[liberationtech] How the Next Generation Diaspora* Should Be Built to Help High-Risk Activists

Yosem Companys companys at stanford.edu
Sat Nov 26 18:22:02 PST 2011


 How the Next Generation Diaspora* Should Be Built to Help High-Risk
Activists<http://liberationtech.tumblr.com/post/13377461578/how-the-next-generation-diaspora-should-be-built-to>

*I. Introduction*

An online privacy activist recently asked me: Suppose you were to build the
next-generation Diaspora* b i.e., a secure, private, and decentralized
social network b how would you go about it?

The question is an important one, especially considering that many
projects preceded Diaspora* but failed to gain
traction<http://www.w3.org/2005/Incubator/federatedsocialweb/wiki/FSWS2010_-_Projects>,
along with the skepticism with which Diaspora* has been met in hacker
circles.

Hacker News has been particularly vicious, with attacks on Diaspora*bs
security and privacy code implementation from the get
go<http://news.ycombinator.com/item?id=1718367> and
with criticism of the Diaspora*bs team ability (or lack thereof) to
implement its vision <http://news.ycombinator.com/item?id=1701542>.

Criticism has also come from the mainstream media, where reporters have
wondered bwhatever happened to
Diaspora*<http://blogs.wsj.com/tech-europe/2011/11/07/whatever-happened-to-diaspora-the-facebook-killer/>b
and bwhatbs taking so
long<http://tech.blorge.com/Structure:%20/2011/10/12/free-diaspora-begs-for-more-cash/>,b
as
though building a secure, private, and decentralized social network were as
easy as building a centralized alternative like Facebook.  In this context,
credit should be given to the Diaspora* founders for trying to advance the
vision by learning from the mistakes past projects have made in this space.

*II. What is the goal?*

One of the first steps to undertake when answering the question posed by my
online privacy activist friend is to determine what the goal of such a
next-generation Diaspora* would be.  For example, if the goal is to gain
traction among mainstream users, as Diso creator Steve Ivy has
suggested<http://www.monkinetic.com/2010/05/why-no-one-is-going-to-succeed-at-building-the-notfacebook.html>,
then the focus would not be so much on the merits of the technology at
ensuring security and privacy, as it would be on its ability to use
decentralization to overcome Facebookbs considerable network
effects<http://en.wikipedia.org/wiki/Network_effect>.
As one of Liberationtech <http://liberationtechnology.stanford.edu/>bs
coordinators, Ibm much more interested in the former than the latter, for
there are many people in the world who care about security, privacy, and
decentralization for its own sake, and there is a very compelling reason
for giving these people such a solution, i.e., their very lives depend on
it.  Before we delve into that topic, however, Ibd like to address the
question of how one would overcome Facebookbs network effects.

*III. How does one overcome Facebookbs network effects?*

As you may recall from economics, a network
effect<http://en.wikipedia.org/wiki/Network_effect> is
the effect one user of a good or service has on the value of that product
to other people.  A network with a lot of people has more value than one
that has fewer people.  For example, if you are looking for a job, or
searching for people who share your interests, you are more likely to find
them in a larger network than in a smaller one.  Since people will choose
to join the larger network at the expense of the smaller one, one will
ultimately end up with one giant network, as barring some kind of niche
offering in smaller networks, one is unlikely to find any value in the
smaller networks as the number of users on those networks dwindles.

This process also illustrates how difficult it is to persuade one person to
switch from one network to another.  A person benefits from her
participation in a social network because she has ties on that network.
That personbs friends benefit from their participation in that network
because of their ties.  As such, to persuade someone to switch from one
network to another, you must not only persuade that person to make the
switch but also that personbs ties, thereby creating a chicken-and-egg
problem <http://en.wikipedia.org/wiki/Chicken_or_the_egg>: That person will
switch only if her friends switch, and the friends will switch only if that
person switches.  Thus, overcoming network effects is a group problem, not
an individual one: You must create a social movement of sorts to encourage
people to switch from one social network to another, or at the very least,
create an information cascade<http://en.wikipedia.org/wiki/Information_cascade>
 orbandwagon effect <http://en.wikipedia.org/wiki/Bandwagon_effect%20> that
encourages people to switch.

