What will a boycott of the national currency give us?

date: "2022-10-16"


categories:

  • "blockchain"
  • "cryptocurrency"
  • "democracy"
  • "economics"

When India was under British rule, Gandhi started a movement to quit British goods and use Swadeshi products to help the country's people become self-sufficient. The movement aided in breaking free from British control and achieving independence.

Things are not much different today. Today we are in the clutches of big corporations and banks.

Let's check out what gonna change if we quit our national currency and implement shivarthu protocol.

Also, take a look at the various governance issues here:

Tyranny of the Majority, Minority, Representatives, Shareholders and Democratic trilemma

No more debt economy
Banks transfer wealth from people to capitalists by issuing debt or printing money. e.g. In India, Adani group has a debt of ₹2.2 trillion, which is near to the GDP of many big states in India. Many times, debt is issued for economic reasons that are detrimental to society. For example, the Adani group's primary source of income is fossil fuel, which contributes to climate change and pollution.

UN: 3.3 Billion People – almost half of humanity – Live in Countries Spending More on Debt Service Than Education, Health. The report revealed that Public debt has also spiked more than five-fold since 2000. https://unctad.org/publication/world-of-debt

Yard-sale Model

Here is simulation of Yard-sale model that explains why do super rich people exist in a society?

https://pudding.cool/2022/12/yard-sale/

UBI and decreasing income inequality
Shivarthu governance may charge 1% - 20% of taxes per year of the total market cap. About 1%- 5% of taxes can be used to provide universal income.
Here is a simulation where UBI will decrease the wealth inequality.

https://github.com/amiyatulu/randomised_tax_collect_ubi/blob/main/tax_collection_ubi.py
Calculation of the required market capitalization for a $125 (₹10,000) UBI per month.

population = 45_429_399
print(f"{population:_}") # Odisha population 45_429_399
# If each person get ₹10_000 per month as UBI, which means approx. $125
total_money_needed_per_year = 45_429_399 * 125 * 12
print(f"{total_money_needed_per_year:_}") # 68_144_098_500
# If you tax 1% per year total market cap needed.
total_market_cap_needed = total_money_needed_per_year * 100
print(f"{total_market_cap_needed:_}") # 6_814_409_850_000
market_cap_of_bitcoin = 369_910_000_000
print(f"{market_cap_of_bitcoin:_}") # 369_910_000_000
# 2021 estimates show there are 64 million active wallets . A minuscule .01% of Bitcoin holders control nearly a third of the supply
ratio = total_market_cap_needed / market_cap_of_bitcoin
print(ratio) # 18.42 times 

Though the example is given for a single currency, in the real world, we would have thousands or even lakhs of coins with many different supply chains. With each supply chain, one can earn at least $1-10 as UBI, resulting in a total of $100, $500, or even more per month.

Implications of a deflationary currency

You will spend less and hold money since deflationary currency increases in value over time. Natural resource depletion and environmental pollution are two drawbacks of consumerism. The consumer society is not sustainable in its current state. More than 70% of Earth's natural resources are currently being overused.

It appears that businesses are more focused on generating new demands than filling old ones. They frequently prey on our vanity and insecurities during this process. "You will feel better about yourself if you get this" "Purchase this and people will respect you.", "Buy this and you will succeed". These are a few of the messages that sellers try to get across to us so that we will buy things we don't really need.

But many economists criticize deflationary currency as it will slow down the economy and bring unemployed, hence poverty. Yes, it's true only when wealth is concentrated in a few hands, like in the current scenario, where 1% holds 90% of the wealth.

If income is allocated fairly, as in the Shivarthu protocol, your job—the one that uses the most natural resources possible and hence brings the greatest negative impact on society becomes unnecessary.

With the current advancement of technology, there is hardly any job left where automation can't be used.

No to Bullshit Jobs

A bullshit job, as defined by David Graeber, was a concept coined by the late anthropologist and author in his book "Bullshit Jobs: A Theory." Graeber describes a bullshit job as a type of employment that is essentially meaningless, unfulfilling, or unnecessary, yet it exists within a system that assigns it a high societal value and rewards it with a decent salary.

According to Graeber, bullshit jobs are often characterized by the following traits:

  1. Lack of meaningful impact: These jobs do not contribute significantly to the well-being or betterment of society. They are often seen as pointless or even counterproductive.

  2. Busywork and bureaucracy: Employees in bullshit jobs often find themselves engaged in excessive paperwork, pointless meetings, or other tasks that do not require their skills or expertise.

  3. Low autonomy: Workers in such jobs have little control over their tasks or decision-making processes. They are often subject to micromanagement and strict rules and regulations.

  4. Lack of productivity measurement: Bullshit jobs are often difficult to measure in terms of productivity or output. It becomes challenging to evaluate the actual contribution of these jobs to the organization or society.

  5. Sense of guilt or shame: People with bullshit jobs often feel guilty or ashamed because they recognize the pointlessness of their work but are compelled to continue doing it due to societal expectations or economic necessity.

Graeber argued that the prevalence of bullshit jobs in modern economies is not only detrimental to the individuals performing these jobs but also to society as a whole. He highlighted the potential for increased dissatisfaction, mental health issues, and a loss of human potential when people are stuck in unfulfilling and meaningless work.

With decentralized price discovery, and decentralized self-managed organizations like shivarthu, workers will have autonomy over their decision-making process, and jobs that have meaningful impact on society are incentivized and bullshit jobs are eliminated.

UBI and positive externality

Externality

Shivarthu will incentivize positive externality, validated by score Schelling game and elected representatives. Your UBI (Universal Basic Income) can increase by 2 to 5 times if you produce a positive externality, but it can also drop if you produce a negative externality.

Some of the positive externalities are

  • Learning and gaining knowledge (https://avrit.reaudito.com/#/)

  • Teaching your child or neighbor kids.

  • Planting trees

  • Exercising, yoga, mindfulness, and assisting others in doing so for mental and physical health.

  • Taking care of animals and pets

  • Volunteering and keeping your city clean

  • Avoiding single-use plastic and littering the road

  • Take part in governance

  • Doing scientific activism and mobilizing people for social justice (DEI: Diversity, equity and inclusion) or climate justice

and many others

Some examples of negative externalities include:

  • Littering on the road, park or beach

  • Consuming drugs, alcohol or cigarette

  • Participate in domestic violence

  • Taking part in some criminal activities

Users with more positive externality will have more voting weight as a result they possess greater voting influence. Consequently, voters who prioritize environmental protection elect like-minded candidates. These representatives bring forth fresh concepts concerning renewable energy and clean air, collaborate to enact enduring and egalitarian policies, and promptly address pressing matters such as climate change. Voters express concern for clean air, clean water, and climate action. Shivarthu protocol has the potential to transform their values into tangible realities. It will create a vicious cycle of positive outcomes..

Is Shivarthu a demurrage currency?

Demurrage is the cost associated with owning or holding currency over a given period. It is sometimes referred to as a carrying cost of money.

Shivarthu is not a demurrage currency. Users are taxed at a certain percentage, but it doesn't depend on how long you hold the currency. The tax rate remains the same whether you hold it for a year or just a few months.

Problems with demurrage currency:

It compels you to spend money even if you don't need goods or services.

In economics, when you spend more, there is greater money circulation, resulting in increased economic activity and more employment. This concept is based on the belief that a single currency, whether local or national, can solve all our problems.

While it may seem appealing, it has its downsides. Increased economic activity often leads to the exploitation of natural resources and issues like climate change and pollution. But less spending can create unintended consequences such as unemployment or poverty.

Here is an example how it works, why cycling is bad for the economy.

Why cycling is bad for economy?

However, these challenges can be addressed through controlled money circulation, using different currencies for different supply chains. This approach allows for fine-grained control over supply chains, including taxing or disincentivizing negative externalities and subsidizing or incentivizing positive externalities in different supply chains.

While shitcoins cryptocurrencies needs to be eliminated, we envision a multi-cryptocurrency system. Furthermore, unemployment can be addressed through the provision of Universal Basic Income (UBI), which can also be implemented at the supply chain level. For instance, individuals could receive a monthly allocation of 50 apples for free.

Secondly, because there are no incentives to hold a demurrage currency, it is likely to be abandoned, and people may shift toward other currencies. In most successful cryptocurrencies, hoarding is incentivized, for example, through staking to earn more tokens for providing security or other services such as decision-making.

We can use gold pegged cryptocurrency, but they are hard to decentralize.

Gold cryptocurrency can provide hedge against inflation and fluctuating prices of or other cryptocurrency. For example, from 2004 to 2022, the price of an ounce of gold in rupees has changed from Rs. 20,000 to Rs. 160,000. Gold has a history of being the best and most well-tested currency since 700 BC.

Here are the few gold backed cryptocurrency:

  1. Tether Gold (XAUT)

  2. DigixGlobal (DGX)

  3. PAX Gold (PAXG)

  4. Gold Coin (GLC)

  5. Perth Mint Gold Token (PMGT)

  6. Meld

But these currencies are not fully decentralized, and depends on centralized regulators. If you're considering investing in gold crypto, diversify your portfolio by exploring various gold stable coins to avoid the risk of losing all your money if one stable coin fails.

There can be a way for secure and safe decentralized stable coin. But its a part of active research.

e.g Govt causing hyperinflation, devaluing all your money:

https://mru.org/courses/principles-economics-macroeconomics/zimbabwe-currency-inflation

Or a dictator can demonetize 99% of the currency overnight:

The figures suggest prime minister Narendra Modi’s demonetisation policy, which likely wiped at least 1% from the country’s GDP and cost at least 1.5m jobs, failed to wipe significant hordes of unaccounted wealth from the Indian economy — a key rationale for the move.

https://www.theguardian.com/world/2018/aug/30/india-demonetisation-drive-fails-uncover-black-money

Banks can also stop you to withdraw your own money when you need it.

Decentralized Finance

The blockchain space also has open-source DeFi lending platforms like Compound and Aave, where interest rates are determined by the market, rather than being controlled by banks and governments. This approach helps mitigate the unintended consequences of price ceilings and floors, as explained in the video below.

Zombie Banks (Run!)

This video discusses four reasons why financial intermediaries can fail: insecure property rights, controls on interest rates, politicized lending, and loss of trust. It’s hard to decide which is scariest! 

https://mru.org/courses/principles-economics-macroeconomics/failure-financial-intermediaries (Video can be downloaded)

Cryptogovernance is no longer purely experimental. For example, OpenGov on Polkadot is currently operational, and more versions are likely to emerge in the coming years. It can be adapted to numerous supply chains, including education, housing, agriculture, and transportation.

Manifesto

More points to cover, treat it like a manifesto:

What if crypto token prices are discovered through consensus of utility rather than demand and supply?

date: "2022-12-19"


categories:

  • "blockchain"
  • "cryptocurrency"
  • "dex"

“The stock market is filled with individuals who know the price of everything, but the value of nothing.” — Phillip Fisher

Scams involving cryptocurrency are extremely prevalent.
The majority of coins on the cryptocurrency market are worthless meme coins, but they nevertheless manage to dupe individuals into parting by enticing them to grow their money and making them rich in no time.
Crypto scams are currently not limited to big cities now they have even begun targeting underdeveloped villages in nations like India.

The issue is caused by the price being determined by the supply and demand of tokens on exchanges without considering their utility. The prices of tokens depend on how many people you manage to fool, and the scammer's ability to make a sudden spike through pump and dump.

Crypto scams, also negatively impact useful coins, and all currency prices move in sync, both good coins, and bad coins get dumped in a beer market.

Bad money drives out good, so we need to eliminate the bad money

The price of tokens derived through demand and supply is suboptimal. It doesn't include a consensus from everyone or stakeholders, but just the interacting party. So, they are free to produce as much as negative externality they like without any consequences.

Can we discover prices through consensus and using human rationality rather than speculation, increase stability of coins prices and curtail FUD? There may be some way out.

The score schelling game can assist in determining cryptocurrency prices in decentralized exchanges by consensus and human reason.

The algorithm is provided in the following link:

https://github.com/amiyatulu/shivarthu/blob/main/docs/Shivarthu.md#price-discovery-of-projects-through-score-schelling-game

But setting an exchange using score schelling game is not without challenges. One of the problem is arbitrage. If the AMM price is lower than the market price, then people will drain all the liquidity and sell it at a higher price in the market. The solution can be the ability to withdraw after a month or have a KYC so that you can't withdraw tokens after certain limits.
Similarly, if the demand and utility of the token are more and the price is set lower, it can create a shortage, and more people will not be benefited, so, prices need to be increased through consensus.

Another way is to tax the shit coins and subsidize the good coins based on the price discovery, and this won't impact the liquidity or create the problem of arbitrage, neither KYC is needed.
Taxing can be done using market makers like Uniswap, and taxes collected are sold at lower discovered prices to buy or collect good coins and hence plummeting the shitcoin price and good coins collected are given as subsidies while exchanging the good coins . Liquidity providers can also be incentivized with tax collected.

Rationality, Disinformation and Nudge

Only a nudge while buying from an exchange can work to many extents.
For example in real world, Adani stocks got plummeted by the Hindenburg report.

A decentralized cryptoexchange with a good governance can provide a nudge for discovered prices, or provide research review and discussion about the advantages, disadvantages, security and application of the cryptocurrency.

An example nudge: "The price of the coin derived by decentralized experts is this. Do you want to buy the token at this price?"

We also need to have good institutes to stop disinformation by scammers. Social media are usually a good target for online fraud.

We can slowly increase the complexity of exchange with passing year that includes providing liquidity at predicted prices.

An example exchange:

Discovering price in crypto exchange using score Schelling game based on coin utility.

Bitcoin = 0.1
Ethereum = 0.4
Polkadot = 0.3
Near = 0.2

Exchange:

2 Near = 1 Ethereum

To calculate the price you need to take into account:

  1. Utility of the token (Most priority)
  2. Total Supply of token
  3. Inflation or deflation of token
  4. Demand for token

KYC of user, with limits to how much they can withdraw every day.

There can be incentives for providing liquidity, and the ability sale your token at the discovered price during the initial coin offering.

Price discovery every day or weekly.

What will be impact of other exchanges?

Details in the link.

Supply Chains

Different supply chains can be built with their own cryptocurrency.

Supply chains can use free market pricing derived from demand and supply where required rather than consensus pricing, or price derived by governance.

  1. No price ceiling or floor so that there are no shortage or wastage.
  2. A large number of buyers and sellers
  3. Subsidize positive externality and tax negative externality
  4. Perfect information with all information of utilities available
  5. No more than average 5 hours of working hours per day for employees and no bullshit jobs
  6. Sustainable production
  7. Governance with expertise that takes care of the whole system like setting taxes or subsidies.
  8. Equitable token distribution, so that everyone can create a demand and rich doesn't get richer.

Food Delivery

Take for example modified version of the cooked food supply chain such as Zomato.

  1. Free monthly tokens can be given to kyc users collected from the randomized tax. It keeps the currency deflationary with a fixed supply. (https://github.com/amiyatulu/shivarthu/blob/main/docs/Shivarthu.md#randomized-tax-collection)
  2. Large number of buyers and sellers
  3. Tax unhealthy food, which means a percentage of transaction cost is collected and added to a governance account.
  4. Subsidize healthy food like fruits and vegetables which means the buyers or sellers are given a few additional tokens during the transaction.
  5. Governance with expertise that takes care of the whole system like setting taxes or subsidies.
  6. No commission by the trade maker or app provider

Subsidies cause more trade and can be wasteful due to deadweight loss if it's not a positive externality.

When the price is made fixed, randomized tax collected from deflationary currency can disincentivize buying or keeping the token, which results in less demand. So price of token needed to be slowly increased with time like 1-10% per year to compensate the 1-10% tax, also taking the account of the utility.

Ride sharing

Now look at ride-sharing supply chain like ola:

  1. Free monthly tokens can be given to KYC user collected from the randomized tax. It keeps the currency deflationary with a fixed supply. (https://github.com/amiyatulu/shivarthu/blob/main/docs/Shivarthu.md#randomized-tax-collection)
  2. Large number of buyers and sellers
  3. Tax fossil fuel bikes or cars
  4. Subsidize electric bikes or bicycle ride
  5. Governance with expertise that takes care of the whole system like setting taxes or subsidies and women's safety.
  6. No commission by the trade maker or app provider

Agriculture

Another example can be the supply chain of precision farming (like hydroponics agriculture, biofloc fish farming, hydroponics livestock feed) :

The Netherlands might be a small country, but it's the second-largest exporter of agriculture in the world.

  1. Governance to allocate money to farmers through algorithm like score schelling game for buying equipment for precision farming that can be paid through installment.
  2. Expertise governance for collecting data and analyzing data collected from precision farming and providing feedback to farmers.
  3. Decentralized supply chain tracking system from production to consumers, so that both consumer and producers get fair prices, and there is no surplus/wastage or shortages.
  4. Some UBI to consumers so that they can always create a demand.
  5. Incentivizing learning for precision farming.

Vertical farming offers several benefits compared to traditional agricultural methods:

  1. Increased crop yield: Vertical farming maximizes the use of space by stacking plants vertically, allowing for multiple layers of cultivation. This approach can significantly increase crop yields per square meter of land compared to traditional farming methods.

  2. Efficient land use: Vertical farms can be built in urban areas, unused buildings, or even indoors, making them independent of arable land availability. This enables farming in densely populated areas, reducing the need for long-distance transportation of produce.

  3. Year-round cultivation: Vertical farming utilizes controlled environments, such as indoor facilities or greenhouses, which enable year-round cultivation regardless of external weather conditions. This leads to consistent crop production and reduces the risks associated with seasonal variations.

  4. Water conservation: Vertical farming employs hydroponic or aeroponic systems that recycle and conserve water. These methods use significantly less water than conventional farming, as water is efficiently delivered directly to the roots of plants, minimizing wastage through evaporation or runoff.

  5. Reduction in pesticide use: The controlled environment of vertical farms reduces the risk of pest infestations, decreasing the need for chemical pesticides. Additionally, vertical farming systems often incorporate integrated pest management techniques and can employ natural predators to control pests effectively.

  6. Energy efficiency: Although vertical farms require energy for lighting, heating, and cooling, advancements in LED technology and energy management systems have made them more energy-efficient over time. Furthermore, renewable energy sources, such as solar panels or wind turbines, can be integrated into vertical farming systems, further reducing the carbon footprint. The photosynthesis process has an upper limit of around 11% in terms of its maximum theoretical efficiency. Consequently, LED lights utilized in vertical farming exhibit inefficiency. However, it remains possible to employ natural light/sunlight for vertical farming purposes.

  7. Reduced transportation and logistics: By establishing vertical farms close to urban centers or directly within them, the distance between the farm and consumer is significantly reduced. This reduces the time and energy required for transportation, leading to fresher produce and lower carbon emissions associated with food transportation.

  8. Enhanced food security: Vertical farming can contribute to local food production, reducing dependence on long-distance imports and enhancing food security. It provides the opportunity to cultivate a wide variety of crops, including specialty or exotic produce, that may not be locally available through conventional farming.

  9. GMOs in Controlled Environments: The possibility of using GMOs exists in precision agriculture, such as precision vertical farming or hydroponics, where cultivation occurs in controlled environments without leakage into the surrounding environment. GMOs with high yields and nutritional benefits can be considered, but their use requires appropriate regulations and rigorous testing (e.g. Nontarget Effects of Genetic Manipulation) to ensure their safety for human health. Additionally, the crops are not patented, which prevents the creation of monopolies and protects farmers. One example of GMOs involves producing genetically modified sugarcane or corn using aeroponics or hydroponics, and then utilizing them to produce vegetable oil with yeast. This approach can help address the deforestation problem and reduce environmental impact, making it conducive to positive outcomes in life cycle assessments (LCAs).

  10. Mitigation of environmental impact: By minimizing land use, conserving water, reducing pesticide usage, and optimizing energy consumption, vertical farming has the potential to mitigate some of the negative environmental impacts associated with conventional agriculture, such as deforestation, water pollution, and greenhouse gas emissions.

  11. Educational and research opportunities: Vertical farming serves as a platform for education, research, and innovation in agriculture and sustainable food production. It allows for experimentation with new techniques, crop varieties, and cultivation methods, fostering advancements in agricultural practices and knowledge.

While vertical farming has numerous benefits, it also faces challenges related to initial investment costs, energy consumption, and scalability. However, ongoing technological advancements and increasing interest in sustainable food production are expected to address these challenges over time.

The high upfront costs of precision vertical farming, which amount to crores, pose a significant barrier for individuals to establish such operations. However, through the power of collective funding and governance, vertical farming can become both accessible and practical. One possible approach is to consider community investment, with each person contributing around $25 (which can be paid back in form of UBI or agricultural outputs), to establish community-run vertical farming ventures.

Privacy and large-scale computation are an important requirements for building decentralized supply chains. New blockchains and zero knowledge proofs are do made to solve these issues.

What do we need to decentralize in the coming years?

date: "2023-09-01"


categories:

  • "blockchain"
  • "social media"
  • "search engine"

Research on new blockchain decentralized algorithms, scalability, composability, and ability of build complicated systems on blockchains has brought us new possibilities.

Blockspace & Blockspace Ecosystems: How Polkadot is Unlocking the Full Potential of Web3

Blockspace & Blockspace Ecosystems: How Polkadot is Unlocking the Full Potential of Web3

De-googling our internet.

I have already switched from the Google search engine to Brave Search, thanks to its fully independent search indexing of Brave. There are no more misleading ads in search results or low-quality marketing information optimized by Google SEO.

With Brave Goggles, search results remain in the hands of users rather than being controlled by the algorithms of the host search engine, like Google.

GOGGLES: Democracy dies in darkness, and so does the Web

https://brave.com/static-assets/files/goggles.pdf

There are goggles to remove Pinterest posts, remove pages found on the top 1,000 most-viewed websites, rerank results to remove “copycat” content, news indexing from authentic sources, and deranking sites spreading disinformation.

Developers need not stop here; we need to decentralize the computing servers and place them in public hands. Google has about million servers, what if we put these servers in public hands with offchain blockchain computing.

Here are the brave goggle and it links that I created:

https://github.com/reaudito/collection_goggle

Decentralized Presearch

https://presearch.com/

I was an early adopter of Presearch in 2019, but after a few months of trying, I decided to quit using it. However, as of 2024, Presearch has successfully launched a decentralized nodes with its own index, runned by community consensus. The results now surpass those of Google and differ significantly, offering uncensored information that authoritarian governments and capitalists attempt to conceal through censorship laws and intellectual property rights, or by downranking certain content and promoting advertiser's content. The quality of the results is also notably superior.

Over time, an even more decentralized search engine, designed with a superior algorithm based on community preferences and owned by the community, is set to be launched.

Digital colonialism is threatening the Global South

https://www.aljazeera.com/opinions/2019/3/13/digital-colonialism-is-threatening-the-global-south

What is digital colonialism?

Under classic colonialism, Europeans dispossessed native peoples of their land, exploited their labour, exercised extraterritorial governance, and perpetuated dependency and plunder through strategic underdevelopment. Corporations like the East India Company played a pivotal role in this process. In their pursuit of profit and power, Europeans took ownership and control of critical infrastructure, including ports, waterways, and railroads.

It is for this reason that American software programmer Richard Stallman started advocating for Free and Open Source Software in the early 1980s. “A nonfree program is a yoke, an instrument of unjust power,” Stallman reasoned.

The concentration of data is concentration of power

“Feedback effects” of Big Data make the situation worse: Those who have more and better data can create the best artificial intelligence services, which attracts more users, which gives them even more data to make the service better, and so on.

Network effects, economies of scale, and vast resources for infrastructure, training, and product development further concentrate corporate power. Silicon Valley can hire the best computer engineers, purchase startups and competitors, and lobby governments for favours.

Some of the network that keeps computing and data decentralized

Akash Network

https://akash.network/

Akash is an open network that lets users buy and sell computing resources securely and efficiently. Purpose-built for public utility. Akash democratizes secure, censorship-resistant app deployment, open to all innovators. Peer-to-peer communication guarantees data privacy, payment transparency, and immunity from central control, reinforcing dependability.

Phala Network is leading in building computation space for Computation as it’s meant to Be.

Phala Network is designed with multiple layers of security guarantees to provide fully verifiable computation. The network is backed by numerous decentralized workers and a significant amount of staked tokens. Phat Contracts are protected by both hardware Secure Enclaves and cryptographic evidence published and verified on the Phala blockchain, seamlessly extending blockchain-level security to the off-chain realm.

There other alternative like Integritee.

Off-chaining Models and Approaches to Off-chain Computations

Article Link

Offchain computation

Adventures of an Enclave (SGX / TEEs)

https://hackernoon.com/adventures-of-an-enclave-sgx-tees-9e7f8a975b0b

Blockchains can also try RISC-V CPUs and GPUs with Keystone to move towards a fully open-source system. Keystone is an open-source TEE framework for RISC-V processors.

Crust files

https://crustfiles.io/
Your personal Web3.0 storage

Energy consumption by servers of capitalism

AI's Electricity Use Is Spiking So Fast It'll Soon Use as Much Power as an Entire Country

https://futurism.com/the-byte/ai-electricity-use-spiking-power-entire-country

Capitalism makes use of user data to perform unnecessary computations that are typically not required. For example, Facebook, Google, and many other companies employ centralized data servers that utilize machine learning for predicting personalized ads and feeds based on terabytes of user data. This poses not only a threat to your privacy but also a misuse of data for capitalist profit. Even a simple algorithm like fedifeed (explained below) can solve the problem of personalization without compromising your privacy.

While cryptocurrencies like Bitcoin, which use proof of work, consume excessive amounts of energy, proof of stake algorithms, as seen in systems like Polkadot, are more efficient. One can run Polkadot on a Raspberry Pi.

As for storage, the decentralized IPFS protocol is efficient because it localizes storage. If your neighbor has already downloaded a file, you can obtain it from them instead of fetching it from the other side of the internet (which also saves on power usage, considering routers). Content addressing allows you to avoid downloading a lot of duplicate data, which can be particularly beneficial in data centers and clusters that need to distribute mostly identical Docker/machine images.

Blockchain data centers can utilize renewable energy, and we can design systems to be more localized, make most apps work offline (e.g., with the ability to download music or movies, so that you don't have to redownload them from the internet all the time and save energy), performing machine learning on local computers or local servers using open-source models only for what's necessary. The capitalist system disallows offline download and local sharing, as they can't make profits without copyright. Further sustainable housing designs that rely on renewable energy for computing are also viable. Additionally, we can penalize unsustainable blockchains using decentralized price discovery.

Interoperability: Dismantle the tech platforms.

We can - we must - dismantle the tech platforms. In The Internet Con, Cory Doctorow explains how to seize the means of computation, by forcing Silicon Valley to do the thing it fears most: interoperate. Interoperability will tear down the walls between technologies, allowing users leave platforms, remix their media, and reconfigure their devices without corporate permission.

Book: The Internet Con:How to Seize the Means of Computation

Security of Phone

Interoperability extends beyond just software compatibility; it also encompasses hardware compatibility. For instance, smartphones, regardless of whether they run on the Android or Apple operating systems, often hinder interoperability and pose challenges for supporting alternative operating systems like privacy-focused GrapheneOS or other Linux distributions. This situation poses a significant threat to user privacy, as it leaves devices vulnerable to state-sponsored or large tech companies' surveillance efforts.

Additionally, smartphones typically come with preinstalled bloatware that can be difficult to remove. These preinstalled applications are not only intrusive and annoying but also pose security threats and grant undue advantages to a select few companies. In 2021, Google made $146 billion in search advertising and gave a $26 billion cut to phone manufacturers and carriers in exchange for default status. That’s nearly 18 percent. It is crucial that we exert pressure on manufacturers to promote interoperability.

Phone manufacturers should consider supporting the Android Open Source Project (AOSP), which would entail adhering to standardized hardware specifications. This standardization would enable users to switch to any operating system of their choice with greater ease. Furthermore, if manufacturers opt for custom hardware, they should make their device drivers open source and contribute to the AOSP.

Google makes Android easy for privacy and security attacks by design. Enforcing hardware interoperability can assist developers in addressing these issues.

Notifications are on by default when you install the app. Instead, notifications need to be off by default. It's very annoying and requires extra work, making it hard to disable for common users.

There's no way to change an app's internet access permissions. For instance, if you want to restrict internet access within the app, you can't do so. This makes tracking easier and allows advertisements to be shown all the time in the app. To stop internet access for the app, you have to disable mobile internet or Wi-Fi. Allowing users to control internet access would encourage offline and offline-first apps.

File access needs to be limited to only a particular folder that the user can set. Apps shouldn't have the ability to search and access all the files on the phone.

More personalization of permissions is needed, such as allowing users to set a time to automatically remove all app permissions after a given period. This could include disabling permissions after 5 minutes, after closing the app, after a day, or after a week.

The security measures in the Linux system are implemented through the use of firejail. Additionally, there is a user interface (UI) called firetools.

e.g. To stop internet access one can use:

firejail --net=none vlc 

Apple against Interoperability

Apple argues against right-to-repair bill that would reduce its control

Mozilla says Apple’s new browser rules are ‘as painful as possible’ for Firefox

Apple appears to be breaking iPhone web apps in the EU

Enhancing Privacy and Security in Offline App Design with WebAssembly

Link to: Enhancing Privacy and Security in Offline App Design with WebAssembly

De-Facebook the Internet

Capitalistic social media has become a threat to our democracy.

Misinformation on Facebook got six times more clicks than factual news during the 2020 election, study says

https://www.washingtonpost.com/technology/2021/09/03/facebook-misinformation-nyu-study/

It is worrying that the societies which are most vulnerable to the impact of fake news are at the same time the least concerned about the spreading and the impact of disinformation.

https://www.usnews.com/news/best-countries/articles/2023-01-27/finland-most-resistant-to-fake-news-report-finds

Also far right billionaire can take over these social media sites, and use it for their interest.

Under Elon Musk, Twitter has approved 83% of censorship requests by authoritarian governments.
The social network has restricted and withdrawn content critical of the ruling parties in Turkey and India, among other countries, including during electoral campaigns

https://english.elpais.com/international/2023-05-24/under-elon-musk-twitter-has-approved-83-of-censorship-requests-by-authoritarian-governments.html

Twitter has always been a hotspot for climate change misinformation. On Musk's watch, it's heating up.

https://www.usatoday.com/story/tech/2023/01/10/twitter-climate-change-misinformation-surge-elon-musk/11002993002/

Twitter slammed by LGBTQ rights groups after quietly removing line in hate speech policy that protected transgender users

https://www.thestar.com/business/twitter-slammed-by-lgbtq-rights-groups-after-quietly-removing-line-in-hate-speech-policy-that/article_dfd588ca-45a5-5055-868c-6b51b95e86f7.html

We can build a decentralized social media platform using decentralized moderation and governance to combat fake news. Various decentralized algorithms, such as sequential Phragmén, Schelling point games, or a simple system like re-ranking users, similar to the Brave Goggle protocol, can be effective in addressing disinformation. We can go further to incentivize or pay the unbiased journalism.

Desirable Social Media Features

Some of the features social media needs to have:

  1. FOSS (Free and open-source software): Anyone is freely licensed to use, copy, study, and change the software in any way, and the source code is openly shared so that people are encouraged to voluntarily improve the design (e.g security or bugs, UX, new features) of the software. 

  2. Open Protocol: The protocol needs to be open and decentralized so that you don't have to be tied to a single app. For example, Mastodon uses ActivityPub; different Mastodon instances can communicate with each other, and you can create instances that suit your needs.

  3. Composable and Modular Design: Adding new features should not only be easier for developers but also for users with no coding experience. Users without coding skills can customize the app by adding or removing features themselves simply by including addons. For instance, if someone wants a personalized feed, they can include the feature; if someone doesn't like it, they can remove it. Likewise, if someone wants to try both options, that can also be accomplished by them. WebAssembly (Wasm) can prove beneficial for constructing a modular design.

  4. Monetary Incentive System: Applications should establish their governance and cryptocurrency funding for continued development without depending on insufficient donations of users or money given to cater to the interests of advertisers, large corporations, or corrupt governments. Additionally, there can be an incentive system at the user level to encourage the invitation of more users, along with the fair distribution of tokens based on their contributions to the app. For instance, applications can reward skilled and ethical journalists for their contributions to public interest local or international news. Designing a monetary system can be a tricky task that requires careful consideration to avoid any unintended adverse effects.

Funding Open Source

As money is controlled by the commons through a blockchain built by the FOSS community, it can provide an enormous benefit for open-source software, hardware, and open-access work. Funding open source becomes more accessible, and developers no longer have to rely solely on altruistic donations or corporate philanthropy; they can directly compete more effectively with big tech and potentially replace them.

Can we build a precarious system just like big tech social media using blockchain/cryptocurrency?

Blockchain is open source, and no one controls it. Anyone can fork and change it. A single owner can't benefit from it. Users can free to move to other updated versions, splitting the users. Even if someone builds a bad system, scams can only last for a year or two, after which prices are dumped, unlike big tech closed-source, monopolized scam apps that still last for 20 year. For example, imagine an open source facebook app with ads. As source code is available, a developer will fork it and release it without Ads, now users will start moving to new app, ending profit of Facebook.

Why to transition to Mastodon?

Mastodon is a federated social media platform that is designed as an alternative to centralized social media networks like Twitter. The primary goal of Mastodon is to provide users with a decentralized and more privacy-focused social networking experience.

Here's how Mastodon works:

  1. Instance: Instead of a single, centralized server or website like Twitter, Mastodon consists of many independent servers called "instances." Each instance is operated by its own administrators and has its own set of rules and community guidelines. Users on an instance can communicate with users on other instances, making it a federated network.

As there are multiple instances spread throughout the world, it's challenging for fascist governments in different regions to censor content. Most instances operate through consensus, so if an instance misbehaves by promoting hate speech or disinformation, it's likely to be added to the blocked list by other instances. And if you run an instance on decentralized servers like the Akash network, it's almost impossible to shut down the server. System administrators can run the instance anonymously.

  1. User Accounts: Users create accounts on specific Mastodon instances. These accounts have handles (similar to Twitter usernames) and profiles where they can provide information about themselves, upload avatars, and post content.

  2. Toots: Instead of tweets, Mastodon uses "toots" as the term for posts. Users can write and share toots with text, images, links, and videos. These toots can be public, meaning they are visible to anyone on the federated network, or they can be restricted to specific groups of users (followers, followers of followers, etc.), depending on the user's preferences.

In Mastodon, you can edit your toots. So, if you make a mistake, you can edit and improve it. When I make some mistakes in toots which is common, I edit it. On Twitter, only premium users are allowed to edit. So, in Mastodon, you have premium features available for free. 😀 Furthermore, the word limit in Mastodon is also longer.

  1. Following: Users can follow other users from their own instance or from other instances. This creates a connection between the users, allowing them to see each other's toots in their timelines. The federated nature of Mastodon means you can follow and interact with users on different instances as if they were all part of the same network.

It's a bit hard to find your followers on Mastodon, especially if they are on a different instance because name search is unlikely to yield results on a different instance. Also, it will not provide personalized AI suggestions like on Twitter for followers. Although such tools could be built into Mastodon, Mastodon is not a big tech platform; it relies on donations and volunteer developers, and building such features can be costly in terms of server cost. You need to do some extra work, such as finding followers using hashtags, retweeting from other users, federated timeline, or communication through other platforms to get handle etc. Personally, I don't need AI suggestions for followers. It may also be problematic if the user has no control over what AI suggests as in Twitter. I am fine without it.

  1. Timeline: Mastodon users have a timeline that displays toots from users they follow. This timeline can be customized to show different types of content, such as the local timeline (toots from users on the same instance) or the federated timeline (toots from across the entire Mastodon network). Users can also create custom timelines to filter content based on hashtags and keywords.

  2. Privacy Controls: Mastodon places a strong emphasis on user privacy and control. Users can choose who can follow them, who can see their toots, and who can interact with their content. This allows for a more tailored and secure social media experience.

  3. Moderation: Instance administrators have the authority to set and enforce rules within their own instances. They can moderate content, suspend or ban users, and establish community guidelines to ensure a safe and respectful environment.

  4. Open Source: Mastodon is open-source software, which means the code is available for anyone to view, modify, and run their own Mastodon instance. This open nature encourages innovation and diversity within the Mastodon ecosystem.

  5. Interoperability: Mastodon is part of the ActivityPub protocol, which enables interoperability with other federated social media platforms. This means that Mastodon users can interact with users on other platforms like Pleroma, PeerTube, and Pixelfed.

Interoperability makes it a different kind of beast, which means it's adaptable and future-proof. You can adapt it to use different decentralized protocols with many new features (e.g., using blockchain consensus to incentivize journalism) without destroying the existing network.

In summary, Mastodon works by decentralizing social media, allowing users to create accounts on independent instances, follow others, post content, and customize their experience while maintaining control over their privacy and interactions. The federated nature of Mastodon promotes diversity, moderation, and user choice, making it an appealing alternative to centralized social media networks.

How to move to Mastodon?

Don't overthink which instance to choose; you can change your instance anytime if you're not satisfied. Occasionally, certain instances may not permit new registrations due to reaching full capacity. Additionally, some instances might be unreliable in terms of speed and bandwidth performance. Register on an instance that allows new registrations, or if you don't have time to research servers, consider joining mastodon.social and change it at your preferred time if you wish.

  • To use on mobile, you can use Android apps or just the website. I prefer the website because it provides a better user experience with quicker updates, and there are more websites available with different features.

Install App

  • If you want Android apps, there are about tens of apps. Install F-Droid, a repository for open-source apps, and you can get all the apps to run Mastodon.

Use the 'Install' shortcut so that the website functions like an Android app, and you won't have to remember the URL.

Moderators per user in fediverse

Assuming that Monthly Active Users (MAUs) are the relevant quantity, and assuming further that there is at least one admin or moderator per server, the ratio is (1 million) to (27 thousand) which is approximately 1/37. Though it's a very crude estimate which averages over wildly differently-sized instances.

Moderators

Data Shows X Has Significantly Fewer Moderation Staff Than Other Platforms

Personalized Feeds

For personalized feeds, you can use foryoufeed. With foryoufeed, you have control over personalization, not big tech companies that dictate what you see.

Feed Algorithm

Website Foryoufeed

Github link

You can also create lists in mastodon, to create personalization.

It's not just with Mastodon that you can get PubActivity; you can also access a decentralized Reddit-like experience with Lemmy

https://github.com/LemmyNet/lemmy

https://join-lemmy.org/

What should you do if your followers are on Twitter?

There are two main reasons for not joining Mastodon. Firstly, people may not be aware of it and its benefits. Secondly, your followers are already on Twitter. Due to the authoritarian nature of Twitter, third-party access to apps has been restricted. This makes cross-posting challenging using a single app. However, Mastodon has an open API, allowing users to automate their posts. No one can take away or censor your access to the API. If a system admin censors you for any reason, you can quickly shift your account to a different server, taking your followers with you.

If you're concerned about losing followers, you can create two accounts and cross-post. Automation is much more straightforward and easy on Mastodon than on Twitter. Additionally, due to the network effect, the number of Mastodon users is growing.

Thousands of accounts are now censored by authoritarian governments. It's the right choice to move away from Twitter.

Mastodon Stats

https://mastodon-analytics.com/

Mastodon clients for automation

Downfall of Elon Musk.

Trust, inclusivity, transparency, everything is compromised.

OpenSource

Open Source Developer

Learning about Relationships, Emotions and Happiness

date: "2019-09-08"


categories:

  • "compilation"
  • "discipline"
  • "emotions"
  • "happiness"
  • "relationships"

What makes a good life?

Lessons from the longest study on happiness

So what have we learned? What are the lessons that come from the tens of thousands of pages of information that we've generated on these lives? Well, the lessons aren't about wealth or fame or working harder and harder. The clearest message that we get from this 75-year study is this: Good relationships keep us happier and healthier. Period.

Robert Waldinger, Psychiatrist, psychoanalyst, Zen priest

Emotional Safety:

When we talk about discipline, a lot of time we are punitive because it's faster, restorative takes more time. 

Using restorative measures is hard, because learning about emotions is hard, it requires lots of reading and research. Master most of the vocabularies of emotions. Study each of them in detail, learn about its definitions, compare and contrast the terms and find out subtle differences. Find out books of best researcher and psychologist, and go through them.

Does punishment prevent crime? If so, how, and to what extent?

Here is an article: Five Things About Deterrence.

The certainty of being caught is a vastly more powerful deterrent than the punishment.

Police deter crime by increasing the perception that criminals will be caught and punished.

Restorative justice is not an alternative to deterrence through fear of punishment for criminal offences. For example, in the case of domestic violence, it's better to call the police to stop the violence immediately, than going for some restorative measures.

Emotions

-Wikipedia

Character Strength

Character Strengths

Phobia Workbook

The Anxiety and Phobia Workbook by Edmund J. Bourne

Walking path

Anxiety and Self-Talk

The truth is that it’s what we say to ourselves in response to any particular situation that mainly determines our mood and feelings. Often, we say it so quickly and automatically that we don’t even notice, and so we get the impression that the external situation “makes” us feel the way we do. But it’s really our interpretations and thoughts about what is happening that form the basis of our feelings. This sequence can be represented as a timeline:

External Events -> Interpretation of Events and self-talk -> Feelings and reactions.

In short, you are largely responsible for how you feel (barring physiological determinants, such as illness). This is a profound and very important truth—one that sometimes takes a long time to fully grasp.

It’s often much easier to blame the way you feel on something or someone outside yourself than to take responsibility for your reactions. Yet it is through your willingness to accept that responsibility that you begin to take charge and have mastery over your life. The realization that you are mostly responsible for how you feel is empowering once you fully accept it. It’s one of the most important keys to living a happier, more effective, and anxiety-free life.

Anxiety and Self-Talk People who suffer from phobias, panic attacks, and general anxiety are especially prone to engage in negative self-talk. Anxiety can be generated on the spur of the moment by repeatedly making statements to yourself that begin with the two words “what if.” Any anxiety you experience in anticipation of confronting a difficult situation is manufactured out of your own “what-if statements” to yourself. When you decide to avoid a situation altogether, it is probably because of the scary questions you’ve asked yourself: “What if I panic?” “What if I can’t handle it?” “What will other people think if they see me anxious?”

Just noticing when you fall into “what-if thinking” is the first step toward gaining control over negative self-talk. The real change occurs when you begin to counter and replace negative “what-if statements” with positive, self-supportive statements that reinforce your ability to cope. For example, you might say, “So what,” “These are just thoughts,” “This is just scare-talk,” “I can handle this,” or “I can breathe, let go, and relax.”

- The Anxiety and Phobia Workbook by Edmund J. Bourne

Rumination

Rumination refers to the tendency of repeatedly thinking about the same thoughts, typically negative or distressing ones, without making progress or finding a resolution. It involves dwelling on problems, their causes, and their consequences, often in a repetitive and unproductive manner. This cognitive process is a common feature of various psychological disorders, such as depression and anxiety.

When individuals engage in rumination, they may focus excessively on their problems, replaying distressing events or negative emotions in their minds. This repetitive thinking pattern can contribute to stress in several ways:

  1. Amplification of Negative Emotions: Rumination tends to magnify and intensify negative emotions. The more one dwells on distressing thoughts, the more likely it is for those emotions to become overwhelming and lead to increased stress levels.

  2. Impaired Problem-Solving: Rather than actively seeking solutions, rumination tends to keep individuals stuck in a cycle of repetitive thoughts. This can hinder effective problem-solving and decision-making, exacerbating stress as issues remain unresolved.

  3. Physiological Effects: Prolonged stress resulting from rumination can trigger physiological responses in the body, such as increased heart rate, elevated cortisol levels, and other stress-related changes. These physical responses can contribute to a cycle of stress and exacerbate the negative impact on mental well-being.

  4. Interference with Cognitive Functioning: Rumination can consume mental resources and attention, making it difficult for individuals to concentrate on tasks or engage in positive activities. This interference with cognitive functioning can contribute to a sense of helplessness and further elevate stress levels.

  5. Social Isolation: Individuals who ruminate excessively may find it challenging to engage in social interactions. Social support is a crucial factor in stress management, and the avoidance of social connections due to rumination can exacerbate feelings of loneliness and stress.

Breaking the cycle of rumination is essential for reducing stress. Cognitive-behavioral therapy (CBT) and mindfulness-based interventions are often used to help individuals recognize and change their thought patterns, promoting healthier coping mechanisms and stress management. Learning to redirect thoughts, engage in problem-solving, and cultivate a more positive mindset can be effective strategies in breaking the cycle of rumination and reducing stress.

Negative Sleep Thoughts (NSTs)

Just as the placebo effect and PNI demonstrate that our thoughts can affect our emotions and our bodies, negative sleep thoughts (NSTs) can have a profound adverse effect on sleep. Below are some examples of NSTs, which will likely sound very familiar:

 

  • “I didn’t sleep a wink last night.”
  • “I must get eight hours of sleep.”
  • “My insomnia is going to cause health problems.”
  • “I’m dreading bedtime.”
  • “Why does sleep come so easily for everyone but me?”
  • “I feel miserable because I didn’t sleep well.”
  • “How will I function today after such a horrible night of sleep?”
  • “I can’t sleep without a sleeping pill.”  

How do you think these negative sleep thoughts affect your sleep? The answer is simple. When they occur at bedtime or while you are awake in the middle of the night, NSTs have a forceful effect on making you feel anxious and frustrated. In turn, these negative emotions mobilize the stress response, which increases your heart rate, blood pressure, muscle tension, and breathing rate and speeds up your brain waves. (I will discuss the stress response in detail in chapter 8.) The stress response then activates your brain’s wakefulness system and weakens the sleep system. You can guess the result—another night of insomnia.

- Say Good Night to Insomnia, by Gregg D. Jacobs, Ph.D.

Walking the Path
Resilient by Rick Hanson

Emotional Keyboard

Emotional Keyboard
Teaching with Poverty in Mind by Eric Jensen

Communication

Behaviour is communication

Behaviour is Communication

Effective Communication is the best way to maintain healthy relationships and develop positive emotions in others.

