Free Republic
Browse · Search
Topics · Post Article

Skip to comments.

EXCLUSIVE: 'Life after Google: 10 Laws of the Cryptocosm'
Townhall ^ | Jul 17, 2018 | George Gilder

Posted on 10/16/2018 6:46:22 PM PDT by george76

Google’s security foibles, its “aggregate and advertise” model, its avoidance of price signals, its silos of customer data, and its visions of machine mind are unlikely to survive the root-and-branch revolution of distributed peer-to-peer technology, which I call the “cryptocosm.”

Today, all around us, scores of thousands of engineers and entrepreneurs are contriving a new system of the world that transcends the limits and illusions of the Google realm.

In the Google era, the prime rule of the Internet is “Communications first.” That means everything is free to be copied, moved, and mutated. While most of us welcome “free” on the understanding that it means “no charge,” what we really want is to get what we ordered rather than what the authority chooses to provide. In practice, “free” means insecure, amorphous, unmoored, and changeable from the top. This communications-first principle served us well for many years.

The Internet is a giant asynchronous replicator that communicates by copying. Regulating all property rights in the information economy are the copy-master kings, chiefly at Google.

In this system, security is a function of the network, applied from the top, rather than a property of the device and its owner. So everything rises to the top, the Googleplex, which achieves its speed and efficiency by treating its users as if they were making random choices. That’s the essence of the mathematical model behind their search engine. You are a random function of Google.

But you are not random; you are a unique genetic entity that can- not be factored back into an egg and a sperm. You are unbreakably encrypted by biology. These asymmetrical natural codes are the ruling model and metaphor for enduring security. You start by defining not the goal but the ground state. Before you build the function or the structure, you build the foundation. It is the ultimate non-random reality. The ground state is you.

1. Utterly different from Google’s rule of communications first is the law of the Cryptocosm. The first rule is the barn-door law: “Security first.” Security is not a procedure or a mechanism; it is an architecture. Its keys and doors, walls and channels, roofs and windows define property and privacy at the device-level. They determine who can go where and do what. Security cannot be retrofitted, patched, or improvised from above.

For you, security means not some average level of surveillance at the network level but the safety of your own identity, your own device, and your own property. You occupy and control a specific time and space. You cannot be blended or averaged. Just as you are part of a biological ledger, inscribed through time in DNA codes and irreversible by outside power, your properties and transactions compose an immutable ledger. Just as you are bound in time, every entry in the cryptocosmic ledger is timestamped.

2. The second rule of the cryptocosm derives from the first: “Centralization is not safe.” Secure positions are decentralized ones, as human minds and DNA code are decentralized. Darwin’s mistake, and Google’s today, is to imagine that identity is a blend rather than a code—that machines can be a singularity, but human beings are random outcomes.

Centralization tells thieves what digital assets are most valuable and where they are. It solves their most difficult problems. Unless power and information are distributed throughout the system peer to peer, they are vulnerable to manipulation and theft from the blenders at the top.

3. The third rule is “Safety last.”1 Unless the architecture achieves its desired goals, safety and security are irrelevant. Security is a crucial asset of a functional system. Requiring the system to be safe at every step of construction results in a kludge: a machine too complex to use.

4. The fourth rule is “Nothing is free. This rule is fundamental to human dignity and worth. Capitalism requires companies to serve their customers and to accept their proof of work, which is money.

Banishing money, companies devalue their customers.

5. The fifth rule is “Time is the final measure of cost.” Time is what remains scarce when all else becomes abundant: the speed of light and the span of life. The scarcity of time trumps an abundance of money.

6. The sixth rule: “Stable money endows humans with dignity and control.” Stable money reflects the scarcity of time. Without stable money, an economy is governed only by time and power.

7. The seventh rule is the “asymmetry law,” reproducing biological asymmetry. A message coded by a public key can be decrypted only by the private key, but the private key cannot be calculated from the public key. Asymmetric codes that are prohibitively difficult to break but easy to verify give power to the people. By contrast, symmetrical encryption gives power to the owners of the most costly computers.

8. The eighth rule is “Private keys rule.” They are what is secure. They cannot be blended or changed from on top any more than your DNA can be changed or blended from above.

9. The ninth rule is “Private keys are held by individual human beings, not by governments or Google.” Private keys enforce property rights and identities. In a challenge-response interaction, the challenger takes the public key and encrypts a message. The private responder proves identity by decrypting, amending, and returning the message encrypted anew with his private key. This process is a digital signature. By decrypting the new message with a public key, the final recipient is assured that the sender is who he says he is. The document has been digitally signed.