For those who may be skeptical about the strength of Facebookbs network
effects, consider the following:
Polls<http://www.allfacebook.com/survey-seven-in-ten-facebookers-worry-about-privacy-2011-02>
regularly
find that approximately 70% of users are concerned about their Facebook
privacy and security, yet according to a proprietary Forrester study only
4% quit Facebook for this reason.  In fact, nearly half of those who quit
Facebook do so because they were bored with Facebook or found a better
niche site elsewhere.  These numbers suggest the strength of Facebookbs
social network effect.  Given the seriousness of peoplebs security and
privacy concerns, one would expect a much larger number of people to quit.
Yet they donbt do so because quitting would mean losing touch with your
friends and other contacts on the Facebook network.

You may immediately notice, however, that this economics story is
one-sided: The assumption is that advantages in network size will create an
inexorable trend towards consolidation, yet the disadvantages in network
size that could create an equally strong or more powerful effect away from
consolidation is left unexplored.  We know, however, that such effects
exist.  Otherwise, how would MySpace have replaced Friendster in the first
place?  Or how would Facebook have replaced MySpace?

The question that arises then is the following: How does one overcome
Facebookbs network effect?  There is less research on overcoming network
effects than on their inevitability, but some possibilities immediately
come to mind.

*A. Deep Pockets*

One obvious possibility is that a competitor may come along with pockets
sufficiently deep enough to challenge the entrenched network.  Such a
competitor could spend considerable resources on marketing and advertising
to attract users to switch from the dominant network to the competing one.
Yet, as Google+bs experience has shown, this process may be neither
immediate nor successful.  The verdict is still out, but Google+bs recent
experience<http://tech.slashdot.org/story/11/10/10/1624207/google-loses-60-of-active-users>suggests
that deep pockets may not be enough to counter a leading networkbs network
effect.

*B. People Discovery*

A second promising alternative is people discovery, i.e., a social network
that enables you to meet people you donbt know.  Despite an extensive
academic literature that suggests that people are distrustful at meeting
strangers in real life, proprietary Mintel data suggests the opposite:
Nearly 50% of those surveyed say they would like to meet strangers online,
and many admit to bfriendingb strangers on a regular basis, including
women, who are generally assumed to be much more distrustful of strangers.
Web inventor Tim Berners-Lee sees people discovery, or stretching onebs
ties to meeting people who are different from
us<http://www.wired.co.uk/news/archive/2011-04/19/tim-berners-lee-science-w3c>,
as the next social networking frontier, and companies have heeded the call,
as Altlybs transformation from a private social network to a
people-discovery engine named
BetaBeat<http://techcrunch.com/2011/09/13/upcoming-social-network-altly-is-now-anybeat-goes-into-private-beta/>
has
shown.

Itbs unclear, however, whether people discovery will be sufficient to
overcome Facebookbs network effects, especially since Facebook has
sufficient resources to copy any social network innovation in this area to
its advantage.  Moreover, by virtue of Facebookbs larger pool of users, the
company should be in an ideal position to introduce people to others they
do not know.

As Twitter has shown, however, people discovery has the distinct advantage
of circumventing Facebookbs network effect.  If a new social network
focuses on people who want to meet those they donbt know, then those people
are also less likely to care whether their existing ties are on that new
network, since by definition they donbt care as much about their existing
ties as they do about establishing new ones.  Twitter has capitalized on
this insight, and Facebook has recognized it, as the latterbs ongoing
transformation from a private, close-tie, college-based campus network to a
public, weak tie, international network has
shown<http://www.huffingtonpost.com/2011/09/16/facebook-subscribe-copies-twitter_n_966193.html>.
In economics, some<http://en.wikipedia.org/wiki/Open_Veins_of_Latin_America>have
argued that countries pursue protectionism when they are poor and free
trade when they are rich.  Similarly, Facebook was for privacy as a small
network and is now for openness as a large one.

