VRM

You are currently browsing articles tagged VRM.

This is what greets me when I go to the Washington Post site from here in Germany:

Washington Post greeting for Europeans

So you can see it too, wherever you are, here’s the URL I’m redirected to on Chrome, on Firefox, on Safari and on Brave. All look the same except for Brave, which shows a blank page.

Note that last item in the Premium EU Subscription column: “No on-site advertising or third-party tracking.”

Ponder for a moment how the Sunday (or any) edition of the Post‘s print edition would look with no on-paper advertising. It would be woefully thin and kind of worthless-looking. Two more value-adds for advertising in the print edition:

  1. It doesn’t track readers, which is the sad and broken norm for newspapers and magazines in the online world—a norm now essentially outlawed by the GDPR, and surely the reason the Post is running this offer.
  2. It sponsors the Post. Tracking-based advertising, known in the trade as adtech, doesn’t sponsor anything. Instead it hunts down eyeballs its spyware already knows about, no matter where they go. In other words, if adtech can shoot a Washington Post reader between the eyes at the Skeevy Lake Tribune, and the Skeevy is cheaper, it might rather hit the reader over there.

So here’s the message I want the Post to hear from me, and from every reader who values what they do:

That’s what I get from the print edition, and that’s what I want from the online edition as well.

So I want two things here.

One is an answer to this question: Are ANY publishers in the online world selling old-fashioned ads that aren’t based on tracking and therefore worth more than the tracking kind? (And are GDPR-compliant as well, since the ads aren’t aimed by collected personal data.)

The other is to subscribe to the Post as soon as they show me they’re willing to do what I ask: give me those real ads again. And stop assuming that all ads need to be the tracking-based kind.

Thanks in advance.

Tags: , , ,

wheat+apple

[Update on 3 January 2016: Buzzfeed reports that Apple is killing iAd and getting out of that business, ending the conflict I detail below. And Apple confirms the decision, here. For a look at what I am sure is behind that, scroll down to “Sacrificing its adtech business…”.]

A couple weeks ago, I posted Separating advertising’s wheat and chaff, contrasting privacy-respecting brand advertising (the wheat) with privacy-offending tracking-based advertising (the chaff), better known in the industry as “adtech.”

Apple pushes both, through its own advertising business, called iAd. The company is also taking sides against both — especially adtech — by supporting Content Blocking in a new breed of mobile phone apps we can expect to see in iOS 9, Apple’s next mobile operating system, due next month.

In Apple’s Content Blocking is chemo for the cancer of adtech, which I posted a few days ago, I visited the likely effects of content blocking. Since then a number of readers have pointed to posts about iAd and the opt-out choices Apple provides for advertising on iPhones and iPads.

Both iAd and the opt-outs reveal that Apple is as much in the adtech business as any other company that tracks people around the Net and blasts personalized advertising at them.

Apple is clearly taking sides against adtech with its privacy policy, which has lately become more public and positioned sharply against the big tracking-based advertising companies (notably Google and Facebook). In September of last year, for example, Apple put up a new pageapple.com/privacy — that contained this paragraph:

Our business model is very straightforward: We sell great products. We don’t build a profile based on your email content or web browsing habits to sell to advertisers. We don’t “monetize” the information you store on your iPhone or in iCloud. And we don’t read your email or your messages to get information to market to you. Our software and services are designed to make our devices better. Plain and simple.

What we have here, then, is Apple’s massive B2C business in conflict with one of its B2B businesses. Since there is a lot of history here, let’s review it.

On 8 July 2010, Engadget published iAds uses iTunes history, location information to target advertising. It begins,

We’ve heard about this before, but now that it’s up and running, this is probably worth a revisit. Apple’s iAds system actually uses lots of your information, including your iTunes purchasing history, location data, and any other download or library information it can suss out about you, to determine what ads you see. So say a few marketing firms working with the large companies now buying and selling iAds.

A recent series of ads for soap was able to target “married men who are in their late 30s and have children.” That’s very specific, and when Apple rolls out the full program, it’ll even be able to use things like iBooks purchases and iTunes movie and TV downloads to target you with advertising.

On 15 October 2014, Digiday published Apple revamps mobile ads with retargeting options. It begins,

Apple’s release of its new mobile operating system last month came with an overlooked gift for marketers: the ability to retarget ads based on users’ in-app browsing behaviors.

According to ad agencies, Apple is actively pitching the new capability as a way to effectively solve the mobile cookie problem.

Say, for example, a visitor to a retailer’s iPhone app adds a pair of shoes to his cart but ultimately decide not to buy it. In this scenario, the retailer will now be able to retarget that user with an ad for that exact pair — even in another app on his iPad. When tapped, the ad would direct him back to his abandoned checkout page and automatically add the shoes to his online shopping cart.

That was when iAd was new. Since then it has come to be regarded, at least by the online press, as something of a failure. On 16 Ocbober 2014, Business Insider published Here’s Apple’s Plan To Turn Around iAd, One Of Its Biggest Flops. The gist:

Several sources have confirmed to Business Insider that Apple is currently visiting mobile specialists at the top media agencies in New York City to push the new function. (Cross-device retargeting.)

Cross-device retargeting is of most use to retailers: if a customer spends some time looking at a dress on their iPad app but decides not to buy it, that same retailer can “retarget” them with an ad displaying an image of that dress, options to buy, or directions to the store when they next pick up their iPhone.

On 19 November 2014, AdExchanger published iAd starts selling programmatically, and explains how it works:

iAd has more than 400 targeting options for advertisers. Its audience is also validated, since users must create an iTunes account in order to download apps. With the release of iOS 8, Apple announced that those Apple IDs could be used by iAds advertisers to retarget users across their devices. Those capabilities make it a good fit for advertisers doing audience-based targeting, who often prefer transacting in programmatic channels.

iAd has scale: “Apple iAd’s sell-side SDK is one of the most penetrated SDKs in the industry,” said Michael Oiknine, CEO of Apsalar. “They now have added iTunes radio inventory, so it’s a smart yield maximization strategy for Apple and is akin to Facebook strategy, which maximizes inventory sales via FBX and PMDs.”

On 21 November 2014, Venturebeat published Apple and AdRoll enable iOS ad retargeting — with extra data from iTunes and the App Store. It begins,

In a significant move for the mobile advertising industry, Apple and retargeting leader AdRoll have announced a partnership that will see AdRoll providing its retargeting and programmatic buying capability for iAd. In addition, Apple will enable advertisers to target potential customers via access to its proprietary data sets from iTunes and the app store.

