Charles Clancy, Chief Futurist at MITRE, and his co-authors of a recent report – “Democratizing Technology: Web3 and the Future of the Internet” – provide the best framing of a “robust and decentralized, democratized alternative to the existing technology stack” and “the establishment and advancement of alternative technological paradigms to protect the public interest by making authoritarian misuse difficult or impossible.”
Background
“Cryptocurrency and Web3 are a counterculture, hacker, open- source response to the hyper-scalers and the centralization of compute and data ownership.”
Central to our ongoing research on The Future of Digital Self-Sovereignty (which will be released as a series of post in November) is a need to understand the growing tension between the individual and the nation-state in the digital domain, especially autocratic surveillance states, and the potential value propositions of Web3 architectures that enable new business models and governance frameworks.
Before the Web3 ecosystem emerges and evolves into a fledged marketplace with winners and losers, aligned economic incentives and regulatory oversight, however, societal trust remains fragile and will impact the ability to build trust into these new systems. While we always strive to drill down to the What Next? of it all – and to prioritize actionable business strategy insights – digital self-sovereignty only becomes a mature marketplace – with recognizable market dynamics, platforms, ecosystems, and business strategy implications – after we puzzle through the more socio-technological implications.
Edge cases, crypto creative destruction, community building, collective intelligence, partipatory culture – essentially, bottom-up dynamics – all figure prominently in our an analysis to date. In the end, our working hypothesis is that a Web3 ecosystem with digital-self sovereignty for the individual as a central design element – prioritized over nation-state data and digital self sovereignty – holds great promise to correct some of the unintended consequences of the legacy Web 2.0 system. As with everything else, AI/ML will also figure prominently.
In a conversation with OODA CTO Bob Gourley in a recent OODAcast, MITRE’s Charles Clancy provided a very prescient analysis of the state of play and the potential of it all:
“Cryptocurrency and Web3 are a counterculture, hacker, open- source response to the hyper-scalers and the centralization of compute and data ownership. Web3 has started to separate itself from crypto – with crypto as only one application of Web3. Of course, in the pandemic, we saw crypto prices start to sort of skyrocket, then collapse, mostly due to discovering some of the insecure and fraudulent underpinnings of certain major pieces of the crypto economy. But my hope is that we have gone through the whole hype cycle now, and we can actually start building Web3 out of all the building blocks that have kind of been thrown off by this ecosystem in the last ten years – that really are decentralized.
And what I really like about Web3 and this whole notion of decentralization is, from a U.S. perspective, it could be a really good technical offset strategy to China’s Belt and Road Initiative. So, China is very interested in exporting its very verttically integrated, cloud, 5G, surveillance technology tech stack to other countries through Belt and Road. I think that as we shift towards these decentralized technologies, it is inherently anti-authoritarian in the way that the technology works and works together. You have this whole notion of democratic control of services under the hood.
No one entity controls any of these different things. I think there is a real opportunity to invest in Web3. One, because it is a cool set of new technologies. The decentralization is really interesting from a technology perspective. But I think from a policy perspective, it is the natural answer to authoritarian tech stacks that we are seeing in other parts of the world. We have a paper we published on the topic.”
Democratizing Technology: Web3 and the Future of the Internet
“Web3 promises a future World Wide Web far different from the centralized, hyperscaled, and structurally authoritarian era of web2. MITRE offers policy recommendations that complement government, industry, and academic efforts to advance web3 and increase user adoption.”
From the Report:
The architecture of today’s World Wide Web is, in many ways, an authoritarian one—built around a business model and technology stack that rewards vertical integration, massive aggregation of user data, and hyperscale centralized management. This architecture has provided benefits in terms of society-wide connectivity and scalable use cases, but comes at the cost of user privacy and autonomy, and domination of this crucial facet of modern life by a few enormous firms. Worse, this architecture facilitates surveillance not simply by profit-maximizing hyperscaler service providers, but also—in authoritarian regimes—by the repressive state entities to which such providers are answerable. China, for instance, is harnessing data to manage and control the lives of its people by requiring them to use software that defines a new precedent for forms of automated social control.
