What if it were possible to make agorist business networking invisible, compartmentalised, locally focused, and globally connected?
If you want to join a discussion forum aimed at organising a division of labor with the building of this system, subscribe to the Bitmessage Chan:
BM-2cVH7ztTA28jF54ETz7FtctARDHXBpetR8 The Agora Development Network...
Even if you are just a fan, join in, probably you can at least network and find more people to join, who can do more than you can alone.
This is the network system equivalent of "Think Locally, Act Globally" It lets you organise business activities that build strength and prosperity in your community, while also linking you to others elsewhere. It enables us as a group of disorganised otherwise disconnected people, to gather intelligence on those who are working to divide us, and creates an open platform for further escalation and empowerment to further strengthen our position and weaken theirs. Making the slime into the pariahs they should be, for their immoral, violent, and destructive actions that destroy quality of life, oppress the weak, and all the while, let them paint a picture on the TV that they are out to protect you.
They are not
Bitmessage is a sadly neglected, and powerful tool for organisation without any significant way for participants to be isolated, attacked and marginalised. Part of my intent in this is to build up from the principles demonstrated by Bitmessage, to promote the conceptual framework, and build it into something that will empower deep web black markets, resistance movements, local, peer to peer markets, and, my favourite bit, coordinate action to damage the power of those who wish to suppress the genuine, productive, and beneficial effects of social networking for the promotion of a society without oppression, violence and delusion.
If you need help with getting up and running and joining the agora development network, just post a comment and I will try to provide information directly addressing your questions about how to get on the network, and join the discussion.
Let's build the kernel of the greatest, most disorganised, invisible insurgency against corrupt, centralised power, and make our world a beautiful place, where freedom, beauty, prosperity and courage fill the hearts of the people and end this dark age of violence, trickery and oppression.
Let's make this thing a reality. I think if I can get 50 people actively participating in developmen, we could have a live Beta network running within 6 months.
Everyone involved will benefit, and this will empower millions by leveraging network systems to enable us to fight back against the privileged, malicious groups who are all trying to control the terms of the discussion about the way the future will look. This benefits so many little groups, without forcing them to conform to any agenda except mutually assisting efforts to defeat the power of the powerful groups whose power makes this world such a dangerous place.
Agora - A Local-Centric Distributed, Compartmental Corporate Infrastructure
Abstract We propose a system by which a decentralised, locality-focused, ad-hoc business organisation, potentially operating in hostile environments, can facilitate communication, advertising, inventory, order management, fulfillment, escrow payments, feedback and rankings, while enabling the automatic distribution of income for the organisation to fund an insurance fund for members who go dark from the network, distribute profits according to stake, to invest into a funding pool, to distribute credit out of the pool of shares for rapid grasping of new business opportunities, and the secure, remote management of member's infrastructure, while enabling pro-active security measures against hostile parties.
1. Introduction
The initial inspiration for this concept came after thinking about the serious vulnerability of centralised black market systems, as well as applying the same basic principles of operation of this kind of organisation on a more localised basis.
A longer range goal is that with sufficient, geographically distributed organisations using this system, a secure, but geographically seamless system of connecting many individual local markets together, to improve accessibility to a broader marketplace, by both customers, and every class of member operating as part of this system, to more comprehensively allow the optimal distribution of resources and personnel where it is needed. This could greatly boost resilience of communities to calamity whether it be war or natural disaster.
The primary application is not intended to be the only one. In especially second and third world countries, a system like this can form commercial infrastructure for any kind of trade, as well as providing the tools to deal with adversaries to the traders in improving their advantage of acquiring intelligence as to the whereabouts and associates of potential threats to the marketplace.
Indeed, this system could integrate every function of securing any kind of especially local marketplace, it allows operations to be geographically distributed, presenting a smaller potential target, it provides opportunities for anyone who produces, procures, warehouses, delivers, administers or manages closely operating subunits, and includes a means for such groups to pool financial resources in order to gain maximum lead time against competitors.
