CVS update: openprivacy/htdocs/notes

From: cvs@openprivacy.org
Date: Mon Feb 26 2001 - 18:52:49 PST

  • Next message: cvs@openprivacy.org: "CVS update: openprivacy/htdocs/notes"

    Date: Monday February 26, 19101 @ 18:52
    Author: fen
    CVSWEB Options: -------------------

    Main CVSWeb: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi

    View this module: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi/openprivacy/htdocs/notes

    -----------------------------------

    Update of /usr/local/cvs/public/openprivacy/htdocs/notes
    In directory giga:/home/fen/projects/openprivacy/htdocs/notes

    Modified Files:
            whitepaper.shtml
    Log Message:
    re-ordered for maximum impact (tx, elaine!)

    *****************************************************************
    File: openprivacy/htdocs/notes/whitepaper.shtml

    CVSWEB Options: -------------------

    CVSWeb: Annotate this file: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi/openprivacy/htdocs/notes/whitepaper.shtml?annotate=1.18

    CVSWeb: View this file: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi/openprivacy/htdocs/notes/whitepaper.shtml?rev=1.18&content-type=text/x-cvsweb-markup

    CVSWeb: Diff to previous version: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi/openprivacy/htdocs/notes/whitepaper.shtml.diff?r1=1.18&r2=1.17

    -----------------------------------

    Index: openprivacy/htdocs/notes/whitepaper.shtml
    diff -u openprivacy/htdocs/notes/whitepaper.shtml:1.17 openprivacy/htdocs/notes/whitepaper.shtml:1.18
    --- openprivacy/htdocs/notes/whitepaper.shtml:1.17 Mon Feb 26 18:17:40 2001
    +++ openprivacy/htdocs/notes/whitepaper.shtml Mon Feb 26 18:52:49 2001
    @@ -9,7 +9,7 @@
       </head>
       <body bgcolor="#ffffff">
     
    - <!-- $Id: whitepaper.shtml,v 1.17 2001/02/27 02:17:40 fen Exp $ -->
    + <!-- $Id: whitepaper.shtml,v 1.18 2001/02/27 02:52:49 fen Exp $ -->
         
