Let go from mainframes till networks of interconnected AI agents
What is web2 web3 web5 web7 and hundreds of following webs that we need
More in the article
https://volodymyrpavlyshyn.medium.com/toot-is-a-mastodon-tweet-500-characters-long-fcb54807e11e
It is to long to share so I ll put a few ideas here
Web 3 and second system syndrome
We have so many requirements and features for the next web version that we failed to deliver it and got lost.
- Internet for machines and semantic web
- internet of connected data
- internet of IoT devices and things
- Internet of identity and ownership
and most recent challenge Internet of AI-powered agent
Satohi paper and Vitalic Buterin idea of intelligent contracts bring a new view of ownership and economy but ignore heavenly privacy , ownership, and data.
Web3 locks a user in a new glass cage
Blockchain is a promise of WEB 3 and a new era of internet lock users in even more restricted and isolated networks that force to be self-contained and accumulate mainly public data inside a network with highly hight cost storage and require the cost of interaction. Another challenge is a speed of transation — blockchains are slow. So blockchain is cool for assets and a new economy but fail to create a identity and new social space for extended human and machines
#Web5 and #SSI
Idea is simple — we build a missed identity layer that treat humans as something more than a private key and give a tools to create a data point about ourselves and others and freally exchange this data via protocols. We unlock a user for a glass cage of blockchain and from a fragmented nightmare of web2 platforms and apps where you slice yourself to hundreds of you. Now holistic you open to the world
WEB5 #WEB7
Web 5 and web7 use a #DID and decentralized identity to create a network-agnostic decentralized ownership that give identity to you , your devices, your data, and your AI agent.
WEB5 is built around Decentralized web nodes and DIDs and driven by TBD
WEB7 uses a DID as same as web5 but on top of did comm communication protocols but still luck a persistent layer
Next is web of trusted computing and AI agents
Now, we could make this tool securely talk to each other. Now we need more — protocols and trusted executed computing that allow users to run their software and AI agents. Now we need the internet of private and trusted computing and secure space where you could train and use AI on private datasets. Let’s make an internet of secure computation edge compute. One cool area is fog computing.
#architecture #web2 #web3 #web5 #ssi #web7 #aiagents
What #verifier actually verifie in verifiable credential and what’s could go wrong ? If we talk about classical json-ld vc:
- validity of a context and corresponding data . It is a point of few big performance and security issues in case your json-ld context represented as external link . Could enforce recursive http calls
- signature of issuer : give a data integrity and authenticity of data. Often depends on did resolution that relay on external did registry . In case of blockchain based did resolution could be slow
- cryptographical suite should be supported by verifier . As same as a key formats .
- in case of revocable credential one more dependency for revacation list credential and possibly on revacation list resolution. Also it is few revocation list and revocation status implementation
- expiration date of VC . General topic of handling time stamps .
- optionally json schema could be a part of VC but often ignored so it is application responsibility .
What is not verifiable :
- ownership of presented VC or any kind of holder correlation even if holder section is present . VP partially solve this challenge but general problem of binding is open .
- validity of a data
- validity of data capturing
- any kind of chains of trust and trust related topics .
So most important parts are subject of trust relation to issuer and data capturing protocols and procedures that regulated by trust frameworks and trust registries some of them require policy and legal frameworks .
Summary : trust is not verifiable!
Verification could relay on centralized systems that represent schema and revocation registries as same as decentralized did registries . So it is not so autonomous as majority users think .
#ssi
SSI in 7 toots:
1) #SSI augments the Internet with missed Identity layer that gives a digital identity to a user and provides the user an instrument to share data about himself and others in an end-verifiable way.
2) SSI is #architecture and a set of #principles that build user-centric and data-centric networks where the user has untakable rights to control and access his data and identity without needing centralized organizations or other medium systems. Every network user has the same rights and functions that allow them to manage their data and identity. It is sovereign you in a network.
3) #SSI principles
#Existence — exist in real life
#Control —control their identities.
#Access —access to their own data
#Transparency — Systems and algorithms must be transparent.
#Persistence — must be long-lived.
#Portability — identity must be transportable
#Interoperability — Identities should be as widely usable as possible.
#Consent — Users must agree to the use of their identity.
#Minimization — Disclosure of claims must be minimized
#Protection — The rights of users must be protected
4) #Transparency , #Portability, #Interoperability enforced by open standards and portable self-explaining and self contain data format and distributed data with meaning and context understandable for machines and humans. Together with data, we have interoperability of behavior that is achieved with #protocols that describe data, user roles, and expected behaviors.
5) Full Decoupling of identity, protocols, and data from applications allows the building of entirely decentralized and open-distributed systems for the good of all
6) SSI tools are like an onion of tools and functions that form your digital identity:
- Asymmetric Keys + Signatures - backbone of decentralized identity in #web3 and #web5 that give #algorithmic #cryptographical basics of identity.
- #DID give Decentralized Public Key Infrastructure that distributes your Public Keys and service endpoints to a broader audience.
- #VC Verifiable credentials allow you to share information about yourself and others in a temper-proof and end-verifiable way. VC contains the issuer's signature, a person, and an organization that creates a data statement.
- #VP or verifiable presentation solves a problem of proof of Ownership. It is like an envelope with multiple #VC from different issuers or self-issued statements combined with your signature proving your data ownership.
