Words We Use
This is a list of words we use that might not immediately make sense to everyone.
Jargon is annoying for anyone who doesn't understand it, but also serves the purpose of allowing us to communicate and co-operate efficiently. Just imagine having to use the description of a blockchain every time it might come up rather than the word itself.
Yet at the same time, it makes sense to keep jargon to a minimum and the wizardy technologists in our midst promise (don't you?!) to refrain from using any terms that aren't listed here within the general fora and discussions. Thanks.
The design of products, devices, services, or environments for people who experience disabilities.
Alice, Bob and Charlie
The cryptography community started to use these names (A, B and C) in the 1970s to explain their designs. Now the tech community uses the names more widely for greater clarity than say user1, user2 and user3.
Short for software application, mostly used in the context of an application designed to run on mobile devices.
Artificial intelligence (AI)
Intelligence exhibited by machines, typically developed for specific goals such as reasoning, knowledge building, planning, learning, and understanding spoken and written language. More ambitiously, a general AI may be applied to any of these specific goals in the same way humans can adapt to different goals.
Confirming the truth of some piece of data or information claimed to be true. In the context of identity, authentication is the process of actually confirming that the person claiming to be Alice is indeed Alice.
Metrics related to human characteristics. Biometric authentication may allow Alice to access her device with her fingerprint for example. Biometrics may also help identify individuals under surveillance, for example with facial recognition.
A distributed database that maintains a continuously growing list of records, called blocks, secured with encryption from tampering and revision. Before the blockchain we could have secure centralized databases and insecure decentralized databases, and now we can have secure decentralized databases. Bitcoin was the first application of a blockchain. The blockchain is a form of distributed ledger.
Software for retrieving, presenting and making one's way around the World Wide Web. Also known as a web browser. Examples include Mozilla Firefox, Microsoft Edge, Google Chrome, Apple Safari, and Opera.
The list of the web pages a user has visited recently in a browser, including the title of the web page and the date and time of the visit. This facility allows the browser's back button to know where exactly to go back to. The browser can apply a different color to hyperlinks on current web pages indicating whether or not the user has been there before, and it provides a searchable log to allow the user to find a web page they wish to return to. Your browsing history is personal data.
Consensus decision-making is a group decision-making process in which group members develop, and agree to support a decision in the best interest of the whole. It represents a broadly acceptable resolution. In sociocracy, consent is preferred to consensus.
In data protection, consent means any freely given, specific, informed and unambiguous indication of the data subject's wishes by which he or she deliberately indicates agreement to the processing of personal data relating to him or her. In sociocracy, consent is used instead of consensus for decision-making.
A small piece of data sent from a website and stored on the user's computer by the user's web browser. Cookies were designed to improve user experience by remembering things from the last time the user visited the website so the user wouldn't have to set them again. For example: a preference for the French language version; remembering items that had previously been selected for purchase; automatically logging the user back in. However, cookies were very soon adopted for other reasons including the ability to track the user's browsing history, a privacy concern and an early form of surveillance capitalism.
An autonomous association of persons united voluntarily to meet their common economic, social, and cultural needs and aspirations through a jointly owned and democratically-controlled enterprise.
A digital form of money where money is defined as a medium of exchange (used in transactions), a unit of account (a measurement quantity), and a store of value (allowing money earned today to be stored for tomorrow). As the name implies, it relies on cryptography. Most everyday money is fiat money, which means it's established by government regulation or law, whereas a cryptocurrency does not depend on either.
The construction and analysis of methods that prevent anyone other than the intended recipient(s) from reading private messages. The message may be intended for humans (e.g. instant messaging) or machines (e.g. purchasing something online). The stronger the cryptography, the more difficult it is for a third party to break it.
Individual, separate, objective facts representing the properties of objects and events. Computers work with data, but humans do not. Rather, we deal in information; that is processed data, data made useful, data made relevant.
Also, see personal data.
Also, see personal data.
The identified or identifiable natural person to whom personal data relates.
Unlike a centralized network, a decentralized network doesn't have one central component through which everything passes. A famous diagram by Paul Baran (1964), a prominent engineer in the development of the Internet, shows three forms of network. Think about these three forms as sitting on a spectrum representing the leftmost (centralized), middle (decentralized) and rightmost (distributed) positions, with networks in the real world spanning the full spectrum with the majority falling somewhere in-between the extremes.
Note that while decentralized is then midway between totally centralized and fully distributed, use of the verb to decentralize often describes that journey from left to right including progression right of the middle. The rallying cries of “decentralize!” and “redecentralize!” are more powerful than “distribute!”
The economist E.F. Schumacher associated decentralization with freedom and one of “the truths revealed by nature’s living processes." In other words, we don't find centralized networks in Nature.
