Editing Talk:Worst cases

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
I'm not sure at all if it's wise to '''publicly''' list the sensitive points which can be used to haul consumerium out of the way for a more [[w:productivism|productionism orientated]] system with similar features, but lacking the observance of [[Features|corporate social responsibility issues]].[[User:Juxo|Juxo]] 17:25 Jun 22, 2003 (EEST)
I'm not sure at all if it's wise to '''publicly''' list the sensitive points which can be used to haul consumerium out of the way for a more [[w:productivism|productionism orientated]] system with similar features, but lacking the observance of [[Features|corporate social responsibility issues]].[[User:Juxo|Juxo]] 17:25 Jun 22, 2003 (EEST)
:Well, there are two attitudes 1. assume that you are a genius who can figure out all this in advance without ever writing it down or working out weak points "security by obscurity" 2. assume that you need to brainstorm about the problems that can be visited on you in a competitive world, by those who seek to subvert, and, that you can best discourage them by working out a robust solution, wit good answers to all the [[threats]] and [[worst cases]]  You have no non-public way to do this, and surely you would rather be notified of potential attacks or competitors this way than by having them suddenly appear, exploiting flaws in the [[licenses]] and [[audit]] process that you never thought of, or discussed?  Same issue as computer security - you can be transparent or try to hide flaws in the hope that this hiding will make you obscure.  But if it does, you aren't having any influence.  So the winning strategy is probably the more open one.
:[http://www.disinfopedia.org/wiki.phtml?title=Center_for_Consumer_Freedom Center for Consumer Freedom] is the kind of people we are up against.  They are smart, and well-funded, and you better believe they do this kind of analysis.
::Maybe, but we shouldn't be doing the work for them or whatever party is interested in blocking [[Delivery]] of [[Consumerium]] [[Features|services]]. Rather if someone has thought of a [[worst cases]] scenario, [http://www.consumerium.org/Juxo.gpgkey encrypt] it and mail it to me. --[[User:Juxo|Juxo]] 16:27 Jun 23, 2003 (EEST)
:::If you stick to that policy, you doom the project.  No insult to you, but you are simply not smart enough to understand all such cases, not wise enough to know which matter when, and require a lot of help to think of how to deal with them, and what policy to take.  Especially on complex matters like protocols and licenses where lots of experience and input is required.  This is exactly the argument against [[closed source]] for security products.  Aside from all that, a high-overhead way to submit such cases, that only a few people have the tools to use, guarantees you will not see most cases people think of. Successful projects like Wikipedia have revealed and discussed many [[m:worst cases]] and show no sign of being wiped out yet.
:::If you stick to that policy, any worst case that trolls think of, will appear somewhere else and be easily found on google as a Consumerium Exploit or some other obvious tag.  You will not have write access so you will not be able to block their visibility to others.  So your choice is not "hide or publish", your choices is "publish here or lose all control" over the presentation of such [[worst cases]].  You may take that as both a threat, and as a statement of inevitability.  Trolls are trolls.  Consider yourself to be bitten on the leg.  We are not helping you create a [[monopoly]] you do not deserve (yet), nor are we wasting our time on a stupid and provably-wrong strategy.  So, reconsider.
------
[[Threats]] has now been created, some of which may be [[worst cases]].  If you see a threat you actually believe in, or can construct a worst case that you really believe could happen out of what you see at threats, add that to these other worst cases.
[[Stories]] will help too.  They can be either based on [[worst cases]] or [[best cases]].  The best stories are those that show how a best case becomes a worst case by a small difference in the system's design or governance protocol.  Like say the difference between [[Gus Kouwenhoven]] getting to grow his business, or his buddies deciding he's a liability, and wasting him, using him to feed the same loggers he is now feeding chimps (cannibalism either way).
Please note that all contributions to Consumerium development wiki are considered to be released under the GNU Free Documentation License 1.3 or later (see Consumerium:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)