
Read Write Own: Building the Next Era of the Internet

The read-write era, also known as Web 2.0, had arrived.
Chris Dixon • Read Write Own: Building the Next Era of the Internet
Token rewards can boost the income of creators.
Chris Dixon • Read Write Own: Building the Next Era of the Internet
the media world is addicted to sequels and reboots because it’s risky to market new intellectual property. Media companies need to spend tens of millions of dollars to promote new stories. It’s safer just to recycle proven material. But what if fans really could be owners, and media companies could harness their energy to help create and evangelize
... See moreChris Dixon • Read Write Own: Building the Next Era of the Internet
Harnessing fandom is a powerful way to market new story universes without spending millions on advertising.
Chris Dixon • Read Write Own: Building the Next Era of the Internet
Collaborative storytelling combines the lessons of Wikipedia with the power of credibly neutral, low take-rate blockchain networks that reward fans with ownership over their creations. The way this works most commonly in practice is that users receive tokens in proportion to their contribution to the narrative corpus. The resulting intellectual pro
... See moreChris Dixon • Read Write Own: Building the Next Era of the Internet
More recent protocol networks enjoy no such resiliency. No credible protocol network, after thirty years of attempts, has succeeded beyond niche adoption.
Chris Dixon • Read Write Own: Building the Next Era of the Internet
Fediverse
How did open source take the world by storm? One of the main reasons the movement has been so successful is a feature of software known as composability.
Chris Dixon • Read Write Own: Building the Next Era of the Internet
All technologies have the capacity to help or harm; blockchains are no different. The question is, how can we maximize the good while minimizing the bad?
Chris Dixon • Read Write Own: Building the Next Era of the Internet
A key concept in security is the “attack surface,” which refers to all the places an attacker might find vulnerabilities.