The Data In The Open - dito! A privately sharing p2p system distributing its data always encrypted for specific group/s

tags:
0 pages:
Show hidden
RSS: New threads | New posts
Search is temporarily unavailable, we are working to bring it online!
Add to this wiki
Edit | Code | Tag | Commentsn/show Forum {$permit_forum} can create
Contact {$permit_chat} can create | Wiki {$permit_wiki} can create | Blog Any wikidot.com user can create | Doc Any member can create
| July 2017 |
| Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
Saturday |
Sunday |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Next |
General Anyone can create |
How |
Gentrification Resistant HowTo @ Postnational Solutions
Get Organized AS Peer Owners
Contributions last month: 0
Contributors: 1
Constitution of its Citizens
Against corruption, let's now make it !!!
Contributions last month: 0
Contributors: 1
Common Companies/Companions: ComComized @ Postnational Solutions
Contributions last month: 0
Contributors: 1
Postnational Solutions To Win the Xenophobic Neoliberalism WithOut the Tyranny of Minority/Majority (by ComComIst) #HopeIsBack
Building Bottom-Up, Self Organized, Responsive, Scalable and Collective Inclusive Growth Solutions #InclusiveGrowth
Contributions last month: 0
Contributors: 6
Rcoin - coin of Respect! @ postnational solutions
Communal, Time Limited and Equally Re-distributed
Contributions last month: 0
Contributors: 9
Yes, I am angry! @ Postnational Solutions
Solutions by Common Companies Foundation of NonProft Netowrk
Contributions last month: 157
Contributors: 4
Blog ComComism ( for Common Companies) @ Postnational Solutions
Public Blog of ComComism for any ComComist
Contributions last month: 0
Contributors: 7
common companies consultants @ Postnational Solutions
Contributions last month: 0
Contributors: 1
ComComized Groups:
Full mobility while blocking unlimited power accumulation for transparent and satisfaction of the members
Contributions last month: 0
Contributors: 7
Latest pages in this site:
contact
Contact me (Erez Elul, namzezam, comcomist) using this form and optionally by using my public key. Using public key is easy (try gpg4win or kgpg + guardianproject) and it is easy to communicate anonymously (try tor). And for what iiaom is, see this + how to. Here is my F786QE36JHIP3JT4OGF2SU5VIN3TB7BSU3QAII6H169FO3N3GOP3MS.iiaom (54B name of 8K file). To upload file (up to 1g) encrypt it 1st, use something like dropcanvas and then the how to get it encrypt with my pub key using this message.

Thinking
People should understand that Google's significant profits of around
$34.9 billion per quarter are tied to an ecosystem that inherently delays the visibility of independent sites like ienets (the proposed alternative name for namzezam), because those delays help maintain Google's monopoly through several mechanisms:
The Mechanics of the Monopoly and Delays
Prioritizing Established Authority (E-E-A-T): Google’s algorithms are fundamentally designed to trust older, more established sites (like Wikidot) over newer ones. This delay in recognizing a new identity (like ienets) is an inherent part of maintaining "quality control." This system benefits Google because established, high-traffic sites are more likely to be monetized effectively through Google's ad network.
The "Zero-Sum Game" Reality: In a market with 90% dominance, a delay for one site means continued traffic (and potential ad impressions) for existing high-ranking sites. The lack of viable competition means Google faces little pressure to speed up the indexing process for every independent query.
Monetizing the Inefficiency: If a user is misled by a result and has to search again, that user generates more data points and more ad impressions for Google. Delays in providing accurate, direct answers are not necessarily an accident; they are a feature of a system maximizing engagement within its own platform.
AI Overview Control: In 2025, Google’s AI Overviews often summarize existing, established sources rather than new ones. By controlling the information flow through its AI, Google keeps users within its ecosystem, further solidifying its market control and revenue streams.
Understanding a large company's financial success often involves examining its business model and market position. Companies that hold a significant share of the market may implement strategies that prioritize established content and maintain user engagement within their platforms. These strategies, while contributing to the company's revenue, can also influence the visibility of newer or alternative sources of information. This is a common aspect of how dominant players in various industries operate.
by
Pharmk346 (guest),
22 Apr 2015 05:14
by
Pharme741 (guest),
21 Apr 2015 17:03
by
Pharmk68 (guest),
20 Apr 2015 05:13
by
Pharmc395 (guest),
18 Apr 2015 23:07
by
Pharmd868 (guest),
16 Apr 2015 04:45
by
Pharmk921 (guest),
14 Apr 2015 16:44
Thx for you effort.
You can abandom all the Articles which have no essence. This is Art. 3, 16, 20, 22, 23, 31, 33
by
Alinka (guest),
28 May 2014 17:26
Under Humanitarian Agpl License, an element of the privateQ project
A privately sharing p2p system distributing its data always encrypted for specific group/s, running its applications only locally and storing its redundant data in some cheap storage, cloud or elsewhere:
The Data In The Open (dito): is data structured in files, each is encrypted for groups of readers (gpg —group ), where the data is in the open (i.e. shared in public boxes/folders/drives/url) and each of its files is renamed and located by any field of its locator, being a record in the (originally named) locators.csv encrypted file
- being specific per root and additionally held by each of the participants (involved peer), while
- being synced/refreshed/notified upon its cid changes, where
- each of its locator records is defined such that
- nid (as in node id) is of 64 char of 32 digit pairs coded in base32 for index<1024 per each layer<31, as the last pair indicates the node's version;
- cid (as in content id) equals hash(content), optionally with some hashcash;
- name(data)=cid(data).type(data), as its original name is moved to its locator (for revalidating in the open as being unchanged and matching content by type from the node until its root);
- stand(data)=(nid(data), name(data));
- h(data) is the host function to download or upload the data, eg. link to dedicated 5G on transfer.sh and how to get it public also on gdrive; and
- locator(data) =(nid(data), cid(data), type(data), cid(stand(data)), original-name(data), age(data), max(age), h(data), list of signatures upon cid(stand(data))).
News:
- using it under humanitarian agpl, while encrypting for group, ie symmetric key of document is encrypted asymmetrically with each of the pub key of the group's members, with interface such as in gpg4usb on Signal Protocol (what is the lib or class to be use in qt environment?),
- such that those groups are nested into each other and represented in a tree by their node name prefixing the name of that group and then using it for dito
- such that the encrypted for group document is hashed and then named and then referable by the hash value, for creating something like blockchain visible only to that specific group, where the individuals are referable by iiaom not email, name tel number, andorid app etc.
Notes:
- At the same node's version, if not defined elsewhere, there could be more than one file of different name.type , original names , age , max(age) or signatures.
- By inserting into the content of file the name.type of its origin and allowing only one such name.type per each node's version, history is maintained without being rewritten.
- This should be used by 2 separated applications (preferably on an external device):
- online-app: Only for get offline after fire offline-app after get online then download, upload or move, i.e. download then upload by tor, torrent or any browser.
- offline-app: fired after download: decrypt/verify ,view , modify encrypt/sign, fire aonline-app (upload this)

