
We have great faith in that which has never let down human history. principle that the system carefully constructed by the ruling class eventually makes that same class dependent on a new class—the manager of a new resource. More details on this are written. Text for translation: here. Текст для перевода: ..
In addition to what has been said, it is important to critically assess the idea that a change in the social order must necessarily occur in the context of a rapid, bloody upheaval with a predetermined direction recognized by its participants. meat grinders Текст для перевода: ..
And, most importantly, it is unlikely that any specific scenario will be implemented. Society will spontaneously take different paths, and we will see signs of the realization of one scenario alongside signs of other scenarios. The very multitude of possible transition scenarios serves as indirect confirmation of its inevitability.
Table of Contents
The scenario for creating utopian communities.
Let’s start with the community. Suppose a group of people becomes enthusiastic about the idea of reconism. First of all, they will need to give up money and switch to transactions recorded in accounts. This will require the establishment of some kind of intermediary legal entity that would accept all cash earned by the reconists outside the community and record it in their accounts. It’s possible that the first reconist bank will even be created. Accordingly, all purchases made by community members will be carried out through this settlement center.
Secondly, the community will make efforts to label all items belonging to the community and establish systems for monitoring and tracking the movements of people and objects within the community. A guest will only be allowed to enter the community after registering in the system. Additionally, the community will create a system for recording all correspondence and discussions, ensuring that all members have access to the records of these minutes.
It is important to understand that the very concept of a “community” can be virtual. It can be a social network aimed at cultivating one’s own reputation. People will voluntarily share with each other the content of their phone conversations and email inboxes. They will show each other their locations, share lists of credit card transactions, make their documents—usually kept in a folder in a drawer—publicly accessible, and upload data from their car dashcams to the “cloud,” and so on.
The only thing the community won’t be able to achieve is complete control over its members outside the community. However, considering that the community is voluntary, each member could carry some sort of tracking telemetry device that collects and transmits data to the local community. OIS. Текст для перевода: ..
To people outside the community, reconists may appear to be reliable and trustworthy individuals, as the community’s rules technically prevent people from behaving dishonorably. Reconists may gain preferences when it comes to hiring, being assigned responsible tasks, or being chosen for positions of authority. The rise of reconists to power would be welcomed by others who want to see their leaders as honest and incorruptible.
Yes, there is a problem of xenophobia: “Who are these people gathering together? They must be against me.” On the other hand, when choosing between a random person and someone who has the backing of a thousand others who can vouch for them and explain why, the decision is obvious.
That is, starting with a few small communities, the process of societal reorganization will take on an avalanche-like form. It should also be noted that the information collected by the communities… OIS. , will be quite valuable; however, to gain access to it, one must become a reconist. Bribing reconists with people from outside the community in order to obtain any data from OIS. complicated by the fact that all property, valuables, and money of the community members are monitored by the community. OIS. And the one who is bribed simply won’t be able to make use of the received bribe.
To eliminate any potential suspicions of “anti-reconist” activities, members of the reconist community will voluntarily wear devices that record conversations among reconists, and, if possible, also capture images. By the way, while processing data about those with whom reconists interact, local… OIS. They will gradually gather data on the other members of society, and after reaching a certain critical mass of reconists, it will be possible to track the activity of any person on Earth. We should keep in mind that only reconists will have access to this information, and the rest of society, in order to avoid discrimination, will have to join the ranks of reconists. This example has shown that reconism can develop in an avalanche-like manner, as long as local reconist communities emerge.
Revolutionary scenario
There is, of course, a more sinister scenario in which the society of a certain country, fed up with the arbitrariness and corruption of the authorities that prohibit reconism and reconist communities, justifiably fearing reconism, rises up and initiates a reconist revolution. Yes, a revolution, with all the horrors of terror, civil war, and devastation. A revolution would be possible if the authorities artificially suppress reconist reforms in society. Firstly, the ruling class may already understand the threat posed by a fully open society just by reading this text. However, it is unlikely that reconism will be taken seriously from the moment the idea is born; more likely, the ruling class will simply observe the development of reconism in other countries, the creation of reconist communities, and draw their own, quite specific conclusions.
