Analogies and Metaphors


so modeled after this approach this speech along with some offline slides compares “the internet” to “the safe internet” though the section in bold needs a better rewrite; any ideas, maybe it’s already best? @frabrunelle

The Internet;

The origins of the internet that we know of today, started in the 1960s as a United States Government project in order to design a fault-tolerant system with which computers can communicate. This work took place in the USA , the United Kingdom, and France. This attempt at connecting the internet was prototype at best, and did not complete a scalable robust system.

Moving forward 20 years in the 1980s the US National Science Foundation, alongside many private international commercial firms, in addition to several Universities participated in the development of the networking technologies and the process of merging individual networks.

1960s – ARPANET a system of networks could be made in to a network of networks. Initially by one two networks which were UCLA school of engineering and applied science and SRI International in Menlo Park.

1971 – 15 networks were connected using ARPANET.

Not until 1981 did the NSF join the ARPANET and in 1982 the Internet Protocol Suite was released (TCP/IP) standardized and the concept of World Wide web networking called the internet was introduced.

The NSF had conducted much of the network propagation which led to supercomputer sites, education and research organizations began to merge into this internet. By 1990 ARPANET decommissioned and by 1994/1995 the commercialization of the internet started.

This commercialization began as a result of the NSFNET being decommissioned which removed the last set of restrictions on the use of the Internet in order to carry commercial traffic.

Those societies which surround and maintain their substantial infrastructures in Education, Research, and Technology eventually would begin to realize much accomplishment using the internet. Those technologies included email communication, instant messaging, Voice communication (VoIP) or phone calls, two way video calls, the world wide web – with forums, blogs, social networking services, online shops;

Each of these are mediums for communicating information such as knowledge, commercial transactions, entertainment and social interactions.

The number of internet users by 2014 has estimates of 2.4 billion users on the internet or approximately 39% of the global 7.1 billion population.

This internet exists in a decentralized fashion autonomously. Well, that’s what it is supposed to be. However it is not. If we take a look

the problems start to take place the centralized locations of Tiered networks. These tier networks initially could have been run by individuals from their garage, though moving forward we will start to notice that they have centralized in the major telecommunications corporations that we see today such as AT and T, Verizon, Comcast, to name a few.

These large corporate structures are heavily influenced by politics. These politics step in at times and present a strange interference with the natural intended flow of the internet which was the initial intent of the creators. That is decentralized flow of information.

However, if influenced by any entity, the flow of information could easily be controlled and regulated by the switch owner; We see this in China, and it is a focal point of information control in that country. This effect also pours itself into any hosting company, and its servers such that if the company is hosting some material it can be pinpointed to that particular host, and the host is directly targeted as a central support to the content that is malevolent. This is not how the internet was originally designed… not only does this interference directly target the responsibility to the host, the malicious user could also just as easily find alternative routes even though those routes could be less effective, nonetheless, the harmful content is still hosted, and the identity of the host could be tarnished at least temporarily.

The latest in terms of decentralization is also counter progressive as such the latest proposals for expanding the internet and making it accessible to all is Municipal Internet. This means that local governments will be responsible for providing internet service to localities. Certainly at this stage the responsibility on hosts will be most direct as the data aggregation of local governments would be exact and precise, and such a system will directly target internet usage and malicious content directly at the hosts as if such hosts were intentionally providing the means of such dissemination.

This is not what the internet was intended for. As we look back at the original timeline we start to notice, that the onset of introduction was information dissemination, and the first uses of the commercialized internet were still information dissemination. And this is where the internet lies fundamentally. Steering information down the sewer line is not what the original makers had in mind.

The solution to this is to have anonymous hosting and distributed hosting. This leads to a safe internet. This means that hosts are as knowledgeable about their service as they are about their hardware, and are no longer shouldering the responsibility of politics. The ugly content of the internet is for the people to decide not to observe.

Besides, we are focusing on the magnificent content. The fact that we have so much hardware on this planet that goes each day unused. The fact that we have such an enormous population of the planet that could contribute their thoughts to the success of such great problems which have seen the light of Billions of days, and yet there has not been a single speck that illuminates beyond the obvious that we still have a problem, such as cancer, such as weather impacts, and political manipulation through the media. Imagine getting live coverage in real time of what actually happened in Ukraine, or the attacks in New York on September the 11th 2001, imagine that each person had a smartphone each connected to a network and they were making their footage live, and safe for anyone to see and analyze besides just only the FBI.

If each persons’ router was a Service Provider, as they are using MaidSafe then the ability for a government, or gangster organization to interfere with the transmission of data from and to a particular address would cease to exist, and the flow of information would be ceaseless and uncontrollable.

Censorship would exist in the hands of the user of the Internet, and the fact that we can accomplish this is because of the protocols that MaidSafe has established at the core.


Leonardo da Vinci created many amazing diagrams. His works were held among his personal possessions; he had no knowledge about many things, such as metallurgy of a high level; he likely did not even have enough time to consider many aspects of realizing the designs of the inventions that he had. Now fast foward to the technology which MaidSafe is developing for deployment. Using the MAID in the SAFE environment, everyone is capable of sharing to every single peer and each node in the network is a peer. Maybe da Vinci would share the diagram and a master blacksmith would have a new idea to create a different bend to the metal bar which would result in a spaceship for space travel and moon landings could have occurred 500 years ago.


Perhaps we need an app for that. Something that specializes in matching ideas with actualization.


Amazing, @frabrunelle shared the identical thought just two minutes before you posted this;


What about analogies and metaphors though;