On 21 November 2014, AdWeek published Get Ready for More Mobile Ads on Your iPhones as Apple Launches New iAds. The gist:

Today, Apple is unveiling partnerships with companies like AdRoll, which will flip a switch and start serving iAds through its automated marketing platforms. This turn toward programmatic mobile advertising has been in the works for at least a year. Last year, the company stopped treating iAd like a high-end marketing platform for only the top brands with the most cash.

Apple wanted to build a self-serve mobile advertising system in house, and it bought Quattro Wireless to help. Sources said that effort faltered, and Apple decided to partner with ad tech companies like AdRoll and The Rubicon Project to compete with mobile ad giants like Facebook, Google and Twitter.

AdRoll is a retargeting specialty firm that lets marketers use their own consumer data profiles to deliver ads across such platforms. And Rubicon unexpectedly leaked word earlier this week that it was partnering with Apple.

On 22 January 2015, ExchangeWire asked What will Apple’s Ad Tech Play look like? They say,

Apple’s renewed designs on the advertising business were revealed when it was announced it was to start selling its iAd inventory on a programmatic basis, with several firms including MediaMath, Rubicon Project, among others, over four years after its iAd unit was initially launched, asking advertisers for (the then audacious sum of) $1m per campaign on its iOS devices.

Since launch, Apple’s presence in the advertising business has been largely underwhelming (apart from its own spend). But the revelation it had chosen several supply-side platforms (SSP) to sell programmatic guaranteed opportunities on behalf of the 250,000-plus App Store developers indicated its renewed designs on the sector.

The announcement itself made waves, not least because of the bungled nature of the announcement,which itself raises a number of issues to debated about Apple’s influence in the ad tech sector (more on that later).

The initial announcement read: “Apple’s iAd provides 400-plus targeting options to advertisers, based on hundreds of millions of validated iTunes accounts worldwide. This rich first-party data asset makes it easy for buyers to target the specific mobile audiences of their choice.”

The move represented, for the first time, that Apple is willing to loosen control over its first-party iTunes data with advertisers expected to be willing to pay top dollar for the access.

They add,

Apple has since started to advertise for roles within its iAd business, requesting applications for UK candidates to join its iAd Marketplace Sales Organisation.

Among the skills requested are: “Apple’s customers on the various products iAd has to offer as well as how to leverage iAd’s self service buying platform, iAd Workbench.”

In addition: “Third-party tags familiarity a plus.”

What is clear, from all these pieces and many others like them, is that Apple’s adtech business is little if any different from the rest of them — meaning just as creepy and privacy-abusing — and notable as well for failing to live up to its original ambitions, which were both huge and (via Business Insider) outlined by Saint Steve himself:

At launch, Jobs set out the bold ambition that iAd would capture 50% of the mobile ad market. Apple marketed iAd as a best-in-class solution for advertisers because it owns both the hardware and operating system the ads ride on and gains valuable data when people sign up for Apple ID to register for iTunes accounts. That means it can target ads by age, gender, home address, iTunes purchases and App Store downloads.

However, it’s still somewhat behind that lofty 50% target. iAd made up just 2.5% of the mobile ad revenue booked in the US last year, according to eMarketer, behind Google which takes the lion’s share (37.7%) and Facebook (17.9%). The most recent data from IDC states Apple generated $125 million in mobile ad sales in 2012.

Apple’s total sales in FY 2012 were $125 billion, or 1000x its mobile ad sales that year. Put another way, iAd contributed 0.01% to Apple’s sales.

Meanwhile, does any Apple customer want advertising on their iPhone or iPad?

Apple knows the answer to that question, which is why Apple provides ways for you to “limit ad tracking on your iPhone, iPad, or iPod touch” and “ads based on your interests.”* (Just go to Settings > Privacy > Advertising to “Limit Ad Tracking,” and to Settings > Privacy > Location Services > System Services. to turn off “Location Based iAds.”) And soon we’ll have Content Blocking as well.

Sacrificing its adtech business would position Apple in full alignment with three things:

  1. Tim Cook’s privacy statement. It would take the loopholes out of that thing.
  2. Market demand. People are fed up with losing their privacy online — almost all of it to the tracking-based advertising business. (Sources: Pew, TRUSTe, Customer Commons, Wharton.)
  3. The moral high ground called simple human decency. Most people don’t want to be tracked in the online world any more than they want to be tracked in the physical one. Nor do they want information about them known by first parties to be sold to third parties, or to anybody, with our without their knowledge, no matter how normative that practice has become.

Dropping adtech would also be good for iAd, which could then concentrate on placing non-tracking-based brand ads, which are more valuable anyway: to brands, to publishers and to the marketplace. Also to Apple itself, because they would be selling wheat, rather than chaff.

Until then, the loopholes persist in Tim Cook’s privacy statement, and Apple retains major conflicts between its massive B2C businesses and its struggling B2B adtech business.

It will be interesting to see what the company does once the Content Blocking chemo hits the App Store bloodstream.

* “Based on your interests” (aka “interest based advertising“) is a delusional conceit by both adtech (examples here , here and here) and online retailing (prime example: Amazon). Neither visiting sites nor buying are measures of interests. All they show are actions that could mean anything — or nothing.

The interest-based advertisers say our interests are “inferred” by what we do (and they like to observe, constantly and everywhere). And yet those inferences are weakened by another assumption that is flat-out wrong, nearly all the time: that we are always in a shopping mode. In fact we are not.

We are, in fact, always in an owning mode, which is why I think that’s the real greenfield for e-commerce. If companies shifted a third of what they spend on adtech over to customer service, they would vastly increase both customer loyalty and brand value.

By the way, Apple knows this, possibly better than any other technology company. That’s one more reason why I think their B2C smarts will correct the adtech crowd-following errors of their B2B ways.

[Later…] @JamesDempsey tweets,

iOS 9 content blocking is in Safari. iAds appear in apps—not web pages: iAds not blocked.

Good to know. Apple’s iAd site doesn’t make that clear (to me, at least). What this tells me is that iAd is in the chaff business while Content Blocking encourages wheat on Safari. Doesn’t change the point of this post, or the earlier ones.

Tags: , , , , , , ,

IIW XX, IIW_XX_logothe 20th Internet Identity Workshop, comes at a critical inflection point in the history of VRM: Vendor Relationship Management, the only business movement working toward giving you both

  1. independence from the silos and walled gardens of the world; and
  2. better means for engaging with every business in the world — your way, rather than theirs.

