Identity / Platform

The core/root of this platform is a robust identity engine. Participation requires sharing biometric data with your peers via end to end encryption. This can be as simple as a picture with a proximity check-in. For more security sensitive groups this can include digital biometrics, passwords, or even dna.

Your peers confirming you are a real living breathing person and providing evidence of your activities is your currency. Your contributions as well as your reputation among your peers determines the size of your budget.

It is essential to trust the people you depend on in a fair and balanced community. Fear is the antithesis of trust, removing fear of infiltration from our interpersonal interactions opens the space for love, empathy, and radical transformation.

  • Your personal data is always stored locally and encrypted on your own device. 
  • Choose to share encrypted backups of your data with your trusted peers. 
  • Wearables can be used automate interaction check-ins
  • Physical locations (places of work or play) can be identity/data vaults 
  • Link online profiles/accounts, and places of work/hobby strengthens your identity 
  • One to many mapping between each human and their associated digital identities
  • Identity is our most valuable resource and solely owned by individual
  • Personal encrypted wiki, exchange your public keys to share profiles
  • Check-ins can be automated, frequent checks increase security

Personal

Personal identity extends beyond just your name, online accounts, and biometrics. It is also your mind, ego, soul, and all the voices and energies that guide you. Your beliefs and psychological state are a critical determining factor of which groups and people you can successfully interact with depending on the type of work being done. 

Your Personal identity manages your private and public keys, links to your different online profiles, questionnaires to determine alignment and psychological profile, biometric data and permissions.

Group

Cross group public key/contact storage

Individual contacts

Platform

Group level keys/distributed database

Hive TOR, a peer to peer TOR client/server. Your public key is split into two parts, each encrypted using your private key. The first part (broadcast public ID) is always available when you are on net, you control how much of your personal information you want to share on this page, but others can post reputation data linked to this key. This key can be linked to externally scanned biometric data. Duplicate bio-scans are linked for hive verification (redemption through various means) in case someone resets their key to bypass safeguards. 

Your bpID is linked to an optionally anonymized summary of your reputation data which reveals your general alignment, unless you are in anonymous mode.