Ownership of private keys distributes power. The owner of a private key (id) can always respond to a challenge by proving ownership of the identity of a public address and the contents of a public ledger. Thus, in response to government claims and charges, the owner of the private key can prove his work and his record. By signing with a private key, the owner can always prove title to an item of property defined by a public key on a digital ledger.

10. The tenth rule is “Behind every private key and its public key is the human interpreter.” A focus on individual human beings makes meaningful security.

How will your experience of the world change when these ten rules define the new system?

Google is hierarchical. Life after Google will be heterarchical. Google is top-down. Life after Google will be bottom-up. Google rules by the insecurity of all the lower layers in the stack. A porous stack enables the money and power to be sucked up to the top. In life after Google, a secure ground state in the individual human being, registered and timestamped in a digital ledger, will prevent this suction of hierarchical power.

Whereas Google now controls your information and uses it free of charge, you will be master of your own information and charge for it freely. Try the Brave Browser of Brendan Eich, formerly of Mozilla and the author of Javascript. It gives you power over your data and enables you to charge for them.

Whereas Google envisages an era of machine dominance through artificial intelligence, you will rule your machines, and they will serve you as intelligent, willing slaves. You will be the “oracle” that programs your life and dictates to your tools.

Whereas Google’s “free world” tries to escape the laws of scarcity and the webs of price, you will live in a world brimming with information on the real costs and most efficient availabilities of what you want and need. The proof of your work will trump the claims of top-down speed and hierarchical power. The crude imperatives of “free” will give way to the calibrated voluntary exchanges of free markets and micropayments.

Whereas the Google world strains you through sieves of diversity and runs you through blenders of conformity, the new world will subsist on the foundational realities of individual uniqueness and choice. Whereas the Google world is stifling entrepreneurs’ access to the public markets through initial public offerings, which are down 90 percent in two decades, the new world will offer an array of new paths to enterprise. From initial coin offerings and token issues to crowd- funded projects, new financial devices are already empowering a new generation of entrepreneurs. The queues of abject “unicorns”—privately held start-ups worth a billion dollars or more—outside the merger and acquisition offices of Google and its rivals will be dispersed, replaced by herds of “gazelles” headed for public markets at last.

Whereas Google attempts to capture your eyeballs with ubiquitous advertisements, you will see advertisements at your own volition, when you want them, and you will be paid for your time and attention. Again, Brave is the leader of this movement.

Money is not a magic wand but a measuring stick, not wealth but a gauge of it. Whereas money in the Google era is fodder for a five- trillion-dollar-a-day currency exchange—that’s seventy-five times the amount of the world’s trade in goods and services—you will command unmediated money that measures value rather than manipulates it. Whereas the Google world is layered with middlemen and trusted third parties, you will deal directly with others around the globe with scant fees or delays.

Emerging is a peer-to-peer swarm of new forms of direct transactions beyond national borders and new forms of Uber and Airbnb beyond corporate gouges. Whereas the Google world confines you to one place and time and life, the new world will open up new dimensions and options of new life and experience where the only judge is the sovereign you.

Does the promise that human dignity will once again take its place on the Internet and that human beings will be masters of the cryptocosm sound too good to be true?

If these principles are enigmatic today, to explain their sources and ultimate success, we must, as Caltech’s Carver Mead tells us, “listen to the technology and find out what it is telling us.”

TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Editorial; News/Current Events
KEYWORDS: blockchain; brave; bravebrowser; brendaneich; capitalism; cryptocosm; eich; georgegilder; gilder; google; javascript; mozilla
Navigation: use the links below to view more comments.
first 1-2021-27 next last

1 posted on 10/16/2018 6:46:22 PM PDT by george76
[ Post Reply | Private Reply | View Replies]

To: george76

Gilder is a genius. Even Oprah does not like him, that is proof.

2 posted on 10/16/2018 6:51:13 PM PDT by Fungi
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

Sounds unrealistic and unworkable to me.

3 posted on 10/16/2018 6:53:26 PM PDT by be-baw (still seeking...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: be-baw

Tried the Brave Browser of Brendan Eich ?

4 posted on 10/16/2018 6:55:40 PM PDT by george76 (Ward Churchill : Fake Indian, Fake Scholarship, and Fake Art)
[ Post Reply | Private Reply | To 3 | View Replies]

To: george76

Reading this now. Lots of good points. And he was right 20 years ago about TV.

5 posted on 10/16/2018 6:56:33 PM PDT by LS ("Castles made of sand, fall in the sea . . . eventually" (Hendrix))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fungi

Saw this guy last night——I had NO idea what he was talking about most of the time——but want to read his book.


