Category Archives: Uncategorized

Truth and Marketplace of Ideas

Copyright (c) 2022 Michael Herman (Alberta, Canada) – Creative Commons Attribution-ShareAlike 4.0 International Public License
https://creativecommons.org/licenses/by-sa/4.0/legalcode

Also checkout: Facts, Opinions, and Folklore: A Preliminary Taxonomy

Research findings on the topics of:

  • Marketplace of Ideas
  • Facts, Opinions, and Folklore

1.  THE FACT/OPINION DISTINCTION: AN ANALYSIS OF THE SUBJECTIVITY OF LANGUAGE AND LAW

• The first, commonly associated with John Stuart Mill, 8 is that one receives a clearer perception of truth if it is the result of a “collision with error.”9 One can never be sure that an opinion which we seek to suppress is false.’0 To assume otherwise is to assume infallibility.” Hence, an individual who seeks truth must consider opposing opinions to sift the true from the false.'” The collision of adverse opinions is necessary in the search for truth.13

• These are the premises of the marketplace theory, in which the “consuming public in the marketplace of ideas,”19 ultimately determines which beliefs are true.20 Under this theory, “false ideas need not be suppressed, for the operation of the market ultimately will reject ideas that are in fact false.” 21

2. INSTITUTIONS IN THE MARKETPLACE OF IDEAS

• This Article brings them together, using the New Institutional Economics to describe the “speech institutions”—such as schools and universities—that play the same cost-reducing role in the marketplace of ideas as other institutions do in the market for goods and services.

• The market is an imperfect and frequently malfunctioning machine, and the costs of exchange add friction to its gears. This friction, which economists call “transaction costs,” includes the time and expenditure needed to find, evaluate, and obtain good ideas or products.9 And although Holmes’s metaphor does not account for them, these costs exist in the marketplace of ideas just as surely as they do in the economic market.

3. Abrams v. United States, 250 U.S. 616 (1919)

• [W]hen men have realized that time has upset many fighting faiths, they may come to believe even more than they believe the very foundations of their own conduct that the ultimate good desired is better reached by free trade in ideas—that the best test of truth is the power of the thought to get itself accepted in the competition of the market, and that truth is the only ground upon which their wishes safely can be carried out.

4. R.H. Coase, Advertising and Free Speech, 6 J. LEGAL STUD. 1, 27 (1977)

• “The rationale of the First Amendment is that only if an idea is subject to competition in the marketplace can it be discovered (through acceptance or rejection) whether it is false or not.”.

• Free speech, in Holmes’s framework, is worthy of constitutional protection precisely because—like the free flow of goods and services—it creates a competitive environment in which good ideas flourish and bad ideas fail.

5. The Fact/Opinion Distinction: An Analysis of the Subjectivity of Language and Law

• The collision of adverse opinions is necessary in the search for truth.13

• These are the premises of the marketplace theory, in which the “consuming public in the marketplace of ideas,”19 ultimately determines which beliefs are true.20 Under this theory, “false ideas need not be suppressed, for the operation of the market ultimately will reject ideas that are in fact false.” 21

• Under the First Amendment there is no such thing as a false idea. However pernicious an opinion may seem, we depend for its correction not on the conscience of judges and juries but on the competition of other ideas.

• The inherent indeterminacy of words makes any distinction between fact and opinion a subjective determination.

6. The taxonomy of evidence: experts, facts, opinions and the courts

• Opinion evidence is ordinarily inadmissible, but there is an exception when the person giving their opinion is an “expert”. An expert can give evidence of fact like anyone else, the only restriction being its relevance. A forensic pathologist (to use an example of Master Matthews) may give evidence about what they saw when they performed a post-mortem: blood here, lacerations there, discolouration everywhere. No permission is necessary for that sort of evidence. What they cannot give without permission is their expert opinion on the cause of death, for example (albeit the court may give permission because the expert, unlike most of us, has some useful qualification in doing so).

• Scots law identifies a third category of evidence which, we learn from Kennedy, requires a ruling as to admissibility. That is factual evidence, given by an expert, but which draws on their specialist knowledge or experience.

7. The Fact/Opinion Distinction: An Analysis of the Subjectivity of Language and Law

• Indeed, “[m]ost speech will contain some elements of fact, some of inference, some of emotion, and some of value judgment.’7 1 For example, assume a person observes a fellow classmate reading late on a Friday evening. The person then makes the statement, “John Doe is a diligent student.” This statement is neither purely fact nor purely opinion. The fact that the student was reading late on a Friday evening may be verified. However, the person has inferred from the fact of reading that the student was studying. The statement now includes some degree of opinion or belief. The student, in fact, could have been reading the latest science fiction best seller merely for pleasure. The statement may also reflect the person’s emotions toward, and judgments of, that student. Rather than characterizing the student as diligent, the observer could have described the student as “an egghead.” Both statements would have originated from the same verifiable fact of reading, however, both are inseparable from the observer’s opinion of that student.

