Filedot Model -
Today, individuals bear the risks of data breaches but capture little value from their data. Under Filedot, you could sell access to a dot (e.g., your shopping preferences) via a smart contract, without losing custody. The buyer receives a verifiable copy; you retain the master. Data becomes a tradeable asset, not a leaky byproduct.
This graph structure enables what the model’s proponents call . You can assemble a temporary dossier for a loan application by providing a folder of dots: an ID dot, an employment verification dot, a credit history dot from a bureau, and a bank statement dot. Each dot remains independently verifiable. The lender does not need to “pull your credit report” from a central agency; you push the relevant dots. And because you control the files, you can revoke access by simply not sharing them again—though note that once a dot is shared, the recipient can retain it. (The model addresses this through expiry timestamps and revocation lists, a topic of ongoing refinement.) V. The Economic and Political Implications The Filedot Model is not merely technical; it is a political economy in code. By inverting the platform-data relationship, it shifts leverage from corporations to individuals.
This design choice is revolutionary in its conservatism. It returns to the early internet’s ethos of end-to-end principle and dumb networks. A dot file is like a physical letter: sealed, signed, and self-contained. You can store it on a USB stick, email it as an attachment, or host it on a personal web server. The network becomes merely a transport layer, not an identity layer. filedot model
Third, . The model excels at pairwise verification but offers no native search. Finding other dots requires external directories, which could re-create platform power. The Filedot response is to embrace multiple, competing directories, but the tension remains. VII. Conclusion: The Dot as Digital Self The Filedot Model is ultimately a philosophical stance. It asserts that digital identity should be as tangible and ownable as a physical key. It rejects the notion that complexity—multiple accounts, layers of abstraction, trust in intermediaries—is inevitable. Instead, it offers a return to first principles: a file, a signature, a hash, and a choice.
A platform cannot ban you if your identity is a file you control. It can refuse to accept your dot’s claims, but it cannot delete your identity. You simply take your dot to another platform. This transforms content moderation from an existential threat (deplatforming) into a contractual disagreement (rejection of a specific transaction). VI. Criticisms and Open Problems No model is without challenges. Critics of the Filedot Model raise three substantial objections. Today, individuals bear the risks of data breaches
Because references are cryptographic hashes, the resulting graph is and content-addressable . This is the Filedot Model’s answer to the blockchain’s distributed ledger but without global consensus overhead. You do not need every node to agree on history; you only need each dot to carry its own provenance.
Second, . If a dot is immutable (changing it creates a new dot), how do you revoke an old credential—e.g., a driver’s license after you move to a new state? The answer requires a revocation registry: a public log of “still valid” hashes. That registry reintroduces a central or consensus-based component, partially undermining the model’s purity. Data becomes a tradeable asset, not a leaky byproduct
Consider a concrete example: a digital driver’s license under the Filedot Model. The DMV creates a file containing your name, birthdate, license class, and a cryptographic signature from the state’s private key. This file is your dot. You store it on your phone. When a police officer asks for your license, you transmit the file via NFC or a QR code. The officer’s device verifies the signature against the state’s public key (which is published on a blockchain or a static website) and reads the claims. No database lookup, no centralized verification service, no privacy leak beyond what the file contains. You remain in possession of the only copy of your license—not the DMV. The model would be trivial if each dot were an isolated monad. Its power emerges in the relationships between dots. A dot can reference another dot by its hash, creating a directed edge. For example, a purchase receipt dot can reference a product dot, which references a manufacturer dot. A credential dot (e.g., “university degree”) can reference an issuer dot (the university) and a subject dot (the graduate).