Skip to content

Commit

Permalink
fix: Put Why Choose first on the list of questions
Browse files Browse the repository at this point in the history
  • Loading branch information
okdistribute committed Oct 20, 2020
1 parent 46eea08 commit f588415
Show file tree
Hide file tree
Showing 16 changed files with 57 additions and 53 deletions.
10 changes: 5 additions & 5 deletions patterns/age-indicator.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
## Why Choose age indicator?

Age indicator shows you information about network participants without taking
up too much space.

## The Design Problem

In a local-first world, peers may or may not be connected to the network at all
Expand All @@ -15,11 +20,6 @@ Trello’s card ageing

![https://s3-us-west-2.amazonaws.com/secure.notion-static.com/0137b60b-4db4-4b2b-aaf9-f114d4a26aa5/Untitled.png](https://s3-us-west-2.amazonaws.com/secure.notion-static.com/0137b60b-4db4-4b2b-aaf9-f114d4a26aa5/Untitled.png)

## Why Choose age indicator?

Age indicator shows you information about network participants without taking
up too much space.

## Potential Problems with age indicator

When there are multiple dimensions of aging—is it when a peer was last seen? or
Expand Down
10 changes: 5 additions & 5 deletions patterns/cautious-optimism.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
## Why Choose Cautious Optimism?

Trust is more fine-grained than a rigid protocol presumes; it can be
revoked at any moment, and is tied to human behavior.

## The Design Problem

In a centralized world, the trust model is simple: all participants have to
Expand Down Expand Up @@ -32,11 +37,6 @@ a code-of-conduct-abiding network participant.
- Secure Scuttlebutt
- Mastodon

## Why Choose Cautious Optimism?

Trust is more fine-grained than a rigid protocol presumes sometimes; it can be
revoked at any moment, and is usually tied to actual behavior.

## Best Practice: How to Implement Cautious Optimism

- Make sure that the terms and conditions of network participation are made
Expand Down
15 changes: 8 additions & 7 deletions patterns/content-curators.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
## Why Choose Content Curators?

When users need more flexibility and control over their feeds.

## The Design Problem

In a decentralized social network, people cannot (or should not) rely on centralized algorithms to view their feed. Protocols struggle to decide between
Expand All @@ -14,21 +18,18 @@ Media and news organizations are the curators of content.
- Are.na
- Mastodon 'Who's on this instance'

## Why Choose Content Curators?

More flexibility and control over feeds.

## Best Practices: How to Implement Content Curators?
- Only place trusted and verified third parties in the role of content curators.
- Allow users to access more interesting and relevant contents and therefore fosters a stronger and meaningful relationship with their network.
- Allow users to access more interesting and relevant content and therefore fosters a stronger and meaningful relationship with their network.


## Potential Problems with Content Curators?
- Keep in mind that not all media and news organisations are necessarily good at curating contents. In addition, the majority of them might tend to have some certain biases and or positions. This means the quality and credibility of a content is crowdsourced and explicitly based on users' choice of curators.
- The level of contents relevance might vary depends on different platforms.
- Keep in mind that not all media and news organisations are necessarily good at curating content. In addition, the majority of them might tend to have some certain biases and or positions. This means the quality and credibility of a content is crowdsourced and explicitly based on users' choice of curators.
- The level of content relevance might vary depends on different platforms.

## The Take-Away

This is more of an opt-in option rather than a catch-all solution for curating contents.
This is more of an opt-in option rather than a catch-all solution for curating content.

## References and Where to Learn More
8 changes: 4 additions & 4 deletions patterns/discovery-pub.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
## Why Choose Discovery Pub?

When your application is heavily enriched by the ability to search and discover new content (e.g., social networks).

## The Design Problem

In a centralized world, search and discovery within a service doesn't involve too many difficult decisions on the part of the user. When typing into a search box, the user trusts that the service is giving them the results they've asked for. This usually involves algorithms to display information in a way that makes sense to the user — including filtering, ranking, and selecting information intelligently. For most services, user has little-to-no choice on how this search and discovery is executed on their behalf, and if controls are offered, these options are usually buried within profile and platform settings.
Expand All @@ -23,10 +27,6 @@ SSB pubs

Mastodon Search

## Why Choose ... ?

When your application is heavily enriched by the ability to search and discover new content (e.g., social networks).

## Best Practice: How to Implement ...

Allow users and services to create and share 'block' and 'allow' lists of instances, peers, or keywords that they do not want to include in search. First-time users should be able to adopt already well-known filters for abusive, fraudulent, or spam content. This is critical to prevent the 'Welcome to Hell' problem, where first-time users see a bombardment of irrelevant or harmful content.
Expand Down
8 changes: 4 additions & 4 deletions patterns/host-roulette.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
## Why Choose Host Roulette ?

When you want to steer the network into further distribution

## The Design Problem

In a centralized world, onboarding users to a service doesn't involve too many
Expand Down Expand Up @@ -32,10 +36,6 @@ provider over another, randomly assign new users to a hosting provider.

