Meeting - demo_wtfisthis

Unknown0:00
this thing. This is a recording agent. It just goes to our local infra. If you guys don't mind,
Unknown0:07
I'm just testing out the recording functionality and this might be important to record. Yeah,
Unknown0:13
I'll just I'll just like implement the what do you call it chilling effect and not say anything
Unknown0:20
important now. Yeah, so basically not third party, totally self hosted, but also understand
Unknown0:29
still alien intelligences. So yeah, so basically a task list is a nice easy way to think of this.
Unknown0:38
So Jeff has a task. Rory has a task. I have a task. Oh, maybe like Jeff and Rory make an
Unknown0:46
organization together for their shared stuff. And then they start adding tasks to a higher level
Unknown0:53
task list. In the olden days, or you know, maybe even in Roberto's implement implementation. Okay,
Unknown1:04
how do we how do we do this? Well, let's spin up a new group to which we can all have accounts
Unknown1:11
and then add our shared tasks. And when we want to see our shared tasks, we log in there when we
Unknown1:16
want to see our own tasks, we we go back and log into our other account. And then let's say Rory
Unknown1:26
and Jeff and I and if Godfrey's here, I'm not sure. But oh, hi. Nice to meet you. Yeah. Oh,
Unknown1:43
shit. Oh, shit. Not only talking about this. Oh my God, what a moment in time.
Unknown1:53
Yeah. So in terms of a higher level group, okay, Rory, Jeff, and I, we can throw Godfrey in there.
Unknown2:03
We all join a higher level group. Okay, we got to mint a new account with a new login age,
Unknown2:09
with a task list each out with a task list that we all share. And so, okay, we can we can keep
Unknown2:15
the same underlying structure and go one better and say, Oh, well, actually, wouldn't it make sense
Unknown2:23
if the tasks can flow down from the top level group to the bottom level. So let's say we have
Unknown2:30
shared action items come out of a meeting. Some of them are for me. Some of them are for Godfrey.
Unknown2:36
And some of them are not for Jeff or Rory, but therefore, the organization that Jeff and Rory
Unknown2:44
made. Oh, okay, the tasks that we make in our shared group can flow down to that second level group.
Unknown2:50
And then from there, it can flow down to Jeff and Rory personally. So wouldn't it be great
Unknown2:56
if you can just log into your personal account and then see all of your individual action items
Unknown3:03
and tasks from all of your groups to n levels of scale without having to mint a new account,
Unknown3:11
a new data store, run it as a new instance on another server, et cetera, et cetera. So I think
Unknown3:16
like Jeff has been dealing with some of these issues with R Space as he tries to make the
Unknown3:21
community infrastructure for how many levels of nesting can I handle? How do I create capability
Unknown3:30
models and user account controls and all this stuff? And like, how much does it scale?
Unknown3:41
So Roberto had, I don't know if people have seen his implementation of Hollons,
Unknown3:48
but there's a nice part of it where you have a globe. And like, I don't know if it's worth
Unknown3:53
bringing up a screen share because this is a good, let me do it. Yeah, it's good to have a
Unknown4:00
simplifying model, right? So basically in Hollons, so Hollons are an abstract, it's not a tree
Unknown4:12
structure, but it's something like that. It's a Holonic structure that have the mappings of spaces
Unknown4:20
within spaces when spaces, right? This here that Jeff is showing is a geo located version.
Unknown4:30
So basically it uses what Uber used or maybe even developed for its ability to
Unknown4:37
break down the surface of the world into smaller and smaller tiles or subspaces.
Unknown4:45
But what it did that was really smart is it created a geo hashing schema
Unknown4:55
that creates addresses on each tile. So every, if you go to the highest level,
Unknown5:02
each tile is a hexagon. Well, most of them are, I think there might be one or two pentagons in
Unknown5:08
there just to make it work. But each tile is a hexagon, which is broken into seven other hexagons.
Unknown5:19
Something like that. They don't even map cleanly. It's weird. But for the most part,
Unknown5:26
it's like it enabled something, right? So each tile is a hexagon, and you go down and you have
Unknown5:32
a bunch of hexagons underneath that tile, and then you go down one level and you have
Unknown5:36
more hexagons underneath that tile. So that's pretty cool. That allowed them to
Unknown5:41
zoom in and zoom out through multiple levels of scale, which is a common problem across
Unknown5:48
many systems that we're trying to do globally, right?
Unknown5:51
But what's really cool about it, and I sent Jeff a document about this,
Unknown5:58
they basically hash, they create an address for the highest level tile. And
Unknown6:06
the address is like a, you know, a bunch of character string.
Unknown6:13
But zooming in and out becomes an operation of concatenating
Unknown6:19
the string. So, concatenating or truncating the string, like cutting letters off it,
Unknown6:28
or adding letters to it, basically. And so you have an operation that's basically like,
Unknown6:36
you know, maybe the smallest level tile has the longest string.
Unknown6:41
Or the, yeah, you know, I would have to actually look at the docs, like maybe I'm
Unknown6:46
simplifying it, but the way I remember Roberto talking about it was this. And then as you zoom out,
Unknown6:51
you kind of don't need as many cells, and you don't need as many characters worth of information.