If you’re looking for a point of leverage on the future of customer liberation, independence and empowerment, IIW is it.

Wall Street-sized companies around the world are beginning to grok what Main Street ones have always known: customers aren’t just “targets” to be “acquired,” “managed,” “controlled” and “locked in.” In other words, Cluetrain was right when it said this, in 1999:

if you only have time for one clue this year, this is the one to get…

Now it is finally becoming clear that free customers are more valuable than captive ones: to themselves, to the companies they deal with, and to the marketplace.

But how, exactly? That’s what we’ll be working on at IIW, which runs from April 7 to 9 at the Computer History Museum, in the heart of Silicon Valley: the best venue ever created for a get-stuff-done unconference.

Focusing our work is a VRM maturity framework that gives every company, analyst and journalist a list of VRM competencies, and every VRM developer a context in which to show which of those competencies they provide, and how far along they are along the maturity path. This will start paving the paths along which individuals, tool and service providers and corporate systems (e.g. CRM) can finally begin to fit their pieces together. It will also help legitimize VRM as a category. If you have a VRM or related company, now is the time to jump in and participate in the conversation. Literally. Here are some of the VRM topics and technology categories that we’ll be talking about, and placing in context in the VRM maturity framework:

Note: Another version of this post appeared first on the ProjectVRM blog. I’m doing a rare cross-posting here because it that important.

Tags: , , , , , , , , , , , , , ,

In , opens with this sentence: “On any person who desires such queer prizes, New York will bestow the gift of loneliness and the gift of privacy.” Sixty-four years have passed since White wrote that, and it still makes perfect sense to me, hunched behind a desk in a back room of a Manhattan apartment.

That’s because privacy is mostly a settled issue in the physical world, and a grace of civilized life. Clothing, for example, is a privacy technology. So are walls, doors, windows and shades.

Private spaces in public settings are well understood in every healthy and mature culture. This is why no store on Main Street would plant a tracking beacon in the pants of a visiting customer, to report back on that customer’s activities — just so the store or some third party can “deliver” a better “experience” through advertising. Yet this kind of thing is beyond normative on the Web: it is a huge business.

Worse, the institution we look toward for protection from this kind of unwelcome surveillance — our government — spies on us too, and relies on private companies for help with activities that would be a crime if the  still meant what it says. ( more than two years ago.)

I see two reasons why privacy is now under extreme threat in the digital world — and the physical one too, as surveillance cameras bloom like flowers in public spaces, and as marketers and spooks together look toward the “Internet of Things” for ways to harvest an infinitude of personal data.

Reason #1

The was back-burnered when  (aka ) got baked into e-commerce in the late ’90s. In a single slide  summarizes what happened after that. It looks like this:

The History of E-commerce
1995: Invention of the cookie.
The end.

For a measure of how far we have drifted away from the early promise of networked life, re-read ‘s “Death From Above,” published in January 1995, and his “Declaration of the Independence of Cyberspace,” published one year later. The first argued against asymmetrical provisioning of the Net and the second expressed faith in the triumph of nerds over wannabe overlords.

Three years later  was no less utopian. While it is best known for its 95 Theses (which include “” and ““) its most encompassing clue came before of all those. Chris Locke wrote it, and here’s what it says, boldface, color and all:

if you only have time for one clue this year, this is the one to get…
we are not seats or eyeballs or end users or consumers. we are human beings and our reach exceeds your grasp. deal with it.

Note the first and second person voices, and the possessive case. Our reach was everybody’s. Your grasp was companies’.

Fourteen years later, companies have won. Our reach has not exceeded their grasp. In fact, their grasp is stronger than ever.

Another irony: the overlords are nerds too. And  they lord over what Bruce Schneier calls a feudal system:

Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android phones. Others have pledged allegiance to Apple: We have Macintosh laptops, iPhones, and iPads; and we let iCloud automatically synchronize and back up everything. Still others of us let Microsoft do it all. Or we buy our music and e-books from Amazon, which keeps records of what we own and allows downloading to a Kindle, computer, or phone. Some of us have pretty much abandoned e-mail altogether … for Facebook.

These vendors are becoming our feudal lords, and we are becoming their vassals. We might refuse to pledge allegiance to all of them – or to a particular one we don’t like. Or we can spread our allegiance around. But either way, it’s becoming increasingly difficult to not pledge allegiance to at least one of them.

Reason #2

We have loosed three things into the digital world that we (by which I mean everybody) do not yet fully comprehend, much less deal with (through policy, tech or whatever). Those are:

  1. Ubiquitous computing power. In the old days only the big guys had it. Now we all do.
  2. Ubiquitous Internet access. This puts us all at zero virtual distance from each other, at costs that also veer toward zero as well.
  3. Unlimited ability to observe, copy and store data, which is the blood and flesh of the entire networked world.

In tech, what can be done will be done, sooner or later, especially if it’s possible to do it in secret — and if it helps make money, fight a war or both. This is why we have bad acting on a massive scale: from click farms gaming the digital advertising business, to the NSA doing what we now know it does.

Last month I gave a keynote at an  event in New York. One of my topics was personal privacy, and how it might actually be good for the advertising business to respect it. Another speaker was , a “gentleman hacker” and CEO of WhiteOps, “an internet security company focused on the eradication of ad fraud.” He told of countless computers and browsers infected with bots committing click-fraud on a massive scale, mostly for Russian hackers shunting $billions from the flow of money down the online advertising river. The audience responded with polite applause. Privacy? Fraud? Why care? The money’s rolling in. Make hay while the power asymmetry shines.

Just today an executive with a giant company whose name we all know told me about visiting “click farms” in India, which he calls “just one example of fraud on a massive scale that nobody in the industry wants to talk about.” (Credit where due: the IAB wouldn’t have had us speaking there if its leaders didn’t care about the issues. But a .org by itself does not an industry make.)

Yet I’m not discouraged. In fact, I’m optimistic.

These last few months I’ve been visiting dozens of developers and policy folk from Europe to Australia, all grappling productively with privacy issues, working on the side of individuals, and doing their best to develop enlightened policy, products and services.

I can report that respect for privacy — the right to be left alone and to conceal what one wishes about one’s self and one’s data — is far more evolved elsewhere than it is in the U.S. So is recognition that individuals can do far more with their own data than can any big company (or organization) that has snarfed that data up. In some cases this respect takes the form of policy (e.g. the EU Data Protection Directive). In other cases it takes the form of advocacy, or of new businesses. In others it’s a combination of all of those and more.