In these times of economic instability, by building a turn-key, easily distributed means of connecting both distant and selectively, local users of this system, connecting it in with multiple cryptocurrency systems, on top of the compartmentalisable, infiltration resistant, counterintelligence, connecting users, whether providers of services of one kind or another, suppliers, customers, technical and training resources, the intention is bring heretofore unavailable resources, to fund and invest, and thus to strengthen communities against both economic and military incursions into communities.
With Agora, you can buy and sell anything that others on the market are offering. You can precisely choose exactly how and where your goods or services are delivered, and by who, leveraging the building of track records and reputations. When banks and governments fail, but internet infrastructure remains functional, it can be a tool to not just do business but to coordinate any kind of activity, direct funds and materials and personnel where they are needed, and especially by enabling compartmentalisation of even a local group of operators, who may not even know what each other looks like thus also limiting the ability of intelligence gathering intended to disrupt and destroy the cohesion of communities.
The applications of a network system like this are powerful whether the environment is hostile, or even when it is relatively benign. It forms a complete business infrastructure system that can be rapidly deployed, expanded, and relocated when necessary.
Glossary
I will use a few specific terms to refer to corporate roles I have defined, thus:
Something Bad: This is a situation where you have just been compromised, This is why Agora squirrels a little away from everything you get paid.
Halp!: The Laptop, and ideally, your Android or Ubuntu phone will need to have a Halp! button installed. This button will send an Instant Message to your Operation with your coordinates, and stream up to the Agora Halp cluster. This will ensure nobody will forget you if Something Bad happens. It also makes your Laptop into Toast, so it doesn't make Something Bad, Worse.
Toast: The Laptop is shiny and clean, and then, what you are supposed to do is then put The Access Key in it, and turn it on. Then the Access Key is also Toast, and so long as you flushed your stash, keep yer mouth shut and wait for your lawyer, mum, sister (oh, I hope it's not your spouse). And they'll bring the Liar to say the magic words to judgey poo, and you can go home. And for the Toasted, if we can arrange an underground railroad. Well, It depends on how good the Operation is, I guess.
Doom: You're out, gone. Sorry, but someone pwned The Laptop or The Access Key, and if that happened they know what you are doing. Your Insurance Payout will be with whoever you told us to send it to, and probably they will already have your ticket to Barbados ready. Or maybe just Belgrade. The command has been sent out and anyone silly enough to boot The Laptop, or if it was already online, it is now Toast.
The Buzzer: Unfortunately, there needs to be a crappy, small as possible burner phone, always kept on and charged near your person. When The Button needs to be pressed, you need to clean up your house. If a simpler, longer-running Button can be found, and it can give two signals, one meaning go to ground, the other means The Button has been pressed.
The Button: The Button is The Doom. Of All. If The Button must be pressed, then it means either You are in trouble, and possibly a bad guy, or it means SHTF and go toss The Key and The Laptop in the garbage truck crusher. Wait until The laptop winks out though.
The Administrator: Basically, customer service and button pusher for manually triggered transactions. The administrator also holds the private key for the group in which this is their role. If the Administrator presses the blow everything up key, (or just yours) then you have 6 hours. Only the Geek can instantly blow shit up. The Geek can unpress The Button but if The Administrator had to, then they probably had good reason.
The Geek: The technician, the one with the primary access to all that buttons that make things go bang, and whose job it is to issue new access keys. The Geek is the most trusted user. But they don't have root, or any login, on any Access Key they give out.
The Access Key: This is a preconfigured live USB with the Agora system preinstalled and configured with your key. You set the password when you order it, so if someone else swipes it they can't do anything with it. The installation uses a single-entry Grub based luks unlock, with the keyfile hidden away from you, the regular user. And everyone else. You can use this key also to install on another computer, but if the Geek notices (and he made the key give a signature different on the installed version) appearing at the same time, he will wipe them both. It's the rules. The Access Key should be stashed away for only if the laptop blows up. The access key will require the password you told the Geek to put on it, or it will blow up! The Access Key will be a collaborative project of all Agora Geeks.
The Laptop: It doesn't have to be a big clunky laptop, actually, But if the Geek doesn't tell you (or one of the Agora Geeks)' that the latest Access Key works with The Laptop, then, even if it does, it doesn't. This is why you keep your Accesss key, and remember the password you set it to when it first booted. It can actually, yes, be a tablet. But not unless the Geek says so.
