The purpose of this blog is to get some support for the project.

Its goal is to replace our profit-focused information infrastructure with systems designed to empower individuals.

If you’re looking for a good place to start, check out the overview.

Upcoming topics for January 2022:

  • user experience description
  • security ideas
  • define “goal oriented”
  • discuss consensus


  • focus posts (partition personal and fti)
  • fti posts should feature “problem: solution” relationship for focus

Post ideas:

  • Abuse of Authority: call out corrupt power structures that necessitate fti
    • abuse occurs as a result of misplaced trust
    • remove the trust to stop the abuse
  • Hosting is hard: how self-hosted infrastructure can work
  • Consensus
    • why we don’t have it
    • why we need it
    • how to get it
Part 1 of 3 of the plan. Objectives (key results as bulleted list) attract some attention explain the need for personal social infrastructure get indexed some organic traffic one mention in social media one inbound link define areas of need define onboarding process decide on project organization create social meeting place describe the most ideal personal social infrastructure decide on software approach launch with powerful CTA and onboarding Ideal Personal Social Infrastructure The main idea is just to enable people to safely socialize over the internet with the people they know in real life. Read More…

There exists some ideal personal social infrastructure, so let’s build it! The first step is always the same. Even if we don’t know how to build it yet, we have to just get started.

All of the features implemented as part of this project have the potential to benefit all people. It’s my hope that enough people see value in it to donate toward its creation. If you are such a person, please donate!

Read More…
In order to be categorically more useful than commercial offerings, an open and free system must take advantage of functionality that is difficult or impossible in revenue-bound services. Here’s a rough list of some advantages we can leverage in open systems: Attack surface - Centralized systems are centralized attack points. Decentralized architectures can present a confoundingly elusive and vast attack surface that is an impractical target for any entity. User control - Users of for-profit systems are not allowed full control of the interface they use, or users would be able to make changes incompatible with profitability. Read More…
We will have to take a nuanced approach that acknowledges these challenges. If we cannot eliminate them, we must ensure the process is tolerant of their existence. Solution consensus Consensus is extremely difficult to attain in a large group. Misinformation and idea sabotage are commonplace. We will be fighting an uphill battle at first, because we currently lack the tools that we will create in order to help solve the problem of unstable consensus. Read More…

To “free the internet” is to bring freedom to all people that use the internet.

Read More…
The bitcoin protocol is trustless. It was designed to allow people to exchange and store value without trusting any centralized entity. This is a refreshing departure from conventional financial systems where a mutual trust in banks, governments, and counterfeit-proof printing is required to facilitate the transfer of value. Bitcoin is nice because we don’t want to have to trust any third party in order to confidently transfer value between only two. Read More…
A number of companies sell consumer products under the personal cloud moniker. They’re implemented using servers and software maintained by the companies themselves, architecturally similar to nearly every other service on the internet: The user registers an account with the company, and then logs in to access the features of the service. The personal cloud could be much more. Where this leads, there can be no ads, no user tracking, no data harvesting, and no warrantless surveillance, and no staggering data breaches. Read More…