Some examples:

 is a policy and code development movement led by Ann Cavoukian, the Information & Privacy Commissioner of Ontario. Many developers, enterprises and governments are now following her guidelines. (Which in turn leverage the work of Helen Nissenbaum.)

, the Fondation Internet Nouvelle Génération, is a think tank of leading French developers, scientists, academics and business folk, convened to guide digital transformation across many disciplines, anchored in respect for the individual and his or her full empowerment (including protection of privacy), and for collective action based on that respect.

 is a Fing project in which six large French companies — Orange, La Poste, Cap-Digital, Monoprix, Alcatel-Lucent and Societe Generale — are releasing to 300 customers personal data gathered about those customers, and inviting developers to help those customers do cool things on their own with that data.

The  in the UK is doing a similar thing, with twenty UK companies and thousands of customers.

Both Midata and Etalab in France are also working the government side, sharing with citizens data collected about them by government agencies. For more on the latter read Interview with Henri Verdier: Director of Etalab, Services of the French Prime Minister. Also see Open Data Institute and PublicData.eu.

In Australia,    and  are working on re-building markets from the customer side, starting with personal control and required respect for one’s privacy as a base principle.

In the U.S. and Europe, companies and open source development groups have been working on personal data “stores,” “lockers,” “vaults” and “clouds,” where individuals can harbor and use their own data in their own private ways. There is already an  and a language for “” and “pclouds” for everything you can name in the Internet of Things. I posted something recently at HBR about one implication for this. (Alas, it’s behind an annoying registration wall.)

On the legal front, Customer Commons is working with the  at the Berkman Center on terms and privacy requirements that individuals can assert in dealing with other entities in the world. This work dovetails with , the  and others.

I am also encouraged to see that the most popular browser add-ons and extensions are ones that block tracking, ads or both. AdblockPlus, Firefox’s Privowny and  are all in this game, and they are having real effects. In May 2012,  a 9.26% ad blocking rate in North America and Europe. Above that were Austria (22.5%), Hungary, Germany, Finland, Poland, Gibraltar, Estonia and France. The U.S. was just below that at 8.72%. The top blocking browser was Firefox (17.81%) and the bottom one was Explorer (3.86%). So it was no surprise to see Microsoft jump on the Do Not Track bandwagon with its latest browser version. In sum what we see here is the marketplace talking back to marketing, through developers whose first loyalties are to people.

(The above and many other companies are listed among developers here.)

More context: it’s still early. The Internet most of us know today is just eighteen years old. The PC is thirty-something. Pendulums swing. Tides come and go. Bubbles burst.

I can’t prove it, but I do believe we have passed Peak Surveillance. When Edward Snowden’s NSA revelations hit the fan in May, lots of people said the controversy would blow over. It hasn’t, and it won’t. Our frogs are not fully boiled, and we’re jumping out of the pot. New personal powers will be decentralized. And in cases where those powers are centralized, it will be in ways that are better aligned with individual and social power than the feudal systems of today. End-to-end principles are still there, and still apply.

Another reason for my optimism is metaphor, the main subject in the thread below. In , George Lakoff and Mark Johnson open with this assertion: The mind is inherently embodied. We think metaphorically, and our metaphorical frames arise from our bodily experience. Ideas, for example, may not be things in the physical sense, but we still talk of “forming,” “getting,” “catching” and “throwing out” ideas. Metaphorically, privacy is a possession. We speak of it in possessive terms, and as something valuable and important to protect — because this has been our experience with it for as long as we’ve had civilization.

Possession is “nine-tenths of the law” because it is nine-tenths of the three-year-old. She says “It’s mine!” because she has hands with thumbs that give her the power to grab. Possession begins with what we can hold.

There is also in our embodied nature a uniquely human capacity called indwelling. Through indwelling our senses extend outward through our clothes, our tools, our vehicles, enlarging the boundaries of what we do and experience in the physical world. When drivers speak of “my wheels” and pilots of “my wings,” it is because their senses dwell in those things as extensions of their bodies.

This relates to privacy through exclusion: my privacy is what only I have.

The clothes we wear are exclusively ours. We may wear them to express ourselves, but their first purpose is to protect and conceal what is only ours. This sense of exclusivity also expands outward, even though our data.

 “the Internet is a copy machine.” And it is. We send an email in a less literal sense than we copy it. Yet the most essential human experience is ambulation: movement. This is why we conceive life, and talk about it, in terms of travel, rather than in terms of biology. Birth is arrival, we say. Death is departure. Careers are paths. This is why, when we move data around, we expect its ownership to remain a private matter even if we’re not really moving any of it in the postal sense of a sending a letter.

The problem here is not that our bodily senses fail to respect the easily-copied nature of data on networks, but that we haven’t yet created social, technical and policy protocols for the digital world to match the ones we’ve long understood in the physical world. We still need to do that. As embodied beings, the physical world is not just our first home. It is the set of reference frames we will never shake off, because we can’t. And because we’ve had them for ten thousand years or more.

The evolutionary adaptation that needs to happen is within the digital world and how we govern it, not the physical one.

Our experience as healthy and mature human beings in the physical world is one of full agency over personal privacy. In building out our digital world — something we are still just beginning to do — we need to respect that agency. The biggest entities in the digital world don’t yet do that. But that doesn’t mean they can’t. Especially after we start leaving their castles in droves.

Tags: , , , ,

[Trieste, Italy, 12:02am Friday 21 May 2013 — As I say in the comments here, Airbnb has responded to this post, explaining that a bug in the system was involved. While that might patch Airbnb’s relationship with my wife and I, the bridge remains burned with other customers as long as Airbnb’s Verified ID system retains its current requirements. They still need the kind of help only good hackers and loyal customers can provide. — Doc]

My wife and I are veteran Airbnb customers who have been happy with the company from the start. We like the prices, the experiences, the whole thing. As happy customers, we have also been spreading the love far and wide, pitching many new customers on Airbnb as a better way to stay when traveling. We want to continue spreading that love, even though we — and many other loyal customers — are now on the far side of a bridge Airbnb burned when it launched its new identity Verified ID system, which they explain (at that link) this way:

Verified ID provides a connection between the online and offline spaces. Airbnb users can earn a “Verified ID” badge on their profile by providing their online identity (via existing Airbnb reviews, LinkedIn, or Facebook) and matching it to offline ID documentation, such as confirming personal information or scanning a photo ID. The name provided by both channels must match for verification to succeed.