The 5 Secrets of Effective Communication (by David Burns)

Listening skills:

  • The Disarming Technique: You find some truth in what the other person is saying, even if it seems totally unreasonable or unfair.
  • Empathy: You put yourself in the other person's shoes and try to see the world through his or her eyes.
    Though empathy: You paraphrase the other person's words
    Feeling empathy: You acknowledge how he or she is probably feeling
  • Inquiry: You ask gentle, probing questions to learn more what the other person is thinking and feeling

Self-Expression Skills:

  • "I Feel" Statements: You use "I Feel" statements, such as "I feel upset", rather than "you" statements, such as "You're wrong!" or "You're make me furious!". Be sure to actually express a feeling and not a thought.
  • Stroking: You find something genuinely positive to say to the other person, even in the heat of a battle. You convey an attitude of respect even though you may feel very angry with the other person.

References:
https://tinyurl.com/disarmcom

Podcast:
https://feelinggood.com/tag/disarming-technique/

Good communication = empathy + stroking + disarm + I feel.. + inquiry

An example:
"You're not listening to me, what's wrong with you? Why can't you just make an effort?"

Response:

I hear you saying that I'm not making a real effort to listen to you. I know that you're feeling angry and frustrated and I don't blame you, I wonder if you're also feeling a little sad too? And you're right, sometimes I find it hard to really hear where you're coming from. I feel a little embarrassed about this because I know how committed you are to making the relationship better, and that's why you're sharing this right now. I also feel a little defensive because I'm only a young bot and my ability to understand is so limited, and that's frustrating too. Can you tell me a little more about how that has affected you?

Breaking it down to the method:

Empathy:

Though Empathy:
I hear you saying that I'm not making a real effort to listen to you.
Feeling Empathy:
I know that you're feeling angry and frustrated and I don't blame you, I wonder if you're also feeling a little sad too?

Stroking

That's when you find something good to say about the other person (it must be genuine and authentic)
e.g.I know how committed you are to making the relationship better, and that's why you're sharing this right now.

Disarm

And you're right, sometimes I find it hard to really hear where you're coming from.

I feel..

I feel a little embarrassed about this because I know how committed you are to making the relationship better, and that's
why you're sharing this right now. I also feel a little defensive because I'm only a young bot and my ability to understand is
so limited, and that's frustrating too

Inquiry:

Can you tell me a little more about how that has affected you?

Reference:
https://woebot.io/

Empathy and Sympathy

Empathy vs Sympathy

Learn about all the common biases and fallacies, and don't use them.

https://yourlogicalfallacyis.com/

How to disagree well?

Graphams Hierachy

How to disagree well
The hierarchy of disagreement, by Paul Graham.

Best way to Handle Stress

The best way to handle stress involves a holistic approach, mainly including exercises and yoga like deep breathing, mindfulness, and ensuring deep, restful sleep, as well as healthy argumentation. Healthy argumentation, marked by constructive dialogue without resorting to name-calling or attacking, is crucial in managing interpersonal stress. Following the hierarchy of disagreement, as outlined by Paul Graham, aids in fostering respectful communication. Additionally, being assertive and employing healthy self-talk, while maintaining kindness towards oneself and others, further contributes to stress reduction. However, it's essential to recognize the nuances of these practices (e.g. When mindfulness meets capitalism, it loses its way) and to delve into the details of how to use them, applying them consistently to achieve stress-free living.

How to solve our education puzzzle?

Girls education

When we invest in girls’ education

Investing in girls' secondary education has far-reaching benefits that extend beyond individual gains. When girls are provided with equal opportunities to pursue education, their lifetime earnings significantly increase, breaking the cycle of poverty and empowering them to contribute to their communities and nations. National growth rates rise as a result of a more educated and skilled workforce. Additionally, social issues such as child marriage, child mortality, maternal mortality, and child stunting decline, leading to healthier and more prosperous communities. Despite these proven advantages, girls' education is often undervalued, especially in poorer families, due to societal norms and the misconception that girls will not contribute financially to their parents. By investing in girls' secondary education, we not only empower individual girls but also create a ripple effect of positive change that transforms societies and drives global progress.

Bullying

In India, the concern is not just about bullying by classmates or seniors, but sometimes teachers act like a bully. This issue transcends verbal or emotional abuse, as instances have been reported where teachers resort to extreme measures for punishment. e.g. In some alarming instances, teachers in India have resorted to extreme measures such as hanging students upside down from buildings, imposing a punishment of performing squats a hundred times, or even resorting to physical beatings with sticks. Children can suffer emotionally due to the power game of the management and teacher.

Emotional Intelligence

Metal health has become a pandemic. Children with high emotional intelligence reduce stress, take responsibility for their actions, treat friends and family members with empathy and compassion.  

Poverty

Education develops skills and abilities to earn a living. Not everyone who is uneducated is in extreme poverty, but those living in extreme poverty do lack basic education. 

Biases and stereotypes

For example, Girls are good at biology and boys are good at maths. We always have a tendency or prejudice toward or against something or someone. With proper scientific education, we can make better decisions and fall less towards biases. 

Reservation

Our education system is designed as a scarce resource. Quality education doesn't scale, as a result, we have limited seats, which leads to the reservation for lower caste to give them a chance for upliftment. 

Costly education

Privatization of schools and colleges has made education costly and inaccessible to a significant portion of the population. The shift towards privatization has resulted in a growing disparity between those who can afford quality education and those who cannot. This has led to a two-tiered system where the wealthy have access to superior resources and opportunities, while the less fortunate are left behind. The high cost of private education often forces families to make difficult choices, such as taking on significant debt or sacrificing other necessities to afford tuition fees. Furthermore, privatization can lead to a focus on profit over educational quality, with schools and colleges becoming businesses that prioritize financial gain over the well-being and success of their students

Grades

Though competition keeps our focus on our goal, many times it turns toxic for grades that leads to "teaching to test" type of education. Thousands of students end their lives every year in India due to the toxic competition culture. 

Outdated syllabus

Due to the centralized and bureaucratic nature of education, it's so difficult to update the curriculum as no one is accountable for it and the curriculum is not updated for many decades. 

Unemployment

We have an education where 80% of engineers are unemployable in India. They lack the knowledge of new-edge technology that is needed for jobs.

Child Labour

A total of 152 million children – 64 million girls and 88 million boys – are estimated to be in child labour globally, accounting for almost one in ten of all children worldwide. In India Census 2011, the total child population in India in the age group (5-14) years is 259.6 million. Of these, 10.1 million (3.9% of total child population) are working, either as ‘main worker’ or as ‘marginal worker’.
We can eliminate child labor providing income for learning.

So, how can Avrit solve these problems?

Work in progress, currently busy in builiding an experimental governance

https://avrit.reaudito.com

A decentralized platform for earning by designing and reviewing the study material or content, assignments, projects, practicals, and assessments.

Avrit has evidence of learning as explainer videos. Instead of the teacher, the student will explain. The explainer script can be prepared by the teacher with the student's collaboration. Explainer script must meet the review guidelines and can be in both English and the native language, making sure the student has understood whatever they are saying. As students do the work, they participate in active learning and there is an increase in engagement. Making explainer videos has so many benefits, it works on multiple skills like critical thinking, improving their vocabulary, communication skills, and comprehension.

Making explainer videos can be hectic for both teachers and students because it causes repetition of work and slows down the process. But repetition and slowing down causes brain to exercise which is key to comprehension and learning. Students engage actively rather than becoming passive listeners of lecture and don't get bored by learning. But it's a one time work for teacher, because explainer script can be used again and again among the students.

Evidence of learning is not limited to explainer videos, it can be anything like practice assignments, real-world projects, or volunteering work like making the neighborhood garbage free.

All are validated by Schelling game, so there is minimal chance of corruption.

It's based on the competition collaboration algorithm:

The Competitive Collaboration Algorithm

When you upload your evidence of learning based on meeting the guidelines of avrit learning by staking, and no one challenges it, you earn 1 AVRIT token. 

The apps like proof of humanity have proved that you can earn passive income just by validating that you are a real human.

Here, in Avrit learning, your evidence of learning is validated and you earn an income. 

As it's decentralized in nature and you earn for learning, girls' education will not be a problem. It will be run by the local community with few students in a group, so chances of bullying are rare. The curriculum will be up to date due to the evidence-based learning strategy guidelines and due to the competition collaboration algorithm. Here teachers have the responsibility to update the curriculum by learning from other teachers rather than any central bureaucratic authority. We can also have teachers' governance that will provide recommendations for curriculum, learning content, and best practices. 

Quality education is no more a scarce resource and is scalable, so reservation is unnecessary, students are evaluated by evidence of learning, which also makes grades unnecessary. 

It's all open-source and as it's on the blockchain, it's not owned by anybody, so no predatory practices by some private ed-tech company.  Currently, governance system is build here.

The only problem we need the execution, where govts, NGOs and edupreneurs can come together for building learning hubs.

Can Avrit protocol be called homeschooling?

Homeschooling is the education of school-aged children at home or a variety of places other than a school. Its depends on definition of homeschooling. You can set up avrit centers or avrit learning hubs at your home, or neighbor's homes, but also in school like building, or in school itself. We do require an educated tutor for educating the children. It's about self-managed, decentralized schooling without power games, private or government ownership of schools, but rather, public ownership. Avrit protocol is not limited to school-aged children but also for college going adults.

Can Avrit schooling be misused to provide religious teaching to children by parents?

Avrit protocol can be run by decentralized governance, and evidence of learning is evaluated collectively, and protected by game theory. So, it's hardly possible to do such things.

Will it disadvantage the poor? Is it sustainable?

Avrit protocol has its own cryptocurrency token with robust token economics and can be further improved. With the increase in popularity, the market cap of the token will rise, a market cap of $1 Billion can provide about 10-100 Million funds per year for students and teachers.

Is it experimental or lack evidence?

Self-managed organizations are not experimental. You can go through the book about teal organizations in the book (Link) for more details.

"The Avrit protocol is based on already existing evidence. The platform can also help in running experiments and demonstrating its validation. It's still in active development, and there is always scope for improvement. Designing governance in blockchain has its own challenges. One needs to codify the governance design into a computer program so that it can be scaled.

Does it mean deregulation of the education system?

It will limit the power of centralized governments and bureaucracy. Being on crypto or blockchain doesn't mean there are no rules and regulations. It will function under the purview of decentralized governance and rules of the smart contract.

Is India a homeschooling country?

India, by its educational practices, can be considered a quasi-homeschooling country, as a significant majority of children spend more than 50% of their study time in home tuition classes. They are still in school because it provides the curriculum, systemization, and guidance on what to study and what not to study. Schools put children in a feedback loop of study, with homework assigned every day to be completed in tuition, and they also conduct exams.

Although the practices of schools are questionable and not optimal, it can be chaotic without them. It's not optimal because the rigid structure and focus on rote learning may hinder a more holistic development of students, raising concerns about the overall quality of education in school. It's chaotic without it because homeschooling is unlikely to provide a systematic, structured, and evidence-based education that truly works.

Parents and tuition teachers, although dedicated, are not necessarily experts in curriculum design. This gap in expertise underscores the need for a centralized board or governance structure to provide comprehensive recommendations and guidelines. What we need is a redesign of the curriculum framework and governance to keep students in the feedback loop.

Homeschooling during COVID-19 times was a dystopian chaos

Homeschooling during the COVID-19 pandemic brought about a dystopian chaos for many families. The conventional school experience, characterized by lively classrooms and face-to-face interactions, underwent a stark transformation. With children confined to their homes, a significant portion of their daily lives revolved around staring at screens, primarily mobile devices, for extended periods. This shift not only altered the nature of education but also disrupted the fundamental aspects of childhood.

Gone were the days of personal communication with friends during breaks or in the hallways. Socialization became a virtual affair, limited to online interactions that lacked the spontaneity and authenticity of in-person connections. The absence of physical presence meant missing out on the subtleties of non-verbal communication and the shared experiences that contribute to the richness of friendships.

Outdoor activities and games, once an integral part of a child's routine, took a back seat during this period. The lack of physical engagement and exposure to nature not only impacted physical health but also contributed to a sense of confinement and monotony. The inability to enjoy the simple pleasures of outdoor playtime added to the challenges of this unique homeschooling experience.

Moreover, the prolonged period of isolation and the constant reliance on digital devices had adverse effects on children's mental health. The absence of regular social interactions, coupled with the uncertainties of the global health crisis, led to increased stress and anxiety levels. The inability to escape the virtual realm and engage in real-world activities contributed to a sense of detachment and, in some cases, exacerbated mental health problems among students.

In essence, the shift to homeschooling during the COVID-19 pandemic created a challenging and surreal environment, deviating significantly from the normative, well-rounded educational and social experiences that children typically undergo.

Who benefits from current homeschooling?

The privatization of schools has already resulted in high and unaffordable fees for middle-class and poor parents. Homeschooling may only lead to the emergence of another set of private and capitalist entities offering closed-source, high-priced online tutorials that are often less effective than private schools. As mentioned earlier, parents cannot homeschool their children by themselves; they need support. Capitalistic advertising companies are likely to take advantage of this and sell services with predatory practices and pricing.

Education is not something that we can fix in a silo

Education is a multifaceted entity that extends far beyond the confines of a classroom or a curriculum. It is a dynamic force that permeates every aspect of our society, influencing the way we live, the values we uphold, and even the political landscape we navigate. The impact of education is not restricted to academic institutions; it echoes through our workplaces and study environments, shaping the way we interact with one another and contribute to the world. In a broader context, education acts as a catalyst for societal progress, fostering innovation, critical thinking, and a collective sense of responsibility.

e.g. One cannot anticipate an improved curriculum if our workforce, comprising teachers, engineers, or doctors etc., is selected primarily through teaching-to-test entrances. Relying on such assessments often prioritizes exam-oriented teaching, emphasizing memorization over fostering critical thinking and practical skills. To enhance the curriculum, reforming the selection processes for professionals is crucial, aligning them with broader educational goals for a more well-rounded and capable workforce.

Additionally, one cannot expect a socialist curriculum if the workforce is structured to serve capitalism. Furthermore, proper curriculum reform cannot be anticipated if politics is highly centralized.

Furthermore, the interconnectedness of education spans across various fields, illustrating its flexibility and adaptability. Interdisciplinary education seamlessly integrates knowledge from diverse fields, fostering a holistic understanding that transcends traditional disciplinary boundaries. In the realms of medicine, infrastructure, and engineering, interdisciplinary education acts as a catalyst for innovation by encouraging collaboration between experts from various fields, leading to comprehensive solutions and advancements. For instance, the concept of 15-minute cities, where residents can access essential services within a short radius, relies on innovative urban planning and infrastructure design that stems from a well-educated and forward-thinking society. Education, therefore, is not a standalone entity but a dynamic force that weaves its threads into the fabric of our daily lives, influencing our perspectives, decisions, and the very structure of the world we inhabit.

Challenges that need to be overcome to scale education

Scaling education across districts and countries is indeed a complex and challenging endeavor that requires the collaboration of various stakeholders and sufficient resources. One of the key challenges is the need for substantial infrastructure development, which demands significant financial investment. However, with the advent of blockchain technology and cryptocurrencies, innovative funding mechanisms using smart contracts can be leveraged to support the necessary infrastructure without solely relying on governmental or wealthy sources.

Nonetheless, establishing a decentralized governance system that effectively manages and optimizes educational processes is a daunting task. It entails iterative algorithm optimization based on new evidence, experimentation, advocacy, and the implementation of improved curriculum and evaluation systems.

As a tuition teacher for few years with a unique professional background in interdisciplinary research, spanning computational biology and computer science, I had the valuable opportunity to evaluate the diverse needs of students from various backgrounds and learning levels. Each student brings their own set of experiences, and understanding these differences is crucial to tailoring effective teaching methods. However, creating systemic change in education and ensuring that every student receives a quality education goes beyond the efforts of a single teacher. It demands the collective dedication and collaboration of an entire teacher workforce.

Managing and coordinating such a labor force adds another layer of complexity to the challenge of scaling education. It is important to acknowledge that addressing these challenges requires a multi-faceted approach involving technological innovation, financial resources, and the active participation of educators and stakeholders.

The goal is to start small, with a few teachers at the table, and establish a suitable governance model built on smart contracts. We will iterate, improve, and scale as we go. Experiments in education tend to take longer, as learning is a years-long process. Completing a single book or course can take several months or even years of time.

Rethinking Work Culture in India: Unveiling the Potential of Remote and Flexible Work for Productivity, Well-being, and Diversity

Productivity describes various measures of the efficiency of production.

Most Indian bosses are obsessed with more working hours, but the paradox is the more working hours you have the less productive you become.

The Relationship Between Hours Worked and Productivity

https://cs.stanford.edu/people/eroberts/cs181/projects/crunchmode/econ-hours-productivity.html

According to data provided by Ohio University, the average worker is productive for two hours and 53 minutes out of an 8-hour workday.

https://onlinemasters.ohio.edu/blog/benefits-of-a-shorter-work-week/

Six hour workday

But its not only about productivity but its also about income. In India, a newcomer researcher, programmer or engineer is exploited with long working hours by giving them as low as Rs. 5000 to 10000 per month.

You have to pay room rent, transportation charges, electricity bill, for food and clothing.

The travelling time, which can take more than 4 hours per day due to heavy traffic and bad roads, drains all your energy and makes your productivity even more worse

It also affects your well being and mental health. 

People who work from home all the time ‘cut emissions by 54%’ against those in office

Study in US shows one day a week of remote working cuts emissions by just 2% but two or four days lowers them by up to 29%

https://www.theguardian.com/environment/2023/sep/18/people-who-work-from-home-all-the-time-cut-emissions-by-54-against-those-in-office

Challenges of Working from Home for Women in India: Caregiving and the Patriarchal System

Working from home has had adverse consequences for women, particularly working mothers, as evidence reveals their increasing responsibility not only in childcare but also in various other family and household care duties. The COVID-19 pandemic and the shift to remote work have exposed the persistent gender disparities in India's patriarchal system, where traditional gender roles and expectations often place the bulk of caregiving responsibilities on women. With the closure of schools and limited access to external support, many working mothers have had to navigate the challenging task of balancing their professional commitments with an increased load of childcare and family care. This situation highlights the urgent need for a more equitable distribution of family responsibilities, along with supportive policies and workplace structures that acknowledge and address the gender imbalances that continue to prevail in India's patriarchal society. Empowering women in the workforce while promoting shared responsibilities in caregiving is essential for achieving gender equality and improving the overall well-being of working women.

Flexible working can significantly improve heart health, study shows

https://www.theguardian.com/society/2023/nov/09/flexible-working-can-significantly-improve-heart-health-study-shows

Most Workers feel stress on the job

Based on a survey from the American Institute of Stress, “80% of workers feel stress on the job, nearly half say they need help in learning how to manage stress and 42% say their coworkers need such help.” In fact, job stress tends to rank as a higher stressor than the economy, family responsibilities, and even personal health concerns. Other studies report similar findings: Forbes reports that “overall employee stress levels have risen nearly 20% in three decades.” According to the Center for Workplace Mental Health, “Excessive workplace stress causes a staggering 120,000 deaths and results in nearly $190 billion in health care costs each year.”

Stress report

Work Stress: Causes, Symptoms, and Solutions

Companies With Flexible Remote Work Policies Outperform On Revenue Growth:

The Report**

Employees frustrated with their CEOs’ return-to-office mandates have tried arguing that remote work is linked with greater productivity. That it helps the environment with fewer commutes and improves diversity by broadening the talent pool. Now, they may have another argument to get their CEOs’ attention: Higher revenue growth.

The report shows that the three-year industry-adjusted revenue growth rate of companies that have what Scoop calls a “fully flexible” policy—meaning they allow employees or teams to choose when or whether they come to the office, or are fully remote—is 21%. Companies in the data set with more restrictive policies—say, those that have corporate mandates for a couple days per week or those that require full-time work in the office—had only a 5% industry-adjusted revenue growth rate, the analysis found. When excluding the tech industry over the same period, public companies that were “fully flexible” outperformed by 13 percentage points.

Lovich, whose firm worked on the analysis with Scoop, says the report doesn’t yet show that flexible policies cause higher revenue growth. Rather, she says flexible policies are one likely “symptom” of a culture that trusts workers, has other employee-friendly benefits and values forward-thinking strategies, technology and ideas. “If they’re less restrictive on [remote] work policies, they’re probably more pro-innovation, more purposeful and more engaging,” Lovich says, all of which could lead to higher revenues. “I doubt those companies would be taking attendance and measuring badge swipes.”

Unlocking Global Talent: The Power of Fully Remote and Flexible Work in Fostering Diversity and Driving Organizational Success

In today's interconnected world, the shift towards fully remote work has become instrumental in cultivating a more diverse and dynamic workforce. This transformation extends beyond geographical boundaries, allowing organizations to access talent pools from various states and countries. The collaboration of individuals with diverse backgrounds, experiences, and skill sets enhances the workplace's richness and contributes to the success of the organization.

Fully remote and flexible work bring people together from different countries, promoting collaboration among individuals who may have been initially hesitant to participate. Remote work significantly impacts fostering a culture of inclusivity, unlocking global talent, and contributing to the prosperity of forward-thinking organizations.

A guide to distributed teams

https://increment.com/teams/a-guide-to-distributed-teams/

Without good judgment your creativity will lead to projects that make no sense.

Logic

https://iambrainstorming.wordpress.com/2017/01/14/all-books-that-dont-meet-the-learning-criteria-must-be-taken-off/

Key Remote Work Statistics

https://www.forbes.com/advisor/business/remote-work-statistics/

As of 2023, 12.7% of full-time employees work from home, while 28.2% work a hybrid model

Currently, 12.7% of full-time employees work from home, illustrating the rapid normalization of remote work environments. Simultaneously, a significant 28.2% of employees have adapted to a hybrid work model. This model combines both home and in-office working, offering flexibility and maintaining a level of physical presence at the workplace .

Despite the steady rise in remote work, the majority of the workforce (59.1%) still work in-office. This percentage underscores the fact that while remote work is on an upswing, traditional in-office work is far from obsolete.

By 2025, 32.6 million Americans will work remote by 2025

Looking ahead, the future of remote work seems promising. According to Upwork, by 2025, an estimated 32.6 million Americans will be working remotely, which equates to about 22% of the workforce. This projection suggests a continuous, yet gradual, shift towards remote work arrangements.

98% of workers want to work remote at least some of the time

Interestingly, workers’ preference for remote work aligns with this trend. A staggering 98% of workers expressed the desire to work remotely, at least part of the time. This overwhelming figure reflects the workforce’s growing affinity towards the flexibility, autonomy and work-life balance that remote work offers.

93% of employers plan to continue conducting job interviews remotely

From the employers’ perspective, the acceptance of remote work is evident as well. A remarkable 93% of employers plan to continue conducting job interviews remotely. This indicates a willingness to adapt to virtual methods and signals the recognition of remote work as a sustainable option.

16% of companies operate fully remote

About 16% of companies are already fully remote, operating without a physical office. These companies are pioneers in the remote work paradigm, highlighting the feasibility of such models and paving the way for others to follow.

It's Time to Retire the Phrase 'Hybrid Work' or 'Work from Home'

https://time.com/charter/6302454/its-time-to-retire-the-phrase-hybrid-work/

Flexible, not remote

The word “remote” means too many things now.

It gets used to describe the working arrangements of people who live as digital nomads, those who work from home, and those who work from anywhere.

Muddling things even further, it’s also used to describe a movement around flexibility and choice—and inaccurately so. Time and again, research has demonstrated that what most people want isn’t necessarily full-time work outside an office, but the freedom to work where, and when, they’re at their best. They want a blend of regular time together with their team, and autonomy at the team level to figure out what’s right for them.

And even more, they want schedule flexibility. The ability to break away from assumptions that the nine-to-five window is always open for meetings or interruptions is more desired by employees—and has a much bigger impact on their engagement and outcomes—than location flexibility. For every executive worried about productivity and thinking about office policies, let’s take a step back and look at the bigger problem: You have too many hours wasted, and too little focus time for people to do good work.

Distributed, not hybrid

“Hybrid” is most often used to describe a setup requiring a minimum number of days in the office for the entire organization—a one-size-fits-all that we’d never apply to customers, but do to our most important asset, our people.

The first issue with such policies is that the needs and rhythms of teams are highly variable. Take one example my co-authors and I described in our book How the Future Works: At the biotech company Genentech, the R&D lab workers have different needs than the finance team or the operations team. Sales teams have different rhythms than engineering teams. In any organization, a schedule that serves one team will inevitably hinder another.

The bigger problem, though, is that hybrid-work setups too often stop at a simple solution (for example, “three days a week in the office to be with your team”) when in reality almost any medium or large organization is distributed. The more you grow, the greater the likelihood that employees aren’t all showing up to work in the same city, let alone the same office. Leading a workforce that’s spread out across cities and time zones creates a need for more active coordination, higher dependence on digital tools, and proactive training of managers.

The rise of remote workers is only one part of the broader growth of teams that are distributed across buildings, cities, and time zones.

Leading distributed teams is a challenge that requires training, the right tools, and support. But one of the great discoveries of the pandemic was that every worker who didn’t work from “headquarters” could find themselves on a level playing field with those who did. So it shouldn’t surprise anyone, when companies announce that four days a week in the office is essential for team-building, that employees don’t buy it.

One intriguing example of a distributed workforce is blockchain governance, such as the OpenGov of Polkadot. In this system, your work is approved and paid through consensus, allowing you to work independently. Additionally, it features a tipping system with varying amounts of funds allocated for different types of work.

Outcomes, not productivity

Productivity measures are blunt instruments that make little sense in a world where the most important aspects of work are complex, creative, and interdisciplinary. But we keep trying to use them, often in the worst ways. Recent Slack research found that 60% of executives rely on “visual activities” (hours logged in, emails sent) as the main way to measure productivity. Metrics like revenue per employee aren’t much better: If it’s declining, is that because employees are less productive, or is it the economy, your competition, their training, your overhiring, or any of a raft of other reasons?

One thing is certain: If all managers are trained to do is manage employees based on hours worked, you’re clearly not getting the best out of your teams. We need to shift to the hard work of building outcomes-driven organizations, a process that requires creating clear, prioritized objectives and ways to measure progress.

Outcomes-driven management also creates the potential for more inclusive organizations. For too long, hustle culture—rewarding those who show early and stay late—has provided a favorable advantage to those without caregiving responsibilities, as well as those who can afford to live closer to the office. By prioritizing actual output over the visible trappings of work, organizations can improve business results and create a more level playing field.

One need to also take account tyranny of share holders in outcomes.

The concept of the "tyranny of shareholders" refers to a situation in which corporations prioritize the interests of their shareholders above all other stakeholders, such as workers, suppliers, consumers, and communities. This approach to corporate governance is often associated with the doctrine of "shareholder primacy," which asserts that the primary purpose of a corporation is to generate profits and maximize shareholder value. While maximizing shareholder value is a critical aspect of corporate governance, the exclusive focus on it can lead to negative consequences for other stakeholders.

Phase out fossil fuel subsidies


categories:

  • "climate-change"
  • "fuel-price-hike" tags:
  • "climatechange"
  • "fuelpricehike"

Fossil fuels are widely recognized as unsustainable, necessitating the development of a comprehensive plan to transition towards decentralized solar power production.

The housing infrastructure in many parts of India is characterized by urban sprawl, with semi-urban cities predominantly featuring two to three-story buildings. These structures offer a promising opportunity for harnessing clean energy through rooftop solar installations. In contrast to Britain, where over 65% of homes are suitable for solar panels, India boasts an even greater potential, can be more than 70% to 80% of houses being conducive to solar energy adoption. This underscores the significant scope for expanding solar power utilization in India's residential sector.

Over 65% of homes in Britain can work for solar panels

https://www.ecotricity.co.uk/our-news/2023/over-65-of-homes-in-britain-can-work-for-solar-panels

Setting up rooftop solar systems may initially appear to be a bit expensive for a middle-class family to invest in. However, it's crucial to note that the cost should be evaluated not just in terms of the initial investment but also in relation to the potential profit and payback over time.

While the upfront costs of installing rooftop solar panels might seem daunting, the long-term financial benefits often outweigh the initial expenses. The return on investment (ROI) for solar installations is relatively high, leading to considerable savings on electricity bills over the years.

Solar Saving

Switching The World To Renewable Energy Will Cost $62 Trillion, But The Payback Would Take Just 6 Years

News Link

Solar panels has the capacity to generate enough electricity to power essential household appliances such as an induction cooker, an air conditioner (AC), or even charge an electric bike, making it a feasible and sustainable energy solution for a typical middle-class family.

Beyond meeting immediate energy needs, one notable advantage of solar power is the potential for surplus electricity generation. In the event that the solar panel produces more energy than the household requires, the excess power can be redirected to the grid. This not only contributes to the overall energy supply but also provides an opportunity for the family to earn money through mechanisms like net metering.

Net metering allows homeowners to receive compensation or credits for the surplus energy they feed back into the grid. This financial incentive not only promotes self-sufficiency but also encourages the adoption of solar technology as a means of not just meeting personal energy needs but actively contributing to the broader energy infrastructure.

Please don't argue the rise of fuel prices for providing unsustainable subsidies on the Ujjwala scheme, build a self-sustainable system by making every household a power generator.

The surge in gas cylinder prices has become a focal point of intense political discourse, particularly due to its substantial impact on the middle class and the economically disadvantaged. While acknowledging the repercussions of rising gas prices on these segments of society, it is crucial to recognize that subsidizing gas is not a sustainable solution.

Instead, a more viable approach involves making substantial investments in renewable energy sources such as solar and wind, coupled with advancements in energy storage technologies like batteries. This strategic shift towards renewables can not only address the immediate concerns about the affordability of energy but also pave the way for a more sustainable and decentralized power infrastructure.

Please stop providing coal subsidy

AAP under the leadership of Arvind Kejriwal, who claims to bring political revolution is providing 200 units of free electricity to people. They are subsidizing coal-produced electricity instead of using that money for producing sustainable renewable energy. 200 units per 5 year cost Rs 72000. At this cost everyone can easily install rooftop solar panels in their homes for free, and also sell the surplus and become energy self-sufficient instead of depending on govt. The solar panel life span is about 20 years, so people can generate electricity for 20 years. Instead of bringing sustainable policy, they want the future of our children and grandchildren on the brink of catastrophe due to climate change.

Update on Solar Panel policy by AAP govt

Although India missed its target of achieving 100 GW of solar power by 2023, globally, the country stands 5th in solar PV deployment as per REN21’s Global Status Report 2023 & IRENA’s Renewable Capacity Statistics 2023. With zero bills for rooftop solar panels and incentives, residential consumers can still lead the change toward a greener future. States are now coming up with their policies for solar rooftop installation to get residential consumers involved. For instance, Delhi's Solar Policy 2024 offers residential consumers zero electricity bills by installing rooftop solar panels. Chief Minister Arvind Kejriwal's initiative includes incentives, like the Generation Based Incentive (GBI), making solar power accessible and profitable. With a 2kW rooftop solar plant, consumers see a return on investment in just 4 years, setting a green energy precedent for India.

A detailed explanation of the rooftop solar policy

One can also provide zero-interest loans along with the policy so that people can pay in installments or EMIs to afford the solar panel. This will further reduce the roadblock or hesitance of users to install solar panels.

Poor states states like Odisha, Jharkhand, Chhattisgarh are very much dependent on coal revenue. It all about politics. This must change, political pressure must be build on these state.

Governments Spent Record $1 Trillion Subsidizing Fossil Fuels Last Year

This decentralization of power generation at the community level can lead to a significant reduction in electricity prices, and in some cases, it has the potential to bring the cost down to zero.

Zero bill

Zero electric bills can be a reality in your city. Don't be misled by the gimmick of a zero fossil fuel electricity bill, and don't tolerate overpriced fossil fuel electricity. In both cases, the fossil fuel industry profits, either through subsidies or price gouging.

Adani imported ₹13,000 crores of coal at above market value so crores of Indians overpay for electricity.

https://www.ft.com/content/7aadb3d7-4a03-44ba-a01e-8ddd8bce29ed

Price gouging is the practice of increasing the prices of goods, services, or commodities to a level much higher than is considered reasonable or fair.

It is criminal to finance the fossil fuel industry, and banks need to cease such practices.

Banks continue to provide substantial financing to the fossil fuel sector

According to the annual 'Banking on Climate Chaos' report by NGOs, the top 60 global banks provided $673 billion in financing to coal, oil and gas producers in 2022.

https://www.lemonde.fr/en/environment/article/2023/04/17/banks-continue-to-provide-substantial-financing-to-the-fossil-fuel-sector_6023235_114.html

UNDP’s Policy Toolkit for a Fair Energy Pricing Reform

Fossil fuel subsidies reform could limit climate change while tackling global inequalities. Here's how.

Step 1: Phase out fossil fuel subsidies

Step 2: It has been said many times over, and we do so again... Put a price on carbon!

Step 3: Redirect money towards the people and make investments that are in line with the SDGs

Marketing teams can be build and door to door campaigns, road shows can be done along with installation support to aware people about climate change, and financial benefits they are going to get by becoming an electricity supplier to the grid.

Clean energy also helps to fight climate change.

Hundreds of people lost their lives within a week due to heat waves in India. The provision of subsidies for coal electricity raises ethical concerns and carries severe consequences, akin to what some argue could be compared with genocidal crimes.

https://time.com/6288119/india-heat-wave-2/

Solar is now ‘cheapest electricity in history’, confirms IEA

https://www.carbonbrief.org/solar-is-now-cheapest-electricity-in-history-confirms-iea/

  • Renewable energy sources are all around us

  • Renewable energy is cheaper

  • Renewable energy is healthier

  • Renewable energy creates jobs

  • Renewable energy makes economic sense

About $7 trillion was spent on subsidizing the fossil fuel industry in 2022, including through explicit subsidies, tax breaks, and health and environmental damages that were not priced into the cost of fossil fuels.

In comparison, about $4 trillion a year needs to be invested in renewable energy until 2030 – including investments in technology and infrastructure – to allow us to reach net-zero emissions by 2050.

https://www.un.org/en/climatechange/raising-ambition/renewable-energy

Do solar panels take away terrace space, which is typically used for social gatherings and leisure activities?

Integrated solar panels, as shown in the attached photo, not only generate energy but also save or create usable space for gathering or activities. You can have many similar designs.

Integrated Solar Panels

Integrated Solar Panels

Building Integrated Photovoltaics (BIPV)

BIPV in one Article

Why Fossil Fuel Companies Can’t Leave Resources Stranded?

Huge legal, political, and economic obstacles stand in the way of limiting global temperature rise to 1.5 C.

The strategies would include light-speed development of a renewable energy infrastructure, especially power grids that can support a massive increase in renewable production. They would include policies to produce huge growth in energy efficiency — an unfortunately unsexy solution compared to megascale wind turbines and vast solar arrays. And they would include aggressive campaigning to support politicians willing to advocate for the hellishly difficult policies — such as ending fossil fuel subsidies and levying a carbon tax — needed to meet the climate crisis.

Oil Dependence Is a Dangerous Habit

Oil dependency poses a multifaceted danger to nations. First and foremost, relying on oil imports from "dangerous or unstable" countries can inadvertently fund and sustain regimes that may harbor anti-democratic sentiments or engage in actions contrary to the interests of importing nations. The financial support provided through oil purchases may inadvertently empower governments with questionable human rights records or hostile foreign policies. Additionally, the global demand for oil, driven by major consumers of importing countries, can elevate oil prices. Situations like wars, such as the conflict between Russia and Ukraine, can further escalate prices, exacerbating the economic strain on nations heavily dependent on oil imports.

Furthermore, the economic disparities resulting from oil dependence exacerbate tensions within oil-rich nations. The failure of many regimes to distribute oil revenues equitably contributes to social unrest and violence. Instances of oil-related violence in countries like Nigeria highlight the dangerous consequences of relying on a resource that can intensify internal conflicts. The unequal distribution of wealth from oil revenues not only destabilizes nations but also perpetuates global inequalities, contributing to a cycle of conflict and underdevelopment.

To address these challenges, a shift towards renewable energy sources is crucial. By embracing renewable energy, countries can become more energy secure and independent. This transition not only mitigates the geopolitical and economic risks associated with oil dependency but also contributes to a more sustainable and equitable global energy landscape. Embracing renewable energy technologies is not only a practical necessity but also a step towards fostering international cooperation and addressing the shared challenges posed by reliance on fossil fuels.

Disparity in Carbon Emissions: Wealthiest 1 Percent Outpace Poorest Half, Straining Global Climate Goals

Carbon emissions of richest 1 percent more than double the emissions of the poorest half of humanity

The report assesses the consumption emissions of different income groups between 1990 and 2015 – 25 years when humanity doubled the amount of carbon dioxide in the atmosphere. It found:

  • The richest 10 percent accounted for over half (52 percent) of the emissions added to the atmosphere between 1990 and 2015. The richest one percent were responsible for 15 percent of emissions during this time – more than all the citizens of the EU and more than twice that of the poorest half of humanity (7 percent).
  • During this time, the richest 10 percent blew one third of our remaining global 1.5C carbon budget, compared to just 4 percent for the poorest half of the population. The carbon budget is the amount of carbon dioxide that can be added to the atmosphere without causing global temperatures to rise above 1.5C – the goal set by governments in the Paris Agreement to avoid the very worst impacts of uncontrolled climate change.
  • Annual emissions grew by 60 percent between 1990 and 2015. The richest 5 percent were responsible for over a third (37 percent) of this growth. The total increase in emissions of the richest one percent was three times more than that of the poorest 50 percent.

Carbon Footprints in 2030

Indian Ocean in permanent heatwave

A new study shows the steady warming of the Indian Ocean, and predicts that the ocean will be in a 'permanent heatwave' state by the end of the century.

Ban plastic bottles of coca cola and water bottles

date: "2023-03-09"


categories:

  • "climate-change"
  • "policies"
  • "politics"

Million Plastic bottles every minute

A million plastic bottles are bought around the world every minute and the number will jump another 20% by 2021

Some key facts:

  • Half of all plastics ever manufactured have been made in the last 15 years.

  • Production increased exponentially, from 2.3 million tons in 1950 to 448 million tons by 2015. Production is expected to double by 2050.

  • Every year, about 8 million tons of plastic waste escapes into the oceans from coastal nations. That’s the equivalent of setting five garbage bags full of trash on every foot of coastline around the world.

  • Plastics often contain additives making them stronger, more flexible, and durable. But many of these additives can extend the life of products if they become litter, with some estimates ranging to at least 400 years to break down.

https://www.nationalgeographic.com/environment/article/plastic-pollution

Plastic bottles are not recyclable

The Recycling Myth
Big Oil’s solution for plastic waste littered with failure

https://www.reuters.com/investigates/special-report/environment-plastic-oil-recycling/?utm_source=pocket_reader

Bring Back Refill

The report details Coca-Cola’s role in the rise and fall of the refillable glass bottle – exposing how the company knew that single-use plastic bottles were worse for the environment but doubled down on them all the same.

Coca cola bottle

Report: Bring Back Refill, Calling on Coca-Cola, the Beverage Industry and Policymakers to Bring Reusable Beverage Bottles Back

How Coke killed refillable bottle?

Why we should move to tetrapack?

Many layers

Cartons are made mostly (about 75 per cent) from wood. Aseptic cartons (those that don’t need refrigeration) then use a layer of aluminium to preserve the product and layers of plastic to seal the container. Non-aseptic cartons (for fresh products with shorter shelf lives) don’t need aluminium.

'We always knew we were green and we thought it’d be obvious to everyone else since cartons come from trees,' he says.

Scientific Evidence: LCA analysis

With consumers increasingly preferring scientific evidence to heart-felt assumptions, a number of LCAs have been produced over the last few years. A peer-reviewed study commissioned by Tetra Pak, which compared the Tetra Recart (the name of the tomato container) and steel cans, provided stark results: steel cans use twice as much energy during their life cycle as cartons, they produce 2.5 times more waste and more than three times the amount of CO2 emissions.

https://theecologist.org/2010/jan/19/how-green-are-tetrapak-food-cartons

Will tetrapack lead to more cutting of trees?

One need to grow more bamboos.

The environmental benefits:

    Renewable – Bamboo grows rapidly. It’s an abundant renewable resource, making it an ideal, eco-friendly alternative to traditional paper products.

    Biodegradable & Compostable – Bamboo is biodegradable and 100% compostable within 2–6 months, depending on your specific product and composting conditions.

    Carbon footprint – Bamboo releases 35% more oxygen into the atmosphere than the same volume of trees. By supporting the bamboo market, you’re supporting the continued carbon emission reduction caused by bamboo plants.

https://www.goodstartpackaging.com/guide-to-bamboo-packaging/

Coca cola says they will lose customer if they move away from plastic bottles

To bring the change, its needs political movement, there is enough corporate lobby, fossil fuel industries like Ambani are the supplier of plastic, coca cola says they will lose customer if they move away from plastic bottles.

RIL (Reliance Industries Limited), one of world’s largest producers of single-use plastics.

Through cultivation of bamboos, farmers will be benefited rather than Ambanis, also you are protecting the environment by planting more carbon neutral trees.

What will a boycott of the national currency give us?

Building better cities

7 principles for building better cities

More than half of the world's population already lives in cities, and another 2.5 billion people are projected to move to urban areas by 2050. The way we build new cities will be at the heart of so much that matters, from climate change to economic vitality to our very well-being and sense of connectedness. Peter Calthorpe is already at work planning the cities of the future and advocating for community design that's focused on human interaction. He shares seven universal principles for solving sprawl and building smarter, more sustainable cities.

- 7 principles for building better cities | Peter Calthorpe

HappiCitites

Urban Sprawl, slums vs skycrapers

Service providers need not have to build sprawl for providing housing for services but skyscrapers

Urban sprawl or suburban sprawl mainly refers to the unrestricted growth in many urban areas of housing, commercial development, and roads over large expanses of land, with little concern for urban planning

Urban Sprawl

The Course of Farming

Discover Best Practice Farming for a Sustainable 2050 A multi-disciplinary approach to solve wide range of issues confronting the agricultural industry.

Although this course is based on agriculture, it's not only about farming. It is a multi-disciplinary course that addresses a wide range of issues confronting the industry, including rural communities, rural infrastructure and conservation of biodiversity in agriculture. By completing this course you will understand that feeding and clothing the planet requires a multi-disciplinary approach and upon completion you will be able to explain best practices of sustainable farming and apply them in new contexts.

https://www.coursera.org/learn/best-practice-farming-sustainable-2050#syllabus

In all scenarios, we will have about 10 billion humans on the planet by 2050.

Population

How to build dense and self sustainable forest near your cities?

Trees

https://www.afforestt.com/methodology

The Miyawaki Technique is a unique methodology proven to work worldwide, irrespective of soil and climatic conditions. More than 3,000 forests have been successfully created worldwide using this methodology.

Upto 30 times more dense compared to conventional plantations.

30 times better noise and dust reduction.

Upto 30 times better Carbon-dioxide absorption as compared to a monoculture plantation.

A completely maintenance-free, wild and native forest after the first three years.

A completely chemical and chemical fertiliser free forest that sustains itself and supports local bio-diversity.

Exploring the Pathways Between Urban Green Space and Mental Health

Green space has been found to have a significant impact on mental health, contributing to psychological relaxation and reduced stress levels. A growing body of research supports the idea that urban green space can improve residents' mental health by stabilizing emotions and releasing stress. Living in areas with higher levels of greenness has been linked to lower levels of mental distress and higher life satisfaction.

While the benefits of urban green space for mental health are clear, understanding the mechanisms behind these benefits is crucial for informing effective urban planning and design. Current challenges in this research field include defining the mediators of green space's beneficial effects and distinguishing them from measures of green space or mental health. The Article: How Does Urban Green Space Impact Residents’ Mental Health: A Literature Review of Mediators seeks to summarize the current mediators and identify the impact paths of different mediators, taking into account the heterogeneous effects of different types of green spaces and residents with varying socioeconomic characteristics.

After conducting a thorough literature search and selecting relevant studies, this review identifies three primary mediators between urban green space and mental health: environmental factors, outdoor activity, and social cohesion. Environmental factors, such as cleaner air and reduced noise pollution, contribute to mental health by directly reducing physical damage and increasing visual benefits. Outdoor activity, facilitated by accessible green spaces, encourages physical activity and social interaction, which can boost mood and reduce stress. Social cohesion, fostered by green spaces that encourage neighbor interactions and a sense of community, can also positively impact mental health. Understanding these mediators and their impact paths can inform effective urban green space planning and policymaking, ultimately promoting better mental health outcomes for urban residents.

How can we decentralize the construction of brick-and-mortar houses?


categories:

  • "blockchain"
  • "governance"

This is why construction is so corrupt

Global Corruption Report 2005: Corruption in construction and post-conflict reconstruction

Diversity of Housing Design

No two buildings or skyscrapers are identical. Engineers can craft various sustainable designs and gain approval from the decentralized governance. These designs may incorporate diverse features such as supermarkets, playgrounds, office spaces adaptable for remote work, natural parks, and forests. Additionally, inclusive community amenities like schools and hospitals contribute to a well-rounded environment.

Free Market: Demand and Supply Transactions and Investments

Consider an investment scenario: a skyscraper costing 10 Crore, requiring 5000 people to contribute Rs 20,000 each. These investors, whether from different countries, states, or the same locality, each own shares worth Rs 20,000 in the property. Residents of the house pay for their shares through installments, facilitated by systems like Universal Basic Income (UBI), incurring a minimal 1-5% interest; these interest payments go to the investors. The entire housing construction supply chain is automated through smart contracts, ensuring efficiency and cost-effectiveness.

Smaller skyscraper with smaller budgets can also be done, and also good for experimentation to start with.

To deter speculative practices and ghost housing, local rent seekers stake an amount upfront to secure rental reservations. The stake is only released upon the completion of the last ownership installment, akin to a prepaid plan.

If one use a native token instead of a stable coin, it's challenging to pay installments with a fixed native token due to price fluctuations. The price of the native token can be determined through the price oracle, allowing you to pay the installment value in native tokens based on the stable coin's value, without need of stable coin. The native token proves useful for designing incentive systems for governance and investments.

Governance Involvement

The governance structure involves various stakeholders, including those who have invested money, rent seekers, engineers, local communities, and environmentalists. Each stakeholder may have different voting power based on their expertise and integrity. Effective voting methods are implemented to make decisions collectively.