*C. Technical Superiority*

A third possibility is to find a technical feature (or set of features)
that are more valuable than those offered by the dominant network.  In
other words, one would focus on technical advantages that overcome the
social advantages created through network effects.  An example of this can
be found in how Google overcame Yahoo at
search<http://lowendmac.com/orchard/09th/google-history.html>.
Google had a search algorithm that generated better results, and over time,
people gravitated to Google over Yahoo.

One example that comes to mind in the network space would be the
application of natural language
processing<http://en.wikipedia.org/wiki/Natural_language_processing>
to
enable users to get more benefits out of their social network ties.
Facebook does this through filtering, albeit not as transparently as many
would like, leading thinkers like Eli
Pariser<http://en.wikipedia.org/wiki/Eli_Pariser> to
complain about the dangers of bfilter
bubbles<http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles.html>.b
In fact, there is a battle brewing
betweenFacebook<http://www.zdnet.com/blog/facebook/facebook-using-natural-language-processing-to-group-posts-link-to-pages/2380>
 and Google+ <http://www.youtube.com/watch?v=Sx3Fpw0XCXk> in this area, as
natural language processing is seen as the potential driver for a new wave
of social network interactions.  Nevertheless, just as Google did to Yahoo,
it is entirely conceivable that a new network could come along with a
proprietary algorithm in natural language processing that could give it a
similar technical advantage over Facebook or Google+ in the social
networking marketplace.

Moreover, there are many unexplored innovations in this space:  While
computational researchers have made advancements in the study of syntax and
semantics <http://en.wikipedia.org/wiki/Computational_linguistics>,
pragmatics <http://en.wikipedia.org/wiki/Pragmatics> remains a relatively
black box, despite media hype to the contrary.  In fact, the most
sophisticated research in this area comes not from computer science but
from social network
analysis<http://en.wikipedia.org/wiki/Social_network#Social_network_analysis>
in
the behavioral sciences.  Surprisingly, however, programmers have yet to
mine this extensive literature for behavioral insights with which to
construct better social networking sites.

*D. Total Institutions*

One final possibility comes from the realm of total
institutions<http://en.wikipedia.org/wiki/Total_institution>.
A total institution can be defined as a place of work and residence where a
great number of similarly situated people, cut off from the wider community
for a considerable time, together lead an enclosed, formally administered
round of life.  Examples of total institutions include monasteries, the
army, prisons, and psychiatric institutions, among many others.  Total
institutions are dense locations of activity, where ideas can spread
quickly, and thus they are ideal locations for fostering the growth of
social networking sites.

Youbre probably thinking: bThatbs crazy. Are you suggesting that we build a
social network out of an insane asylum?b  But before you discount the idea,
remember that this is exactly one of the reasons why Facebook became a
dominant player in social networking.  Facebook, in fact, capitalized on
the most influential total institution of Western society, i.e., the
college campus.  On college campuses, students work and live together, and
they share similar values and engage in similar activities, cut off from
the wider community for at least four years.  Facebookbs strategy, as I
have explained elsewhere<http://liberationtech.tumblr.com/post/13205628046/the-story-of-online-social-networks>,
focused on controlled growth and saturation from one college to the next.
To the extent that female students had privacy fears about joining
Facebook, these concerns were assuaged by the fact that Facebook only
allowed people who had university email addresses to join, such that the
number of potential whack jobs were limited to those that you knew on your
college campus, not those that you did not.  This may also help explain why
Facebook, unlike other social networking and dating sites, is predominantly
female, and why men b as even the Facebook founders themselves acknowledge
b were so attracted to joining Facebook in the first place.

This story raises the question:  Can a new social networking site challenge
Facebook by taking over college campuses again?  The answer to that is
unclear.  Facebook remains strong among college campuses, though the bulk
of its growth is now coming from older demographics, such that the
proportion of college students in the network has fallen.  You could say
that Facebookbs strategy has now shifted from the campus as a total
institution to the elderly home as a total institution.  At the same time,
college campus-specific social networks have been launched in recent years
but have made scarcely a dent on Facebookbs college-age numbers.