Starting today, Airbnb will require a random 25% of users in the USA to go through the Verified ID process. Soon, we’ll expand this requirement to users around the world. We hope that hosts and guests worldwide will see the benefits of interacting with users who complete Verified ID. Our goal is for all Airbnb members to have Verified ID eventually.

Any Airbnb host can now require their prospective guests to obtain Verified IDs before booking. Trust runs in both directions, so any host who requests this condition must also get verified.

Some of the comments under the post were positive, but many went the other way. Here are a few…

Jon:

I am an Airbnb host. Naturally, safety is always a concern. Despite that, I find this move objectionable, dishonest, misguided, and outright offensive.

  1. As a host, it is up to me to choose who I allow in my home. I like that I can decide how many requirements to place on my guests. Should I choose to place strict requirements, I get more protection and probably fewer bookings. I like having the choice. Airbnb just took the choice away from me and I’m not happy about it.
  2. You are making it substantially harder for guests to book on Airbnb. These standards will reduce the number of bookings we receive as hosts. You reduce our bookings and remove our ability to choose. Hosts should have the ability to choose.
  3. You want people to send you their photo ID / passport? Are you out of your *&#%& mind? Banks lose customer data all the time and they have some of the most stringent standards possible. Despite that, you pretend that you all are immune. You claim that having people send some of their most personal information over the internet will make them safer. You don’t make them safer; you make them MUCH LESS SAFE. When you have your data breached and you get sued, you will deserve every bit of the penalty.
  4. Why did you require a random 25% of users? Why not all users? Because you know you’d get too much negative feedback all at once and you could control the situation better if you phase it in. Either you are lying or you are putting hosts at risk. Shameful either way.
  5. “enhanced trust” I hate your Orwellian crock of sh&# phrasing. You should help the prison system rebrand their “full body cavity search”
  6. As a traveler myself, I was one of the 25% selected for “enhanced trust”. I have over 50 positive reviews from guests and hosts alike. You know where I live! There is no more trust that could possibly be had. Use a little common sense. This is the kind of nonsense I’d expect from the DMV, not from a blossoming enterprise.
  7. When the hell did facebook become an authority on people’s identities? I suspect that you have much more interesting motives for forcing people to connect their profiles to facebook. Quit trying to mine data under the guise of trust.
  • Deborah:

    my Facebook account did not work for Airbnb so they asked me to make a personal video talking about such things as why i like my neighborhood. I’m sorry, but I find this creepy. think of the inevitable steps up: photos of tattoos or birthmarks? proof of baptism? defense of fashion choices? that fragrant blend of californian cumbayah and capitalism. yechh….

  • Also from Deborah:

    I was just trying to book a short stay and the rigmarole and emails this verification process generated was ridiculous, but what caused me to cancel the reservation was this weird audition video request. Nor will I ever have anything further to do with Airbnb; not because of the hassle, but because this new verification process is invasive and puts my identity at risk. I have never encountered any comparable vetting for any purpose and it’s depressing to realize people will unthinkingly accept this kind of exploitation of information. I guess the thinking is if you value your privacy and identity above “trust” you don’t measure up to the Airbnb “community”. And is it a “community”? Really??

  • kim:

    well this is irritating. i have neither a facebook nor linkedin account, nor do i want either. i’ve been a positively-reviewed airbnb member for 2 years. although this article says it will look at positive reviews as online verification, it does not seem to be the case.
    and as for the 24/7 customer service? at this moment there is NO chat available, phone number is reserved for emergencies, and they are not responding to e-mail. so my booking is in limbo. if you’re going to implement this new feature, at least have the customer service to support it!<

  • Mle Davis

    Agree with others that the new verification process is insane and insulting. I have used your service for two years. My “reality” has been verified by my hosts and my guests: people in four countries have left feedback about their experiences with me. We have talked on the phone. You have my social security number from when you sent me tax documents. You have my credit card on file. I”m happy to send you my drivers license, but don’t see why you would need it, when you already have the rest. There is just no way I”m linking up my facebook account so you can datamine my friends, keep an eye on my day to day activity, or examine my relationships. There are enough safety checks on me through the relationship we’ve already developed. Please reconsider this stupidity.

  • E:

    Just had a reservation cancelled tonight because I did not complete the verification process. I inadvertently skipped the second step in the process which is give them access to my facebook account and contacts. I guess it doesn’t matter that I have been a member for almost three years and have rented through airbnb more than 15 times and have ALL positive reviews. I see this as an attempt to gather data for marketing purposes. Why else would they need access to facebook or linked in. Airbnb is going down hill. I have had more and more problems with them over the past 6 months. It was a great idea in the begining, but I think they are imploding!

  • Tony:

    I’m new to airbnb and I’m not crazy about the idea of scanning my driver’s license or passport and sending that to you. How do I know the faceless employees of whatever company which gets this information can be trusted with it?…
    … before you go to these extraordinary steps, why not fix the site so that friends can give me references. As I said, I’m new and (per your instructions) have asked friends through the site (both by email and facebook) to provide me with a reference. No one has done so yet and three have written back to say that they click the link and then don’t see any way to provide me with a reference. Two of these people are now concerned that this was just a way for someone to get their email addresses and add them to a spam list.

  • Lisa:

    I am so relieved to hear all these comments about the verification process. I am feeling DEEPLY resentful of this. I used Airbnb successfully this year, and am horrified to see what they’re asking. It is so invasive I can’t believe it. Like most people here, I’m sure, I’ve done vacation rentals, car rentals, bought tickets, booked everything and anything without this level of scrutiny. I finally capitulated to four levels of the scrutiny. This is ABSURD. If they want to offer this, then fine. But let the users decide how much they’re sharing and let hosts decide what they need.

Well, it was our bad luck to fall into that 25% when we booked an Airbnb place in Rome last weekend. My wife, an experienced and savvy traveler (with more than two million miles on one airline alone), always books our reservations, and expected the usual smooth and pleasant process when she was suddenly faced with this crazy new verification routine. Here’s how Airbnb explained her options after she declined to login with Facebook or Linkedin (neither of which she belongs to):

If you’re unable to verify your online ID using Facebook or LinkedIn, or if your account does not automatically satisfy the online ID requirements, you can create a video profile to serve as an alternative.

Your video will be visible on your profile as a live introduction of yourself to other Airbnb community members. To create your video profile, visit the “Photos and Video” section under Edit Profile. Consider using your first name, your current city, what you like about your neighborhood, and what you are looking for in a travel experience! Please do not include information about your government-issued ID, payment information, email address, last name, or any other personally identifiable information in your profile video.