The Courier: This is any poor soul who actually has to move The Package from A to B. Your pay is good. Just remember to ready to press Record, and if Something Bad happens, press Halp! We will get your money to you in Barbados.
The Warehouse: This is the guy whose job it is to keep The Goods in The Crypt, make them Clean, and who posts the Inventory Updates. None of us wanna know about your dirty Crypt, ok? Keep it to yourself.
The Buyer: You might also be a Maker, but even if you are not, you are the most important person in The Operation. After The Customer. Your job is to fill The Crypt with The Goods.
Just have to reinforce the point. The Geek is the most precious, and the most dangerous node in your Operation. It is possible, but not probable, that maybe in an Operation there is another Geek. Well, if there is, if you are lucky you were friends before the Operation and they will fix your broken Laptop.
*Maybe not everyone who uses Agora needs to be so worried about Doom. *
Potential Applications
Contraband markets
Drugs, Untaxed goods, Weapons, Sexual services, Border crossing, Hacking, SurveillanceDirect person to person trade
Transport, Courier services, Secure storage, Classified advertising, Repairs, Procurement, Consulting, TrainingOrganising mass action
Flashmobs, Structure hits, Citizens arrest, Evacuations, Militia mobilisation and coordination
...The applications are probably limitlessOH. I did forget one thing. Running a Business!
Principles of Agora Technology
Agora works on the principle that I will call purpose-agnostic.
These are the general two classes of inter-node interactions.
1. Proxy connections
Every time a proxy gets a new IP address, it gets a new key. All routing certificates are discarded and will not be honoured.
Correlations between multiple IP addresses and a router node key are an avenue of correlating a node to a user, however slim.
Proxy connections require payment using a pre-purchased routing voucher.
All queries to another node require a routing voucher. Except a routing voucher purchase.
The voucher is transformed by you in an irreversible way that retains proof of purchase, but cannot be back-referenced by the seller of the voucher. A voucher is not valid until it is transformed. It can be sold and its' lack of 'stamp' proves it is unclaimed. When you spend the stamped voucher, you get a session key, and to initiate a session, your node must use the session key to decrypt the secret, and then this opens (or re-opens) the session.
You will never use a routing session certificate again as the outer layer, unless it was previously used as the entry node before It is better to not reuse them, they will be discarded after a session is closed.
Proxy service requires the use of the public key of the routing node for encryption. During the period of the open connection, at random intervals a new key is forwarded using Diffie Hellmann. The re keying is taken in turns so that neither side can have the random seed for the next key exchange.
Applications of Proxy Connections
- Payment for access to a network
- Wireless hotspot (No more captive portals!)
- Cabled connection
- Simple NAT type proxy
- Traffic is forwarded
- With layering from end to start, proxy chains can be built.
- Packets can be randomly scattered across multiple proxy nodes, and the receiver endpoint reconstructs in correct order
- Individual packets can be split using secret shares, routed acrosss multiple proxy nodes
- Any combination of 3, 4 and 5 can be combined
- Sequential packets can be routed differently, or any number, or random number, to switch paths. Endpoint will not feed the data to the next step until it can push them in their specified sequence. While a session certificate is still valid, your node will only use it from whichever node it was used before. Otherwise multiple malicious nodes could develop correlations.
Note each hop in the chain costs you. But if you relay for others, part of your bill is paid in kind. You can also earn relay fees with a hotspot being accessed this way.
A note about Relay Pricing
This system is essentially a distributed exchange. The price in cryptocurrency, and note, I have not specified which. This is relatively unimportant except for the delay time. Hosts with free space available, will ask lower prices. Nodes with less free space, will charge more. There will be a record made by each node providing this service, of a cosigned payment price. It could be Bitcoin, it could be Dash, it could be Steem. It doesn't really matter. Analytics sites can spend their routing vouchers pulling this data, compile it, and keep it up to date. You can set your price as you see fit, if there is an offer available at this price. A simple budget manager function will let you pool your budget for relay traffic, and another function will top it up as need be, alerting you if you need to fill up its payment pool.