Unknown6:59
So you truncate the string. And so zooming out is actually a truncation operation,
Unknown7:08
which is cool, because it's very cheap. And you just...
Unknown7:13
Can I jump in here? Because this is where it blew up my brain, where I didn't understand
Unknown7:19
what the difference with H3 was before. I just thought it was in your mapping library or something.
Unknown7:23
But what it does is it geo addresses. So as Brian said, as you like delete characters from the
Unknown7:29
address, you're like zooming in or you're moving around. So this is different from like a Google
Unknown7:33
Maps address, right, which is you send them a URL, like a site address, and then they have to find
Unknown7:41
some server on the back, or have a server on the back end that says that URL equals this map.
Unknown7:46
Let me serve that image. That's a lot of computation on Google's behalf, and you need Google.
Unknown7:52
But when you do it with the geolocation, the intelligence is in the addressing. So the compute
Unknown7:58
is in the membrane. As you are navigating, you get this, this is fucking cool. So then as Brian
Unknown8:06
was talking, I was like, well, if we can do this for geographic space, why can't we do this for
Unknown8:11
semantic space? And I'm thinking like in the verticals of all of the R apps that I've deployed,
Unknown8:16
because I basically have an R app for every function of like collaboration that I don't know
Unknown8:23
that I find helpful. And a lot of them just have no tools that kind of exist in that area, like
Unknown8:28
shared inboxes, shared maps, map calendars, you know, group shopping carts and connected to group
Unknown8:38
multisig, like why don't these things exist? Why don't why aren't these things easy? So I've been
Unknown8:42
building R space out of like basically traditional server client relationship this whole time.
Unknown8:48
And Brian's like, Hey, this is great. But, you know, what would be even better is if we could make
Unknown8:53
it like, you know, reticulum, you know, so this is another parallel thing, like we've been basically
Unknown8:59
trying to data quantize and then ZK encrypt and reticulum route all of the data. So we've been
Unknown9:10
doing that. And now we're talking this addressing system. I'm just like, wait a second, we've just
Unknown9:15
like quanta quantically chopped up all of the data going through all of the R apps. And now
Unknown9:22
a space that you and I share can just be a part of our address that hashes together that says you
Unknown9:29
both shared this space, there doesn't have to be a server that serves a thing that Rory and Jeff
Unknown9:33
signed into with some authority. It's now all contained in the addressing. And I'm like, wait,
Unknown9:38
how far can this go? So maybe Brian, you want to come back before I go off into space? But yeah,
Unknown9:44
well, maybe maybe I'll catch people up then on, I think that's a good point. So
Unknown9:48
kind of we've had a few cool technologies going on before, but we didn't have the
Unknown9:55
anywhere anyone getting anywhere close enough to having to implement something
Unknown10:01
that we needed to mash them together. So maybe so we've got age three. And we kind of know how to
Unknown10:10
do very cool scale traversal through essentially string operations, simple linear string operations.
Unknown10:21
And like another another idea, which we'll get to is masking, which is like, you know,
Unknown10:28
if I have a long string, and it says like, Rory choose, and then I put the number like one zero,
Unknown10:35
zero, zero, zero, zero, zero, whatever, on top of it, then I can basically say, I don't want to see
Unknown10:41
all of the last letters like Rory choose, I just want the R, right? So that's applying a mask
Unknown10:48
on top of the fundamental string to select the first letter, or, or any letter, right? And then
Unknown10:56
you have more complicated algorithms where you, you know, you mash two strings together and create
Unknown11:04
a hash or you use an sh to sh a 256 algorithm or whatever to, to mash two strings together
Unknown11:12
to do operations on it and create a new address, right? So anyway, the point being, you can create
Unknown11:19
addresses from an existing address. And this is where we get to like, how do we move between
Unknown11:28
our spaces between cells, between levels of scale and across levels of scale. And do, for example,
Unknown11:39
this, this nested task list. So I had been playing with the reticulum and reticulum is a mesh network.
Unknown11:48
And it is quite a nice one, maybe, maybe Godfrey knows a bit about it.
Unknown11:56
Just since you started dumping in that signal channel for hours on end.
Unknown11:59
Yeah. So hopefully you're okay with that and up to speed. But yeah.
Unknown12:05
Cool. Welcome to the fire hose.
Unknown12:10
No, you love it.
Unknown12:14
No, Godfrey, are you able to see what's on the screen?
Unknown12:19
No, I'm not really, I'm trying to select that view and it's not giving it to me.
Unknown12:26
Try try clicking the tiled view toggle tile view. And then you should maybe see all the screens
Unknown12:30
like the four squares. Oh, there we go. There we go. Yeah.
Unknown12:34
So in reticulum, you have a similar looking system where you have a whole bunch of nodes.
Unknown12:43
It can traverse across any physical link, as long as it's using the reticulum protocol. So
Unknown12:52
basically reticulum replaces the TCP IP stack. And you can go on the internet without ever being
Unknown12:58
on the internet kind of thing, which is super cool. But what's the relevant part here? Basically,
Unknown13:08
every node has an address. And if you want to talk to somebody on the reticulum network,
Unknown13:16
you need to get their address either out of band or using their announce system,
Unknown13:23
which propagates the address along nodes. But once you do a key pair exchange,
Unknown13:28
and you have their address, their routing system remembers the fastest uplink
Unknown13:34
from you to any other node that you're searching for. And you guys can communicate, right?