3 Comments

Filed under Uncategorized

Welcome to Web 7.0! (overview)

Copyright (c) 2022 Michael Herman (Alberta, Canada) – Creative Commons Attribution-ShareAlike 4.0 International Public License
https://creativecommons.org/licenses/by-sa/4.0/legalcode

Web 7.0 is a unified software and hardware ecosystem for building resilient, trusted, decentralized systems using decentralized identifiers, DIDComm agents, and verifiable credentials.

Take what you need; leave the rest.

Michael Herman, Trusted Digital Web Project, Hyperonomy Digital Identity Lab, Parallelspace Corporation. January 2023.
Figure 1. Welcome to Web 7.0!

Web 7.0 is being built using and is conformant with the DIDComm-ARM; more specifically, Layer 6 of the DIDComm-ARM (See Figure 2 below).

Figure 2. DIDComm Agent Architecture Reference Model (DIDComm-ARM): Layer 6 Web 7.0 DIDComm Agent Architecture Model

Layer 6 is one of the 7 layers in the DIDComm Agent Architecture Reference Model (DIDComm-ARM) (see Figure 3 below).

Figure 3. DIDComm Agent Architecture Reference Model (DIDComm-ARM): 7 Layer Model (Feature Matrix)

For the complete story, download the Web 7.0 DIDComm Agent Architecture Reference Model (DIDComm-ARM) whitepaper from here:

If you prefer to listen to a narrated version of the Web 7.0 DIDComm-ARM whitepaper, checkout this playlist:

No REST for the wicked!

APPENDIX A – Web 7.x Versions and DID-DOS Distributions

Figure 4. DID-DOS 7.0 Genealogy: 50 Years in the Making
Figure 5. DID-DOS 7.0 Roadmap Metamodel
Figure 6. Web 7.x Versions and DID-DOS Distributions
Figure 7. DID-DOS 7.0 Reference Distribution: Roadmap

APPENDIX B – Web 7.0 Body of Knowledge: Content Map

Figure 8. Web 7.0 Body of Knowledge: Content Map

APPENDIX C – Web 7.0 Technology Adoption Model

Figure 9. Web 7.0 Technology Adoption Model

Reference: https://www.linkedin.com/pulse/blockchain-foundational-technology-michael-herman/

APPENDIX D – “DIDFax” Windows Printer Driver Scenario

Figure 10. “DIDFax” Windows Printer Driver Scenario

2 Comments

Filed under Uncategorized

Web 7.0 DIDComm Agent Architecture Reference Model (DIDComm-ARM) 0.27

A Design Guide for Software Architects and Developers working on DIDComm Agent-based Software Systems

Copyright (c) 2022 Michael Herman (Alberta, Canada) – Creative Commons Attribution-ShareAlike 4.0 International Public License
https://creativecommons.org/licenses/by-sa/4.0/legalcode

Your comments and feedback on the DIDComm-ARM, its layered models, and Web 7.0 (seventh layer in the DIDComm-ARM) will be greatly appreciated.

You can find us on Twitter @ https://twitter.com/web7arch (hashtag #web7).

UPDATED: The last version of the DIDComm-ARM whitepaper can be found here:

3 Comments

Filed under Uncategorized

Web 7.0 Application Note: “DIDFax” Windows Printer Driver Scenario

Copyright (c) 2022 Michael Herman (Alberta, Canada) – Creative Commons Attribution-ShareAlike 4.0 International Public License
https://creativecommons.org/licenses/by-sa/4.0/legalcode

The purpose of this Web 7.0 application note is to describe the “DIDFax” Windows Printer Driver scenario within the context of a cardiac specialty physician’s clinical setting. The “DIDFax” Windows Printer Driver solution concept uses DIDComm Messages, DIDComm Message Attachments, and DIDComm Agents using Layer 6 of the Web 7.0 DIDComm-ARM model[1].

This document was produced to address the following goals:

  • Illustrate how a DIDComm Agent-based software system can deliver high business value by solving a communications problem within the healthcare ecosystem.
  • Illustrate how Web 7.0 DIDComm-ARM models and DIDComm Notation can be used to assist in the design and visualization of DIDComm Agent-based software systems.

NOTE: The solution concept (see Download below) is made possible by using DIDComm, DIDComm Messaging, and DIDComm Agents (as described in the DIDComm-ARM). The solution concept is not achievable using the classical notion of a digital identity wallet.

Download


[1] Web 7.0 DIDComm Agent Architecture Reference Model (DIDComm-ARM)

(https://hyperonomy.com/2022/12/07/web-7-0-didcomm-agent-architecture-reference-model-didcomm-arm/)

Leave a comment

Filed under Uncategorized

[OLD] Web 7.0 DIDComm Agent Architecture Reference Model (DIDComm-ARM) 0.25

A Design Guide for Software Architects and Developers working on DIDComm Agent-based Software Systems

Copyright (c) 2022 Michael Herman (Alberta, Canada) – Creative Commons Attribution-ShareAlike 4.0 International Public License
https://creativecommons.org/licenses/by-sa/4.0/legalcode

The Web 7.0 DIDComm-ARM whitepaper is being released publicly for the first time today.

