Artifact Content
Not logged in

Artifact 263ace6509d9e7db87fabe92067b0bf6b20c25d5:

Wiki page [Marketing Scheme] by martin_vahi on 2016-11-17 09:36:14.
D 2016-11-17T09:36:14.351
L Marketing\sScheme
P 4c56890342ff6d16802fbcd013ebdd372df62f0d
U martin_vahi
W 5452
<p><br>
</p>

<p>For the majority of people the <b>Silktorrent applications as robustness
oriented applications will never be able to compete with applications that are
optimized for end user comfort</b>. There does not exist even a goal to make
everybody use Silktorrent. The marketing scheme is that a small number of
security conscious people adopt the Silktorrent and keep their systems working
with Silktorrent, offering continuous testing as a side effect. When the
traditional Internet becomes unusable to other types of audience, the members
of those other types of audience can buy consultancy services from the security
conscious people and the&nbsp;security conscious people install the Silktorrent
based systems to their clients and train their clients to use the Silktorrent
based systems.</p>

<p><br>
</p>

<h1>Tier 1 Early Adopters are Consultants</h1>

<p>Tier 1 Early Adopters are freelancers, who try out release candidates and
use the Silktorrent as a dependency for their own projects. The general release
policy is that only technically tested Silktorrent versions are published, but
the Tier 1 Early Adopters do the validation and acceptance testing. There
exists a
<a href="./raw/work_in_progress/doc/propaganda/2016_08_20_Silktorrent_propaganda_t1.pdf?name=c93ff3c489cc2356e4925c49d4999fe245b0b21d">propaganda
leaflet</a> that targets the Tier 1 Early Adopters.</p>

<p><br>
</p>

<h1>Tier 2 Early Adopters are End Users</h1>

<p>Tier 2 Early Adopters are various parties that are expected to act during a
disaster. War is also a disaster. The Tier 2 Early Adopters are the ones, who
distribute the Silktorrent applications to the general population that finds
the Silktorrent applications to be uncompetitive during the time, when the
traditional data networks offer the comfort-optimized services like Skype,
Facebook, YouTube, Twitter, classical web pages, etc. &nbsp;As classical
businesses do not care to prepare themselves for such "hypothetical" and
"irrelevant", "theoretical", scenarios as area-wide cyber attacks or war, lack
of ability to communicate with business partners, it's better to exclude all
classical businesses from the Tier 2 Early Adopters. The super-mafia financed
institutions consist of mostly uninnovative bureaucrats, so the typical rescue
teams and medical services will be furnished with Silktorrent applications only
to the extent that there exist personal contacts between Tier 1 Early Adopters
and people, who happened to work at the super-mafia financed institutions. The
main target audience to be included to the Tier 2 Early Adopters is the various
volunteers, voluntary firefighters, voluntary civil defense groups.</p>

<p><br>
</p>

<p>The Estonian Defense League Cyber Unit is basically, like all of the
Estonian Defense League, super-mafia financed hierarchical organization that is
officially a sub-branch of the Estonian super-mafia security department, the
Estonian Ministry of Defense. It is OK, even encouraged, for the&nbsp;Estonian
Defense League Cyber Unit people to have Silktorrent applications, if those can
be offered to them through some trusted personal contacts, without interacting
with the nasty super-mafia hierarchy directly, but offering Silktorrent
applications to them is probably more trouble than it's worth. It is perfectly
OK, if only the more innovative people at the civil society have the
Silktorrent at their disposal. The rest will probably have to just drag along
at their own pace. <b>The Tier 2 Early Adopters are expected to get only those
versions of the Silktorrent that the Tier 1 Early Adopters have been using for
at least 1 year without finding any major flaws. The Tier 2 Early Adopters are
expected to receive Silktorrent updates about once in 3 years.</b></p>

<p><br>
</p>

<p><br>
</p>

<h1>Propaganda for Privacy</h1>

<p>In addition to psychology based ignorance of IT-security issues, for
example, the ignorance of speech recording malware in mobile phones, people,
who do not have any technical IT background <i>(non-technical IT personnel
examples include user support and cabling builders)</i>&nbsp;tend to think of
their living environment as something that does not depend on IT that much or
they believe that the electronic &nbsp;equipment that is not connected to the
internet and the totally non-electronic equipment, for example, coffee cups,
chairs, milk, bread, apples, are not really effected by IT-security. <b>The key
thing to explain is, how the availability and properties of the non-electronic
daily consumables depends on IT-security.&nbsp;</b></p>

<p>For example, if the electronics of milking robots are destroyed by an EMP,
then the only way to get all of the cows milked is to do it with some old
milking machines that do not have any electronics in them or to milk the cows
even more manually. People, who want to drink milk and get their milk from
local grocery stores, need IT-security at the milking robot side, at the dairy,
where milk packaging robots reside, at the computers of those people, who plan
the logistics of the milk gathering, at the computers of the grocery store
officials, who order the milk from the dairies. The same with other food
products, including bread. If the electronics of all tractors is destroyed with
an EMP, there is no equipment for gathering the crops from the fields and the
crops need to be harvested at a specific, relatively short, time period.<br>
</p>

<p><br>
</p>

Z a8cc813eda037a6fe5d52d2fc5b4a5fa