Unknown13:45
But you can communicate in a way that's perfectly forward secret. So all of your packets,
Unknown13:50
it's not like TCP IP where you get somebody's address. And then,
Unknown13:53
you know, even if you're using HTTPS or some sort of encrypted pathway,
Unknown14:01
you're still having metadata from like, who is the sender of these packets? Who is the receiver?
Unknown14:08
Because the routing protocol needs to know where to send your packets. And so, you know,
Unknown14:15
your computer is sending out, Hey, I want my packet to get to this, you know, 192.168.5.78
Unknown14:22
address, if it's local or some other address, if it's on the website.
Unknown14:32
And yeah, so you're always having to pass metadata, because the routing layer needs to know
Unknown14:39
where to send your packets. So the ISP can get the metadata, you know, the next ISP can get it.
Unknown14:45
And then all the corporations that are serving apps or just surveillance capitalism, I mean,
Unknown14:53
the internet can see who's talking to who. And essentially, even if they can't read the messages,
Unknown14:58
they can see who's talking. And reticulum solves that in that once you've done the handshake,
Unknown15:07
the sender doesn't even need to send out who, well, who's the sender. And,
Unknown15:16
you know, nobody can see even that that metadata that allows you to communicate. Because once the
Unknown15:25
route has been found, you're all good, right? So I can't, I wrote it down thankfully, but I can't
Unknown15:33
fully remember at this stage exactly what in the conversation led us to this. But it was basically
Unknown15:38
like, why don't we take reticulum routing and H3's system of perversing all levels of scale with
Unknown15:47
geohashing. You know, this is one thing I always wondered about, Roberto's Hollons is like, how
Unknown15:55
you do you have a schema for creating the address of the Hollons, the next level up Hollon on top of
Unknown16:04
Jeff or Rory. And you've got the Jeff Rory Hollon. You know, I think what his Hollons is doing is
Unknown16:12
just minting an address. It's not doing any cryptography between Jeff and Rory's address to
Unknown16:19
then generate a new address and creating like a Merkle tree, for example. Probably be a good idea
Unknown16:25
in our case. Yeah, it literally is. So I have things to update you on, Brian. Cool. So, yeah,
Unknown16:36
basically, you know, just looking at H3 and the amount of computation that's saved by
Unknown16:43
applying a certain schema to the axis of zoom, you know, you don't have to actually like do some
Unknown16:51
calculations to figure out how to zoom. You just have created an addressing system that you then
Unknown16:56
need to just say the address or chop off some letters on a string to choose which cell or
Unknown17:02
whichever level of scale you want to go to. I mean, that's pretty, pretty amazing, right? So,
Unknown17:07
let's apply this with reticulum to, to Hollonic addressing. And so I went there. Yeah, yeah.
Unknown17:19
And add all the extra stuff. So, so basically, before I went to bed that night, I sent Jeff
Unknown17:26
like also a paper on fractal addressing, which was, you know, if you look at a fractal, the
Unknown17:33
formalizations, yeah, if you look at a fractal pattern, blanket, you can, you can notice that
Unknown17:41
certain areas on the fractal look the same as certain other areas if you zoom in and zoom out
Unknown17:47
or translate across the space, or I guess the manifold one dimensional like two dimensional
Unknown17:52
manifold or whatever. And essentially, yeah, this person came to a similar conclusion,
Unknown18:00
which is that with a combination of an addressing scheme and masking, you can translate across
Unknown18:10
self similar patterns on the, the address tree, let's call it on the, the coordinate system by
Unknown18:22
applying a mask to some pattern with a function between right. So basically what it looks like is
Unknown18:34
every Hollon has an address and higher level Hollons, the address is constructed from the
Unknown18:43
addresses of the lower level Hollons, right. And like actually to be, to be perfectly honest,
Unknown18:49
masking is like a simple way to think about it. It probably is not using
Unknown18:55
masking per se, it's probably using some sort of hashing of the addresses. But if you create
Unknown19:04
any sort of structured relationship between the addresses of the Hollons,
Unknown19:09
and then you do reticulum routing across those addresses, you can basically translate between
Unknown19:18
Hollons at any level of scale, and across any layers to other addresses, but you don't have
Unknown19:25
to do calculations to do it. Well, it's all on the, it's all on the spine or the, the, the access.
Unknown19:36
So you've embedded, so you've created an address system for how all the Hollons interrelate so
Unknown19:43
that people can traverse up groups, up, you know, from Rory or Jeff's addresses individually up to
Unknown19:50
the Rory and Jeff level address, up to the Rory, Brian, Jeff and Godfrey and the AI are in a chat
Unknown19:57
room level address. But you don't have to create new accounts, post this video chat on a, on a
Unknown20:05
server for the organization, etc. You just need to provide the address that was made from a hash
Unknown20:14
of all of our individual addresses put together in some way so that now all of the data, all of the
Unknown20:22
applications, all of anything related to us as a group of people simply is pointed to another
Unknown20:32
address on a different level of, of, of Hellonic scale. As Rory, I want to check that you're,
Unknown20:43
you're with us. Yeah. Sorry, I'm getting a visual on this one. Yeah, that's a good thing. Yeah.