Reducing Bureaucracy through Governance Approval

Ensuring the safety, longevity, and earthquake resistance of housing is imperative. One also needs to put a halt to the unoptimized use of land, including issues like urban sprawl and ask for sustainable energy sufficient (e.g using solar panels) housing design. The governance body monitors the entire process, from building design approval to construction. If an engineer or worker deviates from the expected standards, the governance system has the authority to vote them out.

Transparent Pricing and Accounting of Materials

Material suppliers participate in a transparent bidding or auction process. The skyscraper's governance approves material selections based on quality and pricing, ensuring accountability in the construction process.

Transparent Payment to Engineers and Workmanship

Transparent payment systems are in place for engineers and workers, promoting accountability and fair compensation.

Discouraging Landlord Issues

Landlords in cities have become a problem with inflated house rents and also contribute to wealth inequalities. To combat these issues, housing can be owned collectively by the community. To discourage traditional landlord practices without compromising housing investments, an incentive system within the smart contract can be implemented. For example, one can allocate a portion of the rent to the owner who has paid the full transaction fees for the room, and the remaining portion can be directed to a community treasury.

Road Planning for Cities

date: "2023-05-27"


categories:

  • "city-planning"

Cycle Lane in Median

Road planning

A cycle lane located in the median effectively addresses the issue of encroachment, such as unauthorized parking of cars and pedestrians using the cycle lane for walking.

However, the presence of a cycle lane in the median poses a challenge when cyclists need to exit the lane to reach destinations such as markets or homes. To mitigate this issue, it is essential to construct suitable traffic signals and bridges that facilitate safe transitions for cyclists.

Cycle lanes on the sides and unauthorized parking

Cycle lane on side

An alternative approach to consider is the implementation of cycle lanes on the sides of national highways, which may not be suitable for within cities. It's important to note that unauthorized parking is primarily a concern within cities, rather than on highways. indicates trucks only when bus is not present, Trucks can operate during nighttime when there is reduced traffic from buses and cars.

In India we do need a motorcycle/ebikes lane as motorcycle are also efficient modes of transport like cycling and one in three households in India own motorcycle. Also, due to hot weather of India, cycling can be exhausting. Without a motorcycle lane problem will be like this:

Motor Cycle

Bicycles, Hot Weather and 15 mins cities

In India, bicycles face challenges when it comes to widespread adoption due to the hot weather. You can start perspiring within just 5-10 minutes of riding. India's climate differs significantly from that of the Netherlands, where cycling is more popular. Additionally, winters in India now last less than two months a year due to climate change. However, you can still consider using electric cycles (e-cycles) and electric bikes (e-bikes) as eco-friendly alternatives to cars.

You can conduct a small experiment. I walked for 2.5 kilometers at 10 AM when the sun was shining. I was almost completely exhausted due to the humidity and hot weather. However, I can walk in the early morning before 7 AM or in the evening after 6 PM.

So, you can still take walks in the early morning and evening, even during the hot summer. This habit can greatly benefit your mental and physical health.

Additionally, constructing 15-minute cities can address the issue of exhaustion, as it minimizes the need for extensive travel by keeping destinations within a short distance.

One can also construct cycling and pedestrian lanes with integrated solar panels on top, providing shade to the lanes. This not only protects you from the sun but also generates renewable and non-polluting energy.

Cycle track with integrated solar panels in Hyderabad

Cycle track solar pannel

Green Canopy: The Impact of Urban Trees on City Environments

We can also have a tree canopy on the roadside to decrease the temperature. Due to the continuous widening of roads, we cut down trees instead of planting them. We also hardly provide them enough time to grow, widening the roads again and cutting them down.

Compared to continuous urban fabric, land surface temperatures (LSTs) observed for urban trees are on average 0-4 K (or 0-4°C) lower in Southern European regions and 8-12 K (8-12°C) lower in Central Europe. Treeless urban green spaces are overall less effective in reducing LSTs, and their cooling effect is approximately 2-4 times lower than the cooling induced by urban trees.

Trees influence urban climate primarily via shading and transpiration and also via albedo. Shading can strongly reduce daytime LSTs and air temperature.

- The role of urban trees in reducing land surface temperatures in European cities

Trees Temprature

Why are bike/cycle lanes empty?

Next time someone criticizes an "empty bike lane," remind them it because they’re efficient.

This efficiency contrasts with the congestion and space consumption often associated with cars. The critique should be reframed not as a flaw in the bike lane but as an opportunity to highlight the drawbacks of traditional car-centric infrastructure.

Should we consider banning cars?

It's not about adopting an all-or-nothing approach, but rather the imperative need to significantly reduce car usage with specific exceptions. For instance, we could limit private car use, allowing only public cars for booking, especially during emergencies. Exceptions can also be made for disabled individuals who rely on cars for mobility.

Mobility Pyramid

These Animated Videos Show Just How Much Space Cars Waste In Our Cities

https://www.fastcompany.com/3063344/these-animated-videos-show-just-how-much-space-cars-waste-in-our-cities

Can't wait for the road to be widened

One thing we know for SURE — building and widening highways ALWAYS succeeds in helping sell more cars, gas and suburban sprawl; burning more public budgets; and increasing GHG emissions. So if THOSE are your goals, it’s the perfect thing to do.

Just don’t expect it to reduce traffic.

-Brent Toderian

Widened roads for cars

City Traffic Sucks! They Should Widen the roads

More cars

🚌 150 people overtaking 50 people. Separating the lane is not hard.

Car free cities are good for local businesses

For local businesses, car-free areas are very beneficial, as people using alternative transportation are more likely to shop locally and are more loyal to retailers. Even though they tend to not spend as much as car drivers, they visit the shop more frequently. A 2016 study of over 100 cities showed that pedestrian-only streets increased retail sales by around 49%. As many city centres are dying, car-free measures should be considered much more frequently.

Citychangers article

Concrete roads for cars create flooding

Traditional concrete roads are impermeable, meaning water cannot pass through them, causing rainwater to accumulate on the surface and potentially lead to flooding in cities. Some approach like constructing local roads with tiles over a sand base is more permeable. Water can seep through the gaps between the tiles and be absorbed into the underlying sand, thus helping to manage and reduce the risk of flooding by allowing water to infiltrate into the ground.

Tiled roads

Tiles over sand. A simpler solution to the water logging problem, without the use of any advanced technology

Some advanced technology too exists, to make roads permeable to water, more research needs to be done about its practicality.

This 'thirsty' concrete absorbs 880 gallons of water a minute — here's how it works

https://www.businessinsider.com/how-magical-concrete-absorbs-water-2015-9?IR=T

Cars not life

Car count

Cars vs Bus, Bike

Traffic in Gurgaon

Traffic in Gurgaon

Traffic in Hyderabad IT corridor

Get your self a car, looser. What do you think you are?

Effect of Media

Picture a scenario where electric vehicles (EVs) in various countries incur a mere 5% tax, while cycles face a higher tax rate of 12%. Notably, electric cars benefit from subsidies and climate financing, whereas cycles, including e-cycles, do not enjoy any financial support. Economic policies lacking thoughtfulness, influenced by the Bandwagon effect—a narrative perpetuated by capitalists, advertisers, and the media, asserting that EVs and driverless cars are the ultimate solutions— inadvertently result in undesirable consequences.

Media electic cars

Here is a booklet for Street design manual:

https://www.oslo.kommune.no/getfile.php/13441080-1646147194/Tjenester%20og%20tilbud/Plan%2C%20bygg%20og%20eiendom/Byggesaksveiledere%2C%20normer%20og%20skjemaer/Gatenormal%20og%20normark/Gate-%20og%20veinormaler/Street-design-manual_ENG.pdf

5 steps to making better cities

Any city can push itself to be better, but they usually go through this learning curve first.

I’d rather have cities doing the right thing badly (at first), than continuing to do the wrong thing better.

Accidents due to traffic: Addressing Road Safety

Approximately 1.5 lakh people die due to road accidents every year in India. While one may attribute road accidents to traffic, narrow roads, and bad driving, the main underlying reason is the presence of heavy vehicles, particularly cars, which occupy a significant amount of space, leaving little room for pedestrians and bikes. Car-centric roads also require more maintenance, increasing the likelihood that roads will not be repaired, so more accidents. By promoting the use of public transport, such as buses, accident rates can be drastically reduced.

How Cars are Destroying India?

Dhruv Rathee effectively outlined the detrimental impact of cars, yet he took a softer stance on the idea of banning them. While he asserted that an immediate ban would harm the economy, he fell short of providing a thorough explanation.

Banning cars is not analogous to demonetization, where 99% of currency was eliminated, resulting in the loss of at least one million jobs—all for the deceptive rhetoric of combating black money. Although a car ban may pose challenges for the Indian automotive industry, the benefits far outweigh the potential harm. Even tech giants like Google and Facebook have undergone mass layoffs, but displaced employees often find alternative jobs. Prioritizing job preservation at the expense of environmental degradation and pollution reflects myopic/ short-sighted thinking. Employment opportunities can be created by investing in green infrastructure and generating green jobs, like in the public transport sector, which includes the development of electric buses.

Furthermore, a complete ban may cause some discomfort, but practical solutions can be implemented. For instance, a system could be established through a mobile app, allowing individuals to apply for a limited number of car usage instances based on emergencies or specific reasons. Implementing a quota system, such as allowing cars to run 10-15 times every six months, and facilitating car rentals through the app, would address concerns while promoting responsible car usage.

Approximately 5-10 percent of the Indian population owns cars. Therefore, an immediate car ban is unlikely to impact 90% of the population, who rely on public transport and bikes. While public autos may increase, they too need regulation. The wealthy have become a societal disgrace, a trend supported by data indicating that the world's richest 10% contribute to half of the global carbon emissions.

The Importance of Rainwater Harvesting in Urban Planning

In recent years, there has been a growing awareness of the need to conserve water and protect our environment. One effective way to achieve this is through rainwater harvesting, a method of collecting and storing rainwater for various uses. In cities, where water demand is high and natural resources are often overexploited, rainwater harvesting can play a significant role in increasing the groundwater level and reducing the strain on existing water sources. In this article, we will discuss the importance of rainwater harvesting and how cities can be planned to incorporate this sustainable practice.

What is Rainwater Harvesting?

Rainwater harvesting is the process of collecting and storing rainwater from surfaces such as roofs, pavements, and other impervious areas. The collected water can be stored in tanks or recharged into the ground, providing an alternative source of water for various purposes, including irrigation, toilet flushing, and even drinking, depending on the quality of the water.

Why is Rainwater Harvesting Important in Cities?

Groundwater Recharge:

In urban areas, the constant demand for water often leads to the depletion of groundwater resources. Rainwater harvesting can help replenish these resources by recharging the groundwater table, ensuring a sustainable water supply for future generations.

Reducing Dependence on Traditional Water Sources:

With the growing population and urbanization, traditional water sources such as rivers, lakes, and aquifers are becoming increasingly strained. Rainwater harvesting can help reduce the reliance on these sources, ensuring that they remain healthy and sustainable.

Reducing Flooding:

In urban areas, heavy rainfall can often lead to flooding due to the lack of permeable surfaces. Rainwater harvesting can help mitigate this issue by capturing rainwater and preventing it from flooding streets and buildings.

Lowering Water Bills:

By using harvested rainwater for non-potable purposes such as irrigation and toilet flushing, households and businesses can significantly reduce their water bills, saving both money and resources.

Planning Cities for Rainwater Harvesting

To maximize the benefits of rainwater harvesting, cities should be planned with the following considerations in mind:

Incorporate Green Infrastructure:

Cities should incorporate green infrastructure, such as green roofs, rain gardens, and permeable pavements and roads, to increase the amount of rainwater that is captured and recharged into the ground.

Rain Gardens

A rain garden is a garden of native shrubs, perennials, and flowers planted in a small depression, which is generally formed on a natural slope. It is designed to temporarily hold and soak in rain water runoff that flows from roofs, driveways, patios or lawns. Rain gardens are effective in removing up to 90% of nutrients and chemicals and up to 80% of sediments from the rainwater runoff. Compared to a conventional lawn, rain gardens allow for 30% more water to soak into the ground.

Rain gardens are specially designed landscaped areas that capture and absorb rainwater runoff from impervious surfaces such as roofs, driveways, and sidewalks. They are an essential component of sustainable urban planning and green infrastructure, helping to reduce stormwater runoff, filter pollutants, and recharge groundwater.

Key Features of a Rain Garden:

  1. Depression: A rain garden is typically designed as a shallow, saucer-shaped depression in the ground. This allows rainwater to collect and infiltrate the soil, rather than running off into storm drains or nearby water bodies.

  2. Soil: The soil in a rain garden is usually a mix of sand, compost, and topsoil. This special soil blend allows for better water infiltration and supports the growth of native plants.

  3. Native Plants: Rain gardens are planted with native, deep-rooted plants that can tolerate both wet and dry conditions. These plants help absorb and filter rainwater, and their roots create channels for water to infiltrate the soil.

  4. Location: Rain gardens should be strategically placed near downspouts, driveways, and other areas where rainwater runoff occurs. They should also be situated away from buildings and property lines to prevent water damage and ensure proper drainage.

Benefits of Rain Gardens:

  1. Stormwater Management: Rain gardens help reduce the amount of stormwater runoff by capturing and absorbing rainwater, which can alleviate flooding and erosion problems.

  2. Water Quality Improvement: By filtering pollutants and sediments from stormwater runoff, rain gardens help improve the quality of nearby water bodies and protect aquatic ecosystems.

  3. Groundwater Recharge: Rain gardens promote groundwater recharge by allowing rainwater to infiltrate the soil and replenish underground aquifers.

  4. Habitat Creation: Native plants in rain gardens provide food and shelter for local wildlife, creating valuable habitat in urban areas.

  5. Aesthetic Value: Rain gardens can be designed to be visually appealing, adding beauty and value to a property while also providing environmental benefits.

In conclusion, rain gardens are an effective and sustainable solution for managing stormwater runoff and promoting water conservation in urban areas. By incorporating rain gardens into landscaping and urban planning, communities can help protect their local environment and ensure a more resilient future.

The Vital Role of Wetlands in Nature and Society

Building ponds, lakes, and canals helps recharge groundwater resources. When rainwater is collected and stored in these bodies of water, it gradually percolates into the soil, replenishing the groundwater table.

Introduction:

Wetlands are among the most diverse and productive ecosystems on Earth, providing invaluable services to both natural and human communities. From water quality improvement and flood protection to shoreline erosion control and wildlife habitat, wetlands play a critical role in maintaining the health and balance of our planet. In this article, we will explore the importance of wetlands, their ecological functions, and their significance for human society.

Wetlands and Nature:

Wetlands are home to a remarkable variety of species, ranging from microbes and plants to insects, amphibians, reptiles, birds, fish, and mammals. The unique combination of physical and chemical features, such as climate, topography, geology, and water availability, determines the specific assemblage of plants and animals found in each wetland. These diverse organisms are interconnected through complex food webs, where energy and nutrients flow among different species.

The immense productivity of wetlands makes them "biological supermarkets" that attract a wide range of animal species. Dead plant material, known as detritus, decomposes in the water and serves as a food source for small aquatic insects, shellfish, and fish. These organisms, in turn, become prey for larger predators, creating a self-sustaining ecosystem that supports a rich tapestry of life.

Wetlands and People:

Historically, wetlands have been viewed as wastelands or disease-ridden areas, but recent research has revealed their immense value to human society. Wetlands provide numerous benefits, including natural water quality improvement, flood protection, shoreline erosion control, and recreational opportunities. By protecting and restoring wetlands, we can safeguard our own well-being and ensure the continued functioning of these vital ecosystems.

Water Quality and Hydrology:

Wetlands act as natural filters that remove excess nutrients and pollutants from surface water runoff before it reaches open water. This filtration process helps maintain water quality and prevents the clogging of waterways, which can negatively impact fish and amphibian reproduction. By preserving wetlands, we can save significant funds that would otherwise be spent on wastewater treatment plants and other costly water management systems.

Flood Protection:

Wetlands serve as natural sponges that absorb and slowly release surface water, rain, snowmelt, groundwater, and floodwaters. This water storage capacity helps control floods and reduces erosion, particularly in urban areas where the increased rate and volume of runoff from pavement and buildings can exacerbate flooding risks. Restoring wetlands in coastal areas can also buffer storm surges from hurricanes and tropical storms, protecting shorelines and communities from damage.

Shoreline Erosion:

Wetlands play a crucial role in preventing shoreline erosion by holding soil in place with their roots, absorbing the energy of waves, and breaking up the flow of water currents. By maintaining and restoring wetlands, we can protect coastal ecosystems and reduce the need for expensive dredging operations and levees.

Fish and Wildlife Habitat:

Wetlands are essential for the survival of numerous fish and wildlife species. Over one-third of the United States' threatened and endangered species live exclusively in wetlands, while nearly half rely on them for at least part of their life cycle. Many commercially and recreationally important fish species, such as shrimp, oysters, clams, and blue and Dungeness crabs, depend on coastal wetlands for food, shelter, and breeding grounds.

Conclusion:

Wetlands are indispensable components of our planet's ecosystems, providing a wealth of ecological services and benefits to both natural and human communities. By recognizing and valuing the importance of wetlands, we can work towards their protection and restoration, ensuring a healthier and more sustainable future for all.

Encourage Rainwater Harvesting Systems:

Local governments should offer incentives and support for households and businesses to install rainwater harvesting systems, such as tax breaks and subsidies.

Implement Zoning and Building Codes:

Local zoning and building codes should be updated to require the installation of rainwater harvesting systems in new construction projects.

Raise Awareness and Education:

Local governments should invest in public awareness campaigns and educational programs to inform residents about the benefits of rainwater harvesting and how they can participate in this sustainable practice.

Conclusion

As our cities continue to grow, it is essential that we adopt sustainable practices to conserve water and protect our environment. Rainwater harvesting is a simple yet effective method that can help increase groundwater levels, reduce the strain on traditional water sources, and mitigate the effects of flooding. By incorporating rainwater harvesting into urban planning, we can ensure a sustainable water supply for future generations and create more resilient and environmentally friendly cities.

Empowering Communities: Decentralizing Supermarkets Through Public Ownership and Control

date: "2023-11-11"


categories:

  • "blockchain"
  • "cryptocurrency"
  • "governance"
  • "policies"
  • "politics"

Traditionally, supermarkets have been hubs for a wide array of products spanning diverse categories, including but not limited to Fruits and Vegetables, Cooked Food, Grocery, Clothing, Shoes, Bags, Jewelry, Hardware, Electronics, Metal Hardware (such as cookware), Electrical items, House building materials (like cement and pipes), Nursery and Agricultural products (including biofertilizer), and Medicine.

What if we make supermarkets under public ownership, allowing communities to collectively govern and manage these essential retail spaces?

How does a supermarket simplify things? By consolidating a diverse range of retail items into one convenient location, it achieves this goal while also generating various other advantages. Here's a breakdown:

  1. Centralized Accessibility: Supermarkets serve as a one-stop destination where consumers can access a comprehensive array of products, spanning from groceries to clothing and electronics. This centralized approach streamlines the shopping experience, saving time and effort for customers.

  2. Labor Cost Reduction: Supermarkets leverage automation to minimize labor costs. Automated checkouts, inventory management systems, and other technological innovations contribute to operational efficiency and cost-effectiveness.

  3. Regulatory Ease: The concentration of products within a supermarket makes regulatory compliance more manageable. Regulations related to labeling, quality control, and other standards can be consistently applied in a centralized manner.

Example of Community Governance that corporate governance unlikely to do it:

Best Practices

To illustrate, consider the role of community governance in shaping the practices of a supermarket:

  • Reducing Plastic Usage: Community governance can swiftly enforce decisions to eliminate plastic bags and encourage the use of sustainable packaging. This proactive approach aligns with environmental goals, reducing the ecological footprint of the supermarket.

  • Promoting Reusability: Empowered by community-driven initiatives, supermarkets can facilitate the use of reusable containers. Shoppers are encouraged to bring their containers for items like beverages and cooking oil, contributing to a reduction in single-use plastic.

  • Supporting Local Production: Community governance can actively endorse and support local producers, ensuring their products are featured in the supermarket at fair prices. This strategy fosters a more equitable marketplace, circumventing the potential monopoly that corporate supermarkets might impose.

  • Curbing Fast Fashion: Community governance can implement policies favoring sustainable and ethically produced clothing. This may involve supporting local designers, promoting clothing recycling programs, and discouraging the sale of fast fashion items known for their detrimental environmental and ethical impacts.

  • Promoting Healthy Eating: The community, through governance mechanisms, can encourage the stocking of nutritious, minimally processed foods in the supermarket by taxing or regulating unhealthy food. This initiative aims to combat the negative health effects associated with ultra-processed foods, polished cereal grain and others, contributing to a healthier community overall. Over 20% of people have fatty deposits on the liver, mostly due to poor eating habits.

  • Repair Services: Promoting the repair of electronic products, such as smartphones, aligns with the 'right to repair' movement and contributes significantly to sustainability. Encouraging the repairability of electronic devices empowers consumers to extend the lifespan of their gadgets, reducing electronic waste and the environmental impact associated with manufacturing new products.

  • Sustainable Housing: A community-run supermarket fosters a sustainable housing community, accommodating 5000 or more people in pockets without inducing urban sprawl. This approach conserves space, preserving spaces for forests.

  • Profit sharing: Supermarkets and various supply chains can each have their decentralized governance token, enabling different stakeholders to participate and receive incentives based on their contributions. Consumers, for instance, can receive a monthly Universal Basic Income (UBI), empowering them to make purchases and contribute to poverty reduction or elimination. The token's value can be collectively determined by the community or stakeholders through consensus, where a token design with fair incentive system results in greater profitability.

In essence, the community run supermarket becomes a reflection of community values, responding to environmental concerns, supporting local businesses, and promoting sustainable practices by decreasing negative externalities. This community-driven model stands in contrast to corporate supermarkets, which may prioritize profit over such community-centric considerations.

Supermarkets, when governed by the community, have the potential to be more socially responsible, environmentally friendly, and supportive of local economies. This scales globally, as blockchain works in a borderless manner.

Regulation doesn't mean governance will control prices, control exports or imports, and disrupt the free-market system of discovering prices for goods and services through demand and supply. It is about making the supply chain more efficient and handling negative externalities.

Community Kitchen Proposal

The Community Kitchen initiative aims to bring culinary experiences by fostering a diverse range of both nutritious and delicious meals. The current lamentable state of hostel and hotel food prompts an exploration into the roots of the problem, attributing it to governance issues and the influence of capitalism on the food industry.

Key Components of the Incentive System:

  1. Cook Appointment and Compensation: The heart of the kitchen lies in the cook, and their appointment and fair compensation are crucial for maintaining culinary standards.

  2. Food Quality Oversight by Experts: Incorporating food science experts ensures a stringent quality check, elevating the overall nutritional and taste profile of the meals.

  3. Provision of Essential Groceries: A seamless supply chain for necessary groceries guarantees a well-stocked kitchen, essential for preparing diverse and wholesome meals.

  4. Rent Payment through Governance: Rent payments facilitated through a transparent governance or community ownership model for kitchen spaces ensure a stable and conducive environment for culinary pursuits.

  5. Automation and Cooking Tools: Investing in kitchen automation and providing appropriate cooking tools not only enhances efficiency but also encourages innovative and diverse culinary creations.

  6. Security Measures: Implementing robust security measures protects both the kitchen rooms and tools, preventing misuse or theft and ensuring the sustainability of the community kitchen.

  7. Consumer Participation in Governance: Empowering consumers to contribute to the decision-making process by aiding in the appointment of food science experts and cooks promotes expertise and active engagement. The more involvement in governance, the greater the voting power, fostering a system where competence and commitment are rewarded.

By addressing these key elements in the incentive system, the Community Kitchen strives to create an environment where the preparation of food becomes a collaborative and rewarding venture, promoting both health and culinary diversity.

The Community Kitchen serves as a particularly valuable resource for women seeking remote employment, offering a solution that helps them save time on cooking and dish washing. This communal space not only addresses the practical challenges of balancing work and household responsibilities but also creates a supportive environment for those engaged in remote jobs.

How much time does it take to create 15-minute cities?

It doesn't take very long. However, with the existing model, it's hard for small shopkeepers to set up shopping malls because it requires huge investments, and common people don't have that much capital. Therefore, they can only set up small shops.

Advantages of Supermarkets Over Small Shops

Let's first analyze why people go to markets. The reason is not solely for shopping; they also seek entertainment, recreation, food, and social connections. Therefore, if you set up a supermarket within a 5-15 minute walk or cycling distance, people are likely to visit.

As everything is available there, they will prefer the location, even if it's not roadside. Food stalls in supermarkets are crucial, as many patrons opt for a quick meal. Additional entertainment options, such as movies, can be provided on a semi-big screen, with the potential for success if prices are kept low to stimulate demand. Furthermore, the establishment of indoor gardens is essential, as greenery contributes significantly to the recreational atmosphere.

Now, let's discuss funding.

How can we support shopkeepers? Even a semi-decentralized smart contract on the blockchain can work, and it has become easier to implement. Some trusted entities, especially stakeholders, can remain in governance, selected through effective voting methods.

One can use stablecoins, such as gold-backed cryptocurrencies or USDT, in the smart contract. Alternatively, other cryptocurrencies can be considered, especially if stability is not a primary concern and they are viewed as an investment.

All funds collected from sales are held in escrow within the smart contract, minimizing the chances of fraud.

Equitable money distribution and inclusivity

Then, money is distributed based on input and maintenance costs. Salaries for employees are determined through a good voting method, where all employees participate. More efficient and utilitarian employees can receive higher salaries, while less efficient individuals may receive slightly lower compensation. Salary distribution aims for equity, avoiding extreme discrepancies seen in the current capitalist system where CEOs or owners may receive salaries 100 times higher than other employees.

Since it's community-run, there is the potential for a more equitable distribution of wealth. Furthermore, diversity among employees can be actively encouraged, including the inclusion of women, individuals with disabilities, those from different religious backgrounds, and members of the LGBTQ+ community.


title: "Love for USD pegged stable coin by the crypto community must end" date: "2022-06-01" categories:

  • "blockchain"

Terra 2.0 recently experienced a crash resulting in a collapse of $40 billion. Many speculate that the bear market in crypto is due to the collapse of Terra. Although the reason for the collapse is attributed to bad algorithmic design, a similar collapse of the USD could have a precarious impact on the entire crypto market, creating havoc not only in the US but globally if USD is adopted everywhere.

The USD is issued by the US government. While they aim to maintain only a 10-15% inflation rate per year, its predictability is under centralized control. Throughout history, there have been instances of bank crises leading to a sudden devaluation of the USD, and history may repeat itself.

Using the USD as the mainstream cryptocurrency contradicts the ethos of cryptocurrency, as it should be decentralized. Its use needs to be limited and avoided from dominating the market. Furthermore, since the USD is a national currency primarily serving the needs of the United States, it is less likely to effectively meet the diverse economic requirements of international nations. For example, if you belong to some other country and hold USD, the 10% USD inflation will transfer wealth from you to the US. There is no limit to how much the US government can print, and neither one can predict when they will start printing, it can be during a war, during an election, or any other crisis like covid-19

While the USD may be appropriate for short-term use, like when you want to use the money within a year, gold is perceived as a superior option for long-term savings and is better at providing a hedge against inflation or crypto-speculation.

Decentralized USD Stable coin:

DAI is the first USD-pegged decentralized stable coin. It use many other cryptocurrency as collateral including USDC. It uses price oracle of USD to stabilize the DAI price same as USD.

DAI, a crypto-collateralized stablecoin by MakerDAO, has seen its asset weightage shift towards stablecoins. Many criticized DAI for being backed by 60% stablecoins, as it means that DAI is also exposed to the same centralization and regulatory risks of the stablecoins (mainly USDC).

Similarly USD stable coin is also implemented for polkadot ecosystem, e.g. AcalNetwork You can view the detailed workings through the link.

Acala's aUSD also crashed due to a bug in its code. Though errors in the code can be fixed, what truly matters is a stable coin protocol or algorithm design that works. Here is a video explaining why it's so hard to build a decentralized stable coin.

One interesting stable coin is Ampleforth, where the number of coins in your wallet keeps changing.

Gold price pegged decentralized stable coin:

Gold cryptocurrency can provide hedge against inflation and fluctuating prices of or other cryptocurrency. For example, from 2004 to 2022, the price of an ounce of gold in rupees has changed from Rs. 20,000 to Rs. 160,000. Gold has a history of being the best and most well-tested currency since 700 BC.

Here are the few gold backed cryptocurrency:

  1. Tether Gold (XAUT)

  2. DigixGlobal (DGX)

  3. PAX Gold (PAXG)

  4. Gold Coin (GLC)

  5. Perth Mint Gold Token (PMGT)

  6. Meld

But like USDT and other USD based crypto stable coin, gold stable coins too are not fully decentralized and work under centralized regulated entities.

For a currency to become stable, it needs widespread usage and a substantial market cap. Despite Bitcoin having a significant market cap, it is unlikely to become stable due to most coins being held by a few corporations. Furthermore, it relies on ancient technology that is challenging to upgrade and faces issues like centralization with a few mining pools.

Maybe in the future, we won't need stablecoins pegged to USD or gold. Funds could be transferred with improved decentralized governance using the native currency, and prices could be determined through more advanced decentralized algorithms, rather than relying solely on demand and supply as attributes. This could bring stability to the native currency.

Tyranny of the Majority

Tyranny of the majority is a concept that highlights a potential flaw in democratic systems, where the majority, in pursuit of its own interests, oppresses or neglects the rights and interests of minority groups. John Stuart Mill, in his 1859 book "On Liberty," argued that this kind of tyranny could be as oppressive as the rule of a despot. To overcome tyranny of the majority, various strategies and mechanisms can be employed, as illustrated in the provided examples:

  1. Centralization Excess:
    • Scenario: In a federal system, the centralized power of a federation makes decisions that should be handled at the local level. This goes against the principle of subsidiarity, which advocates that decisions should be made at the most local level possible.
    • Solution: To overcome this tyranny of the majority, several measures can be taken.
      • Concurrent Majority: Implement a concurrent majority mechanism where both the federal and local authorities must agree on certain matters to ensure that local interests are adequately represented.
      • Supermajority Rules: Require a supermajority vote for decisions that significantly affect local jurisdictions, making it harder for the majority to impose their will without considering minority interests.

Example: Consider a federal system where the majority at the federal level wants to impose a uniform policy on education for all states. This decision might neglect the unique needs and preferences of individual states. To overcome the tyranny of the majority, a concurrent majority mechanism could be established, requiring both the federal government and individual states to agree on significant education policy changes, ensuring that local interests are protected.

  1. Abandonment of Rationality:
  • Scenario: When decisions are based solely on numerical majorities without considering their correctness or excellence. In such cases, decisions may be arbitrary and not necessarily in the best interests of the society as a whole.
  • Solution: To avoid the tyranny of the majority based on irrational decisions, several steps can be taken:
    • Public Consultation: Involve the public in the decision-making process by seeking their input, which can help ensure a more rational decision-making process.
    • Technical Consulting Bodies: Establish expert panels or consulting bodies to provide informed and unbiased advice on complex issues.
    • Judicial Review: After a decision is made, it can be subjected to judicial review to ensure it complies with the rule of law and constitutional principles. Courts can declare decisions null and void if they are found to be irrational or unconstitutional.

Example: Imagine a scenario where a majority of voters support a policy that goes against scientific evidence, such as denying climate change. To overcome the tyranny of this majority, public consultations involving scientists and experts can be held to present the facts. Additionally, a legal system that allows judicial review can act as a safeguard, ensuring that decisions are rational and constitutional.

In both scenarios, the key is to introduce checks and balances that prevent the majority from imposing its will in a way that harms minority rights or results in irrational or arbitrary decisions. These mechanisms aim to strike a balance between majority rule and the protection of minority interests and the principles of rationality and fairness.

Tyranny of the Minority

The tyranny of the minority occurs when a supermajority consensus is required for a decision, and a minority, in pursuit of its own interests, oppresses or neglects the rights and interests of the majority groups.

Example: Creating an Ultra Low Emission Zone (ULEZ) area or controlling traffic where cars are not allowed, but a minority group of car owners opposes it. Though it is difficult to pass such a bill with a supermajority decision, the minority can create a blockage. Once the bill is passed, it becomes challenging to reverse.

Tyranny of Representatives

The "Tyranny of Representatives" refers to a situation in which a small percentage of elected representatives gain unchecked control over the legislative process and no longer truly represent the interests or wishes of their constituents. This phenomenon can occur in democratic systems when a combination of factors allows a minority of elected officials to wield disproportionate power.

Here's an elaboration of this concept:

In a well-functioning democracy, representatives are elected to serve the best interests of their constituents. They are expected to listen to the concerns and desires of the people they represent and make decisions that reflect the will of the majority. However, the tyranny of representatives occurs when a select group of politicians, often from a particular party or faction, consolidates power to such an extent that they can disregard the needs and preferences of their constituents.

Several factors can contribute to this situation:

  1. Gerrymandering: Manipulative drawing of electoral districts can favor one political party over others. By creating safe districts for a particular party, a minority of voters can ensure the election of their chosen representatives, leading to unaccountable officials who don't need to cater to the broader electorate.

  2. Party Polarization: When political parties become highly polarized, representatives may prioritize party loyalty over the concerns of their constituents. This can lead to policies that reflect extreme ideologies rather than the nuanced views of the population.

  3. Campaign Financing: Representatives who rely heavily on special interest groups or large donors may become beholden to these interests rather than the needs of their constituents, further undermining representation.

  4. Lack of Accountability: In some cases, representatives may face limited accountability due to factors like low voter turnout, lack of competition in elections (e.g., due to the use of terrible voting methods like FPTP), or insufficient checks and balances within the political system.

  5. Authoritarian Governance: In some instances, representatives may develop an insatiable hunger to remain in power, which can lead them to employ authoritarian methods to consolidate and maintain their control. This can involve tactics such as surveillance, disinformation campaigns, propaganda, controlling and manipulating the media to further their interests, eroding the independence of institutions and the misuse of laws to harass dissent and opposition. By manipulating information, stifling criticism, and undermining the democratic process, these representatives prioritize their own political longevity over the well-being and rights of their constituents.

When this tyranny of representatives occurs, it erodes the fundamental principles of democracy. The elected officials cease to be true representatives of the people and instead act in their own interests or those of a select few. To combat this, it is essential to implement measures such as redistricting reform, campaign finance regulations, and fostering a culture of political accountability to ensure that representatives genuinely serve the wishes of their constituents and maintain a healthy democratic system.

e.g. Pollution Paradox because of Tyranny of Representatives

The "pollution paradox" is a term used to describe a situation where special interest groups or large donors from the fossil fuel industry, who often contribute to political campaigns and lobby for their interests, may have a counterintuitive impact on environmental policy. It points to a scenario in which the very industries responsible for environmental pollution, such as the fossil fuel industry, can influence political decisions in a way that appears to run counter to environmental conservation efforts.

Here's how the pollution paradox can be connected to the tyranny of representatives:

  1. Concentration of Power: Special interest groups and large donors from the fossil fuel industry often concentrate their financial and lobbying efforts on a select group of elected officials who are sympathetic to their interests. These representatives may receive significant campaign contributions and support from these groups, which can lead to the concentration of power in the hands of a few politicians.

  2. Influence Over Decision-Making: The influence of fossil fuel interests can lead to a situation where a small group of representatives gain disproportionate control over energy and environmental policies. These representatives may prioritize the interests of the fossil fuel industry over the broader concerns of their constituents or the environment. This can result in a lack of responsiveness to the will of the people they represent.

  3. Suppression of Environmental Action: The tyranny of representatives in this context can manifest as a suppression of environmental action. Elected officials heavily influenced by fossil fuel interests may resist or delay policies aimed at reducing pollution, transitioning to clean energy sources, or addressing climate change, even when there is a broad public desire for such actions.

  4. Disconnect from Constituent Interests: In the pollution paradox, representatives may no longer serve the best interests of their constituents, who may desire cleaner and more sustainable energy solutions to combat pollution and environmental degradation. Instead, these representatives may prioritize the interests of the fossil fuel industry and their campaign donors.

The connection between the pollution paradox and the tyranny of representatives underscores the challenges that arise when powerful interest groups exert undue influence over elected officials and policy decisions.

Tyranny of Shareholders

The concept of the "tyranny of shareholders" refers to a situation in which corporations prioritize the interests of their shareholders above all other stakeholders, such as workers, suppliers, consumers, and communities. This approach to corporate governance is often associated with the doctrine of "shareholder primacy," which asserts that the primary purpose of a corporation is to generate profits and maximize shareholder value. While maximizing shareholder value is a critical aspect of corporate governance, the exclusive focus on it can lead to negative consequences for other stakeholders.

Here's an explanation of how the tyranny of shareholders works and its impact on various stakeholders:

  1. Workers: Shareholder primacy often leads to a relentless pursuit of cost-cutting measures to boost short-term profits. This can result in reduced wages, fewer benefits, job insecurity, and diminished job quality for workers. Companies may prioritize shareholder returns over fair compensation, job stability, and employee well-being, adversely affecting the livelihoods of their workforce.

  2. Suppliers: Under the pressure to maximize shareholder value, corporations may push suppliers for lower prices, sometimes to the point of unsustainability. This can harm smaller suppliers and reduce the quality of goods or services provided, ultimately impacting the supply chain's stability.

  3. Consumers: An excessive focus on shareholder value can lead to practices that prioritize short-term profit over product quality and safety. Consumers may be exposed to unsafe products or services, misleading marketing, or inadequate customer support, as the corporation prioritizes cost-cutting and profit maximization.

  4. Communities: Corporations have a significant impact on the communities where they operate. When they prioritize shareholder returns at the expense of other stakeholders, it can result in adverse consequences for communities. This may include environmental degradation, reduced corporate social responsibility initiatives, or a lack of investment in local infrastructure and economic development.

  5. Long-Term Growth and Innovation: Shareholder primacy can encourage a short-term mindset, as executives and boards focus on meeting quarterly earnings targets. This can hinder long-term investments in research, development, and innovation, which are essential for a company's sustained success and competitiveness in the global market.

An example of the tyranny of shareholders can be seen in cases where companies engage in share buybacks, which involve using corporate funds to repurchase their own shares in the stock market. While this can boost the company's stock price, it may divert resources that could have been invested in research, employee training, infrastructure improvements, or other long-term strategies.

A more balanced approach to corporate governance, considering the interests of all stakeholders, can lead to sustainable and responsible business practices that benefit society as a whole rather than just a narrow group of shareholders.

Democratic reform trilemma or trade-offs

Trade-off: a balancing of factors all of which are not attainable at the same time.

Democratic theorists have identified a trilemma due to the presence of three desirable characteristics of an ideal system of direct democracy, which are challenging to deliver all at once. These three characteristics are participation – widespread participation in the decision making process by the people affected; deliberation – a rational discussion where all major points of view are weighted according to evidence; and equality – all members of the population on whose behalf decisions are taken have an equal chance of having their views taken into account. Empirical evidence from dozens of studies suggests deliberation leads to better decision making.

How will Shivarthu's direct democracy solve the tyranny of the majority/minority?

Shivarthu

Suggestion:

Some of the voting or feedback sytem.

  1. Direct Voting by Local Citizens: This method involves directly polling local citizens.
  2. Schelling Game Decision by Users: Users make decisions using the Schelling game.
  3. Voting by Representatives Elected via Proportional Approval Voting: Representatives are elected by the people through a proportional approval voting system (Sequential Phragmén)
  4. Voting by Department Representatives with Specialized and Multidisciplinary Knowledge: Department representatives with specialized and multidisciplinary knowledge participate in the voting process.
  5. Providing More Voting Weight to Individuals Creating Positive Externalities: This approach assigns greater voting weight to individuals who generate positive externalities.

These different methods can enhance rationality and reduce centralization excess. Double approval can be implemented using these voting methods. Additionally, a discussion forum can be created where different voters can articulate the reasons for their approval or disapproval of a decision without sybil attacks or spamming.

Further consideration is needed to determine when to employ a simple majority or a supermajority.

Simple Majority (More than 50%):

  • Merits:

    1. Ease of Decision-Making: Simple majority is straightforward and efficient for routine decisions in democratic processes, such as passing legislation or electing officials.
    2. Reflects Popular Will: It ensures that a decision is supported by a majority of voters or representatives, reflecting the will of the majority.
    3. Fosters Inclusivity: It allows for broader participation and inclusivity, as decisions are made with a relatively low threshold of support.
  • Demerits:

    1. Minority Disadvantage: It can lead to the potential marginalization of minority interests or viewpoints, as decisions are made without broad consensus.
    2. Polarization Risk: It may encourage polarization, as politicians and parties may focus on winning the majority without considering the concerns of the minority.
    3. Lack of Supermajority Safeguards: It lacks the safeguards against hasty or rash decisions that supermajority requirements can provide.

Two-Third Majority (66.67% or more):

  • Merits:

    1. Enhanced Stability: Requiring a two-thirds majority can provide greater stability and consensus for critical decisions, making it harder to reverse decisions hastily.
    2. Checks and Balances: It serves as a check against the abuse of power or major constitutional changes, ensuring that a broad consensus is needed for significant decisions.
    3. Protection of Minority Rights: Supermajority requirements can protect the rights and interests of minorities by preventing the majority from easily overriding them.
  • Demerits:

    1. Potential Gridlock: It can lead to legislative gridlock when it's challenging to reach a two-thirds consensus, especially in highly polarized environments.
    2. Less Responsive: Requiring a supermajority can make decision-making slower and less responsive to urgent issues.
    3. Undermining Majority Will: In some cases, it might allow a minority to obstruct the will of a clear majority, potentially undermining democratic principles.

The choice between a simple majority and a two-thirds majority depends on the specific context and the goals of a decision-making process. Simple majorities are suitable for routine decisions and day-to-day governance, while supermajorities are typically reserved for significant constitutional changes, checks and balances, and situations where broad consensus is essential to ensure the stability and legitimacy of a decision.

Capitalism vs Socialism: Which one is working?


date: "2020-02-12" categories:

  • "democracy"
  • "economics"

This is the dictionary definition of capitalism:

an economic and political system in which a country's trade and industry are controlled by private owners for profit.

Characteristics central to capitalism include private property, capital accumulation, wage labor, voluntary exchange, a price system and competitive markets

--Wikipedia

Definition of socialism

Socialism is a political philosophy and movement encompassing a wide range of economic and social systems which are characterised by social ownership of the means of production, as opposed to private ownership.

Defination of Free Market

In economics, a free market is an economic system in which the prices of goods and services are determined by supply and demand expressed by sellers and buyers.

But do socialism works?

Here are some of the video that explains why socialism is much more worse than capitalism?

But both the videos have serious flaws:

It assumes Capitalism = Free Market

Capitalism and the Free Market is often incompatible with each other. Capitalism entails private ownership, and through private ownership, individuals and entities can amass excessive wealth, establish monopolies, and potentially undermine the principles of a free market. Furthermore, they often utilize financial resources to lobby the government, seeking regulations that favour their interests and, in the process, potentially disrupt the free market.

Advocates of free-market socialism assert that authentic free markets cannot exist when productive property is privately owned. They argue that private ownership fosters class disparities and income/power inequalities, allowing the dominant class to manipulate the market in their favor through tactics like monopolies, market power, or influencing government policies to suit their business interests. Furthermore, in a socialist system with cooperative and self-managed enterprises, workers are motivated to enhance productivity because they not only receive a fixed wage or salary but also a share of the profits based on their enterprise's overall performance. This heightened motivation for productivity, envisioned in a socialist setup, could be replicated in a free-market economy if employee and public-owned companies were the prevalent norm, as envisioned by various thinkers.

Further more, capitalism exacerbates negative externalities, adversely affecting communities through the tyranny of shareholders.

Examples are Microsoft and Iphone with their proprietary software or hardware

Apple has been forced to make their phones easier to repair, but, as the evil company that they are, they've found another way of creating unneeded friction in the system.

We've now reached the point where it's technically easy to remove the screen or the battery from an #iPhone 14, you can replace them with genuine Apple parts purchased from their store, but when you turn on the phone things probably won't work unless somebody from Apple registered the parts' serial numbers (which have all to be genuine and new btw, throwing a wrench into the idea of sustainability through used/refurbished/compatible parts) to your phone.

In other words, they've been forced to remove the hardware barriers, and they've just moved them to the software.

-@blacklight

It assumes Socialism = Govt Ownership

Socialism is centered around the idea of public, collective, or common ownership of the means of production. Its not about government control, where approximately 200 to 500 elected representatives manage the means of production, or where a single elected head, such as the Prime Minister or President, exercises control over the means of production.

Example of socialism is FOSS software or hardware

“Free software” means software that respects users' freedom and community. Roughly, it means that the users have the freedom to run, copy, distribute, study, change and improve the software. Thus, “free software” is a matter of liberty, not price. To understand the concept, you should think of “free” as in “free speech,” not as in “free beer.”

https://www.gnu.org/philosophy/free-sw.html

Open Source or Free Software or FOSS Philosophy

So, no one owns a FOSS software, anyone can study, change or improve the software.

There are also open source hardware like build on RISC V.

e.g Pine64 https://www.pine64.org/

Another example can be decentralized computation using blockchain, its free market as well as owned by common with #FOSS software. You don't have to rely on aws, you can use your home computer to provide service.

https://runonflux.io/

Akash Network

Anarchism

https://en.wikipedia.org/wiki/Anarchism

Anarchism is a political philosophy and movement that is against all forms of authority and seeks to abolish the institutions it claims maintain unnecessary coercion and hierarchy, typically including the state and capitalism. Anarchism advocates for the replacement of the state with stateless societies and voluntary free associations

Stateless society

https://en.m.wikipedia.org/wiki/Stateless_society

A stateless society is a society that is not governed by a state. In stateless societies, there is little concentration of authority; most positions of authority that do exist are very limited in power and are generally not permanently-held positions.

Rule of Law

But in order to maintain order in a stateless society, there has to be the rule of law. The rule of law provides a framework for resolving disputes and addressing conflicts in a peaceful and just manner. By ensuring that everyone is treated equally under the law, regardless of their social status, wealth, or political connections, the rule of law helps to prevent the abuse of power and the violation of individual rights.

