The purpose of this blog was to flesh out the initial plan for the freetheinter.net project.

Now that plan has taken shape, so now I’ll just use this for personal blogging.

You can find some random musings in misc.

We have to reduce the influence of centralized entitites in order to make decisions on our own: use systems that allow us to apply greater scrutiny to information distribute information in a way that prohibitively increases the cost for a centralized entity to manipulate the narrative rely on those we know and trust, rather than third parties with dubious motivations Corporations and governments will never build systems like this for us, so we have to build them ourselves. Read More…

There exists some ideal personal social infrastructure, so let’s build it! The first step is always the same. Even if we don’t know how to build it yet, we have to just get started.

Read More…
In order to be categorically more useful than commercial offerings, an open and free system must take advantage of functionality that is difficult or impossible in revenue-bound services. Here’s a rough list of some advantages we can leverage in open systems: Attack surface Centralized systems are centralized attack points. Decentralized architectures can present a confoundingly elusive and vast attack surface that is an impractical target for any entity. User control Users of for-profit systems are not allowed full control of the interface they use, or users would be able to make changes incompatible with profitability. Read More…
We will have to take a nuanced approach that acknowledges these challenges. If we cannot eliminate them, we must ensure the process is tolerant of their existence. Solution consensus Consensus is extremely difficult to attain in a large group. Misinformation and idea sabotage are commonplace. We will be fighting an uphill battle at first, because we currently lack the tools that we will create in order to help solve the problem of unstable consensus. Read More…

Freetheinter.net is an experimental dynamic infrastructure system that allows anyone to host their own network services using the devices and connections they already have. It was created in recognition of the severe need for individuals to take control of their own social interactions and information online.

Instead of individuals existing as tiny components of massive centralized services, individuals are elevated to the centerpiece of their online presence. Instead of services accumulating users, users accumulate services.

Once the basic design of automated self-hosted infrastructure has been completed, the first application is to implement a simple text-based social sharing system. This will serve as a technology proof-of-concept and realize the constraints of these systems.

Centrally controlled implementations of social networks are severaly handicapped by the very nature of being closed and controlled by a self-interested entity. Because control of information grants ultimate control of society, replacing social networks with user controlled systems is the only way for individuals to meaningfully control society.

Read More…
The bitcoin protocol is trustless. It was designed to allow people to exchange and store value without trusting any centralized entity. This is a refreshing departure from conventional financial systems where a mutual trust in banks, governments, and counterfeit-proof printing is required to facilitate the transfer of value. Bitcoin is nice because we don’t want to have to trust any third party in order to confidently transfer value between only two. Read More…
A number of companies sell consumer products under the personal cloud moniker. They’re implemented using servers and software maintained by the companies themselves, architecturally similar to nearly every other service on the internet: The user registers an account with the company, and then logs in to access the features of the service. The personal cloud could be much more. Where this leads, there can be no ads, no user tracking, no data harvesting, no warrantless surveillance, and no staggering data breaches. Read More…
Menu