Unknown20:52
Channel is so use your visual cortex to understand the patterns. We like that. So, so basically
Unknown21:00
what's very cool about it and the reticulum routing part is
Unknown21:08
is, yeah, is applying, I guess, how, how do we use this so that
Unknown21:16
well, yeah, how do we use this to actually navigate between these levels of scale?
Unknown21:29
So, and, and by, by hashing people's addresses together. So, you know, H3 creates the levels of
Unknown21:37
scale on an arbitrary axis that allows you to zoom in and zoom out to translate between sort of cells.
Unknown21:44
But the reticulum part is like, oh, let's create the addresses when two people want to talk
Unknown21:52
by hashing their stuff together, and then use that for routing. So, basically,
Unknown22:03
try to visualize this. There's a group at a higher level of scale that was made from hashing maybe
Unknown22:10
Jeff and my address and then hashing up with your address and hashing that with everybody's address.
Unknown22:15
So now we've got a character space that is n dimensional.
Unknown22:21
And movement up and down that character space involves masking
Unknown22:32
certain characters. But because the character space has been defined already through the
Unknown22:39
handshakes that people do and through the hashing, we don't have to do computation to route between
Unknown22:46
the spaces anymore. Like you do that the first time and now you have addresses for where the
Unknown22:51
spaces are, right? So if I want to go like, oh, hey, I want to look at what's relevant to my address
Unknown23:01
in this like third level hold on. Well, I just need to provide the address of where that hold on
Unknown23:07
lives in this abstract space. And because my address in some way is compatible with that address
Unknown23:17
through a number of hashes or what have you, it already knows that I belong to that group,
Unknown23:25
because my address was one of the ones that was used to create the group address, right? So
Unknown23:33
what does this give us? And Jeff can maybe expand upon that. But basically, like, I can
Unknown23:41
not have to do computation by having a Holonica dressing scheme and know that I am,
Unknown23:48
I deserve to be in this group. So I have access rights over the data in this group.
Unknown23:55
My task list should therefore automatically know that any tasks added to that group should flow down
Unknown24:03
the tree to my personal task account, etc, etc, etc. But basically, we've embedded
Unknown24:16
the routing logic and the fractal or Holonica structure, dimensional structure
Unknown24:28
into a character space, which is n dimensional. And using that as an addressing scheme,
Unknown24:40
we can do mappings across the entire n dimensional manifold, as it turns out,
Unknown24:47
to be able to create an okay, and this is important. And I might leave out words here
Unknown24:57
because still getting our heads around it, but we've made an infinitely divisible, infinitely
Unknown25:06
expansible n dimensional space. So, you know, if you have a Holon and you want to make subgroups
Unknown25:17
and subgroups and subgroups, your addressing scheme has to allow for infinite divisibility
Unknown25:22
of the space. And then if you want to make supergroups and supergroups and supergroups,
Unknown25:28
you need to have infinite expansibility of the space. And then we have a holographic
Unknown25:36
character space representation of this entire space, which is basically all of the possible
Unknown25:43
addresses. And we have routing between them based on simply having to look at whether your
Unknown25:51
personal address or your group address or whatever is compatible with whatever nth level address.
Unknown25:58
And by creating this space and embedding all of that complexity in the in the axis,
Unknown26:05
in the character space, you don't, there's a lot of computation saved on conventional models where,
Unknown26:14
you know, if you're running another server that has to pass messages between servers,
Unknown26:19
you don't have to do that anymore. Because you just have to kind of know that your address is
Unknown26:28
allowed in another level address. And that's how you decide access rights. And that's how you know
Unknown26:34
that you have access to data blocks that deserve to be in that Holonic level. So, essentially,
Unknown26:43
like, yeah, McLuhan's thing, the medium is the message. And like I gave Jeff some, some analogs
Unknown26:49
of this, like if you're familiar with other areas in mathematics or engineering,
Unknown26:53
like Laplace transforms in electronics, you know, you can have really complicated differential
Unknown27:01
equations that you need to solve. Or you create a new access system in which all of the differentiation
Unknown27:10
is embedded in the in the axis in the underlying medium, so that if you want to resolve and find
Unknown27:16
solutions to how to decompose a signal network on a circuit, you only have to do addition and
Unknown27:24
subtraction and linear algebra type of things now. Right. And you, I don't know, somebody,
Unknown27:30
Jeff, do you know a really simple example for people who didn't do a bunch of electronics? It's
Unknown27:35
like, you can all like, you know, polar coordinate systems. So yeah, like an XY coordinate system.