Banning reconism and opposing it is quite simple – it’s enough to formulate the principle of reconism as a restriction of constitutional freedoms, launch a propaganda machine against reconists as degenerates, exhibitionists, and voyeurs, and even start imprisoning activists for infringing on the constitutional freedoms of the country’s citizens. Such a state policy will drive reconists underground, leading to the formation of radical movements and terrorist groups, that is, secret communities that will, in turn, discredit the idea of reconism.
Additionally, a reconist revolution may occur as a result of a particularly strong uprising in the country, when adventurers come to power with the slogans of reconism. Just as the October Revolution did not lead to communism, a reconist revolution is unlikely to lead to reconism, as reconism itself denies phenomena such as secret collusion or illegal activities.
Okay, no one knows how things will be in the future, but it’s worth considering the mechanism of existence of a particular reconist state. In fact, the principle of operation of a reconist state will not differ much from that of a community. Visitors to the country will exchange their currency for account entries, and they will be identified and tracked whether they like it or not. Those leaving will purchase currency, and the OIS will register their departure abroad. Citizens of the reconist society won’t need passports, but they will be issued specifically for traveling abroad.
Governments of other countries will welcome reconcilers without fear, asjust in caseYou can always request a dossier on a tourist. By the way, the introduction of reconism will initially lead to the expulsion of criminal elements abroad, to places where reconism has not yet taken hold. The complete openness of information within a reconistic society seems to make the work of spies and intelligence agents easier; however, it is difficult to devise a method to bribe a reconist in such a way that they would benefit from the results of that bribery or even be able to negotiate with a spy. It will also be challenging to organize a trace-free transfer of important data in a society where codes and passwords simply do not exist. Ultimately, every move of a spy is tracked. OIS. So he won’t really be able to either “lie low” or engage in any activity.
The script through Big Brother
One could also imagine the following scenario: First, it will be implemented… OIS. — with the aim of “monitoring terrorists” or “ensuring security,” for example. In Moscow, it seems that almost everyone would agree to the widespread installation of surveillance cameras. Then, some overindulged official will annoy the crowd, and they will demand that he “turn out his pockets,” meaning he should open his accounts, report his income, and show all the video recordings of himself, beloved as he is. Or another official, accused of corruption because he has become undesirable, will lay everything bare to justify himself. A few precedents, and a law will emerge requiring government officials to “disclose” their “accounts.” This will be the beginning.
This scenario could also take a different path. The increasing centralization of databases and the growing informatization of bureaucracy will only provoke the emergence of new stories, similar to the one with WikiLeaks When data, fiercely guarded by those in power, becomes public due to bribery, hacking, or simply for ideological reasons.
In such a situation, the doctrine implying will be used more and more frequently. the presumption of disclosure of information This will lead to the devaluation of the idea of privacy for any information. Efforts to conceal information will be replaced by efforts to prevent the consequences of potential leaks.
As a result, it is precisely due to the totality of information collection systems that a significant leak will inevitably occur sooner or later. This will eliminate the need for restricted access to such systems and will subsequently allow full access to all registered individuals. After all, it is better to manage the process than to lament its uncontrollability.
Opportunistic scenario
Step by step. The society’s drive for transparency is already noticeable. Various anti-corruption laws require transparency in the finances of officials and their families. Producers print the composition of their products on labels. Parents give their children “tracking” phones. Corporate law is becoming increasingly demanding regarding transparency year after year. IPOs require companies to establish procedures that ensure greater transparency in their finances. In some countries (for example, Singapore), there is a principle that all corporate records are maintained online. In Brazil, all budget expenditures of each administrative entity are published online, and in real time. In general, projects related to transparency are emerging around the world every day.
Transparency requirements will become increasingly stringent, as unethical and criminal activities will always remain in the shadows. Thus, with greater disclosure, the “concentration” of negative aspects in still-hidden information will rise, leading to heightened demands for its revelation. Sooner or later, a stereotype will emerge in society: “closed means criminal.” This will be a turning point in public consciousness.
Relationships in the purely informational sphere are becoming increasingly transparent. There are no physical barriers preventing people from freely sharing software, videos, and music with one another. This is why GNU licenses and business strategies designed for mutual exchange, rather than copyrights, are emerging. The transparency of the IBM PC architecture practically ensured a revolution in the software available to the public.
