Personal clouds

You are currently browsing the archive for the Personal clouds category.

Fuse is more than a device and a smartphone app to go with it. The world is full of those already.

Fuse is the first product in the digital age that can blow up every one of the silos built to trap personal data and limit personal independence.

Fuse does that by putting you — literally — in the driver’s seat of your life.

Fuse is also the first product to show how your own “Internet of things” can be fully yours — and truly integrated in ways that work for you — without requiring that you become a serf in some company’s castle.

Fuse is an invention of Phil Windley and his team at Kynetx, who are committed to the freedom,  independence and self-empowerment of individuals: to making you a driver of your own life and your own stuff, and not just a “user” of others’ products and services. And to letting you be “social” in your own ways, as you are in your everyday life outside the Web.

This is why Fuse is Net-native, not Web-native (though it uses the Web too). This matters because the Net was created as a decentralized World of Ends, where every node can be sovereign and independent, as well as zero functional distance from every other node. The Web could have been the same, but instead it grew on top of the Net, along lines defined by client-server architecture (aka calf-cow), which makes everything there centralized: you’re always a client, and always at the mercy of servers. This is why the browser, which started out as a vehicle on the Information Superhighway, turned into a shopping cart that gets re-skinned at every commercial site you visit, and carries tracking beacons so you can be a better target for advertising.

Fuse drives under and away from that model, which has become terribly corrupted, and toward what Bob Frankston (sitting next to me as I write this) calls the “boundary less” and “permissionless” world.

If Fuse succeeds, it will be a critical first step toward building the fully independent vehicle for the fully independent human being on that same old Information Superhighway. And it will do that that by starting with your own car.

There are only a few hours left for the Fuse Kickstarter campaign. The sum required is only $60,000, and contributions have passed $50,ooo already. So help put it over the top. It could be the most leveraged investment you’ll ever make in the future of personal independence in the networked world.

More background in my first post on Fuse.

[Later, same day…] Goal reached:

294 backers
$63,202 pledged of $60,000 goal
Looking forward to seeing Fuse’s pudding prove the headline above. 🙂

silosThe Forrest of Silos problem I describe in the last post is exactly what Josh Marshall of TPM is dealing with when he says (correctly) “there’s no single digital news publishing model” — and what Dave Winer also correctly talks about here.)

Every publisher requiring a login/password, or using ‘social logins’ such as those provided by Facebook and Twitter, is living in an administrative hell that burns no less because it’s normative in the extreme. That every pub has its own login/pw, subscription system and/or social login is a perfect example of centralized systems failing to solve the problems of centralization.

We need decentralized solutions: ones that work first at the personal level and after that at the social and organizational ones. Only by starting with the individual will we get:

  • One standard way that any one of us can subscribe, and manage subscriptions, for any number of publications, using tools and services that any variety of providers can offer, but any one of us can leave for other tools and providers.
  • One standard way that we can change our address, phone number, email, last name or other personal data, for every publication we deal with, at once. We can do that, for example,  in our own personal cloud — a standards-based one that’s ours alone, using open code at the base level. (A bonus link about that.)
  • One standard way we can advertise our own wants, needs and other intentions to the marketplace, securely, with minimized fear of surveillance or other offenses to our privacy.

None of that can be done with yet another centralized private service such as we get today from Apple, Google, Facebook and Twitter.

I’ve believed since long before I co-wrote Cluetrain that distributed and decentralized personal tools were the only way to solve the problems of centralization and create countless new opportunities for personal, social and economic growth in the world. It’s why I started ProjectVRM, and why we have a growing list of developers working to liberate individuals and prove that free customers are worth more than captive ones.

I believed in this work because we already see it proven in the world by personal computers, the Internet and its liberating standards and protocols. Those are decentralized too. All I’m talking about here is standing new solutions on top of those old shoulders.

This is not to knock anything social, by the way. Of course we are social beings. But we are also, as individuals, decentralized, except to ourselves. That’s what I (and others, such as Devon Loffreto) mean when we talk about (for example) sovereign identity.

None of us will solve the Forest of Silos problem by creating bigger and better silos, or by making them ore “centric” toward individuals.

In , opens with this sentence: “On any person who desires such queer prizes, New York will bestow the gift of loneliness and the gift of privacy.” Sixty-four years have passed since White wrote that, and it still makes perfect sense to me, hunched behind a desk in a back room of a Manhattan apartment.

That’s because privacy is mostly a settled issue in the physical world, and a grace of civilized life. Clothing, for example, is a privacy technology. So are walls, doors, windows and shades.

Private spaces in public settings are well understood in every healthy and mature culture. This is why no store on Main Street would plant a tracking beacon in the pants of a visiting customer, to report back on that customer’s activities — just so the store or some third party can “deliver” a better “experience” through advertising. Yet this kind of thing is beyond normative on the Web: it is a huge business.

Worse, the institution we look toward for protection from this kind of unwelcome surveillance — our government — spies on us too, and relies on private companies for help with activities that would be a crime if the  still meant what it says. ( more than two years ago.)

I see two reasons why privacy is now under extreme threat in the digital world — and the physical one too, as surveillance cameras bloom like flowers in public spaces, and as marketers and spooks together look toward the “Internet of Things” for ways to harvest an infinitude of personal data.

