A short read on the topic's time range, peak episode, and strongest associations. Use it as the quick orientation before drilling into examples.
information flow control appears in 11 chunks across 9 episodes, from 2024-04-01 to 2026-03-23.
Its densest episode is Bits and Bobs 4/22/24 (2024-04-22), with 2 observations on this topic.
Semantically it travels with private cloud enclave, massive amount, and data flow, while by chunk count it sits between hyper era and left behind; its yearly rank moved from #62 in 2024 to #166 in 2026.
Over time
?
Raw mentions over time. Use this to see absolute attention, not relative rank among all topics.
Range2024-04-01 to 2026-03-23Mean1.2 per episodePeak2 on 2024-04-22
Observations
?
The primary evidence view for this topic. Sort it chronologically when you want concrete examples behind the larger pattern.
Showing 11 observations sorted from latest to earliest.
The emergent "game" in organizations is inescapable.
As the organization scales, it must emerge.
Things you do to squash it (e.g. make the information flows more legible to leadership) just change the meta-game and cause the dysfunction to squish out elsewhere.
In some cases, that's worse: the kayfa
A key observation: 'The distance between … "the world outside and the pictures in our heads" afforded vast power to those who managed information flows.'
Our modern society is increasingly defined by the growing gap between on-the-ground person-to-person reality and the distorted reality presented t
The information flow rate in a conversation is tied to the human brain's ability to produce and consume speech.
You can think of this as the information per unit time, the clock speed.
Some people are incrementally better or worse at it, but all humans are in the same basic ballpark.
I asked o1 to e
...latonic ideal of privacy.
"My data is used in line with my interest and intent"
Information Flow Control is an applied math framework that's been around for 50 or so years.
It allows making formal statements about the confidentiality and integrity of inf...
...data crossing origins rare and scary, which leads to centralization.
Tools like Information Flow Control, if applied in clever ways, could allow common and safe data crossing origins.
But it would require all data in the system to be tagged, and for the ...
Information Flow Control can be used as an ingredient to establish a different set of laws of physics.
Confidential compute and private cloud enclaves can be used to extend t...
... territory are not permitted because there are small bits of illegal territory.
Information Flow Control allows applying it more fine-grained, so there is more that can be permitted without including any illegal territory.
A huge amount more possibility ...
Tools like Information Flow Control have existed for decades.
They allow you to make formal statements about the confidentiality and integrity of a composed system.
Part of the challeng...
Adversarial collaborations will share the bare minimum.
Adversarial collaborations happen when the two collaborators don't trust each other.
They share the bare minimum, just to be safe.
This creates a very thin thread of information flow.
This makes it unlikely to have unexpected downside…
… but al
... has different laws of physics from other technical systems.
It uses tools like information flow control, remote attestation, confidential computing, and good old fashioned cryptography to establish these laws of physics.
It will start off having decentr...