The technological complexity and information density of the final product are constantly increasing. Appearance has long ceased to be an indicator of product quality, and to understand the difference between “cheap Chinese” and “expensive German” products, information is needed, along with reputation and user evaluations. This is especially important as the product becomes more complex. Transparency does not provide much reassurance to consumers when it comes to a grill grate. Transparency becomes crucial when discussing a programmable washing machine.
Openness is essential. This is especially important in a market that is increasingly becoming like a wiki, where even small companies can potentially produce cars in small batches, thanks to design, CNC machines, and industrial robots. A large number of new manufacturers can gain consumer trust only by being transparent and demonstrating why their seemingly “similar” products are worth more. In fact, transparency is becoming a part of the added value of a product.
Marketers, forced to respond to consumer demands for transparency, understand that vague labels like “flavoring, identical to natural” are no longer sufficient. To outshine their competitors, they must not keep “trade secrets,” but rather, be open. This is currently taking the form of organizing tours for bloggers. Sooner or later, having webcams in production facilities will become the norm, a part of the PR campaign for any serious business.
Thus, the world will build reconciling relationships even without revolutionary transformations. This will be facilitated by the wikification of the economy and, as a consequence, the growing demand for Open Source technologies (as opposed to today’s Know How) and for ensuring information exchange among producers, both to develop common standards and to win consumer favor.
The very process of “wikification” is driven not only by the availability of technological and IT infrastructure for total outsourcing of everything and anything, as well as the opportunity for freelancing for everyone, but also by economic upheavals. Each crisis, each shock in the economy increasingly shakes talented professionals loose from corporations, prompting them to work for themselves. It is becoming more common for small companies, consisting of 2 to 10 people, to compete with large, unwieldy giants in terms of price, quality, range of offerings, and service. More and more, large corporations are retaining only their core business and brand, outsourcing everything else. There is an increasing tendency for companies, when ordering services like design or accounting from external providers, to accept that information previously considered confidential may leak outside the company. Moreover, these outsourcers often end up knowing everything about several companies, frequently competitors, thus gaining significant advantages in their own business, as information is now power.
Politicians, in turn, will also need to think about their transparency; otherwise, they won’t be able to win the next elections with a income statement that looks like that of a pensioner. Small steps. Small concessions.
At the same time, the need for politicians, as administrators of public resources, will gradually decline. People will be able to to make decisions and implement them themselves, as is already happening in communities at the level of apartment buildings or garden cooperatives. The decline in the need for administrators will lead to a decrease in motivation to pay taxes. Politicians will have nothing to “cut” or “compact,” and the “struggle for seats” will become irrelevant.
After all, in any case, capitalist relations… formed long before the “capitalist revolutions.” This means that nothing prevents the formation of wiki-like relationships long before any revolutions, again.
Scenario of realizing the source of security
Here’s another scenario. It turns out that the privileges of power come not from access to information itself, but from the exclusivity of that access. Let’s explain with an example. Recently, there were mass protests in Moscow. The police began to crack down on people, especially the organizers, accusing them of “resisting law enforcement officers.” There’s no way to prove anything now. But for the next event, people will come with their cameras turned on. Moreover, they will broadcast everything online, so that if their phones are taken away, the leak cannot be covered up.
A little later, an honest driver in a dispute with those in power over who is at fault in an accident will be saved by a dashcam. Even later, when the technology becomes cheaper, data from these cameras will also be uploaded to the internet, directly to multiple public servers, making it impossible to erase evidence.
In a situation where a person constantly broadcasts all information about themselves and it is immediately stored in many places (WikiLeaks demonstrated the effectiveness of this tactic), you can’t slip them drugs, take them out to the woods, or stage a car accident.
The government will lose its power over the opposition.
The same goes for the business sector. As soon as, for example, food producers realize that complete transparency in their operations will take away the officials’ arguments for why they need to be monitored, they will immediately move all their production “behind glass.”