         <h1>OpenPrivacy - Building a Better Internet</h1>
     
    @@ -47,8 +47,26 @@
             owner of the profile maintains her anonymity.
           </p>
         </blockquote>
    - <h2><a name="overview">Background</a></h2>
    + <h2><a name="platform">The OpenPrivacy Platform</a></h2>
         <blockquote>
    + <h3>Philosophy</h3>
    + <p>
    + While we provide a system that securely protects one's privacy, we
    + are focusing our efforts on creating an <i>open</i> system. By
    + "open" we mean much more than merely being Open Source with open,
    + published APIs. We are creating a mechanism for communication and
    + interaction that provides free and open access to all.
    + </p>
    + <p>
    + In order to be able to freely search for and collect, read, write,
    + publish and distribute information in a highly networked society
    + without fear of reprisal, there must be a mechanism that can
    + dissociate a user from her actions. It is our intention and firm
    + belief that pseudonymous entities, combined with our concepts of
    + reputation and their intrinsic value, will form the cornerstone of
    + a powerful and unlimited communications mechanism that allows us to
    + make better informed, useful and profitable decisions.
    + </p>
           <h3>Overview</h3>
           <p>
             What you do tells a lot about who you are. For example, where you
    @@ -106,45 +124,137 @@
             avail themselves of targeted, high-quality profile information with
             the full cooperation and confidence of a pseudonymous user.
           </p>
    - <h3>Philosophy</h3>
    + <h3>Reputation Calculation Engine</h3>
    + <h3>Reference Applications</h3>
    + <blockquote>
    + <h4>JetsPeek</h4>
    + <h4>OpenPrivacy-enabled Communities (e.g. Slashdot and Advogato)</h4>
    + </blockquote>
    + <h3>Security, Trust, Verifiability</h3>
    + <h3>Attack Resistance</h3>
           <p>
    - While we provide a system that securely protects one's privacy, we
    - are focusing our efforts on creating an <i>open</i> system. By
    - "open", we mean much more than merely being Open Source with open,
    - published APIs. We are creating a mechainsm for communications and
    - interaction that provides free and open access to all.
    + <ul>
    + <li><b>Denial of service (DOS):</b>
    + </li>
    + <li><b>Spoofing:</b>
    + </li>
    + <li><b>Replay:</b>
    + </li>
    + <li><b>Flooding:</b>
    + </li>
    + <li><b>Shills/Slander/False claims:</b>
    + </li>
    + </ul>
    + </p>
    + </blockquote>
    + <h2><a name="economy">OpenPrivacy Enhances The New Internet Economy</a></h2>
    + <blockquote>
    + <h3>Anonymity</h3>
    + <p>
    + Within any society, anonymity has certain usefulness. Freedom from
    + observation and monitoring of one's physical location, purchases,
    + reading and (e.g.) movie viewing preferences and history are in
    + general no one else's business. There is a reasonable expectation
    + of privacy through confidentiality contracts made between a person
    + and their school, employer, financial institutions and health
    + providers. And in a less common but no less important role, the
    + cloak of anonymity can be well used for purposes of whistle-blowing
    + - an employee's ability to shed light on their employer's
    + questionable business or social practices - without fear of
    + reprisal from one's superiors.
           </p>
           <p>
    - In order to be able to freely search for and collect, read, write,
    - publish and distribute information in a highly networked society
    - without fear of reprisal, there must be a mechanism that can
    - dissociate a user from her actions. It is our intention and firm
    - belief that pseudonymous entities combined with our concepts of
    - reputation and ins intrinsic value will form the cornerstone for a
    - powerful and unlimited communications mechanism that will allow us
    - all to make better informed and more profitable - in every sense of
    - the word - decisions.
    + While these characteristics carry through to the online world,
    + there is a growing desire for personalized services that anonymity
    + cannot satisfy. People want personalized services, and portals such
    + as my.Yahoo.com, community sites ranging from Slashdot to iGolf, and
    + e-commerce sites such as Amazon and eBay all collect information on
    + their member users and use this information to provide welcome
    + services. Many of these sites now display a <i>privacy policy</i>
    + intended to describe the way in which collected information will be
    + used - and these often profess that they store no personally
    + identifiable information - but in any case, it is out of the user's
    + hands and control.
    + </p>
    + <h3>Reputations and Trust</h3>
    + <p>
    + Anonymity has very real limitations, both in the social and business
    + worlds. We find <i>trust</i> is built on the security of knowing
    + and building relationships with our acquaintances and places of
    + business over time. On the flip side, companies want to be able to
    + provide personalized services that enhance their customer's
    + experience and further, to understand their wants and capabilities
    + so that they can be marketed to effectively.
    + </p>
    + <p>
    + Trust is a key point, and when many people trust some entity it
    + gains a positive reputation. (Note: negative reputations are
    + possible, too.)
    + </p>
    + <h3>Publishing with Pseudonymity</h3>
    + <p>
    +
    + </p>
    + <h3>The Value of Information [Quality]</h3>
    + <p>
    +
    + </p>
    + <h3>An Agoric, Reputation-based Marketplace [Capitalism]</h3>
    + <p>
    +
    + </p>
    + <h3>Efficiency Via Chaos and Bias</h3>
    + <p>
    + Chaos is an essential element for systems to evolve, for without
    + it the unexpected changes and mutations that lead to new, often
    + revolutionary processes will not have a chance to occur. The very
    + fact that people are all different - not only from each other but
    + even with one's self from moment to moment - has a valuable
    + ramification: that we all have different opinions and bias. This
    + points to a major failing of search engines: that each person who
    + enters the same search X probably has a slightly different mind
    + set of what they would like to see as results.
    + </p>
    + <p>
    + OpenPrivacy thrives in this multitude of opinion, this diversity
    + of thought, for though we are all different, there are certain
    + areas that two very different people may align with. For example,
    + suppose person A reads the New York Times every day and finds an
    + average of four articles that A considers tops - well worth the
    + cost of the paper and her time to find them. Now consider that
    + there probably exists a person B who finds the same four articles
    + to be indispensable. The safe, secure, pseudonymous publishing
    + environment of OpenPrivacy, along with the agoric marketplace of a
    + million infomediaries looking for valuable concordances, make it
    + possible for these two people to virtually meet. Further, A may
    + strike a deal with B to provide her with the editorial filtering
    + process, saving A time and aiding B at least in reputation if not
    + also financially.
           </p>
    + </blockquote>
