Verifying a Network State
- Making the Map Real: the Crypto Checkin and the Verifiable Census
Making the Map Real
- Problem: how do we materialize a cloud community into the real world?
- Solution: a series of intermediate structures
- Background
- Recall this gif: thenetworkstate.com/networkstate.gif
- Concept: there is no upper bound to the scale and duration of cloud formations
- Include the Software is Reorganizing the World article, and the citation
- Show several examples of building up the table, and update it to 2022
- How do we apply this concept?
- The person funnel: book, readers, applicants, members, organizers. Each new network state should probably have a book, movie, or similar document that justifies its reason for existence.
- The place funnel: the intermediate structures — the meetups, community centers, and then more complicated buildings. The exact sequence of these is yet TBD, but this is the concept — meet up in person until it seems worth it to get something more serious.
- The map — here’s what a theoretical map might look like with simulated data
- The goal is to make the map real
- Call to action: click to do a simulated action that’s viewed on a simulated TNS map — then apply to make the map real
The Crypto Checkin (6)
- Problem: at some point when we get to 1000 or 10000, people will start to doubt the photos are real
- Example: “this person does not exist”
- Example: Trump crowd size dispute
- So, we introduce the concept of the crypto checkin (solo) and the hashed handshake (pairwise)
- Crypto checkin
- daily login
- Individual KPI: you get 1/365 towards the citizen number NFT
- Community KPI: checking the status of the network state (coinmarketcap for the state of the network state)
- Could be a network state dashboard with actions you can take to improve the network state (recruiting, evaluating, etc)
- contributes to the census
- often 1, could be N people at same time
- what is the daily activity?
- task
- comment by the community
- post proof of workout
- TBD
- ideally you come back because these are your people and this is the long-term purpose outside of work (or it becomes your work)
- Hashed handshake
- pairwise verification
- writes the social graph on chain
- also contributes to the census
- Operationalizing cryptohistory
- Compare to the history of Bitcoin: from the history of a currency to the history of a country
- The history of a country on chain
- From the blockchain to the John Hancock-chain
- Auditable citizenship
- The Network State Verification Script
- Here’s source code for how it works
- Call to action: execute a crypto checkin in the app
Social Proof (7)
- Problem: how do we show that network states are real to the world?
- Solution: show 140 second videos on Twitter with both social proof and cryptographic proof
- For each meetup, we want social proof and cryptographic proof
- Here’s dos and don’ts for videos
- Dos and don’ts
- Film with a vertical video (do: vertical, don’t: horizontal)
- Make sure the lens is wiped clean (do: clean lens, don’t: dirty lens)
- Put yourself on 4K mode (do: https://support.apple.com/en-us/HT209431, don’t: default)
- Get shots lasting at least 1 minute, with at least 10 minutes of footage (do: videos: don’t: just photos)
- Film people, people interacting, reactions, the meetup setup, the app, and narrate a little to tell us what is happening (do: several shots, don’t: just one shot)
- The desired output
- Theory: positive, gender-balanced, sunshine, friendly. Not cyberpunk.
- Practice: a video like this of a single place
- Theory: make the map real
- Practice: a video that knits the various events together
- Call to action: upload a vertical 4K selfie signed with your ENS at a meetup
Cryptographic Proof
Chainlink talk on the census
Next Section:
Legitimating a Network State
Next