Author: Black Sky Society
The internet was not originally built with the autonomy of its users in mind. Its roots trace back to the Advanced Research Projects Agency Network (ARPANET), a project by the U.S. DoD, created primarily as a tool for swift communication and knowledge sharing among universities and research institutions. As the internet evolved from its academic origins into a commercialized platform, user autonomy was often overlooked, leaving significant control in the hands of ISPs and major tech companies. Web3, i.e. the union of cryptocurrency with the internet, promised a more decentralized and equitable digital landscape that avoids the monopolistic and privacy-invasive practices of Web 2.0.
Yet, incessant legal obstacles, multi-million dollar hacks and the threat of pervasive surveillance have instilled skepticism about Web3’s vision of a better internet. These existential threats to crypto, combined with the challenge of compliance for protocol developers, accentuate the fact that laws and regulations are inherently local, whereas the internet is global. Consequently, designing next-generation Web architectures aiming to empower communities is a daunting task. Furthermore, building these protocols on top of Web architecture not originally designed to work with cryptocurrencies is akin to fitting a square peg into a round hole. These struggles often divert the greater Web3 community’s attention from privacy and sovereignty as essential system components.
While we could propose a Web4, Web5, or Web6 to counter these issues, we believe the root of our troubles may lie in the foundational infrastructure of the Web itself. Hence, we propose a new path to address the deeper problems of the Web as whole. Our aim is not just to rethink network technologies, but to venture into unexplored territory: the Post-Web.
Six Principles of the Post-Web
Privacy & Security: User privacy is upheld by minimizing data and metadata exposure, ensuring end-to-end security, and fine-grained personal control over information disclosure. Financial transactions must be private and shielded by default. Users can decide where, when, and to whom, their information is disclosed, while remote services handle only encrypted content without access to sensitive details, such as user location.
Local-First: Develop protocols that can be implemented locally first and connected in a bottom-up, confederated manner from the bottom up. Applications should operate offline and asynchronously when feasible, enabling access to cached content like wikis, messages, and forums, while allowing users to search and discover information on their devices, within their communities and groups as well as globally, using privacy-preserving protocols. Focus on designing robust tools effective in real-world, local contexts before considering global standards and remote services.