!qMgVsNLWTAIzDtTsKR:matrix.org

persono.id/foundation

3 Members
Persono.id core and ecosystem development funding issues. Publish your idea, a startup or any related to persono.id activity and get funded!1 Servers

Load older messages


SenderMessageTime
30 Jul 2019
@gate32:matrix.orggate32Also systems like that must be very complex and likely impossible to analize, even while being free, libre, open source. AI will require datasets for learning and they likely must be open too (security through obscurity is not a good way to implement it, you know), but then their features will be known and it'll be easy to mess with them... probably.19:34:25
@gate32:matrix.orggate32Redacted or Malformed Event19:35:04
@gate32:matrix.orggate32 * Also systems like that must be very complex and likely impossible to analyze, even while being free, libre, open source. AI will require datasets for learning and they likely must be open too (security through obscurity is not a good way to implement it, you know), but then their features will be known and it'll be easy to mess with them... probably.19:35:16
@gate32:matrix.orggate32Edits, nice19:35:34
@persono.id:matrix.orgpersono.id> And very doable if we talk about governments, they already tend to collect as many as they can That's a very interesting question. Cryptocurrencies are presented as an "alternative assets". That's it. Piece of cake. Who were talking about freedom?) Well, governments tend to control everything. If your law say that you must provide you bio, well, you should. But what if say half a billion people from different countries agree on using an independent system? Too havy to lift for any gov, ain't it?19:49:59
@persono.id:matrix.orgpersono.id> I actually don't know what storno is. I don't use banks at all. It is a reverse accounting operation. Original: acc A-> acc B =100£. Can't change it or delete. But putting a corrective entry attached to it is allowed.19:53:41
@persono.id:matrix.orgpersono.id

It is really very deep and technical. I fail to imagine it working. Ok, you can use your fingerpring to buy ice cream, and if it was not you, you can reverse it.... Waait a minute, how exactly do you reverse an ice cream?

Well, add a voice confirmation to your spendings for over a buck when you need to pronounce a certain auto generated phrase. Too much for an ice cream, isn't it?

19:56:39
@gate32:matrix.orggate32I think they consider everything they can't control as a threat, and they already control factories, communications, they have backdoors everywhere. It may be possible to organize that system within a group of locals, maybe, but on international level...19:56:44
@persono.id:matrix.orgpersono.id

I think they consider everything they can't control as a threat, and they already control factories, communications, they have backdoors everywhere. It may be possible to organize that system within a group of locals, maybe, but on international level...

Someone said if your dreams don't scare you, they aren't big enough. )
Who knows.

19:59:26
@gate32:matrix.orggate32
In reply to @persono.id:matrix.org
> I actually don't know what storno is. I don't use banks at all. It is a reverse accounting operation. Original: acc A-> acc B =100£. Can't change it or delete. But putting a corrective entry attached to it is allowed.
So somebody unknown just got ice cream, and the shop doesn't get the money from me?
20:00:46
@gate32:matrix.orggate32
In reply to @persono.id:matrix.org

It is really very deep and technical. I fail to imagine it working. Ok, you can use your fingerpring to buy ice cream, and if it was not you, you can reverse it.... Waait a minute, how exactly do you reverse an ice cream?

Well, add a voice confirmation to your spendings for over a buck when you need to pronounce a certain auto generated phrase. Too much for an ice cream, isn't it?

So, what device should I talk to?
20:02:23
@persono.id:matrix.orgpersono.id
  • Also systems like that must be very complex and likely impossible to analyze, even while being free, libre, open source. AI will require datasets for learning and they likely must be open too (security through obscurity is not a good way to implement it, you know), but then their features will be known and it'll be easy to mess with them... probably.

Yes and no. The protocol is the most important thing. Based on PoID. Implementation might differ while conforming to interfaces. Can't imaging a small team able to achieve all that. Thus we need good funding.

20:04:17
@gate32:matrix.orggate32
In reply to @persono.id:matrix.org

I think they consider everything they can't control as a threat, and they already control factories, communications, they have backdoors everywhere. It may be possible to organize that system within a group of locals, maybe, but on international level...

Someone said if your dreams don't scare you, they aren't big enough. )
Who knows.

I'm quite not sure we share our dreams) But anyway, I'm first for free software and hardware everywhere. Then is the moment we can rely on the technology and build our independent communities or whatever else.
20:06:55
@gate32:matrix.orggate32So, how many people are in your team now? You are the author, right?20:16:44
@gate32:matrix.orggate32Do you program yourself? Any code to look at?20:18:02
@persono.id:matrix.orgpersono.id

<@persono.id:matrix.org> > It is really very deep and technical. I fail to imagine it working. Ok, you can use your fingerpring to buy ice cream, and if it was not you, you can reverse it.... Waait a minute, how exactly do you reverse an ice cream?

Well, add a voice confirmation to your spendings for over a buck when you need to pronounce a certain auto generated phrase. Too much for an ice cream, isn't it?