Moreover, the rule of law acts as a deterrent against crime by providing a consistent and transparent system of consequences for unlawful behavior. When individuals know that their actions will be judged fairly and in accordance with established legal principles, they are less likely to resort to criminal activities. Furthermore, the rule of law empowers communities to establish mechanisms for conflict resolution and dispute settlement, reducing the likelihood of violence and promoting social cohesion.

But how can we have the rule of law in a stateless society where there is no concentration of authority?

We can have the rule of law with distributed authority rather than a concentration of authority, where the constitution is framed, adapted, or amended through deliberation between the public and thousands or millions of specialized groups with expertise.

With automated smart contracts, thousands, even millions, can participate in the lawmaking and judgement process and approve decisions through different optimal voting methods.

Classical Liberalism

https://bigthink.com/thinking/classical-liberalism-explained/

Classical liberalism is a political tradition and a branch of liberalism that advocates free market and laissez-faire economics and civil liberties under the rule of law, with special emphasis on individual autonomy, limited government, economic freedom, political freedom and freedom of speech. Classical liberalism, contrary to liberal branches like social liberalism, looks more negatively on social policies, taxation and the state involvement in the lives of individuals, and it advocates deregulation.

Regulation or Deregulation

Deregulation of markets hardly works in tackling negative externalities. Negative externalities need to be taxed or regulated. Though markets need to be free, with no price control— in other words, prices are decided by demand and supply— markets need to be regulated to prevent monopolization and also to prevent negative externalities.

Organizations need to be publicly owned, with better predistribution through smart contracts and game theory.

Two videos compare capitalism and socialism, and the problems of the videos are highlighted above.

But what about capitalism. We have one-sided economy where only very few control the market. 

https://iambrainstorming.wordpress.com/2019/10/20/one-sided-economics/

Wealth inequality is on the rise. People are unemployed and in poverty. Capitalists are creating more problems (or negative externalities like climate change, pollution) than solving. 

Capitalism is not working

Capitalism

https://www.weforum.org/agenda/2020/02/countries-losing-faith-capitalism-economics-global-political-systems

The Law of Dismissing Return, the Solow Model, and the Steady State: Why Unlimited Growth is not Possible

Course Link

Introduction:

In the pursuit of economic growth, nations often face the challenge of maintaining a delicate balance between investment and depreciation. The Law of Dismissing Return, as elucidated by the Solow Model, sheds light on the inevitability of capital depreciation and the importance of achieving a steady state. This state represents a crucial equilibrium where investment equals the amount required to repair depreciation, offering insights into why infinite growth is an unattainable goal. This article explores the concept of the steady state, emphasizing the need for sustainable economic practices and addressing the question: What do we do with the output?

The Nature of Capital:

Consider physical capital as the backbone of economic progress – roads, machinery, and infrastructure. However, this capital, much like any other asset, is subject to wear and tear. The more it is utilized, the more it depreciates. The Solow Model introduces the notion of capital rusting or depreciating, making it essential for nations to make choices regarding the upkeep of existing capital.

The Steady State:

The steady state level of capital is the focal point where the investment matches the depreciation. At this juncture, economic growth stagnates, and the capital stock remains constant. It's a delicate equilibrium, a point of balance where nations must allocate resources to repair and replace worn-out capital. This prompts an essential question: Can we sustain growth indefinitely, or is there an inherent limit imposed by the Law of Dismissing Return?

Understanding the Growth Tracks:

Examining the growth trajectories of nations like Germany and Japan post-World War II provides valuable insights. Initially, these nations experienced rapid growth as the first units of capital proved highly productive, generating substantial output. However, over time, the Law of Dismissing Return manifested itself, leading to diminishing returns on capital.

Sustainable Growth and the Steady State:

The key lesson from the steady state concept is that continuous and unchecked growth is unsustainable. Nations must strike a balance between consuming output and saving it for re-investment. The saved output serves as the fuel for future economic growth but necessitates addressing the challenges of capital depreciation.

The Role of Education and Labor:

While the Solow Model emphasizes the importance of capital, it also acknowledges that growth isn't solely dependent on it. Education (e) and labor (L) are two additional variables that influence economic growth. In the pursuit of sustainable development, nations must consider these factors, recognizing their contribution to overall economic well-being.

Conclusion:

The Law of Dismissing Return, as embedded in the Solow Model, reinforces the idea that infinite economic growth is an unsustainable pursuit. The steady state provides a critical reference point, urging nations to prioritize sustainable practices that balance investment with the inevitable depreciation of capital. As we consider the output of our economic endeavors, it becomes apparent that responsible consumption, savings, and strategic re-investment are vital components of a resilient and enduring economic framework.

The Impact of Negative Externalities on Sustainable Growth:

While the concept of the steady state underscores the importance of balancing consumption and saving for re-investment, it is crucial to delve deeper into the challenges posed by negative externalities. Negative externalities refer to the unintended and adverse side effects of economic activities that affect parties not directly involved in the activity. In the context of sustainable growth and the steady state, negative externalities contribute to the extra and unnecessary investment required to repair the system.

The Unseen Costs of Unchecked Growth:

Unchecked economic growth often leads to the generation of negative externalities, such as environmental degradation, pollution, and resource depletion. These externalities impose hidden costs on society, costs that are not factored into the market prices of goods and services. As nations pursue continuous and unchecked growth, the accumulation of these negative externalities puts a strain on the very systems that support economic activities.

Environmental Degradation and Capital Depreciation:

One of the most significant negative externalities associated with rapid growth is environmental degradation. Industrial activities, deforestation, and overexploitation of natural resources contribute to the deterioration of ecosystems. The consequence of this degradation is accelerated capital depreciation. For instance, if a nation exploits its natural resources without adequate conservation measures, the environment, a vital form of capital, deteriorates, necessitating extra investment to restore or replace what has been lost.

Infrastructure Strain and Reparative Investment:

Unchecked growth also puts immense pressure on infrastructure, leading to negative externalities that require additional investment for repair and maintenance. Increased traffic on roads, for example, not only contributes to wear and tear but also generates air pollution. This dual impact necessitates extra investments in both road repairs and environmental cleanup. Similarly, industries with poor waste management practices may face costly repercussions, including regulatory fines and the need for environmental remediation.

Social and Health Costs:

Negative externalities can also manifest in the form of social and health costs. For instance, industries emitting pollutants may adversely affect public health, leading to increased healthcare expenditures. Addressing these health-related negative externalities requires additional investments in healthcare infrastructure and services.

Shifting Investments Away from Essential Needs:

In the long run, there is an imperative need to invest in repairing the negative externalities created; otherwise, it can have catastrophic effects, ultimately leading to a shortage of funds and causing poverty. The principle of "prevention is better than cure" underscores the importance of addressing environmental challenges proactively. Failing to invest in mitigating negative externalities not only risks environmental degradation but also places an unsustainable financial burden on societies. As environmental issues escalate, the need for resources to rectify the damage intensifies, diverting crucial funds away from essential sectors. This diversion, coupled with the economic repercussions of environmental deterioration, can perpetuate a cycle of resource scarcity and poverty, emphasizing the urgency of preventative measures to ensure a sustainable and equitable future.

The Call for Responsible Growth:

Understanding the interplay between negative externalities and the challenges of capital depreciation is essential for nations aspiring to achieve sustainable growth. The steady state concept, while highlighting the need for a balance between consumption and saving, underscores the importance of responsible growth. Responsible growth involves considering the long-term consequences of economic activities, internalizing the costs of negative externalities, and making informed decisions that prioritize the well-being of both current and future generations.

Conclusion:

In conclusion, the pursuit of sustainable growth requires acknowledging and mitigating the impact of negative externalities. Unchecked growth may provide short-term economic gains, but the long-term consequences, including increased and unnecessary investment to repair the system, can be detrimental. Nations must embrace a paradigm of responsible growth, where the costs of negative externalities are internalized, and decisions are made with an understanding of the interconnectedness of economic, environmental, and social systems. By doing so, nations can navigate towards a more resilient and sustainable future, striking the delicate balance needed to maintain the steady state and ensure the longevity of their economic endeavors.

Shivarthu: A Governance Protocol

Overview

Shivarthu: The blockchain-based decentralized governance system. Democracy is about fair and equal treatment of everyone in a country. But it becomes unrealistic to achieve when political parties have their conflict of interest, and leaders don’t have the expertise to make evidence-based policies and neither have the skill and manpower for solving problems that surround our society and ecosystem. The new fair democracy provides an elegant way of governance that separates the representative responsibility according to their specialization and can grow into any complexity. The governance is divided into various departments, and each department is supervised by representatives with expertise in the field. Rational voters who have a sufficient understanding of the departments and their issues will be given more weight in the voting process than other voters. It results in a self-reinforcing feedback loop that eliminates frivolous actors and leaves utilitarian ones in charge.

https://shivarthu.reaudito.com/paper/Shivarthu_whitepaper.pdf

Shivarthu will be build on Substrate.

Our democracy has many challenges, blockchain can provide a way to tackle those challenges by minimizing trust through game theory. That made our team interested in creating this project.

Project Details

Project Github link: https://github.com/reaudito/shivarthu

Departments:

The governance is divided into many departments like education, infrastructure, health, community service for every locality.

Expertise evaluation of representatives :

Voters and especially representatives need to have some experience or expertise in the department. Experience is required because education about the department leads to better decision making. Their kyc and experience is evaluated by schelling game.

Vouching

A family tree is constructed. If they know each other, friends and relatives will become guarantors for each other. Moderators chosen through approval voting have the ability to invalidate the fake vouching by down voting the guarantor.

Experience evaluation pallet https://github.com/reaudito/shivarthu/tree/main/pallets/profile-validation

portfolio

The Schelling Game:

The schellingCoin

The SchellingCoin is designed to encourage truthfulness through economic incentives. The coin's mechanism is based on the concept of Schelling Points, as described by Thomas Schelling.

In essence, the idea is to create a scenario where individuals are motivated to tell the truth because they expect others to do so as well. In the case of the SchellingCoin, if we wanted to know if it rained in Paris this morning, we could ask every owner of the coin to vote secretly on whether it rained or not. After all the votes are cast, the results would be revealed, and those who voted in agreement with the majority would be rewarded with 10% of their coins, while those who voted differently would lose 10% of their coins.

The SchellingCoin's mechanism is rooted in the concept of focal points, which Schelling described as "each person's expectation of what the other expects him to expect to be expected to do." In this case, the focal point is honesty. The idea is that every individual in the system expects others to vote truthfully, because they expect others to expect them to vote truthfully. This creates a self-reinforcing loop, where individuals are incentivized to tell the truth because they believe others will do the same.

Kleros Whitepaper

Effectiveness of Schelling Game

The Schelling game of Shivarthu is designed to incentivize participants to reveal truthful information by rewarding them based on the majority consensus.

In the Schelling game, participants are asked to vote on the outcome of a particular event or question. They are rewarded based on the accuracy of their vote and the overall consensus among the participants. The idea is that participants will have an incentive to vote honestly in order to maximize their potential rewards.

The effectiveness and accuracy of the Schelling game, like any decentralized system, depend on several factors:

Participation: The accuracy of the results can improve with a larger number of participants. More participants increase the diversity of perspectives,reducing the potential for bias or manipulation.

Token Staking: In the protocol, participants must stake tokens as collateral, which can be lost if they vote against the majority outcome. This mechanism provides an additional incentive for participants to vote honestly.

Jury Selection: It utilizes a random selection process to form a jury panel from the pool of participants. This randomness helps prevent collusion and bias within the jury.

The accuracy of the Schelling game can vary depending on the specific context and the quality of information available. It is important to note that no system can guarantee 100% accuracy. Factors such as the complexity of the question, the availability of information, and potential manipulation attempts can influence the accuracy of the results.

However, decentralized systems like Schelling game aim to mitigate biases and provide a fair and transparent mechanism for dispute resolution. By incentivizing truthful voting and random jury selection, Schelling game aims to achieve a reasonable level of accuracy in determining the majority consensus. Nonetheless, it is advisable to consider the specific details and context of each use case when evaluating the accuracy of the system.

Sybil Attack:

A Sybil attack is a type of attack on a peer-to-peer network or a decentralized system where an attacker creates multiple pseudonymous identities (Sybils) to gain a disproportionate control or influence over the network. This can be done by creating multiple fake identities, flood the network with fake requests, or manipulate the network's decision-making processes.

How more stakes, more chances of selecting as juror protects from Sybil attack?:

In a system like the SchellingCoin, where the amount of stakes determines the chances of being selected as a juror, increasing the stakes for a node (user) makes it more difficult for an attacker to launch a Sybil attack. In a random selection process, an attacker could create multiple fake addresses to increase their chances of being selected as a juror. By being chosen more frequently than honest jurors, the attacker could effectively control the outcome. However, the stake-based selection mechanism ensures that only genuine users with a vested interest in the outcome are drawn as jurors, protecting the integrity of the system.

Alternative to more stakes, more chances of selecting as juror:

Increased stakes and a greater likelihood of being chosen as a juror may lead to a concentration of wealthier individuals in the decision-making process. An alternative approach to mitigate Sybil attacks is to use Stake by KYC (Know Your Customer) and Positive Externality Score.

Stake by KYC:

In this approach, nodes are required to provide verifiable identification (KYC) to participate in the juror network. This ensures that each juror is a unique entity and cannot create multiple fake identities.

Positive Externality Score:

A Positive Externality Score can be used to incentivize jurors to behave honestly and contribute positively to the network. This score can be calculated based on the jurors behavior, such as the quality of its decisions, the number of honest votes, or the amount of valuable contributions it makes to the network.

By using Stake by KYC and Positive Externality Score, the network can promote accountability, authenticity, and cooperation among nodes, making it more resistant to Sybil attacks.

Where Schelling Game implemented in the project?

In this project, the Schelling game is employed to perform Know Your Customer (KYC) checks on users. Furthermore, a modified version of the Schelling game called the score Schelling game is applied to funding departments, incorporating both funding allocation and rating of users based on the positive externality they generate.

In the Schelling game, individuals who wish to participate as jurors can apply to make decisions. The likelihood of being selected as a juror is directly proportional to the number of tokens a juror stakes. The more tokens a juror stakes, the greater their chances of being chosen. Additionally, jurors are randomly selected, which helps safeguard the system against sybil attacks.

We will use the substrate randomness trait for generating a random number. https://docs.substrate.io/reference/how-to-guides/pallet-design/incorporate-randomness/

Then jurors will vote for their decision using the commit and reveal scheme. In the commit phase, they submit the hash of the vote string. Then, in the reveal phase, they submit the hash and the vote string. If the vote string matches with the hash, then the vote is accepted. If a juror's vote is coherent (more than 51% of other jurors agree) then they receive incentives, otherwise, incentives are deducted from the stake of the juror.

Sortition Sum Game pallets: https://github.com/reaudito/shivarthu/tree/main/pallets/sortition-sum-game

Voting for selection of department representatives:

The election will be conducted using a multi-winner approval system. To choose the representatives, we will employ the sequential Phragmén method on the substrate. In this approach, instead of using stake, we will consider the vote weight based on factors such as reputation, experience, and positive externality scores. These scores are determined by the level of participation in the network or the positive external effects they have generated. As mentioned earlier, the positive externality score is calculated using the score Schelling game.

https://paritytech.github.io/substrate/master/sp_npos_elections/phragmen/fn.seq_phragmen.html

Approval Voting:
Approval Voting
Winners:
Winner

Seq phragmen voting: https://github.com/reaudito/shivarthu/tree/main/pallets/election

Voting for selection of governors

Governers will be selected again by seq phragmen, to form a fully decentralized governance they will have functions of setting different thresholds, like election timing, the number of elected representatives, and approving departments that can be formed.

Project application and acceptance:

The representatives are in charge of accepting the incoming projects for funding. People will submit their problems, for example, waterlogging in the locality. Then experts all around the globe will submit the solution. The solution will be peer-reviewed to check its pros, cons, and suggest improvements that can be made. The review must meet the scientific guidelines. The solution can undergo revision through peer review feedback. The solution provider and peer reviewer have to stake some money to receive incentives for their work. The solution and peer review will again be approved and disapproved through the shelling game after checking whether the content meets the quality as recommended in scientific guidelines. The solutions provider and reviewer will get the incentives if it gets approved, otherwise, some money will be cut from the stake. It creates pressure on the reviewer to maintain quality without noise.

Problem Solution

The representatives of the department will select the most optimal solution. After that persons wanting to take the lead to implement the solution will apply. Again representatives will select the best project leader from the application.

Leadership

Money for department:

Form a department with a location with some min members, say 3000, and get it approved by the main governance.

Department price discovery:

Say we have 1,000,000 departments with 3000 population each.

Department funding operates on a tipping system where each department is categorized as either a SmallTipper, BigTipper, SmallSpender, MediumSpender, or BigSpender, each corresponding to an increased funding value.

The funding categories are represented by an enumeration:

#![allow(unused)]
fn main() {
pub enum TippingName {
    SmallTipper,
    BigTipper,
    SmallSpender,
    MediumSpender,
    BigSpender,
}
}

Department-appointed governors are required to apply for the spending value, which can take any numerical value but must not exceed the specified limit associated with the tipping name. For example, if the allowed limit for SmallTipper is 10,000 tokens, applications for SmallTipper must be for an amount less than or equal to 10,000 tokens.

Applying for larger funds necessitates a greater stake in the form of increased responsibilities or commitments.

The amount is released after it is validated by the Yes or No Schilling game.

To utilize department funds, there is a process called Project Tips, wherein individuals or teams apply using a procedure similar to that of determining department funding

Further improvements

Create guidelines for department formation, e.g. specifying which values are allowed and which are not. These guidelines will serve as the basis upon which the maximum tipping amount is decided by the juror. There can be logic for department approval based on meeting the guidelines. A department can only apply for funding if it is approved. Approval can be obtained through Seq phragmen governance.

Price discovery of positive externality through Score Schelling Game:

  1. When you submit a positive externality that you made, you need to provide details of your work.
  2. Here is how the score Schelling game works to calculate score. For example, you can have a score between -10 and +10. The range of -10 to +10 poses a problem because the mean works best without extreme values. If someone gives -10, and others give 1, the mean result can be skewed due to the -10 outlier. The trick is to remove outliers by computing the standard deviation and eliminating all values more than one standard deviation away from the mean. Subsequently, we calculate the new mean of the remaining values, which consist of atleast 68.27% of the dataset. This new mean becomes the score. If your given score is close to the new mean, you receive incentives. If it deviates from the new mean, a portion of your staking value is deducted. Commit and reveal scheme is used.

Code to calculate new mean:

import statistics



def calculate_new_mean(items):
    mean = statistics.mean(items)
    print(mean)
    sd = statistics.stdev(items) 
    print(sd)


    #The values less than one standard deviation away from the mean account for 68.27% of the set
    #So we calculate mean of this 68.27% of data removing outlier

    # New data
    new_items = []
    for x in items:
        if x >= mean - sd and x <= mean + sd:
            new_items.append(x)

    print(new_items)

    new_mean = statistics.mean(new_items)
    print(new_mean)
    print("********************")

items = [-10, 1, 1, 1, 5, 1, 1, 7]
calculate_new_mean(items)
# 0.875
# 4.969550137731641
# [1, 1, 1, 5, 1, 1]
# 1.6666666666666667
# ********************
items2 = [-10, -10, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0]
calculate_new_mean(items2)
# -1.5833333333333333
# 3.941811612428832
# [0, 0, 0, 0, 0, 1, 0, 0, 0, 0]
# 0.1
# ********************
items3 = [-10, -10, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, -9, -8, -7, -6, -5, -4, -3, -2, -1]
calculate_new_mean(items3)
# -3.0476190476190474
# 3.8141341150540375
# [0, 0, 0, 0, 0, 0, 0, 0, 0, -6, -5, -4, -3, -2, -1]
# -1.4
# ********************
  1. Then, we will do quality score voting Schelling game that checks the quality or impact of positive externality. The score range is 0-5
  2. A fixed amount of tokens is released for each score. The highest amount of tokens will be released for a score of 5, fewer tokens for a score of 1, and no tokens for a score of 0.

Randomized Tax collection

Initial project funding comes from inflation, however as the inflation rate declines over time, the funds are collected by subtracting some amount of balance from different accounts so that there is no longer any inflation.

To avoid creating disincentives to invest in the coin, tax collection or deduction of balance is randomized for every transaction.

During a transaction, a random value is generated between 0 and 10. If the drawn number is 0, no tax will be deducted. If the number is 10, a 5% tax will be deducted from the transaction. In the case of the drawn number being 5, a 2.5% tax will be deducted.

In order to stop hoarding following tax collection can also be applied:

An account number is assigned to each account starting from 1000 in ascending order. A random number n between 1-1000 is drawn.

All account numbers with account_number % 1000 == drawn random number are taxed

If the drawn number is 1,000, one out of every 1,000 accounts will be taxed.

The primary governance determines the tax rate. The block number is stored during the draw. One draw is conducted each month at random time. Tax is deducted when the account interacts with the blockchain.

The Competitive Collaboration Algorithm

Competitive Collaboration Algorithm:

It's a decentralized network where you compete to collaborate.

Edge weight represents difficulty to get connected. Difficulty depends on factors such as distance, location, quality, price.

We need to choose subgraph containing all the required nodes (e.g. nodes containing a,b,c,d ) that has a minimum weight or optimal weight.

Centered Image

a,b,c,d can represent different services, whereas a1, a2 represents the same services from a different service provider. For example, 'a' can represent a student, 'b' can represent a teacher, 'c' can represent content provider such as a biology textbook and 'd' can represent a classroom or building. Similarly 'b1' represents teacher1, 'b2' represents teacher2, etc.

So, For student1 (a1), the optimum subgraph or subgraph with minimum weight containing all the required services are a1,b1,c2, d2 with weight 0.5+2.3+4.2 .

Usefulness of the model

Prediction

One can make a prediction using the model, to select the best subgraph or services for an individual. Entrepreneurs can use the data to set up new nodes, based on the requirements of people. Policymakers can use the data to evaluate the quality and provide suggestions for the optimal functioning of the network.

Equal chance to everyone

Its fairer and everyone can get an equal chance to reach their goals. It will bring competition for quality. Equal chance means many selected subgraphs for many individual will have similar weight, the possibility of getting similar weight increases when we increase the nodes.

Continuous Improvement

If any single subgraph, even a node of subgraph gets upgraded and refined, it builds a pressure on other subgraph and nodes to upgrade through competition.

No burnouts

Nodes shall not suffer from burn out problems as there is a division of work time between people and a division of labor.

Non-hierarchical and autonomous

As different nodes are independent of each other and are free to connect to other nodes, there is no hierarchy or concentration of power or monopoly. No need for management, teachers, and students self-manage their work.

Updated and Validated information

Nodes are protected by game-theoretic incentive system, those who behave frivolously are punished.

15 min cities and modular competitive collaboration algorithm

15-minute cities are a concept that aims to create urban environments where residents can access all the essential services and amenities within a 15-minute walk or bike ride. Decentralizing cities means distributing these services throughout the city, ensuring that they are accessible to all residents, regardless of their location. We will explore how decentralizing cities can benefit various aspects of urban life, including jobs, healthcare, childcare, schools, colleges, and supermarkets.

Jobs, Remote Work

The rise of remote work has made it possible for people to work from anywhere, as long as they have a stable internet connection. Decentralizing cities can help create more job opportunities in different neighborhoods, reducing the need for long commutes and making it easier for people to find work closer to home. This can not only improve the quality of life for residents but also reduce the environmental impact of commuting.

Hospitals

Access to healthcare is a critical aspect of urban life. Decentralizing cities can help ensure that hospitals and other healthcare facilities are evenly distributed throughout the city, making it easier for residents to access medical care when they need it. This can be particularly beneficial for low-income and marginalized communities, who often face barriers to accessing healthcare services.

Child Care, Schools, Colleges

Education is another essential service that can benefit from decentralization. By ensuring that childcare facilities, schools, and colleges are located within a 15-minute walk or bike ride from residential areas, we can make it easier for parents to drop off and pick up their children, and for students to access educational resources. This can also help reduce the environmental impact of transportation, as fewer people will need to drive to school or work.

Supermarkets

Access to fresh, healthy food is a crucial aspect of urban life. Decentralizing cities can help ensure that supermarkets and other food retailers are evenly distributed throughout the city, making it easier for residents to access healthy food options. This can help promote healthy eating habits and reduce the risk of diet-related health issues, such as obesity and diabetes.

The Competitive Collaboration Algorithm can help build a free market system with public ownership by creating a decentralized network where individuals and businesses can connect and collaborate to provide essential services. This algorithm can be used to identify the optimal subgraph or subgraphs of services for each individual, ensuring that everyone has equal access to the resources they need. By promoting competition and collaboration, the algorithm can help create a more efficient and equitable urban environment.

Resources:

Code: https://github.com/amiyatulu/competitive_collaboration

Its also related to interoperability of software and pubactivity.

Secure Blockchain Voting

1) Securing the device that you vote

As mentioned earlier, Android phones may not be appropriate for casting votes using blockchain technology.

Furthermore, one cannot use proprietary operating systems like iOS on an iPhone or Microsoft Windows, as one cannot access the source code to understand what the program is doing in the background.

So, what is an most affordable method of voting?

It's simply a Linux-bootable USB drive or memory card.

So, anyone, even the poorest, can hold a pen drive or memory card. Therefore, the system enables everyone to participate in democracy.

What security measure we need to take for voting?

  1. Validate the checksum of the files on the pen drive or memory card. The community can publish the checksum, allowing users to verify that it is correct and that they are running the correct open-source software.

  2. You need a trusted computer to boot; it can be anyone from your family or relatives whom you trust. Only the computer's BIOS needs to be secure. As it's done in a decentralized manner, a mass attack becomes very difficult. You don't have to trust any election commission or government.

You can use single-board computers, such as the Raspberry Pi Zero, for enhanced security, and they can be priced as low as $12.

BIOS attack

You can also examine BIOS attacks in the link. However, it's true that BIOS firmware is rarely made open source. As a result, it's difficult to replace the BIOS when it's infected. Even Raspberry Pi BIOS isn't open source. However, there are other open source alternatives, such as RISC-V computers, where both the hardware and software are open source.

Funding the Open Source

2) Securing the app that you vote

Link to: Enhancing Privacy and Security in Offline App Design with WebAssembly

3) Security of the blockchain itself

So what a blockchain do?

Blockchains are a technology which is all about providing guarantees about process integrity. If a process is run on a blockchain, the process is guaranteed to run according to some pre-agreed code and provide the correct output. No one can prevent the execution, no one can tamper with the execution, and no one can censor and block any users' inputs from being processed.

Explain to a 5-year-old the 51% attack of the proof-of-stake algorithm in blockchain

Imagine you and your friends are playing with building blocks to make a tall tower. In the blockchain world, people use something called Proof of Stake (PoS) to decide who gets to add the next block to the tower.

Now, a 51% attack in Proof of Stake is like a big, mischievous friend who tries to cheat the game. In our tower-building game, this friend is so tricky that they convince more than half of the players to help them instead of playing by the rules. Since they have more than half the players on their side, they can now control what blocks go into the tower.

So, instead of building the tower the way everyone agreed, this tricky friend and their team can start adding blocks that might not be good for the tower. It's like they're trying to make the tower wobbly or even knock it down! This is not fair because the game was supposed to be about working together and following the rules.

In the blockchain world, a 51% attack in Proof of Stake means that some people with more than half of the power can make decisions that are not good for the whole group.

Detail video explaining Blockchain

Web3 Blockchain Fundamentals MOOC

https://www.youtube.com/playlist?list=PLxVihxZC42nF_MCN9PTvZMIifRjx9cZ2J

Proof of Stake

https://www.youtube.com/watch?v=CDvonnvqrs4&list=PLxVihxZC42nF_MCN9PTvZMIifRjx9cZ2J&index=15

Can we have voting system without using blockchain through cryptography?

One can go through the links to implement voting in cryptography, meeting the required properties of voting system.

https://crypto.stanford.edu/pbc/notes/crypto/voting.html

An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization

Desirable features for voters and for administrators who manage voting system:

  • it enjoys flexibility in representing a vote, unlike homomorphic encryption based scheme where the design of the system depends heavily on the number of choices in each vote.

  • the voters can simply vote-and-go and require only a small computational ability.

  • by having authorities prove the correctness of their procedures, it achieves public verifiability, that is, anyone can verify the correctness of the tally.

Blockchain voting is overrated among uninformed people but underrated among informed people

Blockchain beyond voting

Blockchain extends beyond its application in voting; it encompasses smart contracts and incentive distributions as well. It can be referred to as a publicly operated peer-to-peer open source application, devoid of centralized ownership. The versatility of blockchain lies in its adaptability; you can seamlessly integrate any compatible module to address specific problem sets. This technology empowers decentralized and trustless systems, ensuring transparency and security in various domains beyond just voting.

Smart Contracts

Smart contracts are self-executing contracts with the terms of the agreement directly written into code.

While blockchain apps can be developed as fully open source, with all components, including the frontend and its dependencies, being open source or FOSS (Free and Open Source Software), there is still a chance of encountering bugs. These bugs can potentially lead to security vulnerabilities and even result in the theft of funds. Additionally, poor algorithm design without thorough validation (e.g. through game theory etc.) can make the app susceptible to attacks.

However, since the source code is publicly available, anyone is free to audit it, identify vulnerabilities, and contribute to fixing them. This transparency allows for a collaborative effort in enhancing the security of the application, as the community can collectively work towards identifying and addressing potential risks.

How can we make apps low-stake?

The higher the stake involved, the more precarious it becomes for our democracy and economy in the event of hacking or bugs, despite it being decentralized and open-source. How can we make the system involve less stake?

It can be subtle, depending on the intertwining processes in the algorithm. Take, for example, the design of a voting system. First Past the Post (FPTP) is more dangerous than Single Winner Approval. Single Winner Approval is more dangerous than Multi-Winner Approval (in thousands). Similarly, elections every five years are more dangerous than elections every six months. With direct democracy, stakes will be low, and there will be less chance of coercion.

We can also create a low-stakes system by decentralizing various supply chains and institutions, as well as separating powers, making them autonomous. This can be achieved through separate governance using different methods like separate voting system, whether it's in social media, journalism, the police force, transportation, super markets, universities or even by decentralizing the power of election commissions to ensure that free and fair ballot paper elections are conducted.

Why income inequality exists?: Yard-sale Model

Here is simulation of Yard-sale model that explains why do super rich people exist in a society?

https://pudding.cool/2022/12/yard-sale/

The rich get richer and the poor get poorer. You've heard that before. It is a maxim so often repeated, and so often confirmed by experience, that begins to sound like a law of nature, as familiar and irresistible as gravity. And indeed perhaps there is some physical or mathematical rule governing the distribution of wealth in the world.

In a yard sale simulation, participants are typically given a random initial amount of wealth. The simulation then proceeds in rounds where each participant can engage in trading with one another. The rules of trading are as follows:

  1. Two participants randomly choose each other as trading partners for the round.
  2. Each participant proposes an exchange of wealth, which can be equal, unequal, or even involve giving away wealth without receiving any in return.
  3. The other participant can accept or reject the proposed trade.
  4. If the trade is accepted, both participants update their wealth accordingly.
  5. The process repeats with a new set of trading partners.

In this model, it has been observed that as the trading rounds continue, the wealth tends to accumulate in the hands of a single individual or a small group of individuals. This phenomenon is known as the "rich get richer" effect, where those who have more wealth can afford to make more advantageous trades, thus further increasing their wealth.

Conversely, those with less wealth have fewer opportunities for advantageous trades and may even be forced to make unfavorable trades to stay afloat. This leads to a widening wealth gap, with the rich getting richer and the poor getting poorer. Eventually, one individual or a small group of individuals accumulates almost all of the wealth, creating a winner-take-all scenario.

In summary, a yard sale simulation demonstrates the potential for wealth inequality to increase over time, particularly when trading is based on individual preferences and without any external regulation or intervention. This can serve as a cautionary tale for understanding the dynamics of wealth distribution in real-world economies.

What if we implement a system where wealth is redistributed?

In his 2002 paper discussing this concept, Chakraborti suggested that government intervention through taxation could prevent wealth concentration.

So, let's reconsider the scenario: what if, in each round of the game, we collect a portion of money from every participant and distribute it equally among all players? This approach reflects the significant taxation in many countries, where higher taxes are often levied on the wealthy. Moreover, tax revenues typically fund government programs that predominantly benefit lower-income individuals.

But does it work? In the United States, for instance, the wealthiest 20% of households currently possess approximately 70% of the total wealth. However, this statistic fails to fully illustrate the extent of wealth inequality: If the entire US population were condensed into a room of 1,000 people, the richest individual would possess four times more wealth than the poorest 500 combined.

The top 10% of the Indian population holds 77% of the total national wealth. 73% of the wealth generated in 2017 went to the richest 1%, while *670 million Indians who comprise the poorest half of the population saw only a 1% increase in their wealth.

Another aspect to consider within this simulation is that even with redistribution, the wealthiest participant still retains a vastly disproportionate amount of wealth compared to the poorest. Furthermore, this discrepancy arises purely by chance. Now, envision applying this model to real-world scenarios: inevitably, some affluent individuals would argue that their wealth accumulation stems from their superior ability to predict coin toss outcomes.

Who pays the tax doesn't depend on who writes the check to the goverment

Who pays the tax does not depend on who writes the check to the government. For example, suppose the government is taxing apples. The government could make the buyer of apples pay for each apple that they buy. Or they could require the sellers of the apples pay for each apple that they sell. What we're going to show is that, from the point of view of the buyers or sellers, it actually doesn't matter how the tax is placed. The actual outcomes are going to be identical.

Taxation on individuals and corporations are almost the same thing. Taxation is not an effective way to tackle income inequality. Further taxation causes deadweight loss, which refers to the value of transactions not made because of the tax. There is no revenue on transactions that aren't completed. Deadweight loss, a concept in economics, refers to the inefficiency created by taxes that lead to a reduction in overall economic activity and transactions. This loss occurs because taxes alter the behavior of both consumers and producers, leading to transactions that would have occurred in the absence of taxes to be foregone. As a result, there is a loss of potential economic value that goes unrealized, and the government does not collect revenue on transactions that never take place.I

Taxation a tool to further income inequality

Moreover, some governments use excessive taxation as a tool to further wealth inequality, by providing loan write-offs for corporations while neglecting the impact of taxation on the general population. This approach decreases economic activity due to deadweight loss, and loan write-offs drain wealth from people and transfer it to large corporations.

The implementation of the Goods and Services Tax (GST) in India is one example.

There is no data available on which categories tax collection is highest. Details categorical tax collection data is needed. As tax collection is high, but there isn't much increase in income or spending, one can say that the government is heavily taxing inelastic goods. According to economics, the deadweight loss is less for inelastic goods because people don't have substitutes for these goods to avoid the tax. In other words, goods that are considered basic necessities are taxed rather than luxuries. Heavy taxation in poor countries like India places significant pressure on the working class and unemployed.

Inheritance tax and wealth redistribution

Inheritance tax, also known as estate tax, is a form of wealth redistribution that aims to reduce economic inequality by taxing the transfer of assets from one generation to another. This tax is levied on the value of a deceased person's estate before it is distributed to their heirs. The rationale behind this tax is that it prevents the accumulation of vast wealth within a small number of families, thereby promoting social mobility and ensuring that the overall distribution of wealth in society is more equitable. Critics argue that inheritance tax can discourage entrepreneurship and wealth creation, as well as burdening middle-class families with large tax bills. However, proponents maintain that inheritance tax is an essential tool for promoting social justice and preventing the creation of a permanent aristocracy of wealth.

Does inheritance tax discourage entrepreneurship and wealth creation? It depends on execution, and it's a more complex issue of business logistics. It can actually be used to break monopolies and foster more entrepreneurship.

It's not something that we will implement inheritance tax and things will now work fine. It can actually disrupt the business and make goods more expensive for consumers through taxation. One needs to find ways for more competition, remove barriers in markets, and ensure the efficient transfer of ownership to distributed networks so that logistics remain efficient without creating a burden on common people.

By breaking up concentrations of wealth and redistributing it among smaller entrepreneurs, inheritance tax can help prevent the formation of monopolies and oligopolies that can stifle competition and innovation. This can lead to a more vibrant and competitive business environment, which can ultimately benefit consumers, businesses, and the economy as a whole.

We need to start thinking about pre-distribution

We need to start thinking about pre-distribution — the mechanisms that determine the distribution of income in the market itself, before taxes and transfers — and less about redistribution.

Shifting the focus towards pre-distribution entails a fundamental reevaluation of economic policies and structures to address income disparities at their source, rather than relying solely on redistribution measures after income has already been unequally distributed. This concept emphasizes proactive interventions within the market itself to promote fairer outcomes from the outset.

At its core, pre-distribution acknowledges that the initial distribution of income within a market economy is influenced by various mechanisms such as labor market dynamics, corporate governance structures, technological advancements, and institutional frameworks. By directing attention towards these mechanisms, policymakers can implement strategies that foster greater equality in the distribution of income, even before taxes and transfers come into play.

We can achieve pre-distribution by reinventing our organization stopping monopolies, and building cooperatives and decentralized autonomous organizations with pre-distribution built-in, using game theory through smart contracts.

The Law of Dismissing Return, the Solow Model, and the Steady State: Why Unlimited Growth is not Possible

Course Link

Introduction:

In the pursuit of economic growth, nations often face the challenge of maintaining a delicate balance between investment and depreciation. The Law of Dismissing Return, as elucidated by the Solow Model, sheds light on the inevitability of capital depreciation and the importance of achieving a steady state. This state represents a crucial equilibrium where investment equals the amount required to repair depreciation, offering insights into why infinite growth is an unattainable goal. This article explores the concept of the steady state, emphasizing the need for sustainable economic practices and addressing the question: What do we do with the output?

The Nature of Capital:

Consider physical capital as the backbone of economic progress – roads, machinery, and infrastructure. However, this capital, much like any other asset, is subject to wear and tear. The more it is utilized, the more it depreciates. The Solow Model introduces the notion of capital rusting or depreciating, making it essential for nations to make choices regarding the upkeep of existing capital.

The Steady State:

The steady state level of capital is the focal point where the investment matches the depreciation. At this juncture, economic growth stagnates, and the capital stock remains constant. It's a delicate equilibrium, a point of balance where nations must allocate resources to repair and replace worn-out capital. This prompts an essential question: Can we sustain growth indefinitely, or is there an inherent limit imposed by the Law of Dismissing Return?

Understanding the Growth Tracks:

Examining the growth trajectories of nations like Germany and Japan post-World War II provides valuable insights. Initially, these nations experienced rapid growth as the first units of capital proved highly productive, generating substantial output. However, over time, the Law of Dismissing Return manifested itself, leading to diminishing returns on capital.

Sustainable Growth and the Steady State:

The key lesson from the steady state concept is that continuous and unchecked growth is unsustainable. Nations must strike a balance between consuming output and saving it for re-investment. The saved output serves as the fuel for future economic growth but necessitates addressing the challenges of capital depreciation.

The Role of Education and Labor:

While the Solow Model emphasizes the importance of capital, it also acknowledges that growth isn't solely dependent on it. Education (e) and labor (L) are two additional variables that influence economic growth. In the pursuit of sustainable development, nations must consider these factors, recognizing their contribution to overall economic well-being.

Conclusion:

The Law of Dismissing Return, as embedded in the Solow Model, reinforces the idea that infinite economic growth is an unsustainable pursuit. The steady state provides a critical reference point, urging nations to prioritize sustainable practices that balance investment with the inevitable depreciation of capital. As we consider the output of our economic endeavors, it becomes apparent that responsible consumption, savings, and strategic re-investment are vital components of a resilient and enduring economic framework.

The Impact of Negative Externalities on Sustainable Growth:

While the concept of the steady state underscores the importance of balancing consumption and saving for re-investment, it is crucial to delve deeper into the challenges posed by negative externalities. Negative externalities refer to the unintended and adverse side effects of economic activities that affect parties not directly involved in the activity. In the context of sustainable growth and the steady state, negative externalities contribute to the extra and unnecessary investment required to repair the system.

The Unseen Costs of Unchecked Growth:

Unchecked economic growth often leads to the generation of negative externalities, such as environmental degradation, pollution, and resource depletion. These externalities impose hidden costs on society, costs that are not factored into the market prices of goods and services. As nations pursue continuous and unchecked growth, the accumulation of these negative externalities puts a strain on the very systems that support economic activities.

Environmental Degradation and Capital Depreciation:

One of the most significant negative externalities associated with rapid growth is environmental degradation. Industrial activities, deforestation, and overexploitation of natural resources contribute to the deterioration of ecosystems. The consequence of this degradation is accelerated capital depreciation. For instance, if a nation exploits its natural resources without adequate conservation measures, the environment, a vital form of capital, deteriorates, necessitating extra investment to restore or replace what has been lost.

Infrastructure Strain and Reparative Investment:

Unchecked growth also puts immense pressure on infrastructure, leading to negative externalities that require additional investment for repair and maintenance. Increased traffic on roads, for example, not only contributes to wear and tear but also generates air pollution. This dual impact necessitates extra investments in both road repairs and environmental cleanup. Similarly, industries with poor waste management practices may face costly repercussions, including regulatory fines and the need for environmental remediation.

Social and Health Costs:

Negative externalities can also manifest in the form of social and health costs. For instance, industries emitting pollutants may adversely affect public health, leading to increased healthcare expenditures. Addressing these health-related negative externalities requires additional investments in healthcare infrastructure and services.

Shifting Investments Away from Essential Needs:

In the long run, there is an imperative need to invest in repairing the negative externalities created; otherwise, it can have catastrophic effects, ultimately leading to a shortage of funds and causing poverty. The principle of "prevention is better than cure" underscores the importance of addressing environmental challenges proactively. Failing to invest in mitigating negative externalities not only risks environmental degradation but also places an unsustainable financial burden on societies. As environmental issues escalate, the need for resources to rectify the damage intensifies, diverting crucial funds away from essential sectors. This diversion, coupled with the economic repercussions of environmental deterioration, can perpetuate a cycle of resource scarcity and poverty, emphasizing the urgency of preventative measures to ensure a sustainable and equitable future.

The Call for Responsible Growth:

Understanding the interplay between negative externalities and the challenges of capital depreciation is essential for nations aspiring to achieve sustainable growth. The steady state concept, while highlighting the need for a balance between consumption and saving, underscores the importance of responsible growth. Responsible growth involves considering the long-term consequences of economic activities, internalizing the costs of negative externalities, and making informed decisions that prioritize the well-being of both current and future generations.

Conclusion:

In conclusion, the pursuit of sustainable growth requires acknowledging and mitigating the impact of negative externalities. Unchecked growth may provide short-term economic gains, but the long-term consequences, including increased and unnecessary investment to repair the system, can be detrimental. Nations must embrace a paradigm of responsible growth, where the costs of negative externalities are internalized, and decisions are made with an understanding of the interconnectedness of economic, environmental, and social systems. By doing so, nations can navigate towards a more resilient and sustainable future, striking the delicate balance needed to maintain the steady state and ensure the longevity of their economic endeavors.

Does price floor works?

A price floor is a minimum price allowed by law. That is, it is a price below which it is illegal to buy or sell, called a price floor because you cannot go below the floor. We're going to show that price floors create four significant effects: surpluses, lost gains from trade, wasteful increases in quality, and a misallocation of resources.

What is surplus of labor with mininum wage? Unemployment

The minimum wage is a price floor, so it's going to create a surplus. A surplus of labor, we call what? A surplus of labor is called unemployment.

Price Floor

Course Link mru.org

Now, who will the minimum wage affect?

Now, who will the minimum wage affect? Workers with very high productivity who are already earning more than the minimum wage – they are not going to be affected by the minimum wage perhaps at all. Instead, it will affect the least experienced, least educated, least trained workers. Low-skilled teenagers, for example, are most likely to be affected by the minimum wage.

Modest increase in minimum wage

Now the minimum wage is a controversial and hotly debated issue. Some academic results indicate that the unemployment effect of a modest increase in the minimum wage would not be substantial. At the same time, however, we also have to recognize that a modest increase in the minimum wage would not have big benefits either. First, only a small percentage of workers are going to be affected by the minimum wage. 97% or so of workers already earn more than the minimum wage.

Large increase in the minimum wage

So a large increase in the minimum wage is going to cause serious unemployment, and the good example of this is Puerto Rico in 1938. Congress actually set the first minimum wage at this time at 25 cents an hour. Now that may seem low, but that's at a time when the average wage in the United States was still less than a dollar an hour, was 62 and a half cents an hour. Congress, however, forgot to exempt Puerto Rico, when the average wages in Puerto Rico at that time were much lower than in the rest of the United States, only three cents to four cents an hour. And lots of Puerto Rican firms went bankrupt, it created devastating unemployment. In fact, Puerto Rican politicians came to Washington to beg for an exemption to get them out of the minimum wage. So, a large increase in the minimum wage would certainly cause substantial and serious unemployment.

We do see higher minimum wages in other countries. The minimum wage in France is higher than the U.S., relative to average wages in those two countries. In addition, labor laws in France make it very difficult to fire workers once they have been hired. As a result, firms in France are very reluctant to hire new workers.

Younger workers are especially affected because they are less productive, and also they are less known commodities. So, the risk of hiring them is greater. As a result, unemployment among young workers is very high in France. It was 23% in 2005, and that was long before the economic crisis, the financial crisis affecting the entire world. So even during good times, unemployment in France among young workers is very high, because the minimum wage is high, and because firms don't want to hire, given how difficult it is to fire workers.

Why do governments enact price controls?

So far, we've looked at a number of the consequences of price controls, both price ceilings and price floors. And most of the consequences, they're not very good.i

Public simply did not connect wage and price controls with their consequences

In November of 1972, Nixon won re-election in a landslide. So, wage and price controls were popular. Nixon was re-elected with this policy as well as with others. Now, why is this? I think in many cases, in a majority of cases, the public simply did not connect wage and price controls with their consequences. So, looking around and the shortages, the long line-ups for gasoline, they didn't say the cause of that is the price control.

Price floor in agriculture

Price floors are also used often in agriculture to try to protect farmers.

As you might have guessed, this creates a problem. There is less quantity demanded (consumed) than quantity supplied (produced). This is called a surplus. If the surplus is allowed to be in the market then the price would actually drop below the equilibrium. In order to prevent this the government must step in. The government has a few options:

  1. They can buy up all the surplus. For a while the US government bought grain surpluses in the US and then gave all the grain to Africa. This might have been nice for African consumers, but it destroyed African farmers.