Reason #1

The was back-burnered when  (aka ) got baked into e-commerce in the late ’90s. In a single slide  summarizes what happened after that. It looks like this:

The History of E-commerce
1995: Invention of the cookie.
The end.

For a measure of how far we have drifted away from the early promise of networked life, re-read ‘s “Death From Above,” published in January 1995, and his “Declaration of the Independence of Cyberspace,” published one year later. The first argued against asymmetrical provisioning of the Net and the second expressed faith in the triumph of nerds over wannabe overlords.

Three years later  was no less utopian. While it is best known for its 95 Theses (which include “” and ““) its most encompassing clue came before of all those. Chris Locke wrote it, and here’s what it says, boldface, color and all:

if you only have time for one clue this year, this is the one to get…
we are not seats or eyeballs or end users or consumers. we are human beings and our reach exceeds your grasp. deal with it.

Note the first and second person voices, and the possessive case. Our reach was everybody’s. Your grasp was companies’.

Fourteen years later, companies have won. Our reach has not exceeded their grasp. In fact, their grasp is stronger than ever.

Another irony: the overlords are nerds too. And  they lord over what Bruce Schneier calls a feudal system:

Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android phones. Others have pledged allegiance to Apple: We have Macintosh laptops, iPhones, and iPads; and we let iCloud automatically synchronize and back up everything. Still others of us let Microsoft do it all. Or we buy our music and e-books from Amazon, which keeps records of what we own and allows downloading to a Kindle, computer, or phone. Some of us have pretty much abandoned e-mail altogether … for Facebook.

These vendors are becoming our feudal lords, and we are becoming their vassals. We might refuse to pledge allegiance to all of them – or to a particular one we don’t like. Or we can spread our allegiance around. But either way, it’s becoming increasingly difficult to not pledge allegiance to at least one of them.

Reason #2

We have loosed three things into the digital world that we (by which I mean everybody) do not yet fully comprehend, much less deal with (through policy, tech or whatever). Those are:

  1. Ubiquitous computing power. In the old days only the big guys had it. Now we all do.
  2. Ubiquitous Internet access. This puts us all at zero virtual distance from each other, at costs that also veer toward zero as well.
  3. Unlimited ability to observe, copy and store data, which is the blood and flesh of the entire networked world.

In tech, what can be done will be done, sooner or later, especially if it’s possible to do it in secret — and if it helps make money, fight a war or both. This is why we have bad acting on a massive scale: from click farms gaming the digital advertising business, to the NSA doing what we now know it does.

Last month I gave a keynote at an  event in New York. One of my topics was personal privacy, and how it might actually be good for the advertising business to respect it. Another speaker was , a “gentleman hacker” and CEO of WhiteOps, “an internet security company focused on the eradication of ad fraud.” He told of countless computers and browsers infected with bots committing click-fraud on a massive scale, mostly for Russian hackers shunting $billions from the flow of money down the online advertising river. The audience responded with polite applause. Privacy? Fraud? Why care? The money’s rolling in. Make hay while the power asymmetry shines.

Just today an executive with a giant company whose name we all know told me about visiting “click farms” in India, which he calls “just one example of fraud on a massive scale that nobody in the industry wants to talk about.” (Credit where due: the IAB wouldn’t have had us speaking there if its leaders didn’t care about the issues. But a .org by itself does not an industry make.)

Yet I’m not discouraged. In fact, I’m optimistic.

These last few months I’ve been visiting dozens of developers and policy folk from Europe to Australia, all grappling productively with privacy issues, working on the side of individuals, and doing their best to develop enlightened policy, products and services.

I can report that respect for privacy — the right to be left alone and to conceal what one wishes about one’s self and one’s data — is far more evolved elsewhere than it is in the U.S. So is recognition that individuals can do far more with their own data than can any big company (or organization) that has snarfed that data up. In some cases this respect takes the form of policy (e.g. the EU Data Protection Directive). In other cases it takes the form of advocacy, or of new businesses. In others it’s a combination of all of those and more.

Some examples:

 is a policy and code development movement led by Ann Cavoukian, the Information & Privacy Commissioner of Ontario. Many developers, enterprises and governments are now following her guidelines. (Which in turn leverage the work of Helen Nissenbaum.)

, the Fondation Internet Nouvelle Génération, is a think tank of leading French developers, scientists, academics and business folk, convened to guide digital transformation across many disciplines, anchored in respect for the individual and his or her full empowerment (including protection of privacy), and for collective action based on that respect.

 is a Fing project in which six large French companies — Orange, La Poste, Cap-Digital, Monoprix, Alcatel-Lucent and Societe Generale — are releasing to 300 customers personal data gathered about those customers, and inviting developers to help those customers do cool things on their own with that data.

The  in the UK is doing a similar thing, with twenty UK companies and thousands of customers.

Both Midata and Etalab in France are also working the government side, sharing with citizens data collected about them by government agencies. For more on the latter read Interview with Henri Verdier: Director of Etalab, Services of the French Prime Minister. Also see Open Data Institute and

In Australia,    and  are working on re-building markets from the customer side, starting with personal control and required respect for one’s privacy as a base principle.

In the U.S. and Europe, companies and open source development groups have been working on personal data “stores,” “lockers,” “vaults” and “clouds,” where individuals can harbor and use their own data in their own private ways. There is already an  and a language for “” and “pclouds” for everything you can name in the Internet of Things. I posted something recently at HBR about one implication for this. (Alas, it’s behind an annoying registration wall.)

