It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: LookingAtMars
Are you sure? Do you not think Berners-Lee would of thought of this.
This is why I have, over recent years, been working with a few people at MIT and elsewhere to develop Solid, an open-source project to restore the power and agency of individuals on the web. Solid changes the current model where users have to hand over personal data to digital giants in exchange for perceived value. As we’ve all discovered, this hasn’t been in our best interests. Solid is how we evolve the web in order to restore balance - by giving every one of us complete control over data, personal or not, in a revolutionary way.
Design
There are a number of technical challenges to be surmounted to accomplish decentralizing the web.[8] Applications and data must be kept separate, allowing people to store personal data where they want. Authentication must correctly identify the data owner while ensuring the privacy of identities. Rather than using centralized spoke–hub distribution paradigm, decentralized peer-to-peer networking should be implemented in a manner that adds more control and performance features than traditional peer-to-peer networks such as BitTorrent. Finally, the system must be easy to use, fast, and allow for simple creation of applications by developers.[8]
Solid's central focus is to enable the discovery and sharing of information in a way that preserves privacy. A user stores personal data in "pods" (personal online data stores) hosted wherever the user desires. Applications that are authenticated by Solid are allowed to request data if the user has given the application permission. A user may distribute personal information among several pods; for example, different pods might contain personal profile data, contact information, financial information, health, travel plans, or other information. The user could then join an authenticated social-networking application by giving it permission to access appropriate information in a specific pod. The user retains complete ownership and control of data in the user's pods: what data each pod contains, where each pod is stored, and which applications have permission to use the data.[1]
originally posted by: LookingAtMars
a reply to: CharlesT
Please tell us what you have learned.