Dito use case: Assuming anonymous can only download or add files only to area under digesting dito node, such that the file is to be automatically removed when does not comply with specific conditions to be checked in specific period of time (such as per cycle, it must be younger than max age or permitted by…), such that when accepted the file can be moved to specific participant/s (optionally mapped to iiaom) to be sitting in the corresponding dito-node, where one or more of the participants is functioning as dito-gate-keepers optionally peeking data from the pool before it's expired.
- This, after acceptance by the dito-gate-keepers, can be stored additionally to log of distributed records (in messages and/or files), as dito tree of db»table»column»sorted-field, where each node has name, type and description including how to use it.
- For to reduce spamming risk, the node owners can specify excepted formats up-to max size, lifetime etc and other conditions, with iiaom and public key etc.
The evolutionary naming in dito LogChain: being a p2p and communal bookkeeping of transactions and/or sharing information eg music, while using, instead of mining, signatures and optionally iiaom of authenticators. where
- authenticators are or representing those who made the transactions or bring the information and
- the cid(stand(data)) is digitally signed by, and optionally with the iiaom of, authenticators granting the missing coherence, which is missing from the regularly made activity to be by most of the peers, such as matching hashes of the origin until root, or checking balances/resources against statements etc.
Conclusion The data, being separated from its meta and named somehow, is encrypted (with id of its senders ,its expiration-date,its name,its type,its msg) for specific recipients and stored temporally and hence its url is separately given in another channel to the recipients. Using, publicly or privately, services like https://transfer.sh/ + curl to (up/down) load and https://otr.im/clients.html to notify formated records, where the dito app does:
0. id is iiaom or fingerprint and optionally iiaom, instead of email, is set to key-id, as the app has id mapped (valued) by nice gui identity (key) able be recognized by the user
1. sender, it=encr4ids(file=(from ,, expiration-date,name,type ,, msg))
2. sender, what =url(upload(it))
3. sender, notify: record line formated as: to ,, what, in room or privately
4. recipient, download
5. participants being senders and recipients, optionally log history keeping their record lines
6. participants, periodically and optionally, share (using 1-4 steps) the hashed log to check for matching their own, which on successes produce one consensus with its measurement of that consensus to be marked on their own log.
Conclusion: Per each time-block consisting data and its locator, the longer the chain is, the harder the forgery in it, the maturer it's. The locator in size is small and in its name encapsulates, when conformation is reliable, the whole chain of blocks from the root until the current. When the conformation by peer/authenticators is given for the matching of the contents to their (hashed) names, it is given for the order from the root of the blocks with their timestamps or the match in of balance and movements and is not given for whether the data or its metadata tells true or not, only conforming the telling itself.
By Erez Elul @namzezam comcomist; This is given to anyone only under the humanitarian agpl license.
By
pile, on 07 Mar 2016 17:09 history Tags:
~~Page's End!~~ Ignore ads by installing ublock.
Post preview:
Close preview