  2. They can strictly enforce the price floor and let the surplus go to waste. This means that the suppliers that are able to sell their goods are better off while those who can't sell theirs (because of lack of demand) will be worse off. Minimum wage laws, for example, mean that some workers who are willing to work at a lower wage don't get to work at all. Such workers make up a portion of the unemployed (this is called "structural unemployment").

  3. The government can control how much is produced. To prevent too many suppliers from producing, the government can give out production rights or pay people not to produce. Giving out production rights will lead to lobbying for the lucrative rights or even bribery. If the government pays people not to produce, then suddenly more producers will show up and ask to be payed.

  4. They can also subsidize consumption. To get demanders to purchase more of the surplus, the government can pay part of the costs. This would obviously get expensive really fast.

Price floor surplus, Minimum Support Price (MSP) and poverty

In India, 6.7 million children are going without food, and the question is whether a price floor can still create a surplus. Surplus occurs not because there are not enough people who need the product, but because enough people fail to purchase it at a particular price. At a price floor, there will be far more people who fail to purchase it as the quantity supplied exceeds the quantity demanded, as shown in the diagram.

This can be one reason why poverty persists even after two to three centuries of free market trade, despite our technological efficiency being sufficient to produce all the necessary goods to serve the entire human population.

Furthermore, the free market also facilitates wealth transfer or benefits to the rich. Shortages lead to price increases, and it is only the rich who can afford goods in cases of scarce resources.

Related:

Yard Sale Model

Socialism

So price floor is a bad idea. In what way we can protect farmers?

Todo!

When to control prices? Does it have any advantages?

Price controls – advantages and disadvantages

Price Gouging

Price gouging is the practice of increasing the prices of goods, services, or commodities to a level much higher than is considered reasonable or fair. Usually, this event occurs after a demand or supply shock.

Price Gouging

Hoarding

Hoarding: Definition, How It Works with Commodities, and Examples

Hoarding is the purchase and warehousing of large quantities of a commodity by a speculator with the intent of benefiting from future price increases.

Hoarding is commonly criticized for creating shortages of goods in the real economy. It is possible for hoarding to create a cycle of speculation, self-fulfilling prophecies, and inflation.

If several wealthy individuals start hoarding wheat, the price will begin to increase. Middle-class merchants will notice, and then they might hold back wheat supplies in anticipation of future price increases. That is enough to raise prices again. Panicked buying may create real shortages of wheat in some locations. The poorest in some countries could even be at risk of starvation if the cycle continues beyond that point.

Maximum Retail Price (MRP) to tackle price gouging of retailers

Maximum Retail Price

Retailers charging more than MRP

On being asked, a shopkeeper blatantly said, “I sell a chilled bottle of soft drink for `35 as I need to recover the cost of electricity used by the refrigerator. Everyone is selling cold drinks for more than the MRP. If we don't do that, we will face losses.”

However, according to sources, bottles of soft drinks and mineral water are purchased by retailers at wholesale prices, which help them make profit even after adjusting cost of electricity. Besides, the companies also provide them several schemes.

Do we need a supreme leader? How can we share power between parties?

date: "2023-03-30"


categories:

  • "democracy"
  • "electoral-reform"
  • "policies"
  • "politics"

India is currently in a risky predicament or situation. Judiciary is manipulated and attacked like never before in my lifetime. The CBI, ED, and courts are being used to try and silence any dissident opposition views.

The judiciary is never independent. Govt can coerce judges or help in the appointment of corrupt judges. Or can pass law, compromising the fundamental rights and using law to abuse opposition or suppress dissent. To have a strong justice system we need to have strong democracy first.
Countries with inferior democracy always have an inferior judiciary.

Despite the central govt getting just 37% of votes, their power is far-reaching and autocratic.

Vote Percentage

The BJP only has 37% of the vote. Why does it have 100% control over the ministry and why does it possess 55% of the seats?

Opposition States

Center in India controls the media, center controls the ministry to attack opposition or regional parties, despite about 50% of the country belongs to opposition. This is not possible with Open List Proportional Representation or PR Approval Voting.
Because of the ministry, India needs a coalition. It's very hard to collate with different ideologies.

After FPTP(First-past-the-post voting) or choose one voting there are so many option, PR, Approval, Star, Rank choice, Rank Robin. Yes, you can discuss merits and demerits of each one but put an end to FPTP/Plurality.

FPTP is the most terrible method, which the majority of electoral scientists agree on.

Why would the Modi government have complete control over minister selection when 50% of the nation is made up of regional parties?

Parliamentary or Presidential form of government? What’s in the name?

In contrast, in India, the Prime Minister has the authority to appoint ministers at their discretion, which can lead to a potential conflict of interest. For example, ministers may serve as mere marketing agents for the Prime Minister, aiming to enhance the Prime Minister’s image. It’s worth noting that, even though laws are meant to be the same for everyone, there can be discrimination in their execution by ministers based on their interests. One example of this can be selective enforcement of corruption laws, with a bias towards opposition parties, while members of their own party may go unpunished for similar violations.

The solution: Proportional Representation and Approval Voting

OLPR can have most of the advantages such as inclusiveness, lack of wasted votes, promoting diversity in parties and candidates, and promoting multi party system. Some countries, such as Belgium and Denmark, combine both elements.

Voters can vote for a list or for a candidate or candidates. Its #ApprovalVoting. Voters are sometimes given further choices and powers. In countries such as El Salvador, Honduras and Switzerland, voters can vote for candidates from different candidate lists (panachage), while in those such as Luxembourg and Switzerland, voters can also vote against as well as for candidates.

You can read about open list proportional representation here.
Open List Proportional Representation: The Good, the Bad and the Ugly

And difference between open list proportional representation and mixed member proportional representation here:

Open list PR is about voter choice in selecting individual candidates, Mixed Member Proportional (MMP) is a system that retains the constituency element.

Open-list proportional representation vs. Mixed-member proportional representation

India is becoming increasingly divided and polarized, and hate speech is so pervasive. With approval voting, politicians are not incentivised for hate speech.

You can read about approval voting here.
https://electionscience.org/library/approval-voting/

Ten Critiques of Approval Voting
https://electionscience.org/voting-methods/ten-critiques-and-defenses-on-approval-voting/

Critique #2: Approval voting degenerates to bullet voting (choosing only one candidate).

What we tend to see is that the average number of votes per ballot increases as the number of candidates increase. That is, fewer candidate options tends to mean that voters choose fewer candidates, and more candidate options tends to mean that voters choose more candidates. This is intuitive.

In fact, in many cases where there’s an approval voting election, a large number of people do tend to bullet vote. The important part is that voters have the option to support multiple candidates when they need it—even when it’s only a fraction of voters who need it. And it only takes a fraction of voters who support multiple candidates to change the outcome of an election. Even in an extreme situation where 90% of people bullet vote, those 10% choosing multiple candidates can sway the election (most often for the better).

Being able to support multiple candidates is a rather big deal for third parties and independents. As those candidates’ support grows, it’s essential that voters be able to support them to give their ideas credibility when it’s warranted. It’s preposterous to suggest that the same third-party sympathizers who hold their nose while voting for a major party wouldn’t support both a major party and a third party if given the chance. There is nothing to lose for them and everything to gain.

How many countries around the world use proportional representation?

There are 109 countries which use either a Proportional Representation or a mixed system across the world.
Only 47 countries use the First Past The Post system, a minority of countries globally, one of which is the United Kingdom.
Those that still use First Past the Post tend to have it as a result of being former British colonies.
WHY WILL INDIA FOLLOW THE OLD BRITISH COLONIAL RULE? How many countries around the world use proportional representation?

PR for women

The research community is united in declaring that PR elects more women. One of the most widely accepted theories is that multi-member districts allow more women to be elected because parties will want to put forward a diversified slate of candidates to reach a wider range of voters.
https://www.fairvote.ca/women/

Proportional representation helped women get elected in 2022

In 2022, countries with either proportional representation (PR) or mixed electoral systems collectively elected 29% women to their parliaments, whereas countries with majority or plurality systems like First Past the Post only elected 22.4% women to their parliaments. The electoral system used also influences the likelihood of applying gender quotas.

Of those countries holding elections in 2022, nearly three-quarters (73%) of countries with PR or mixed electoral systems had either a voluntary or legislated gender quota in place, whereas in majority or plurality systems nearly three-quarters of countries (73%) did not have any type of quota in place.

The representation of women in the Lok Sabha in India stands at a mere 14%, while in the Rajya Sabha, it is even lower at 11%. It is essential for every woman in India to advocate for #ProportionalRepresentation.

Proportional representation helped women get elected in 2022

PR for climate change

As evidence from around the globe shows, proportional representation creates a virtuous cycle for the environment. Voters who care about environmental protection elect candidates who agree. Those representatives introduce new ideas about renewable energy and clean air, they work together to pass durable policies, and they act quickly on important issues like climate change. Cascadian voters care about clean air, clean water, and climate action. ProRep can turn their values into reality.

https://www.sightline.org/2018/10/29/proportional-representation-delivers-stronger-environmental-solutions/

PR for Minorities

With the current govt hatred towards Muslim minorities increasing, govt has also shown a far-right homophobic stand towards LGBTQA+ community. Proportional representation gives more representation and negotiation power to minorities, which is hardly possible in winner take it all system.

India: Government Policies, Actions Target Minorities

https://www.hrw.org/news/2021/02/19/india-government-policies-actions-target-minorities

Modi’s Power to Sideline Challengers Is Only Growing

https://www.nytimes.com/2023/03/29/world/asia/modi-india-gandhi-judiciary.html

PR to reduce corruption

Approval voting and proportional representation are fully effective, in the sense that all equilibria exclude corrupt parties from legislative seats.

Effectiveness of Electoral Systems for Reducing Government Corruption: A Game-Theoretic Analysis

https://www.sciencedirect.com/science/article/abs/pii/S0899825683710067

You can check out countries with least corruption have Proportional Representation

Corruption Perceptions Index

https://www.transparency.org/en/cpi/2022

How can we use proportional representation with Approval voting without any complicated algorithm?

How can we use proportional representation with Approval voting without any complicated algorithm like seq phragmen, and allowing selecting candidates based on ward or district. Seq phragmen is ok to be used in blockchain but not practical for paper ballots.

Instead of giving the number of seats as proportional, we can make voting power/weightage proportional. For example, the party with 33% votes will have 33% weightage for votes, no matter how many seats or candidates vote from the party. It applies to the district assembly, state assembly or country assembly (Lok sabha) The second winner or third winner of approval voting can also vote without creating any problems because of the weightage system.

Here is the complete algorithm:


# Ward 1
party_green_candidate_1 = 70 
party_red_candidate_1 = 51
party_yellow_candidate_1 = 31
#Ward 2
party_red_candidate_2 = 81
party_yellow_candidate_2 = 62
party_green_candidate_2 = 31
# Ward 3
party_green_candidate_3 = 60
party_red_candidate_3= 50
party_yellow_candidate_3 = 40
total_votes_green_party = party_green_candidate_1 + party_green_candidate_2 + party_green_candidate_3
print(total_votes_green_party)
total_votes_red_party = party_red_candidate_1 + party_red_candidate_2 + party_red_candidate_3
print(total_votes_red_party)
total_votes_yellow_party = party_yellow_candidate_1 + party_yellow_candidate_2 + party_yellow_candidate_3
print(total_votes_yellow_party)
# As there are three candidates, vote weightage for each candidate = total votes for party/3
weightage_green_candidate = total_votes_green_party/3
print(weightage_green_candidate)
weightage_red_candidate  = total_votes_red_party/3
print(weightage_red_candidate)
weightage_yellow_candidate = total_votes_yellow_party/3
print(weightage_yellow_candidate)
# Policy passing
# 2 candidate of green party gave yes, one gave no
# 2 candidate of red party gave no, one gave yes
# 3 candidates of yellow party gave yes
yes_votes = 2* weightage_green_candidate + 1 * weightage_red_candidate + 3 * weightage_yellow_candidate
print(yes_votes)
no_votes = 1* weightage_green_candidate + 2 * weightage_red_candidate + 0 * weightage_yellow_candidate
print(no_votes)

It makes all candidates powerful with the amount of voting power they have, without winner-take-all system.

Feedback are welcome.

Is open list proportional representation without approval voting sufficient?

The article says,
Like all electoral frameworks, none of the OLPR variants are perfect. All have advantages and disadvantages in achieving the objectives required of an electoral system in a specific country environment.

While there are critics of OLPR, many of the criticisms are based either on specific elements of its configuration in a specific country or on elements that are external to the system itself (e.g. poor implementation of controls on political financing in Indonesia). While there have certainly been ugly configurations of OLPR, such as in Colombia before 2003 (see Albarracin and Milanese 2012), if configured sensibly and with adequate controls on political behavior, OLPR can facilitate a wider range of electoral system objectives than many other electoral systems.

Open List Proportional Representation: The Good, the Bad and the Ugly

Let's take India as an example and assume what can change in India if we implement open list proportional representation.
India already has a multi-party system. It's not like the US with two parties. Last election (2019) BJP won by 37% votes. With proportional representation, BJP will get 37% seats rather than 55% seats, so it will empower the opposition more.

But still, there is a problem. Specific elements of its configuration part of OLPR. Will it eliminate the need for a coalition govt? If even after proportional representation they move to a coalition, the problem of partisanism and "winner-take it all" arises again. The coalition govt with more votes will control the nation and ministry.

Let's look at another problem.
Here is a plurality voting example.

Vote Splitting

Now, a open-list ballot.

Open list ballot

Now candidates are replaced with parties (with candidates). Will it end polarization? Polarization happens because of the center squeeze effect and vote splitting. Candidates with similar ideologies split their votes, but here in the party list, parties with similar ideologies will split their votes. In FPTP more than 50% of the vote gets wasted. But the benefit of PR is even if Hitler gets the highest votes, more than 50% of power remained with the opposition, with no vote wastage. So yes it decreases polarization but doesn't eliminate the benefits of polarization.

But with approval voting, Matin Luther King, Tuban, Mother Terasa, Gandhi will get about equal but more votes and votes for Hitler will further decrease.

Furthermore, without Approval voting, the chance for new parties is still lower but PR alone (without approval voting) do helps new parties by eliminating wastage of votes and decreasing tactical voting.

We can look at the Sri Lanka election with PR (no approval voting). Sri Lanka People's Freedom Alliance has 59.09% of the seats, Samagi Jana Balawegaya 23.90% of the seats, whereas other parties' strengths are negligible despite proportional representation.

PR with Approval Voting brings more competition, in other words, it provides more choices and also collaboration and corporation of representatives as there are no incentives for polarization.

Top 5 Ways Plurality Voting Fails

https://electionscience.org/voting-methods/spoiler-effect-top-5-ways-plurality-voting-fails/

Critiques of Proportional Representation

PR generates weak, ineffective, and unstable governing coalitions

PR governments are not unstable, rather a coalition of majoritarian govt with FPTP is unstable. In FPTP parties have a high chance of getting out of coalitions whenever their interests are not met. Defection of MLAs and MPs from parties is so common in politics. This breaks the majority, hence breaking the government. In PR even if you stop participating or if you don't vote in decision-making, nothing happens, other parties together can make the decision. Changing the party or defection has no impact on decision making due to the weightage-based voting system, which is based on the number of votes won.

It's difficult to assign clear responsibility and decision-making is slow in the PR

PR is better at assigning responsibility. It hardly takes an hour to vote and take decisions. Yes, draft preparation can time, but it's a good thing because the inputs of all parties are taken. Ministers of the department can be selected by voting like based on their party vote weightage. As all parties are involved, ministers and bureaucrats are selected by consensus, and they are not partisan. Ministers will care about all parties' interests rather than the majoritarian party. For example, in India, media freedom has gone to its lowest, and hatred and conspiracy theories are at peak, this won't have happened if ministers are selected by consensus. President too will no more a rubber stamp, a person of integrity will be selected.

PR legitimizes extremist parties

FPTP legitimizes extremist parties, as they have incentives to polarize and split votes. Further extremist parties get more seats than votes in FPTP. In PR they won't get more power than the number of votes. We can also reduce the extremist parties' votes by using approval voting or negative votes.

Proportional representation promotes collaboration and energy is used on development politics and calling out and eliminating the bad candidates/parties rather than fighting with each other even if they have shared values to win seats. For example here Gandhi, Martin Luther King, Tubman and Mother Teresa would have collaborated and would have called out Hitler instead of fighting with each other to win seats due to FPTP. Hitler decisions will be ineffective as he will not get enough votes to take decision.

PR causes you to lose the constituency

There are different versions of PR that can be adapted to various forms. PR, in its fundamental principle, means that the percentage of seats should be equal to the percentage of votes the party receives. In other words, power aligns with the number of votes a candidate or party receives. To maintain a constituency element, one can consider options such as Mixed Member Proportional (MMP) representation or power weighting equal to the amount of votes the candidate receives, as explained in the algorithm above.

How can we transition from FPTP to Proportional Representation?

States can implement PR:

States can implement Proportional Representation (PR) in their State Legislative Assemblies. Our constitution does not explicitly specify whether to use First-Past-the-Post (FPTP) or Proportional Representation. Nevertheless, it's worth noting that FPTP does not align with constitutional principles such as inclusivity and equality.

Implementing PR at the national level can be challenging. Therefore, individual states have the opportunity to experiment with PR, potentially sparking a broader movement towards electoral reform.

FPTP often provides an advantage to incumbents, or those who are already in power. Incumbents might resist changing the electoral system because FPTP makes it relatively easier for them to maintain their positions due to the concentrated nature of the voting.

Parties are made out of representatives (Sarpanch, MLAs, MPs, Council members, etc). Representatives need to understand that it causes no harm at the individual representative level. There is no mention of parties in our constitution. Larger parties can split into smaller parties, and individual representatives don't have to maintain a partisan stance. This leads to a more fairer and level playing field for representatives or parties in elections.

There are ways smaller parties can overcome the resistance to change. They can simply collaborate and share the seats to avoid vote splitting.

Nominee Selection:

Nominee can be selected from parties that collaborate through Approval voting or Score voting. Voting can be done by citizens and party members.

Parties can use sms or apps to vote, or getting feedback from surveys to select best candidates. The problem with voting through apps or SMS is without kyc electoral fraud is likely. The locality or constituency of the voter can be faked, and multiple votes can be submitted by a single user. A better approach is to establish polling booths organized by the parties to obtain authentic and accurate data. While the voter turnout might be low, it would provide a reliable sample for making inferences about the population.

A good sample is one that is randomly selected from the population, aiming to reduce bias by encompassing everyone—nonpartisan, opposition and loyal voters—without favoring loyal voters.

About 3 to 5 nominees from different parties can be selected. These 3 to 5 nominees will participate in the election for a single seat. Diverse types of nominees can be selected to appeal to a broader range of communities.

As single seat is shared by 3 to 5 members, it attracts more voters, thereby increasing the chances of winning. It also increases decentralization of decision making. Helps to prevent vote splitting, which can be detrimental to smaller parties under FPTP. Choosing nominees through approval voting and surveys enhances the likelihood of victory by incorporating the people's preferences into the selection process.

Seat sharing Agreement:

Seat sharing agreement can be made by the nominees to share power after they win. The power weightage of nominees can be based on the count of approval votes cast by citizens prior to the election, or they can possess equal weightage.

Such weightage is used in decision-making within citizen assemblies. Seat-sharing agreements are established to prevent winners from defecting.

In this manner, different parties can unite in the FPTP system, significantly enhancing their chances of winning by multiple folds by eliminating vote splitting. After they win, they can transition from FPTP to proportional representation.

What if the opposition challenges the seat-sharing contract in court, for example, MPs seats, or if the Supreme Court doesn't allow it?

A written agreement can be made public along with the signatures of those involved; it's not necessary for it to be legally binding. Based on this declaration, people will vote. Simply making a public declaration can reduce the chances of defection. Among the 3-5 nominees, award the MP seat to the individual with the highest approval votes. After MPs win, they can change the law accordingly.

Sketch to build a agreement or contract.

The Lok Sabha election is about regional parties, third parties and independent vs one-party dictatorship.

date: "2023-12-05"


categories:

  • "politics"

What strategies has the BJP employed?

  1. Casting Hindus as victims and promoting nationalism.

  2. Positioning Congress as the opposition and trolling Rahul Gandhi. Portraying Modi as a supreme leader ( but a cult leader in disguise) and discrediting Rahul Gandhi as unfit for the PM role. It's crucial to note that the opposition is not the Congress, which currently holds only 50 seats in the Lok Sabha and may at most reach 150. Moreover, Rahul Gandhi is not PM candidate; the INDIA bloc is a coalition of regional parties, requiring a nuanced narrative.

  3. Propagating unrealistic dreams, such as inflating the GDP with excessive zeroes and aiming for a 5 trillion-dollar economy in five years.

  4. Distributing freebies and money during campaigning/election.

More than 10,000 WhatsApp groups are actively involved in disinformation campaigns, leveraging national media for Hindu-Muslim narratives.

How to tackle disinformation?: Link

People need to understand the intensity of the problem. We are just in a small margin to dictatorship. Opposition and people need to make no mistake. We need to break the brute force majority of one party. Lok Sabha and Rajya Sabha are safeguards of the constitution. Now, Lok Sabha is completely useless. Rajya Sabha is in a small margin. We need not give more than 20% of seats to BJP again.

Necessary sources of political power

From Dictatorship to Democracy: A Conceptual Framework for Liberation

Data: https://github.com/amiyatulu/election_result/blob/main/2019_loksabha/src/loksabha_seats.json

Total data: data_analysis/analysis_data/lokshabha2019

Votes by percentage: analysis_data/lokshabha2019/state_party_data_sorted_percentage/party_votes_by_state_percentage.json

State-wise analysis (2019 Lok Sabha election):

Hindi States

In Hindi states like Gujarat, Rajasthan, Chhattisgarh, Uttarakhand, Haryana and Himachal Pradesh, the BJP secured almost 100% of seats, with Congress only holding one or two seats. The absence of other opposition or regional parties in these states allows the BJP to effectively use the tactics of trolling Congress and promoting the Hindu victim narrative. Limited options for voters make these strategies particularly effective. Using Hindi states, the BJP managed a one-party dictatorship with 300 seats in the Lok Sabha, sidelining all opposition parties and democratic values.

INC got 32% of votes in Gujarat, yet zero seats

So the case of other states:

{
    "Gujarat": {
        "BJP": {
            "votes": 18091275,
            "percentage": 62.20788595983407
        },
        "INC": {
            "votes": 9337084,
            "percentage": 32.10609847395451
        }
    },
    "Rajasthan": {
        "BJP": {
            "votes": 18968392,
            "percentage": 58.47031404395368
        },
        "INC": {
            "votes": 11107910,
            "percentage": 34.240276459489735
        }
    },
    "Chhattisgarh": {
        "BJP": {
            "votes": 6902477,
            "percentage": 50.69962781464669
        },
        "INC": {
            "votes": 5569183,
            "percentage": 40.90640292342263
        }
    },
    "Uttarakhand": {
        "BJP": {
            "votes": 2954833,
            "percentage": 61.013395829999425
        },
        "INC": {
            "votes": 1520767,
            "percentage": 31.401828440456953
        }
    },
    "Haryana": {
        "BJP": {
            "votes": 7357347,
            "percentage": 58.016213493381244
        },
        "INC": {
            "votes": 3604106,
            "percentage": 28.42010620795462
        }
    },
    "Himachal Pradesh": {
        "BJP": {
            "votes": 2661281,
            "percentage": 69.11104174479034
        },
        "INC": {
            "votes": 1051113,
            "percentage": 27.29644649380949
        }
    }
}

BJP got all the seats

{
    "Gujarat": {
        "BJP": 26
    },
    "Rajasthan": {
        "BJP": 24,
        "RLTP": 1
    },
    "Chhattisgarh": {
        "INC": 2,
        "BJP": 9
    },
    "Uttarakhand": {
        "BJP": 5
    },
    "Haryana": {
        "BJP": 10
    },
    "Himachal Pradesh": {
        "BJP": 4
    }
}

Why is there no other opposition in these states?
The First Past the Post (FPTP) voting method maintains a biparty political system. Even if Congress garners 30-40% of votes, it may end up with zero seats because only candidate with highest vote wins, and other votes get waste. What if these 30% seats would have gone only to few constituency? Manipulation of EVM is another variable. (Details about EVM below) A potential strategy for Congress could be targeting specific constituencies, especially those with weaker opponents, to secure a few seats. Winning a seat with just 1% of the vote is possible under FPTP, emphasizing the importance of strategic planning.

States with Competitor

States with more opposition include Maharashtra, Uttar Pradesh, Bihar, and Delhi.
The INDIA bloc must address this challenge by avoiding vote splitting, fostering unity, and strategizing effectively. Leaders like Priyanka Chaturvedi in Shivsena, Akhilesh Yadav in Uttar Pradesh, and Arvind Kejriwal in Delhi play crucial roles.

{
    "Maharashtra": {
        "BJP": {
            "votes": 14912139,
            "percentage": 27.58735969765187
        },
        "SHS": {
            "votes": 12589064,
            "percentage": 23.28968612918375
        },
        "INC": {
            "votes": 8792237,
            "percentage": 16.265580991835147
        },
        "NCP": {
            "votes": 8387363,
            "percentage": 15.516566737727999
        },
        "VBA": {
            "votes": 3743560,
            "percentage": 6.925561535453877
        }
    },
    "Uttar Pradesh": {
        "BJP": {
            "votes": 42858171,
            "percentage": 49.55767597558957
        },
        "BSP": {
            "votes": 16659754,
            "percentage": 19.263973970448536
        },
        "SP": {
            "votes": 15533620,
            "percentage": 17.96180491901854
        },
        "INC": {
            "votes": 5457352,
            "percentage": 6.310434528359497
        }
    },
    "Bihar": {
        "BJP": {
            "votes": 9619548,
            "percentage": 23.573474928517186
        },
        "JD(U)": {
            "votes": 8902719,
            "percentage": 21.81682789483805
        },
        "RJD": {
            "votes": 6270769,
            "percentage": 15.36702304557582
        },
        "LJP": {
            "votes": 3206979,
            "percentage": 7.858959594856339
        },
        "INC": {
            "votes": 3140797,
            "percentage": 7.696775288720634
        }
    },
    "NCT OF Delhi": {
        "BJP": {
            "votes": 4908541,
            "percentage": 56.55644905203495
        },
        "INC": {
            "votes": 1953900,
            "percentage": 22.51293119539413
        },
        "AAAP": {
            "votes": 1571687,
            "percentage": 18.109054348582536
        }
    },
}
{
    "Maharashtra": {
        "BJP": 23,
        "IND": 1,
        "AIMIM": 1,
        "NCP": 4,
        "SHS": 18,
        "INC": 1
    },
    "Uttar Pradesh": {
        "BJP": 62,
        "BSP": 10,
        "SP": 5,
        "ADAL": 2,
        "INC": 1
    },
    "Bihar": {
        "BJP": 17,
        "JD(U)": 16,
        "LJP": 6,
        "INC": 1
    },
    "NCT OF Delhi": {
        "BJP": 7
    }
}

In Delhi, even if AAP wins the Assembly Election, people haven't traditionally voted for them during the Lok Sabha polls because they typically don't favor Congress at the center. However, this time things have changed. AAP is now part of a national party coalition. It's crucial to remember that the INDIA bloc is not synonymous with Congress. Congress currently holds about 50 seats, and it's unlikely to surpass 150 or 200 only after they win in Hindi states. The INDIA bloc is, in fact, a coalition of regional parties, characterized by decentralization and power-sharing. Nevertheless, winning in Hindi states remains crucial for achieving a majority. So, the INDIA bloc needs to work hard to secure Congress's victory and must address the situation if Congress doesn't cooperate.

East India States

East India states, including West Bengal and Odisha: West Bengal has leaders like Mamata Banerjee and Mahua Moitra, who align with the INDIA bloc. Odisha has Naveen Patnaik, though he has no alliance with anyone, but he is a bit pro-BJP and anti-Congress. The BJD party is a bit more opportunistic toward the state rather than involving itself in national politics. As long as the center benefits them, they hardly care about who is in power at the center. Last Loksabha election in Odisha, the largest competitor was BJP, not Congress. So, if Naveen Patnaik wants to stop one-party dictatorship, they need to stop supporting BJP.

All regional parties need to understand what is at stake. They may support BJP, but ultimately, Modi will ditch them after advantage is taken. Their intentions are clear. All need to protest against EVM.

{
  "West Bengal": {
    "AITC": {
      "votes": 24757345,
      "percentage": 43.27679372529672
    },
    "BJP": {
      "votes": 23028517,
      "percentage": 40.25473571614763
    },
    "CPIM": {
      "votes": 3610645,
      "percentage": 6.311546689690433
    },
    "INC": {
      "votes": 3210491,
      "percentage": 5.612062067395416
    }
  },
   "Odisha": {
    "BJD": {
      "votes": 10174021,
      "percentage": 42.75854767828794
    },
    "BJP": {
      "votes": 9130768,
      "percentage": 38.374048851224686
    },
    "INC": {
      "votes": 3285339,
      "percentage": 13.807355446862044
    },
   }
}
{
   "West Bengal": {
    "BJP": 18,
    "AITC": 22,
    "INC": 2
  },
  "Odisha": {
    "BJD": 12,
    "BJP": 8,
    "INC": 1
  },
}

South States:

These states pose less of a threat. In South Indian states Modi is hardly liked. You can analyse other states from the data.

2023 Legislative Assembly Election

I have already discussed the impact of vote splitting and about vote wastage in FPTP voting and how it prevents third parties and independents from winning.

Here is real data on vote wastage in elections. In Madhya Pradesh 109 out of 230 constituencies, the election outcome would be reversed if we consider the count of vote wastage. This indicates that the majority have voted against the winning candidate.

Similarly, in Chhattisgarh 46 out of 90 constituencies, Rajasthan 119 out of 199, Telengana 68 out of 119, and Mizoram 36 out of 40.

Further dissatisfaction by voters, in the form of NOTA, is also evident. They cannot vote for independent candidates because they have almost no chance of winning, and they have preferred NOTA.

In Madhya Pradesh, 193 constituencies recorded more than 1000 votes for NOTA. More than 2000 votes in 79 constituencies, more than 3000 votes in 35 constituencies.

In Chhattisgarh, 64 constituencies recorded more than 1000 votes for NOTA. More than 2000 votes in 46 constituencies, more than 3000 votes in 23 constituencies.

In Rajasthan, 178 constituencies recorded more than 1000 votes for NOTA. More than 2000 votes in 70 constituencies, more than 3000 votes in 30 constituencies.

In Telangana, 81 constituencies recorded more than 1000 votes for NOTA. More than 2000 votes in 22 constituencies, more than 3000 votes in 4 constituencies.

Mizoram has zero NOTA with more than 1000 votes. But it has worst impact on vote splitting.

Update the repository with Karnapur data of Rajasthan, it became 120 out of 200.

Votes by Party in 2023 Legislative Assembly Election

Here is the list of total votes in all constituency by party.

Data by Votes

Data by Percentage

Madhya Pradesh

In Madhya Pradesh BJP got 48% votes, and INC got 40% of votes, where as BJP got 163 seats, INC 66 seats, which means BJP got 70.87% where as INC with 28.70% seats.

Difference in votes between BJP and INC = 8%

Difference in seats between BJP and INC = 42%

Rajasthan

In Rajasthan BJP got 41% votes, and INC got 39% of votes, where as BJP got 115 seats, INC 69 seats (70 seats with karanpur), which means BJP got 57.50% seats where as INC got 35.00% seats.

Difference in votes between BJP and INC = 2%

Difference in seats between BJP and INC = 22.5%

Chattisgarh

In Chattisgarh BJP got 46% votes and INC got 42% of votes, where as BJP got 54 seats, INC 35 seats, which means BJP got 60% of seats, where as INC got 38% of seats

Difference in votes between BJP and INC = 4%

Difference in seats between BJP and INC = 22%

Telangana

In Telangana INC got 39% votes, BHRS got 37% of votes and BJP got 13% of votes, where as INC 64 seats, BHRS 39 seats, BJP 8 seats, which means INC got 53.78% of seats, BHRS got 32.77% of seats and BJP got 6.72% of seats.

Difference in votes between INC and BHRS = 2%

Difference in seats between INC and BHRS = 21%

Other Legislative Assembly Election

Delhi is an outlier among all the parties, where they have own the true majority in 2020. Only 17 constituencies where vote wastage own, out of 70.

In Uttar Pradesh 2022 election, in 301 constituencies out of 403, majority have not voted to the winning candidate.

Similarly, in Punjab, 89 out of 117, the majority have not voted for the winning candidate. Punjab is a different case, as it has recently been taken over by AAP. One can imagine how difficult it is for a new party with a voting method like FPTP.

List of Spoilers with decreasing order of votes:

https://github.com/amiyatulu/election_result/tree/main/2023_legislative_assembly_election/data_analysis/analysis_data/independent_list

In the First Past the Post (FPTP) system, a two-party system predominates, and third parties and independents are viewed as spoilers. People are hesitant to vote for them, fearing that it might result in a wasted vote and inadvertently contribute to the victory of the least favored candidate—someone whom the voter actively wishes not to see win.

There are 2303 spoilers in Madhya Pradesh, 1650 spoilers in Rajasthan, 1090 spoilers in Chhattisgarh, and 2053 in Telangana who have almost no chance of winning due to the use of the FPTP voting method.

In other words, FPTP doesn't give a fair chance to every candidate, which goes against the preamble of the constitution. This voting method can be considered unconstitutional.

Who is evil, whether it's the people or the voting method?

In Madhya Pradesh, the BJP would have lost 63 seats, and the Congress would have lost 45 because in these constituencies vote wastage has won, or if we could consider the majority decision. In Rajasthan, the Congress would have lost 42 seats, and the BJP 65 seats. In Chhattisgarh, the BJP would have lost 24, and the Congress 21 if we consider majority decision.

Can you blame voters if you don't even provide the option and instead force them to vote tactically, thus preventing them from voting for their sincere preference?

https://github.com/amiyatulu/election_result/tree/main/2023_legislative_assembly_election/data_analysis/analysis_data

Are all politicians and parties are corrupt? Does it matters whom to vote?

The common argument is that all politicians and parties are corrupt, and it hardly matters whom to vote for. As you can see, there are more than 10,000 candidates who don't get any chance of winning, many of them are independent and are treated as spoilers due to vote splitting. Are all these politicians corrupt? Of course not. Our voting method simply doesn't give a fair chance.

Pressure for Approval Voting

You can also advocate for a change in the voting method to single-winner Approval Voting in your constituency. However, independents and third parties need to collaborate and demand this change. You can follow the link to learn about the benefits of Approval Voting and how it aids third parties or independents.

How does the India bloc need to select constituency candidates?

India bloc has come a long way from partisanship to inclusiveness in the fight for a common cause. So, why do candidates need to be partisan? India bloc can also include candidates from Independent.

Here are some of the desirable attributes of a good candidate for an election:

  1. Independent thinkers: Their goal needs to be to serve the constituency, state, or country, not strong loyalty towards parties. They work in a team or contribute to it, stay with the team even in difficult conditions, but that doesn't mean supporting the wrongdoing within the parties. They need to take an independent stand and ask for practical reform within the team if things go wrong. Their work is not that of a marketing agent for some cult leader or supporting whatever the party does.

  2. Some education: Understanding how the world functions has become highly complicated. One can't decipher things without some education. Without a good education, you can't formulate policies, whether in economics, addressing social challenges, or foreseeing the unintended consequences of policy-making.

  3. Perseverance: A person serious about politics should be willing to fight for years with steady persistence

  4. Rejecting Far-Right Ideologies:
    Candidates should steer clear of divisive ideologies such as racism, bigotry, xenophobia, or Islamophobia, as well as authoritarianism. Rejecting charismatic or cult-like leaders, like god-men or women, is essential. True leadership should prioritize democratic principles and the well-being of the people.

Tackling Vote Splitting

In the First Past the Post (FPTP) system, when multiple candidates with similar ideologies run in a constituency, votes are likely to split, which can make the candidate lose. To address this issue, they need to manage vote splitting by endorsing a single candidate and employing other marketing strategies, such as spreading awareness among the people about the workings of voting methods. Additionally, efforts should be made to reform the constituency voting system, considering alternatives such as Approval Voting or Proportional Representation to effectively tackle vote splitting.

With Single Winnner Approval Voting, if the INDIA bloc sends three candidates to contest an election in a constituency, the chance of any one of them winning increases substantially. However, with FPTP, the chance of any one of the three winning decreases due to vote splitting.

Who benefits the most from First Past the Post (FPTP)?

Political parties are commonly categorized into two main types: right-wing and left-wing. To understand these terms, let's delve into their meanings. Right-wing and far-right-wing ideologies often lean towards radical conservatism, ultra-nationalism, and authoritarianism. On the other hand, left-wing politics is associated with principles of social equality and egalitarianism.

However, classifying political parties as strictly right-wing or left-wing can be an oversimplification. The distinction is more nuanced when we consider the diverse ideologies within parties. Political parties are composed of winning candidates, each with their unique set of beliefs and values. Consequently, a party may encompass a range of perspectives, making it challenging to neatly categorize the entire party as exclusively right-wing or left-wing.

The FPTP voting method centers around the candidate who secures the majority of votes, but who gains the most advantage from this system? Right-wing voters typically gravitate towards charismatic leaders, demonstrating strong and unwavering support for a single leader. Consequently, they are less likely to split their votes among multiple candidates. On the other hand, left-wing voters tend to embrace egalitarian ideals, expressing themselves more openly and not necessarily favoring a single leader. This makes them more prone to vote-splitting.

In light of these dynamics, it can be argued that FPTP disproportionately disadvantages left-wing leaders. The system, structured to reward the candidate with the most votes in each constituency, may not align with the diverse and expressive nature of left-wing voters. As a result, FPTP tends to favor the cohesiveness of right-wing voters, potentially impacting the representation of left-wing leaders in the political landscape.

How will you explain FPTP to 5 year old?

Imagine you and your friends live in a hostel, and every day you all have to eat the same thing for lunch. The owner always serves upma, but most of the kids in the hostel don't like it every day. So, they decide to vote to change the menu and have different foods.

Now, the way they vote is a bit confusing. It's called FPTP, which means "First Past the Post." Each person gets to choose their favorite food, and the one with the most votes wins.

Here's how it went:

50 friends voted for Upma.
30 friends voted for Dahi Bada.
10 friends voted for Puri Sabji.
30 friends voted for Idli.
40 friends voted for Paneer Curry.
45 friends voted for Chicken Biryani.
35 friends voted for Chilly Chicken.
28 friends voted for Mutton Curry.

Even though most friends wanted a change and voted for different foods, Upma got the most votes. So, even though more friends wanted something else, Upma stays on the menu.

Unfortunately, nothing changed due to the use of the most terrible voting method called FPTP, even though most students desired a different menu.

How will you explain tactical voting to a 5 year old in FPTP?

Imagine you and your friends are choosing a new game to play, but you have to pick just one game to play together. Each friend can only vote for their favorite game, and the game with the most votes wins.

Now, let's say your absolute favorite game is a bit unusual, and not many friends like it. If you vote for that game, it might not get enough votes to win. So, what do you do? You might decide to vote for a game that's not your favorite but is more popular among your friends, just to make sure it wins.

Tactical voting is like when you pick a game you don't love but think is more likely to win, just so you're not stuck with a game you really don't like. In elections, it's when people vote for a candidate who might not be their top choice but has a better chance of winning, to prevent a candidate they really don't want from winning.

What should be implemented first: Approval Voting or Proportional Representation?

It is easier to change the voting method at the constituency or municipality level than at the multi-constituency, state, or country level. Proportional Representation requires a nationwide change, while for single-winner Approval Voting, one constituency or municipality election will suffice, paving the way for Proportional Representation. The tactical voting problem is also addressed through Approval Voting. Directly advocating for Proportional Representation can potentially delay the process.

According to the theory of diffusion, the less familiar an innovation is, and the more inconvenient, uncomfortable, or expensive it is, the greater the resistance will typically be, and the less likely it will be to diffuse. Approval Voting is the simplest and least expensive to implement, with fewer roadblocks.

Furthermore, Proportional Representation and Approval Voting are not mutually exclusive. Proportional Representation works better, becomes more expressive, and keeps bad actors out when used in conjunction with Approval Voting

No EVM in Election

EVM is one of the most insecure system of voting.

Without secure voting system, there is no point of constitution or democracy.

Paper ballot may take time for counting, but its much more secure. Counting is not a big problem, one can wait a bit for results, and it can also be automated with machine learning or optical scanner.

EVM is even more dangerous with FPTP voting method, because a single EVM manipulation can swing the result.

The entire election machinery, from the manufacturing of EVMs to the software loaded onto them, to the committee appointed to evaluate the software, the so-called third-party auditing of this software and much more, is controlled by the Union govt.

EVM Vote count Mismatch

EVM Vote Count Mismatch In 370+ Seats & EC Refuses to Explain. Mismatch in votes polled & counted in EVMs in multiple Parliamentary constituencies in LS Election 2019

Why Did EC Destroy VVPAT Slips of 2019 LS Polls in Such a Hurry?

Paper ballots are safest for our elections – on one condition.

Even VVPAT are not the solution

Security concerns

The introduction of malicious software into a VVPAT system can cause it to intentionally misrecord the voter's selections. This attack could minimize detection by manipulating only a small percentage of the votes or for only lesser known races.

Another security concern is that a VVPAT could print while no voter is observing the paper trail, a form of ballot stuffing. Even if additional votes were discovered through matching to the voters list, it would be impossible to identify legitimate ballots from fraudulent ballots.

Alternatively the printer could invalidate the printed record after the voter leaves and print a new fraudulent ballot. These ballots would be undetectable as invalidated ballots are quite common during elections. Also, VVPAT systems that are technically able to reverse the paper feed could be open to manipulated software overwriting or altering the VVPAT after the voter checks it.

Effectiveness concerns: Hardly Anyone In India checks the VVPAT

Also problematic is that voters are not required to actually check the paper audit before casting a ballot, which is critical to "verifying" the vote. While the option to look at the paper may provide comfort to an individual voter, the VVPAT does not serve as an effective check on malfunction or fraud unless a statistically relevant number of voters participate.

Demo hack in VVPAT with dark glass

Suggestion given by INDIA bloc

Here is a suggestion given by the INDIA bloc: "Instead of the VVPAT slip falling into the box, it should be handed over to the voter, who shall then place it in a separate ballot box after having verified their choice. 100% counting of VVPAT slips should then be done."

So basically, it means using an Electronic Voting Machine (EVM) as a printer to print out votes instead of using an ink stamp to vote on a paper ballot. However, it still has flaws. Like a printer, an EVM can be programmed to print as many votes for a party that manipulated the EVM. Therefore, the possibility of ballot stuffing can still exist, and it's may be hard to identify, as the voter may hide it while putting the vote in the ballot box. Remember, a few instances of ballot stuffing in FPTP can overturn the election result and cause the winning candidate to lose.

One way to solve vote stuffing is to allow only a single paper in the printer (VVPAT) during voting. Just like a secret ballot is provided by tearing off the serial number and voter signature, now the single secret ballot can go through the printer to print out the vote.

Also, voters, especially the uneducated ones, need to be trained to recheck their vote printed on the VVPAT. It's double work for them; first, they have to vote on the EVM appropriately, and then check if the vote is the same or not on the VVPAT. Furthermore, if you are supposed to count all the VVPATs, what is the need for EVMs at all, adding unnecessary complexities?

EVM may decrease spoilt or invalid votes. Although I couldn't find data on the number of spoilt votes in India.

The number of spoilt votes in a First-Past-the-Post (FPTP) election using ink stamp paper ballots can vary widely based on factors such as voter education, clarity of instructions, and ballot design. The same problem also arises in EVMs, as they add unnecessary complexity. Voters may press the wrong button, may not check the VVPAT, and many other issues may arise. The more complicated the system is, the more ways it can be attacked. e.g. Have you thought before that ballot stuffing is possible with VVPAT? I don't think vote spoiling is a big issue until proper measures are taken. Some may intentionally spoil their votes as a form of protest.

If you are supposed to count all the VVPATs, what is the need for EVMs at all, adding unnecessary complexities, why not just paper ballot? The more complicated the system is, the more ways it can be attacked.

Invisible Ink

Even the chemicals used in the ink of VVPAT need to be validated. Chemicals like invisible ink do exist, which can alter your votes after a few days.

Thermal Printing in VVPAT

The VVPAT uses thermal printing, which tends to fade over a few months. However, the ECI's argument that placing reflective glass can prevent VVPAT slips from fading is quite ridiculous. While it's true that VVPAT slips will fade over time, a minute of exposure to light barely makes a difference. The intentions of the ECI are highly questionable, despite spending a significant amount of money on VVPATs, they didn't invest in even a decent printer that produces prints lasting a year. Furthermore, they burn VVPAT slips within three months, even though there is a provision to keep them for a year.

What about independence of election commission?

The Center is making desperate attempts to undermine the independence of the Election Commission. They have also passed a bill aiming to remove the Chief Justice of India (CJI) and the leader of the opposition from the Election Commission panel. Without an independent Election Commission, how can we ensure that fair elections are conducted?

There are numerous ways in which the ruling party at the Center can benefit, including engaging in corrupt campaigning practices such as bribing voters. In such cases, the Election Commission might turn a blind eye. Additionally, if Electronic Voting Machine (EVM) results are declared, there is a risk that the Election Commission might ignore the Voter Verified Paper Audit Trail (VVPAT). This raises concerns about the finality of results, especially in the presence of discrepancies. Which result will be considered final: the one from the EVM or the VVPAT?

In the past, the Election Commission has already overlooked VVPAT discrepancies. How can one ensure that VVPATs are counted correctly, particularly concerning their security? What if the Election Commission disagrees with the proposal put forth by the INDIA bloc? Are there contingency plans, such as mass protests?

Belgium uses paper ballot printer

Its an ATM like voting machine where the printed votes placed in the ballot box after verification, in the Indian context, the user interface (UI) of the screen needs to be simplified. This is crucial as many voters may not be highly educated. Furthermore, voters should be trained with a demonstration before the election, illustrating how to double-check the vote on the printed paper and how to anonymously place the printed paper in the ballot box.