There is no formal specification for an 'Exit Node'
A node operator could make one, and set whatever fee they like. I'd set it at double, since even if they are paying to get to my node, I don't want to be connected with what they are doing, and, furthermore, I am not building a network you want to get out of anyway. Proxy relaying is a defense against rogue Agora nodes, and exit traffic, even SSL, reveals the GET string from the address bar.
2. Read and Write
Read operations request a file with a specified hash, or identify a type of blockchain data store, and then the appropriate identifier for this blockchain. Mostly, just block hashes.
- Instant messages and emails are re-relayed periodically. All nodes participate in their relay and traffic. Only file block requests are not.
Storage Rental Costs
Obviously, a node has to be paid rent on the hard drive space they sacrifice to store your data. But likewise for access. So your node, with its' seed, keeps a track of rental contracts, and it knows when rent is due.
When a user downloads a file, likewise, they pay for the bandwidth, but there will also be an access fee. The price of data storage is its own separate market, and likewise it will be mined by analytics, in order to provide users a picture of the market. It will rise as supply dwindles, and lower, as it increases. The log entries that can be totaled and cumulated, will be the price for the service, and intermediaries that automate managing a budget pool can even be set to up the pool at a low point, and leave it alone when it builds up.
*So we will have two virtual currencies: Relay and Storage Intermediary agents will take their own costs for the datamining, and this will be their baseline. The whole thing can be pretty much automated, and you can earn by providing storage, or bandwidth, and nodes can be set up to perform these automated price adjustments. In effect the currency will be bandwidth and gigabytes, and buying more gigabytes or bandwidth will be raising your holdings, and conversely, when value drops, you can lower it. The dividends pay out instantly, and frequently, and you don't have to worry about third parties losing control of it, because you manage it, or you hire someone at a margin, to do it, and share in the flow of payments.
File/Folder Query Costs
The price of data to query an Agora node is the same as the equivalent for relay traffic. Well, up and down is added together.
Searching for Indexes
One of the queries you can send to another node is for a file, identified solely by its' hash. If it is an unencrypted, public file, the next 256 bytes in the file are the filename. Hashes of files versus folders are different by the first character. D or F. Makes it easy for humans to see.
Listing Folder Contents
If you request a directory listing of a folder, if the files are public, it will return a list of pairs of hashes and filenames. Otherwise you just get the hash and no filename.
Public Filesystems
Files and folders are identified by a hash. If you send a request for a folder, it will send back as much as it has.
Private filesystems
A client can store, and back up in a seed file stored on a series of known nodes, and this seed file when decrypted, contains the deterministic index seed sequence that corresponds to a specific filesystem. This effectively enables an entire filesystem tree to be distributed across the network.
If the seed is already available on the client, this seed does not need to be retrieved.
The seeds can be multipartite, and represent the distinct indexes for files that have been split using secret shares as a redundancy measure, for example, 3 of 5, if any block cannot be found from the first three queried, another three nodes can be queried, and the chances are 3:5 that the complete file can be retrieved.
Folders are a special type of file node, and such an unencrypted node will enable the download of an entire filesystem tree. They likewise contain a 32 byte signature that must match the, in this case, encrypted folder name.
If you have the key to unlock the folder, and, if anything inside it has a different key, but you also have it, then you can have it all. But by default, we don't want people running around yanking encrypted files off when they can't prove they have the key. If it's an encrypted file, you get fed the 32 bytes after the 256 byte filename slot. If you then have the valid signature for the filename back to them, they send you the file.
The encryption on each different node is different. The node's public key is hashed with the encryption key. This amplifies the cost of cryptanalysis because:
Private File Distribution, Block Size
Because the hash of the server's key, on top of your key, further scrambles things up. It geometrically increases the possible keys. So you distribute your files randomly. Your seed knows where they all are. You can find them manually querying one node at a time, but if you have the seed, you can go straight to it and grab it. Plus, to open a channel to do a filesystem query, you are chewing up bandwidth, and you pay for it.
