35
Internet of Living Things: Decentralized Identities and Delegated Agency & Authorities: June 3, 2015 Dr. John Henry Clippinger ID3/MIT © John Clippinger

John Clippinger - Internet of Living Things

  • Upload
    masstlc

  • View
    137

  • Download
    1

Embed Size (px)

Citation preview

Internet of Living Things:Decentralized Identities

and Delegated Agency & Authorities:

June 3, 2015

Dr. John Henry ClippingerID3/MIT

© John Clippinger

Surreal New Data Ecologies

New Immersive Data EcologyData are not about but for:

• seeing - recognizing - doing

• influencing - learning - improving

• controlling - feedback -correction

1. We are inside looking out - not outside looking in

2. Data are like water - essential nutrient of Digital Ecosystem

Observers and actors are now digital devices

Devices like PeopleNeed to be:

• authenticated

• verified,

• permitted

• governed

Some devices will become autonomous bots - that learn, explore, access, control, create

1. https://www.youtube.com/watch?v=uj0v1BgzUdc

internet device immersion

1. sensors – smart dust

2. controllers

3. new infrastructure

4. new data commons

5. autonomous bots & cars

6

BIG DATA & THE NEW POWER DYNAMICS: FEED THE MACHINE

1.ACCURATE PERSONAL PREDICTION Identify on actual identities (biological) and attributes - income, gender, preferences. Knows you better than you know yourself

2.MACHINE LEARNING- gets better and better - smarter & smarter - “lives off of and grows in predictive powers with data

Digital Assets Are Source of Sovereignty & Power

Who Controls My Assets?

• Vaults are digital

• Transfer is digital

• Control over military Assets

Whom can I Trust ?

Drones With License ID BeaconsHow do you

Control autonomous

Devices

That Express

Your agency

And their

Own?

Digital Assets & Currencies

New Immersive Data Asset Ecologies for:

1. Capturing,

2. Discovering

3. Certifying

4. Securing

5. Securitizing

6. Syndicating

Autonomous exchange of digital assets

NEW CLASS OF ASSET:“NOUMENAL” – QUANTUM ?

1. BITCOIN IS A DEMAND BACKED ASSET THAT CAN BE TRADED AS ANY OTHER PHYSICAL ASSET

2. Non material asset whose value is determined by the extent it is in demand

3. Other assets – could be valued in terms of their level of use or entropy - Dispersion

LEDGER X – REGULATED BY THE U.S.COMMODITIES TRADING COMMISSION

the next generation of “phones”Sentient Devices - “spy phone” vs. “my

phone”

55

It sees you and your “friends”, listens to you, monitors your

health, Reads Your Emotions

movements, interactions, activities, and tirelessly

learns to know you better -for yourself and others:

Google NowGoogle GlassesAmazon Phone

PrimeSenseQualcomm Chips

EmotientAffectiva

Internet of Watching Things

Gateways in the home?

Who is Watching Whom?

Who controls the Data?

Who Monetizes the Data?

What are the Terms of Service Agreements?

12

Warnings About Augmentation 50 Years Ago:

1. “The more the data banks record about each one of us, the less we exist.”

2. “We shape our tools and afterwards our tools shape us.”

3. “Augmentation leads to amputation”

Marshall McLuhan

What might happen when you “loose your brain” to Google’s Brain & Google Now -

“augmentation = amputation”

mbies ??

???

Many Expressions of Selves

1. Totemic

2. Emanations - Spirits

3. Gods

4. Avatars

5. Personas - Credentials

Traditional Solutions to Identity & Authority : Hierarchical & Static

Hindu Caste System

Medieval Chain of Being

Patriarchal Lineages

Traditional Artifacts of Identities & Access

GLOBAL REGULATION ATTEMPTING TO ADAPT

• user control over personal data

• consumer data bill of rights

• mobility of data

• privacy by design

• transparency and accountability

• self-determination

Who Are the New Authorities?

Who now tells you who you are?

1. Facebook

2. Google

3. Governments

4. Banks

Data Regulations Based UponObsolete Mindsets & Practices

1.Do not collect = do not see

2.Opt out = digital pariah

3.Notification and consent = denial of service attack

4.Do not track = do not know-learn

5.Do not share = digital ghetto

6.Harms and Duties come with the use of the specific use of the data and chain of custody

Locus of Control of Identity

A. Individual –Atomic Libertarian “Free” Fixed -Person Identity – transactional –

B. Group - Collective Fixed - Imposed – Clan – State - Religion -Corporate

C. Conjoint Identities Mutually Constructed & Evolving - Relational

A BC

The Atomic Self-Made Man

1. Nature – Social Darwinism

2. Private – Property rights

3. Competition - Transaction

4. Freedom & Free Markets

5. Winner Takes All

6. Individual Agency

7. Personal Code of Honor

8. Closed Loop of Self

Collective – Social Person

1. Nurture – Social Design – Collective Identity & Purpose

2. Group Over Individual

3. Top Down “Rational” Planning - Rule

4. Variation = Discord

5. Compliance – Conformity

6. Closed Loop of Group

Mutually Defining Joint Identities

1. Nurture & Nature

2. Artisan – Relational- Sharing - Economy

3. Participation – Sharing

4. Embedded – Not Separate

5. Decentralized – Emergent - self-ordering – Peer to Peer Economy

6. Open loop

7. Open Source

Identities & Norms for Devices

Security

Safety

Resilience

Recoverability

Interoperability

Governance

Trust

Transparency

Accountability

Digital Common Law

“and the rule adapts itself to the new reasons which have been found for it, and enters into a new career. The old form receives a new content, and in time even this form modifies itself to fit the meaning which it has received

Oliver Wendell Holmes Jr., The Common Law - Early Forms of Liability

Who or What Has the Authority to Govern Identities ?

Does it have to be a who?

Unresolved Governance Dilemmas

Who Guards the Guards ?

1. Can there be a method of oversight that itself is not subject to collusion and corruption?

2. Can there be incorruptible self -correcting and self- attesting oversight?

Decentralized Autonomous Authorities (DAA)

1. Etherium

2. Factom

3. Eris

4. Counterparty

5. Smart Contracts

Windhover Principles1. Self-Sovereign Identity and Control of Personal Data

Individuals and groups should have control of their digital personal identities and personal data

2. Transparent Enforcement and Effective Lite Governance

Enhancing / improving personal privacy while allowing for effective governance and accommodation of legitimate auditing and enforcement needs

3. Insuring Trust and Privacy

An effective identity system continuously furthers trust, security, accountability and privacy

4. Open Source Collaboration

An inclusive open source methodology to build systems that embody these Principles

30

Decentralized Identitieson The Blockchain

1. New ID Cards with multiple ways of asserting and approving identities and credentials

2. Who asserts and who absorbs or underwrites the risk

FROM HIERARCHY AND STATIC TO

DECENTRALIZED AND DYNAMIC

PASSCARD

SHOCARD

MYCARD

Rule of law & Self-Executing Contracts

Can there be rule of law when Justice is blind and is trustless and autonomous ?

Is Justice – Trustless?

Autonomous Governance Technologies ?

• Governance without governments

• Authorization without authorities

• Regulation without regulators

• Adjudication and sanctions without lawyers and judges

• Polis without politicians

• Auditing without auditors

Legal Agency & Self Hood for Devicesand Digital Organizations

1. How much of our agency should we delegate to autonomous devices – authorities?

2. How do we revoke the powers and agency of a device?

3. When will it be beyond us to know?

4. Must There Be a “kill switch” ?

5. Who – What - Can Pull the Switch - When? “Just what do you think you're doing, Dave? Dave, .”.