you use can die a million times and you will NOT be affected.

  2. Secondary Single Point of Failure - their Cloud.
    A lot of them use others to store their data or their metadata so your data is in trouble if any of them has problem.
    With Infinite Disk you have direct access to the Storage Nodes, no extra layers of complexities there!

  3. Unsubstantiated Distribution - where?
    How many claim they cut your data up into many pieces and store them separately, yet these separate pieces are all within the SAME data centre.
    With Infinite Disk you know where the Storage Nodes are, from your parent's basement to some stranger within 10km radius.

  4. Useless Encryption - they encrypt for you.
    So not only can they decrypt your data at anytime without telling you, if they disappear or lost the key then you data is basically screwed.

  5. Complex Interface - s3 is not a disk
    Storing files in s3 only benefits the Amazon and its copy cats. It makes operating a remote storage at scale much easier, but also makes using that storage much harder.

5. Blockchain based Network

Blockchain based networks that claiming to be "decentralised" are actually NOT decentralised and come with numerous blockchain related problems.

For example, Helium claims to be people's network
To show what suckers are the people this is AFTER they have purchased hardware e.g. Helium took the power away from hotspots
As if the original one sided changes changes to Centrai

Corporate Clouds

White Clouds are companies that COLLECTS your data for internal user, they might use it to provide services to you or they might use your data to influence you. Despite not releasing your data to external parties for profit, they do get hacked very often.

Although Paypal discloses who the third parties they are sharing your data with, there is no information how those numerous parties are using your information.

Privacy Policy Dellusion

You need to understand that Privacy Policy of any company is to protect the company NOT to protect its customers.

Most of these privacy policy start by saying in a lengthy manner how important your privacy is to them and then somewhere in the middle quickly tell you how they can use you information in ways you don't know without you consent - that is they are doing the exactly the opposite of what they said in the beginning of the policy.

Who has the time to look up the legal jargons or read through the whole document ?

Loyalty Point Programs

Loyalty programs that analyse or sell your data are also Corporate Clouds, you have no control of what they are doing with your data (e.g. using your data to influence you) and you lose out on potential income from the data they have gathered.

Not Clouds

Providers of application INDEPENDENT compute power (like virtual machines e.g. Vultr, AWS etc.) are NOT Clouds, as they do NOT dictate what software you can run of their machines and they do not access your data as part of their business model.

We call these providers Hosters, as they host computers remotely for their customers. Hosters plays an important part within the Citizen Ecosystem.

A few online services like Wikipedia and OpenStreetMap are not, but most are.

Ownership changes Everything

The benefits of owning your compute, instead of using cloud compute, are similar to the benefits you get from

  • owning your home instead of staying in a hotel
  • owning your car instead of taking a public bus

Become a Compute Owner instantly - with just ONE CLICK.

40+ Advantages of Compute Ownership

Owner
ADVANTAGES
Citizen Compute
OWNER
Cloud Compute
USER
1. Access you define platform define
2. Artificial Intelligence your model platform model
3. Asset your asset cloud asset
4. Attention controlled interruptions constant interruptions
5. Benefits mostly to you mostly to platform
6. Broadband more return on investment less return on investment
7. Collaboration directly by you only through platform
8. Contacts you know platform knows
9. Control totally exclusive almost none
10. Cost collaborative infrastructure centralised infrastructure
11. Customisation personal wants platform wants
12. Death your beneficiaries unknown beneficiaries
13. Encryption you encrypt platform encrypts
14. Evidence you collect platform collect
15. Hardware cheap devices expensive devices
16. Impact global reach platform reach
17. Income mutual reward algorithm reward
18. Independence your rules platform rules
19. Innovation swappable processes fixed processes
20. Insight processed data raw data
21. Interaction you manage platform manage
22. Leadership easy to lead easy to follow
23. Name your aliases account name
24. Payment your log platform log
25. Profit your compute your data
26. Principle your own platform directors
27. Productivity globally optimised locally optimised
28. Redundancy massive redundancy limited redundancy
29. Reputation you decide platform decides
30. Resource reclaim latent resources waste precious resources
31. Reward value based reward platform based reward
32. Rules mutual agreement platform dictate
33. Safety your boundaries platform boundaries
34. Security trusted interaction supervised interaction
35. Skill mix and match nodes application programming interfaces
36. Software Node Set App Store
37. Sovereignty local laws overseas laws
38. Trust distributed attestation central attestation
39. Usability your interface platform interface
40. Value Add your way platform's way
41. Wastage all data partial data
42. Worldview you control platform controls

As can be seen above, Compute Ownership improves all aspects of your digital life - substantially. Whatever you do, you can do it better when you own the compute processing your data.

Access Advantage

Define who has access to what data yourself, instead of letting cloud platforms use it in ways you have not approved or sell it to people you don't know.

