Cancer as dogma / five unrestricted growth hacks sure to bloat your host (DNS Edition)
A sidebar, while listening to public arguments in favor of the .org heist by those who would profit from it
1. Primary markers of cancer in organisms:
The progression from normal cells, to cells that can form a detectable mass, to outright cancer, is called malignant progression.
2. 90% margins
Industries with 90% or higher profit margins (often: marginal profit margins, where there was some up-front cost doubling as barrier to entry and hand-waving excuse for continuous rent increases) are all deeply inefficient and non-competitive. That should be what you (or any economist) would suspect, yet people continue to say things like “I’m not actually against the 95 percent profit margins or even caps if the market for broadband were competitive. Unfortunately…“
The rise of these industries eat collective surplus and productivity, and funnel the fruits of new technology into the hands of organizations that think this sort of resource allocation is healthy. This gives them ample resources to expand their work, into new markets and topics, and to train new industries to adopt their techniques. 90% margins become 99%, until all available shared resources are captured by this network. In other words: cancer.
Here is the head of ISOC, convincing himself and others that a well-meaning private equity firm will not unreasonably raise rates for use of their namespace monopoly. “Given registries must announce price increases for renewal 6 months in advance, and domains can be registered at current prices for up to 10 years, any operator seeking to increase prices dramatically would certainly lose customers without producing any increased revenue.“
This is not so. Renewal rates are quite price-inelastic (it costs > 100x the annual registration cost to change one’s domain on all sites and materials, and breaks existing links). Incentivizing people to hurry up and register for 10 years at once would produce a surge of revenue, not a decline. New domains can have prices raised with no warning, which would simply raise new domain rates for TLDs across the industry: likely bringing in more revenue as well as support from other registries (.org / .net /.com are among the few TLDs that can unilaterally affect industry rates)
(more…)
Designing life for episodic tyranny | 1: Secure toolchains
See also Part 2: social networks
Motivation
Classify your local environment according to how much freedom you have to create and share tools, access those of others, and communicate across secure networks.
- In a “Tier 1” environment you have access to all popular security technology, and can build whatever infrastructure you want, entirely within your control.
- In a “Tier 2” environment, central network nodes and critical infrastructure all have backdoors and logging, and noone is allowed to distribute strong cryptography that some central group is unable to break.
- In a “Tier 3” environment, using secure tools and all but trivial cryptography is illegal – you shouldn’t have anything to hide. Even talking about such tools may put you on a blacklist. A central group that enforces the law may also access, modify, or reassign your work and possessions at will.
Say you live in a Tier 1 jurisdiction, which controls land, banks, and physical infrastructure. Periodically, it shifts for a time to a Tier 3 regime, which may make abrupt changes at any depth in society to suit the fashion of the moment.
While in the latter regime, you can’t always trust the law or social norms to preserve
- Your right to communicate with others
- Your right to use your own tools and resources
- The visibility (to you and those around you) of how your rights and tools are changing, if these are taken away
Most infrastructure in such an environment becomes untrustworthy. Imagine losing trust in AT&T, Google, Symantec, Cisco. (Even if you trust the people who remain running the system, they might no longer be in full control, or may not be able to inform you if your access was altered, filtered, compromised.)
What can you do while in a Tier 1 regime to moderate the periods where you have fewer rights?
These are some quick thoughts on the topic, from a recent discussion. Improvements and other ideas are most welcome.
Technical design decisions to improve resilience:
1. multi-homing, letting users choose their jurisdiction. for instance, let you choose from a number of wholly independent services running almost the same stack, each within a different jurisdiction.
1a. Be able to choose who hosts your data, tools, funds. E.g., fix current US-EU policy – give users choice of where data resides and under which laws.
1b. Measure: how long it takes to shift key storage / control elements betweeb jurisdictions, copying rather than mirroring any required pieces. Make it possible to shift on the timescale of expected transition between Tiers.
2. Give users advance warning that the threat to their data/account is rising; make it possible to quickly change what is stored [not just what is shared with other users].
2a. Learn explicitly from how banking does this (cf. concerns among many users about funds being frozen, for less-than-fascist conflicts).
3. work with telcos to add built-in IP and egress-fuzzing
3a. consider what china does: blocking per IP, by each egress point. harder but possible in the US.
4. multi-source hardware, and any other needed ‘raw materials’ at each level of abstraction
4a. Both multiple sources w/in a jurisdiction (for the first stages when only some producers have lost control of their own production), and in different jurisdictions.
5. have systems that can’t be subverted too quickly: relying on the temporary nature of the fascist trend. (if it lasts long enough, everything mentioned here can be undone; design to make that take a reasonable amount of time and a lot of humanpower)
5a. add meshes – like the electrical grid, that have local robusness. When central management disappears or ‘shuts things off’, local communities can build a smaller-scale replica that uses the physical infrastructure [even if they have to go in and replace control nodes, like generators, by hand].
5b. make change happen on the lifescale of hardware that has to be replaced. e.g. a bulk of investment in dumb pipes that have to be replaced or removed by hand. Systems with high upfront infrastructure costs that are easy to maintain but relatively hard to replace.
6. design alternate solutions for each level of the stack that have minimal central requirements. E.g. fuel-powered USB chargers, gas generators, solar panels, desktop fabs and factories. Make it easy to produce inferior, but usable, components if the high-economy-of-scale sources dry up.
7. keep strong contacts with someone in the existing [government], even when there’s nothing that you need to lobby for. that makes transitions smoother, and you less likely to be surprised by change. Cf. Idea 3: invest heavily into those social relations.
8. distribute end-user tools that let individuals adapt under hostile conditions. Examples:
8a. Ship antennas or power sources flexible enough to be modded.
8b. Allow broadcast updates to the latest version, but allow users to freeze the version at one they support.
8c. Support unblockable rollbacks to earlier revisions: something like a hardware button that rollsback to one of a few previous versions, if you realize you’ve installed malware or controlware. you can still push updates as agressively as you like, as long as the provider can hint that a new snapshot is useful as risks of overtaking increases.
8d. provide some sort of checksum to see if firmware has changed [even with above may be possible for new software to change that option; but users should at least know]
Related ideas
1. consider reasonable steps to degrade control:
1a. starting with increased infra for those who align with government views. (or decreased for those breaking new / stringent laws)
1b. compare how voting is restricted, liquidity is restricted.
2. consider: is it better to be asset-heavy or asset-light?
2a. usefulness of land and resources to use, vs. having things that can’t be claimed / revoked. networks rather than assets – land, tools?
2b. compare liquidity of favors to that of funds or items.
3. compare current work with regulations/regulators. in politics, relationships w/in a commission made it valuable to have a rotating door. Invest in those relations, considering also 2) above – invest before assets are frozen to offset risk.
4. compare how US corps plan for inter-state shifts within the country. Including being flexible enough to move to a new state for favorable regs, or shift ops/people among different centers.
5. Currently there’s network-tracking of IP addresses in malls, &c. There are tools now that have a ‘War mode’ that randomizes your MAC or other address all the time. Injecting noise into bluetooth and other tracking is straightforward.