Unknown27:46
And then you want to do trigonometry on top of it. So like Y equals sine X. And then you have to
Unknown27:52
solve some like some slightly more complicated things. Or you can check these guys are alive for
Unknown27:59
a sec. I haven't seen either of them. Oh, just listening. No, I have questions. Right. I've
Unknown28:07
got vision. This means that, like, I'm not on people and I'm not on whole arms. I'm on like,
Unknown28:16
we can, we can like map trees in woods. Yeah. Yeah. Yeah. Yeah. And that's what's fascinating
Unknown28:29
about it because it's an n dimensional manifold that is capable of mapping
Unknown28:42
any amount of dimensions, any, any type of node also to any level of scale. And then if you provide
Unknown28:51
enough layers between that. So for example, you want to map one coordinate system on an outer
Unknown28:57
level of scale to a different type of coordinate system inside another holon. If you provide a
Unknown29:04
transfer function between them, or there's a name for it in manifolds, maybe an example will help
Unknown29:11
map between the guys. So the other, the other massively important one for, for my perspective
Unknown29:17
is the fact that you can then identify the relationship. Right. Yes. Like, yeah. It's
Unknown29:27
was that the relationship is self aware. Yeah, well, it has like, there's a specific means then
Unknown29:36
of essentially tagging any given relationship. Yes. And for my specific area of interest is
Unknown29:45
relational health, right, like relations and being able then to literally tag
Unknown29:52
any of those relations and that the relation itself can be considered then a unique entity.
Unknown30:02
Yes. Within that, you need to meet. Yeah. So maybe I'll add the last kind of important
Unknown30:15
step here. And then we can just zoom out to like, where are we, you know, everybody's brains can
Unknown30:21
dump stuff. Yeah. So basically, you know, Jeff kind of made an, this is something that like,
Unknown30:31
I guess needed to be in the pipes for a while, but like Jeff just chucked it all into the
Unknown30:37
food machine and it came out by the next morning. And then because Jeff then was like also like,
Unknown30:45
oh, well, you know, we want to do this for the addresses in our space.
Unknown30:50
What about the data blocks? What about the access controls? What about any number of
Unknown31:01
basis dimensions that I need? I can define in a holonic way. So okay.
Unknown31:09
Then it makes all those things the same thing. Yeah. So if I have words,
Unknown31:15
making bobbleheads. Yeah. If I have words, and then I want paragraphs, and then I want those
Unknown31:22
paragraphs to all be data blocks in a document. And I want those documents to all be, you know,
Unknown31:27
pages in a book or something. And I also want them to have access rights across different groups.
Unknown31:39
Well, I can apply an addressing schema to that, which is the same because it can represent
Unknown31:47
lots of things at lots of different levels of composition. So basically,
Unknown31:54
you apply, oh, it turns out to be the same pattern, but you just give it another dimension,
Unknown31:59
which is the data dimension. And then every data block has an address at a certain level of
Unknown32:06
scale. And then so you have this in your set, and you decompose your system into like how many
Unknown32:15
basis dimensions do I need? And I can't really remember, Jeff, but it's like I need access rights,
Unknown32:21
I need addresses for the spaces I need. Bye. Yeah. And so now you have like your anything that needs
Unknown32:36
to be represented in your system now has an address representation across dimensions. And you can
Unknown32:47
traverse this space without having to send any messages or do computation.
Unknown32:56
Yeah. That's cool. Yeah, that's pretty nice. And yeah, so let's all just take a moment
Unknown33:13
and like be happy about that. But the other side of it, I guess, to reground it in like why is
Unknown33:26
reticulum important is, you know, this is like we want a world of agent centric computing with
Unknown33:36
where agents hold their own data and choose when to forward that rights on that data to the network.
Unknown33:44
And this is where Godfrey and ZK come in, right? Like, you know, and I want to just be able to show
Unknown33:50
proofs that I have certain requisite data or to validate certain things without having actually
Unknown33:57
show my data. So maybe Jeff, because I wasn't so clued in, I was more focused on the addressing
Unknown34:05
scheme, but Jeff has been implementing ZK in our space for some time. So how does this bring in ZK?
Unknown34:13
I mean, every data packet is ZK encrypted. It's just like, so they're like, it's the perfect
Unknown34:21
encryption every and, you know, Godfrey, I don't know, maybe you have some technical input on
Unknown34:32
where ZK and reticulum fit together. But I mean, every time I give a repo to the AI, it's like,
Unknown34:38
this is a exact match. This is the mathematical formalization. This is the technical formalization
Unknown34:43
of the routing. This is the formalization of the ZK. Yeah, I will say, I forgot to say one last bit.
Unknown34:56
So the reason this is nice is so moving away from client server, mental models, and this is going
Unknown35:05
to be a bit of a process. Like every time we come back and look at this, you know, if you're not
Unknown35:11
familiar with Holochain or something, it takes a little while to just start thinking in a membrane
Unknown35:15
computing style way. But basically, in reticulum, the design is for a network that maybe has
Unknown35:26
like low bandwidth up links between nodes. It's not like the internet where people have like focused
Unknown35:33
on this massive build out a very high bandwidth infrastructure so that you can stream cat videos,
Unknown35:39
you know, from Antarctica, which are living on a server in the US. Reticulum actually is solving
Unknown35:45
a problem. I found a good article that I forgot to share that was basically NASA had tried to figure
Unknown35:51
out how they could do a mesh networking system that could handle very low bandwidth up links and
Unknown36:02
really long round trip times on the data so that you could get to some ship in outer space like
Unknown36:08
three minutes later, and it's not going to be like connection, you know, unclear, like drop the link,
Unknown36:14
it's going to be like, okay, data takes time to travel. And reticulum has that, right? Because
Unknown36:19
you're going between high bandwidth up links and then allora node, which can transmit at like
Unknown36:26
one kilobyte kilobit per second. And so basically, you have to do your applications in a design
Unknown36:37
way that's called store and forward, right? So each node might run the same application.