After you’ve created a video profile, please email  trust at airbnb.com and we’ll help you complete the verification process.

I’ll pause to note here that my wife and and I have been around identity systems development for a very long time. In my case I’ve keynoted nearly ever Digital ID World, and have co-hosted all sixteen Internet Identity Workshops. Neither of us have ever seen an identity verification routine that required making a video to share with others.  We were, like… what?

So, after she declined to make the video and Airbnb cancelled our order, she sent an email to  trust at airbnb.com that included the following:

I’m perfectly happy to verify through a personal cloud provider ie: Personal.com, Virtrue, OwnYourInfo, Mydex, Gli.ph, or a trust network like Respect Network or Qiy. I suggest that you take a look at some of these services that work on the side of the customer, without exposing them to further surveillance and tracking of their personal data.

Airbnb replied,

Thank you for your email. Please accept our apologies if our verification process caused you any distress. As we are constantly working on improving our product and services, I’ll pass your feedback on accordingly. In the future, you can also submit your opinions or ideas on www.airbnb.com/feedback. Even when we are unable to accommodate all requests, we always value feedback from the community.

Airbnb is a platform for connecting individuals interested in having unique and personalized experiences. This is how Airbnb differs from the norm, as not everyone on Airbnb operates their business outside of Airbnb the way a normal bed and breakfast would. Please consider that you will be staying in the home or residence of another individual. At Airbnb we’re constantly striving to improve the level of trust between our users to instill confidence in the transactions between our users. Our verification process was designed to help improve that level of trust and allow users to fully enjoy their experience on Airbnb.

At Airbnb we’re constantly striving to improve the level of trust between our users to instill confidence in the transactions between our users. Our verification process was designed to help improve that level of trust and allow users to fully enjoy their experience on Airbnb.

Recent positive reviews do count towards verifying your Online identity but the reviews you received did not satisfy our system’s verification requirements. Unfortunately, if you don’t have a Facebook or LinkedIn account, the video profile is the only alternative available at this point. We offer several alternatives in hopes that one will work for you, but we understand that these situations do arise. That’s why we offer you the opportunity to verify your account by recording a 30 second video in which you can introduce yourself to the Airbnb community.

Please know that if you don’t want your video profile to be public, you can also record the clip using a digital camera or a smartphone and attach it to your response to this message. We’ll then verify your account without publishing the video.

This makes no sense to me. Are they saying Airbnb operates a social business, meaning one that places a premium on people exposing themselves to others, rather than on minimizing exposure? Are they saying that everybody in the Airbnb community is a potential “friend,” and thats’s why it makes sense to login with Facebook or Linkedin? And why the video? What’s to keep any community member from copying that video — or any personal information exposed through social media — and spreading it out on the open Web? Why would anybody trust Airbnb to keep that kind of thing from happening?

Given that Ghostery finds Airbnb using only six tracking systems (Facebook Connect, Google AdWords Conversion, Google Analytics, Google Tag Manager, MixPanel and New Relic) — a relatively small number for a commercial site — I doubt that Airbnb just wants to play the same advertising game that B2B companies like Google, Facebook, Twitter and other “social” sites play. Why should they, when they operate one of those very rare things in the “social” age: a real B2C business, for customers who actually pay for goods and services. That’s an enviable and valuable thing. And they’re screwing it up.

The “Verified ID” program fails because it alienates both the supply and the demand sides of the marketplace. It turns away good, loyal, paying customers, and denies hosts those customers’ bookings. Worse, it filters through only those customers who are comfortable exposing themselves through social media and in video performances. Do they really want to do that?

At some point it will dawn on Airbnb that this new system is worse than broken. When that dawn comes I suggest they do three things:

  1. Look into the list of companies and projects my wife mentioned above
  2. Join the Personal Identity Ecosystem Consortium (PDE.cc)
  3. Follow what’s happening with VRM and personal clouds — and get involved with those too

I also invite readers to weigh in with their own positive suggestions. No complaints or put-downs, please. We’re here to help.

Tags: , , , ,

(Cross-posted from the ProjectVRM blog.)

left r-buttonright r-buttonFor as long as we’ve had economies, demand and supply have been attracted to each other like a pair of magnets. Ideally, they should match up evenly and produce good outcomes. But sometimes one side comes to dominate the other, with bad effects along with good ones.

Such has been the case on the Web ever since it went commercial with the invention of the cookie in 1995, resulting in a  in which the demand side — that’s you and me — plays the submissive role of mere “users,” who pretty much have to put up with whatever rules websites set on the supply side.

Consistent with  (“Power corrupts; absolute power corrupts absolutely”) the near absolute power of website cows over user calves has resulted in near-absolute corruption of website ethics in respect to personal privacy.

This has been a subject of productive obsession by  and her team of reporters at The Wall Street Journal, which have been producing the  series (shortcut: http://wsj.com/wtk) since July 30, 2010, when Julia by-lined . The next day I called that piece a turning point. And I still believe that.

Today came another one, again in the Journal, in Julia’s latest, titled Web Firms to Adopt ‘No Track’ Button. She begins,

A coalition of Internet giants including Google Inc. has agreed to support a do-not-track button to be embedded in most Web browsers—a move that the industry had been resisting for more than a year.

The reversal is being announced as part of the White House’s call for Congress to pass a “privacy bill of rights,” that will give people greater control over the personal data collected about them.

The long White House press release headline reads,

We Can’t Wait: Obama Administration Unveils Blueprint for a “Privacy Bill of Rights” to Protect Consumers Online

Internet Advertising Networks Announces Commitment to “Do-Not-Track” Technology to Allow Consumers to Control Online Tracking

Obviously, government and industry have been working together on this one. Which is good, as far as it goes. Toward that point, Julia adds,

The new do-not-track button isn’t going to stop all Web tracking. The companies have agreed to stop using the data about people’s Web browsing habits to customize ads, and have agreed not to use the data for employment, credit, health-care or insurance purposes. But the data can still be used for some purposes such as “market research” and “product development” and can still be obtained by law enforcement officers.

The do-not-track button also wouldn’t block companies such as Facebook Inc. from tracking their members through “Like” buttons and other functions.

“It’s a good start,” said Christopher Calabrese, legislative counsel at the American Civil Liberties Union. “But we want you to be able to not be tracked at all if you so choose.”