The Operation
It seems a bit late to talk about this, but The Operation is the chatroom where your Halp! message goes to, and it is where you can talk with all your compadres. It is also where you can send Emails that everyone sees. The Laptops are all set up as members of The Operation, and when they connect to the network, this is home, and where they will try to first make sure you are shuffling email and instant messages to, and it's where The Operation's internal Intel gets sent to first, before it goes out into the Country, and then the World. The Operation will also have another nickname, so if people like the work of your compadres, and you, this is the name they will search for. More on Names later.
Intel
This is part of the security system. Halp! and Record also go into the Intel folder, indeed, in the Agora interface, there is a little button even Customer can press, labeled "Intel".
People should not get in a tizz over any little thing, but if Customer is feelin greebly from the man with the aviators and blue jeans standing around trying to not look like he's standing around looking, maybe Customer got his smartphone, sent his photo, plus GPS like he was trained to, then Administrator, This is one of her jobs, unless The Operation is so big they have their own G-Man.
She has the job of scrubbing (using an easy tool made for the job) the picture of its other unrelated, unsuspicious looking peoples and pigeons, prints on the image the GPS coordinates, trims it up, and casts it out to # publicintel, and every Operation gets this guy's ugly mug in their Intel folder, and as well, if Ugly Mug gets seen sniffing around again, a new report goes up, and added.
Now, there doesn't have to be a G-Man in every Operation, but this guy is a researcher, and knows lots of tricks to how to identify people by faces, locations and times. The G-Man comes up with a name, and a facebook profile, confirms this guy is a spook of some description, and ups it to # Publicintel, and then, every Agorist gets a little email with a link to the dossier in the # PublicIntel
At this point, Administrator decides that it's time to go dark fora while. She hits the 'Go Dark' button on her console, and every Customer, and Operator in the range set by those other customers, gets a pop up saying, 'Time to lay low, and has Ugly Mug's Facebook profile, and a collection of notes saying it is a known spook, and then in nice friendly writing:
Computer will shut down in 20, 19, 18...
For the next 24 hours, the local Agorans are all just going around like as though it was normal, and sure enough, Ugly Mug is still around. 5 different Customers and Other operators confirm, and later that evening, Administrator East, Administrator West, and Administrator South all are tapping away in # hireAgman, send the link to the Dossier, and then they go dark again.
It happened to be there was a G-Man just a couple hundred miles away. He just got paid about 5% Operator's share, plus 50 Customers throw in another $400, and with some 3k in his wallet, he spies on the spy. Figures the bastard out, finds his weakness, the woman he'd been pestering for weeks since he got assigned here kicks him in the nuts, while G-Man happened to be taking photographs, pays an old lady who saw the job a fifty, and another horrified bystander another 50, and off he trots in his G-Car back to G-Town and Ugly Mug turned out to be stupid enough to barge through a bunch of tough guys just walking by, and Granny exclaims 'Ugly Mug over there was layin his hands on that nice woman.
Ugly Mug shows his badge, and with 10 cam videos already going, Ugly Mug makes that evening news, as he is pepper spraying everyone, and for good measure, shoots a little boy's dog.
Instant Messages and Emails
It is part of the cost both of running an Agora node, and a responsibility of an Agora node, to pass around all unexpired emails and instant messages. Without these, there could be Doom if you don't power up and let it Blow Up when The Button is pressed. Apart from sayin nuffin.
For this reason also, each node first requests to the geographically proximate. Local traffic is where most of your business traffic comes from, and where most of your customers are. Once the local cluster has been synchronised with, then it will start to reach out to others.
Geographical proximity accuracy is only provided to other nodes to the extend of the geographical boundary of the country. Associated nodes have a user key, and a group public key. The group private key is held by the Administrator and the Geek.
Proof of Work
Agora will use the Equihash Proof of Work algorithm:
This is the first truly effective cryptohash PoW that does not accelerate with faster hardware. It is almost perfectly proportional in its execution time with the clock speed of your Memory. This is important because it helps the network stay more synchronised, leading to a generally equal amount of delay for sending and relaying messages.
Instant Messages
The Instant Message system is the fastest, and shortest lived block that circulates on the Agora network. It will be tuned to generally take 2 seconds or less to propagate out to the network. Because the relays are set up to propagate first in your Operation, and then your Country, your compadres, whoever they are (ideally) will get your 'Halp' message fastest.