An advantage of this method is that vote spoiling is negligible, as the paper is computer-printed. However, there is still the risk that a voter may press the wrong button and cast an unintended vote. Another benefit is the flexibility to use any voting method, such as Approval Voting. This is challenging with Voter Verified Paper Audit Trail (VVPAT) systems because reprogramming all Electronic Voting Machines (EVMs) or even changing hardware is required to experiment with different voting methods.

However, it has one significant drawback that can be a primary argument against using the system. There is a chance for voters to be tracked and their information retained, possibly even transmitted over the internet, thereby compromising the anonymity of votes.

The Best Option: Paper ballot without any technology

A paper ballot, without relying on any technology or complications, appears to be the best option. To prevent vote spoiling, the paper can be made thicker to avoid ink spillage, and higher-quality ink can be used for the stamp. Furthermore, open-source machine learning models and algorithms can be employed for the accurate counting of votes, thereby reducing the cost of counting and faster result declaration.

Here is a demo and source code for recognizing numbers using machine learning. Similar classification training can be applied to vote counting.

MNIST Web Demo

MNIST Web Demo Source code

The paper ballot is the simplest solution.

With paper ballots, every citizen, politician, or election nominee can understand what is actually happening. Everyone has the idea of how to secure the system without adding complexity that only technical experts can comprehend, making it difficult for the common citizen to identify the problems or technicalities of electronic voting machines.

EVM Hack Hypothesis

There is no doubt that EVMs can be hacked. If it is indeed susceptible to hacking, it is in the best interest of politicians, especially for the incumbent party, as they hold the power at the state or center.

The problem with EVMs is that it is hard to prove whether they have been hacked or not, due to reasons associated with how EVMs are manipulated.

Let's consider the hypothesis: if parties can hack the EVMs, how will they change the ballot to ensure their candidate wins?

They can't substantially increase the total vote count of a constituency because it is already declared on the voting day itself. They may not do mass manipulation, as its likely to be caught.

Instead, they may make the candidate win with a small margin. They could increase the votes for the candidate they want to win, decrease the votes for the candidate they want to lose (first runnerup), and manipulate vote splitting (increase the votes of second, third etc runnerup) while keeping the total vote count of the constituency constant.

As given in data, there are many instances where the majority of people in a constituency have voted against a candidate, yet they have won. While it is very likely to happen with FPTP, EVM hacking can make it even worse.

You can also look the data where FPTP got worse, Madhya Pradesh BJP got 48% votes, and INC got 40% of votes, where as BJP got 70.87% where as INC with 28.70% seats.

It's better for us to stop using the EVM and reform our voting system by doing away FPTP.

Security analysis of a real Indian EVM

You can watch a demo video by going through the link:

https://indiaevm.org

Here the the research paper with about security analysis of a real Indian EVM.

Pdf Link

Abstract of the paper

Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, known in India as EVMs, have been praised for their simple design, ease of use, and reliability, but recently they have also been criticized following widespread reports of election irregularities. Despite this criticism, many details of the machines’ design have never been publicly disclosed, and they have not been subjected to a rigorous, independent security evaluation. In this paper, we present a security analysis of a real Indian EVM obtained from an anonymous source. We describe the machine’s design and operation in detail, and we evaluate its security in light of relevant election procedures. We conclude that in spite of the machines’ simplicity and minimal software trusted computing base, they are vulnerable to serious attacks that can alter election results and violate the secrecy of the ballot. We demonstrate two attacks, implemented using custom hardware, which could be carried out by dishonest election insiders or other criminals with only brief physical access to the machines. This case study carries important lessons for Indian elections and for electronic voting security more generally.

Some Details about EVM Hack in the Paper

We demonstrate two attacks that involve physically tampering with the EVMs’ hardware. First, we show how dishonest election insiders or other criminals could alter election results by replacing parts of the machines with malicious look-alike components. Such attacks are made far simpler and cheaper by the EVMs’ minimalist design, and they could be accomplished without the involvement of any field-level poll officials. Second, we show how attackers could use portable hardware devices to extract and alter the vote records stored in the machines’ memory, allowing them to change election outcomes and violate ballot secrecy. This attack is technically straightforward because the EVMs do not use even basic cryptography to protect vote data internally. It could be carried out by local election officials without being detected by the national authorities or the EVM manufacturers’ agents.

Though EVM manufacturers and election officials have attempted to keep the design of the EVMs secret, this presents only a minor obstacle for would-be attackers. There are nearly 1.4 million EVMs in use throughout the country, and criminals would only need access to one of them to develop working attacks.

Dishonest insiders or other criminals would likely face less difficulty than we did in obtaining such access. There are many other possibilities for manipulating Indian EVMs, both with and without the involvement of dishonest election insiders. Depending on the local context and security environment, the nature and scale of potential manipulations may vary, but neither the machines’ simplicity nor their secret design keeps them safe.

The Illusion of Secrecy vs Open Protocol

The common assumption is that a secret encryption algorithm adds an extra layer of security by making it more challenging for attackers to decipher sensitive information. However, this belief is built on the misconception that secrecy equates to strength.

Testing Strength Through Transparency:

The paradox lies in the fact that the only reliable way to determine the strength of an encryption method is to make it public and subject it to rigorous analysis by the cryptographic community. Public scrutiny and peer review play a pivotal role in identifying vulnerabilities and ensuring the robustness of an encryption algorithm.

Lesson from Cryptography

One important and counterintuitive fact in this situation is that both the encryption and decryption algorithms are publicly known. It seems that keeping the encryption algorithm secret should make the whole system harder to break. However, secret algorithms also mean untested algorithms: The only way to find out whether an encryption method is strong, i.e., cannot be broken by a determined attacker, is to make it public and have it analyzed by other cryptographers.

[Book: Understanding Cryptography: Christof Paar, Jan Pelzl]

Open source software are more secure

It's not that opensource software is necessarily better engineered...it is that without the sourcecode it is impossible to see what a program does. So opensource software is seen as more secure as it is the only kind of software that can be checked for security at all without needing to blindly trust someone...everything not open-source can't be checked and by this has to be seen as insecure.

In a voting process, the ballot needs to be kept secret not the protocol or process.

Securing Your Code

Schneier on Security

The exact same reasoning leads any smart security engineer to demand open source code for anything related to security. Let’s review: Security has nothing to do with functionality. Therefore, no amount of beta testing can ever uncover a security flaw. The only way to find security flaws in a piece of code—such as in a cryptographic algorithm or security protocol—is to evaluate it. This is true for all code, whether it is open source or proprietary. And you can’t just have anyone evaluate the code, you need experts in security software evaluating the code. You need them evaluating it multiple times and from different angles, over the course of years. It’s possible to hire this kind of expertise, but it is much cheaper and more effective to let the community at large do this. And the best way to make that happen is to publish the source code.

Why should we trust proprietary or closed source software?

No one can be sure what the proprietary or closed source software does in the background. It can provide accurate results during testing, but after the election, it may switch votes when you turn on the EVM. Based on the current inquiry, it seems to also have a clock. This makes it easy to switch votes with precise date and time.

Please note that one can also use a timer based on process time using loops and conditionals, process time is a measure of the total CPU time consumed by an executing process. Process times are a count of CPU instructions or clock cycles and generally do not have a direct correlation to wall time. Although it doesn't have a direct correlation with wall time, one can still use it approximately to schedule tasks like vote switching or swapping at specific timings.

Also, as said earlier, one also cannot know what it prints to the VVPAT; it may print multiple votes in the absence of oversight.

Even if the software is made open source, we still cannot be sure if the correct software is installed, especially if a corrupt official has manipulated it.

Why Electronic Voting Is Still A Bad Idea

The cost associated with replacing EVM with a paper ballot

There are almost no countries that utilize electronic voting machines (EVMs). One argument in favor of EVMs is cost efficiency. India, being a vast country with a sizable population, will it incur high expenses with paper ballots? Let's compare the costs associated with EVMs and paper ballots.

The initial setup, including the appointment of volunteers to manage booths, remains the same for both methods. The primary difference lies in the vote counting process. Given India's large population, there is a need for a substantial number of counting centers. But there are also large number of volunters in a large populated country. A significant portion of the adult population in India is unemployed, resulting in lower labor costs. Counting is a low-skill labour, so anyone can do it at a very low cost. To contribute to saving the country, most people would be willing to work for free for a week or a month. It wouldn't take a week to finish counting votes. Additionally, there are maintenance and manufacturing costs associated with EVMs, which are absent in the case of paper ballots. Consequently, paper ballots prove to be a more cost-effective option.

Counting with paper ballots can be conducted in a decentralized manner, constituency-wise, involving a large number of people. Moreover, the counting process can be automated using open-source machine learning, as demonstrated earlier. Anyone can develop the machine learning algorithm, and the validation and accuracy checks can be performed by the community.

How much time does it take to print a ballot paper?

Printing presses are available in every locality. Each ballot paper's size will not be more than 6-10 inches, and consequently, each ballot paper will not even cost 25 paise in Indian currency. It won't take a day to print the ballots. If government is not ready to pay for that; we can crowd fund 1-10 rupees. Most people will be ready to contribute in Rs. 100s and 1000s because it safeguards our constitution and democracy.

Environmental cost of printing paper ballot

The environmental cost of paper printing has been a topic of discussion, with some arguing that it contributes to deforestation. However, it's important to note that paper production utilizes raw materials such as wood pulp, bamboo, salai and sabai grass, as well as waste products like molasses and bagasse. So, it's mostly grass and manufacturing waste that is used in making paper.The amount of paper consumed by a family of two children in a year, approximately 100 notebooks and 50 books. Don't we waste paper anyway? So, will you stop educating your children because of that? Voting, on the other hand, requires just a single sheet of paper per person. Additionally, paper is recyclable up to 5-7 times, ensuring its reuse for packaging, notebooks, and other purposes. Therefore, the argument against paper ballots on environmental grounds is not compelling, especially when considering the minimal paper usage and the potential for recycling.

Booth Capturing in Paper Ballot

Booth capturing, also known as booth looting, is electoral fraud in which party loyalists or hired criminals "capture" a polling booth and vote on behalf of legitimate voters to ensure a particular candidate's victory. One argument is that Electronic Voting Machines (EVMs) help decrease booth capturing by enabling a five-minute delay in voting process, polling officer can also press a close button to deactivate the EVM. However, this measure doesn't entirely prevent booth capturing. Examples of booth capturing date back to the 1990s, but with the advancement of media, surveillance technology and redundant camera based mobile phones, it has become increasingly difficult to conceal such activities. Since booth capturing is a criminal offense, re-elections can be conducted in places where it occurs.

Regarding the time delay, we can now implement secure robotic ballot boxes that open and close at specific intervals with the press of a button by polling officers. The slit or hole can be thin enough so that a single ballot can enter. It is a simple machine. Such a device will be much cheaper than an EVM assembly. While booth capturing can be detected, it remains challenging to ascertain what the EVM software is doing in the background.

Courts cannot disregard the use of ballot papers by simply stating, "We all know what happened when there was ballot papers. You may have but we have not forgotten." This statement is vague and does not provide a specific reason of the potential vulnerabilities of ballot papers in modern times. The world is dynamic, and the past is not the same as the present. It is true that past instances of ballot paper misuse have occurred, but it is essential to evaluate the current situation with consideration for advancements in technology and security measures. For instance, the widespread availability of cheaper CCTV cameras and camera phones has significantly improved the monitoring capabilities of polling stations. This is not how courts should argue. They need to talk by evidence and citation like how are paper ballots vulnerable to booth hacking, and how do EVMs protect against booth hacking?

Role of courts

In the event of booth hacking, what we need are an independent judiciary and an independent election commission that can declare the election void and ensure the conduct of free and fair elections. An analogy could be drawn to cricket: if the umpire is corrupt, the integrity of the game is compromised.

If people and opposition parties don't want EVMs, who are the CJI or the courts to force people to vote through EVMs? EVMs are an opaque voting system that can't be falsified, and there is enough evidence through computer science. These are not theoretical evidence, but evidence from many decades of computer science practices. So, why are the courts forcing people to vote through EVMs and reject PILs against EVM? Courts are failing to conduct free and fair elections and protect our constitution.

Is paper ballot voting archaic?

The ballot paper is the gold standard of voting. Your votes don't disappear in the ballot box; that goes beyond the laws of physics. However, with Electronic Voting Machines (EVMs) that support read, write, and delete functions, your votes can disappear without trace, and you can't even prove it. Furthermore, one can use technology to automate and secure ballot voting by implementing robotic ballot boxes and employing open-source, tested machine learning algorithms to automate the counting process, as mentioned above.

How can we achieve secure automated vote counting through open source machine learning software?

One method involves utilizing a high-capacity auto-feed scanner to scan votes.

Scanned images need to be made public. This action promotes transparency and allows anyone to verify the count using various open-source machine learning programs. To mitigate reliance on a centralized scanner, opposition leaders or other stakeholders can independently verify the results using their own scanners. Since the process is automated, this verification task is not cumbersome.

Manual counting can be prone to human errors; typically, runner-up leaders request multiple recounts to validate the results. Automated counting simplifies the recounting process, and well-trained machine learning algorithms can offer greater accuracy in counting.

Vote counting is a simpler model, akin to handwriting number recognition, so machine learning can achieve a high level of accuracy as demonstrated. It also provides probabilities, indicating when the machine learning is unsure of labeling by giving a low probability. In such cases, human intervention can be involved.

As for the ballot paper design, using thicker paper without folds and placing it directly into the ballot box simplifies the scanning process.

Placing the unfolded ballot directly into the ballot box aids in feeding it into the scanner without requiring manual effort to open the ballot paper.

To preserve anonymity without folding the ballot, a separate piece of paper can be provided to conceal it from cameras or observers before placing the voted ballot in the ballot box.

In terms of paper costs, paper can be sold and recycled, which reduces expenses. Additionally, paper costs are significantly lower than those associated with electronic voting machine (EVM) assembly.

For a constituency with one lakh voters, three to six scanners are typically sufficient to provide results within a day. Increasing the number of scanners reduces the processing time further. Many scanners boast scanning speeds of up to 20 pages per minute.

Using this method, the cost of voting will be significantly lower than EVM assembly, and it is also one of the most secure methods.

Currently I am trying out image classification. Typically, it takes 5-10 hours to train the model.

False positives and false negatives in machine learning

A false positive is an error in classification in which a test result incorrectly indicates the presence of a condition, while a false negative is the opposite error, where the test result incorrectly indicates the absence of a condition when it is actually present.

In classification problems like vote counting or identifying handwritten numbers, there are chances of false positives. For example, identifying a sketch as a number when it should be none of the numbers from 1 to 9. Machine learning doesn't work best when the given data is very different from the trained data, so it may fail to identify spoiled votes, which can occur in many different and unpredictable ways. Therefore, some human caution is required to check the probability values.

As scanned images can be made public, humans can check them later on, within a week.

ECI cannot claim the cost of counting or the space or the time required for counting. If you make the scanned image public, we will count it for free.

How can we be sure that the scanner software is not hacked?

The software installed on a laptop can be Linux-based, and the scanner software can be open source; for example, HP drivers are open source. We shouldn't trust Windows or other closed-source software. However, what about the software installed in the scanner hardware itself? It's usually proprietary. Therefore, it's advisable not to use a scanner that has firmware installed. Many scanners are just motors and some buttons; there is no CPU or memory chip for firmware to reside on. Only the driver is needed installed on computer, which can be open source. The Linux OS and driver software need to be installed on the laptop under proper surveillance, and the checksum of the Linux OS and driver software needs to be checked.

Randomization of EVMs to be supplied to constituencies and randomized recounts of VVPATs to detect possible malfunctions or fraud. Is randomization transparent?

Randomization is not conducted transparently. Why should we trust a video and a server controlled by a system administrator to generate random values? Secure random number generation involves drawing from shuffled papers, not relying on software controlled by a system administrator.

A letter from Mehmood Pracha, who is running as an Independent candidate in the Rampur, Uttar Pradesh, Lok Sabha Constituency:

Randomization process for EVM-VVPAT machines by you, was at best a videographed demonstration of a pointless, illegal, opaque, and surreptitious fiddling of the machines being presented as a technical exercise. The very fact that I was not permitted to access the actual machines, or even see them physically, is sufficient to discredit the entire process, and to shatter my confidence, and that of the electorate, in the veracity and trustworthiness of the EVM-VVPAT machines and the polling process in which they are to be used. The entire process lasted less than half an hour, and was very evidently conducted purely as a matter of formality without inviting or permitting any actual participation by me.

Letter link 1

Letter link 2

Chances of Match-fixing

The chances of match-fixing increase when elections can be manipulated. Opposition parties may be negotiated with to cease protests against Electronic Voting Machines (EVMs) or to treat the protests casually, giving the appearance of opposition to EVMs.

Thus, there is a high likelihood of election fixing when election results are determined by EVM machines.

This undermines competition, eliminates third parties, and stifles independent thinking leaders. It can be detrimental to any representatives, regardless of party affiliation, including the ruling party. Those dissatisfied with the current regime have a high risk of losing, whether they belong to the BJP or the Congress. Additionally, many Congress leaders have switched parties due to threats from investigative agencies like the Enforcement Directorate (ED) or out of greed for money.

If the BJP is targeting 370 seats, then there are 173 seats that they would have to lose. One can assume who will lose those seats in the case of match-fixing.

Probability of Hacking

Those who argue the probability of hacking is non-existent, firstly, the EVM is an opaque system. Nobody knows what is installed on the EVM except the software maker who has installed it. There is no way to trace it because everything is happening behind the screen. If you are inside a room, how can someone outside know what's happening inside? Light can't pass from outside to inside; walls are opaque. That's beyond the laws of physics to know what is happening inside the room through our eyes when outside. It's a complete pseudoscience argument of lack of falsifiability. The software installed is proprietary or closed source. EVMs are also not made public to be scrutinized by ethical hackers. So why should we trust a middleman to take care of our votes? People have the right to directly vote, not give their vote to a middleman to vote for them.

When there is so much control by the software maker and installer, the probability of rigging elections becomes extremely high, not low.

Shooting the messenger

A whistleblower is an individual who exposes information about wrongdoing, illegal activities, or unethical behavior within an organization. Unfortunately, whistleblowers may face backlash, retaliation, or legal consequences for bringing such information to light.

"Shooting the messenger" is a critical perspective on the unfair treatment that whistleblowers may experience for their courageous actions in exposing the truth.

The government should prioritize the safeguarding of whistleblowers rather than resorting to punishing the messenger.

Researcher Arrested in India After Disclosing Problems With Voting Machines

The Supreme Court didn't give a judgment on 100% VVPAT counting.

There's no bigger irony than the fact that they can't tally votes for 12 days. Counting is such a low-skilled job that even a 10th-grade student can do it, yet the Supreme Court rejected the counting, as predicted, as we don't trust the judge.

Why can't counting be as decentralized as polling booths? Each polling booth typically serves 300 to 700 voters. Therefore, if we establish similar decentralized booths for counting, it would only take an hour or two to count the paper ballots.

There are no free and fair elections; it's all a rigged game.

The silence of the people equates to accepting dictatorship, allowing the government to control your taxes, economy, and the monopoly of violence.

People need to stand up collectively; it can't be done by individuals alone. If 50% of the population doesn't trust the election commission and EVMs, then why elections with EVM? Don't be afraid; peacefully protest and take to the streets. They can't imprison 50% of the populace.

Understand how a fascist government operates.

Voter turnout in Phase 1

About 40% of voters are not voting. About 5-10% decrease in voter turnout than 2019 election.

Voter turnout image

With such a low voter turnout, one can assume there is high distrust in elections and politicians. The Supreme Court's decision has made it worse.

Should we vote or not vote?

EVMs have VVPATs installed even if VVPAT slips are not counted. People must check and also be trained to inspect what falls into the VVPAT. It's hard to say how many votes will be manipulated. It can range from 5% to even 30% of vote manipulation. But if mass manipulation occurs, it is likely to be caught if VVPATs are counted. One needs to also be aware of VVPAT ballot stuffing i.e. EVM printing the ballot when no one is watching. The Election Commission of India (ECI) is already changing or manipulating the voter turnout data and not providing the full details of actual numbers of voter turnout in each booth or constituency; instead, they provide percentages. There's no transparency at all levels of voting, from the calculation of voter turnout to EVM black box. We can still request people to vote. We can still defeat the government with sufficient votes against them and VVPAT are counted. Don't press NOTA. We will see what happens next. The fight for 100% counting needs to continue, though the Supreme Court is unlikely to allow counting. We need to be ready for mass protests during and after the election for 100% counting of VVPAT.

About strong rooms of EVM and VVPAT storage

ECI Link

CCTV cameras with sufficient storage facility shall be installed. CCTV Camera should cover sealed doors of Polled EVM Strong Room and Election Paper Strong Room, security and corridor etc. A proper system to take back up of CCTV footage shall be ensured. Such video data shall be in the custody of the District Election Officer.

Videography shall be made at the time of the opening and closing of Polled EVM Strong Room and Election Paper Strong Room. Proper log books shall also be maintained.

Courts can ask for a 100% counting of VVPATs at any time if protest continues, and those involved can be caught if any manipulation occurs, provided that proper security measures are taken to protect the VVPATs.

Microcontrollers are ported with firmware by BEL/ECIL with directors affliated with BJP

A former bureaucrat has raised concern with the Election Commission on the nomination of 'at least' four persons allegedly having 'affiliation with the BJP' as independent directors on the board of state-run BEL that manufactures EVMs, prompting opposition leaders to attack the government.

Can EVMs be Hacked or Tampered With? | The Debate over VVPAT Matching

The video connected all the dots of EVM. However, I have a conflict with the solution given.

EVMs demand protection for 365 days every year

EVM is a useless machine, and there is no need for EVM at all. It adds extra unnecessary complexity, maintenance, and costs.

Using paper ballots is more cost-effective, requires less maintenance than EVMs, and EVMs demand protection for 365 days every year, whereas ballot papers need protection for only about few months, hardly 3-6 months after the election. Any unprotected EVM at any time is susceptible to hackers manipulating it and installing malware. Manufacturing of new EVM is another additional cost associated with EVMs. Paper ballots have fewer steps to maintain and are also considered the gold standard.

So, instead, we can just use paper ballots. Paper ballot counting can be automated in the future using an open-source machine-learning algorithm, as I have already said and demonstrated. If you want the results in one day, it can also be done with paper ballots.

Lets end the voting scam.

To be clear, parties at the center will always want EVMs to select their own government through a flawed and opaque voting system that they have full control over. It is the responsibility of people to protest and return to paper ballot-based voting.

The myth that Electronic Voting Machines can't be hacked before elections

The argument that Electronic Voting Machines (EVMs) cannot be hacked long before an election is based on the premise that EVMs do not recognize political parties or candidates. The names of candidates are only associated with specific serial numbers just before the election, making it highly challenging for a hacker to know which serial number to target in advance. However, it is important to note that knowing the serial number is not the only method of hacking EVMs. Malicious actors could potentially install or replace hardware components with microscopic wireless or Bluetooth devices, which could be used to switch votes during the result declaration. The challenge lies in thoroughly inspecting the internal mechanisms of lakhs of machines. As a result, the security of EVMs largely depends on the integrity of the manufacturers and the protection against unauthorized access. It raises a valid question: Why do we entrust the safety of our votes to third parties like manufacturers?

A ghost in the machine? On EVMs, democracy deficit and its constitutionality

https://theleaflet.in/a-ghost-in-the-machine-on-evms-democracy-deficit-and-its-constitutionality/

Fundamental flaw no.1: The Black box technology

The primary objection to EVMs is that the technology deployed is the ‘black box technology’

Fundamental flaw no. 2: Technical scrutiny of EVMs impossible

The German court struck down the use of EVMs as unconstitutional simply because no accessible public or judicial scrutiny of EVMs was possible without the intervention of technical experts.

Fundamental flaw no. 3: VVPAT precedes the recorder

Flaw no. 4: A near-zero paper trail

The ECI, employing bizarre logic, revealed: “Verification of VVPAT paper trail of 479 (randomly selected) EVMs would generate 99 percent accuracy in election results.

Vague arguments of Supreme Court

The Supreme Court judge seems to be utterly corrupt. He is making all the same vague arguments to justify the security of EVMs that have already been debunked. According to Justice Khanna, EVMs are not re-programmable. It may be one time programmable memory, but votes are not in non-volatile memory. Votes are readable and rewritable. As mentioned earlier, attackers could use portable hardware devices to extract and alter the vote records stored in the machines' memory, thereby enabling them to change election outcomes and violate ballot secrecy. As per previous analysis by hacker, EVMs do not use even basic cryptography to protect vote data internally. Furthermore, judge says that the source code couldn't be disclosed and that EVMs can't be made public for a hackathon because they will be prone to misuse. This is completely opposite to the principles of computer science and security experts. What are they scared of, if it's one-time programmable memory? No one can change its code, right? Why should we believe what you said is true if it hasn't been tested by independent security experts? The argument that EVMs don't recognize political parties and candidates is completely misleading. VVPATs contain information about political parties through symbol uploading. There is a free flow of information between VVPATs and the control unit. This makes the EVM aware of political parties and candidates.

Give missed call to 9667722062 to Ban EVM

If you want to support Ban EVM Movement... Just give Miss Call- 9667722062- Adv. Rajendra Pal Gautam

2 Lakh 30,000 have already given missed call in 48 hours

Share on social media for missed call to 9667722062 to Ban EVM

Message 1

If you want to support Ban EVM Movement... Just give Miss Call- 9667722062

2 Lakh 30,000 have already given missed call in 48 hours

https://youtu.be/sHmpEv4dWDA?si=Zm1ISm6WOzhFPyB2

#EVM_Hatao_Desh_Bachao 
#BanEVM_Save_India
#EVM_हटाओ_लोकतंतर_बचाओ 
#EVM_Hatao_Loktantra_Bacho 

Message 2

If you want to support Ban EVM Movement... Just give Miss Call- 9667722062

2 Lakh 30,000 have already given missed call in 48 hours

https://42683ff2b1a2ac5ad2fef0ee01995d78.ipfs.4everland.link/ipfs/bafybeifofj2zgq5wnb2juvyj3nyf23wdizpqtsfmbmidoqsxau3js7biyq

#EVM_Hatao_Desh_Bachao 
#BanEVM_Save_India
#EVM_हटाओ_लोकतंतर_बचाओ 
#EVM_Hatao_Loktantra_Bacho 

Message 3

Ban EVM Movement... Give Miss Call- 9667722062

2024 election will be without EVM.
Farmers, the army, and everyone needs to come together to ban it.

https://42683ff2b1a2ac5ad2fef0ee01995d78.ipfs.4everland.link/ipfs/bafybeicjvqn3ksjfys7cmpqu7msap2vvnlqbbejilv4jtjuztrkpennule

#EVM_Hatao_Desh_Bachao
#BanEVM_Save_India
#EVM_हटाओ_लोकतंतर_बचाओ
#EVM_Hatao_Loktantra_Bacho

Message from the Army officer

When an army officer dies for their nation on the border, it is often seen as a sacrifice made to protect the country from external threats and maintain its sovereignty. This act highlights the significance of safeguarding national borders and reinforces the idea that a nation must be prepared to defend itself against potential dangers.

Similarly, having a secure voting system within a nation is equally important for preserving democracy and ensuring the stability and safety of the country. A secure voting system guarantees fair elections, which are essential for reflecting the will of the people and upholding the principles of representative government. When citizens cast their votes with confidence, knowing that their choices will be accurately recorded and counted, they contribute to the legitimacy and strength of the political process.

A vulnerable or compromised voting system can lead to various issues such as voter fraud, manipulation, or suppression, all of which undermine the democratic foundation of a nation. Such situations not only erode public trust but also create social unrest, instability, and potentially even violence. Therefore, investing time, resources, and efforts into developing and maintaining a robust and reliable voting infrastructure should be considered a priority for any democratic nation.

Timer in EVM

Impact of EVM on our country

EVM manipulation in loksabha 2019 election and state assembly

Duplicate voter lists in lakhs

In FPTP, a single vote matters, as a candidate can lose by a few votes.

Courts on EVM

Stop watching corporate TV news and protest against EVMs in front of all courts. The government cannot pressure courts to not ban EVMs.

The resignation of an Election Commissioner

There needs to be a body of three members in the Election Commission, but only one election commissioner is left. Arun Goel has resigned ahead of the 2024 Lok Sabha elections. Will only one election commissioner be able to conduct the Lok Sabha election? How are election commissioners appointed, what are the guidelines and criteria for their appointment? How have they been appointed so quickly overnight? Will the government appoint another election commissioner now, who will follow the government's orders rather than staying neutral and independent to all parties? Will the new election commissioner, if appointed, listen to the people and consider eliminating the use of EVMs?

The Lok Sabha election is about regional parties, third parties and independent vs one-party dictatorship.

date: "2023-12-05"


categories:

  • "politics"

What strategies has the BJP employed?

  1. Casting Hindus as victims and promoting nationalism.

  2. Positioning Congress as the opposition and trolling Rahul Gandhi. Portraying Modi as a supreme leader ( but a cult leader in disguise) and discrediting Rahul Gandhi as unfit for the PM role. It's crucial to note that the opposition is not the Congress, which currently holds only 50 seats in the Lok Sabha and may at most reach 150. Moreover, Rahul Gandhi is not PM candidate; the INDIA bloc is a coalition of regional parties, requiring a nuanced narrative.

  3. Propagating unrealistic dreams, such as inflating the GDP with excessive zeroes and aiming for a 5 trillion-dollar economy in five years.

  4. Distributing freebies and money during campaigning/election.

More than 10,000 WhatsApp groups are actively involved in disinformation campaigns, leveraging national media for Hindu-Muslim narratives.

How to tackle disinformation?: Link

People need to understand the intensity of the problem. We are just in a small margin to dictatorship. Opposition and people need to make no mistake. We need to break the brute force majority of one party. Lok Sabha and Rajya Sabha are safeguards of the constitution. Now, Lok Sabha is completely useless. Rajya Sabha is in a small margin. We need not give more than 20% of seats to BJP again.

Necessary sources of political power

From Dictatorship to Democracy: A Conceptual Framework for Liberation

Data: https://github.com/amiyatulu/election_result/blob/main/2019_loksabha/src/loksabha_seats.json

Total data: data_analysis/analysis_data/lokshabha2019

Votes by percentage: analysis_data/lokshabha2019/state_party_data_sorted_percentage/party_votes_by_state_percentage.json

State-wise analysis (2019 Lok Sabha election):

Hindi States

In Hindi states like Gujarat, Rajasthan, Chhattisgarh, Uttarakhand, Haryana and Himachal Pradesh, the BJP secured almost 100% of seats, with Congress only holding one or two seats. The absence of other opposition or regional parties in these states allows the BJP to effectively use the tactics of trolling Congress and promoting the Hindu victim narrative. Limited options for voters make these strategies particularly effective. Using Hindi states, the BJP managed a one-party dictatorship with 300 seats in the Lok Sabha, sidelining all opposition parties and democratic values.

INC got 32% of votes in Gujarat, yet zero seats

So the case of other states:

{
    "Gujarat": {
        "BJP": {
            "votes": 18091275,
            "percentage": 62.20788595983407
        },
        "INC": {
            "votes": 9337084,
            "percentage": 32.10609847395451
        }
    },
    "Rajasthan": {
        "BJP": {
            "votes": 18968392,
            "percentage": 58.47031404395368
        },
        "INC": {
            "votes": 11107910,
            "percentage": 34.240276459489735
        }
    },
    "Chhattisgarh": {
        "BJP": {
            "votes": 6902477,
            "percentage": 50.69962781464669
        },
        "INC": {
            "votes": 5569183,
            "percentage": 40.90640292342263
        }
    },
    "Uttarakhand": {
        "BJP": {
            "votes": 2954833,
            "percentage": 61.013395829999425
        },
        "INC": {
            "votes": 1520767,
            "percentage": 31.401828440456953
        }
    },
    "Haryana": {
        "BJP": {
            "votes": 7357347,
            "percentage": 58.016213493381244
        },
        "INC": {
            "votes": 3604106,
            "percentage": 28.42010620795462
        }
    },
    "Himachal Pradesh": {
        "BJP": {
            "votes": 2661281,
            "percentage": 69.11104174479034
        },
        "INC": {
            "votes": 1051113,
            "percentage": 27.29644649380949
        }
    }
}

BJP got all the seats

{
    "Gujarat": {
        "BJP": 26
    },
    "Rajasthan": {
        "BJP": 24,
        "RLTP": 1
    },
    "Chhattisgarh": {
        "INC": 2,
        "BJP": 9
    },
    "Uttarakhand": {
        "BJP": 5
    },
    "Haryana": {
        "BJP": 10
    },
    "Himachal Pradesh": {
        "BJP": 4
    }
}

Why is there no other opposition in these states?
The First Past the Post (FPTP) voting method maintains a biparty political system. Even if Congress garners 30-40% of votes, it may end up with zero seats because only candidate with highest vote wins, and other votes get waste. What if these 30% seats would have gone only to few constituency? Manipulation of EVM is another variable. (Details about EVM below) A potential strategy for Congress could be targeting specific constituencies, especially those with weaker opponents, to secure a few seats. Winning a seat with just 1% of the vote is possible under FPTP, emphasizing the importance of strategic planning.

States with Competitor

States with more opposition include Maharashtra, Uttar Pradesh, Bihar, and Delhi.
The INDIA bloc must address this challenge by avoiding vote splitting, fostering unity, and strategizing effectively. Leaders like Priyanka Chaturvedi in Shivsena, Akhilesh Yadav in Uttar Pradesh, and Arvind Kejriwal in Delhi play crucial roles.

{
    "Maharashtra": {
        "BJP": {
            "votes": 14912139,
            "percentage": 27.58735969765187
        },
        "SHS": {
            "votes": 12589064,
            "percentage": 23.28968612918375
        },
        "INC": {
            "votes": 8792237,
            "percentage": 16.265580991835147
        },
        "NCP": {
            "votes": 8387363,
            "percentage": 15.516566737727999
        },
        "VBA": {
            "votes": 3743560,
            "percentage": 6.925561535453877
        }
    },
    "Uttar Pradesh": {
        "BJP": {
            "votes": 42858171,
            "percentage": 49.55767597558957
        },
        "BSP": {
            "votes": 16659754,
            "percentage": 19.263973970448536
        },
        "SP": {
            "votes": 15533620,
            "percentage": 17.96180491901854
        },
        "INC": {
            "votes": 5457352,
            "percentage": 6.310434528359497
        }
    },
    "Bihar": {
        "BJP": {
            "votes": 9619548,
            "percentage": 23.573474928517186
        },
        "JD(U)": {
            "votes": 8902719,
            "percentage": 21.81682789483805
        },
        "RJD": {
            "votes": 6270769,
            "percentage": 15.36702304557582
        },
        "LJP": {
            "votes": 3206979,
            "percentage": 7.858959594856339
        },
        "INC": {
            "votes": 3140797,
            "percentage": 7.696775288720634
        }
    },
    "NCT OF Delhi": {
        "BJP": {
            "votes": 4908541,
            "percentage": 56.55644905203495
        },
        "INC": {
            "votes": 1953900,
            "percentage": 22.51293119539413
        },
        "AAAP": {
            "votes": 1571687,
            "percentage": 18.109054348582536
        }
    },
}
{
    "Maharashtra": {
        "BJP": 23,
        "IND": 1,
        "AIMIM": 1,
        "NCP": 4,
        "SHS": 18,
        "INC": 1
    },
    "Uttar Pradesh": {
        "BJP": 62,
        "BSP": 10,
        "SP": 5,
        "ADAL": 2,
        "INC": 1
    },
    "Bihar": {
        "BJP": 17,
        "JD(U)": 16,
        "LJP": 6,
        "INC": 1
    },
    "NCT OF Delhi": {
        "BJP": 7
    }
}

In Delhi, even if AAP wins the Assembly Election, people haven't traditionally voted for them during the Lok Sabha polls because they typically don't favor Congress at the center. However, this time things have changed. AAP is now part of a national party coalition. It's crucial to remember that the INDIA bloc is not synonymous with Congress. Congress currently holds about 50 seats, and it's unlikely to surpass 150 or 200 only after they win in Hindi states. The INDIA bloc is, in fact, a coalition of regional parties, characterized by decentralization and power-sharing. Nevertheless, winning in Hindi states remains crucial for achieving a majority. So, the INDIA bloc needs to work hard to secure Congress's victory and must address the situation if Congress doesn't cooperate.

East India States

East India states, including West Bengal and Odisha: West Bengal has leaders like Mamata Banerjee and Mahua Moitra, who align with the INDIA bloc. Odisha has Naveen Patnaik, though he has no alliance with anyone, but he is a bit pro-BJP and anti-Congress. The BJD party is a bit more opportunistic toward the state rather than involving itself in national politics. As long as the center benefits them, they hardly care about who is in power at the center. Last Loksabha election in Odisha, the largest competitor was BJP, not Congress. So, if Naveen Patnaik wants to stop one-party dictatorship, they need to stop supporting BJP.

All regional parties need to understand what is at stake. They may support BJP, but ultimately, Modi will ditch them after advantage is taken. Their intentions are clear. All need to protest against EVM.

{
  "West Bengal": {
    "AITC": {
      "votes": 24757345,
      "percentage": 43.27679372529672
    },
    "BJP": {
      "votes": 23028517,
      "percentage": 40.25473571614763
    },
    "CPIM": {
      "votes": 3610645,
      "percentage": 6.311546689690433
    },
    "INC": {
      "votes": 3210491,
      "percentage": 5.612062067395416
    }
  },
   "Odisha": {
    "BJD": {
      "votes": 10174021,
      "percentage": 42.75854767828794
    },
    "BJP": {
      "votes": 9130768,
      "percentage": 38.374048851224686
    },
    "INC": {
      "votes": 3285339,
      "percentage": 13.807355446862044
    },
   }
}
{
   "West Bengal": {
    "BJP": 18,
    "AITC": 22,
    "INC": 2
  },
  "Odisha": {
    "BJD": 12,
    "BJP": 8,
    "INC": 1
  },
}

South States:

These states pose less of a threat. In South Indian states Modi is hardly liked. You can analyse other states from the data.

2023 Legislative Assembly Election

I have already discussed the impact of vote splitting and about vote wastage in FPTP voting and how it prevents third parties and independents from winning.

Here is real data on vote wastage in elections. In Madhya Pradesh 109 out of 230 constituencies, the election outcome would be reversed if we consider the count of vote wastage. This indicates that the majority have voted against the winning candidate.

Similarly, in Chhattisgarh 46 out of 90 constituencies, Rajasthan 119 out of 199, Telengana 68 out of 119, and Mizoram 36 out of 40.

Further dissatisfaction by voters, in the form of NOTA, is also evident. They cannot vote for independent candidates because they have almost no chance of winning, and they have preferred NOTA.

In Madhya Pradesh, 193 constituencies recorded more than 1000 votes for NOTA. More than 2000 votes in 79 constituencies, more than 3000 votes in 35 constituencies.

In Chhattisgarh, 64 constituencies recorded more than 1000 votes for NOTA. More than 2000 votes in 46 constituencies, more than 3000 votes in 23 constituencies.

In Rajasthan, 178 constituencies recorded more than 1000 votes for NOTA. More than 2000 votes in 70 constituencies, more than 3000 votes in 30 constituencies.

In Telangana, 81 constituencies recorded more than 1000 votes for NOTA. More than 2000 votes in 22 constituencies, more than 3000 votes in 4 constituencies.

Mizoram has zero NOTA with more than 1000 votes. But it has worst impact on vote splitting.

Update the repository with Karnapur data of Rajasthan, it became 120 out of 200.

Votes by Party in 2023 Legislative Assembly Election

Here is the list of total votes in all constituency by party.

Data by Votes

Data by Percentage

Madhya Pradesh

In Madhya Pradesh BJP got 48% votes, and INC got 40% of votes, where as BJP got 163 seats, INC 66 seats, which means BJP got 70.87% where as INC with 28.70% seats.

Difference in votes between BJP and INC = 8%

Difference in seats between BJP and INC = 42%

Rajasthan

In Rajasthan BJP got 41% votes, and INC got 39% of votes, where as BJP got 115 seats, INC 69 seats (70 seats with karanpur), which means BJP got 57.50% seats where as INC got 35.00% seats.

Difference in votes between BJP and INC = 2%

Difference in seats between BJP and INC = 22.5%

Chattisgarh

In Chattisgarh BJP got 46% votes and INC got 42% of votes, where as BJP got 54 seats, INC 35 seats, which means BJP got 60% of seats, where as INC got 38% of seats

Difference in votes between BJP and INC = 4%

Difference in seats between BJP and INC = 22%

Telangana

In Telangana INC got 39% votes, BHRS got 37% of votes and BJP got 13% of votes, where as INC 64 seats, BHRS 39 seats, BJP 8 seats, which means INC got 53.78% of seats, BHRS got 32.77% of seats and BJP got 6.72% of seats.

Difference in votes between INC and BHRS = 2%

Difference in seats between INC and BHRS = 21%

Other Legislative Assembly Election

Delhi is an outlier among all the parties, where they have own the true majority in 2020. Only 17 constituencies where vote wastage own, out of 70.

In Uttar Pradesh 2022 election, in 301 constituencies out of 403, majority have not voted to the winning candidate.

Similarly, in Punjab, 89 out of 117, the majority have not voted for the winning candidate. Punjab is a different case, as it has recently been taken over by AAP. One can imagine how difficult it is for a new party with a voting method like FPTP.

List of Spoilers with decreasing order of votes:

https://github.com/amiyatulu/election_result/tree/main/2023_legislative_assembly_election/data_analysis/analysis_data/independent_list

In the First Past the Post (FPTP) system, a two-party system predominates, and third parties and independents are viewed as spoilers. People are hesitant to vote for them, fearing that it might result in a wasted vote and inadvertently contribute to the victory of the least favored candidate—someone whom the voter actively wishes not to see win.

There are 2303 spoilers in Madhya Pradesh, 1650 spoilers in Rajasthan, 1090 spoilers in Chhattisgarh, and 2053 in Telangana who have almost no chance of winning due to the use of the FPTP voting method.

In other words, FPTP doesn't give a fair chance to every candidate, which goes against the preamble of the constitution. This voting method can be considered unconstitutional.

Who is evil, whether it's the people or the voting method?

In Madhya Pradesh, the BJP would have lost 63 seats, and the Congress would have lost 45 because in these constituencies vote wastage has won, or if we could consider the majority decision. In Rajasthan, the Congress would have lost 42 seats, and the BJP 65 seats. In Chhattisgarh, the BJP would have lost 24, and the Congress 21 if we consider majority decision.

Can you blame voters if you don't even provide the option and instead force them to vote tactically, thus preventing them from voting for their sincere preference?

https://github.com/amiyatulu/election_result/tree/main/2023_legislative_assembly_election/data_analysis/analysis_data

Are all politicians and parties are corrupt? Does it matters whom to vote?

The common argument is that all politicians and parties are corrupt, and it hardly matters whom to vote for. As you can see, there are more than 10,000 candidates who don't get any chance of winning, many of them are independent and are treated as spoilers due to vote splitting. Are all these politicians corrupt? Of course not. Our voting method simply doesn't give a fair chance.

Pressure for Approval Voting

You can also advocate for a change in the voting method to single-winner Approval Voting in your constituency. However, independents and third parties need to collaborate and demand this change. You can follow the link to learn about the benefits of Approval Voting and how it aids third parties or independents.

How does the India bloc need to select constituency candidates?

India bloc has come a long way from partisanship to inclusiveness in the fight for a common cause. So, why do candidates need to be partisan? India bloc can also include candidates from Independent.

Here are some of the desirable attributes of a good candidate for an election:

  1. Independent thinkers: Their goal needs to be to serve the constituency, state, or country, not strong loyalty towards parties. They work in a team or contribute to it, stay with the team even in difficult conditions, but that doesn't mean supporting the wrongdoing within the parties. They need to take an independent stand and ask for practical reform within the team if things go wrong. Their work is not that of a marketing agent for some cult leader or supporting whatever the party does.

  2. Some education: Understanding how the world functions has become highly complicated. One can't decipher things without some education. Without a good education, you can't formulate policies, whether in economics, addressing social challenges, or foreseeing the unintended consequences of policy-making.

  3. Perseverance: A person serious about politics should be willing to fight for years with steady persistence

  4. Rejecting Far-Right Ideologies:
    Candidates should steer clear of divisive ideologies such as racism, bigotry, xenophobia, or Islamophobia, as well as authoritarianism. Rejecting charismatic or cult-like leaders, like god-men or women, is essential. True leadership should prioritize democratic principles and the well-being of the people.

Tackling Vote Splitting

In the First Past the Post (FPTP) system, when multiple candidates with similar ideologies run in a constituency, votes are likely to split, which can make the candidate lose. To address this issue, they need to manage vote splitting by endorsing a single candidate and employing other marketing strategies, such as spreading awareness among the people about the workings of voting methods. Additionally, efforts should be made to reform the constituency voting system, considering alternatives such as Approval Voting or Proportional Representation to effectively tackle vote splitting.

With Single Winnner Approval Voting, if the INDIA bloc sends three candidates to contest an election in a constituency, the chance of any one of them winning increases substantially. However, with FPTP, the chance of any one of the three winning decreases due to vote splitting.

Who benefits the most from First Past the Post (FPTP)?

Political parties are commonly categorized into two main types: right-wing and left-wing. To understand these terms, let's delve into their meanings. Right-wing and far-right-wing ideologies often lean towards radical conservatism, ultra-nationalism, and authoritarianism. On the other hand, left-wing politics is associated with principles of social equality and egalitarianism.

However, classifying political parties as strictly right-wing or left-wing can be an oversimplification. The distinction is more nuanced when we consider the diverse ideologies within parties. Political parties are composed of winning candidates, each with their unique set of beliefs and values. Consequently, a party may encompass a range of perspectives, making it challenging to neatly categorize the entire party as exclusively right-wing or left-wing.

