Personal Privacy Networks & Exchange Tokens

WebShield and a broad network of ecosystem partners are launching Personal Privacy Networks that will offer unprecedented privacy, cybersecurity, and identity protection; enable convenient access to data, apps, digital content, and online services; and allow online activities to be personalized, automated, and optimized without jeopardizing privacy or control of sensitive data.

The Privacy Network Exchange will leverage WebShield’s Quantum Privacy and Proof of Trust to allow people and organizations to safely tokenize, pool, reprocess and reuse rights to use data, software, infrastructure, contractual rights, brands, and relationships – all without risking the privacy, security, regulatory compliance, or commercial rights of any participants.

Individuals and enterprises will earn Exchange Tokens as a by-product of protecting and personalizing their online activities and as a reward for their engagement and resource rights, giving them a stake in a Web3 token economy without requiring that they invest money or have specialized technical expertise. Ordinary people will be able to earn Exchange Tokens worth tens of thousands of dollars or more simply by opting into Personal Privacy Networks and using them in their online activities and interactions.

Exchange Tokens will be backed by fractional rights to ownership, cashflows and in-kind resources from application networks enabled by reuse of resources via the Privacy Network Exchange. This will decentralize network ownership; unlock sensitive, regulated, and proprietary resources that are currently fragmented and largely unavailable; and align incentives by rewarding resource sharing and beneficial behaviors that create value for individuals, enterprises, and society.

The Privacy Network Exchange promises to bootstrap a lucrative Web3 token economy driven by mainstream applications that drive real-world value – better healthcare and educational outcomes for less money, more productive and convenient work and personal lives, a more sustainable environment, an end to identity theft and cybersecurity fraud, more trustworthy governance of online services, etc.

 

Personal Privacy Networks

Unifies web, email, social networks, and messaging clients into a consumer-controlled person-centered network that offers convenient access to apps, digital content, data, secure messaging and payments, and supports automated provisioning of apps and online services on demand. Uses EasyAccess and Quantum Privacy to empower people with convenient access and personal control of their online identity, relationships, data, digital content, and access policies, while protecting them from identity theft and cybersecurity fraud. Leverages Personal Data Networks to enable privacy-preserving discovery, data access, personalization, and process automation.

Personal Data Networks

Enforces a person’s regulatory, contractual, and individual rights as customers, employees, parents, patients, and citizens, making it possible to unlock data, online services and accounts that are currently fragmented and hard to share, linking them to a consumer-controlled virtual database and global graph via existing APIs, legal agreements, and trust frameworks. Can connect diverse data sources and accounts across disparate organizations and systems into privacy-protected data graphs that enable personalization, population analytics, and cross-organizational process optimization without risking the privacy, regulatory compliance, or commercial rights of any participants.

EasyAccess Authorization Network

A decentralized set of services that supports no-password authentication, many-factor identity proofing and record linking, automated data and account discovery, end-to-end consent management and access authorization and anonymous personalization across disparate organizations and systems – all without revealing sensitive information to any person or organization. Leverages Quantum Privacy and Proof of Trust to simultaneously enforce disparate federal, state, and international privacy and data governance regulations on a global scale.

Quantum Privacy

Enables end-to-end person-centered encryption and zero-trust data protection, with precision access control down to the level of individual attributes to a single person for a specified purpose – decrypting personally identifiable information only for authorized recipients after verifying Proof of Trust. This enables decentralized computation without revealing information to any person or organization, allowing resources to be made available as protected URIs or smart contracts that can be shared, linked together, reprocessed and re-used without jeopardizing privacy, security, or regulatory compliance.

Proof of Trust

Provides a symbolic trust layer enabling distributed governance of identity, security, privacy, regulatory compliance, commercial terms, semantic interoperability, etc. without assuming consistency or mutual trust. Every Privacy Network resource has a decentralized identity and can be bound to trust credentials and trust criteria based on a Unified Trust Model and anchored on a public ledger to verify Proof of Trust. Allows online users, record subjects, vendors, regulators, and enterprises to independently specify trust criteria and trust credentials which can be automatically inherited by aggregates, computational outputs, or user responses, so that Proof of Trust can be verified across the network and through time.

Privacy Network Exchange

Allows people and organizations to safely recombine, reprocess, and re-use resources (e.g. data, software, infrastructure, contractual rights, brands, and relationships), while anonymously tracking resource utilization and user engagement and ensuring end-to-end enforcement of privacy, regulatory compliance, enterprise policies, and commercial terms through time and across organizations and regulatory jurisdictions. This enables the multi-sided network revenue model of consumer online advertising and simple e-commerce to be extended to virtually the entire economy, while avoiding the data governance, privacy and anti-trust conflicts that have plagued the Web 2.0 ecosystem.