In the New York Times’ White House, Consumers in Mind, Offers Online Privacy Guidelines Edward Wyatt writes,

The framework for a new privacy code moves electronic commerce closer to a one-click, one-touch process by which users can tell Internet companies whether they want their online activity tracked.

Much remains to be done before consumers can click on a button in their Web browser to set their privacy standards. Congress will probably have to write legislation governing the collection and use of personal data, officials said, something that is unlikely to occur this year. And the companies that make browsers — Google, Microsoft, Apple and others — will have to agree to the new standards.

No they won’t. Buttons can be plug-ins to existing browsers. And work has already been done. VRM developers are on the case, and their ranks are growing. We have dozens of developers (at that last link) working on equipping both the demand and the supply side with tools for engaging as independent and respectful parties. In fact we already have a button that can say “Don’t track me,” plus much more — for both sides. Its calle the R-button, and it looks like this: ⊂ ⊃. (And yes, those symbols are real characters. Took a long time to find them, but they do exist.)

Yours — the user’s — is on the left. The website’s is on the right. On a browser it might look like this:

r-button in a browser

Underneath both those buttons can go many things, including preferences, policies, terms, offers, or anything else — on both sides. One of those terms can be “do not track me.” It might point to a fourth party (see explanations here and here) which, on behalf of the user or customer, maintains settings that control sharing of personal data, including the conditions that must be met. A number of development projects and companies are already on this case. Some have personal data stores (PDSes), also called “lockers” or “vaults.” These include:

Three of those are in the U.S., one in Austria, one in France, one in South Africa, and three in the U.K. (All helping drive the Midata project by the U.K. government, by the way.) And those are just companies with PDSes. There are many others working on allied technologies, standards, protocols and much more. They’re all just flying below media radar because media like to look at what big suppliers and governments are doing. Speaking of which… 🙂

Here’s Julia again:

Google is expected to enable do-not-track in its Chrome Web browser by the end of this year.

Susan Wojcicki, senior vice president of advertising at Google, said the company is pleased to join “a broad industry agreement to respect the ‘Do Not Track’ header in a consistent and meaningful way that offers users choice and clearly explained browser controls.”

White House Deputy Chief Technology Officer Daniel Weitzner said the do-not-track option should clear up confusion among consumers who “think they are expressing a preference and it ends up, for a set of technical reasons, that they are not.”

Some critics said the industry’s move could throw a wrench in a separate year-long effort by the World Wide Web consortium to set an international standard for do-not-track. But Mr. Ingis said he hopes the consortium could “build off of” the industry’s approach.

So here’s an invitation to the White House, Google, the 3wC, interested BigCos (including CRM companies), developers of all sizes and journalists who are interested in building out genuine and cooperative relationships between demand and supply::::

Join us at IIW — the Internet Identity Workshop — in Mountain View, May 1-3. This is the unconference where developers and other helpful parties gather to talk things over and move development forward. No speakers, no panels, no BS. Just good conversation and productive work. It’s our fourteenth one, and they’ve all been highly productive.

As for the r-button, take it and run with it. It’s there for the development. It’s meaningful. We’re past square one. We’d love to have all the participation we can get, from the big guys as well as the little ones listed above and here.

To help get your thinking started, visit this presentation of one r-button scenario, by Adam Marcus of MIT. Here’s another view of the same work, which came of of a Google Summer of Code project through ProjectVRM and the Berkman Center:

(Props to Oshani Seneviratne and David Karger, also both of MIT, and Ahmad Bakhiet, of Kings College London, for work on that project.)

If we leave fixing the calf-cow problem entirely up to the BigCos and BigGov, it won’t get fixed. We have to work from the demand side as well. In economies, customers are the 100%.

Here are some other stories, mostly gathered by Zemanta:

All look at the symptoms, and supply-side cures. Time for the demand side to demand answers from itself. Fortunately, we’ve been listening, and the answers are coming.

Tags: , , , , , , , ,

CRM and IIW

It just occurred to me that everything being worked on at IIW is meaningful to CRM. I had been thinking that only the VRM stuff was meaningful, but I realize now that all the IIW stuff is, because — from a CRM perspective — it’s all about customer empowerment. And empowered customers are entities that CRM will welcome, sooner or later.

Here’s the list of IIW topics on the IIW home page:

  • Open Standards that have been born and developed at IIW – OpenID, OAuth, Activity Streams, Portable Contacts, Salmon Protocol, SCIM, UMA ….
  • The Federated Social Web
  • Vendor Relationship Management
  • Personal Data Services –  collection, storage and value generation
  • Anonymity Pseudonymity and Reputation Online (think google+ controversy)
  • Legal Innovation including, Information Sharing Agreements, Data Ownership Agreements and the development of “trust” frameworks.
  • NSTIC – the National Strategy for Trusted Identities in Cyberspace (it uses the term “user-centric identity” 4 times & “citizen-centric identity” once)
  • Cloud Identity and the intersection of enterprise ID and people (consumer) ID

With this in mind we (a bunch of VRM and IIW people) decided that Wednesday afternoon is when we’ll have the VRM+CRM session, although we can have CRM sessions anytime, because the whole workshop is an unconference and participants choose the topics. But if you’re into the future of CRM, that afternoon session will be a good one to hit.

There is also the whole next day, currently thus described:

Thursday is Yukon Day: One of the longtime themes of IIW is how identity and personal data intersect.  Many important discussions about Vendor Relationship Management (VRM) have also taken place at IIW.  In recognition of how personal data and identity are intertwined, the third day of the IIW, will be designated “IIW + Yukon” and will stress the emerging personal data economy.  The primary theme will be personal data control and leverage, where the individual controls and drives the use of their own data, and data about them held by other parties.

This isn’t social. It’s personal.  This day you can expext open-space style discuss ions of personal data stores (PDS), PDS ecosystems, and VRM.  One purpose of Yukon is to start to focus on business models and value propositions, so we will specifically be reaching out to angels and VC’s who are interested in personal data economy plays and inviting them to attend.

Yukon” is a play on “You Control.”

So, if CRM is your thing, IIW would be a good place to see what’s coming in CRM’s direction.

Look forward to seeing some of ya’ll there.

Enhanced by Zemanta

Tags: , ,

OwnerIQ sez,

This video explains what they mean.

Compare those people and the way they define themselves—as products (a BMW, an iPad)—to the way Walt Whitman defined himself, just before Industry won the Industrial Revolution:

I know I am solid and sound.
To me the converging objects of the universe
perpetually flow.
All are written to me,
and I must get what the writing means.
I know I am deathless.
I know this orbit of mine cannot be swept
by a carpenter’s compass,

I know that I am august,
I do not trouble my spirit to vindicate itself
or be understood.
I see that the elementary laws never apologize.

