In a world of deepfakes, data brokers, and eroding digital trust, the Filedot Model is more than an alternative architecture. It is a manifesto for rehumanizing the digital sphere—one dot, one file, one self at a time.
A platform cannot ban you if your identity is a file you control. It can refuse to accept your dot’s claims, but it cannot delete your identity. You simply take your dot to another platform. This transforms content moderation from an existential threat (deplatforming) into a contractual disagreement (rejection of a specific transaction). VI. Criticisms and Open Problems No model is without challenges. Critics of the Filedot Model raise three substantial objections.
Authentication becomes possession of a dot and proof of control over its private key. No more “forgot password” flows. No more credential stuffing. Your dot’s private key (stored in a hardware wallet or a secure enclave) signs challenges from services. This is public-key infrastructure reborn, but with the crucial difference that the public key is derived from the dot’s content, not from a certificate authority’s ledger. filedot model
Today, individuals bear the risks of data breaches but capture little value from their data. Under Filedot, you could sell access to a dot (e.g., your shopping preferences) via a smart contract, without losing custody. The buyer receives a verifiable copy; you retain the master. Data becomes a tradeable asset, not a leaky byproduct.
Consider a concrete example: a digital driver’s license under the Filedot Model. The DMV creates a file containing your name, birthdate, license class, and a cryptographic signature from the state’s private key. This file is your dot. You store it on your phone. When a police officer asks for your license, you transmit the file via NFC or a QR code. The officer’s device verifies the signature against the state’s public key (which is published on a blockchain or a static website) and reads the claims. No database lookup, no centralized verification service, no privacy leak beyond what the file contains. You remain in possession of the only copy of your license—not the DMV. The model would be trivial if each dot were an isolated monad. Its power emerges in the relationships between dots. A dot can reference another dot by its hash, creating a directed edge. For example, a purchase receipt dot can reference a product dot, which references a manufacturer dot. A credential dot (e.g., “university degree”) can reference an issuer dot (the university) and a subject dot (the graduate). In a world of deepfakes, data brokers, and
This design choice is revolutionary in its conservatism. It returns to the early internet’s ethos of end-to-end principle and dumb networks. A dot file is like a physical letter: sealed, signed, and self-contained. You can store it on a USB stick, email it as an attachment, or host it on a personal web server. The network becomes merely a transport layer, not an identity layer.
We are accustomed to thinking of data as weightless, ephemeral, and subject to platform whims. The Filedot Model asks us to imagine the opposite: data as solid, as portable, as legally and cryptographically equivalent to the self it represents. Whether it will succeed depends not on technical elegance alone but on whether individuals and institutions are willing to trade the convenience of centralized services for the sovereignty of the dot. It can refuse to accept your dot’s claims,
First, . If losing your dot file means losing your identity, the model imposes unforgiving self-custody burdens. Proponents counter with social recovery mechanisms and hardware vaults, but usability remains a hurdle.