6 posted on 10/16/2018 7:01:01 PM PDT by Mears
[ Post Reply | Private Reply | To 2 | View Replies]

To: george76

He’s 78 and still cutting edge.

7 posted on 10/16/2018 7:03:05 PM PDT by ClearCase_guy (The MSM is in the business of creating a fake version of reality for political reasons.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

Good stuff, especially the PKI plus blockchain. Proves ownership and allows end-to-end security without any trusted middleman or authority.

8 posted on 10/16/2018 7:04:46 PM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wattojawa; carriage_hill


9 posted on 10/16/2018 7:09:21 PM PDT by lightman (Obama's legacy in 13 letters: BLM, ISIS, & ANTIFA. New axis of evil.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

Using it daily as my main browser.

10 posted on 10/16/2018 7:17:38 PM PDT by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 4 | View Replies]

To: george76

I hear sliding barn doors are in.. That, along with a pea and shells security approach,, might be considered a risky scheme by some visionaries.. like Al Gore or Barry Obammy.

Nice to know GooGle is not the end all... every ID a unique person unto themselves in a gelatinous web.

11 posted on 10/16/2018 7:19:30 PM PDT by NormsRevenge (Semper Fi - Monthly Donors Rock!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: george76

No. Why would I want to download something I have no reason to trust?

12 posted on 10/16/2018 7:28:55 PM PDT by be-baw (still seeking...)
[ Post Reply | Private Reply | To 4 | View Replies]

To: george76

Thanks for posting this, I haven’t had a chance to watch the Mark Levin show yet.


13 posted on 10/16/2018 8:05:15 PM PDT by MarkL (Do I really look like a guy with a plan?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: be-baw; george76
No. Why would I want to download something I have no reason to trust?

Chrome is snitchware, and FireFox is junk...

If you're using Edge, Safari or IE, there's no hope at all.

14 posted on 10/16/2018 8:39:53 PM PDT by kiryandil (Never pick a fight with an angry beehive)
[ Post Reply | Private Reply | To 12 | View Replies]

To: MarkL

Capitalism vs. socialism: economist George Gilder weighs in.

Google has made the same error that Karl Marx made. The error? Assuming that the issue of human productivity has resolved to the point that we can focus solely on the distribution of the existing resources.

15 posted on 10/16/2018 8:48:52 PM PDT by george76 (Ward Churchill : Fake Indian, Fake Scholarship, and Fake Art)
[ Post Reply | Private Reply | To 13 | View Replies]

To: george76

Republicans need to do something

support Inrupt
support TOR

we need to stop google and facebook
from tracking people

16 posted on 10/16/2018 8:51:30 PM PDT by RockyTx
[ Post Reply | Private Reply | To 1 | View Replies]

To: LS

I read it, maybe understood a tenth of it. I’m an old, tech-challenged gal and it was tough sledding.

17 posted on 10/16/2018 9:03:19 PM PDT by Pining_4_TX (..Do not be frightened, and do not be dismayed, for the Lord your God is with you.. Joshua 1:9)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Fungi

Nature rules
Screen addicted are FOOLS
know nature
Know the great spirit
The internet in all its glory. Is NOTHING

18 posted on 10/16/2018 9:38:24 PM PDT by Truthoverpower (The guvmint you get is the Trump winning express !)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Fungi

Gilder is brilliant on technology, but not on theology.

He asserts that men need to be civilized by women.

Jesus did not. His Apostles did not.

I did not.

19 posted on 10/16/2018 10:45:11 PM PDT by YogicCowboy ("I am not entirely on anyone's side, because no one is entirely on mine." - J. R. R. Tolkien)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Pining_4_TX

Yeah, Gilder likes to show off his “techiness.” However, the main point I got (and I sent it to my tech guy who read it in minutes and had a detailed report) is that

*free ain’t free. We are increasingly paying with our time to do countless passwords, security clues, and then watch a ridiculous amount of ads to get the “free” stuff.

*As in anything, a top-down system is less likely ultimately to be as effective as a bottom up system. It will have advantages in the beginning-—like Nazi Germany-—but peter out when the “masses” get going.

*(for Gilder) the key is to correctly monetize everything.

20 posted on 10/17/2018 6:01:38 AM PDT by LS ("Castles made of sand, fall in the sea . . . eventually" (Hendrix))
[ Post Reply | Private Reply | To 17 | View Replies]

Navigation: use the links below to view more comments.
first 1-2021-27 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794 is powered by software copyright 2000-2008 John Robinson