The authoritarian cost of today’s web2 architecture developments call for a response, but it is not enough to denounce the impact of the web2 technology stack on human rights, privacy, and democratic norms. We also need a better answer: the establishment and advancement of alternative technological paradigms to protect the public interest by making authoritarian misuse difficult or impossible.
Web3 technology can help provide an offset strategy to counter the rise of authoritarian and surveillance-facilitating regimes. This paper expands on previous MITRE publications discussing web3 by describing how earlier web-related technology stacks and economic modes have led to data centralization, and how much of this centralization within web2 can be unwound by web3; it also presents use cases where an alternative paradigm is already starting to take hold. Most visibly, this is already happening with decentralized finance and cryptocurrency, but web3 can decentralize any digital service.
What Next?
“…there is much to do to make web3 a reality, make it safe and reliable, and equip it to fulfill its potential.”
Clancy and his co-authors offered the following strategic insights in the report:
As new protocols are considered for web3, this paper offers the following specific policy recommendations that complement government, industry, and academic efforts to advance this technology and increase user adoption:
- Develop a combined national security/economic security strategy that can maximize the benefits of a new decentralized payment system while mitigating illicit financial activities;
- Advance global decentralized digital identity and digital data technologies to protect citizen privacy;
- Promote accessibility standards to reduce burden of technology adoption;
- Address the needs of the underbanked/unbanked by maturing prototype digital asset solutions; and
- Convene international partners and advance an inclusive vision to strengthen democratic values, and protect citizens from threat actors, and develop and promote a decentralized, web3-facilitated response to the global growth of the authoritarian technology stack.
Web3 promises a future World Wide Web far different from the centralized, hyperscaled, and structurally authoritarian era of web2. It could form a robust and decentralized, democratized alternative to the existing technology stack, but there is much to do to make web3 a reality, make it safe and reliable, and equip it to fulfill its potential.
For the full MITRE report, go to Democratizing Technology: Web3 and the Future of the Internet
The Future of the Internet: Web3 , Data Sovereignty, Digital Sovereignty and Digital Self-Sovereignty
Web 2.0: Web 2.0 refers to the second generation of the internet, characterized by the transition from static web pages to dynamic, interactive, and user-generated content. It marked a shift from the early days of the internet (Web 1.0) when most websites were read-only, and users had limited interaction beyond clicking links. With Web 2.0, websites became more dynamic, allowing users to contribute, share, and collaborate on content. Social media platforms, blogs, wikis, and other interactive web applications became prevalent during this era. Key features of Web 2.0 include user-generated content, social networking, and the rise of online communities. See The Future of the Internet and Artificial Intelligence: Non-fungible Tokens (NFTs) and AI-Generated Art.
Web3: Web3 refers to the third generation of internet technology that aims to create a decentralized and user-centric internet. Unlike Web 1.0, which was static web pages, and Web 2.0, which introduced interactive and social features, Web3 focuses on blockchain technology, cryptocurrencies, and decentralized applications (DApps). In Web3, the control of data and digital assets is shifted from centralized entities to individuals through the use of blockchain and smart contracts.
Data Sovereignty: Data sovereignty is the concept that data is subject to the laws and governance policies of the country in which it is located. It implies that data is subject to the laws of the country in which it is located and should be stored, processed, and managed in compliance with those laws. Data sovereignty is often a concern in cloud computing and international data transfers.
Digital Sovereignty: Digital sovereignty refers to a nation’s ability to govern its own digital infrastructure, technologies, and data in a way that protects its national interests, security, and cultural values. It encompasses the control a country has over its digital resources, technologies, and data flows, ensuring that foreign entities or governments do not have undue influence or control over a nation’s digital space.
Digital Self-Sovereignty: Digital self-sovereignty refers to an individual’s control and ownership over their personal data, digital identity, and online presence. It empowers individuals to have autonomy and agency over their digital lives, deciding how their data is used, shared, and accessed by third parties. Digital self-sovereignty is closely related to the principles of privacy, security, and user empowerment in the digital realm. See:
- Science Fiction Writer and Futurist Karl Schroeder on Digital Self-Sovereignty
- Signals from Mainstream Information Outlets on Digital Self-Sovereignty, Digital Rights and Digital Identity
- Research Primer on Digital Self-Sovereignty, Digital Rights and Digital Identity
- John Robb on Hyper-networked Tribes, Digital Sovereignty, Digital Identity, Digital Rights and “The Long Night”
In summary, Web3 represents the decentralized future of the internet, while data sovereignty emphasizes compliance with national laws regarding data. Digital sovereignty relates to a nation’s control over its digital infrastructure, and digital self-sovereignty pertains to an individual’s control over their personal data and online identity. These concepts are interconnected and reflect the evolving landscape of the digital world.