So, what device should I talk to?

Let's get it straight.
There is no an absolutely reliable technology.
They can make you do anything under the gun.
The solution is to make it too hard or useless. Like if they make you transfer your money to an account, then it is someone's account.
Trustless environment: to a certain extent, as who wants to depend on a digital key completely?

20:23:29
@gate32:matrix.orggate32
In reply to @persono.id:matrix.org

<@persono.id:matrix.org> > It is really very deep and technical. I fail to imagine it working. Ok, you can use your fingerpring to buy ice cream, and if it was not you, you can reverse it.... Waait a minute, how exactly do you reverse an ice cream?

Well, add a voice confirmation to your spendings for over a buck when you need to pronounce a certain auto generated phrase. Too much for an ice cream, isn't it?

So, what device should I talk to?

Let's get it straight.
There is no an absolutely reliable technology.
They can make you do anything under the gun.
The solution is to make it too hard or useless. Like if they make you transfer your money to an account, then it is someone's account.
Trustless environment: to a certain extent, as who wants to depend on a digital key completely?

I was literally asking that) Like can it be some average android phone, is it your device, or seller's?
20:48:05
31 Jul 2019
@persono.id:matrix.orgpersono.idRedacted or Malformed Event08:48:43
@persono.id:matrix.orgpersono.id

<@persono.id:matrix.org> > > <@persono.id:matrix.org> > It is really very deep and technical. I fail to imagine it working. Ok, you can use your fingerpring to buy ice cream, and if it was not you, you can reverse it.... Waait a minute, how exactly do you reverse an ice cream?

Well, add a voice confirmation to your spendings for over a buck when you need to pronounce a certain auto generated phrase. Too much for an ice cream, isn't it?

So, what device should I talk to?

Let's get it straight.
There is no an absolutely reliable technology.
They can make you do anything under the gun.
The solution is to make it too hard or useless. Like if they make you transfer your money to an account, then it is someone's account.
Trustless environment: to a certain extent, as who wants to depend on a digital key completely?

I was literally asking that) Like can it be some average android phone, is it your device, or seller's?

<@persono.id:matrix.org> > > <@persono.id:matrix.org> > It is really very deep and technical. I fail to imagine it working. Ok, you can use your fingerpring to buy ice cream, and if it was not you, you can reverse it.... Waait a minute, how exactly do you reverse an ice cream?

Well, add a voice confirmation to your spendings for over a buck when you need to pronounce a certain auto generated phrase. Too much for an ice cream, isn't it?

So, what device should I talk to?

Let's get it straight.
There is no an absolutely reliable technology.
They can make you do anything under the gun.
The solution is to make it too hard or useless. Like if they make you transfer your money to an account, then it is someone's account.
Trustless environment: to a certain extent, as who wants to depend on a digital key completely?

I was literally asking that) Like can it be some average android phone, is it your device, or seller's?

You are going to make a transaction by sending some encrypted payment to a public node. So, you need to input or scan destination address and accompanying data , sign it with some secret data using bio, one-time pwd, using 2FA or any combination of your preference.
You might generate signed data offline using some offline device with a screen and let the shop scan QR code or barcode. Or generate it on your mobile using some secure app and send tx to a node.
But if you need to rent a car, you have a rental company that needs to identify you. Implementations might differ. I.e. you provide some "short code" or bio (face, fingerprints, voice) to the shop scanner or smth that hashes it and requests a persono.id node, that returns only needed info of your choice. The info might be one-time purposefully generated by a node according to the persono.id protocol.
If you care much about keeping your bio from being collected, you may keep and provide some hash that is sent along with a request and , say your photo is returned as a part of the node's reply.
Generally, even if your bio is collected somehow, it can't be used maliciously.
There is no code as there is nothing to code.
We need the protocol. To craft it we need different points of view, a community of proficients from different areas, you know.

08:49:38
2 Mar 2020
@gate32:matrix.orggate32 set a profile picture.22:21:45
7 Jul 2020
@lily8134:matrix.org@lily8134:matrix.org joined the room.16:26:14
8 Jul 2020
@lily8134:matrix.org@lily8134:matrix.org left the room.01:13:16
31 Jul 2020
@gate32:matrix.orggate32 changed their profile picture.00:22:27
20 Aug 2020
@jt35:matrix.orgjt35 joined the room.18:51:18
18 Apr 2022
@wybpip:matrix.org@wybpip:matrix.org joined the room.16:11:31
@wybpip:matrix.org@wybpip:matrix.org left the room.16:11:33
2 May 2022
@wybpip:matrix.org@wybpip:matrix.org joined the room.03:52:36
@wybpip:matrix.org@wybpip:matrix.org left the room.03:52:37
27 Jun 2022
@better_sleeping:converser.eu@better_sleeping:converser.eu joined the room.03:54:34
@better_sleeping:converser.eu@better_sleeping:converser.eu left the room.03:54:38

There are no newer messages yet.


Back to Room ListRoom Version: 1