#VP + #DID form your digital identity
7) #Control , #Consent, #Minimization , #Interoperability enforced by user-centric, exchange protocols. In the scope of these protocols, we have a role:
- holder - a party that owns data and gives content to share data with others via VP
- issuer - party that creates a data point via VC and shares it with a holder
- verifier - attest and check data
Roles are not the permanent user could change roles during the exchange session
I worked a lot on secure messaging and confidential communication.
I see a great match of work that TBD folks do in the #DWN space with secure and confidential messages.
Sure, it is more of a building block requiring application logic and features, but it is a perfect start.
In general, today's communication channels are broken because that attached to a sensitive identifier like phone or email that is forced to be public and almost impossible to drop or change, especially for phone numbers.
If your phone number gets leaked, you will get spam in the best case.
What if you could have a communication channel with an identifier that is easy to drop or stop following or, even better, have an identifier for different types of relations? Most extreme and privacy-focused pattern - create a new identity for every relationship or, to some extent, for every transaction.
DIDs give you such an identifier.
We all know about did comm, but for me, did comm is to tech, to low-level, and does not offer an end-to-end solution with transport, persistence, and something more user-focused.
We still need to find a balance between privacy and convenience, how to manage KYC and address books for new identifiers, and how to simplify a cognitive load of a network of networks.
Nice text
With Complex Carbohydrates it could be hard especially on diet and etc. One more missed topic is tea. Puehr tea is one more fermented product. Majority of green teas full of polyphenols that good for Gut and immune system
#trust #compute #ssi #ai
I am not a big fun of morning magic . I believe that quality sleep 8+ hours long is more critical for your success .
Few things in morning routine change my productivity a lot .
1) switch from coffe to puehr tea . It is give softer effect and bring more focus and awernes with out caffein crash effect .
2) tea meditation- priceless experience. Listen inner you and enjoy tea.
3) Nordic walking after tea . We think , memorize and make decision better on go . Movement in space with moderate activity is secret thinking / learning weapon . You could learn think and meditate in 45 - 60 m slot. Be careful you need safe walking area like park for this
4) interval fasting - it is ok to skip breakfast if you know what you doing . It will give extra time for other things
5) journaling and zettelkasten sessions - play 30 minutes with your digital twin. It is generating a lot of ideas. In genaral talk to yourself and your ideas more.
6) focus more on goals in morning planing not on super detailed per hour plan .
7) spend time with family before work .
Staff Engineer: Leadership beyond the management track (English Edition)

#bookshelf . Staff+ is relatively new grade but quite old concept . Leaders without direct reports that do impact without formal titles with informal empathy and experience based approach . Every organization has different view on this position but for me it is always about empowering and enabling others . It is more about concepts , principles and ideas.
Book is quite good intro to taxonomy of staff+
My survival must have tools
- know your why narrative
- risk registry
- architecture decision logs
- technical decision logs
- c4 architecture diagrams
- architecture narrative with history and why’s
- change managment policy
- data management policy

LinkedIn
This link will take you to a page that’s not on LinkedIn
#SSI is the best friend and prerequisites for new #AI world .
We already have a lot of use cases
- authentic and attested sensors - how to prove that audio and photo is organic original.
- authentic data and data ownership .
- #zkml and prove of model use
I keen to see more and more cases .
My favorit one data economy - we need a protocols for quality data . We need a way to pay back people for data that was used for models .
Big open question that will create new business models - how to measure a contribution of your data to model and produced result ?
Introduction | ZK Learning Resources
<iframe
#rust #helo2 #zk quite good intro to proofs
Zukunft-Innovation-Technik (ZuInnoTe) - Digitalize your business
Zukunft-Innovation-Technik (ZuInnoTe) - Digitalize your business
#rust #wasm modules . Folks any samples of federated monolith that could load modules on fly ? it is easy to do on js . looking for something on #rust
#Relays have been powering telecom for decades. Messaging is a foundational topic for Sovereign networks. We have many transport protocols like a #didcomm #iden3comm, but we still need an end-to-end solution with permission and persistence in place. Decentralized Web Nodes #DWN offers a relay-based network topology with persistence. The same topology was proposed by #noster. So why #relays are so important?
#web3 is abused term . It is not about crypto . It is not about blockchain. For me it is more about freedom of choice. Freedom of ownership of your data , your identity , your devices , your social relations . I like more concept of sovereign internet . #ssi
#blusky - folks, I didn't get the point. Why it is still on invitation only? Is it a decentralized and open social network, or what?
Well, I am happy to see that identity is based on DID. It is a big benefit over #nostr, but your repositories - why is it so complex with so much of reinventing the wheel? If you use iplds you don't need a lexicon.
I still didn't get an architecture is it relays or federated servers?
I have an impression that #DWN could build up a protocol that will simulate a #blusky in more open manure based on way more open data and standards
I don’t believe in work life balance it is self destroying concept . I more about life work integration but I meet in 22 years only one organization that admit this and create more life space at work . For me thinking time is part of work / life . I have list of 12 favorites problems to think about. For me learning and teaching is part of work / life . Recovery and rest require work and discipline itself . I have a lot of tools and rituals on edge of life work integration . Quality time at work and life .
Work from home improve a lot but not and Covid time . Around 2020 work destroy me completely and after this experience I really rethink and redesign a lot of routines . I still reflecting and try to formalize and make it useful and reproducible for others .
#work #life
about #nostr