Real applications and Anonymity

For example

Account and under that account we can have

  • ID1
  • ID2
  • ID3
  • and so on

And for web sites the user might use
Site A - ID1
Site B - ID2
Site C - ID1
Site D - ID1
Site E (selling goods) - ID3
Site F (Selling computers) - ID3

So here ID3 is being used for sites where the user has to provide in their profile for the site their real name/address.

3 Likes

Ok, I think I got it, thank you. That means even KYC/AML portals like stock market brokers could exist inside SAFE Network, right?

4 Likes

Yes. There is no reason why they could not since they just demand you give them those details.

But those sites do not need to know your account also visits other sites. By using different IDs there is no tracking.

In theory you could send SAFEcoin using a different coin balance ID each time and thus no tracing via using the coin balance ID

7 Likes

In addition to what Neo has said, if you use a single ID in more than one instance, you have significantly de-anonymized yourself. That is to say, if you’re consistently using “ID3” for more than one thing/site, you’ve given people connectable patterns of behavior with which to deduce who you are. Real anonymity has been essentially dead for quite sometime now.

Part of that is identity-driven; the other part is behavior driven. Most people don’t and won’t spend the energy necessary to make sure there are no linkable patterns in their behavior. There have been interesting papers written over the past decade detailing why only 4 data points is enough to identify someone—particularly if spatio-temporal data is involved.

In short, while SAFE can provide the ability to use multiple IDs and will not of itself identify the user, the user’s behavior may do so.

10 Likes

Just to build off of what @Sotros25 said, I believe that what has been shown in the UI/UX development by Maidsafe is that when posting or uploading anonymously, it is actually a one time throw away anonymous ID.

I would assume once Identity Management is in focus that most people will have a Public Facing SAFE ID (which should still be devoid of today’s excessive online tracking), then some alias SAFE ID for pseudonymous use with the expectation of little tracking or deanonymizing, and then posting with a one time throw away anonymous ID when they require true anonymity.

6 Likes

Ah! You’ve struck on one of my favourite areas of the SAFE Network, Identities and ecommerce. The plans and possibilities are really exciting… buckle in, and I’ll give you my take.

The first thing to note is that a user of the Network only ever needs one ‘Account’ (aka login). That means just one set of credentials to remember—a password and passphrase. Then within this account, they can create as many identities, or SafeIDs, as they need. We know people wear different hats in life, personal, professional, family, hobbies, temporary. All of these different identities can be accommodated and separate, but still allow all the data to be readily accessible, and organised.

When using identities on the network, there are four main modes of operation:

Identifiable

This is a way of using your regular IRL identity on the network, so you are discoverable by friends, or readily identified professionally, for example.

SafeIDs allow this via a unique handle, such as @JimCollinson, plus a Name which need not be unique, plus a fully customisable profile.

Pseudonymous

The ability to create new SafeIDs whenever you wan, allows you to use the Network pseudonymously. This could be through persistent a pseudonym, or through throw away ones. So if you want to separate our different parts of your life, or have different identities when using different apps or sites, we’ve made that very straightforward.

These identities are not linked to your ‘Account’ or to other identities in way that is readily discoverable by other users or apps, but as others have pointed out, that could possibly still be inferred through a pattern of use.

Anonymous

Should you need to publish or edit data anonymously, then we give you the ability to do that. It’s done in such a way that there is no identity associated with it, so the identity could not be reused by mistake.

Data that you publish anonymously can still be accessed and organised by you at an account level though; you’ll be able to see a history things you’ve edited anonymously for example, all in one place, it’s just that this is only available to you, and not anyone else.

This is the mode you find yourself in by default but the way, many users will choose not to create an identity at all, and that’s fine.

Also just a reminder that browsing and reading data from the network is always anonymous. There is no way for this to be tracked, monitored, or monetised. You don’t even need to create an account for this.

Anonymous Data Drop

And should you want to—and admittedly this is a bit more of a niche use case—you can also just drop data on the network anonymously, with no identity, nor with it even being accessible via your own account login. In essence it would just ‘appear’ on the network at a random unique URL. What you would then do with tis URL would be up to you.

So this is a way to, say, whistleblow data onto the network without the susceptibility to—and I’m sorry for the grim reference here—a rubber-hose attack.