Your comments and feedback on the DIDComm-ARM, its layered models, and Web 7.0 (seventh layer in the DIDComm-ARM) will be greatly appreciated.

You can find us on Twitter @ https://twitter.com/web7arch (hashtag #web7).

UPDATED: The most recent version of this whitepaper can be found here:

4 Comments

Filed under Uncategorized

[OLD] DIDComm Agent Architecture Reference Model (DIDComm-ARM): A Preview

Copyright (c) 2022 Michael Herman (Alberta, Canada) – Creative Commons Attribution-ShareAlike 4.0 International Public License
https://creativecommons.org/licenses/by-sa/4.0/legalcode

The following is an excerpt from a whitepaper I’m working on. Early feedback is always welcome.

BREAKING NEWS: I’ve added some of the more recent revisions that have been made to the DIDComm-ARM to this preview post:

  • Layer 4 DIDComm Agent Mesh Network Model
  • Layer 5 DIDComm User Agent Model

UPDATE: The most recent version of this whitepaper can be found here:

Leave a comment

Filed under Uncategorized

Facts, Opinions, and Folklore: A Preliminary Taxonomy

Copyright (c) 2022 Michael Herman (Alberta, Canada) – Creative Commons Attribution-ShareAlike 4.0 International Public License
https://creativecommons.org/licenses/by-sa/4.0/legalcode

Also checkout: Truth and Marketplace of Ideas

This preliminary taxonomy attempts to characterize the differences between facts, options, folklore, and related terminology. Your feedback is appreciated.

  • Facts
    • True Facts – Truths – Hard Facts – 100% true
    • False Beliefs – believed to be true but are, in fact, false
    • Fake Facts – knowingly or purposely 100% false (0% true)
  • Perturbations of the Facts
    • Misunderstood Facts
    • Misconceived Facts
    • Misstated or Miscommunicated Facts
  • Opinions
    • Feedback that may or may not be true
    • Vague
    • Poor recollected
    • Subjective opinions
    • Humorous/satirical
  • Folklore
    • Feedback originating with a fourth party and passed on by a third-party

The driver for the above taxonomy is a new belief in the mind of the author is that only facts or truths should be embedded into verifiable credentials. This gives rise to the concept of the Authentic Conversations Spectrum (illustrated below). The author no longer believes that verifiable credentials can be used or should be used to encode “all data on the planet”.

Figure 1. Authentic Conversations Spectrum

Reference: Web 7.0 DIDComm Agent Architecture Reference Model (DIDComm-ARM) 0.52 Part 2 of 2

1 Comment

Filed under Uncategorized

Trusted Digital Web (TDW2022): Characteristic Information Scopes

Figure 1. Trusted Digital Web (TDW2022): Characteristic Information Scopes (based on the Social Evolution Model

Leave a comment

Filed under Uncategorized

Verifiable Credentials Guide for Developer: Call for Participation

Want to contribute to the World Wide Web Consortium (W3C) Developers Guide for Verifiable Credentials?

W3C is an international community that develops open standards to ensure the long-term growth of the Web.

A new W3C Community Note Work Item Proposal entitled Verifiable Credentials Guide for Developers has been submitted and you can help create it.

I want to invite everyone interested #DigitalIdentity, #DecentralizedIdentity, #VerifiableCredentials, #TrustOnTheInternet, and/or #SecureInternetStorage to join this key group of people who will be defining and creating the W3C Verifiable Credentials Guide for Developers.

Please contact me directly or post an email to public-credentials@w3.org

Links

Leave a comment

Filed under Uncategorized

Bootstrapping a VDR-based Fully Decentralized Object (FDO)/Credential Platform: VON Example

Michael Herman (Trusted Digital Web) 8:35 PM
What are the common/known strategies for bootstrapping a VDR-based decentralized credential/object platform? …asked naively on purpose.

  • Strategies for placing the first/initial DIDs in the VDR?
  •  …presumably purposed to be the initial Issuer(s) of verifiable identifiers on the platform?

Best regards,
Michael Herman
Far Left Self-Sovereignist

Stephen Curran 5:37 PM
In Hyperledger Indy, which is a permissioned public network, the first transactions are a DID for one of the  “SuperUser’s (aka “Trustee”) of the network, and DIDs for the initial node operators that verify the transactions.  From there, DIDs for additional nodes are added, DIDs for other Trustees and then DIDs of other types of users (Endorsers, authors), who in turn create other DIDs and object types. 
If you look at von-network (https://github.com/bcgov/von-network) you can spin up a little network (4 nodes in docker) and see the transactions that are used to start the network. In that, the seed for the Trustee DID is well known, so once you’ve started the von-network, you can control it. In a “real” network, that seed (and associated private key) would of course be protected by that first Trustee.
For Sovrin, a ceremony was video’d of all the initial Trustees and Stewards (node operators) when MainNet was started in 2017.

VON Blockchain Explorer

Reference: http://greenlight.bcovrin.vonx.io/browse/domain

Reference: http://greenlight.bcovrin.vonx.io/browse/pool

Initial DID Transactions

Initial Node Transactions

First SCHEMA Transaction

Leave a comment

Filed under Uncategorized