This is also why it is a high priority to have an Android Halp! button, and the Record button. But more about Record later.
Instant Messages are a maximum of 512bytes.
Oh, and yes, The Button uses an Instant Message to make everyone's Laptops Toast.
Emails
There's not much to say about this really. They are limited to 8kb in size, and are either plaintext or Markdown, if you want to be fancy with your stylin. They can contain pictures, ONLY if you first dumped them into The Operation private folder.
Which is now where we get to the juicy bits.
Ads
Ads are a specially formatted email, that is entered into a special form, that Buyers and Warehouse use to announce revisions in consist and count of the Goods. Agora automatically keeps track of changes in stock when orders are made, and confirms them when the Escrow, and/or Feedback is returned by The Customer.
Ads do not manually take away stock if The Warehouse had a party and et the Goods. The Warehouse is responsible then for paying for The Goods, which of course, sans insurance, goes straight back to his share.
So to do that, Warehouse Party Man, you click the checkboxes on the inventory, sign the bill, and the Administrator's auto-pay will kick in because you were not so high you clicked the escrow button.
Orders
Orders are a special thing that goes out when you go to the Ads, fill in your quantities on what you want, select your delivery method, pick the location, pop in the mailing address, or whatever choice you made (The Warehouse has the unique ability to not have to pick a delivery method if they are silly enough to have a party), click order, enter your wallet password, and click Pay!, and then an email gets sent out to the Warehouse, and The Administrator.
Orders put a hold on quantity from Ads, so nobody thinks there is more in the Crypt than there is.
Courier
This part is pretty simple, and is partly why Agora has a Group File Share. When you, The Customer, make your account, you give us a region. Assuming you are receiving by Dead Drop. The Warehouse is paid the Courier fee, because the moment he hits 'send', after upping the photo and GPS of the Drop, if it's new, he needs to be disappeared.
Warehouse goes back to the Crypt, and Courier gets an instant message with a link to the Drop photo that is now encrypted only to him on the Operation Filesystem.
As soon as he gets that piccy, with his trusty degooglified, AOSP android, with Halp! and Record buttons handy, goes and looks for this drop, picks it up, and then snaps the pic and GPS of the Customer's Drop, they head back home, or to the pub, and click Send, and the picture is also shredded on the phone, and now an encrypted drop pic with coordinates is flying about Agora, and The customer goes get the Goods, and goes home and enjoys.
The Access Key
To simplify things and not be wasting money, The Customer only has an Access Key preloaded with their address. They pull it from its hidey hole, boot their Laptop, leaves a rating on the email asking them if they got it, and was it good, Click!, and
The Operation has another notch in its' belt, the Insurance went up, the Administrator got her little stipend, Courier got his cut, and everyone gets a +1, Courier can get +2 if they are fast, and Warehouse can get +2 if they give a freebie, but of course they have to pay, the little pest.
Once Customer sends their feedback, Administratorbot makes a new Ads, deletes the old.
The Administrator
So what does this one do? Well, let's say that Courier failed, and a local street urchin got lucky. Unhappy Customer goes back, fires up their Access Key, and sez: WARE MY SUFF on the email.
Administrator gets a message, as well as Courier and Warehouse. Warehouse is in the shiz, because that was the last of it. So Warehouse has to pay Administrator, whose autorefundbot fires it back to Customer.
Then Administrator messages Customer and says, Equal value replacement from in stock on the Ads, place the order, and it will be out to you shortly.
Administrator also gets all query messages. A customer asks, have you got the new thing yet? So Administrator sends out to Buyers, the one or more suppliers. One comes back saying YEZ, I order Courier right away. Courier picks up, drops, Warehouse picks, packs, orders Courier 2, drops, Courier 2 takes to Customer Drop du jour, skedaddles home, presses Send on the pic, Customer goes get the Goods, goes home and +2 and makes a glowing comment "The Operation has the Stuff, tyvm".
And the insurance ticks up, the Buyer gets paid, the Warehouse gets his packing and dispatch fee, Courier 1 and 2 get their couriering fee, Administrator, she gets her administrator cut and the Geek gets the smallest bit, because he makes bank sending out Access Keys and Laptops, or if somebody breaks their Geeky toys, they Courier it to him and he gets bank for being the man that keeps the machinery purring.