On the legal front, Customer Commons is working with the  at the Berkman Center on terms and privacy requirements that individuals can assert in dealing with other entities in the world. This work dovetails with , the  and others.

I am also encouraged to see that the most popular browser add-ons and extensions are ones that block tracking, ads or both. AdblockPlus, Firefox’s Privowny and  are all in this game, and they are having real effects. In May 2012,  a 9.26% ad blocking rate in North America and Europe. Above that were Austria (22.5%), Hungary, Germany, Finland, Poland, Gibraltar, Estonia and France. The U.S. was just below that at 8.72%. The top blocking browser was Firefox (17.81%) and the bottom one was Explorer (3.86%). So it was no surprise to see Microsoft jump on the Do Not Track bandwagon with its latest browser version. In sum what we see here is the marketplace talking back to marketing, through developers whose first loyalties are to people.

(The above and many other companies are listed among developers here.)

More context: it’s still early. The Internet most of us know today is just eighteen years old. The PC is thirty-something. Pendulums swing. Tides come and go. Bubbles burst.

I can’t prove it, but I do believe we have passed Peak Surveillance. When Edward Snowden’s NSA revelations hit the fan in May, lots of people said the controversy would blow over. It hasn’t, and it won’t. Our frogs are not fully boiled, and we’re jumping out of the pot. New personal powers will be decentralized. And in cases where those powers are centralized, it will be in ways that are better aligned with individual and social power than the feudal systems of today. End-to-end principles are still there, and still apply.

Another reason for my optimism is metaphor, the main subject in the thread below. In , George Lakoff and Mark Johnson open with this assertion: The mind is inherently embodied. We think metaphorically, and our metaphorical frames arise from our bodily experience. Ideas, for example, may not be things in the physical sense, but we still talk of “forming,” “getting,” “catching” and “throwing out” ideas. Metaphorically, privacy is a possession. We speak of it in possessive terms, and as something valuable and important to protect — because this has been our experience with it for as long as we’ve had civilization.

Possession is “nine-tenths of the law” because it is nine-tenths of the three-year-old. She says “It’s mine!” because she has hands with thumbs that give her the power to grab. Possession begins with what we can hold.

There is also in our embodied nature a uniquely human capacity called indwelling. Through indwelling our senses extend outward through our clothes, our tools, our vehicles, enlarging the boundaries of what we do and experience in the physical world. When drivers speak of “my wheels” and pilots of “my wings,” it is because their senses dwell in those things as extensions of their bodies.

This relates to privacy through exclusion: my privacy is what only I have.

The clothes we wear are exclusively ours. We may wear them to express ourselves, but their first purpose is to protect and conceal what is only ours. This sense of exclusivity also expands outward, even though our data.

 “the Internet is a copy machine.” And it is. We send an email in a less literal sense than we copy it. Yet the most essential human experience is ambulation: movement. This is why we conceive life, and talk about it, in terms of travel, rather than in terms of biology. Birth is arrival, we say. Death is departure. Careers are paths. This is why, when we move data around, we expect its ownership to remain a private matter even if we’re not really moving any of it in the postal sense of a sending a letter.

The problem here is not that our bodily senses fail to respect the easily-copied nature of data on networks, but that we haven’t yet created social, technical and policy protocols for the digital world to match the ones we’ve long understood in the physical world. We still need to do that. As embodied beings, the physical world is not just our first home. It is the set of reference frames we will never shake off, because we can’t. And because we’ve had them for ten thousand years or more.

The evolutionary adaptation that needs to happen is within the digital world and how we govern it, not the physical one.

Our experience as healthy and mature human beings in the physical world is one of full agency over personal privacy. In building out our digital world — something we are still just beginning to do — we need to respect that agency. The biggest entities in the digital world don’t yet do that. But that doesn’t mean they can’t. Especially after we start leaving their castles in droves.

Tags: , , , ,

[Trieste, Italy, 12:02am Friday 21 May 2013 — As I say in the comments here, Airbnb has responded to this post, explaining that a bug in the system was involved. While that might patch Airbnb’s relationship with my wife and I, the bridge remains burned with other customers as long as Airbnb’s Verified ID system retains its current requirements. They still need the kind of help only good hackers and loyal customers can provide. — Doc]

My wife and I are veteran Airbnb customers who have been happy with the company from the start. We like the prices, the experiences, the whole thing. As happy customers, we have also been spreading the love far and wide, pitching many new customers on Airbnb as a better way to stay when traveling. We want to continue spreading that love, even though we — and many other loyal customers — are now on the far side of a bridge Airbnb burned when it launched its new identity Verified ID system, which they explain (at that link) this way:

Verified ID provides a connection between the online and offline spaces. Airbnb users can earn a “Verified ID” badge on their profile by providing their online identity (via existing Airbnb reviews, LinkedIn, or Facebook) and matching it to offline ID documentation, such as confirming personal information or scanning a photo ID. The name provided by both channels must match for verification to succeed.

Starting today, Airbnb will require a random 25% of users in the USA to go through the Verified ID process. Soon, we’ll expand this requirement to users around the world. We hope that hosts and guests worldwide will see the benefits of interacting with users who complete Verified ID. Our goal is for all Airbnb members to have Verified ID eventually.