As such, a better question to ask is the following:  Are there other total
institutions out there that social networking entrepreneurs can tap into to
challenge Facebookbs dominance?  I donbt really have a good answer to this
question, so it remains rhetorical.  But to the extent that Diaspora* has
gotten more traction than other social networking sites, it is because it
has tapped into the free culture
movement<http://en.wikipedia.org/wiki/Free_culture_movement>
, hackerspaces <http://en.wikipedia.org/wiki/Hackerspace> and maker
spaces<http://hardware.slashdot.org/story/11/11/21/1937243/are-maker-spaces-the-future-of-public-libraries>,
and so on.  Similarly, though Silicon Valley has an aversion to politics, a
social networking site that is built out of movements such as
Anonymous<http://en.wikipedia.org/wiki/Anonymous_(group)>
,WikiLeaks <http://en.wikipedia.org/wiki/WikiLeaks>, or the Occupy
movement<http://en.wikipedia.org/wiki/Occupy_movement> may
be able to attain significant traction, if timed properly.  In short, while
the number of pure total institutions in our society is limited, it is
clear from Diaspora*bs experience that a group-based social networking
recruitment approach may work better for social networking entrepreneurs
than the traditional individual-based approach they have followed to date.

*IV. Getting back to the task at hand*

Overcoming Facebookbs network effect, however, only matter to the extent
that you want to build traction to supplant Facebook.  But suppose youbre
not interested in traction.  Suppose that what you care about is to create
a secure, private, and decentralized Facebook alternative that
protects high-risk
activists fighting for freedom, democracy, and human rights in oppressive,
dangerous environments <http://liberationtechnology.stanford.edu/>.  Then,
many of the mainstream usersb considerations drop out of the equation, and
the problem becomes much more focused and manageable b albeit still
difficult.  At the same time, however, mainstream users who care about
privacy and security can still use the solution, if they are so inclined.

As a Stanford liberationtech
<http://liberationtechnology.stanford.edu/> coordinator,
you can see why I would be so interested in such a solution.  The goal of
our program is to conduct research and design of information and
communication technologies to foster freedom, democracy, human rights,
development, and effective governance.  In other words, we want to figure
out ways in which technology can support the dangerous work that activists
conduct every day to create a better world.  A secure, private, and
decentralized communication platform would help support activist efforts to
this end.  And such a platform only needs traction among activists, not all
mainstream users, to succeed.  In other words, it needs to solve the
activist problem, not the mainstream userbs problem, to be most effective.

*A. Organizing versus broadcasting*

But, you may ask, arenbt movements like the Occupy movement, theArab
Spring<http://en.wikipedia.org/wiki/Arab_Spring>,
or the *Indignados <http://en.wikipedia.org/wiki/2011_Spanish_protests> *more
interested in spreading the word?  As such, how can you give up on traction
in pursuit of this goal?  To answer these questions, it is important to
differentiate between what activists do *before* a movement and what they
do *during* a movement.  As my doctoral dissertation shows, before a
movement, an activist needs a private and secure platform to organize with
a small group of people.  These are the people who lay the groundwork for
what the movement is to become.  Authoritarian regimes understand this,
which is why they seek to stamp out the early-movers, and why they
immediately crack down on any signs of free assembly.  When groups of
people are able to assemble in such environments, thatbs when the regimebs
days are numbered.

If people are able to assemble, then the activistbs task changes from
organizing to spreading the word.  It is at this point that traction, or
the broadcast capabilities of a social networking site, become important.
But as we have seen, large mainstream social networking sites like Facebook
and Twitter are more effective at doing this task.  Once activists get to
the broadcasting stage, what becomes more important to them is to protect
their identities as they spread the movementbs message.  But the organizing
task is never completed.  The organizing task continues.  And it is this
organizing task that I care about most.  This critical organizing task is
done by a small group of people that need to be able to maintain strong
ties to one another in a secure and private fashion if they are to succeed.

This explanation starts to draw the raw schematic of what a next generation
Diaspora*-like private, secure, and distributed social network should look
like, if it is to achieve
Liberationtech<http://liberationtechnology.stanford.edu/> ends.
The network should facilitate the communication of a small group of people
seeking to organize social change and subsequently enable them to broadcast
that message through larger mainstream social networking sites to generate
the strength-in-numbers that can help movements grow and ultimately bring
about political change.  In other words, it must be a secure and private
social networking site with
HootSuite<http://en.wikipedia.org/wiki/HootSuite>-like
capabilities that can protect the anonymity of the person broadcasting
messages to the larger and more mainstream social networking sites.