Names
The last feature to add to the system is a name system. Names are rented from the network, and allocate to those who run the nameservers. The Administrator and The Geek both hold copies. They are the organisational and infrastructural nodes in the Operation.
The names blocks, which will generally be cached on all nodes, can also be queried, at relay data price, Name owners can arrange transfers if they wish to, so the process of succession as holders of roles buy in and sell out. The market will operate from specialist nodes who will be linked together, and will register and log offers and acceptances, and certify agreed payment prices. The new owner will then have the new key, in a key escrow deal, and once the key becomes the new owner's, they then have the power, which is the key to the reason for having names, apart from brands. And yes, a field will exist in the name record, referring to a distributed file image, and next time a Customer logs into the site, things have changed. But they were on the channel, receiving the emails, and they can revoke their membership and choose another Operation.
Membership
Whoever owns the name, the Administrator, namely, will then also be able to invite, or accept requests to their address, to negotiate a membership fee and period to expiry.
The name owner can then decide on membership rules. Requests can come in by emails, and the email viewer will show their profile and public record of positive an negative feedback, both inbound and outbound. If they are satisfied, they click the add button, and the member joins the chatroom and the group broadcast chat messages.
Final Notes
This is a rough sketch, full of frivolity and probably more than a few errors in both logic, structure, spelling and grammar.
However, I think I have elaborated enough of mechanisms to go on with, let's call this the first draft
Lastly, outside of routing and file storage and associated smart contracts, there can obviously be extensions. A site like this could run a Wheat wholesale exchange. Or an artist, add a pimped up picture display and wishlist function.
Furthermore, there is elements in the design that are somewhat centralised. I have not discussed things like a group vote to oust a Buyer, Warehouse, Courier, except in the case of their Doom, and follow-up Toasting.
Let's call this spec Alpha. Maybe someone will see the value in it, despite my choosing to focus on its application as an alleged drug dealing and maybe production system. I did that partly for the cool factor and because it's an example with certain humour, and the opportunity to discuss the neutralisation of adversaries.
Loki BM-2cVM3CXsiTSyhvU34w7vfJyKs2wQEHNAHE
PS: if you want to help, but have no ideas how to, at least hit that promote button, and put an SBD on this to raise its profile. The more people who see it, the greater the chance I can find the development team, organise our infrastructure, build this thing, roll out the testnet, get it bugfixed, and then go live with a beta, and create the ultimate weapon of mass creation ever conceived.
And, my gratitude to all who have upvoted, I am trawling through my feed of followers, upvoting what I like, and promoting this when relevant to try and continue to build momentum towards finding the resources required to bring this baby out into the world, where she will smack down every vile, scum sucking, lying piece of shit that walks the earth. While getting rich at the same time, me, you, and everyone who helps refine, support, build, perfect, and distribute it as far and wide as possible.
Hi @l0k1,
You have been chosen as a featured author by the @robinhoodwhale initiative.
Learn more about the Robinhood Whale here!
Keep on Steeming more amazing posts!
Goodluck!
~RHW~
So, I scored 112something votes on this. I pocketed about 9 bux. I am replying directly to you, though not directly addressing you. What do you think I need to do to monetise this, but more importantly, build the support to get developers to actually take this idea seriously?
I know that the shareholding part of my design is very vague. It is also critical. And I wandered off into playful narrative in describing things.
So the ideas I have for how to push this forward have two prongs:
More narrative examples of this design in motion. War zones, economic collapse, ordinary everyday business. Replacing Uber and AirBnB, maybe it didn't help that I focused so much on the much maligned deep web drug market, and an application taking that to the street - But that was what inspired it. Maybe I should write a disjointed series of tales showing why this system needs to be built. Showing the benefits.
Technical. This is an aspect I am a bit lost with. I am a dreamer, and my ideas tend to be a long way from solid in their initial inception and expression. But maybe I can, with 1., inspire more mathematically minded folk to show how this creates a technical infrastructure that can become the WHOLE economy.