Any Airbnb host can now require their prospective guests to obtain Verified IDs before booking. Trust runs in both directions, so any host who requests this condition must also get verified.

Some of the comments under the post were positive, but many went the other way. Here are a few…


I am an Airbnb host. Naturally, safety is always a concern. Despite that, I find this move objectionable, dishonest, misguided, and outright offensive.

  1. As a host, it is up to me to choose who I allow in my home. I like that I can decide how many requirements to place on my guests. Should I choose to place strict requirements, I get more protection and probably fewer bookings. I like having the choice. Airbnb just took the choice away from me and I’m not happy about it.
  2. You are making it substantially harder for guests to book on Airbnb. These standards will reduce the number of bookings we receive as hosts. You reduce our bookings and remove our ability to choose. Hosts should have the ability to choose.
  3. You want people to send you their photo ID / passport? Are you out of your *&#%& mind? Banks lose customer data all the time and they have some of the most stringent standards possible. Despite that, you pretend that you all are immune. You claim that having people send some of their most personal information over the internet will make them safer. You don’t make them safer; you make them MUCH LESS SAFE. When you have your data breached and you get sued, you will deserve every bit of the penalty.
  4. Why did you require a random 25% of users? Why not all users? Because you know you’d get too much negative feedback all at once and you could control the situation better if you phase it in. Either you are lying or you are putting hosts at risk. Shameful either way.
  5. “enhanced trust” I hate your Orwellian crock of sh&# phrasing. You should help the prison system rebrand their “full body cavity search”
  6. As a traveler myself, I was one of the 25% selected for “enhanced trust”. I have over 50 positive reviews from guests and hosts alike. You know where I live! There is no more trust that could possibly be had. Use a little common sense. This is the kind of nonsense I’d expect from the DMV, not from a blossoming enterprise.
  7. When the hell did facebook become an authority on people’s identities? I suspect that you have much more interesting motives for forcing people to connect their profiles to facebook. Quit trying to mine data under the guise of trust.
  • Deborah:

    my Facebook account did not work for Airbnb so they asked me to make a personal video talking about such things as why i like my neighborhood. I’m sorry, but I find this creepy. think of the inevitable steps up: photos of tattoos or birthmarks? proof of baptism? defense of fashion choices? that fragrant blend of californian cumbayah and capitalism. yechh….

  • Also from Deborah:

    I was just trying to book a short stay and the rigmarole and emails this verification process generated was ridiculous, but what caused me to cancel the reservation was this weird audition video request. Nor will I ever have anything further to do with Airbnb; not because of the hassle, but because this new verification process is invasive and puts my identity at risk. I have never encountered any comparable vetting for any purpose and it’s depressing to realize people will unthinkingly accept this kind of exploitation of information. I guess the thinking is if you value your privacy and identity above “trust” you don’t measure up to the Airbnb “community”. And is it a “community”? Really??

  • kim:

    well this is irritating. i have neither a facebook nor linkedin account, nor do i want either. i’ve been a positively-reviewed airbnb member for 2 years. although this article says it will look at positive reviews as online verification, it does not seem to be the case.
    and as for the 24/7 customer service? at this moment there is NO chat available, phone number is reserved for emergencies, and they are not responding to e-mail. so my booking is in limbo. if you’re going to implement this new feature, at least have the customer service to support it!<

  • Mle Davis

    Agree with others that the new verification process is insane and insulting. I have used your service for two years. My “reality” has been verified by my hosts and my guests: people in four countries have left feedback about their experiences with me. We have talked on the phone. You have my social security number from when you sent me tax documents. You have my credit card on file. I”m happy to send you my drivers license, but don’t see why you would need it, when you already have the rest. There is just no way I”m linking up my facebook account so you can datamine my friends, keep an eye on my day to day activity, or examine my relationships. There are enough safety checks on me through the relationship we’ve already developed. Please reconsider this stupidity.

  • E:

    Just had a reservation cancelled tonight because I did not complete the verification process. I inadvertently skipped the second step in the process which is give them access to my facebook account and contacts. I guess it doesn’t matter that I have been a member for almost three years and have rented through airbnb more than 15 times and have ALL positive reviews. I see this as an attempt to gather data for marketing purposes. Why else would they need access to facebook or linked in. Airbnb is going down hill. I have had more and more problems with them over the past 6 months. It was a great idea in the begining, but I think they are imploding!

  • Tony:

    I’m new to airbnb and I’m not crazy about the idea of scanning my driver’s license or passport and sending that to you. How do I know the faceless employees of whatever company which gets this information can be trusted with it?…
    … before you go to these extraordinary steps, why not fix the site so that friends can give me references. As I said, I’m new and (per your instructions) have asked friends through the site (both by email and facebook) to provide me with a reference. No one has done so yet and three have written back to say that they click the link and then don’t see any way to provide me with a reference. Two of these people are now concerned that this was just a way for someone to get their email addresses and add them to a spam list.

  • Lisa:

    I am so relieved to hear all these comments about the verification process. I am feeling DEEPLY resentful of this. I used Airbnb successfully this year, and am horrified to see what they’re asking. It is so invasive I can’t believe it. Like most people here, I’m sure, I’ve done vacation rentals, car rentals, bought tickets, booked everything and anything without this level of scrutiny. I finally capitulated to four levels of the scrutiny. This is ABSURD. If they want to offer this, then fine. But let the users decide how much they’re sharing and let hosts decide what they need.

