good enough voter verification & other identity architecture schemes for online communities

53
& Other Identity Architectu re Schemes for Online Communities GOOD ENOUGH VOTER VERIFICATION

Upload: ele-munjeli

Post on 14-Aug-2015

90 views

Category:

News & Politics


3 download

TRANSCRIPT

& Other Identity Architecture Schemes for Online Communities

GOOD ENOUGH VOTER VERIFICATION

WHO AM I?

Participatory Art, Intermedia, Sonic Art, Audio Engineering

Computer Science Degree from TESC with Undergraduate research in Soft ware Engineering for Deliberative Systems

NCDD – CiralDevOps Socrata

WHAT IS THIS TALK?

Mostly Ideas – but that’s importantQuestions instead of answersPerpetuati ng a common vocabulary of issues

and ideas

Citizens Resources

VIRTUAL DEMOCRACIES – DE JURE STATES

INFLUENCE

AlliancesTreati esImmigrationConstituti ons

Communities of conscience

Communities of interest

Diaspora

WHO ARE THE CITIZENS?

Deliberation – parliamentary procedures, decision making

Voting – if you have representatives or delegates

Taxation – resources and GNPJustice – rights for citizensRelations with other states

POLITICAL TOOLING

Traditional Ideas for Online Deliberation

IMPARCH

DRAMA IS COMPELLING, NARRATIVE ENGAGES.

WHAT’S THE PLOT?

THE IMPORTANCE OF CONFLICT:

PRODUCTIVITY: WE UNDERSTAND THE

ISSUES WHEN WE FIGHT ABOUT THEM.

ADOPTION:PEOPLE DON’T NEED TO WIN, THEY NEED TO BE

HEARD.

ONLINE & OFFLINE IDENTIFIERS:

EQUALITY PRACTICES FROM NCDD

Possessions – clothes, cars, jewelry, technology

Class – accents, educati on, access to culture

Political Access – cold hard cash, infl uence, votes

OFFLINE

Numbers – social networks and published commentary

Technology – Code, coders, and access to coders

Design – intenti onal branding with digital images or work

ONLINE

DEFINING AN EQUAL SPACE

IDENTIFY THE EXISTING CONFLICT MODEL

Research – minutes, videos, published articles, bloggers

Meet with offl ine advocatesVisit the adversaries at home (online or offl ine)Good faith and bad faith

REPO

LAR

IZING

THE CO

NFLICT

Is this a goal-oriented initiati ve?

Are we trying to create a persistent community?

HOW MUCH TIME HAVE WE GOT?

IDENTIFYING VALUES THROUGH NARRATIVE

Your interest is your expertiseVoter fatigue and time as the criti cal resource

SOLUTION BASED TEAMS

Conversational roles and group dynamicsRefer to committ ee, delegati on, and

consultationCommunication plans

Language and Deliberation

IDIOLECT, DIALECT, AND EVOLVED VOCABULARY

NAVIGATING CONVERSATION AUTHENTICALLY AT SCALE

Allowing users to push tags and defi ne the content with their own vocabulary

Users defi ning other users – role tags and popular privileges

Sinking the sins – Jezebel

PROMPT TO MERGE

When the tap runs dryLeveraging the user to identify contentStati stical tools for suggestion

ROBERT’S RULES OF ORDER:TIPS FOR CONTROLLING CONFLICT

Originally designed for scalable groups working in bad faith

Think of it as a menu, you don’t have to order everything

Time or char countNo direct repliesLimit the number of

times people can testify

LIMITS OF DEBATE

A chairman or community manager

Shunning

MODERATION

External Identity &Government Influence

GOOD ENOUGH VOTER VERIFICATION

GOVERNMENT OWNS

IDENTITY

Citizenry ContributorsCriti cs

ACCESS & AUDITIBILITY

THE PROBLEM WITH SINGLE SIGNON

WHO OWNS THE DATA?HOW DO YOU DEFEND THE DATA?

WHAT’S THE BUSINESS PLAN, AND HOW DOES IT INFLUENCE ACCESS?

Self Defi ningSocial NetworksFinancial InformationGeolocation

OPTIONS FOR EXTERNAL VERIFICATION

FINANCIAL INFORMATION

Paypal Address verifi cati onCredit cards and existing verification systemsStrategies in codeThe Washington State Voter Database

FINANCIAL INFORMATION AS

IDENTITY IN NEW YORK

Campaign Contributi ons

Not citi zens, but residents and taxpayers

No risk, it’s purely advisory

ONLINE OFFLINE INITIATIVES

People show up and can download a codeUsing devices onsite to upload data

Completely independent identi ty & sovereignty

THE FLASH SLEMKEY

PROBLEMS WITH SOVEREIGNTY AND ONLINE IDENTIFIERS

Someone owns the banksSomeone owns the serversSomeone owns your drivers licenseThe Internet is buggedYou and your MAC address

GIACOMO FERRARI

Machine generated

Physical artifact for peer authentication

Agnostic devicesDisposableEncrypted

THE SLEMKEY

PEER AUTHENTICATION

ChainingSuperpeers

No arti facts – decryptors and keys

Producing energy from the decryption

Flash paper encoding

DISPOSABLE IDENTIFIERS

HTTPS://YOUTU.BE/EAFEPGX-9RE?T=28S

Post Internet Micro Server Architecture & Distributed Democracy

IMAGINES

BY THE PEOPLE, FOR THE PEOPLE: WHAT IS A CITIZEN?

Centralized servers mean centralized control

Prone to attack Civic

responsibility is rare

IS THE STATUS QUO IN SERVER ARCHITECTURE UNSUITABLE?

Need to work with small cache

Tiered caching for relevance

Bubble up voting

GEOGRAPHY AND INFLUENCE

POST INTERNET COMMUNICATION

Bluetooth LANThings I don’t even know about yet

LightweightSecure protocols

or anonymityTechnical literacyThresholds for

citizen density

REQUIREMENTS

CONSEQUENCES

Do-acracyRisks for distributed systemsIneffective for long term planningThe Tyranny of Structurelessness

https://en.wikipedia.org/wiki/The_Tyranny_of_Structurelessness

Time is a resourceNonparticipation is like not paying

taxesCitizenship as a privilegePeer nationsThird party validation

CONSIDERATIONS

Stock market models

Ballot Box Soap Box

MINIMUM VIABLE PRODUCT

MUCHAS GRACIAS!

NCDD and ODDIJeff OrrGiacomo FerrariMarc SlemkoAndrew Gall (Peaches)Kati e VedderThe Insane Cloud Posse (DevOps Socrata)YOU!

LinkedIn:Ele MunjeliGithub: munjeli

ELE MOONEYTWITTER: @ELEMUNJELI

[email protected]