Unknown36:44
So rather than have one server running the application and then like bandwidth is free,
Unknown36:48
you know, let's send data chunks to everybody. Well, a, we don't need to do that because we don't
Unknown36:54
want to be having to calculate a lot of things and send things across the network.
Unknown36:59
So this is where like Holochain had already figured this out, right? Oh, well, why don't you run the
Unknown37:05
application and only have it have to see data and stuff that's relevant to you, right? So you can
Unknown37:13
run the application on your node and only, and yeah, maybe you have to get some data from another
Unknown37:21
nearby node or a couple of hops away or something. I'm going to like make, make a, a race, a system that,
Unknown37:28
that helps you understand that the data that's shared between all your peers at your level of scale
Unknown37:36
is not being, you know, tampered with. And that's why, you know, that's just borrowing blockchain,
Unknown37:44
but it's having chains of chains of chains at any level of scale, right? But also we're going to
Unknown37:49
make sure that the application code that you're running is being verified. Because even if you're
Unknown37:54
sharing the same data with people, but a couple of nodes band together and run a fake version
Unknown38:00
of the application that gives you more money than all of your friends, then we want to actually
Unknown38:06
check the application code. So Holochain is Holonic, but it didn't implement anything like
Unknown38:14
Holonic addressing. It's, its main purpose is to show that data is verifiably consistent across all,
Unknown38:21
all levels of scale, right? So yeah, with reticulum, you're coming, let's just ground it in the real,
Unknown38:27
well, and not just with reticulum with this system, you're coming and you're coming with your own
Unknown38:35
node and your own application set running on your node. You hold your data, but you're forwarding
Unknown38:45
it to the network based on whom it's relevant to share it with. But this is where it gets interesting.
Unknown38:53
You're forwarding it up to whatever level of scale in the holographic character space
Unknown39:04
that matters to you based on whomever you want to share it with. And when you're sharing it,
Unknown39:10
you're sharing it at ZK encrypted. So yeah, that, that's kind of like, where does the rubber
Unknown39:19
meet the road? Like how does this look for a person? So you don't have to spin up a new server
Unknown39:24
for an organization. You don't have an organization is just you guys choosing to share
Unknown39:29
to a different level of access rights on the addressing schema, your data. And then that address
Unknown39:36
now lives in this holographic space. And so if you want to make a group with people, well, just
Unknown39:42
you gotta, you gotta access that address, right? And there's a whole bunch of stuff that I still
Unknown39:47
don't even know what Jeff has implemented. Like, how do you add people to a group? How do you
Unknown39:52
delete people from a group? Do you have to change the address somehow or whatever? But then, you know,
Unknown39:58
then we're starting to talk about like, and K and n graphs and like nearest neighbors and graph
Unknown40:04
summarization and all this stuff that I guess we've been adding on top and still trying to wrap
Unknown40:09
our heads around as we go. But I think you've got the basis stuff now and then other other layers
Unknown40:19
that we can add to this like some of the, I guess use cases that Jeff and I ended up then talking
Unknown40:24
about including, you know, internet naming system, which is why I want to talk with Jeff, like, how
Unknown40:31
do you do a holo holonic namespace instead of a global namespace? How do you do what was the one
Unknown40:42
we were doing like yesterday on the day before? I feel like we've done some pretty cool things,
Unknown40:47
but I can't remember what they are anymore. We're just shitting unicorns these days, like every night.
Unknown40:56
Another unicorn just comes out accidentally, accidentally. It's like, oh, you get all this
Unknown41:04
shit for free. Oh, you know, you were going to do all that stuff turns out it's all one thing.
Unknown41:08
And actually, we can just do it now. And it's like, it just simplifies everything for everyone
Unknown41:13
forever. And it's like, what the what the what? Yeah, well, yeah, go on godfrey. It's time to
Unknown41:24
brain dump. I think we got a simple questions and reflection and review. So basically, as above so
Unknown41:33
below, it sounds like where your note is, you have internal connections, and then you have
Unknown41:40
external connections from what I was understanding. In like your membrane, then there's membranes above
Unknown41:47
you membranes below you that you're already connected to. And then you want to reach out
Unknown41:52
and connect to the other. There's a few questions I have around. What are the like, what's the node
Unknown41:59
discovery? Is there some kind of like you were sharing earlier? I mean, I'm trying I'm working
Unknown42:05
to track all this and then have potent output here. So like in the ways of discovery, once
Unknown42:11
you're already connected, is there a way to map? And then what's the permissions around the external
Unknown42:18
nodes and internal nodes that secure you locally? And then there's a way to, I guess, to verify.