Well, it was our bad luck to fall into that 25% when we booked an Airbnb place in Rome last weekend. My wife, an experienced and savvy traveler (with more than two million miles on one airline alone), always books our reservations, and expected the usual smooth and pleasant process when she was suddenly faced with this crazy new verification routine. Here’s how Airbnb explained her options after she declined to login with Facebook or Linkedin (neither of which she belongs to):

If you’re unable to verify your online ID using Facebook or LinkedIn, or if your account does not automatically satisfy the online ID requirements, you can create a video profile to serve as an alternative.

Your video will be visible on your profile as a live introduction of yourself to other Airbnb community members. To create your video profile, visit the “Photos and Video” section under Edit Profile. Consider using your first name, your current city, what you like about your neighborhood, and what you are looking for in a travel experience! Please do not include information about your government-issued ID, payment information, email address, last name, or any other personally identifiable information in your profile video.

After you’ve created a video profile, please email  trust at and we’ll help you complete the verification process.

I’ll pause to note here that my wife and and I have been around identity systems development for a very long time. In my case I’ve keynoted nearly ever Digital ID World, and have co-hosted all sixteen Internet Identity Workshops. Neither of us have ever seen an identity verification routine that required making a video to share with others.  We were, like… what?

So, after she declined to make the video and Airbnb cancelled our order, she sent an email to  trust at that included the following:

I’m perfectly happy to verify through a personal cloud provider ie:, Virtrue, OwnYourInfo, Mydex,, or a trust network like Respect Network or Qiy. I suggest that you take a look at some of these services that work on the side of the customer, without exposing them to further surveillance and tracking of their personal data.

Airbnb replied,

Thank you for your email. Please accept our apologies if our verification process caused you any distress. As we are constantly working on improving our product and services, I’ll pass your feedback on accordingly. In the future, you can also submit your opinions or ideas on Even when we are unable to accommodate all requests, we always value feedback from the community.

Airbnb is a platform for connecting individuals interested in having unique and personalized experiences. This is how Airbnb differs from the norm, as not everyone on Airbnb operates their business outside of Airbnb the way a normal bed and breakfast would. Please consider that you will be staying in the home or residence of another individual. At Airbnb we’re constantly striving to improve the level of trust between our users to instill confidence in the transactions between our users. Our verification process was designed to help improve that level of trust and allow users to fully enjoy their experience on Airbnb.

At Airbnb we’re constantly striving to improve the level of trust between our users to instill confidence in the transactions between our users. Our verification process was designed to help improve that level of trust and allow users to fully enjoy their experience on Airbnb.

Recent positive reviews do count towards verifying your Online identity but the reviews you received did not satisfy our system’s verification requirements. Unfortunately, if you don’t have a Facebook or LinkedIn account, the video profile is the only alternative available at this point. We offer several alternatives in hopes that one will work for you, but we understand that these situations do arise. That’s why we offer you the opportunity to verify your account by recording a 30 second video in which you can introduce yourself to the Airbnb community.

Please know that if you don’t want your video profile to be public, you can also record the clip using a digital camera or a smartphone and attach it to your response to this message. We’ll then verify your account without publishing the video.

This makes no sense to me. Are they saying Airbnb operates a social business, meaning one that places a premium on people exposing themselves to others, rather than on minimizing exposure? Are they saying that everybody in the Airbnb community is a potential “friend,” and thats’s why it makes sense to login with Facebook or Linkedin? And why the video? What’s to keep any community member from copying that video — or any personal information exposed through social media — and spreading it out on the open Web? Why would anybody trust Airbnb to keep that kind of thing from happening?

Given that Ghostery finds Airbnb using only six tracking systems (Facebook Connect, Google AdWords Conversion, Google Analytics, Google Tag Manager, MixPanel and New Relic) — a relatively small number for a commercial site — I doubt that Airbnb just wants to play the same advertising game that B2B companies like Google, Facebook, Twitter and other “social” sites play. Why should they, when they operate one of those very rare things in the “social” age: a real B2C business, for customers who actually pay for goods and services. That’s an enviable and valuable thing. And they’re screwing it up.

The “Verified ID” program fails because it alienates both the supply and the demand sides of the marketplace. It turns away good, loyal, paying customers, and denies hosts those customers’ bookings. Worse, it filters through only those customers who are comfortable exposing themselves through social media and in video performances. Do they really want to do that?

At some point it will dawn on Airbnb that this new system is worse than broken. When that dawn comes I suggest they do three things:

  1. Look into the list of companies and projects my wife mentioned above
  2. Join the Personal Identity Ecosystem Consortium (
  3. Follow what’s happening with VRM and personal clouds — and get involved with those too

I also invite readers to weigh in with their own positive suggestions. No complaints or put-downs, please. We’re here to help.

Tags: , , , ,

I first heard QR codes called “robot barf” yesterday, when JP said it. Got a good laugh out of it too, because: yeah, if a robot could barf, that’s what it would look like.

Digging back, it looks like the first source of the joke is Andy Roberts here, or Jon Mitchell here, both of whom posted on 27 October, 2011.

