Hardware Exchange

1. Affordable Cyberspace

Infrastructure Exchange remove the COST barrier to private cyberspace ownership by aggregating surplus resources from others and taking over data income from the Cloud. Everyone now have abundant compute power to operate RELIABLY at any scale, no matter their wealth.

Deploy Crowd Infrastructure to increase capacity and reduce cost with just One Command. By leveraging surplus resources from each other and taking data income away from the Cloud, people at ALL skill and wealth levels can benefit from technology equitably.


1.1. Crowd Infrastructure Design

With numerous massive data centres around the world, there is NO WAY for Private Cyberspaces to match the scale of the economies of the Cloud Platforms using traditional infrastructure.

But what if we turn the traditional control flow UPSIDE DOWN ?


Breaking up your existing Cloud services that are ran by a handful of companies into thousands of sites all around the world can add a whole new dimension into your digital life.

Private Cyberspaces working together can transform the information landscape, Imagine Apple and Google working together! From a few friends backing up each other's data (infinitedisk.com) to millions of citizens controlling pandemics (virtualvaccine.me), the possibilities are endless.

Crowd Infrastructure has been developed to solve the Personal Privacy vs Virus Visibility Conundrum that has prevented rapid isolation of COVID transmission. The same capability can be applied in many areas, from controlling transmissible diseases to redistribution of excess food to polling public opinions to finding missing persons to alerting about active terrorist attack.

The flexibility of Crowd Infrastructure enables the Users to take advantage of the daily improving technology curve, whether it is blockchain or AI they all run on the user's OWN infrastructure.

Instead of having to support thousands of users, the "upside down" Crowd Infrastructure only has to support one user.

For each application and each user, there is an application-specific user-driven infrastructure which is highly diverse, globally distributed, fully encrypted and self-heals.

By leveraging off each other's infrastructure, citizen computing users have access to a wide range of infrastructure to suit their specific needs - pick a site in the neighbourhood for low latency daily use, pick a site in another city for disaster recovery.

Unlike Cloud data centres with thousands computers inside, there is no special cooling, no security guard, no redundant power, no fibre loops required.

Private Devices

A unique features of Private Cyberspace is its ability in making use of readily available Private Devices (like phones and laptops) widely owned by everyone in its Crowd Infrastructure.

Unlike Cloud Platforms that take over private devices to control the digital lives of their owners, Private Cyberspace enables the owners to use their devices to control their own digital lives.

Private Devices can:

  • act as the Frontend Clients of your Private Cyberspace by installing Personal Console software in Web Browsers with just ONE CLICK.
  • act as the Backend Servers of your Private Cyberspace by installing Disposable Node software in Virtual Machines with just ONE COMMAND.


Disposable Node

Disposable Nodes and Personal Consoles form the two halves of a Private Cyberspace's infrastructure. Personal Console provides the frontend user interface while the Disposable Node provides the backend computing power.


Disposable Nodes are basic computing blocks that can be used to deploy an unlimited range of processing, networking and storage systems.

1. Scalable Design

Each Disposable Node provides a set of application specific computing functions by wrapping relevant software and hardware into independently deployable computing bundles that work synergistically together with each other.


It hides the complexity of operating large scale computing resources behind a simple computing abstraction, allowing those resources to collaborate and be shared quickly and safely between members of a community.

Disposable Nodes are not only great for privacy, ironically they create highly reliable systems by being easily disposable themselves.

2. Universal Availability

A Disposable Node can be created with just ONE COMMAND on most computers.

It can share existing computers (from home computers to remote virtual machines) with other applications as well as run on dedicated computers (from tiny Raspberry Pis to massive IBM Mainframes) by themselves.


Most old computers manufactured within the past 10 years (even laptops with damaged screens and keyboards) can be used.