*B. Decentralization*

So far, my emphasis has been on security and privacy alone.  But
decentralization is inextricably tied to security and privacy and equally
important.  What do we mean by decentralization?  Decentralization means
that instead of having to post a message to a central server like Facebook,
and then wait for that server to transfer that message (or not, in the case
of censorship) to your friend, you send that message to your friend
directly.  To achieve this, communication must be machine-to-machine, where
the sender controls the first machine and the recipient controls the
second, and the message that is transmitted is encrypted to ensure that
only the sender and the recipient can read it.  In other words, the sender
and recipient must have an easy and fast means to install and manage the
software on their machines b whether these machines are servers, computers,
or phones, as in the FreedomBox <http://freedomboxfoundation.org/>vision.
 Furthermore, the sender and the recipient must have the ability to stop
using their machines and seamlessly use new ones, should the original
machines be compromised for whatever reason by an authoritarian regime.
The software would need to have an easy bself-destruct mechanismb such that
the data can be destroyed immediately in an emergency.  At the same time,
the bright to forget<http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all>b
would have to be embedded from the get go, such that the data would self
destruct after a certain period of time to prevent a trail of communication
that would make it easy for an authoritarian regime to track down the
activists.  As such, the next generation of secure, private, and
decentralized social networking site would create a one-click turnkey
solution for activists that could easily be discarded if compromised and
whose data could be destroyed automatically as the utility of the data
diminishes while organizing unfolds.

*C. Mobility*

There is one final consideration.  Activists are constantly on the move,
such that the social networking site will need to be mobile from the get go
and have the capability of synchronizing data on multiple machines
simultaneously.  Thus, if the activist needs to coordinate with others
elsewhere, she must have the capability to access her data from the
alternate location.  Similarly, there will be times when the activist will
attend a street protest, and the relevant social networking data will need
to be accessible on her phone.  Other times, the activist will need to go
to a bsafe house <http://en.wikipedia.org/wiki/Safe_house>b and access her
data from there.

Moreover, connectivity will vary greatly.  At times the activist may have
access to broadband Internet, but other times, she may need to connect via
a 56K modem, a mobile connection, a mesh
network<http://en.wikipedia.org/wiki/Wireless_mesh_network>,
or perhaps even a satellite link.  The social networking site will need to
be accessible regardless of the connectivity, which means significant work
on data compression <http://en.wikipedia.org/wiki/Data_compression> will be
required to ensure that the softwarebs performance remains nimble under
such disparate conditions.  This creates difficult challenges for the
developers of such an application that developers of mainstream
applications would never have to encounter.

*D.  Cooperative*

So how does one draw the necessary resources required to overcome the
aforementioned challenges of security, privacy, decentralization, and
mobility to build such a social networking site?  Western society gives us
two main legal-institutional vehicles for tackling the problem:  i) a
for-profit firm a la limited liability
company<http://en.wikipedia.org/wiki/Limited_liability_company>
 or C corporation <http://en.wikipedia.org/wiki/C_corporation>; or ii) a
non-profit firm a la private
foundation<http://en.wikipedia.org/wiki/Private_foundation>
 or 501(c) organization <http://en.wikipedia.org/wiki/501(c)_organization>.
 (Another possibility is a hybrid for-profit/non-profit model a la
WordPress<http://en.wikipedia.org/wiki/WordPress>
 or Mozilla <http://en.wikipedia.org/wiki/Mozilla>, but letbs set that
aside for now.)  In either case, a group of individuals b usually, the
founders b become owners of the organization and raise the necessary
resources needed to execute the organizationbs mission, implement its
strategies, and reach its goals.