Kevin Marks followed in the same vein with QR Codes, bad idea or terrible idea? on 28 January 2012. There Kevin wrote, among other things, “QR Codes ignore years of research and culture on how to communicate meaning in symbolic form designed to be captured by image processing tools behind a lens. We have this technology. It is called writing.”

Both John and Kevin pointed to, an innocuous-looking Japanese site without a QR code anywhere to be seen. Its title, translated by Google in Chrome, is “Floor coatings proficient poisoning.” The subtitle is “Sister and sister floor coating proficient.” The body copy begins, “By the way, eh had fallen at the door my sister When you go home? What does this murder? The’m was about to close the door involuntarily thought such as.Voice of sister sank to the floor face willl “welcome back” I heard, I went to the front door or what ‘s also Ninen.” Thus speaks the technology we call writing.

Citing Kevin, JP asked me if there was a difference between a QR code and a link. I said yes, because the author can make a QR code mean anything, and a QR code can also have any number of authors, or documents, or you-name-it, associated with it. I didn’t have the time make more of a case than that, but now I do, so here goes.

Think of a QR code as a window to anything, rather than as a form of writing.

For example, a QR code can be window on a product to the relationship between the owner and the company that made the product — and, for that matter, with anybody else involved. That’s where Phil Windley goes in his post titled Using Products to Build Customer Relationships. Some background: Phil’s company, Kynetx, makes QR code tags and stickers called “SquareTags,” which you can attach to the things you own, and which can be programmed, by you, to say or mean anything. I wrote about this a bit in The Internet of Me and My Things. Phil unpacks his case with this:

…by and large, ecommerce sites, from the smallest to the biggest, are just glorified online catalogs not significantly different from their more mundane mail-order catalog cousins. I’ve always thought the Internet ought to allow us to do better — to really change how merchants, companies and service organizations interact and relate to people.

Our vision for SquareTag is just that: helping people and companies have better (i.e. less dysfunctional) relationships. We believe that products are natural connecting points between companies and their customers. Because SquareTag makes those products smart and gives them an online presence, SquareTag provides a powerful tool for building vendor-customer relationships.

When I speak in my blog or on stage about the Internet of My Things, I’m highlighting the natural and powerful feelings people have about their stuff. As Doc Searls says in Chapter 21 of The Intention Economy, “possession is 9/10ths of the three-year old”. Our connections with our things are primitive and deep. We spend much of our time and resources acquiring, using, managing, and disposing of things.

Because of the strong feelings people have about them, products are a natural connecting point between manufacturers, retailers, service companies, and the customer. SquareTag is designed to deepen the connection between people and things by making the interactions richer.

With SquareTag, any thing becomes a programming platform. Products become more useful, more helpful with the addition of SquareTag. As an example, SquareTag gives almost anything an online social profile

Many companies confuse “having information” about their customers with having a relationship. That might constitute customer intelligence, but it’s not a relationship. Relationships are built on common interests and an exchange of value. Both parties need to see that value or it’s not a relationship. People are more likely to resent the fact that you know things about them outside of a relationship…

Using SquareTag companies can engage in a new kind of customer relationship management that does more than store contact information and interaction history. SquareTag provides a way to establish genuine relationships that provide continuous interaction throughout the customer life-cycle. This changes “relationship management” into “relating.”

Between the elipses above, Phil goes into specific use cases and scenarios. It’s deep and fun stuff. Go read it.

Meanwhile, think of how lame it has been for QR codes, so far, to be limited mostly to (actual) robot barf on the corners of ads and on the windows of shops, leading the scanner back to something promotional put up by the company at a website. This is worse than uninteresting: it wastes everybody’s time. But let’s say my next Canon camera, maybe the forthcoming 5D Mark IV, comes with a QR code unique to that camera. If I scan it on Day 1 of owning it, I’ll get, perhaps, a greeting and a link to the owner’s manual. Then, after I put it in my personal cloud, I can add my own annotations, such as links to the photos I’ve taken with the camera, or to my own notes for Canon’s repair people, should I have to send it in for a fix. (Which I’ve done many times over the years with my various cameras.) The repair people can then scan the code and see the notes. Canon too can add updates to the code. (Remember, I can program viewing permissions in my pCloud.) And, if I ever sell the camera or give it away, my notes and Canon’s can go with it, and Canon’s CRM system can be updated with relationship information about the new owner.

Finally, in case you need one more thing to convince you that QR codes are only ugly when misused — and are sure to become beautiful once they are used in creative new ways — there is this item in Wikipedia:

The use of QR codes is free of any license. The QR code is clearly defined and published as an ISO standard.

Denso Wave owns the patent rights on QR codes, but has chosen not to exercise them.

Thank you, Denso Wave.

After six years on the VRM case, it seems obvious to me that individuals need to be the points of integration for their own data — and of data about them, held by companies. But it’s not yet obvious to the marketplace, since we still lack suppliers willing either to part with the personal data they already hold, or to provide easy-to-use tools that people can use to combine that data, analyze it and put it to use.

