Anonymous 10/07/2019 (Mon) 20:23:08 No.11626 del
>>11608
On this particular network (we have designed and build parts of it) in order to access the network you must be recognized by the network authenticated. We have a novel means to do this which is.
Once you are on the net you are default anonymous and all you data default encrypted. That is "elective anonymity" although it's really chosen for you unless you choose otherwise.
Credentials are separable. If you want to show a professional credential a law degree or other, you can do that without revealing other aspects of your real world identity.
You can buy and sell, give evidence of capacity to pay, have goods shipped anonymously - it's up to users to configure identity.
In our design the users also own the network after it repays development costs. Information - news or entertainment - is the stuff our brains run on and putting anything but the most accurate information into minds causes damage. That's what cult Information Poisoning is -introducing false information into a communications network is an attack on eer user of the network.

And yes you can uses pseudonyms on the new network, you can even imitate others for satirical purposes. The difference is that you can not credibly impersonate others so as to deceive them.
There is only 1 real you. Other people may pretend you be you, but they can't credibly impersonate you because the network won't verify ID.

"shapeshifters" are greatly feared by indigenous tribal peoples and rightly so. The internet now is the domain of shapeshifters, and if we want it back we'll have to reclaim it, spiritually and technically.