Comparison: Web 2.0 and Web3
Web3 represents the next evolution of the internet beyond Web 2.0. While Web 2.0 focused on interactivity and user-generated content, Web3 incorporates decentralized technologies, most notably blockchain and cryptocurrencies, to create a more user-centric, secure, and decentralized internet. Here are some key differences between Web 2.0 and Web3:
Decentralization
- Web 2.0: Centralized platforms dominate Web 2.0, where user data, content, and interactions are stored on servers owned and controlled by large corporations.
- Web3: Web3 is decentralized. It utilizes blockchain technology, which is a distributed ledger, to enable peer-to-peer transactions and interactions without the need for intermediaries. This decentralization promotes user control and ownership of digital assets and data.
Digital Ownership
- Web 2.0: Users create content on platforms owned by others. They don’t have full control or ownership over their digital assets, such as posts, videos, or images.
- Web3: Users have true ownership of their digital assets and data. Through blockchain technology, individuals can have control over their personal information, and digital assets can be tokenized and traded securely.
Smart Contracts and DApps
- Web 2.0: Traditional web applications are controlled by central entities, and interactions are facilitated through servers and databases.
- Web3: Web3 introduces smart contracts and decentralized applications (DApps) that run on blockchain networks. Smart contracts are self-executing contracts with the terms directly written into code. DApps operate on a peer-to-peer network of computers, enabling direct interactions without intermediaries.
Cryptocurrencies
- Web 2.0: Traditional currencies are used for online transactions and payments.
Web3: Cryptocurrencies, such as Bitcoin and Ethereum, are used for transactions within the Web3 ecosystem. They enable secure, borderless, and fast transactions without the need for banks or financial intermediaries.
In summary, Web3 represents a shift towards a more decentralized, user-controlled, and secure internet experience, facilitated by blockchain technology and cryptocurrencies. It builds upon the interactivity of Web 2.0 while fundamentally changing the way digital assets, transactions, and applications are managed and owned online.
Additional Resources
Bitcoin’s Momentum: Bitcoin seems unstoppable due to solid mathematical foundations and widespread societal acceptance. Other cryptocurrencies like Ethereum also gain prominence. The Metaverse’s rise is closely tied to Ethereum’s universal trust layer. See: Guide to Crypto Revolution
Geopolitical-Cyber Risk Nexus: The interconnectivity brought by the Internet has made regional issues affect global cyberspace. Now, every significant event has cyber implications, making it imperative for leaders to recognize and act upon the symbiosis between geopolitical and cyber risks. See The Cyber Threat
Track Technology Driven Disruption: Businesses should examine technological drivers and future customer demands. A multi-disciplinary knowledge of tech domains is essential for effective foresight. See: Disruptive and Exponential Technologies.
Networked Extremism: The digital era enables extremists worldwide to collaborate, share strategies, and self-radicalize. Meanwhile, advanced technologies empower criminals, making corruption and crime interwoven challenges for global societies. See: Converging Insurgency, Crime and Corruption
Author: Eugene Williams
Last Updated: 1698373562
Views: 1604
Rating: 4 / 5 (111 voted)
Reviews: 99% of readers found this page helpful
Name: Eugene Williams
Birthday: 1972-11-17
Address: 920 Willis Terrace, Jeremyville, AR 25621
Phone: +3943887075029502
Job: Drone Pilot
Hobby: Geocaching, Chess, Wine Tasting, Stargazing, Cooking, Meditation, Playing Piano
Introduction: My name is Eugene Williams, I am a bold, unwavering, Adventurous, irreplaceable, steadfast, resolute, brilliant person who loves writing and wants to share my knowledge and understanding with you.