Unless they’ve been thinking deeply about the nature of the multi-polar traps of our societal system, the systematic ways in which incentives align us towards the exact self-interested and relationally fragmented world we now inhabit, it’s hard to explain to folks the ramifications of the protocols behind IdentiKey. I’ve been working on this problem for a long time, over multiple iterations and contexts. In 2008, while writing email encryption software for PGP Corp, I learned about the P2P us...