RedNote migration

As the TikTok ban approaches, US users have downloaded RedNote en masse - another Chinese video-focused privacy invasion app. There’s a sensational Bluesky thread describing it. It’s not even a straight up replacement for TikTok:

Please be aware, RedNote is in Mandarin. All servers are in China. It's a female dominated social media platform, sort of a cross between Pinterest and TikTok, that's mostly used by Chinese folks to get restaurant recs and beauty tips.

— Erica Wilkinson (@everywhereerica.bsky.social) January 14, 2025 at 3:50 PM

Some fascinating highlights:

  • People are doing this mostly to show the middle finger to the ban - RedNote is backlash tech, even if not the kind that Peter Watts would have hoped;
  • The application is in bloody Mandarin and Americans, who notoriously hate even subtitles, will run an app in Mandarin if they get the interactions they crave for - it’s not just that your UX sucks, but that the underlying app isn’t desirable;
  • American kids now get to point out how their own government is helping Israel pulverize Gaza as a way to self-justify using a Chinese app;
  • This is getting an entire young generation acquainted with (at least a view of) the Chinese way of living, and they’re finding out it’s not as terrible as the US would have them believe.

And if you had any doubt as to how tangled things are becoming:

And you're going to have a hard time manufacturing consent for aggressive action against China when 170 million American TikTok Refugees are mutuals with half of the RedNote netizens.

This is absoLUTELY going to have diplomatic ramifications.

— Erica Wilkinson (@everywhereerica.bsky.social) January 14, 2025 at 3:50 PM

This is culture wars bundled with social moving fast bundled with the rate of change turning entire groups’ expectations into roadkill.

Data ownership and layer fungibility

Recently got into the topic of data ownership on a conversation with Carey Lening which helped catalyze a few ideas I’ve been kicking around for a while.

In short, data ownership requires layer fungibility.

I’ll elaborate below.

Libra, Facebook, and greed blindness

Over at BlueSky, Dell Cameron brought up that Facebook’s involvement in crypto, VR, and GenAI aren’t working out because they are only secondary to their main business purpose: surveillance. (link)

I disagreed. Cameron was right in that it failed because their main business is surveillance, but I suspect they screwed it up because it was such a great fit that they got too greedy.

Crypto would have been for them - if Libra had taken off, Meta would have gotten access to their users' transaction information, something they don't necessarily have right now.

They luckily came out the gate too hard and scared everyone off by making it too obvious it was a supranational currency.

[image or embed]

— Ricardo J. Méndez (@ricardo.bsky.social) Jun 4, 2024 at 9:08

Would it have been different if they’d seen it as a technology investment?

Two projects grew on the compost of Facebook’s Diem open source dump: Sui and Aptos. As of June 4, 2024, their combined fully-diluted valuation is about $10 billion. Facebook could have captured that value if they had spun it out from the start, even as a subsidiary where they control most of the token supply.

But Libra was never a tech investment. You don’t get to have an arms-length independent company and share data.

When all you have is surveillance, everything looks like a data trove.

Privacy and memory

Fully private systems, like Aleo, will be mostly memoryless systems (memory will be provided only by an individual’s viewing keys).

These systems will allow for a class of application we haven’t seen online before - UTXO/records as rai stones that just happened to materialize along with a zkp.

Given that fully private systems will be memoryless black boxes with zero-knowledge proofs, one cannot verify that a contract path got executed in the exact same way that you would have wanted. Therefore, it makes no sense to cling to the notion of traditional execution, and one should focus on the result that one wanted to achieve.

This would seem to indicate that private systems lend themselves to intent-based approaches.

Small world

We do not intend to enforce any sort of identity verification or unique identities in distributed[C]. We do not think encouraging people to doxx themselves is a good idea.

This goes beyond concerns about privacy, though. We believe that having multiple personas, which you can use depending on the context you are in, is healthy.

This raises concerns regarding disinformation. If the platform is uncensorable, and we do not plan to enforce identity, how will this not become a cesspool of fake news?

The Netflixification of digital money

I think crypto is past the PGP point, where individuals controlled how to communicate with and how, but it’s still at the Bittorrent stage of chaotic yet mostly permissionless exchanges.

Its core tech might end up reaching the markets only as CBDCs, however.

This would mean that the majority of people limit themselves to what organizationally centralized services offer them, while the properly decentralized alternatives get more and more walled off.

In a worst-case scenario, crypto has a value in a closed economy. You use your ZCash to pay for decentralized hosting services, but you have to access it all through a VPN to avoid giving yourself away. You don’t generate these coins through fiat onramps, but through providing services to others, such as shared access or a mesh network relay.

Meanwhile, most of the world welcomes Netflix, where you only have whatever rights the company gives to you, for as long as you continue to pay them.

Identity, Privacy, and the Edge

Introduction

My goals for this talk are to:

  • Give a small taxonomy going into categories and labels that I think are useful when talking about identity;
  • Walk you through what a layered conceptual model for identity could be like;
  • Talk about the privacy implications for how we go about implementing things;
  • Hopefully convince you that the closer to the edge we process things, the better it is for the user, but that the edge does not guarantee privacy (no matter what the Blue Behemoth whose name starts with an F would like people to believe).

Slides at Speakerdeck.

The Truth of The Thing

A talk on conceptual accessibility being fundamental for adoption, while discussing mistakes I’ve made.

Slides at Speakerdeck.

Ledgers - When would you even

I delivered this talk at SAP Inside Track Berlin in September 2018. The audience was mostly enterprise developers, almost all of them specifically working with SAP as a platform.

Given how many companies I’ve seen flirting with the idea of distributed ledgers, I thought it would be useful to give people an idea of which cases I see as being a good fit for them, to give them a leg up the next time it enters the discussion.

Slides at Speakerdeck.