My foothold is tenoned and mortised in granite.
I laugh at what you call dissolution,
And I know the amplitude of time.

It is time to explain myself. Let us stand up.

I am an acme of things accomplished,
and I an encloser of things to be.
Rise after rise bow the phantoms behind me.
Afar down I see the huge first Nothing,
the vapor from the nostrils of death.
I know I was even there.
I waited unseen and always.
And slept while God carried me
through the lethargic mist.
And took my time.

Long I was hugged close. Long and long.
Infinite have been the preparations for me.
Faithful and friendly the arms that have helped me.

Cycles ferried my cradle, rowing and rowing
like cheerful boatmen;
For room to me stars kept aside in their own rings.
They sent influences to look after what was to hold me.

Before I was born out of my mother
generations guided me.
My embryo has never been torpid.
Nothing could overlay it.
For it the nebula cohered to an orb.
The long slow strata piled to rest it on.
Vast vegetables gave it substance.
Monstrous animals transported it in their mouths
and deposited it with care.

All forces have been steadily employed
to complete and delight me.
Now I stand on this spot with my soul.

I know that I have the best of time and space.
And that I was never measured, and never will be measured.

I’m sure he owned more stuff than “a rainproof coat, good shoes and a staff cut from the wood.” But hey, maybe not. But whatever he had, what he did mattered more. Here’s what he does for each of us:

Each man and woman of you I lead upon a knoll.
My left hand hooks you about the waist,
My right hand points to landscapes and continents,
and a plain public road.

Not I, nor any one else can travel that road for you.
You must travel it for yourself.

It is not far. It is within reach.
Perhaps you have been on it since you were born
and did not know.
Perhaps it is everywhere on water and on land.

Shoulder your duds, and I will mine,
and let us hasten forth.

If you tire, give me both burdens and rest the chuff of your hand on my hip.
And in due time you shall repay the same service to me.

Long enough have you dreamed contemptible dreams.
Now I wash the gum from your eyes.
You must habit yourself to the dazzle of the light and of every moment of your life.

Long have you timidly waited,
holding a plank by the shore.
Now I will you to be a bold swimmer,
To jump off in the midst of the sea, and rise again,
and nod to me and shout,
and laughingly dash your hair.

I am the teacher of athletes.
He that by me spreads a wider breast than my own
proves the width of my own.
He most honors my style
who learns under it to destroy the teacher.

Do I contradict myself?
Very well then. I contradict myself.
I am large. I contain multitudes.

I concentrate toward them that are nigh.
I wait on the door-slab.

Who has done his day’s work
and will soonest be through with his supper?
Who wishes to walk with me.

The spotted hawk swoops by and accuses me.
He complains of my gab and my loitering.

I too am not a bit tamed. I too am untranslatable.
I sound my barbaric yawp over the roofs of the world.

I submit that wild and free customers are far more potent participants in the marketplace than “consumers” of “brands.”

You know, like this:

The time has come to choose your species. If you’re just what you own, you’re veal.

Tags:

We’re doing something different at next week’s IIW: inviting investors. So here’s a pitch that should resonate with investors — especially in Silicon Valley, where IIW happens (appropriately, at the Computer History Museum in Mountain View)…

Here’s a chance to check in on development work on a huge new disruptive market play: empowering customers as independent players in the marketplace, and building new businesses that serve liberated customers who want choices other than those between silos and walled gardens.

We’re talking here about equipping demand to drive supply, rather than just the reverse. (Which is fine and necessary, but it’s been done. A lot.)

We’re talking about creating tools and services proving at last that free customers are more valuable than captive ones.

We’re talking about how much more can happen in a marketplace where customers collect, control and selectively share their own data, for their own purposes — which nobody on the vendor side needs to guess about, because the customer knows, has the intent, and has the money.

We’ve been working on these tools for awhile now. My own work, both through IIW (which I help organize) and ProjectVRM at Harvard’s Berkman Center, has been to encourage development of tools that liberate and empower customers in the marketplace. Thanks also to the good work of allied efforts, many of these tools now exist, and more are coming along.

These tools fall into many categories. Some are open source efforts that equip developers with essential building material. Some are commercial efforts at the angel or pre-angel stages. Some are already funded. Some are existing businesses looking for partners. Whatever breed they are, all should be interesting to investors looking to place bets on customers, and on companies that align with customer interests and intentions in the marketplace.

IIW — which stands for Internet Identity Workshop — has always been about development. Since 2005 we’ve been getting together twice a year to share ideas and move work forward. As a workshop, it’s organized as an unconference. No speakers, no panels. Participants suggest topics and everybody breaks out to rooms and tables where those topics get discussed, whiteboards get marked up, and in many cases code gets shown and improved.

On Tuesday and Wednesday, May 3 and 4, the workshop will follow the usual routine. But on Thursday, May 5, we’ll visit a new topic which we’re calling “Yukon”: a one-word play on the line, “You control your own data.” As it says here,

Something New: IIW + Yukon: One of the longtime themes of IIW is how identity and personal data intersect. Many important discussions about Vendor Relationship Management (VRM) have also taken place at IIW. In recognition of how personal data and identity are intertwined, the third day of the IIW, May 5, will be designated “IIW + Yukon” and will stress the emerging personal data economy. The primary theme will be personal data control and leverage, where the individual controls and drives the use of their own data, and data about them held by other parties.

This isn’t social. It’s personal. This day you can expext open-space style discussions of personal data stores (PDS), PDS ecosystems, and VRM. One purpose of Yukon is to start to focus on business models and value propositions, so we will specifically be reaching out to angels and VC’s who are intersted in personal data economy plays and inviting them to attend.

Whether or not you’re an investor, or just friends with some (as pretty much all of us are these days), you’re invited. Looking forward to seeing you there.

Tags: , , , , ,

If you want to know what data you’re sharing — without (thus far) knowing about it — on Facebook, ISharedWhat.com is the way. You run it as a simulator and what’s what.

It was developed by Joe Andrieu, a stalwart contributor of wisdom and code to the VRM community, and has been covered by and tweeted by the Wall Street Journal’s @WhatTheyKnow.

It’s what we call a fourth party app, meaning it performs as an instrument of your intentions, rather than a seller’s or a site operator’s. Check it out and give Joe feedback.

Tags: , , , , , ,

« Older entries