If only I owned my data: Architecting decentralized data

Data centric and owned data shift in architecture

One of must see videos about shift in architectures that we all need to do

Based on the transcript of the video titled “Rediscovering the Essence: Decentralizing Identity, Applications, and Data” from the Strange Loop conference, here’s an article that encapsulates the key points and insights:


Title: Embracing Decentralization: A New Paradigm for Identity, Applications, and Data

In an era where digital technology is rapidly evolving, the concept of decentralization is gaining momentum, particularly in the realms of identity, applications, and data. The video from the Strange Loop conference delves into this topic, offering a comprehensive overview of how decentralization can reshape our digital interactions.

The Essence of Simplification and Decentralization

The video begins with an analogy to Pablo Picasso’s artistic journey of simplifying a bull’s image. This process of distillation to essential components is paralleled in the realm of technology, particularly in the design philosophy of companies like Apple. The core idea is that simplification requires a deep understanding of the subject, a principle that is crucial in the context of decentralization.

Decentralizing Identity

A significant portion of the discussion focuses on the decentralization of identity. The current digital landscape often binds users to numerous email-password combinations, posing security risks and complicating user experiences. The proposed shift involves giving users control over their identity by allowing them to select trusted identity providers, whether hardware-based, software-based, federated, or decentralized. This approach would enable users to prove their identity or attributes (like age) without revealing sensitive information, thereby enhancing privacy and security.

Transforming Application Services

The video also explores the decentralization of application services. By decoupling and decentralizing applications, users can gain control over which applications they use and how they use them. This model ensures that users’ data, like photos or messages, remains with them, irrespective of the applications they choose to use. It promotes a user-centric approach where technology serves the user, not the other way around.

Rethinking Data Storage and Access

Another critical aspect discussed is the decentralization of data storage and access. Users should have control over where their data is stored, who has access to it, and the extent of that access. This approach includes the concept of machine learning personalization, where users can leverage their data for personalization without compromising privacy. The idea is to make data portable and controllable by the user, ensuring that they can change storage options or access permissions as needed.

Implementing Standards and Protocols

For decentralization to be effective, the implementation of standards and protocols is essential. The video highlights various initiatives and technologies, such as W3C’s DID (Decentralized Identifiers), Solid and PODs by Tim Berners-Lee, schema.org for industry standards, and CRDTs (Conflict-Free Replicated Data Types) for privacy-first data structures. These technologies and standards pave the way for interoperable, decentralized systems.

Practical Steps Towards Decentralization

The video concludes with practical steps organizations can take towards decentralization. These include adopting federated identity services, making applications interoperable using standards, ensuring data portability, and rethinking access control to be more user-centric. Additionally, it emphasizes the importance of GDPR compliance and user consultation in designing data storage and access systems.

Conclusion: A User-Centric Future

The overarching message of the video is a call to reset the industry with a user-centric foundation. By placing users at the center of identity, applications, and data, technology can better serve communities, organizations, and individuals. This shift towards a human-centric architectural approach promises a future where technology fundamentally serves humanity, fostering a more secure, private, and user-empowered digital world.


Write a comment
No comments yet.