The Blockstack Browser_ A Gateway to a New, Decentralized Internet _ Hacker News types of money laundering activities

Unless I can unplug the WAN connection on my router and connect to your product instead, keep in mind that you haven’t invented the next internet. You might be able to decentralize the worldwide web of HTML pages and hyperlinks, or invent another protocol that can be encapsulated in TCP/IP packets and ethernet frames, but the internet (the graph of inter-connected networks that speak common protocols) is still a fundamental requirement for your product, and the metadata associated with those stacks is still very real and trackable.

To that point as well, the internet already works how real life works. Sick of company X and the way their business treats employees? Shop elsewhere, remembering that it won’t be as convenient with fewer choices. Sick of google tracking the websites you visit?

Use a search engine that doesn’t track you, remembering that they probably can’t pay as much for great engineers.Types of money laundering activities

It’s conway’s law. We are largely constrained to create systems (including the internet) that mirror the organizational structure we’re a part of. Yes, we can evolve and revolutionize occasionally, but it will always mirror real life because they will always influence each other.

I don’t know, the alternatives are getting better. Maybe not consumer grade, but usable, especially for a developer. For the past few years I’ve made a reasonable effort to use ethical software as long as it doesn’t make my job too hard, and here are the results:

– ubuntu is my daily driver OS, with windows getting booted once in a blue moon to play some games

– firefox for 80% of my browsing (the other 20% is chromium on a chromebook, which seems to run faster than FF even in an ubuntu chroot with crouton)

– thunderbird and a plain ol’ IMAP mail server for email

– maybe half of my messaging has moved to signal

types of money laundering activities

– searx.Me for web searches, sure I’m using the google results more often than not, but at least my queries are anonymized, and switching to other providers is easy

I started a business on a very boring, conventional tech stack that gets a lot of hate on HN–PHP and wordpress–but it’s a free and ethical stack, and I sleep better at night because of that. I gave our latest hire most of the same desktop software I use, and so far no major problems.

I’ll grant you that the UI of some of this software is a little creaky, but I get by, and overall I’d say most of the nasty bugs we have to deal with in our toolkit are in closed source saas stuff.

Some notable unethical holdouts include occasional skype/hangouts calls, slack, google docs, and dropbox. Also a bunch of small-time saas products. But give me time.

This actually isn’t true; you can invent organizations of the imagination and mirror those.Types of money laundering activities this imagination driven programming is actually quite dangerous and tends to devolve into state secrets and so on since you are solving the problems created by people who don’t exist but may in fact have lives that are SURPRISINGLY SIMILAR to the lives of people who are doing jobs that are better kept secret.

So you can get around the law…But only by risking the integration of something that should be kept secret into the organizational structure…Which makes its way into your system. Most people aren’t willing to cross that threshold.

So conway’s law is true for most people, just not all.

If you want to think about it from the adversarial point of view, you can say that all programs are designed to transform or destroy organizations; programs mirror organizational structures because people want to determine the resonant frequency of an organization and understand its social vulnerabilities in much the same way a physical structure has structural vulnerabilities.Types of money laundering activities

Still struggling to wrap my head around this, mostly trying to make sense of:


This is DNS on top of the blockchain right?

Though where it deviates some is:

Even though only data record hashes are stored in blockchain transactions, we can use them to verify the authenticity and integrity of the data itself once we get it. For example, you can host your data in S3, and other peers can verify your data by first obtaining the hash from blockstack DNS and then checking it against your data’s hash.

So functionally what this is solving is (I’m asking here):

– nobody can take your domain away b/c they don’t have the keys, so stuff like domain sniping, ISP interference, government seizure, etc. Are less likely (notwithstanding https://xkcd.Com/538/)

– every piece of data is checksummed so you can (and maybe this is what the blockstack browsers are doing) verify that it hasn’t been tampered with ala MITM.Types of money laundering activities

But even with that, I’m still unclear on just what’s the right way to think about this. Like if I setup a new web site on a domain, would I also enter in every file on the page as a separate ‘data record hash’?

So do I…

Lets take a fun game. How about all of atari 2600?


Ok.. This is remote, across all the machines that have that IPFS hash. In other words, its not local.

(in console) ipfs pin add qmacaqrvhjx9es7yjx1vy3iffkf9cdudqpegacusa4x5xb

Now its local!

Or lets do something more than a game… How about node-red in browser(pagenodes)?


EDIT: I had the point in my head, but didn’t put it down here. In other words, we already have this technology, and not using buzzword-bingo like its the interwebz but with blockchains!. These links are direct proof that it not only exists, but is working right now.Types of money laundering activities

And in reality, making a type of blockchain in IPFS would not be hard. It’s an immutable data structure, with append-only characteristics.

And, I also am partial to IPFS, primarily because it feels like a proper IETF-internet scale project. ZeroNET looks prettier, but.. Throw away. Again, some subjective feel there, but IPFS feels elegant.