Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Problem space

Why are we doing this?

Problem statement

In order to move from consent to control, it is the case that there needs need to be one or more mechanisms to move beyond contracts of adhesion abusive 'faux' consent models for individuals and organizations to share information at Internet-scale without ceding control of that information to other entities. We call this privacy-preserving information sharing.

Impact of this problem

Once there is a specification and model for sharing information without giving up control, it will enable the creation of user-centred information sharing ecosystem with individuals in control of their own data and co-creators and managers of shared data.

How do we judge success?

This project will be a success when it has created:

  • Inventory Report on Privacy-Preserving Information Sharing
  • MVP: A prose and technical specification of the minimal necessary elements for a valid information-sharing agreement
  • The MVP can be added on to with the following:
    • The addition of endpoint specifications to allow the exchange of information-sharing agreements
    • Specifications for updating and revoking information-sharing agreements
    • API calls
    • User Interfaces
  • Real world compliant implementations of the specification

What are possible solutions?

...