National Prism. Technology at the service of society

“The idea of ​​the human mind can transform cities. One single idea is able to rewrite the rules and change everything. ” movie "Beginning"




For the preamble, I will list a few well-known facts that are directly related to the topic. So, at the moment, we have a situation where:

- special services use technology to monitor ordinary citizens, and governments allow them to do this , and gentlemen, regulators are connected .
- the time of the great Russian firewall is inexorably approaching, the nuts are gradually tightening, rights and freedoms are becoming less and less.
- On the other hand, we have the government that we have, cuts, kickbacks, the Olympics in Sochi and so on.

At the same time, the stratification of those who can (politicians, oligarchs, special services), and those who can not (ordinary citizens), is increasing even by the day, and by the hour.

At the moment, the development of society has reached the point where the situation needs to be corrected, and the development of technology - until the moment when this situation can be at least partially corrected. And only two steps separate us from this moment, and the first step should be done by geeks. More precisely, for the first step it remains to write one rather thick (in terms of code volume) programlina.

Anyone who is interested in what these steps are and what kind of program is needed, welcome to cat.

Personally, I don’t even dare to calculate the entire computing power of the entire amount of computers, laptops, servers and other things, which is idle most of the time. One thing is for sure - if you use at least 5% of this capacity in the right direction, it will be impossible for any special services to control such a network.

About the idea
The idea of ​​using folk computing resources is simple - folk resources for that and folk, in order to work for the benefit of this very people. What does an ordinary person with a computer subscribe to? For the same thing that the bulk of people have always subscribed to - the idea. The Soviet Union was built on only one idea. The United States 80 years ago emerged from problems with crime and corruption, when the main focus of the special services was the idea of ​​the country's internal and external security. For 30 years, Singapore has changed the status of a fishing village to one of the most developed countries in the East, when the idea of ​​business development and the fight against corruption became the main direction of reform.

In our country, there has not been a common idea for a long time, and I don’t see the point of retelling what comes out of it - so I already wrote too much of the obvious, Cap is already nervously smoking aside.

So, the obvious idea that a native country would live better without corruption, cuts, kickbacks, etc., was scrolled in the head by anyone who was at least a little aware of the "exploits" of our officials. And everyone understood that it was almost impossible to realize it in our conditions. The eternal question "who will control the controller?" For a long time I did not find solutions adequate to our conditions. But now everything can change precisely in connection with the development of technology. How?

Prerequisites for solving the problem:

- special services control almost everyone with the help of data mining and other, less legal, methods;
- Appeared completely out of control of individual organizations distributed decentralized networks (Bitcoin);
- at the same time, the computing resources owned by most ordinary people are idle most of the time.

The solution to the problem consists of these three points - it is necessary to organize a distributed decentralized network, and the main focus of its work should be:

- distributed decentralized collection of information about any socially significant activities of officials, about their relations with organizations, both legal and illegal, and any other information of social importance;
- analysis, systematization and accumulation of this information, its structuring and logical processing in order to identify abuses of entrusted powers, corruption and other factors hindering the normal economic development of factors;
- and most importantly - the publication of the information received and the logical conclusions made on its basis among the participants of this very decentralized network.

Thus, if there are at least about a million participants in the network, this will allow:

- to concentrate huge computing resources in this direction, which will allow the entire network to achieve results that are not available even to well-known supercomputers;
- implement the most distributed collection of information, which will lead to the inability to track and control the participants in the network itself. An example of such an implementation may look something like this: From one of the network users, a request is sent to a search engine about the activity of official A., the most relevant news about the innovation introduced by him is selected. A request is made from another user of the network, who is not connected in any way with the first, about the family and commercial relations of official A., and a third user receives a request for the emergence of new commercial organizations that are in any way connected with official A. or his relatives and friends. Next, the code that analyzes the information embedded in the program’s database of abuse schemes is connected, the network computing resources are connected, but the bottom line is that the relationship of these requests will not be possible to track, especially if they are issued randomly at random time intervals. The reliability of the information received can be checked by repeated requests from completely different network users. The search can be carried out through completely different sources: through the government procurement website, the LinkedIn business network, periodicals and more. A sort of RosPil with extended powers, which can not be banned.