The FPTP voting method centers around the candidate who secures the majority of votes, but who gains the most advantage from this system? Right-wing voters typically gravitate towards charismatic leaders, demonstrating strong and unwavering support for a single leader. Consequently, they are less likely to split their votes among multiple candidates. On the other hand, left-wing voters tend to embrace egalitarian ideals, expressing themselves more openly and not necessarily favoring a single leader. This makes them more prone to vote-splitting.

In light of these dynamics, it can be argued that FPTP disproportionately disadvantages left-wing leaders. The system, structured to reward the candidate with the most votes in each constituency, may not align with the diverse and expressive nature of left-wing voters. As a result, FPTP tends to favor the cohesiveness of right-wing voters, potentially impacting the representation of left-wing leaders in the political landscape.

How will you explain FPTP to 5 year old?

Imagine you and your friends live in a hostel, and every day you all have to eat the same thing for lunch. The owner always serves upma, but most of the kids in the hostel don't like it every day. So, they decide to vote to change the menu and have different foods.

Now, the way they vote is a bit confusing. It's called FPTP, which means "First Past the Post." Each person gets to choose their favorite food, and the one with the most votes wins.

Here's how it went:

50 friends voted for Upma.
30 friends voted for Dahi Bada.
10 friends voted for Puri Sabji.
30 friends voted for Idli.
40 friends voted for Paneer Curry.
45 friends voted for Chicken Biryani.
35 friends voted for Chilly Chicken.
28 friends voted for Mutton Curry.

Even though most friends wanted a change and voted for different foods, Upma got the most votes. So, even though more friends wanted something else, Upma stays on the menu.

Unfortunately, nothing changed due to the use of the most terrible voting method called FPTP, even though most students desired a different menu.

How will you explain tactical voting to a 5 year old in FPTP?

Imagine you and your friends are choosing a new game to play, but you have to pick just one game to play together. Each friend can only vote for their favorite game, and the game with the most votes wins.

Now, let's say your absolute favorite game is a bit unusual, and not many friends like it. If you vote for that game, it might not get enough votes to win. So, what do you do? You might decide to vote for a game that's not your favorite but is more popular among your friends, just to make sure it wins.

Tactical voting is like when you pick a game you don't love but think is more likely to win, just so you're not stuck with a game you really don't like. In elections, it's when people vote for a candidate who might not be their top choice but has a better chance of winning, to prevent a candidate they really don't want from winning.

What should be implemented first: Approval Voting or Proportional Representation?

It is easier to change the voting method at the constituency or municipality level than at the multi-constituency, state, or country level. Proportional Representation requires a nationwide change, while for single-winner Approval Voting, one constituency or municipality election will suffice, paving the way for Proportional Representation. The tactical voting problem is also addressed through Approval Voting. Directly advocating for Proportional Representation can potentially delay the process.

According to the theory of diffusion, the less familiar an innovation is, and the more inconvenient, uncomfortable, or expensive it is, the greater the resistance will typically be, and the less likely it will be to diffuse. Approval Voting is the simplest and least expensive to implement, with fewer roadblocks.

Furthermore, Proportional Representation and Approval Voting are not mutually exclusive. Proportional Representation works better, becomes more expressive, and keeps bad actors out when used in conjunction with Approval Voting

No EVM in Election

EVM is one of the most insecure system of voting.

Without secure voting system, there is no point of constitution or democracy.

Paper ballot may take time for counting, but its much more secure. Counting is not a big problem, one can wait a bit for results, and it can also be automated with machine learning or optical scanner.

EVM is even more dangerous with FPTP voting method, because a single EVM manipulation can swing the result.

The entire election machinery, from the manufacturing of EVMs to the software loaded onto them, to the committee appointed to evaluate the software, the so-called third-party auditing of this software and much more, is controlled by the Union govt.

EVM Vote count Mismatch

EVM Vote Count Mismatch In 370+ Seats & EC Refuses to Explain. Mismatch in votes polled & counted in EVMs in multiple Parliamentary constituencies in LS Election 2019

Why Did EC Destroy VVPAT Slips of 2019 LS Polls in Such a Hurry?

Paper ballots are safest for our elections – on one condition.

Even VVPAT are not the solution

Security concerns

The introduction of malicious software into a VVPAT system can cause it to intentionally misrecord the voter's selections. This attack could minimize detection by manipulating only a small percentage of the votes or for only lesser known races.

Another security concern is that a VVPAT could print while no voter is observing the paper trail, a form of ballot stuffing. Even if additional votes were discovered through matching to the voters list, it would be impossible to identify legitimate ballots from fraudulent ballots.

Alternatively the printer could invalidate the printed record after the voter leaves and print a new fraudulent ballot. These ballots would be undetectable as invalidated ballots are quite common during elections. Also, VVPAT systems that are technically able to reverse the paper feed could be open to manipulated software overwriting or altering the VVPAT after the voter checks it.

Effectiveness concerns: Hardly Anyone In India checks the VVPAT

Also problematic is that voters are not required to actually check the paper audit before casting a ballot, which is critical to "verifying" the vote. While the option to look at the paper may provide comfort to an individual voter, the VVPAT does not serve as an effective check on malfunction or fraud unless a statistically relevant number of voters participate.

Demo hack in VVPAT with dark glass

Suggestion given by INDIA bloc

Here is a suggestion given by the INDIA bloc: "Instead of the VVPAT slip falling into the box, it should be handed over to the voter, who shall then place it in a separate ballot box after having verified their choice. 100% counting of VVPAT slips should then be done."

So basically, it means using an Electronic Voting Machine (EVM) as a printer to print out votes instead of using an ink stamp to vote on a paper ballot. However, it still has flaws. Like a printer, an EVM can be programmed to print as many votes for a party that manipulated the EVM. Therefore, the possibility of ballot stuffing can still exist, and it's may be hard to identify, as the voter may hide it while putting the vote in the ballot box. Remember, a few instances of ballot stuffing in FPTP can overturn the election result and cause the winning candidate to lose.

One way to solve vote stuffing is to allow only a single paper in the printer (VVPAT) during voting. Just like a secret ballot is provided by tearing off the serial number and voter signature, now the single secret ballot can go through the printer to print out the vote.

Also, voters, especially the uneducated ones, need to be trained to recheck their vote printed on the VVPAT. It's double work for them; first, they have to vote on the EVM appropriately, and then check if the vote is the same or not on the VVPAT. Furthermore, if you are supposed to count all the VVPATs, what is the need for EVMs at all, adding unnecessary complexities?

EVM may decrease spoilt or invalid votes. Although I couldn't find data on the number of spoilt votes in India.

The number of spoilt votes in a First-Past-the-Post (FPTP) election using ink stamp paper ballots can vary widely based on factors such as voter education, clarity of instructions, and ballot design. The same problem also arises in EVMs, as they add unnecessary complexity. Voters may press the wrong button, may not check the VVPAT, and many other issues may arise. The more complicated the system is, the more ways it can be attacked. e.g. Have you thought before that ballot stuffing is possible with VVPAT? I don't think vote spoiling is a big issue until proper measures are taken. Some may intentionally spoil their votes as a form of protest.

If you are supposed to count all the VVPATs, what is the need for EVMs at all, adding unnecessary complexities, why not just paper ballot? The more complicated the system is, the more ways it can be attacked.

Invisible Ink

Even the chemicals used in the ink of VVPAT need to be validated. Chemicals like invisible ink do exist, which can alter your votes after a few days.

Thermal Printing in VVPAT

The VVPAT uses thermal printing, which tends to fade over a few months. However, the ECI's argument that placing reflective glass can prevent VVPAT slips from fading is quite ridiculous. While it's true that VVPAT slips will fade over time, a minute of exposure to light barely makes a difference. The intentions of the ECI are highly questionable, despite spending a significant amount of money on VVPATs, they didn't invest in even a decent printer that produces prints lasting a year. Furthermore, they burn VVPAT slips within three months, even though there is a provision to keep them for a year.

What about independence of election commission?

The Center is making desperate attempts to undermine the independence of the Election Commission. They have also passed a bill aiming to remove the Chief Justice of India (CJI) and the leader of the opposition from the Election Commission panel. Without an independent Election Commission, how can we ensure that fair elections are conducted?

There are numerous ways in which the ruling party at the Center can benefit, including engaging in corrupt campaigning practices such as bribing voters. In such cases, the Election Commission might turn a blind eye. Additionally, if Electronic Voting Machine (EVM) results are declared, there is a risk that the Election Commission might ignore the Voter Verified Paper Audit Trail (VVPAT). This raises concerns about the finality of results, especially in the presence of discrepancies. Which result will be considered final: the one from the EVM or the VVPAT?

In the past, the Election Commission has already overlooked VVPAT discrepancies. How can one ensure that VVPATs are counted correctly, particularly concerning their security? What if the Election Commission disagrees with the proposal put forth by the INDIA bloc? Are there contingency plans, such as mass protests?

Belgium uses paper ballot printer

Its an ATM like voting machine where the printed votes placed in the ballot box after verification, in the Indian context, the user interface (UI) of the screen needs to be simplified. This is crucial as many voters may not be highly educated. Furthermore, voters should be trained with a demonstration before the election, illustrating how to double-check the vote on the printed paper and how to anonymously place the printed paper in the ballot box.

An advantage of this method is that vote spoiling is negligible, as the paper is computer-printed. However, there is still the risk that a voter may press the wrong button and cast an unintended vote. Another benefit is the flexibility to use any voting method, such as Approval Voting. This is challenging with Voter Verified Paper Audit Trail (VVPAT) systems because reprogramming all Electronic Voting Machines (EVMs) or even changing hardware is required to experiment with different voting methods.

However, it has one significant drawback that can be a primary argument against using the system. There is a chance for voters to be tracked and their information retained, possibly even transmitted over the internet, thereby compromising the anonymity of votes.

The Best Option: Paper ballot without any technology

A paper ballot, without relying on any technology or complications, appears to be the best option. To prevent vote spoiling, the paper can be made thicker to avoid ink spillage, and higher-quality ink can be used for the stamp. Furthermore, open-source machine learning models and algorithms can be employed for the accurate counting of votes, thereby reducing the cost of counting and faster result declaration.

Here is a demo and source code for recognizing numbers using machine learning. Similar classification training can be applied to vote counting.

MNIST Web Demo

MNIST Web Demo Source code

The paper ballot is the simplest solution.

With paper ballots, every citizen, politician, or election nominee can understand what is actually happening. Everyone has the idea of how to secure the system without adding complexity that only technical experts can comprehend, making it difficult for the common citizen to identify the problems or technicalities of electronic voting machines.

EVM Hack Hypothesis

There is no doubt that EVMs can be hacked. If it is indeed susceptible to hacking, it is in the best interest of politicians, especially for the incumbent party, as they hold the power at the state or center.

The problem with EVMs is that it is hard to prove whether they have been hacked or not, due to reasons associated with how EVMs are manipulated.

Let's consider the hypothesis: if parties can hack the EVMs, how will they change the ballot to ensure their candidate wins?

They can't substantially increase the total vote count of a constituency because it is already declared on the voting day itself. They may not do mass manipulation, as its likely to be caught.

Instead, they may make the candidate win with a small margin. They could increase the votes for the candidate they want to win, decrease the votes for the candidate they want to lose (first runnerup), and manipulate vote splitting (increase the votes of second, third etc runnerup) while keeping the total vote count of the constituency constant.

As given in data, there are many instances where the majority of people in a constituency have voted against a candidate, yet they have won. While it is very likely to happen with FPTP, EVM hacking can make it even worse.

You can also look the data where FPTP got worse, Madhya Pradesh BJP got 48% votes, and INC got 40% of votes, where as BJP got 70.87% where as INC with 28.70% seats.

It's better for us to stop using the EVM and reform our voting system by doing away FPTP.

Security analysis of a real Indian EVM

You can watch a demo video by going through the link:

https://indiaevm.org

Here the the research paper with about security analysis of a real Indian EVM.

Pdf Link

Abstract of the paper

Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, known in India as EVMs, have been praised for their simple design, ease of use, and reliability, but recently they have also been criticized following widespread reports of election irregularities. Despite this criticism, many details of the machines’ design have never been publicly disclosed, and they have not been subjected to a rigorous, independent security evaluation. In this paper, we present a security analysis of a real Indian EVM obtained from an anonymous source. We describe the machine’s design and operation in detail, and we evaluate its security in light of relevant election procedures. We conclude that in spite of the machines’ simplicity and minimal software trusted computing base, they are vulnerable to serious attacks that can alter election results and violate the secrecy of the ballot. We demonstrate two attacks, implemented using custom hardware, which could be carried out by dishonest election insiders or other criminals with only brief physical access to the machines. This case study carries important lessons for Indian elections and for electronic voting security more generally.

Some Details about EVM Hack in the Paper

We demonstrate two attacks that involve physically tampering with the EVMs’ hardware. First, we show how dishonest election insiders or other criminals could alter election results by replacing parts of the machines with malicious look-alike components. Such attacks are made far simpler and cheaper by the EVMs’ minimalist design, and they could be accomplished without the involvement of any field-level poll officials. Second, we show how attackers could use portable hardware devices to extract and alter the vote records stored in the machines’ memory, allowing them to change election outcomes and violate ballot secrecy. This attack is technically straightforward because the EVMs do not use even basic cryptography to protect vote data internally. It could be carried out by local election officials without being detected by the national authorities or the EVM manufacturers’ agents.

Though EVM manufacturers and election officials have attempted to keep the design of the EVMs secret, this presents only a minor obstacle for would-be attackers. There are nearly 1.4 million EVMs in use throughout the country, and criminals would only need access to one of them to develop working attacks.

Dishonest insiders or other criminals would likely face less difficulty than we did in obtaining such access. There are many other possibilities for manipulating Indian EVMs, both with and without the involvement of dishonest election insiders. Depending on the local context and security environment, the nature and scale of potential manipulations may vary, but neither the machines’ simplicity nor their secret design keeps them safe.

The Illusion of Secrecy vs Open Protocol

The common assumption is that a secret encryption algorithm adds an extra layer of security by making it more challenging for attackers to decipher sensitive information. However, this belief is built on the misconception that secrecy equates to strength.

Testing Strength Through Transparency:

The paradox lies in the fact that the only reliable way to determine the strength of an encryption method is to make it public and subject it to rigorous analysis by the cryptographic community. Public scrutiny and peer review play a pivotal role in identifying vulnerabilities and ensuring the robustness of an encryption algorithm.

Lesson from Cryptography

One important and counterintuitive fact in this situation is that both the encryption and decryption algorithms are publicly known. It seems that keeping the encryption algorithm secret should make the whole system harder to break. However, secret algorithms also mean untested algorithms: The only way to find out whether an encryption method is strong, i.e., cannot be broken by a determined attacker, is to make it public and have it analyzed by other cryptographers.

[Book: Understanding Cryptography: Christof Paar, Jan Pelzl]

Open source software are more secure

It's not that opensource software is necessarily better engineered...it is that without the sourcecode it is impossible to see what a program does. So opensource software is seen as more secure as it is the only kind of software that can be checked for security at all without needing to blindly trust someone...everything not open-source can't be checked and by this has to be seen as insecure.

In a voting process, the ballot needs to be kept secret not the protocol or process.

Securing Your Code

Schneier on Security

The exact same reasoning leads any smart security engineer to demand open source code for anything related to security. Let’s review: Security has nothing to do with functionality. Therefore, no amount of beta testing can ever uncover a security flaw. The only way to find security flaws in a piece of code—such as in a cryptographic algorithm or security protocol—is to evaluate it. This is true for all code, whether it is open source or proprietary. And you can’t just have anyone evaluate the code, you need experts in security software evaluating the code. You need them evaluating it multiple times and from different angles, over the course of years. It’s possible to hire this kind of expertise, but it is much cheaper and more effective to let the community at large do this. And the best way to make that happen is to publish the source code.

Why should we trust proprietary or closed source software?

No one can be sure what the proprietary or closed source software does in the background. It can provide accurate results during testing, but after the election, it may switch votes when you turn on the EVM. Based on the current inquiry, it seems to also have a clock. This makes it easy to switch votes with precise date and time.

Please note that one can also use a timer based on process time using loops and conditionals, process time is a measure of the total CPU time consumed by an executing process. Process times are a count of CPU instructions or clock cycles and generally do not have a direct correlation to wall time. Although it doesn't have a direct correlation with wall time, one can still use it approximately to schedule tasks like vote switching or swapping at specific timings.

Also, as said earlier, one also cannot know what it prints to the VVPAT; it may print multiple votes in the absence of oversight.

Even if the software is made open source, we still cannot be sure if the correct software is installed, especially if a corrupt official has manipulated it.

Why Electronic Voting Is Still A Bad Idea

The cost associated with replacing EVM with a paper ballot

There are almost no countries that utilize electronic voting machines (EVMs). One argument in favor of EVMs is cost efficiency. India, being a vast country with a sizable population, will it incur high expenses with paper ballots? Let's compare the costs associated with EVMs and paper ballots.

The initial setup, including the appointment of volunteers to manage booths, remains the same for both methods. The primary difference lies in the vote counting process. Given India's large population, there is a need for a substantial number of counting centers. But there are also large number of volunters in a large populated country. A significant portion of the adult population in India is unemployed, resulting in lower labor costs. Counting is a low-skill labour, so anyone can do it at a very low cost. To contribute to saving the country, most people would be willing to work for free for a week or a month. It wouldn't take a week to finish counting votes. Additionally, there are maintenance and manufacturing costs associated with EVMs, which are absent in the case of paper ballots. Consequently, paper ballots prove to be a more cost-effective option.

Counting with paper ballots can be conducted in a decentralized manner, constituency-wise, involving a large number of people. Moreover, the counting process can be automated using open-source machine learning, as demonstrated earlier. Anyone can develop the machine learning algorithm, and the validation and accuracy checks can be performed by the community.

How much time does it take to print a ballot paper?

Printing presses are available in every locality. Each ballot paper's size will not be more than 6-10 inches, and consequently, each ballot paper will not even cost 25 paise in Indian currency. It won't take a day to print the ballots. If government is not ready to pay for that; we can crowd fund 1-10 rupees. Most people will be ready to contribute in Rs. 100s and 1000s because it safeguards our constitution and democracy.

Environmental cost of printing paper ballot

The environmental cost of paper printing has been a topic of discussion, with some arguing that it contributes to deforestation. However, it's important to note that paper production utilizes raw materials such as wood pulp, bamboo, salai and sabai grass, as well as waste products like molasses and bagasse. So, it's mostly grass and manufacturing waste that is used in making paper.The amount of paper consumed by a family of two children in a year, approximately 100 notebooks and 50 books. Don't we waste paper anyway? So, will you stop educating your children because of that? Voting, on the other hand, requires just a single sheet of paper per person. Additionally, paper is recyclable up to 5-7 times, ensuring its reuse for packaging, notebooks, and other purposes. Therefore, the argument against paper ballots on environmental grounds is not compelling, especially when considering the minimal paper usage and the potential for recycling.

Booth Capturing in Paper Ballot

Booth capturing, also known as booth looting, is electoral fraud in which party loyalists or hired criminals "capture" a polling booth and vote on behalf of legitimate voters to ensure a particular candidate's victory. One argument is that Electronic Voting Machines (EVMs) help decrease booth capturing by enabling a five-minute delay in voting process, polling officer can also press a close button to deactivate the EVM. However, this measure doesn't entirely prevent booth capturing. Examples of booth capturing date back to the 1990s, but with the advancement of media, surveillance technology and redundant camera based mobile phones, it has become increasingly difficult to conceal such activities. Since booth capturing is a criminal offense, re-elections can be conducted in places where it occurs.

Regarding the time delay, we can now implement secure robotic ballot boxes that open and close at specific intervals with the press of a button by polling officers. The slit or hole can be thin enough so that a single ballot can enter. It is a simple machine. Such a device will be much cheaper than an EVM assembly. While booth capturing can be detected, it remains challenging to ascertain what the EVM software is doing in the background.

Courts cannot disregard the use of ballot papers by simply stating, "We all know what happened when there was ballot papers. You may have but we have not forgotten." This statement is vague and does not provide a specific reason of the potential vulnerabilities of ballot papers in modern times. The world is dynamic, and the past is not the same as the present. It is true that past instances of ballot paper misuse have occurred, but it is essential to evaluate the current situation with consideration for advancements in technology and security measures. For instance, the widespread availability of cheaper CCTV cameras and camera phones has significantly improved the monitoring capabilities of polling stations. This is not how courts should argue. They need to talk by evidence and citation like how are paper ballots vulnerable to booth hacking, and how do EVMs protect against booth hacking?

Role of courts

In the event of booth hacking, what we need are an independent judiciary and an independent election commission that can declare the election void and ensure the conduct of free and fair elections. An analogy could be drawn to cricket: if the umpire is corrupt, the integrity of the game is compromised.

If people and opposition parties don't want EVMs, who are the CJI or the courts to force people to vote through EVMs? EVMs are an opaque voting system that can't be falsified, and there is enough evidence through computer science. These are not theoretical evidence, but evidence from many decades of computer science practices. So, why are the courts forcing people to vote through EVMs and reject PILs against EVM? Courts are failing to conduct free and fair elections and protect our constitution.

Is paper ballot voting archaic?

The ballot paper is the gold standard of voting. Your votes don't disappear in the ballot box; that goes beyond the laws of physics. However, with Electronic Voting Machines (EVMs) that support read, write, and delete functions, your votes can disappear without trace, and you can't even prove it. Furthermore, one can use technology to automate and secure ballot voting by implementing robotic ballot boxes and employing open-source, tested machine learning algorithms to automate the counting process, as mentioned above.

How can we achieve secure automated vote counting through open source machine learning software?

One method involves utilizing a high-capacity auto-feed scanner to scan votes.

Scanned images need to be made public. This action promotes transparency and allows anyone to verify the count using various open-source machine learning programs. To mitigate reliance on a centralized scanner, opposition leaders or other stakeholders can independently verify the results using their own scanners. Since the process is automated, this verification task is not cumbersome.

Manual counting can be prone to human errors; typically, runner-up leaders request multiple recounts to validate the results. Automated counting simplifies the recounting process, and well-trained machine learning algorithms can offer greater accuracy in counting.

Vote counting is a simpler model, akin to handwriting number recognition, so machine learning can achieve a high level of accuracy as demonstrated. It also provides probabilities, indicating when the machine learning is unsure of labeling by giving a low probability. In such cases, human intervention can be involved.

As for the ballot paper design, using thicker paper without folds and placing it directly into the ballot box simplifies the scanning process.

Placing the unfolded ballot directly into the ballot box aids in feeding it into the scanner without requiring manual effort to open the ballot paper.

To preserve anonymity without folding the ballot, a separate piece of paper can be provided to conceal it from cameras or observers before placing the voted ballot in the ballot box.

In terms of paper costs, paper can be sold and recycled, which reduces expenses. Additionally, paper costs are significantly lower than those associated with electronic voting machine (EVM) assembly.

For a constituency with one lakh voters, three to six scanners are typically sufficient to provide results within a day. Increasing the number of scanners reduces the processing time further. Many scanners boast scanning speeds of up to 20 pages per minute.

Using this method, the cost of voting will be significantly lower than EVM assembly, and it is also one of the most secure methods.

Currently I am trying out image classification. Typically, it takes 5-10 hours to train the model.

False positives and false negatives in machine learning

A false positive is an error in classification in which a test result incorrectly indicates the presence of a condition, while a false negative is the opposite error, where the test result incorrectly indicates the absence of a condition when it is actually present.

In classification problems like vote counting or identifying handwritten numbers, there are chances of false positives. For example, identifying a sketch as a number when it should be none of the numbers from 1 to 9. Machine learning doesn't work best when the given data is very different from the trained data, so it may fail to identify spoiled votes, which can occur in many different and unpredictable ways. Therefore, some human caution is required to check the probability values.

As scanned images can be made public, humans can check them later on, within a week.

ECI cannot claim the cost of counting or the space or the time required for counting. If you make the scanned image public, we will count it for free.

How can we be sure that the scanner software is not hacked?

The software installed on a laptop can be Linux-based, and the scanner software can be open source; for example, HP drivers are open source. We shouldn't trust Windows or other closed-source software. However, what about the software installed in the scanner hardware itself? It's usually proprietary. Therefore, it's advisable not to use a scanner that has firmware installed. Many scanners are just motors and some buttons; there is no CPU or memory chip for firmware to reside on. Only the driver is needed installed on computer, which can be open source. The Linux OS and driver software need to be installed on the laptop under proper surveillance, and the checksum of the Linux OS and driver software needs to be checked.

Randomization of EVMs to be supplied to constituencies and randomized recounts of VVPATs to detect possible malfunctions or fraud. Is randomization transparent?

Randomization is not conducted transparently. Why should we trust a video and a server controlled by a system administrator to generate random values? Secure random number generation involves drawing from shuffled papers, not relying on software controlled by a system administrator.

A letter from Mehmood Pracha, who is running as an Independent candidate in the Rampur, Uttar Pradesh, Lok Sabha Constituency:

Randomization process for EVM-VVPAT machines by you, was at best a videographed demonstration of a pointless, illegal, opaque, and surreptitious fiddling of the machines being presented as a technical exercise. The very fact that I was not permitted to access the actual machines, or even see them physically, is sufficient to discredit the entire process, and to shatter my confidence, and that of the electorate, in the veracity and trustworthiness of the EVM-VVPAT machines and the polling process in which they are to be used. The entire process lasted less than half an hour, and was very evidently conducted purely as a matter of formality without inviting or permitting any actual participation by me.

Letter link 1

Letter link 2

Chances of Match-fixing

The chances of match-fixing increase when elections can be manipulated. Opposition parties may be negotiated with to cease protests against Electronic Voting Machines (EVMs) or to treat the protests casually, giving the appearance of opposition to EVMs.

Thus, there is a high likelihood of election fixing when election results are determined by EVM machines.

This undermines competition, eliminates third parties, and stifles independent thinking leaders. It can be detrimental to any representatives, regardless of party affiliation, including the ruling party. Those dissatisfied with the current regime have a high risk of losing, whether they belong to the BJP or the Congress. Additionally, many Congress leaders have switched parties due to threats from investigative agencies like the Enforcement Directorate (ED) or out of greed for money.

If the BJP is targeting 370 seats, then there are 173 seats that they would have to lose. One can assume who will lose those seats in the case of match-fixing.

Probability of Hacking

Those who argue the probability of hacking is non-existent, firstly, the EVM is an opaque system. Nobody knows what is installed on the EVM except the software maker who has installed it. There is no way to trace it because everything is happening behind the screen. If you are inside a room, how can someone outside know what's happening inside? Light can't pass from outside to inside; walls are opaque. That's beyond the laws of physics to know what is happening inside the room through our eyes when outside. It's a complete pseudoscience argument of lack of falsifiability. The software installed is proprietary or closed source. EVMs are also not made public to be scrutinized by ethical hackers. So why should we trust a middleman to take care of our votes? People have the right to directly vote, not give their vote to a middleman to vote for them.

When there is so much control by the software maker and installer, the probability of rigging elections becomes extremely high, not low.

Shooting the messenger

A whistleblower is an individual who exposes information about wrongdoing, illegal activities, or unethical behavior within an organization. Unfortunately, whistleblowers may face backlash, retaliation, or legal consequences for bringing such information to light.

"Shooting the messenger" is a critical perspective on the unfair treatment that whistleblowers may experience for their courageous actions in exposing the truth.

The government should prioritize the safeguarding of whistleblowers rather than resorting to punishing the messenger.

Researcher Arrested in India After Disclosing Problems With Voting Machines

The Supreme Court didn't give a judgment on 100% VVPAT counting.

There's no bigger irony than the fact that they can't tally votes for 12 days. Counting is such a low-skilled job that even a 10th-grade student can do it, yet the Supreme Court rejected the counting, as predicted, as we don't trust the judge.

Why can't counting be as decentralized as polling booths? Each polling booth typically serves 300 to 700 voters. Therefore, if we establish similar decentralized booths for counting, it would only take an hour or two to count the paper ballots.

There are no free and fair elections; it's all a rigged game.

The silence of the people equates to accepting dictatorship, allowing the government to control your taxes, economy, and the monopoly of violence.

People need to stand up collectively; it can't be done by individuals alone. If 50% of the population doesn't trust the election commission and EVMs, then why elections with EVM? Don't be afraid; peacefully protest and take to the streets. They can't imprison 50% of the populace.

Understand how a fascist government operates.

Voter turnout in Phase 1

About 40% of voters are not voting. About 5-10% decrease in voter turnout than 2019 election.

Voter turnout image

With such a low voter turnout, one can assume there is high distrust in elections and politicians. The Supreme Court's decision has made it worse.

Should we vote or not vote?

EVMs have VVPATs installed even if VVPAT slips are not counted. People must check and also be trained to inspect what falls into the VVPAT. It's hard to say how many votes will be manipulated. It can range from 5% to even 30% of vote manipulation. But if mass manipulation occurs, it is likely to be caught if VVPATs are counted. One needs to also be aware of VVPAT ballot stuffing i.e. EVM printing the ballot when no one is watching. The Election Commission of India (ECI) is already changing or manipulating the voter turnout data and not providing the full details of actual numbers of voter turnout in each booth or constituency; instead, they provide percentages. There's no transparency at all levels of voting, from the calculation of voter turnout to EVM black box. We can still request people to vote. We can still defeat the government with sufficient votes against them and VVPAT are counted. Don't press NOTA. We will see what happens next. The fight for 100% counting needs to continue, though the Supreme Court is unlikely to allow counting. We need to be ready for mass protests during and after the election for 100% counting of VVPAT.

About strong rooms of EVM and VVPAT storage

ECI Link

CCTV cameras with sufficient storage facility shall be installed. CCTV Camera should cover sealed doors of Polled EVM Strong Room and Election Paper Strong Room, security and corridor etc. A proper system to take back up of CCTV footage shall be ensured. Such video data shall be in the custody of the District Election Officer.

Videography shall be made at the time of the opening and closing of Polled EVM Strong Room and Election Paper Strong Room. Proper log books shall also be maintained.

Courts can ask for a 100% counting of VVPATs at any time if protest continues, and those involved can be caught if any manipulation occurs, provided that proper security measures are taken to protect the VVPATs.

Microcontrollers are ported with firmware by BEL/ECIL with directors affliated with BJP

A former bureaucrat has raised concern with the Election Commission on the nomination of 'at least' four persons allegedly having 'affiliation with the BJP' as independent directors on the board of state-run BEL that manufactures EVMs, prompting opposition leaders to attack the government.

Can EVMs be Hacked or Tampered With? | The Debate over VVPAT Matching

The video connected all the dots of EVM. However, I have a conflict with the solution given.

EVMs demand protection for 365 days every year

EVM is a useless machine, and there is no need for EVM at all. It adds extra unnecessary complexity, maintenance, and costs.

Using paper ballots is more cost-effective, requires less maintenance than EVMs, and EVMs demand protection for 365 days every year, whereas ballot papers need protection for only about few months, hardly 3-6 months after the election. Any unprotected EVM at any time is susceptible to hackers manipulating it and installing malware. Manufacturing of new EVM is another additional cost associated with EVMs. Paper ballots have fewer steps to maintain and are also considered the gold standard.

So, instead, we can just use paper ballots. Paper ballot counting can be automated in the future using an open-source machine-learning algorithm, as I have already said and demonstrated. If you want the results in one day, it can also be done with paper ballots.

Lets end the voting scam.

To be clear, parties at the center will always want EVMs to select their own government through a flawed and opaque voting system that they have full control over. It is the responsibility of people to protest and return to paper ballot-based voting.

The myth that Electronic Voting Machines can't be hacked before elections

The argument that Electronic Voting Machines (EVMs) cannot be hacked long before an election is based on the premise that EVMs do not recognize political parties or candidates. The names of candidates are only associated with specific serial numbers just before the election, making it highly challenging for a hacker to know which serial number to target in advance. However, it is important to note that knowing the serial number is not the only method of hacking EVMs. Malicious actors could potentially install or replace hardware components with microscopic wireless or Bluetooth devices, which could be used to switch votes during the result declaration. The challenge lies in thoroughly inspecting the internal mechanisms of lakhs of machines. As a result, the security of EVMs largely depends on the integrity of the manufacturers and the protection against unauthorized access. It raises a valid question: Why do we entrust the safety of our votes to third parties like manufacturers?

A ghost in the machine? On EVMs, democracy deficit and its constitutionality

https://theleaflet.in/a-ghost-in-the-machine-on-evms-democracy-deficit-and-its-constitutionality/

Fundamental flaw no.1: The Black box technology

The primary objection to EVMs is that the technology deployed is the ‘black box technology’

Fundamental flaw no. 2: Technical scrutiny of EVMs impossible

The German court struck down the use of EVMs as unconstitutional simply because no accessible public or judicial scrutiny of EVMs was possible without the intervention of technical experts.

Fundamental flaw no. 3: VVPAT precedes the recorder

Flaw no. 4: A near-zero paper trail

The ECI, employing bizarre logic, revealed: “Verification of VVPAT paper trail of 479 (randomly selected) EVMs would generate 99 percent accuracy in election results.

Vague arguments of Supreme Court

The Supreme Court judge seems to be utterly corrupt. He is making all the same vague arguments to justify the security of EVMs that have already been debunked. According to Justice Khanna, EVMs are not re-programmable. It may be one time programmable memory, but votes are not in non-volatile memory. Votes are readable and rewritable. As mentioned earlier, attackers could use portable hardware devices to extract and alter the vote records stored in the machines' memory, thereby enabling them to change election outcomes and violate ballot secrecy. As per previous analysis by hacker, EVMs do not use even basic cryptography to protect vote data internally. Furthermore, judge says that the source code couldn't be disclosed and that EVMs can't be made public for a hackathon because they will be prone to misuse. This is completely opposite to the principles of computer science and security experts. What are they scared of, if it's one-time programmable memory? No one can change its code, right? Why should we believe what you said is true if it hasn't been tested by independent security experts? The argument that EVMs don't recognize political parties and candidates is completely misleading. VVPATs contain information about political parties through symbol uploading. There is a free flow of information between VVPATs and the control unit. This makes the EVM aware of political parties and candidates.

Give missed call to 9667722062 to Ban EVM

If you want to support Ban EVM Movement... Just give Miss Call- 9667722062- Adv. Rajendra Pal Gautam

2 Lakh 30,000 have already given missed call in 48 hours

Share on social media for missed call to 9667722062 to Ban EVM

Message 1

If you want to support Ban EVM Movement... Just give Miss Call- 9667722062

2 Lakh 30,000 have already given missed call in 48 hours

https://youtu.be/sHmpEv4dWDA?si=Zm1ISm6WOzhFPyB2

#EVM_Hatao_Desh_Bachao 
#BanEVM_Save_India
#EVM_हटाओ_लोकतंतर_बचाओ 
#EVM_Hatao_Loktantra_Bacho 

Message 2

If you want to support Ban EVM Movement... Just give Miss Call- 9667722062

2 Lakh 30,000 have already given missed call in 48 hours

https://42683ff2b1a2ac5ad2fef0ee01995d78.ipfs.4everland.link/ipfs/bafybeifofj2zgq5wnb2juvyj3nyf23wdizpqtsfmbmidoqsxau3js7biyq

#EVM_Hatao_Desh_Bachao 
#BanEVM_Save_India
#EVM_हटाओ_लोकतंतर_बचाओ 
#EVM_Hatao_Loktantra_Bacho 

Message 3

Ban EVM Movement... Give Miss Call- 9667722062

2024 election will be without EVM.
Farmers, the army, and everyone needs to come together to ban it.

https://42683ff2b1a2ac5ad2fef0ee01995d78.ipfs.4everland.link/ipfs/bafybeicjvqn3ksjfys7cmpqu7msap2vvnlqbbejilv4jtjuztrkpennule

#EVM_Hatao_Desh_Bachao
#BanEVM_Save_India
#EVM_हटाओ_लोकतंतर_बचाओ
#EVM_Hatao_Loktantra_Bacho

Message from the Army officer

When an army officer dies for their nation on the border, it is often seen as a sacrifice made to protect the country from external threats and maintain its sovereignty. This act highlights the significance of safeguarding national borders and reinforces the idea that a nation must be prepared to defend itself against potential dangers.

Similarly, having a secure voting system within a nation is equally important for preserving democracy and ensuring the stability and safety of the country. A secure voting system guarantees fair elections, which are essential for reflecting the will of the people and upholding the principles of representative government. When citizens cast their votes with confidence, knowing that their choices will be accurately recorded and counted, they contribute to the legitimacy and strength of the political process.

A vulnerable or compromised voting system can lead to various issues such as voter fraud, manipulation, or suppression, all of which undermine the democratic foundation of a nation. Such situations not only erode public trust but also create social unrest, instability, and potentially even violence. Therefore, investing time, resources, and efforts into developing and maintaining a robust and reliable voting infrastructure should be considered a priority for any democratic nation.

Timer in EVM

Impact of EVM on our country

EVM manipulation in loksabha 2019 election and state assembly

Duplicate voter lists in lakhs

In FPTP, a single vote matters, as a candidate can lose by a few votes.

Courts on EVM

Stop watching corporate TV news and protest against EVMs in front of all courts. The government cannot pressure courts to not ban EVMs.

The resignation of an Election Commissioner

There needs to be a body of three members in the Election Commission, but only one election commissioner is left. Arun Goel has resigned ahead of the 2024 Lok Sabha elections. Will only one election commissioner be able to conduct the Lok Sabha election? How are election commissioners appointed, what are the guidelines and criteria for their appointment? How have they been appointed so quickly overnight? Will the government appoint another election commissioner now, who will follow the government's orders rather than staying neutral and independent to all parties? Will the new election commissioner, if appointed, listen to the people and consider eliminating the use of EVMs?

Open-list proportional representation vs. Mixed-member proportional representation

date: "2023-09-21"


categories:

  • "democracy"
  • "electoral-reform"
  • "politics" tags:
  • "fair-democracry"
  • "proportional-representation"

This blog is a continuation of the discussion about proportional representation. You can find the main blog here in the link. Do we need a supreme leader? How can we share power between parties?

Open list PR is about voter choice in selecting individual candidates:

Open list proportional representation is an electoral system used in many countries to elect members to a legislative body. It combines the principles of proportional representation with a degree of voter choice in selecting individual candidates. In an open list PR system, voters typically cast a vote for a political party and can also express a preference for specific candidates within that party's list. Here's how it works:

  1. Voting Process:
  • Party Vote: Voters cast their first vote for a political party of their choice. This is known as the "party vote" or "list vote." It determines the overall proportion of seats each political party will receive in the legislature.

  • Candidate Preference: In addition to the party vote, voters have the option to express a preference for one or more individual candidates from the party they selected. This preference can be indicated by ranking the candidates or marking them with an "X" or a similar symbol.

  1. Seat Allocation:
  • Based on the total number of party votes each political party receives, seats in the legislature are allocated to parties in proportion to their share of the vote, using a mathematical formula such as the Sainte-Laguë method or the D'Hondt method.

  • Each party's list of candidates is ordered based on a predetermined ranking established by the party or determined through internal party primaries.

  • Seats are initially awarded to the candidates at the top of each party's list, in proportion to the party's share of the vote.

  1. Candidate Selection:
  • Candidates who receive a high number of individual preferences from voters are more likely to move up the party's list and secure seats in the legislature.

  • In some open list systems, candidates are elected in the order of the preference votes they receive. The candidates with the most individual preferences are elected first, followed by those with fewer preferences until all the party's allocated seats are filled.

  1. Proportionality: Open list PR aims to maintain proportionality between the party's overall vote share and the distribution of seats among its candidates. This means that if a party receives, for example, 30% of the vote, approximately 30% of the seats it wins should go to the candidates who received the most preference votes.

  2. Flexibility and Voter Choice:

  • Open list PR systems offer voters more flexibility and choice compared to closed list PR systems. Voters can influence the order in which candidates from the same party are elected.

  • Voters may choose candidates based on personal attributes, local connections, or specific policy positions.

Open list proportional representation systems provide a balance between party representation and individual candidate representation. They aim to combine the benefits of proportional representation, which ensures that parties are represented in proportion to their popular vote, with the ability for voters to have a say in the selection of individual representatives within parties. This system is used in countries such as Sweden, Finland, and Norway.

Mixed Member Proportional (MMP) is a system that retains the constituency element:

Mixed Member Proportional (MMP) representation is an electoral system used in some countries to elect their legislatures, such as Germany, New Zealand, and parts of Scotland. MMP combines elements of both proportional representation and first-past-the-post systems to achieve a more balanced and representative outcome.

Here's how it works:

  1. Two Types of Representatives: In MMP, voters cast two votes: one for a candidate in their local constituency (similar to first-past-the-post) and one for a political party.

  2. Constituency Seats: The local constituency vote determines a portion of the seats in the legislature. Candidates who win the most votes in their respective constituencies become Members of Parliament (MPs).

  3. Proportional Representation: The party vote determines the overall proportional makeup of the legislature. Parties receive seats in proportion to the percentage of the party vote they receive nationwide. This helps ensure that the overall composition of the legislature reflects the popular vote.

  4. Compensation Seat: To balance the results, additional seats are allocated to parties based on their share of the party vote. These are known as "compensation seats" and are filled from party lists. The goal is to make the total number of seats each party holds closely match its proportion of the vote.

  5. Overall Composition: The final composition of the legislature is a combination of local constituency winners and proportional seats from party lists. This ensures that both individual representation and overall proportionality are considered.

MMP aims to strike a balance between geographic representation (via local MPs) and proportional representation (to reflect the popular vote more accurately). It encourages multi-party systems, as smaller parties have a better chance of winning proportional seats, leading to a more diverse and representative legislature.

However, it can be complex for voters to understand and may lead to coalition governments since it often results in a multi-party system where no single party has an outright majority. This requires parties to work together to form governing coalitions, which can sometimes be challenging.

Example Scenario: New Zealand's MMP System

In New Zealand, the MMP system has been in use since 1996. Let's say there's an election with the following details:

  1. Total Seats in Parliament: 120 seats

  2. Constituency Seats: There are 70 local constituencies across the country, each electing one MP through a first-past-the-post system. These are known as "electorate seats."

  3. Party List Seats: The remaining 50 seats are filled based on the party vote, which is a vote for political parties rather than individual candidates. Parties create ranked lists of candidates, and these seats are allocated to parties based on the proportion of the party vote they receive.

  4. Party A: Let's say Party A receives 40% of the party vote. In this case, they would be entitled to approximately 40% of the 50 party list seats, which is 20 seats. Party A's total representation in Parliament would then be the 20 party list seats plus any constituency seats they won.

  5. Party B: Party B, with 30% of the party vote, gets around 15 party list seats.

  6. Party C: Party C receives 20% of the party vote, which corresponds to 10 party list seats.

  7. Party D: Party D secures 10% of the party vote, resulting in about 5 party list seats.

  8. Constituency Winners: In the local constituencies, the party that wins the most votes in each of the 70 constituencies gets one seat per constituency, regardless of their party vote share.

Now, let's see how this plays out:

  • Party A wins 30 constituency seats, and Party B wins 25. So, Party A and Party B each have their constituency seats plus the proportional seats they earned.

  • Party A ends up with a total of 50 seats (30 constituency seats + 20 party list seats).

  • Party B ends up with a total of 40 seats (25 constituency seats + 15 party list seats).

  • Party C, with 10 party list seats and no constituency seats, has a total of 10 seats.

  • Party D, with 5 party list seats and no constituency seats, has a total of 5 seats.

This proportional representation system ensures that the overall composition of Parliament roughly reflects the percentage of the party vote each party received. It encourages a multi-party system and provides a more balanced representation of the electorate's preferences compared to a purely first-past-the-post system.

Please note that the numbers in this example are simplified for illustration purposes and may not precisely match New Zealand's actual election results.

While some countries use FPTP in mixed member proportional systems to select a single winner in a constituency, one can employ Approval voting as a more optimal voting method to mitigate vote splitting and tactical voting. One can also use proportional representation (number of votes = amount of power) to select multiple winners in a constituency, to make more decentralized decision making.

Closed-List Proportional Representation

In a closed-list proportional representation system, voters cast their votes for a political party, and seats are allocated to parties based on the proportion of the overall vote they receive. The order of candidates on the party's list determines who gets elected. Voters typically do not have the option to choose individual candidates; rather, they are essentially endorsing the party's list.

Now, let's address the concerns you mentioned about the closed-list method:

Lack of Individual Candidate Choice:

In a closed-list system, voters may not have the ability to express preferences for specific candidates. Some argue that this reduces the direct influence of voters on the selection of representatives.

Increase in Partisanship:

Closed-list systems may be criticized for promoting party loyalty over individual candidate qualities. This could potentially lead to a more partisan political landscape, as representatives are primarily accountable to the party leadership rather than the voters.

Rise of Far-Right Parties:

As partisanship escalates, far-right parties can ascend to prominence by strategically employing propaganda, disseminating disinformation, and skillfully appealing to sentiments.

Parliamentary or Presidential form of government? What's in the name?

date: "2023-09-28"


categories:

  • "democracy"
  • "politics"

Both forms of government are dedicated to upholding democracy and ensuring the separation of power among the executive, legislative, and judicial branches. They also aim to establish checks and balances within the system.

Warning: The blog can become a bit longer, but I will highlight key takeaway points.

Today, we will compare two countries: the USA, which is considered to have a presidential system of government, and India, which is known for its parliamentary form of government. We will discuss countries like the UK with a parliamentary system on another day.

Both of the countries select their head, in India, the head of the country is called the Prime Minister, whereas in the USA, they are called the President

This is how President of USA are selected:

The President of the United States is selected through a multi-step process that includes both primary elections and a general election. Here's an overview of how the President of the USA is selected:

  1. Primaries and Caucuses: Before the general election, political parties (primarily the Democratic and Republican parties) hold a series of primary elections and caucuses in each state. During these events, registered party members vote for their preferred presidential candidate. The outcomes of these primaries and caucuses determine the number of delegates each candidate receives.

  2. National Conventions: Each political party holds a national convention, usually in the summer before the general election. Delegates from the primaries and caucuses attend these conventions, where they officially nominate their party's candidate for President. The candidate typically selects a vice-presidential running mate during or before the convention.

  3. General Election: The general election occurs on the first Tuesday in November of every fourth year. Registered voters across the United States cast their ballots for their preferred presidential candidate. However, voters technically vote for a slate of electors chosen by their party, known as the Electoral College.