One thing thing about SafeIDs and the identities you use on the SAFE Network that gets me really amped, and it’s not always immediately understood, is that they are not siloed in apps, or, sites or services: they span the entire Network. That’s the awesome sauce that a decentralised internet, and the power of linked data provide! Just a few (but by no means all) of the upsides:

  1. I won’t need to create an account or identity for each new site or app I use
  2. I can choose to use as few or as many identities as I want, yet I can have access to them all in one place.
  3. I can interact all over the network, but see all replies in one place should I choose. I’m not confined to a single UI.
  4. I can be tagged with my SafeID (by someone typing @JimCollinson) anywhere on the network, and I can be notified about it, leap in to see it in context, or just consume it via a feed or UI on my choice. Again, no siloing of data here. And again, joy-upon-joy, we get this whole thing network-wide, with conversations started in a channel desired by the sender, and with a context appropriate for the recipient.
  5. We get global—network wide—contacts management, that’s always up-to-date. So If I update something about my Identity, like me street address for example, then this gets updated for everyone.
  6. As a consumer, on the network, I can verify sources across multiple sites (e.g. news outlets) and have them all referenced in a single timeline.
  7. As an app developer, I don’t need to worry about dealing with people’s private data any more… no more login screens, password handling or GDPR to worry about. That’s all taken case of by the network, with personal data handled by the users themselves, I don’t deal with that any more. All I need to be concerned with is creating useful software.
  8. The list goes on!

And since you are mentioning ecommerce I should mention what gets me excited there—did I mention I was excited?

Of course in your example you are asking about anonymity and physical shipping, which is always going to have it’s concerns, when crossing the boundary between the online and meatspace. But… there are reasons to consider why the SAFE Network could be really transformative for ecommerce, and in particular for small and independent traders, as well as shoppers too. And that is down to network wide Identities and the secret sauce of linked data. Picture this with me:

First of sending and receiving Safecoin is super easy. I have a nice, human readable identity for myself, like @jimcollinson, and send and receive Safecoin from that address, privately. No fears of losing things, worrying about who does what with the secret key.

It’s as easy as Pay @jimcollinson 100. That’s it.

And if I wanted to do this anonymously, that’s doable too. We’ve created a mechanism where an intermediate one-time wallet is created for you. Simple.

So, apart from just the raw usability of this Safecoin itself, the amazing thing is what Safecoin and the other features of Safe Network combine to enable. For traders and individual websites, it’ll be really easy to enable commerce and accept payments for my wares, it’s all built in to the network…

…and as a shopper I can go on a shopping spree network wide, with a single shopping basket, in a really easy way, not have a million logins. When I’m ready to check out, I click once to pay, and all these disparate traders get paid, with no middlemen involved.

Plus, now with linked data, their contact information, and my shipping information is always up-to-date, not siloed all over the place. If I have ordered from 50 different merchants on the way, I just update my address on my own profile, and they all have it instantly. And of course, that’s only accessible to the merchants I choose to share it with, and I can turn off the tap to that data at any time I like.

I could go on! Did I answer your question there?

26 Likes

This sounds really great, Jim. Thanks for clarifying the basics. Just wondering: Do you think the average user of SAFE Network will need some coaxing along the way, because of the learning curve? In other words, is there a plan to allow the onboarding (is that a word?) of someone in a gradual, non-technical way so they are not overwhelmed by the possibilities before even getting started? I think that would accelerate the widespread adoption of SAFE if it could be accomplished.

2 Likes

Linking this earlier idea for anonymous physical shipping

3 Likes

Oh yeah, that’s what we’ve been working on for many months. I made a video about our process for designing the initial onboarding to the network. It doesn’t cover the creating old an identity, just the bit before that… but I can give you some idea of what the experience will be like. It’s harder and more complicated to explain these concepts than it is to actually use the thing, as most of the UI patterns will seem pretty familiar.

Once you’ve grabbed yourself an account—as per the video—you’ll be prompted to create a SafeID should you wish it. It’s pretty easy:

Each identity you create will have a history accessible to you only, together with payments sent to/via it, and you can also see (and customise) your public facing profile for that identity.

And you can access all your identities, and create new ones, in one place too:

Sending payments will be pretty straightforward. All you really need it the recipients SafeID…

(Or event faster if you check out the ‘action menu’ approach shown in last week’s dev update.)

Plus doing things anonymously is simple too, an one-time wallet is generated for me on the fly, and the funds are then bounced via that from/to my wallet:

This is the very basics, and the practical mechanics of the ecommerce I haven’t gone in to here. But you could think of it as a site owner including a small snippet of code alongside the product they are selling, with the browser handling the shopping cart and instigating the payment via the identity selected by the customer. Although that won’t form part of the initial UX we are building, but I’m keen to get it working as close to launch as we can.

17 Likes

Thank you very much! It helped me to increase the list of advantages of the Network as well.

3 Likes

I wonder one problem that I haven’t seen addressed is the way that nature forgets.

I don’t know if there will be merit in some applications that retain association for a time and forget those later. More fluid relationships from that might be useful?.. perhaps not based on identity but activity.

Just a thought and not a well formed one even but perhaps from such nonsense something grows?

:thinking:

2 Likes

Could you explain a bit more about what you mean, or give an example?

You’re a wizard, Jim, a wizard I tell ya!

6 Likes

lol … I really can’t! It really was half a thought. It’s an aspect of physics that I wonder about on occasion that quantum mechanics perhaps allows for loss of what is knowable.

Just for something based on nature, it’s sometimes worth wondering what parallel there might be.

The other, less than half thought, I had was wondering what kind of analytics might arise from SAFE activity… and how whatever those are could ever be useful.