Nextcloud

## Why Choose Host Roulette ?

- When you want to steer the network into further distribution

## Best Practice: How to Implement Host Roulette

- Make sure you indicate that the host was randomly chosen, e.g. write "choose
Expand Down
4 changes: 2 additions & 2 deletions patterns/network-health-indicator.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
## Why Choose Network Heath Indicator?

## The Design Problem

## The Design Solution

### Examples

## Why Choose Network Heath Indicator?

## Best Practice: How to Implement Network Health Indicator

## Potential Problems with Network Health Indicator
Expand Down
4 changes: 2 additions & 2 deletions patterns/paper-keys.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
## Why Choose Paper Keys?

## The Design Problem

## The Design Solution

### Examples

## Why Choose Paper Keys?

## Best Practice: How to Implement Paper Keys

## Potential Problems with Paper Keys
Expand Down
4 changes: 2 additions & 2 deletions patterns/prioritize-backup.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
## Why Choose Prioritize Backup?

## The Design Problem

## The Design Solution

### Examples

## Why Choose Prioritize Backup?

## Best Practice: How to Implement Prioritize Backup

## Potential Problems with Prioritize Backup
Expand Down
4 changes: 2 additions & 2 deletions patterns/protocol-agnosticism.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
## Why Choose Protocol Agnosticism?

## The Design Problem

## The Design Solution

### Examples

## Why Choose Protocol Agnosticism?

## Best Practice: How to Implement Protocol Agnosticism

## Potential Problems with Protocol Agnosticism
Expand Down
6 changes: 4 additions & 2 deletions patterns/social-radius-slider.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
## Why Choose Social Radius Slider?

To more accurately reflect real-world social interactions and group dynamics.

## The Design Problem

Social networks are mentally taxing. Sometimes news from around the world is inspiring, other times it is just depressing. Sometimes you want to hear from
Expand All @@ -10,8 +14,6 @@ Use a radius to indicate how "big" your circle is for today.

### Examples

## Why Choose Social Radius Slider?

## Best Practice: How to Implement Social Radius Slider

## Potential Problems with Social Radius Slider
Expand Down
6 changes: 4 additions & 2 deletions patterns/standards-marker.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,15 @@
## Why Choose Standards Marker?

## The Design Problem

## The Design Solution

### Examples

- .cobox
- .mapeosettings
- .docx vs .pdf

## Why Choose Standards Marker?

## Best Practice: How to Implement Standards Marker

## Potential Problems with Standards Marker
Expand Down
4 changes: 2 additions & 2 deletions patterns/time-machine.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
## Why Choose Time Machine?

## The Design Problem

## The Design Solution

### Examples

## Why Choose Time Machine?

## Best Practice: How to Implement Time Machine

## Potential Problems with Time Machine
Expand Down
9 changes: 4 additions & 5 deletions patterns/tombstones.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
## Why Choose Tombstones?

* When you want to protect the safety and privacy of user generated content.

## The Design Problem

User-generated content may be available forever on some Devices; and thus, could stay on the network somewhere forever. This is more likely the longer this content is online, as crawlers will begin to find it, copy it, and syncronize it to other people.
Expand All @@ -12,18 +16,13 @@ We can encourage deletion across the network quite well by using Tombstones.

### Examples

* Mapeo

## How to best implement

* When a message is deleted, show users if the content is still available somewhere on the network (e.g., it could be that some client is not respecting the message).
* Some clients may not respect tombstones, give users visibility into this and allow blocking replication with those clients.
* Allow 'reversing' tombstones, that is, a tombstone should be a boolean value that can be turned off or on in the future.

## Why Choose Tombstones?

* When you want to protect the safety and privacy of users.

## Potential Problems with Tombstones

* It won't always be clear that content won't be deleted immediately from the network. It can take time before the tombstone message is sent to other devices.
Expand Down
10 changes: 5 additions & 5 deletions patterns/user-identity.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
## Why Choose Full Username?

- When you want to enable users to freely move between providers and usernames
with ease

## The Design Problem

In a centralized world, it's assumed that other users are mediated through the
Expand Down Expand Up @@ -42,11 +47,6 @@ Various P2P Social Profile Systems (Cabal, SSB, Textile, 3box)

Matrix (p2p beta)

## Why Choose ... ?

- When you want to enable users to freely move between providers and usernames
with ease

## Best Practice: How to Implement ...

- Users need to have strict control over when and where their id is shared.
Expand Down
4 changes: 2 additions & 2 deletions patterns/village-or-city.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
## Why Choose Village or City?

## The Design Problem

## The Design Solution

### Examples

## Why Choose Village or City?

## Best Practice: How to Implement Village or City

## Potential Problems with Village or City
Expand Down
4 changes: 2 additions & 2 deletions patterns/visual-hash.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,5 @@
## Why Choose Visual Hash?

## The Design Problem

## The Design Solution
Expand All @@ -6,8 +8,6 @@

- https://github.blog/2013-08-14-identicons/

## Why Choose Visual Hash?

## Best Practice: How to Implement Visual Hash

## Potential Problems with Visual Hash
Expand Down

0 comments on commit f588415

Please sign in to comment.