Awakening β–Ά Prospective β–Ά Identity

Identity

Interest

We will see in the context and study sections that identification is a central issue in social organization. Furthermore, as techniques are evolving rapidly, it is important for Awakening to be effective in this field.

πŸ“š Context

Identity: function and implementation

The identity of individuals plays a capital central role throughout the animal kingdom: recognizing to associate information. For example, this horse is spirited, that friend is calm, etc. Identity plays an important role in adapting behaviors.

When groups became too large to memorize everyone, non-identification became a problem. Several alternative solutions helped fill the functionality void, such as:

* Physical appearance
One adapts one's behavior based on identity groups rather than individuals. For example, the appearance of wealth, phenotype, body language, etc. All these appearances had almost no interest at the time when humans lived with identified and well-known people. For example, it is important to know that a certain person has a bad back (because in a small group we depend on one another) and it is inefficient to attribute absurd characteristics based on skin color.
* Centralized administrative identification
It allows for listing individuals; it is currently managed by the State administration. It allows, for example, the use of contracts (a contract requires knowing who is who), ensuring justice, taxes, etc.
* Morality
It allows determining the behaviors to follow according to different criteria. It is generally modeled in a decentralized way but is a full-fledged organ of society and can therefore be strongly influenced by the social structure.
For example, in certain cultures, morality demands helping others, whereas in others, morality pushes towards individualism. So, rather than freely helping more or less according to one's own criteria, one will be guided in the behavior to adopt with unknown individuals because efficiency dictates that we use relevant representations.
In general, morality is so integrated that we pay no attention to it and render it invisible in its influence on our mental freedom. But one can study its structure; this involves, for example, remarks made to children when they follow a moral rule or not.

Technological evolution and identity

Technological advancement has greatly progressed capabilities regarding centralized identification. For example, centralized files in computers, the addition of multiple pieces of information associated with identity, or even facial recognition. Furthermore, the mastery of social networks by large capitalist groups has allowed them to add a role of information association to identity: promoting certain people (and thus ideas) and silencing others.

We therefore see that tools related to identity are becoming increasingly powerful.

❓ Question

Are identification functions necessary in a just society ? If so, how then to provide identification and information association functions to identities without falling into current pitfalls ?

πŸ“ Study

Modern Identity

The habit of authoritarianism and the lack of knowledge of modern techniques push towards having a distorted vision of identity. For example, it is now possible to prove that one does not yet have an account with a certain service without revealing information about oneself other than this proof (no name, no email, no identity ID, etc.). Modern technological feats are often counter-intuitive because the capabilities are so high. For example, it is possible to maintain a totally public and transparent accounting where everyone can verify compliance with rules while respecting the anonymity of account owners as well as the confidentiality of transactions; that is to say, one does not know which account pays which sum to which account! See such an example: ZCash.

This is why we must rethink identity as a system of services and no longer as a simple identifier that we give out willy-nilly and that serves for everything, as we do with an identity card. We must now see identity as a right to provide certain proofs.

Some technical possibilities:

* Eliminate the vulnerability of centralization

For example, with blockchain technology, it is possible to not have a point of vulnerability like an authority can be (corruption, penetration of the IT service, etc.).

* Grant or revoke rights to an organization

A public organization (police, State, etc.) or private one (company, association, etc.) can obtain the right to request information managed by the identity. One might think that asking for information is never a problem, but this is false because a service can blackmail by refusing service if the information is not given. It is precisely this mechanism that causes the current inflation in intrusive information requests from companies.

To control the right of request, it is possible to give or revoke a request authorization key to/from different organizations. This right can be entirely managed in a decentralized manner via the blockchain. For example, everyone confidentially chooses what they authorize, and the majority of choices wins. We could thus have a city police force that would have the right to ask for the address of people stopped, and which would be denied the right if the majority of people find that this police force is abusive.

Rights management may not be based on the majority; it can also be integrated into a sophisticated and intelligent system also managed without authority.

* Prove that one is not already registered for a service.

We can prove it without the service provider even knowing who we are.

* Provide an email or other means of contact without identifying oneself

It suffices to have an alias generation system integrated into the email service or even provided by another service.

* Create an identity without authority

It is possible to create an identity based on criteria and proofs where everyone can play the role of the user or the administration. A system for memorizing who played the role of the administration for which user allows to represent a network and thus spot fraud. A reliability score can be assigned to restrict fraudsters. This helps avoid fraud where a group would seek to build false identities by validating each other. Each identity could be verified by random members in order to detect fraud.

In practice, various criteria such as physical appearance (biometrics, etc.), state identity, etc., can be used. The person acting as verifier puts their reputation on the network at stake. All this information can be stored not in plain text but in a form that prevents data theft. The goal is not to keep the information but to produce a unique numerical value which cannot change from one verification to another.

Services rendered by identity

Here are a few services that show it is necessary to have identity management:

* Voting
To prevent a person from voting multiple times
* Reputation
For example, it is good to know that a person has committed violence to prevent them from obtaining a job linking them to vulnerable people.
* Social network attacks
Without identity, an aggressive entity can create numerous accounts and spoil the social network in various ways. This is currently the case with bots.

The dangers of identity

Identity is central to society and technical means are evolving fast. We observe rapid growth in the intrusion of political and economic powers into private life.

We cannot regain control by hoping to block it through the expression of popular demand because modern techniques of material and immaterial confinement have played in favor of those who organize themselves autonomously (currently the ruling class). The only solution is to organize autonomously in a decentralized manner so as not to be vulnerable and fall back into power grabs.

Like any reorganization, this involves dangers (cf. the Russian Revolution). Because the more we touch the heart of social organization, the more errors cause fragilities.

Fortunately, clean solution techniques have also progressed, and there are many people with the skills to produce reliable and aesthetic tools.

πŸ’‘ Response

It is necessary to build a decentralized identification and certificate tool, as this allows protecting Awakening from attacks and is also indispensable for a viable social organization.

The study section defines some useful functions, but it is necessary to deepen the requirements and techniques.

Β