So, to help with that, here are a few starters:

  • Quantified self data. Right now all the data produced by your Withings scale, your Zeo sleep manager, your Nike+ sportwatch, your Omron blood pressure monitor, your Fitbit Flex wristband, your Moves smartphone app, your Sportline heart rate monitor, your MoodScope log, your Accu-Check blood glucose meter and your workout machine data from the gym are silo’d by the companies supplying those devices. Even when that data is open and exportable (as it is, say, with Zeo sleep data), you can’t easily pull that data into one place that is yours, where you can analyze them together, and make fully informed decisions based on that data. There are apps and services, such as Digifit, that can combine data from multiple devices made by multiple manufacturers, but those services are silos as well — and they don’t include data from companies not on a privileged list. If you had that data, you could correlate weight loss or maintenance to specific workout routines, moods or dietary practices. You could present that data to your insurance company or health care provider to get better rates and services from both. The list goes on, and can get very long — especially when you integrate it with the other stuff below.
  • Retail. Think of what you could do if you had all your spendings in electronic form, and not just on paper receipts and invoices, or buried ten clicks deep on Web pages  You could look for ways to spend less money, or spend it more wisely. You could share back some of that data to retailers whose loyalty programs wear blinders toward what you’ve bought elsewhere: intelligence that might get you more favorable treatment from those retailers, while also providing them with better market intelligence.
  • Home expenses management, including energy and utility usage. Today “smart” devices and metering are almost entirely silo’d by manufacturers and utility services, so it’s no wonder almost nobody does anything with the data. The green button initiative is a good start in this direction, but implementation by the energy industry is minimal, while consumer awareness and tools for examining the data are also nearly absent. The only thing suppliers want to make easy to read are the invoices they send out. There is no doubt that we could save a lot of money, and spend it far more wisely, if we could see and manage that data with our own tools. But until we get those tools, we’ll stay in the dark.
  • Media usage. Sometimes, when I talk to a group of people in the U.S., I’ll ask how many listen to public radio. Usually nearly all the hands go up. Then, when I ask how many pay to listen, only about 10% stay raised. But when I ask if people would pay if it were “really easy,” the percentage doubles. If I add, “How about if you didn’t have to endure those ‘pledge breaks’ when the station begs for money and promises you a cup or a CD if you call in,” even more hands go up. The problems to solve here are equating listening with value, and easing the ability to pay. That was the idea behind ListenLog, which was featured on the first edition of the Public Radio Player from PRX. It was a nice experiment, but it was buried too deep in the feature list, and the results weren’t easy to get out and put to use. But it would be cool if our usage of media devices and services would yield data we could gather and use. And, if we shared that data back, it would also help media with subscription systems to improve those as well. Most of those are informed by what can be learned only inside their own silos — or by the conventions that include enticements many of us don’t fall for. This is why, for example, I still don’t subscribe to the New York Times, even though I am a loyal buyer of the paper on news stands and often read it online as well. I would also love to pay for music on a per-listen basis, whether I already own that music or not. While that is totally anomalous today, it might not be if all of us had easy ways to weigh and measure the actual value media has for us.

Keeping this stuff from happening is something of a chicken-and-egg problem. Since we lack tools for examining data from various sources, those sources see no need to share that data. And, in the absence of that data’s availability, we lack tools to do stuff with that data.

In respect to personal data, we are where personal computing was before the spreadsheet and the word processor, and where worldwide communications was before the Internet. Once we had the spreadsheet and the word processor, creative and resourceful individuals could do much more with numbers and words than big companies ever could — and that was good for those companies as well. Likewise, once we had the Internet, each of us could do far more with global communications than phone companies and other big players could alone. And that was good for everybody concerned as well.

And, once we have the means to do our own hacking, on data of any size and provenance, we will do for data what we did for computing and communications: make it personal and productive beyond any imaginings that are possible in the absence of those means.

This is why today’s “Big Data” jive, coming entirely from big companies selling to other big companies, sounds very much like the mainframe business in 1980 and the networking business in 1990. It’s mainframe talk. Nothing wrong with it. Just something very inadequate: it ain’t personal. Worse, it’s highly impersonal, unless it’s about how companies can know you so much better than you know yourself.

But that will change. It has to, because we’ve seen this movie before, and we know how it ends. As soon as it’s clear how much more each of us can do with data than the corporate hoarders can, a $trillion market will open up. Count on it.

What will make that clear? My bet, for now at least, is on personal clouds. You’ll find more on those in today’s link pile. For a look at what companies need to do, see everything Craig Burton is writing about the API economy at KuppingerCole.

And, by the way, both this post and that link pile were written in Fargo: another space to watch.

The history of computing over the last 30 years is one of lurches forward every time individuals got the power to do what only big enterprises could do previously — and to do a much better job of it.

It happened when computing got personal in the ’80s.

It happened when networking got personal in the ’90s.

It happened when both together got mobile and personal in the ’00s.

And it will happen with personal data as well in the ’10s.

We as individuals will be able to do more with our own data than big enterprises can. Meanwhile, nearly all the “big data” jive today is about what only big companies can do. Yet we’ve seen this movie before, and we know how it ends: with individuals winning, because they were better equipped. And we know the big companies will win too, because they are comprised of individuals. Both will end up doing what only they can do best.

This is why Big Data needs the modern equivalent of the PC, the Internet and the mobile phone: an invention that mothers necessity.

I think that invention is the personal cloud. All we — today’s developers — need to do now is build a good and compelling personal cloud. Or a choice of them. Once that happens, and people start using them, the big companies (and government agencies) of the world will cave in and release personal data that they clutch like a treasure, thinking that only Big Solutions to their Big Data problems, from Big Vendors, will do the job. They caved in on computing when they embraced PCs, on networking when they embraced the Internet, and on mobility when they embraced smartphones and tablets.