Naturally, all information should be encrypted and repeatedly checked, as is now done on the Bitcoin network. Further actions after obtaining useful information will have to be done by people. Only someone can decide to order someone for bitcoins or in some other way to use the information received. And the fact that it can be used, there is no doubt .

The requirements for such a network are obvious to most readers of Habr, but I still list them:

- a fully decentralized distributed network;
- All information is encrypted in the most reliable ways and is visible only within the network;
- completely open source program code, structured in such a way as to exclude the introduction of backdoors;
- internal ethical barriers implemented in the program code. We can say that a whole manifesto of ethical components restricting the freedom to use the program (so as not to interfere with personal life and not violate the basic laws on information recognized by the community as adequate in modern conditions - nobody really is interested in all these intrigues with prostitutes for prosecutors and etc.).

About privacy
In general, many may have a question about violation of privacy and such nonsense. Only here is not the situation. As a traffic police inspector filed a lawsuit against my friend for the fact that this friend posted a video recorded on the registrar in which the valiant inspector violated a bunch of procedural rules and tried to pump out more money. The essence of the lawsuit was that the driver thus violated all the privacy of the inspector's private life. Naturally, there was no question of any private life, since the inspector was fulfilling his official duties, and this in fact can no longer be private. The same can be said of any other officials performing their duties - their work in general should be completely public. In such circumstances, the level of corruption and cases of abuse of official duties may decrease by an order of magnitude. Information leaks in such situations have repeatedly led to bad consequences for violators. And this is what we need - for everyone to see everything, and even in a convenient and non-covert form.


- the ability to automatically select applicants for control, taking into account the social significance of these people. That is, the plumber Vasya Pupkin does not have a big impact on society, so the information about him in this context is uninteresting. But the governor of the Nskoy oblast has a great influence on the life of this very oblast, he can use this influence in his personal interests, so this comrade should be taken with a pencil and wool any information that appears to his liking.

At first glance, such a social filter is quite difficult to implement programmatically, but in reality there are not so many criteria for such an assessment.

These include the frequency of mentioning a person’s surname in the media and the Internet, the height of the position in the hierarchical structure of the organization and the authority of this organization in terms of regulating socially significant parameters.

- Built-in capabilities for semantic analysis of the information received. Also at first glance it seems difficult to capture in the program, but, firstly, in such cases there are not many more keywords than the FBI’s with their “bomb, president, allah, etc.”, they just different - “made a decision” , “Signed an order”, “offered to introduce”, etc. And secondly, we do not forget that when a large number of people connect to the network, its computing power will reach the level where such calculations will click like nuts.

In general, there are actually much more requirements; one person cannot afford to foresee everything. This can only be done by the community through numerous discussions. That is, we need an extensive forum for discussing program components, preferably located immediately on the I2P network (just for any fireman, in order to avoid possible bans, etc.). Yes, and the network itself can be organized according to the I2P principle, although here, probably, professionals will correct me - the I2P principle itself may not give the necessary exchange rate for the program to work effectively. There is also an idea to generally push the developers forum into the program interface from the very beginning of its development. That is, the start may be the development of a separate interface for a forum that is not related to browsers. Although, maybe such interfaces already exist, knowledgeable people will correct me.

Be that as it may, the technical implementation of Folk Prism is not the only problem for its effective operation. The question arises of volunteers who, for the sake of such an idea, are ready to provide their resources without fear of the state. You can take into account all the possible laws on the protection of privacy and more, but most people who are not savvy in IT will be afraid or even lazy to participate in this. The main driving force at the beginning of the development of the program will be only geeks who like this idea. In our country, such people, it seems to me, are not enough. In Germany, for example, not only geeks will connect, but also a large percentage of the population. People there are like that. but this is also a topic for a separate discussion.

In any case, such a development cannot be biased in anyone's favor, and therefore there can be no talk of any commercialization. All participants in the development should be ready to work for the sake of the idea. True, I myself would not give up such a hobby, for that matter.

In one of Bitcoin's discussions, he was called "a possible shift in the financial paradigm that happens thanks to technology, not politics." So, with the help of technology, I would also like to shift the paradigm of class relations. So that something new comes to replace the revolutions of varying degrees of oranges ...

Also popular now: