Archiveing the “commons” the #makeinghistorys project.

The #OMN are building this into the archiving nodes (see the #makinghistory project https://unite.openworlds.info/Open-Media-Network/MakingHistory) you can then choose to archive hashtags, and you can get a “lossy” view of what is backed up across the network you can see, so you can choose what to focus on your archiving then we rely on “institutions like liberys, arcive.org, university’s etc to back this up in more structured ways. We just do the messy part, 🙂 so agen is a balance with no right path.

Messy is like good enough for most people, and good to have traditional institutions as a backup to this backup. Remember, all our data is #4opens so nothing is private. Privacy is done #p2p decrypted else’s where the best we offer is sudo anonymity through tor.

You can get a “lossy” view of what is backed up across the network you can see, so you can choose what to focus on your archiving. An archiving node is simply a normal node with a different template #KISS simplicity is where the value is.

This is central to the #OMN as it builds meany subject hubs, as you can’t scale storing everything. So a federated natural outcome, anyone can run one. When your database gets too full, you look at your “lossy/local network view of what is backed up and start throwing stuff away. If you are nice you though away stuff that has wide distribution of backup if you are nasty to throw away stuff only you have.

Talking about trust and power in networks

A. on the subject of “security” we have a #open policy of not trusting ANY client server security at all, so this should only be done #4opens as far as possible and having limited trust in #p2p security, even though we use this, because of the insecurity of the underlighting syteams it runs on, mostly old outdated phones, built as blobs by #dotcons this simple approach gets round much of the current thinking of technical “security” ie. the is almost non at a normal use level and little real security at the paranoid level as you will be talking to the normal level so there security will fail even if yours is solid. good to keep this in mind 🙂

The #OMN is all about people messing around with each others data 😉 but yes we need good basic security, (sudo anomumus) accounts, public audit trails (openprocess) everywhere. we will need digital hashes/cigs for media items etc. but the data it self just sloshes around and gets hacked at and added to. its a commons, the rules are social based on trust flows, they are not mostly hard coded or encrypted. but we add a smidgen of hardcoding and decryption ONLY were its needed. So 90% trust flows, 5% social norms, 4% hardcoded, 1% encryption is my thinking.

A. Data has the value the instance itself is transitory, and yes the instance is needed and stores the data but if it vanishes it has little impact on the value (the data), we build this into the network.

Q. am talking about the machines

A. We won’t the instance to stay up and be secure, BUT we build the network, so it keeps working when they are hacked and poisend by bad actors.

Q. Yes, but that doesn’t mean we make things easy for bad actors

A. Yes, the code and instances have to be secure, but the network flows, and the data soup have to keep working when the individual instances are hacked and poised, no security is fool prof and the #OMN is focused on building trust so is inherently more open to fools, we build with this in mind. We are building a #KISS semantic internet of data/flows. For example the idea of rollback as a core security model rather than more traditional hard (control) security is a good fit, due to the #4opens approach, the missing few days of data will (mostly) rollback into the instance so the cost of being hacked/trust failed is less of a block to being open and (social) trusting to bring in actors/sysadmins/moderates etc. On the tin, we are clear that our network is a trust based “lossy” network.

Where you can still run the #OMN as a hard control based secure network if you wont BUT it will not scale to the social change/challenge if this second option is the only one, this is the current #geekproblem we need to work our way out of. The first path of trust based “lossy” is where the real horizontal “power” comes from.

Q. We sometimes need to think/talk about “security”.

A. I can only repeat I don’t have a solution to this, but I have a path to one, make the user facing “trust” based then from this, “trust” them to fix the next “problem” the #geekproblem of the hardcoded #feudalism of all our networks and code. Or in other words head in sand and pray someone else will fix it, am bussey 😉

On the #OMN projects maybe we need to list what needs to be secure: the account, the activity feed, the data credit might be more but can’t think of much else off the top of my head. And yes to secure the account the instance has to be secure, to secure the activity feed the flows need to be secure, to secure the credit the likely needs to be some hashing done on the media objects.
We likely end up back close to the place we started, but we come to this from a very different place, if that makes sense. This path we take matters.