Crystallization scenario
Given the ongoing advancements in science and technology, it seems possible to further saturate the environment with recording devices. The prerequisites for this are clear: the constant reduction in cost and miniaturization of recording devices, the rapid development and decreasing costs of wireless communication, and the evolution of various types of virtual network structures. The next steps are:
- audio-video recorders in every publicly accessible place (elevators, stairwells, public transport, streets, etc.) with results displayed on network services accessible to an increasing number of observers;
- also the near-universal equipping of private vehicles and homes with video recorders, with a gradual increase in the sharing of this data on online services (partially protected, accessible only to certain groups, but generally trending towards broader access);
- The development of recognition technologies, where analytical methods for data accounting will increasingly be used instead of storing direct video information;
- Technologies similar to RFID, but more powerful (in terms of tracking range and software support), are becoming widely adopted. This makes it possible to track a product throughout its entire lifecycle.
- The technology of individual smart cards, tags, etc., will allow for tracking all parameters of a person – from their location and the status of their bank accounts to their health and social status in real time (as well as monitoring ownership of objects and any transactions involving them);
- Biometric technologies and video analytics, where a person can be tracked by their gait and the continuity of their trajectory.
At first, this will be attempted unilaterally (through state and corporate control), but as public outrage grows in response to the inevitable monstrous abuses in such a situation, I hope it will be possible to make the control multilateral.
Probably the last stronghold to be breached will be information about the current state of corporate accounts and financial transactions, and right at the end of the line – information about the political decisions being made at that time.
The necessity for universal access and public oversight will be directly derived from the monstrous abuses stemming from the lack of transparency in information by corporate and governmental structures. As freely accessible registrars become more widespread, such abuses will be uncovered more and more frequently, until information about them flows in a continuous, massive stream (because they exist; even now, the situation is striking, although we still have only a weak trickle).
Ultimately, this will lead to direct participation of people in decision-making — the ideal of democracy. As for the economic structure, it will likely be partly a perfectly ideal market (ideal because of complete transparency in transactions and instantaneous situational response time), and partly, to a significant extent, funds with absolutely transparent, publicly controlled distribution.
Spies and Wars
Interestingly, the principles of reconciling are primarily embodied at the intergovernmental level. All agreements aimed at ensuring mutual and collective security include provisions for inspections, unexpected overflights of territory (based on a permissive system rather than a prohibitive one), and full exchange of information regarding the movement and deployment of military units, among other things.
War is becoming less and less possible simply because the world is becoming more and more interconnected. War is now more of an unacceptable solution than an acceptable one. Look at the U.S. and Iraq. The whole world has long been involved in this conflict between the two countries. No one in the U.S. will attack China, and no one in China will attack the U.S.
Spies today, in essence, are not engaged in gathering secrets but in ensuring transparency. Spies are unnecessary in a transparent country, just as secrets are. Transparency and trust go hand in hand. Secrets are mainly needed as a trump card against potential secrets of the opponent.
WikiLeaks is not a solitary or random phenomenon, but rather the beginning, the very beginning of a new world where the presumption of secrecy will no longer be upheld. People will anticipate… leak In the Israeli army, it is immediately assumed that a captured soldier will reveal everything he knows. Therefore, a) he is allowed not to be a hero, and b) based on the expectation of non-heroism, tactics can be adjusted accordingly to remain unpredictable to the enemy.
Industrial espionage is a typical example of people’s natural attempts to eliminate the asymmetry that has been discussed here all along. Trade secrets are already a very temporary phenomenon. Anyone can instantly copy anything. This phenomenon is called “hypercompetition,” where companies have no long-term competitive advantages. In practice, all “trade secrets” protect not the company from competitors, but the management of the companies from shareholders, who, as owners, are theoretically entitled to full access to the data.
Now about the shareholders. Companies are increasingly owned by vague owners and institutional investors who also own other companies. This means that there are no thresholds for the flow of information anymore. Where two know, the pig knows too. And there is plenty of evidence for that.
And finally, who needs “disposable” spies? Espionage is impossible in an open society. How can one imagine the infiltration of a foreign agent into such a society? How can they create a “legend” for themselves when, in an open society, it’s not documents that define who you are, but the history of tracking you from the moment of your birth? How can one envision their covert activities, and how can one imagine that they can pass on information to someone without being noticed? This is a crime, and criminals are isolated.
It turns out that complete openness within society makes it completely closed off to outside intelligence. Pretty cool, right?