Filed under “wtf is that” and “return to later if I have a better thought”…

What I first thought you meant (and just wanted to clarify) was giving an app access to a piece of data for a limited duration; to which the answer is of course yes! We’ve built this in to the permissions manifest system, it’s covered in this video.

But if course, in the concept of apps, on the Safe Network, we aren’t talking about other eyeballs, it’s just you manipulating your own data with a given app. In fact, we are renaming permissions to capabilities to help make this clearer.

But when it comes to sharing data with another individual or business, such as sharing a shipping address, then we haven’t designed the full flows for this yet, but it would work in a similar way. I could perhaps add a duration rule of “until my product ships” to your address data.

Of course, you can’t get people to unlearn something once they know it, but at least you wouldn’t be creating a persistent link to this data, so the wouldn’t be able to see any future updates to it.

Perhaps that can help with the thinking… I’m keen to hear any other scenarios or points-of-view to help inform all these design when we move on to it.

5 Likes

Yes, I was coming at it from Privacy.

I don’t know if there’s use for time limited signatures; so, subscribing to something as a hold or grasp on it, that requires being reconfirmed after a time. I guess voting is of that class; perhaps then options on distributed politics, where perception needs to be checked on occasion??.. but unclear if there is benefit over more traditional ideas of distinct data in an application… and what is time, is a problem for this too…

Half thought solutions where there is not a problem lead to rambling :slight_smile:

1 Like

This is an interesting thought. Do we (nature) ever really “forget” something, or do we simply become unable to “recall” something without assistance? In this sense would the Network forgetting just be someone losing their keys or someone (as related to the other thread on servicing PUT vs GET) someone no longer maintaining public access to data?

1 Like

I could quote the whole post tbh - absolutely awesome stuff! I can see why you are excited! This single post summarises so many advantages of the SAFENetwork, with very practical use cases.

I love the idea about shopping so easily. The likes of Amazon gets so much trade because it’s silo is so easy to use - your details are all there, including those for payment. With the new identities and coins, those advantages evaporate. Amazon’s advantage would boil down to being a good search/portal, which other providers could step in and do if needed.

Ok, I know Amazon does other stuff behind the scenes, such as drop shipping. They also have loads of infrastructure of their online store too. However, with SAFENetwork, the latter will go away as the network will be self-managing. For drop shipping, others could step in to do that or Amazon could offer drop shipping (as indeed, many other companies already do).

I can’t wait to see all this come together. The user experience really will be at another level!

10 Likes

WRT “forgetting” or allowing data access for a limited time: If you run a business that needs customer data, e.g. physical address for shipping, you’re legally obligated to keep that data (also to keep it safe) for several years (bookkeeping, tax authorities, warranties etc.).

So far that’s outside of the scope of the Safe Network.

But since I keep that transaction in my log, I wouldn’t need to keep a receipt for claiming a warranty – as soon as that gets accepted as legal proof. (And how much of my account data would I need to open to the authorities or to a dealer to prove such a transaction?)

Further ideas: Can we couple a transaction with additional data, e.g. expiration date, subscription renewal date, cancellation period? Hm, of course as a shop owner I could send an .ics to my customers already in the current internet, but “of course” I wouldn’t remind them to cancel a subscription… I should make another calendar with my purchase, warranty and subscription dates…
Ok, too far off topic.

1 Like

Perhaps I should clarify a bit what I meant here.

The beauty of SafeIDs (identities people can have on the network) is that they allow for some pretty powerful, ways to manage contacts, network wide.

So I create a SafeID, and it has a profile, and can have privately or publically sharable attributes, such as a contact information, and like in this cast a shipping address.

When someone, be that a friend or a business, has my SafeID in their address book, my details are always up-to-date, because I can simply make a change to my personal, everyone I’ve shared that with gets the latest information.

I’m sure we’ve all had that crappy task of logging to dozens of different sites or apps when a credit card has expired, or I’ve changed address. But with Safe, there are no silos of data anymore, I update it in one place, and it’s propagated to everyone who needs it.

But here’s where the time limiting (or the adding of rules around access to data) is useful.

If you think of a Shipping Address for a SafeID as being a bit of PrivateSequenced data. I might give someone ongoing access to that data; that would be really useful for certian relationships, because I want my friends to always have my latest address to send me a birthday gift each year. They get my current, and future addresses.

But for a business, I probably only want to give them access to my current address, and not leave the door open to all my future address changes that will be visible in that file. So I might apply a rule like: Read only access, until the product ships.

Of course the business will be able to read that address, to print a shipping label, and also save it for their legal or accounting records. But what they don’t get is ongoing access to that data, they just get a snapshot of it.

But perhaps I get used to transacting with a business, and I trust them some more, I could choose to lift those restrictions or rules around the data later on, to make transactions even quicker. The control over your personal data rests with you, the customer, and the burden of storing and maintaining infrastructure for personal data if vastly reduced for businesses, and in many cases, entirely eliminated.

8 Likes