Unknown42:29
It's all about this very verification from you to other nodes to the, I guess, the greater fractal
Unknown42:38
holons and the greater internal holons, if that makes sense. And what was the, can you just repeat
Unknown42:44
what was the question there? What is the discovery was the first one and then second one was?
Unknown42:52
The second one was, I guess, it's the mapping of the discovery and understanding the permissions
Unknown43:00
of these connective, the connective tissue for the membranes. Like, what's that verification
Unknown43:07
process? Yeah, like, how is it hashing? Is it masking? Like, how does it know that you should
Unknown43:12
be allowed to traverse this address space in this way? Yes, exactly. Well, so the first thing I want
Unknown43:20
to triply, doubly make sure of is we're not talking about physical nodes. So like, yeah, it gets a
Unknown43:26
bit confusing. We're talking about using reticulum, right? And it has its own system of announcers and
Unknown43:32
finding other addresses and then making a handshake with them and all this kind of stuff.
Unknown43:37
We're talking about on the application layer above that, that can be integrated with your
Unknown43:46
physical node address, right? But we're creating a holographic space that is not on a mesh network.
Unknown43:54
For example, it's in the application space above the mesh network, right? Okay, that makes sense.
Unknown44:01
Yeah. But it could also be the addresses on the mesh network if you felt like it made sense that
Unknown44:09
the physical links are representations of the agents, but probably not, right? So yeah, as for,
Unknown44:19
and this is where I think I want to reframe this as a question, answer thing. Like, and we are missing
Unknown44:27
some key people in this room. So this is not happening in the usual thoughtful way of, let's
Unknown44:36
take our time to really know what's going on and only then implement the next step. Like, that would
Unknown44:43
be my preference, but Jeff doesn't listen to me. And so it's really happening at the speed of
Unknown44:51
intuition going through the AI and then us catching up to like integrate, make sure we can explain it
Unknown44:57
in physical conceptual language. And then so what we're doing is we're setting up an auditing pipeline
Unknown45:03
right now on being able to be like, here's all the features that have been implemented so that you
Unknown45:08
have a map to come through and audit this step by step and understand. So I can't actually tell you
Unknown45:14
the answer to your first question. I can't like what is the hashing algorithm used to create the
Unknown45:22
new addresses? What gives addresses permissions? Ede 5519 or something like that. Yeah. Yeah.
Unknown45:31
So I mean, there's not more about the implementation side. Take it away. Yeah.
Unknown45:34
I think the shortest way to give the answer would be co homology. Like, like what Brian said,
Unknown45:43
actually, which I think is a really neat way to say it navigating an n dimensional space with no
Unknown45:47
computation. So it's all in the address. So like, I feel like there is some magic in the way that
Unknown45:54
ZK and reticulum and this like mathematical formalism of these, these that Brian sent me,
Unknown46:02
it was just like, actually, this is perfect, we can have, you know, discovery through the shared
Unknown46:10
shape of a hashed address space. So like if you and I share, like, we don't have to make a third
Unknown46:18
space that is the ZK and space, it can just be a space that you and I share in our addressing.
Unknown46:24
So in that way, it's like the discovery is kind of like part of like, it comes with just turning
Unknown46:32
on your discoverability. Like if you want to be seen, everybody with that similar shape
Unknown46:38
can see you. But people without that similar shape can't see you and the people that can see you,
Unknown46:43
they don't necessarily know anything about you because it's all zero knowledge. They just know
Unknown46:46
you're a similarly shaped thing. That might not even be a human. Like it might be a package
Unknown46:52
communicating with another package, or like a package communicating with a driver in a
Unknown46:56
decentralized mail system where the package knows it needs to get from here to there and it searches
Unknown47:00
for the shape of the trip of someone who might be going that direction. Yeah, so that's actually,
Unknown47:08
I remember the email you sent that was about, like we were talking about, oh, how do you do a system
Unknown47:16
where if you lose your key, you know, like what is it? Sameer's secret sharing stuff. But instead of
Unknown47:22
kind of nominating three people that you need to like reconstruct your key, if you lose it,
Unknown47:29
how do we end dimensionalize this? And it's like, well, what if by default, everyone you interact
Unknown47:38
with, like your past interactions across this network and between agents and on the network
Unknown47:44
space, that gives you a fingerprint in a space that people can't see because it's all ZK.
Unknown47:50
Yeah, and is there a time? Yeah, that's amazing. Is there a like a time expiry so you don't drag
Unknown47:58
around all your past? Maybe we're doing some testing here. There's a way, like auto opening.
Unknown48:04
Yeah, so this is where turn your question into a, this sounds like a good idea.
Unknown48:13
And let's improve the model. No, I love this intuitive approach. Absolutely. Adjusting.
Unknown48:21
Yeah. Yeah, so exactly. So it's like, okay, we, and we've done this on a few iterations, right?
Unknown48:28
Jeff keeps like fucking putting the card before the horse and I have to like get on my donkey and
Unknown48:33
catch up. It'll be done by the time we understand it. Yeah, I love it. But basically, yeah, so, okay,
Unknown48:43
so let's implement some, so it turns out that the K nearest neighbors thing then becomes a
Unknown48:47
functionality that becomes useful across every other dimension, right? So let's throw that in there.