I could be wrong, but I’ve made the same prediction three times already. This is the fourth. To me, the only question that matters is: How?

Some pretty cool startups and open source dev groups will vet their answers at IIW. See ya there.

There is a classic scene in Cool Hand Luke where the prison warden (Strother Martin), says to the handcuffed Luke, (Paul Newman), that he doesn’t like it when Luke talks to him as an equal. So, to teach a lesson, the warden smacks Luke hard, sending him rolling down a hill. The warden then says to the crowd of prisoners below, “What we’ve got here is a failure to communicate.”

That’s also what we’ve got with login failures on the Web. Case in point: In response to The Illusion of the Gifted Child in Time, I tried posting this comment:

Standardized education and testing both deny that which makes us most human: our differences, as individuals, from everybody else. Whitman said it best: “I was never measured, and never will be measured… I know this orbit of mine cannot be swept by a carpenter’s compass… I know that I am august. I do not trouble my spirit to vindicate itself or be understood. I see that the elementary laws never apologize.” Standardized schooling cannot respect any of that.

As the great teacher John Taylor Gatto put it, genius in children is common, not exceptional. Thus the job of the teacher is not to fill empty heads with curricula, but to remove whatever “prevents a child’s inherent genius from gathering itself.” The first thing to remove (which Gatto did, year after year, winning awards along the way), is standardized schooling. Or at least framing our understanding of education in standardized terms. We’ve been in that box so long we can no longer think outside of it. Yet we must. For lack of thinking outside that box, we ruin kids.

When I was a kid, my mother taught in the same school system, and had access to my text scores. Between those and others, my IQ score had an eighty point range, from very smart to very dumb. Those scores showed that there is no such thing as “an IQ.” It also suggested that giftedness has little or nothing to do with test scores, and may not be something schools can deal with at all. My own gifts didn’t appear until after college, and all the achievements for which I am known came after I was fifty.

All of us are profoundly unique. Even identical twins, split from the same egg, are complete, separate and distinct individuals with independent souls. School teaches otherwise. And that’s the problem. Not the parents, and not the kids.

I failed to post that, which is why I’m posting it here. But my point is about digital identity, which is is no less fucked up in 2013 than it was in 1995, when the Web went viral.

What’s fucked up about identity is that every site and service has its own identity system. None are yours. All are theirs, all are silo’d, and all are different. For this we can thank the calf-cow model of client-server computing, and we are stuck in it. That’s why we are forced to remember how we identify ourselves, separately, as calves, to many different cows, each of which act like they’re the only damn cow in the world.

When I attempted to post the comment above under the essay at Time, I was given a choice of social logins (Twitter, Facebook, etc.), plus Time‘s own. Not remembering if I ever created an identity for myself (or, actually, for Time) at that site, I chose to log in with Twitter. This should have worked, given the expectations we all have with “social” login. But it didn’t work, because Time still required an email address to go with the login ID. When I provided the email address I use with Twitter, Time said the address was taken. When I tried another email address, it said that one was taken too. Then I guessed that maybe I had already used one of the handles (login+email A or email B) I had just attempted, as a login with Time. So I tried several new combinations. All failed.

There are two main difference between this failure and Luke’s with the warden: 1) machine programming does the smacking, and 2) no lessons are taught to the rest of the prisoners.

This is a design issue, and it’s as old as computing. It’s called the namespace problem. Every system has its own namespaces, and getting different systems’ namespaces to work together is very hard. Maybe impossible. After all these years (hell, decades), it damn sure looks that way.

I believe, as do more many others, that the only solution is for those with the damn names to be in charge of those names, and to identify themselves in their own ways to the many different systems that require putting those names in their namespaces.

In a blog post last year, Devon Loffreto in Moxy Tongue laid out Why sovereign source authority matters. He was right then and he’s right now. So was Walt Whitman, quoted above in the failed comment to Time.  I believe sovereign identity is the only answer — or at least the only right place to start finding the answer.

I’ll be defending that position when we meet to talk about it, among lots of other subjects, in a couple weeks at IIW. If you’re interested, be there. It’t about time, doncha think?

Tomorrow evening, Tuesday, will be a meetup I wish I could attend in San Francisco. The subject is personal clouds.

We’re not talking about storage here, though that’s part of it, just like storage is part of your PC or your phone. We’re talking about your own personal space, which you control, on the Net, and not just on your devices. We’re talking about your own personal operating system: the platform for your enterprise of one. We’re talking about the place where you stand as you manage not just your own data, but your relationships with other people, various services, the Internet of Things, and your contacts—meaning your real social network (the one you define, your own way). It might be self-hosted, or physically elsewhere on the Net; doesn’t matter, long as it’s yours alone, and secure. That is, not contained in somebody else’s service. (Though you can engage one for that, if you like. On your terms.)

Personal clouds are a new concept, but central to what I (and many others) have been working on for years with ProjectVRM and related efforts. (Some of those will be there too.) It’s where personal computing, personal networking, personal storage and personal autonomy and control all meet — or should, once the tech gets built out.

It’s early in the history of wherever this thing is going to go, which is why going to this thing is a good idea.

Register here.

Newer entries »