New Blueprint for Humanity

I.T. Solution

Why this is needed:

Corporations monopolize industry and technology. Certain corporations have been able to buy or steal any new innovations, either suppressing them or putting them on the market before other companies could compete. Some of these companies were set up by agencies such as the CIA, DARPA and NSA, to collect private/personal data for spying and profiling purposes by offering products and services under the guise of free trendy devices and software to connect us all together. All of these companies have built back doors into all software programs and devices available on the market today. The industrial policy of planned obsolescence forces consumers to replace malfunctioning products frequently, while the lack of standard parts makes repairs difficult or impossible. Indeed, some companies bind consumers to contracts that deny buyers the right to repair their devices. The internet has been flooded with advertising as well as scams and various methods of harvesting data. Further, the Dark Web is primarily used for the sale of drugs, child pornography and other illegal products and services and thus contributes to many crimes.

Solution:

  1. Repurpose the corporations and agency companies that have controlled technology and the internet, such as Microsoft, Google, IBM, Facebook, Twitter, etc. and split them into smaller enterprises.
  2. Ill-gotten gains of the repurposed companies to fund the restructuring and also new startups run by innovators.
  3. Require all computers, phones and other devices to be built without back doors in the hardware, firmware and software; without tracking, spying, profiling and other data harvesting capability as well as without advertising.
  4. Anti-virus software must be installed on all computerized devices sold.
  5. Make data mining, profiling, tracking and spying illegal, as well as the sale of personal data.
  6. Provide an option for users to share personal information, if they choose to, by stating clearly and explicitly that they wish to share personal information, where they wish to share it, with whom, and which specific information is to be shared.
  7. Provide an option for users to explicitly accept or remove advertising.
  8. Ensure all emails and ISP’s (Internet Service Providers) are secure and free from hacking, spying, data mining, malware and other malicious activity.
  9. Remove all child pornography from the Dark Web and internet, as well as all sites designed for the sale of illegal goods and/or services, including but not limited to drugs, bio-weapons and adrenochrome.
  10. Create a team that focuses totally against hackers, other cheats and on monitoring and cleaning of the Dark Web, working with the Cyber Agency, Government, Military, and other agencies as appropriate.
    • a) Note that the Dark Web cannot be deleted without interfering with the privacy of individuals. However, it can be monitored and illegal content removed in order to stop illegal activity.
  11. End censorship of the public.
  12. Standardize all aspects of computing, including a unified operating system that may be offered in three modes: minimal, standard and pro, at low, medium and higher price respectively, with equal quality but more features on the higher-grade items. Different industries that make partially computerized products (cars, home appliances, elevators, sensors). Build standard systems appropriate to the type of device they manufacture, such that all similar devices have standard parts.
  13. Companies must standardize parts, sold in a standard format, so that all accessories can be used on all brands and items of the same kind, each type of device having the same power adapter, ports, sizes, settings, etc. for each of the high, medium and low-priced models.
  14. Products must be easy to repair and buyers must have the right to repair them. All parts must be standard and easily accessible.
  15. Products must be made with materials that are not harmful to users, and that can be safely recycled or destroyed at the end of useful life rather than dumped in landfills.
  16. Clarity about how long devices and software will last is required.
  17. Any products that, by their nature, have transparent obsolescence―that is, a known and clearly labeled useful lifespan, after which they may not be supported or may break down―must be replaced by the manufacturer if they break down before that end-of-use date.
  18. End all subscription-only programs for products such as Microsoft software, PDF subscriptions, advanced email subscriptions, etc. Allow consumers to buy a product up front with no extra add-ons, forced support costs or other costs not directly related to the product.
  19. Products may be sold with an option to pay in installments, so users can finance bigger purchases without resorting to a bank loan or use of a credit card.
  20. Replacement cost before failure is built into product costs and options for support can be built- in or purchased.
  21. Re-assess encryption methods and digital security certificates. Enable end-to-end encryption with the use of private end user keys.

Who gains:

The public gains by less waste of money on substandard merchandise, devices that cannot be repaired and by increased useful life of products. Less waste from products, less need for landfills, less polluting of water and landscapes, all of which aids the environment. Creative individuals and businesses gain opportunity to contribute better products and services. Many of the people in the companies that formerly monopolized IT and industry retain their jobs and incomes when the corporations are restructured, and learn better ways of operating.

Who benefits:

Professionals who wish to maximize IT potential have opportunity to do so. End users enjoy a cleaner internet and safer web interactions. Children and society in general are safer when the Dark Web and illegal dealings are curtailed.