Unknown48:54
What else? Like there's some core bits that like as we go and like,
Unknown48:59
yeah, just, I think it was yesterday and I really want to know if Jeff picked up what I was putting
Unknown49:05
down on the, on the global name space. Like this, this is a fun example. I just want to talk about
Unknown49:14
it. Like right now, okay, no, we're skipping too many steps. Like, then we were like, okay, if we
Unknown49:21
want to deploy our space, we need to be able to access web apps. If we want to display deploy our
Unknown49:30
space on reticulum, we need to be able to access web apps on the reticulum network. Now reticulum
Unknown49:37
has something called NomadNet, which is it's not using HTML or HTTP. It's using, I can't remember
Unknown49:52
the name of it, some like very low brow, like some very data, like it, what's the opposite
Unknown50:04
of data hungry? It's very efficient with how you can serve pages on NomadNet. It's a different
Unknown50:12
protocol. But then somebody made something called mesh web, which allowed you to serve HTML website.
Unknown50:23
Over reticulum. Yeah. And then Jeff started to be like, oh, I want to have a website I can
Unknown50:33
serve that is accessible both by people over the reticulum network and over the regular TCP
Unknown50:44
IP system by going to the same address. And then we got to a point where it's like, well,
Unknown50:52
you want to have self aware routing so that people know because like Jeff did this thing
Unknown50:57
where the page actually said like, you are not on the internet, you know, you're, you're accessing
Unknown51:02
this web page over reticulum. But then I accessed it, but I knew that my reticulum network wasn't
Unknown51:08
working. And it still said that I was seeing it over the, not the internet. And then so we
Unknown51:14
realized, oh, you actually want your data packets. No, that that's skipping a step. You actually just
Unknown51:21
want to know as an end user, yeah, which, which network did I access this over? But it turns out
Unknown51:28
that because of the way we implemented this substrate, your data packets themselves because
Unknown51:34
they bounced through an address space have awareness of the medium through which they're
Unknown51:42
traveling. And so the packets are self aware as to whether they ever pass through TCP IP space,
Unknown51:50
or whether they stayed in reticulum space. And this probably has implications across every other
Unknown51:57
dimension that we haven't even bothered to think of yet. But it's like, all of your data is has
Unknown52:05
self aware routing, like anything through the end dimensional space can have path awareness.
Unknown52:13
And then Jeff started thinking about postal systems and all this kind of stuff.
Unknown52:19
It goes and it goes and it goes. So what was, yeah, that's incredible. Brian was like looking to
Unknown52:28
HNS handshake. So I was like, okay, I fed it HNS. And it was like, Hey, this would be useful for like
Unknown52:35
this one thing. And I was like, wait, isn't that useful for like everything if we just
Unknown52:39
halonify it? And it was like, Oh, my God, you're right, we could halonify this too. And I'm like,
Unknown52:44
can you add it into the Janus addressing? And it was like, of course we can. And I'm like,
Unknown52:47
I think because with the cannon grouping, like, and the the basically like,
Unknown52:54
so give us okay, go on and then we'll jump back to this. Okay. From HNS, rather than just having
Unknown53:05
a handshake agreement, basically, it said, if you want to use this, there are a lot of kinds of
Unknown53:10
handshake agreements, there might be like simple direct ones where I have X and you need X, there
Unknown53:15
might be ring ones where I have a and want B, you have B and one C, you have C and you want A,
Unknown53:21
then you may have more even more complex ones where there are multiple dependencies, multiple,
Unknown53:25
you know, and you have large stakeholders. So it was like, well, how are we going to compute
Unknown53:29
this? And I was like, how about we don't compute it? How about we treat all of these handshakes as
Unknown53:34
part of the addressing thing to at the individual level that then nest holonically. So your your
Unknown53:42
commit your intense so intense or a mathematically formalized, like basically solver system for
Unknown53:50
stuff in anything you intend in a network. So that's already in, we've already done an OMA.
Unknown53:55
Now we've got basically reticulum routing and the context aware packages at every point in the
Unknown54:04
network. So basically, it went from saying this is computationally irreducible, like we cannot
Unknown54:10
build a system. And I mean, that makes sense. How are you going to like measure all of the things
Unknown54:15
across all of the scales? But then it's like, wait, what if every package in that halonic infinity
Unknown54:21
knows where it is, knows where it's from, where it's going. And then it only has to deal with
Unknown54:26
its local like KNN. And it was it was basically like, okay, in small networks, you get a 7000x
Unknown54:33
improvement in efficiency network efficiency. In large networks, it was into the billions or
Unknown54:38
hundreds of billions of times more efficient, basically, meaning this can be computationally
Unknown54:43
tractable at a halonic level, which could like, I mean, I'm like, what the fuck, what does that mean?
Unknown54:51
So, yeah, I don't even, I don't even know what we're playing with at the moment,
Unknown54:56
but it's being filled and it'll be done by the time we have any clue of what it can do.
Unknown55:01
So it sounds like, yeah, Jeff took the handshake thing with an OMA.

Report a Bug