|Page Name:||Marketing Scheme|
The Silktorrent project must never depend on the ability to convince anybody. Not even other software developers. Convincing is plan B, application in one's own projects is the plan A.
For the majority of people the Silktorrent applications as robustness oriented applications will never be able to compete with applications that are optimized for end user comfort. There does not exist even a goal to make everybody use Silktorrent. The marketing scheme is that a small number of security conscious people adopt the Silktorrent and keep their systems working with Silktorrent, offering continuous testing as a side effect. When the traditional Internet becomes unusable to other types of audience, the members of those other types of audience can buy consultancy services from the security conscious people and the security conscious people install the Silktorrent based systems to their clients and train their clients to use the Silktorrent based systems.
Tier 1 Early Adopters are Consultants
Tier 1 Early Adopters are freelancers, who try out release candidates and use the Silktorrent as a dependency for their own projects. The general release policy is that only technically tested Silktorrent versions are published, but the Tier 1 Early Adopters do the validation and acceptance testing. There exists a propaganda leaflet that targets the Tier 1 Early Adopters.
Tier 2 Early Adopters are End Users
Tier 2 Early Adopters are various parties that are expected to act during a disaster. War is also a disaster. The Tier 2 Early Adopters are the ones, who distribute the Silktorrent applications to the general population that finds the Silktorrent applications to be uncompetitive during the time, when the traditional data networks offer the comfort-optimized services like Skype, Facebook, YouTube, Twitter, classical web pages, etc. As classical businesses do not care to prepare themselves for such "hypothetical" and "irrelevant", "theoretical", scenarios as area-wide cyber attacks or war, lack of ability to communicate with business partners, it's better to exclude all classical businesses from the Tier 2 Early Adopters. The super-mafia financed institutions consist of mostly uninnovative bureaucrats, so the typical rescue teams and medical services will be furnished with Silktorrent applications only to the extent that there exist personal contacts between Tier 1 Early Adopters and people, who happened to work at the super-mafia financed institutions. The main target audience to be included to the Tier 2 Early Adopters is the various volunteers, voluntary firefighters, voluntary civil defense groups.
The Estonian Defense League Cyber Unit is basically, like all of the Estonian Defense League, super-mafia financed hierarchical organization that is officially a sub-branch of the Estonian super-mafia security department, the Estonian Ministry of Defense. It is OK, even encouraged, for the Estonian Defense League Cyber Unit people to have Silktorrent applications, if those can be offered to them through some trusted personal contacts, without interacting with the nasty super-mafia hierarchy directly, but offering Silktorrent applications to them is probably more trouble than it's worth. It is perfectly OK, if only the more innovative people at the civil society have the Silktorrent at their disposal. The rest will probably have to just drag along at their own pace. The Tier 2 Early Adopters are expected to get only those versions of the Silktorrent that the Tier 1 Early Adopters have been using for at least 1 year without finding any major flaws. The Tier 2 Early Adopters are expected to receive Silktorrent updates about once in 3 years.
Propaganda for Privacy
In addition to psychology based ignorance of IT-security issues, for example, the ignorance of speech recording malware in mobile phones, people, who do not have any technical IT background (non-technical IT personnel examples include user support and cabling builders) tend to think of their living environment as something that does not depend on IT that much or they believe that the electronic equipment that is not connected to the internet and the totally non-electronic equipment, for example, coffee cups, chairs, milk, bread, apples, are not really effected by IT-security. The key thing to explain is, how the availability and properties of the non-electronic daily consumables depends on IT-security.
For example, if the electronics of milking robots are destroyed by an EMP, then the only way to get all of the cows milked is to do it with some old milking machines that do not have any electronics in them or to milk the cows even more manually. People, who want to drink milk and get their milk from local grocery stores, need IT-security at the milking robot side, at the dairy, where milk packaging robots reside, at the computers of those people, who plan the logistics of the milk gathering, at the computers of the grocery store officials, who order the milk from the dairies. The same with other food products, including bread. If the electronics of all tractors is destroyed with an EMP, there is no equipment for gathering the crops from the fields and the crops need to be harvested at a specific, relatively short, time period. If the control systems of ships, trains, trucks, plains are attacked with malware, there's nothing to use for bringing food from other regions of the planet.
Of course, no rational explanation beats psychology, so one may tell the dinosaurs about the asteroid all one wants and still change nothing. It is important that one self has something better than drugs or suicide pills against the meteor or its consequences.