How much has Apple paid you to use your phone, your bandwidth, your battery power, your LOCATION at that time to help find an Airtag belonging to some stranger ?

Artificial Intelligence Advantage

Attention Advantage

Benefits Advantage

Contacts Advantage

Control Advantage

  • cloud platforms controls almost every aspect of their users' lives

Private Cyberspace turns the existing Cloud Control Flow UPSIDE DOWN, by letting the user control application through infrastructure.

control_flow

Cost Advantage

Economies of Scale

Making Private Cyberspace affordable and attractive to all 8 billion on earth requires a PARADIGM SHIFT in economies of scale:

  • from achieving economies of scale through Centralisation (cloud platforms growing as many users as possible). It is about a few planning what might be efficient FOR OTHERS in the future.
  • into achieving economies of scale through Collaboration (private cyberspaces working together as much as possible). It is about many deciding what is efficient FOR THEMSELVES in real-time.

Private Cyberspace removes the COST barrier to RELIABLE infrastructure by leveraging community idle capacities (e.g. unused disks, bored retirees), reusing broken devices (e.g. laptops with faulty screens & keyboards) and taking over data income from the Cloud.

cost

  • Cloud Platform lowers cost by SHARING platform resources between many platform users.
  • Private Cyberspace lowers cost by AGGREGATING the resources of many cyberspace owners.

Currently most people can only collaborate via cloud platforms, with private cyberspace everyone can collaborate directly and benefit from network effects that were only available cloud platforms before.

Digital Equity

Private Cyberspace removes the COST barrier by leveraging community idle capacities (e.g. unused disks, bored retirees), reusing broken devices (e.g. laptops with faulty screens & keyboards) and taking over data income from the Cloud.

Private Cyberspace removes the COST barrier to private cyberspace ownership by aggregating surplus resources from others and taking over data income from the Cloud. Everyone now have RELIABLE infrastructure to operate at any scale, no matter their wealth.

Customisation Advantage

Death Advantage

Encryption Advantage

Impact Advantage

  • Cloud Platforms make impacts based solely on the platform's interests (e.g. valuation or profit).
  • Private Cyberspaces can make impacts based on their owners' many different interests..

Income Advantage

  • Cloud Platform rewards its user based on proprietary platform ALGORITHMS.
  • Private Cyberspace rewards its owners based on MUTUALLY perceived value.

Data Safety

A major dilemma with selling your data is the lack of privacy, the more data you sell the less privacy you have. So your data income was essentially limited by how much privacy you are willing to lose.

Private Dataspace solves this income dilemma by letting you sell your data without losing your privacy with the world's first deployment of homomorphic encryption at population scale.

selldata

Private Dataspace uses a novel 2 step data exchange process to not just protect owner privacy but also to ensure maximum return on owner data.

Income

If someone uses your personal data and infrastructure built with your tax dollars to generate massive profits from their AI models, may be they should give you some money in return ?

Instead of money, now that you have you own Private Cyberspace with compute power, may be they can:

  1. Let your cyberspace run the software performing the inferencing and training with your data ?
  2. Let you cyberspace use the resulting models that were trained with your data ?
  3. Let your cyberspace access other data they were used with along with your data in training their model ?

Once you have collected some data into your own private cyberspace, you can OPTIONALLY work other cyberspaces in a safe and synergistic manner to solve the most difficult problems facing humankind.

For example, currently you can earn bronze y20coins anonymously (e.g. for helping to locate COVID virus down to meters and cut its legs off within minutes by notifying others).

From the wifi signals on the street to the barcodes on a bottle of milk, you can donate or sell the the data you have collected in your Private Cyberspace immediately on collection or on a later date.

Selling DATA in your Private Cyberspace redirects the funds originally going to the Cloud Platforms to you, however Private Cyberspace also let you sell INSIGHTS by processing your data yourself and then selling the resulting insight, which is substantially safer than exposing your data to others.

insight

You can also use your Private Cyberspace to receive data anonymously, from a pothole on the road in front to an active shooter in the building, from an ambulance coming up behind you to proving you are somewhere else at a certain time in courts ... the possibilities are endless.

Independence Advantage

Innovation Advantage

Innovation sets Human Intelligence apart from Artificial Intelligence, innovation needs compute and data to thrive, restricting the compute and data to dozens of companies worldwide is directly restricting the ability of the rest of us to innovate.

innovate

No matter how smart the staff are at the Cloud Platforms (Apple, Google, Open AI etc.), the diversity introduced through the participation of the rest of the world will result in MORE and BETTER innovations.

Most importantly, those innovations will be carried out under the DIRECTIONS of billions of citizens instead of dozens of board members.

Private Cyberspace provides instant compute power to MANY so their digital lives are no longer dependent on the compute power from a FEW (e.g. Apple, Google, ChatGPT etc.).