For me, Steem is like the giant, global version, without anonymity and localisation. It certainly has been a roaring success. If I can, with the help of others, bind Steem into this system, and whatever other adjuncts are required, maybe this could be amazing. Like the issue of private versus public shares. Right now, Steem has only public shares. If it had a system to create private, protected share pools, this could form that central core I see as being vital.
Well, anyway, thanks again for including me in your database. And thanks to everyone who has upvoted and commented. It's such a large number of people, that I'm sure that this is off to a running start.
Nice concept, and I look forward to seeing this move forward.
This is something straight out of "Little Brother" and that second book, that I've just started reading.
The bit I enjoyed writing the most was the stuff about the freelance spooks being hired to cheaply and efficiently remove the government spook. Everything I describe could be brought to beta phase in 6 months. I think the corporate pooling /shares is probably the part that is the least precisely described. But Steem does this.
Haha, well it is probably the best abstraction of a Temporary Autonomous Zone I've ever seen. Like a virtual TAZ. 8) I'd love to beta-test. Bad at writing code more complicated than sh/sed/awk, but good at finding exceptions, and then bugrepping the hell out of them, thats me.
You can be an Agora Geek then, in some capacity. So what is the way to form a nexus of developers? I know I can build some parts of this. Much of it can steal wholesale from the various existing systems. I think I need another system architect or two to elaborate more detail into the protocols.
It would be more like a cyberspace realisation of TAZ. And by the way, that was the book that I think first really formed my idea of how to destroy the system of control. To become Permanent, it has to be persistent, and invisible.
And promote it anywhere you see relevant discussions. Let's make this thing happen. This is better than OpenBazaar. This could swallow up Steem and Maidsafe, hell, in all seriousness. This is the Decentralised Internet. In embryonic form.
Yup, that is what I am talking about, abstracted to the cyberspace. I think IPFS does some of what you are looking for as a http replacement implementation.
@xanoxt But nobody brings this all together in a unified whole, solves the problem of incentivising network provider nodes, creates a public/private shared filesystem, enables plugins that can integrate into other systems, like Steem, and a counterintelligence network of mercenary, well paid counterintel ops who can make money disrupting the corrupting power of manipulation systems of the various big players with a distributed, headless cluster of common interest groups working and collaborating towards common goals without forcing anyone to agree to a single agenda. And get paid, all the way along.
I have decided to abandon #steemportal in favour of this. This covers such a broad interest base, enables powerful systems where we could even obsolete stuff like Wikileaks, we could enable communities in places where oppressors run riot, giving them access to other resources and even pay operators to focus on counter-disruption operations to defend local interests, build their own economies, linked to every other such group in the world. Unity, without unity. Communism without the dictatorship of the proletariat. A Permanent Autonomous Zone that can intelligently mutate, relocate, refocus, and adapt faster than They possibly can, with all their nepotistic, divided competing attempts towards World Domination.
What an awesome paper!!!!!!
How does this work? I tried to google, and registered for a bitmessage chan, but it works by email.
Is there an actual channel to join? Got a link?
Thanks.
You just need to install bitmessage. Click on the "Chans" tab and bottom right, 'Add Chan' and paste that address.
Bitmessage is very much in need of more work developing it. It really is a replacement protocol for email. A Chan is like a mailing list.
Why not break this down into smaller chunks people will stop and read. On my Steemit College level education course, I say 5 or a maximum of 6 paragraphs only one or two sentences long.
Small paragraphs and fast informative punchy words help people stop and invest their spare time. Remember this message is important to you, your job is to try and connect with others. If it is longer than 99 words people most likely will not bother . . .
: )
it's a white paper. well, draft. not targeted at making votes but finding coders, architects, collaborators. you need to understand the design and why it is how it is to know what it's point is. business without easy espionage vulnerability, local market enabler, especially in a hostile environment, war, oppression
and if you are volunteering to edit.. be my guest. join the bitmessage group...
By the way, by vote count, this is my most up voted post so far. I hope robinhoodwhale's promotion sees me get enough money to juice up my working environment so I can do a bit more polished work, and gather a dev group to start hashing out the details of a development roadmap.