About making the digital world available to everyone without exception.
- access – connection should be available and affordable and designed for everyone
- skills – everyone should have the facility to get a basic understanding
- motivation – everyone should know about the benefits of being online
- trust – because if you don't trust it, you don't use it.
A decentralized network doesn't have one central component through which everything passes, and a distributed network takes this even further by reducing the need to have even local hubs through which data or information passes. This means we can consider the things in the network to have equal powers so to speak, giving rise to peer-to-peer architecture.
See the diagrams included in the definition of decentralized.
A set of data that is located and maintained in many places around a decentralized or distributed network in such a manner that it's consistent without requiring a central administrator or storage place. Blockchain is one form of distributed ledger.
The name used in N. America for sociocracy. See sociocracy.
A grouping of computing or network providers agreeing upon standards of operation collectively. This may allow different systems to work differently but so they can still work together, e.g. when users are able to send messages from one network to the other.
A reference to data or document that the reader can follow directly by clicking, tapping, or hovering, depending on the device used.
Philosophically, identity asks "What makes it true that you are you?" We deal here with digital identity – information on a person, organization, application, device or other 'thing', that describes it uniquely. The process of subsequently confirming an identity is known as authentication.
See Digital inclusion.
Processed data, data made useful, data made relevant. Computers work with data. Humans work with information.
A type of chat that offers real-time text transmission over the Internet. Popular instant messaging (IM) services include: AIM, Blackberry Messenger, eBuddy, Facebook Messenger, iMessage, Line, QQ, Signal, Telegram, Windows Live Messenger, WeChat, Whatsapp.
The global system of interconnected computer networks that use the Internet protocols to link devices.
An emphasis on transparency and free, unrestricted access to knowledge and information, and also collaborative or cooperative management and decision-making rather than a central authority.
Open source software
Open source software (OSS) means that the source code (the code humans write before it's converted into code a computing device runs) is freely licensed to those who need to change it. However, there is typically no requirement to pass on that source code to the end users. Free (Libre) Software – often written as FOSS or FLOSS – is freely licensed to the person who needs to change it and those changes have to be made available to the end user.
"Their tech" is, obviously, out of our control. "My tech" is the form that many reactions to "their tech" take, but it soon becomes apparent that its usefulness is very limited. No (wo)man is an island. As social animals, we live and work together, and so then must our technology. Moreover, our data needs to breathe with other data for it to become useful, actionable information. OurTech entails us coming together as we each determine for our shared benefit. Under our direct supervision. Interoperable. Personal. Mutual. Co-operative. Trusted.
A distributed architecture that regards all the things (peers) involved to have equal status and equal power of participation in the network. Such design may entail the peers sharing out tasks between themselves.
The European Parliament defines personal data as "any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person."
Once it was enough to define privacy as the right to be let alone. Today, it extends beyond 'boundaries' and 'being watched'... E.g. Bob shouldn’t acquire information about Alice, Bob shouldn’t interfere with Alice’s actions, Bob shouldn’t intrude into Alice’s space, Bob should tolerate Alice’s beliefs, and Bob shouldn’t appropriate, use, or exchange Alice’s property.
Single sign-on (SSO)
Allows users, with just a single username and password, to log in to a connected system or systems without using different usernames or passwords for each one. Facebook Connect is a popular example. However, some SSO systems allow the service provider to track your use of the SSO on websites and in applications – Facebook Connect and Google ID for example.
Both a social ideal that values equality and the rights of people to decide the conditions under which they live and work, and an effective method of organizing collaborative and productive organizations as associations, businesses, and governments, large and small.
The monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or protecting people.
The property of biological systems to remain diverse and productive indefinitely. By contrast, the way people use the planet today is unsustainable.
Free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router".
The willingness to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the person doing the trusting, regardless of whether the person can monitor or control that other party.
A form of authentication where the first factor – something you know, such as a password – is complemented by a second factor – something you have, such as your mobile phone. It's very difficult for anyone trying to impersonate you to get hold of both of these things at the same time.
Virtual private network (VPN)
Establishes a connection across the public Internet with the security one might expect connecting over a private network. Businesses use VPNs to allow remote staff to connect securely. VPN services are also useful for Internet users who don't want their (broadband or mobile operator) internet services provider logging everywhere they go online.
A technology for the wireless connection of devices not too far away from each other. It's a trademark, and only devices that are certified compatible with the corresponding standards may claim to be Wi-Fi enabled.
World Wide Web (WWW)
Often confused with the Internet, the World Wide Web actually runs on the Internet. It allows documents and other web resources to be identified by Uniform Resource Locators (URLs, sometimes known as web addresses) such that any document can link to another with hyperlinks.