A for-profit organization like a C-Corp is ideally suited for the task
because the founders can sell an ownership stake in the firm in order to
raise the requisite resources.  But as the saying goes, therebs no such
thing as a free lunch.  The resources come at a cost in terms of the
organization having to perform in a reliable and accountable fashion
relative to the expectations of its shareholders.  In the pursuit of
profit, principle can easily be abandoned since, at the end of the day, all
the shareholders care about is obtaining superior returns relative to what
they could receive by investing elsewhere.  If the firm is able to secure
superior returns, however, other prospective investors will be attracted to
the investment opportunity, thereby providing the organization with the
resources to grow over time.  In the end, shareholders matter more than
customers b and for our purposes, the activists risking their lives for
freedom, democracy, and human rights b for without the shareholders there
is no business.

On the surface, a non-profit organization looks better on principle grounds
because the organization is not acting on the basis of profit alone.
 Nevertheless, a non-profit organization is still owned by a small group of
individuals, and as in the case of a for-profit firm, controlled by its
board of directors, which means all decisions with respect to the
organization and its customers b or in this case, activists b are made by
the board.  This means that, in both the for-profit and non-profit cases,
the product at the end of the day is determined by decisions resulting from
the good will and discretion of a small group of individuals.  Youbll
probably be surprised to hear that itbs often also the case for open-source
projects like Diaspora*.  As Karl Fogelbs book bProducing Open
Source Software: How to Run a Successful Free Software
Project<http://producingoss.com/en/index.html>b teaches,
most open-source projects are run by bbenevolent
dictators<http://producingoss.com/en/social-infrastructure.html#benevolent-dictator>b
in whom bfinal decision-making authority restsb and bwho, by virtue of
personality and experience, is expected to use it wisely.b Even in the case
where the project isAffero General Public License (or
AGPL)<http://en.wikipedia.org/wiki/Affero_General_Public_License>,
the benevolent dictator can make decisions that can prevent the right
technologies from being implemented over the course of the project.  The
project may even create disincentives for open-source involvement by
creating restrictive intellectual property (IP) assignment contracts that
require developers to give up all rights to the code they produce.  And
worse, a non-profit organization cannot sell shares, which means that there
are no financial incentives other than the generosity of donors to raise
the resources required to develop it.

So to summarize, on the one hand, therebs the for-profit firm that can sell
shares to raise the necessary revenues to develop a product but in many
cases may sell out principle in pursuit of profit, and on the other hand,
therebs the non-profit firm that has to depend on donations but, as in its
for-profit counterpart, still makes the activists beholden to the actions
of a few individuals.  Given this predicament, what are we to do to ensure
that the organization is accountable to the activists it serves and can
mobilize developers to contribute in an open-source manner to the project?
 One possibility is the cooperative<http://en.wikipedia.org/wiki/Cooperative>,
a business organization owned and controlled democratically by its members
for mutual benefit.  The cooperative can range from for-profit to
non-profit, depending on the projectbs ultimate goals.  Thus, while the
cooperative is not a magical solution to all of the aforementioned
problems, it can help ameliorate many of them, when correctly designed and
executed.

The advantage of the cooperative for purposes of the task at hand is that
it can ensure that the organization operates in a democratic and
accountable fashion relative to the developers who contribute the code to
solve the aforementioned technical challenges and relative to the activists
who risk their lives using the technology to do their jobs on the field.
 The developers can transfer their IP rights to the cooperative, knowing
that such rights will not be exploited for financial gain without them.
 Similarly, the activists can know that the organization has their best
interest at heart and thus can trust that the solution will be built and
subsequently developed with their needs and concerns in mind.

*V. Conclusion*

So in response to my online privacy activist friendbs question about how I
would build the next-generation Diaspora*, my answer is this:  I would
create it first and foremost as a secure, private, distributed, and mobile
platform with HootSuite <http://en.wikipedia.org/wiki/HootSuite>-like (but
anonymous) broadcast capabilities and fast and reliable performance under
rapidly changing conditions.  But I would make sure to work within a
cooperative legal-institutional framework to find the correct design that
makes the organization accountable both to its developers and customers,
i.e., the activists that the social networking site is meant to serve.

_______________________________________________
liberationtech mailing list
liberationtech at lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?"

You will need the user name and password you receive from the list moderator in monthly reminders.

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE





More information about the cypherpunks-legacy mailing list