Ten Laws of the Cryptocosm
Google’s security shortcomings, its “aggregate and advertise” model, its avoidance of price signals, its vertical silos of customer data, and its visions of machine mind are unlikely to survive root-and-branch revolution of distributed peer-to-peer technology,
which I call the “Cryptocosm”
At this very moment, all around us, scores of thousands of engineers and entrepreneurs are contriving a new system of the world that transcends the limits and illusions of the Google realm. It is in creation right now.
In the Google era, the prime rule of the Internet is “Communications first.” That means everything is free to be copied, moved, and mutated. While most of us welcome “free” on the understanding that it means “no charge,” what we really want is to get what we ordered rather than what the authority chooses to provide. In practice, “free” means insecure, amorphous, unmoored, and changeable from the top. This communications-first principle served us well for many years. The Internet is a giant asynchronous replicator that communicates by copying. Regulating all property rights in the information economy are the copy-master kings, chiefly at Google.
In this system, security is a function of the network, applied from the top, rather than a property of the device and its owner. So everything rises to the top, the Googleplex, which achieves its speed and efficiency by treating its users as if they were making random choices. That’s the essence of the mathematical model behind their search engine. You are a random function of Google. But you are not random; you are a unique genetic entity that cannot be factored back into an egg and a sperm. You are unbreakably encrypted by biology. These asymmetrical natural codes are the ruling model and metaphor for enduring security. You start by defining not the goal but the ground state. Before you build the function or the structure, you build the foundation. It is the ultimate non-random reality. The ground state is you.
Utterly different from Google’s rule of communications first is the
Law of the Cryptocosm.
The First Rule is the Barn – Door Law : “Security First.” Security is not a procedure or a mechanism; it is an architecture. Its keys and doors, walls and channels, roofs and windows define property and privacy at the device-level. They determine who can go where and do what. Security cannot be retrofitted, patched, or improvised from above.
For you, security means not some average level of surveillance at the network level but the safety of your own identity, your own device, and your own property You occupy; and control a specific time and space. You cannot be blended or averaged. Just as you are part of a biological ledger, inscribed through time in DNA codes and irreversible by outside power, your properties and transactions compose an immutable ledger. Just as you are bound in time, every entry in the cryptocosmic ledger is timestamped.
The Second Rule of the Cryptocosm derives from the first: “Centralization is not safe.”
Secure positions are decentralized ones, as human minds and DNA code are decentralized. Darwin’s mistake, and Google’s today, is to imagine that identity is a blend rather than a code – that machines can be a singularity, but human beings are random outcomes.
Centralization tells thieves what digital assets are most valuable and where they are. It solves their most difficult problems. Unless power and information are distributed throughout the system peer to peer, they are vulnerable to manipulation and theft from the blenders at the top.
The Third rule is “Safety last.”
Unless the architecture achieves its desired goals, safety and security are irrelevant. Security is a crucial asset of a functional system. Requiring the system to be safe at every step of construction results in a kludge: a machine too complex to use.
The Fourth rule is “Nothing is free.”
This rule is fundamental to human dignity and worth. Capitalism requires companies to serve their customers and to accept their proof of work, which is money. Banishing money, companies devalue their customers.
The Fifth rule is “Time is the final measure of cost.”
Time is what remains scarce when all else becomes abundant: the speed of light and the span of life. The scarcity of time trumps an abundance of money.
The Sixth rule: “Stable money endows humans with dignity and control.”
Stable money reflects the scarcity of time. Without stable money, an economy is governed only by time and power.
The Seventh rule is the “Asymmetry law,”
Reproducing biological asymmetry. A message coded by a public key can be decrypted only the private key, but the private key cannot be calculated from the public key. Asymmetric codes that are prohibitively difficult to break but easy to verify give power to the people. By contrast, symmetrical encryption gives power to the owners of the most costly computers.
The Eighth rule is “Private keys rule.”
They are what is secure. They cannot be blended or changed from on top any more than your DNA can be changed or blended from above.
The Ninth rule is “Private keys are held by individual human beings, by governments or Google.”
Private keys enforce property rights and identities. In a challenge— response interaction, the challenger takes the public key and encrypts a message. The private responder proves identity by decrypting, amending, and returning the message encrypted anew with his private key. This process is a digital signature.
By decrypting the new message with a public key, the final recipient is assured that the sender is who he says he is. The document has been digitally signed.
Ownership of private keys distributes power. The owner of a private key (ID) can always respond to a challenge by proving ownership of the identity of a public address and the contents of a public ledger. Thus, in response to government claims and charges, the owner of the private key can prove his work and his record. By signing with a private key, the owner can always prove title to an item of property defined by a public key on a digital ledger.
The Tenth rule is “Behind every private key and its public key is the human interpreter.”
A focus on individual human beings makes meaningful security.
How will your experience of the world change when these ten rules define the new system?
Google is hierarchical. Life after Google will be heterarchical. Google is top-down. Life after Google will be bottom-up. Google rules by the insecurity of all the lower layers in the stack. A porous stack enables the money and power to be sucked up to the top. In life after Google, a secure ground state in the individual human being, registered and timestamped in a digital ledger, Will prevent this suction of hierarchical power.
Whereas Google’s “free world” tries to escape the laws of scarcity and the webs of price, you will live in a world brimming with information on the real costs and most efficient availabilities of what you want and need.