    + <h2><a name="overview">Background</a></h2>
    + <blockquote>
           <h3>What a Profile Is (and How Profile Data Is Used)</h3>
           <p>
             When we talk of a person's <i>profile</i> we are referring to a
             store of information that may include one's name, age, gender, phone
             number, postal or electronic mail address, purchase history, web
    - surfing habits, subscriptions, or any of a multitude of other
    - personal preferences, traits and abilities. Often, a persistent
    - cookie is deposited by a company's web site on one's computer or
    - other device so that the company can track the individual's behavior
    - as they browse the company's site. More advanced systems, such as
    - those used by DoubleClick, can track a person from site to site.
    - The capability to accumulate and cross-reference this data supports
    - the multi-billion dollar industry of direct marketing.
    + surfing habits, subscriptions or any of a multitude of personal
    + preferences, traits and abilities. Often, a persistent cookie is
    + deposited by a company's web site on one's computer or other
    + personal information device so that the company can track the
    + individual's behavior as they browse the company's site. More
    + advanced systems, such as those used by DoubleClick, can track a
    + person from site to site. The capability to accumulate and
    + cross-reference this data is what supports the multi-billion dollar
    + direct marketing industry.
           </p>
           <h3>Data Mining</h3>
           <p>
             Technology enables the collection and storage of vast quantities of
             data. Finding, summarizing, and creating models of the patterns,
             trends and projections from this data is what <i>data mining</i> is
    - all about. It is a marriage of statistices, machine learning,
    + all about. It is a marriage of statistics, machine learning,
             information theory and computing that has formed a mathematical
             base for a science that has increasingly powerful tools at its
             disposal. In particular, direct marketers have created data mining
    @@ -316,92 +426,7 @@
             information available for data mining and direct marketing purposes.
           </p>
         </blockquote>
    - <h2><a name="economy">The New Internet Economy</a></h2>
    - <blockquote>
    - <h3>Anonymity</h3>
    - <p>
    - Within any society, anonymity has certain usefulness. Freedom from
    - observation and monitoring of one's physical location, purchases,
    - reading and (e.g.) movie viewing preferences and history are in
    - general no one else's business. There is a reasonable expectation
    - of privacy through confidentiality contracts made between a person
    - and their school, employer, financial institutions and health
    - providers. And in a less common but no less important role, the
    - cloak of anonymity can be well used for purposes of whistle-blowing
    - - an employee's ability to shed light on their employer's
    - questionable business or social practices - without fear of
    - reprisal from one's superiors.
    - </p>
    - <p>
    - While these characteristics carry through to the online world,
    - there is a growing desire for personalized services that anonymity
    - cannot satisfy. People want personalized services, and portals such
    - as my.Yahoo.com, community sites ranging from Slashdot to iGolf, and
    - e-commerce sites such as Amazon and eBay all collect information on
    - their member users and use this information to provide welcome
    - services. Many of these sites now display a <i>privacy policy</i>
    - intended to describe the way in which collected information will be
    - used - and these often profess that they store no personally
    - identifiable information - but in any case, it is out of the user's
    - hands and control.
    - </p>
    - <h3>Reputations and Trust</h3>
    - <p>
    - Anonymity has very real limitations, both in the social and business
    - worlds. We find <i>trust</i> is built on the security of knowing
    - and building relationships with our acquaintances and places of
    - business over time. On the flip side, companies want to be able to
    - provide personalized services that enhance their customer's
    - experience and further, to understand their wants and capabilities
    - so that they can be marketed to effectively.
    - </p>
    - <p>
    - Trust is a key point, and when many people trust some entity it
    - gains a positive reputation. (Note: negative reputations are
    - possible, too.)
    - </p>
    - <h3>Publishing with Pseudonymity</h3>
    - <p>
    -
    - </p>
    - <h3>The Value of Information [Quality]</h3>
    - <p>
    -
    - </p>
    - <h3>An Agoric, Reputation-based Marketplace [Capitalism]</h3>
    - <p>
    -
    - </p>
    - <h3>Efficiency Via Chaos and Bias</h3>
    - <p>
    - Chaos is an essential element for systems to evolve, for without
    - it the unexpected changes and mutations that lead to new, often
    - revolutionary processes will not have a chance to occur. The very
    - fact that people are all different - not only from each other but
    - even with one's self from moment to moment - has a valuable
    - ramification: that we all have different opinions and bias. This
    - points to a major failing of search engines: that each person who
    - enters the same search X probably has a slightly different mind
    - set of what they would like to see as results.
    - </p>
    - <p>
    - OpenPrivacy thrives in this multitude of opinion, this diversity
    - of thought, for though we are all different, there are certain
    - areas that two very different people may align with. For example,
    - suppose person A reads the New York Times every day and finds an
    - average of four articles that A considers tops - well worth the
    - cost of the paper and her time to find them. Now consider that
    - there probably exists a person B who finds the same four articles
    - to be indispensable. The safe, secure, pseudonymous publishing
    - environment of OpenPrivacy, along with the agoric marketplace of a
    - million infomediaries looking for valuable concordances, make it
    - possible for these two people to virtually meet. Further, A may
    - strike a deal with B to provide her with the editorial filtering
    - process, saving A time and aiding B at least in reputation if not
    - also financially.
    - </p>
    - </blockquote>
    - <h2><a name="platform">The OpenPrivacy Platform</a></h2>
    + <h2>References</h2>
         <blockquote>
           <h3>Definitions</h3>
           <blockquote>
    @@ -460,26 +485,6 @@
               </dd>
             </dl>
           </blockquote>
    - <h3>Reputation Calculation Engine</h3>
    - <h3>Security, Trust, Verifiability</h3>
    - <h3>Attack Resistance</h3>
    - <p>
    - <ul>
    - <li><b>Denial of service (DOS):</b>
    - </li>
    - <li><b>Spoofing:</b>
    - </li>
    - <li><b>Replay:</b>
    - </li>
    - <li><b>Flooding:</b>
    - </li>
    - <li><b>Shills/Slander/False claims:</b>
    - </li>
    - </ul>
    - </p>
    - </blockquote>
    - <h2>References</h2>
    - <blockquote>
           <h3>Bibliography</h3>
           <dl>
             <dt><a name="anon">[anon]</a> The Anonymizer



    This archive was generated by hypermail 2b30 : Mon Feb 26 2001 - 18:52:50 PST