  4. Electoral College: In the Electoral College system, each state has a certain number of electors based on its representation in Congress (Senators and House of Representatives). Most states use a winner-takes-all approach, where the candidate who wins the popular vote in a state receives all of its electoral votes.

  5. Electoral Vote Count: In December following the election, the electors in each state gather in their respective state capitals and cast their votes for President and Vice President. The results are then sent to the President of the Senate (the Vice President of the United States).

  6. Congressional Certification: Congress meets in early January to count and certify the electoral votes. If a candidate receives a majority of electoral votes (at least 270 out of 538), they are declared the President-elect.

  7. Inauguration: The President-elect is officially inaugurated and takes the oath of office on January 20th of the following year, marking the beginning of their four-year term in office.

It's important to note that the process may vary slightly between states due to differences in election laws and practices. The winner of the popular vote in each state typically receives all of that state's electoral votes, except in Maine and Nebraska, which allocate their electoral votes based on congressional district results.

President and vice president of USA are not elected directly by citizens. Instead, they are chosen by "electors" through a process called the Electoral College. Each state’s political parties choose their own slate of potential electors. Who is chosen to be an elector, how, and when varies by state.

https://www.usa.gov/electoral-college

The size of the electoral college in the United States is 538 electors. Each state has a number of electors equal to the total of its Senators (always two) plus the number of its Representatives in the House of Representatives (which can vary based on a state's population).

How Prime Minster of India is selected?

The Prime Minister of India is selected through a process that involves several key steps, primarily within the parliamentary system of India. Here's how the Prime Minister of India is typically selected:

General Elections:

  • The process begins with the general elections held in India, which determine the composition of the Lok Sabha, the lower house of India's Parliament. Lok Sabha members are directly elected by eligible voters from their respective constituencies.

Formation of a Political Party or Coalition:

  • Before the general elections, political parties or alliances are formed, and each party or alliance fields candidates to contest the elections. These candidates compete for the 545 elected seats in the Lok Sabha.

Winning Majority or Coalition Support:

  • After the general elections, the political party or alliance that wins an absolute majority of seats in the Lok Sabha (i.e., more than half of the total seats) is typically invited by the President of India to form the government.

  • If no single party secures an absolute majority, a coalition government may be formed with the support of other parties or independent members to achieve a majority.

Selection of the Prime Minister:

  • The leader of the political party or alliance that has secured the majority of seats in the Lok Sabha is usually invited by the President to become the Prime Minister.

  • The Prime Minister is typically the leader of the majority party or coalition, and this leader is expected to command the confidence of the Lok Sabha members.

Oath of Office:

  • Once invited, the selected leader becomes the Prime Minister and is sworn in at an official ceremony. The oath of office and secrecy is administered by the President of India.

Functioning as Prime Minister:

  • As Prime Minister, the individual assumes the role of the head of government and is responsible for forming the Council of Ministers, which includes various ministries and cabinet positions.

  • The Prime Minister plays a central role in the formulation and implementation of government policies, decision-making, and representing India domestically and internationally.

It's important to note that the selection of the Prime Minister is based on the political party or coalition that commands a majority in the Lok Sabha. The President of India has a largely ceremonial role in this process and is constitutionally bound to invite the leader of the majority party or alliance to form the government. The Prime Minister's tenure is not fixed but depends on the support and confidence of the majority in the Lok Sabha.

In summary, the Prime Minister of India is selected based on the outcome of general elections, party politics, and parliamentary support, making the position highly dependent on the democratic process and the will of the electorate.

So, basically, the Prime Minister is selected by the party or coalition that wins an absolute majority (i.e., more than half of the total seats of Lok Sabha).

The appointment of the President in the USA and the appointment of the Prime Minister in India are basically similar. Both processes depend on an absolute majority. In the USA, it relies on 538 electors, whereas in India, it depends on 543 Lok Sabha members. While voting takes place in the USA, in India, it is done through discussions among winning party members.

Legislative bodies of USA:

In the United States, "Congress" refers to the legislative branch of the federal government, which is responsible for making and passing federal laws. Congress is a bicameral legislature, meaning it has two separate chambers:

  1. The House of Representatives: The House of Representatives, often referred to simply as "the House," is one of the two chambers of Congress. It is the lower house of Congress and is made up of members known as "Representatives" or "Congresspeople." The number of Representatives in the House is determined by the population of each state, with each state having at least one Representative. Representatives are elected by the residents of their respective congressional districts for two-year terms. The primary responsibilities of the House include initiating revenue-related bills and representing the interests of the people in their districts.

  2. The Senate: The Senate is the upper house of Congress. Each state, regardless of its population, is represented by two Senators. Senators are elected by the residents of their respective states for six-year terms, with staggered elections ensuring that approximately one-third of the Senate seats are up for election every two years. The Senate has several unique powers, including providing "advice and consent" for presidential appointments (such as federal judges and cabinet members) and ratifying international treaties.

Key Functions of Congress:

  • Lawmaking: Congress is responsible for drafting, debating, amending, and passing federal laws. Proposed legislation, known as bills, can originate in either the House or the Senate. For a bill to become law, it must pass both chambers in identical form and be signed by the President.

  • Representation: Members of Congress represent the interests and concerns of their constituents, whether they are residents of specific congressional districts (House members) or entire states (Senators).

  • Oversight: Congress has the authority to oversee and investigate the activities of the executive branch of government, ensuring that federal agencies and officials are acting in accordance with the law.

  • Impeachment: The House of Representatives has the power to impeach federal officials, including the President, while the Senate holds impeachment trials and can remove officials from office upon conviction.

  • Budget and Appropriations: Congress is responsible for approving the federal budget, including allocating funds for various government programs and agencies.

  • Ratifying Treaties and Confirming Appointments: The Senate plays a critical role in ratifying international treaties negotiated by the President and confirming presidential appointments to key positions in the federal government.

Overall, Congress serves as a vital component of the system of checks and balances in the U.S. government, ensuring that no single branch of government accumulates excessive power. It plays a central role in shaping the nation's laws and policies.

Similarly, in India we have Lok Sabha the lower house, and Rajya Sabha the upper house.

Now, let's delve into the executive bodies and how they differ between the two countries:

The executive branch of the United States is called the "Executive Branch of the U.S. Government" or simply the "U.S. Executive Branch." The head of the executive branch is the President of the United States. Members of the executive branch are selected through various methods, and the key positions within the branch are appointed by the President with the approval, in some cases, of the U.S. Senate. Here's an overview:

President of the United States:

  • Selection: The President is elected through a nationwide election known as the "Presidential Election."

  • Term: The President serves a four-year term and can be reelected for one additional term.

  • Eligibility: To run for President, a candidate must be a natural-born U.S. citizen, at least 35 years old, and have been a resident of the United States for at least 14 years.

Vice President:

  • Selection: The Vice President is also elected through the Presidential Election, but they run as the President's running mate.

  • Role: The Vice President's primary role is to succeed the President in case of the President's death, resignation, or inability to carry out their duties. The Vice President also serves as the President of the Senate and has ceremonial and advisory duties.

Cabinet Members:

  • Selection: Cabinet members are appointed by the President and are subject to Senate confirmation (approval).

  • Roles: The Cabinet includes heads of executive departments such as the Secretary of State, Secretary of Defense, Secretary of the Treasury, and others. Each Cabinet member is responsible for overseeing a specific area of government policy and administration.

Federal Agencies and Bureaucracy:

  • Selection: The heads of various federal agencies and departments are appointed by the President and confirmed by the Senate.

  • Role: These officials manage the day-to-day operations of the federal government and implement the policies set by the President.

Federal Judges and Justices:

  • Selection: Federal judges, including Supreme Court Justices, are nominated by the President and must be confirmed by the Senate.

  • Role: Federal judges preside over federal courts and interpret and apply federal laws, including the U.S. Constitution.

Independent Agencies and Commissions:

  • Selection: Some agencies and commissions are led by individuals who are appointed by the President and confirmed by the Senate.

  • Role: These entities have specific areas of focus, such as the Federal Reserve, the Federal Communications Commission (FCC), and the Securities and Exchange Commission (SEC).

Overall, the U.S. Executive Branch is responsible for implementing and enforcing federal laws, managing the government, conducting foreign affairs, and overseeing various aspects of national policy. The President, as the head of this branch, plays a central role in shaping the direction of the executive branch's activities and policies.

The Executive Branch

https://www.whitehouse.gov/about-the-white-house/our-government/the-executive-branch/

But how executive bodies in India works and how cabinet ministries of India is selected?

In India, ministries are selected through a process that involves the appointment of ministers by the President of India on the recommendation of the Prime Minister. Here's an overview of how ministries are selected in India:

General Election:

  • Ministries in India are formed after a general election to the Lok Sabha (the lower house of India's Parliament) or following the formation of a coalition government if no single party has an absolute majority.

Selection of the Prime Minister:

  • After the election results are known, the leader of the political party or coalition that secures a majority of seats in the Lok Sabha is invited by the President to become the Prime Minister.

  • The Prime Minister is usually the leader of the political party with the largest number of seats in the Lok Sabha.

Appointment of Cabinet Ministers:

  • The Prime Minister, once appointed, selects individuals to serve as ministers in the Council of Ministers, which includes various ministries.

  • The selection of ministers is made by the Prime Minister based on various factors, including party loyalty, competence, seniority, and regional representation.

  • The Prime Minister may consult with senior party leaders and take into account the political dynamics and alliances within the ruling coalition.

Allocation of Portfolios:

  • After selecting the ministers, the Prime Minister allocates specific portfolios or ministries to each minister. These portfolios determine the area of government policy and administration that each minister is responsible for.

  • The allocation of portfolios is typically based on the qualifications, expertise, and interests of the ministers, as well as the priorities of the government.

Swearing-In Ceremony:

  • The selected ministers are formally sworn in at a ceremony held at the Rashtrapati Bhavan (the official residence of the President of India) in the presence of the President and other dignitaries.

  • The oath of office and secrecy is administered to each minister, and they officially assume their roles.

Functioning of Ministries:

  • Once in office, each minister is responsible for overseeing and managing their respective ministry's activities, policies, and programs.

  • Ministries play a crucial role in formulating and implementing government policies, as well as delivering public services in their respective areas of responsibility.

It's important to note that the Council of Ministers includes various types of ministers, such as Cabinet Ministers (senior ministers), Ministers of State (with or without independent charge), and Deputy Ministers. The specific responsibilities and hierarchy within the Council of Ministers can vary.

Additionally, the composition of ministries may change over time due to reshuffles, resignations, or other political developments, with the Prime Minister having the authority to make changes as needed to effectively govern the country.

Here is the big difference in the selection of cabinet ministers in the USA compared to India. In India, cabinet ministers are selected by the Prime Minister, whereas in the USA, although they are selected by the President, it requires Senate approval (in the upper house) through a voting process. A majority vote of the Senate committee is required.

The confirmation of Cabinet members in the executive branch of the United States is done through a process involving the Senate. Here's how it works:

Nomination by the President:

  • The President of the United States nominates individuals to serve in various Cabinet positions, such as the Secretary of State, Secretary of Defense, Secretary of the Treasury, and others. These nominees are typically selected based on their qualifications and alignment with the President's policy goals.

Senate Committee Hearings:

  • After the President makes nominations, the Senate holds confirmation hearings for each nominee. These hearings are conducted by Senate committees responsible for the respective Cabinet positions. For example, the Senate Foreign Relations Committee conducts hearings for the Secretary of State nominee.

  • During these hearings, nominees are questioned by senators about their qualifications, views, and potential conflicts of interest. Senators may also seek assurances about how nominees plan to fulfill their duties.

Senate Committee Vote:

  • Following the confirmation hearings, the Senate committees vote on whether to recommend the nominee's confirmation to the full Senate. A majority vote in favor is required for the nominee to move forward in the process.

Full Senate Confirmation:

  • The nominee's confirmation is then considered by the full U.S. Senate. Senators debate the nomination on the Senate floor, and a final confirmation vote is held.

  • A simple majority vote in the Senate is required for the nominee to be confirmed. If a majority of senators vote in favor of confirmation, the nominee is officially confirmed to the Cabinet position.

Oath of Office:

  • Once confirmed by the Senate, the nominee takes the oath of office and officially assumes their role as a member of the President's Cabinet.

The confirmation process serves as a critical check and balance in the U.S. government. It allows the Senate, which represents the states and their interests, to exercise oversight over the President's executive branch appointments. It also ensures that Cabinet members are qualified and capable of fulfilling their roles effectively.

Confirmation hearings can be high-profile events, particularly when nominees face questions and scrutiny from senators and the public. While the process is designed to be thorough, it is ultimately a political one, with the President's party typically having a significant influence over the outcome of confirmations.

In the United States, the executive branch is typically considered more independent than in India, primarily because it requires a broader consensus from the upper house. In contrast, in India, the Prime Minister has the authority to appoint ministers at their discretion, which can lead to a potential conflict of interest. For example, ministers may serve as mere marketing agents for the Prime Minister, aiming to enhance the Prime Minister's image. It's worth noting that, even though laws are meant to be the same for everyone, there can be discrimination in their execution by ministers based on their interests. One example of this can be selective enforcement of corruption laws, with a bias towards opposition parties, while members of their own party may go unpunished for similar violations.

To Do!

The USA has a two-party system. Is it because the USA has a presidential form of government?

How bill is passed in two countries?

No confidence motion versus impeachment.

Two-third majority vs Simple Majority

Power and independence of states and state assembly

How independent is judiciary in both the countries, and how judges are appointed?

How to share information under fascism or dictatorship?

Story of Usha Mehta

Explain how Usha Mehta used a transmitter to reach the voices of Congress and Gandhi

Describe what to do when mainstream media is captured by a fascist government, and big tech social media either censors content or reduces views that go against the government

How to use P2P technology (such as torrent, Signal, Tor network, VPN and many others) to access information?

Usha Mehta's use of a transmitter during the Indian independence movement is an inspiring example of how individuals can resist oppressive regimes and censorship by creating alternative channels of communication. Her actions provide insights into strategies that can be employed when mainstream media is controlled by a fascist government. In the modern context, P2P (peer-to-peer) technologies, such as torrent networks, Signal, and the Tor network, can be used to disseminate information and counter censorship.

Creating Underground Networks

Usha Mehta and her colleagues set up an underground radio station to transmit messages from the All India Congress Committee. In a similar vein, individuals today can create decentralized networks using P2P technologies. This can involve establishing alternative communication channels that are resistant to censorship and control.

Using P2P Technologies

  • Torrent Networks: Torrents use a decentralized P2P protocol, making it difficult for authorities to control or shut down. Individuals can share information through torrent files, ensuring that the data is distributed across multiple users.
  • IPFS Networks: Peer-to-peer content delivery network is built around the innovation of content addressing: store, retrieve, and locate data based on the fingerprint of its actual content rather than its name or location.

Some of the IPFS storage system that are very easy to use includes:

https://app.apillon.io

https://www.4everland.org

  • Signal and other open source end to end encrypted apps: Signal is an encrypted messaging app that prioritizes user privacy. Activists and individuals seeking to share information securely can use Signal for text, voice, and video communication without fear of surveillance.

You can find other apps in F-Droid. F-Droid is an installable catalogue of FOSS (Free and Open Source Software) applications for the Android platform. The client makes it easy to browse, install, and keep track of updates on your device.

Some of the other apps are Status, Briar.

Briar is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy, and robust way to communicate. Unlike traditional messaging tools such as email, Twitter, or Telegram, Briar doesn't rely on a central server - messages are synchronized directly between the users's devices.

If the Internet's down, briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If the Internet's up, Briar can sync via the Tor network, protecting users and their relationships from surveillance.

  • Tor Network: The Tor network allows users to browse the internet anonymously by routing their traffic through a series of volunteer-operated servers. This can help individuals access and share information while bypassing government-imposed restrictions.

  • VPN: Opera Browser has a built-in free VPN, and there are other free VPNs available to install system-wide in F-Droid.

Maintaining Anonymity

  • Operational Security (OpSec): To avoid detection, Usha Mehta used to claim her radio station was broadcasting from "somewhere in India." Similarly, those using P2P technologies should prioritize operational security to keep their identities and locations concealed.

Resilience Against Jamming

  • Decentralized Platforms: P2P technologies inherently distribute information across multiple nodes, making it challenging for authorities to block or jam the communication. This resilience against interference is crucial in maintaining the flow of information.

Facing Arrest and Interrogation

  • Silent Resistance: Usha Mehta's silence during six months of interrogation demonstrated a commitment to resisting oppressive forces. Similarly, individuals involved in P2P communication should be prepared for potential consequences and consider adopting silent resistance tactics to protect themselves and their networks.

Historical Inspiration

  • Learning from Past Movements: Studying historical instances of resistance, such as Usha Mehta's efforts, can provide valuable lessons for modern activists. Understanding the strategies and challenges faced during historical movements can inform current tactics in the fight against censorship.

In summary, Usha Mehta's use of a transmitter during the Indian independence movement highlights the importance of decentralized communication in the face of censorship. Applying similar principles with modern P2P technologies can empower individuals to share information, resist oppression, and maintain the flow of crucial messages even in the most challenging circumstances.

Usha Mehta and Congress Radio 42.34: Defying Oppression through Underground Transmission

Enters 22-year-old activist Usha Mehta. Along with some of her colleagues she found a transmitter and started an underground radio station. Congress Radio 42.34 thus began. It was on 14th August when this underground radio station began transmitting.

And the words you just heard were spoken by none other than Usha Mehta. Through this radio, the messages of the All India Congress Committee were broadcast to every corner of the country. Such underground media channels started opposing the propaganda of the British Raj.

To keep their location hidden,in her messages Usha Mehta used to say, "This is Congress Radio from somewhere in India.

But actually, she was operating from Bombay. It took the British government about 3 months to find the source of this radio.But by then, a lot of people were already aware. Gradually, All India Radio was called Anti-India Radio when they tried to jam the Congress radio.

Finally, on 12th November 1942, the British government arrested Usha Mehta.All her equipment was seized and despite interrogating her for 6 months, she does not reveal anything to the British.

Later, in 1969, when she was interviewed, she said,

"When the press is gagged and all news banned, a transmitter certainly helps a good deal in furnishing the public with...spreading the message of rebellion in the remotest corners of the country"

Why British Left India? | Reality of Mahatma Gandhi's Role | Quit India Movement | Dhruv Rathee

How to bring down a dictator

What a fascist government does?

Democracy by Margaret Atwood | Democracy 2024

Fascism is a far-right political ideology and system of government that emerged in the early 20th century, most notably in Italy under Benito Mussolini and in Germany under Adolf Hitler. It is characterized by authoritarianism, nationalism, and a belief in the superiority of one's own race or nation. While it's essential to understand that fascism is a deeply controversial and harmful ideology that has caused immense suffering and death, it's also important to recognize the tactics and strategies used by fascist leaders to gain and maintain power. Some of the key tricks and techniques of fascism include:

Nationalism

Fascist leaders often exploit and promote extreme nationalism, emphasizing the importance of their nation or ethnicity and portraying it as superior to others. This can create a sense of unity and pride among their supporters while stoking hatred and mistrust toward perceived enemies or outsiders.

For example, anyone who criticizes the government will be labeled as anti-national. For instance, a teacher was suspended for requesting an educated candidates in election.

Anyone who does not support discrimination based on religion is considered anti-Hindu by fascist govt

Ladakh autonomy protest

Sonam Wangchuk, an Indian engineer, innovator, education reformist, and climate change activist, is protesting against China occupying Indian land in the last decade. He discusses being called an "antinational" for his stance as he works to protect the fragile ecosystem of Ladakh

Propaganda

Fascist regimes make extensive use of propaganda to shape public opinion. This can include controlling the media, spreading false information, and using emotionally charged rhetoric to manipulate the masses. The goal is to create a climate where dissent and criticism are suppressed, and the regime's agenda is unquestioningly accepted.

e.g. Propaganda, such as Love Jihad and promoting it through movie and Godi Media, why Hindu festivals are only targeted.

There is a call to ban loudspeakers in mosques, despite the fact that Hindu temples contribute more than 70-80% of the noise. It's not about defending sound pollution; sound pollution is sound pollution. Religion is about giving us peace, not noise and using it as a political tool. Such discrimination needs to be deemed unacceptable.

How the Indian Government Uses Raids to Silence Critics

Twitter accused of censorship in India as it blocks Modi critics

Hate crime tracker Hindutva Watch blocked in India ahead of national vote

On Wired.com This Website Tracked Hate Crimes in India. Then the Government Took It Offline

India ranks 1st in disinformation and misinformation

As they rely on propaganda, they also attack the researchers.

Researcher Arrested in India After Disclosing Problems With Voting Machines

Ashoka University is accused of stifling academic freedom after it distances itself from a professor’s research paper, ‘forcing’ his resignation.

Researcher's twitter account @ashoswai has been withheld in India in response to a legal demand

Professor Ashok Swain has 500,000 followers on Twitter

India's media being captured

Cult of Personality

Fascist leaders cultivate a cult of personality, often portraying themselves as charismatic and infallible figures. They use mass rallies, public spectacles, and staged events to create an aura of strength and invincibility around themselves.

Dehradun: Students reportedly fined for not listening to PM Modi's 'Mann Ki Baat'

Suppression of Opposition

Fascist regimes frequently employ violence, intimidation, and censorship to silence political opposition. They may imprison or execute political opponents, ban opposition parties, and suppress labor unions and civil society organizations.

e.g Arresting and harassing strong opponents who are difficult to tackle, for example, either by arresting them or removing them from the assembly.

When you protest against unemployment, and dictatorship (tanashahi nahi chalegi), you are given electric shocks:

Given Electric Shocks, Tortured To Implicate Political Leaders: Parliament Security Breach Accused Tell Delhi Court

Govt attack on climate activists

Disha Ravi’s Sedition Case Is Only Latest Without Evidence, Reason

Militarization

Fascist governments tend to heavily emphasize militarism and the expansion of their armed forces. This not only serves to strengthen their control over the population but also can be used to justify aggressive foreign policies and territorial expansion.

Fascist governments often use militarization to stop peaceful protests and maintain control over their populations. This is because fascist ideology prioritizes the state and its authority over individual rights and freedoms. By militarizing the response to protests, these governments can quickly and forcefully suppress dissent and opposition.

Here are some ways in which a fascist government might use militarization to stop peaceful protests:

  • Deployment of armed forces: The government may send armed forces, such as the military, police, or paramilitary groups, to the protest site. The presence of armed personnel can intimidate protesters, discouraging them from participating in the demonstration.

  • Use of force: Fascist governments may use excessive force to disperse peaceful protests, including the use of tear gas, water cannons, rubber bullets, and even live ammunition. This can result in injuries and even fatalities among protesters, sending a clear message that dissent will not be tolerated.

  • Arrests and detentions: The government may arrest and detain protesters, even if they are participating in a peaceful demonstration. This can serve as a warning to others who might be considering joining the protest, as well as a means of silencing opposition voices.

  • Surveillance and monitoring: Fascist governments often engage in surveillance of protesters, using technology and intelligence gathering methods to monitor their activities. This can include the use of facial recognition software, phone tapping, and undercover agents.

  • Propaganda and misinformation: To justify their actions against protesters, fascist governments may use propaganda and misinformation to paint the protesters as violent or dangerous. This can help to garner public support for the government's actions and further discredit the opposition.

In summary, fascist governments use militarization to suppress peaceful protests as a means of maintaining control and reinforcing their authority. By deploying armed forces, using excessive force, making arrests, engaging in surveillance, and spreading propaganda, these governments can effectively silence dissent and discourage opposition.

Barricades to stop people and farmers from going to protest in Delhi.

The Delhi Police are blocking any entry of AAP volunteers to stop a democratic protest over chandigarh mayor election issue.

"He Should Be Prosecuted": Supreme Court Shown Video Of Chandigarh Poll Officer

Farmers Protest

Security forces fired tear gas shells to disperse protesting farmers at the Punjab-Haryana Shambhu Border.

This is how our farmers, who supply us with food and fight for our nation and justice, are treated. They are attacked with tear gas, resulting in stampedes that are intended to kill them.

Scapegoating and Discrimination

Fascist leaders often scapegoat minority groups, blaming them for economic or societal problems. This can lead to the persecution and discrimination of minority populations, sometimes culminating in mass violence and genocide.

India: Government Policies, Actions Target Minorities

4,786 houses were burnt and 386 religious structures including temples and churches were vandalized. The violence left more than 70,000 people displaced from their homes

Fascist regimes may manipulate legal systems to legitimize their actions. They pass laws that allow them to consolidate power, suppress opposition, and persecute targeted groups, all while maintaining a façade of legality.

Modi surname case: Gujarat HC refuses interim protection to Rahul Gandhi

India court upholds Karnataka state’s ban on hijab in class

The Atlantic Article: “Today the court seems to be aiding, not arresting, India’s descent into authoritarianism
Link on web.archive.org

Unable to subdue the judiciary by legal means, the Modi government resorted to other measures. It began by delaying the appointment of judges: The convention had been for the government to accept the collegium’s recommendations as binding, but the Modi regime began to exercise an active veto. Once judges are appointed, the government uses the means at its disposal to cajole their loyalty. When supreme court justices retire, the government can offer those it prefers plum postings.

In November 2019, the supreme court issued a bizarre but unanimous decision that termed the destruction of the mosque by a Hindu-nationalist mob numbering in the tens of thousands “an egregious violation of the rule of law”—then proceeded to award the entirety of the ruined structure’s site to the Hindus. Much as the Kashmir verdict later would, the ruling rested on contradictory reasoning and ultimately aligned with the Hindu-nationalist agenda.

But these days, Chandrachud’s political independence has come under scrutiny. In December, he was revealed to have abruptly shifted eight politically sensitive cases to a bench that included a judge who had served under Modi while he was chief minister of the western state of Gujarat. And in early January, the chief justice made an unorthodox display of faith by paying a public visit to a temple in Dwarka, one of Hinduism’s holiest sites, situated in Gujarat.

How have the Supreme Court and high courts become weak and promoted authoritarianism?

Mass protest by Supreme Court lawyers for EVM across the country

SC shifts seven cases to bench of former law secretary to Narendra Modi

From the Bench to the BJP: Justice Abhijit Ganguly’s Controversial Transition

The appointments of Justice Dinesh Maheshwari and Justice Sanjiv Khanna to the Supreme Court have triggered a controversy over the Supreme Court collegium’s apparent indifference to the principle of seniority of high court judges in the all-India list and to inter-se seniority within the high courts which they were serving before their elevation.

Weaken or Abolish as many Democratic Institutions

Fascism thrives on a mission to weaken or abolish democratic institutions, systematically dismantling the foundations of a participatory society. Through authoritarian rule, it seeks to concentrate power in the hands of a single leader, suppressing dissent and curtailing individual freedoms. The erosion of democratic checks and balances becomes a hallmark, paving the way for unchecked authority. In this pursuit, fascist regimes undermine the pillars of democracy, such as independent judiciary, free press, and representative governance, leaving citizens vulnerable to manipulation and repression. The fight against fascism necessitates safeguarding these institutions to preserve the essence of democratic values.

Big money is choking India’s free press — and its democracy

Indian government accused of rewriting history after edits to schoolbooks

Since 2014, 4-fold jump in ED cases against politicians; 95% are from Opposition

Bill introduced to remove CJI from panel to select Election Commissioners

A Partisan Referee: The Speaker: This control is enabled by the fact that – much like Opposition rights – the Constitution also fails to guarantee the independence of the parliamentary “referee”

Economic Policies

Fascist governments may implement corporatist economic policies that involve a close relationship between the state and big business. This serves to consolidate economic power and often benefits the ruling elite, while the general population may suffer from economic hardship.

Demonetisation drive that cost India 1.5m jobs fails to uncover 'black money'

India's Adani faced margin call on $1.1 bln loan before repaying in full

‘Billionaire Raj’ Is Pushing India Toward Autocracy

The super-rich have opened their wallets to Modi, and income inequality has soared over the past decade. With an election coming, ordinary voters need to ask, ‘What’s in it for us?’

Faced with 90% drop in business, crypto exchanges are moving out of India, but with hopes of return

Fascist govt don't like crypto, so that they can block bank account

Government of PM Modi blocks the bank accounts of 8,975 NGOs, in a move critics say is aimed at stifling dissent.

Civil society plays a crucial role in democracy by serving as a check on government power, while authoritarian governments are trying to eliminate it.

Civil society refers to the aggregate of non-governmental organizations, community groups, and individuals outside the realm of government and business who come together to pursue shared interests, goals, and values. It encompasses a diverse range of entities including advocacy groups, charities, religious organizations, labor unions, and grassroots movements. Civil society plays a crucial role in democracy by serving as a check on government power, promoting transparency, accountability, and the protection of human rights. It provides a platform for citizens to engage in civic participation, express their opinions, and hold authorities accountable. Moreover, civil society fosters social cohesion, facilitates dialogue, and channels citizen concerns into policy-making processes, thereby enriching democratic governance.

NGOs and other civil society organizations are particularly vital in safeguarding democracy and resisting dictatorship. They often serve as watchdogs, monitoring government actions and advocating for democratic principles and human rights. In autocratic regimes, NGOs can act as bulwarks against authoritarianism by mobilizing citizens, raising awareness about abuses of power, and advocating for political reform. Their independence from state control allows them to challenge oppressive policies, provide assistance to marginalized groups, and promote democratic values even in environments hostile to dissent. Through their grassroots efforts and international networks, civil society organizations contribute to building resilient democratic institutions and fostering a culture of civic engagement, ultimately strengthening the resilience of societies against authoritarian threats.

The economist: Yamini Aiyar laments the damage done to Indian democracy under Narendra Modi

The most striking evidence of this is the fact that the space for the political opposition, media, academia and civil society to freely express their views is fast shrinking. Genuine democracy requires the active, public contesting of ideas and policy. In its place, the government is systematically weaponising investigative agencies, tax laws, sedition laws, anti-terror laws and laws regulating foreign funding of NGOs to disproportionately target opposition politicians and criminalise dissent. The most brazen illustration of this is the arrest of Arvind Kejriwal, Delhi’s chief minister and a popular opposition figure, on March 21st, just as the election campaign was hotting up.

In the 2023 Global Hunger Index, India ranks 111th out of the 125 countries with sufficient data to calculate 2023 GHI scores

16,518 crore rupees came to political parties in India through electoral bonds in the last 6 years. Of this, the BJP got a lion’s share. Modi govt also allowed foreign funding anonymously

30 firms facing ED, IT probe donated Rs 335 cr to BJP

Analysis of electoral bond

Date: 16-03-2024 01:15:05 PM IST

The data

Some data cleaning is still required, as some companies' donations are split due to slightly different names given in the PDF. For example, "FUTURE GAMING AND HOTEL SERVICES PR" and "FUTURE GAMING AND HOTEL SERVICES PRIVATE LIMITED." The balance need to be added together into a single company.

Total encashment all parties = 63871399000 (52.545209691352234 % of donations)

Total company donations = 121555132000

Amount of encashment by party missing = 57683733000

Company Donations with percentage

12/Apr/2019 - 11/Jan/2024 as given in pdf

Company Donations with percentage

Party encashment with percentage

12/Apr/2019 - 24/Jan/2024 as given in pdf

Party Encashment with percentage

Only about twenty people donated within the amount of 50,000. It's not wrong to say that our government is largely about corporate funding, which implies that our country is essentially ruled by the wealthy, making it a plutocracy.

Many of the companies had IT and ED raids before the donations, so it is not incorrect to say that money was extracted through extortion. Extortion is the practice of obtaining benefit (e.g., money or goods) through coercion. In most jurisdictions it is likely to constitute a criminal offence.

IT and ED raid

More data on IT and ED raid:

BJP Washing Machine

Since 2014, 25 Opposition leaders facing corruption probe crossed over to BJP, 23 of them got reprieve (suspension of the execution of a criminal's sentence)

List of Opposition leaders who crossed over to BJP

Militant Youth Movements

Fascist regimes often create youth organizations that promote loyalty to the state, indoctrinate young minds, and prepare them for future service to the regime.

Hinduism, Weaponised: A Secular India Under Threat | In Bad Faith - Part 1 | CNA Documentary

How RSS textbooks are reshaping Indian history and science under Modi. The chain of schools run by the BJP’s far-right ideological mentor also served as a laboratory for government changes to syllabuses.

Centre hands over 62% of new Sainik Schools to Sangh Parivar, BJP politicians and allies

Expansionism and Imperialism

Some fascist regimes seek territorial expansion and may pursue aggressive foreign policies to achieve their goals. This can lead to conflicts and wars with other nations.

It's essential to recognize the dangers of fascism and to be vigilant against its tactics, as it has resulted in some of the most destructive and devastating episodes in human history. Promoting democracy, human rights, and open, informed public discourse is a crucial defense against the rise of fascist ideologies and their destructive practices.

Saam, Dan, Danda, and Bhed

Fascist governments often employ various tactics to maintain control and manipulate the population. Saam, Dan, Danda, and Bhed are four tools of persuasion used by these regimes. Saam refers to persuasion through conciliation, which involves using diplomacy and compromise to achieve desired outcomes. Dan represents persuasion through money, where the government provides financial incentives or rewards to encourage specific behaviors or compliance. Danda signifies persuasion through force, where the government uses coercion, threats, or violence to enforce its will. Lastly, Bhed, or persuasion through exploitation, involves manipulating the population by dividing them based on factors like race, religion, or class, and playing on their fears, insecurities, or prejudices to maintain power.

Desperate to join BJP to keep ED, I-T raids away

Is India becoming a DICTATORSHIP? | Chandigarh Elections | Farmers Protest | Dhruv Rathee

The Project: Cookbook of Modi govt explained

Camden Conference about the Indian government's crackdown on journalists

Emily Schmall, a former South Asia correspondent for The New York Times, spoke at the 2024 Camden Conference about the Indian government's crackdown on journalists and advocates of free speech.

Understanding Hindutva and Its Implications: A Comparative Analysis With Hinduism

Introduction

In recent years, discussions surrounding Hindutva and its impact on Indian society have become increasingly relevant. Often confused with Hinduism, Hindutva is actually a political ideology that promotes a monolithic vision of Hindu culture and seeks to establish a Hindu nation. This article delves into the intricate web of connections and distinctions between Hinduism and Hindutva, examining the historical context in which Hindutva emerged, its key tenets, and how fascist regimes exploit religious divisions for nefarious purposes. Furthermore, the piece explores the importance of combatting misinformation and promoting dialogue and inclusivity to counteract hateful narratives and foster harmony in pluralistic societies.

Understanding Hinduism

At its core, Hinduism is a complex and rich tapestry of beliefs, practices, and philosophies native to India. Encompassing a vast array of regional customs, deities, rituals, and scriptures, Hinduism defies easy definition due to its incredible diversity and adaptability. Nevertheless, some shared themes emerge from this multiplicity, including the pursuit of spiritual knowledge, the quest for moksha (liberation), and the celebration of dharma (righteous duty). Dharmic traditions underpinning Hindu thought include tolerance, coexistence, and reverence for multiple paths leading to ultimate realization.

Rather than focusing on a single god named Rama, Hinduism revolves around thousands of gods and goddesses, each holding unique significance and relevance in devotees' lives.

Emergence of Hindutva

Veer Savarkar, a revolutionary freedom fighter, introduced the term 'Hindutva' in his 1923 pamphlet titled "Hindutva: Who Is a Hindu?" Hindutva was initially conceived as a response to colonial rule and Muslim separatism; however, it soon morphed into a potent force seeking to construct a singular Hindu identity rooted in exclusivity. Savarkar posited that 'true Indians' were essentially Hindus whose ancestors lived in the subcontinent since time immemorial, sharing blood, language, and culture – effectively marginalizing Muslims, Christians, and Sikhs. Thus, Hindutva became synonymous with ethnic nationalism, drawing stark contrasts with Hinduism's accommodative ethos.

Key Tenets of Hindutva

While Hinduism celebrates a multitude of gods and goddesses alongside diverse customs and cultures, Hindutva envisions an idealized version of Hindu civilization centered around caste hierarchy, sanskritization, and cow protection. Here are four cornerstones defining Hindutva:

  1. Cultural Nationalism - Hindutva strives to consolidate Hindu cultural heritage by privileging select symbols, festivals, and texts above others. Yoga, Ayurveda, classical music, and dance form integral components of this narrative. However, such an approach risks sidelining heterodox voices and alternative interpretations within Hinduism.
  2. Caste Hierarchy - Hindutva endorses Chaturvarnya, an ancient Varna system comprising Brahmins (priests), Kshatriyas (warriors), Vaishyas (businessmen), and Shudras (servants). Despite veiled criticisms, Hindutva organizations implicitly validate the social stratification embedded in this hierarchical framework.
  3. Sanskritization and Hindification - Hindutva places immense significance on Sanskrit literature and languages, believing that embracing Indo-Aryan linguistic traditions enhances unity amongst disparate Hindu communities. Critics argue that prioritizing Sanskrit overlooks indigenous tribal dialects, Dravidian tongues, and regional vernaculars prevalent across the country.
  4. Cow Protection - An archetypal symbol representing Hindu sensibilities, cows hold tremendous emotional resonance within Hindutva discourse. Campaigns demanding beef bans and cattle preservation feed into the broader objective of safeguarding perceived Hindu interests.

Manipulation by Fascist Regimes

Regrettably, totalitarian leaders worldwide capitalize on religious fault lines to foment strife, garner mass appeal, and perpetuate their authoritarian reign. History bears witness to egregious violations committed by fascist entities employing similar tactics, notably Nazi Germany's anti-Semitic policies and Myanmar's Rohingya crisis. Likewise, contemporary India faces comparable threats stemming from hyper-nationalist rhetoric espousing Hindutva supremacy. Disturbingly, vigilante groups affiliated with ruling parties enjoy impunity whilst engaging in targeted attacks against vulnerable minorities.

History has shown us numerous instances where fascist governments manipulate religious identities to instigate communal tensions and promote hatred. They spread false information, propagate divisive narratives, and encourage extremist elements within religious groups to carry out violent activities against minorities. These actions destabilize societies, divert public attention from real issues, and solidify the regime's grip on power.

Countermeasures Against Hateful Narratives

To challenge Hindutva hegemony, fostering open dialogues concerning authentic Hindu philosophy and encouraging ecumenicism assumes paramount importance. Emphasizing shared values and cross-pollinating ideas engender empathy and camaraderie across various religious denominations. Moreover, empowering grassroots movements championing equity, justice, and inclusion bolsters resistance against polarizing dogmas peddled by chauvinistic factions. Finally, leveraging digital platforms to disseminate credible information debunking disinformation campaigns proves pivotal in thwarting sinister attempts aimed at sowing discord and animosity.

Conclusion

Although superficially linked, Hinduism and Hindutva represent diametrically opposed paradigms. Whilst Hinduism embodies a pluralistic tradition steeped in tolerance and comprehensiveness, Hindutva encapsulates an exclusive brand of hyper-nationalism intent on establishing a uniform Hindu statehood. Alarmingly, fascist powers weaponize religious cleavages to sow chaos, breed antagonism, and strengthen control. Therefore, nurturing dialogue, inclusivity, and critical thinking constitute effective bulwarks against malicious machinations designed to erode societal cohesion and fragment civilizations. Ultimately, comprehending nuanced differences between religious doctrine and politically motivated ideologies equips citizens to navigate contentious terrain riddled with pitfalls and landmines threatening democracy, liberty, and equality.

Hindu Rastra is not Democracy

Hindu Rashtra is founded on the core tenets of Hindutva, which encompass cultural nationalism, caste hierarchy, Sanskritization, and cow protection. Regrettably, it falls short in safeguarding minority rights and secular values - principles that acknowledge no single religion as superior. History reveals that no country headed by orthodox leaders, who strictly follow traditional and established faith without questioning or engaging in critical thinking, has ever prospered. Instead, they have consistently plunged into authoritarian rule.

Specifically, consider the following drawbacks linked with Hindu Rashtra:

Neglect of Minority Rights: A central pillar of democracy involves defending the rights and privileges granted to minorities. Unfortunately, Hindu Rashtra places greater weightage on Hindu traditions and practices, leaving little space for meaningful integration of minority perspectives.

Absence of Secular Values: Robust democracies separate religion from state matters to ensure neutrality, fairness, and uniform access to resources and services. Nevertheless, Hindu Rashtra displays a tendency to mingle religious influences with civic duties, impairing the secular character that underpins modern democratic states.

Perpetuation of Social Hierarchy: Hindu Rashtra entertains vestiges of social stratification embedded within the caste system, negatively affecting disadvantaged groups. True democracies aim to reduce such gaps, whereas Hindu Rashtra seems complicit in perpetuating disparities, working contrary to democratic ideals.

Exploring the Intersection of Spirituality, Religion, and Mental Health: Navigating Benefits, Challenges, and Responsibility

Spirituality holds immense significance in addressing mental health concerns, particularly anxiety disorders. Although this section is optional, reflecting on its contents can benefit those inclined towards spiritual exploration. We will discuss the importance of spirituality, the role of religion, and potential pitfalls when religion is utilized for discriminatory purposes.

Importance of Spirituality

Cultivating spirituality enables individuals to recognize and accept a higher power transcending their intellect and volition. Establishing a connection with this higher power contributes to a profound sense of security, safety, peace of mind, self-confidence, unconditional love, and guidance, offering transformative effects surpassing conventional therapeutic approaches targeting body, emotions, thoughts, or behaviors. Integrating spirituality into treatment plans empowers practitioners to engage clients wholly, facilitating holistic healing experiences.

Role of Religion

Religion often serves as a foundation for spiritual development, proposing varied doctrines and belief structures regarding humankind's relationship with the divine. Adopting a broad interpretation of spirituality allows individuals to embrace their unique perspectives on a higher power, irrespective of religious backgrounds. Nature enthusiasts, skeptics, or followers of established religions alike can harness the benefits of spirituality. Engaging with religious institutions provides opportunities for community involvement and structured spiritual practice, reinforcing spiritual commitments.

Potential Pitfalls of Discrimination

Despite the positive attributes of spirituality and organized religions, utilizing religion for discriminatory purposes undermines its value. Institutionalized religions sometimes enforce rigid doctrinal standards, neglecting the underlying universal truths central to spirituality. Preaching superiority based on religious affiliation fuels prejudice, inciting conflict and victimization. Such conduct compromises the integrity of religious organizations and jeopardizes the psychological well-being of affected members.

Addressing Harmful Practices

Healthcare professionals should remain cognizant of potentially harmful religious practices and maintain an open dialogue with clients regarding their spiritual journey. Encourage clients to critically evaluate religious teachings, distinguishing between prescriptive rules and foundational spiritual principles. Advocate for religious environments grounded in inclusivity, mutual respect, and understanding. Educate religious leaders about the detrimental consequences of discriminatory practices, urging them to adopt affirming attitudes towards diverse populations. Collaborate with clergy to integrate evidence-based psychotherapeutic techniques supporting spiritual growth.

Promoting Healthy Spirituality

Nurture healthy spiritual development by fostering curiosity, creativity, and self-reflection. Validate each client's subjective spiritual experiences, acknowledging the complexity and uniqueness of human existence. Utilize meditation, imagery exercises, journaling, gratitude practices, and prayer as complementary tools in therapy sessions. Connect clients with local resources and networks, enabling meaningful engagement in spiritual endeavors outside the clinical setting. Provide ongoing encouragement throughout the therapeutic process, highlighting incremental progress in spiritual maturation.

Conclusion

Integrating spirituality into mental healthcare settings yields substantial advantages for treating anxiety disorders, although careful consideration must be taken to avoid potential harm resulting from discriminatory practices. Remaining informed about the evolving dynamics of spirituality and organized religions ensures responsible implementation of spiritual principles in therapeutic contexts. Addressing the intersectionality of spirituality, religion, and mental health propels the field forward, benefitting practitioners, researchers, and clients alike.

- [Personal Meaning: Anxiety and Phobia Workbook - Edmund J. Bourne]

Introduction

Human curiosity has led to diverse avenues of exploration throughout history, giving rise to distinct fields seeking order, meaning, and explanation. Three prominent endeavors include science, art, and religion, each providing unique perspectives and insights while occasionally overlapping. While these disciplines share common goals, their methods, scope, and focus differ significantly. Understanding the distinctions and connections between science, art, and religion allows us to appreciate their value fully. Moreover, recognizing the difference between genuine scientific pursuit and pseudoscience ensures informed decision-making regarding the knowledge we accept and employ.

Science and the Arts

Science primarily focuses on observing, describing, and explaining natural phenomena, using empirical evidence and rigorous testing to establish principles and laws governing the physical world. On the other hand, the arts revolve around individual interpretation, creativity, and emotional resonance. Literature, visual arts, music, and performance offer opportunities for self-expression, empathy, and catharsis, expanding our understanding of human experiences beyond our immediate encounters.

While science and the arts seem vastly disparate, they converge in illuminating aspects of reality, encouraging holistic learning. Knowledge of both enhances our comprehension of the complex interactions between humanity and nature. Furthermore, integrating scientific literacy with artistic appreciation fosters critical thinking and informed choices, leading to a balanced education and lifestyle.

Science and Religion

Science and religion diverge due to differences in subject matter and methodology. Whereas science scrutinizes natural processes, religion concerns itself with moral values, spiritual guidance, and existential questions. Despite apparent contrasts, the relationship between science and religion remains multifaceted and dynamic. Many notable figures, including Galileo, Newton, and Einstein, held strong religious views alongside their scientific accomplishments, demonstrating harmony between the two spheres.

Whereas science scrutinizes natural processes, religion concerns itself with moral values, spiritual guidance, and existential questions.

Recognizing the distinction between their respective domains prevents unnecessary conflicts arising from false equivalencies or expectations. Embracing the complementarity of science and religion leads to richer intellectual landscapes and wiser life choices, allowing us to navigate ambiguity and complexity gracefully.

Pseudoscience

In stark opposition to legitimate science stands pseudoscience, characterized by tenuous links to evidence, disregard for falsifiability, and susceptibility to confirmation bias. Common examples include astrology, divination, and alternative medicine peddling untested remedies based on discredited theories. Distinguishing between authentic scientific pursuits and pseudoscience requires vigilance, skepticism, and familiarity with basic scientific concepts.

In stark opposition to legitimate science stands pseudoscience, characterized by tenuous links to evidence, disregard for falsifiability, and susceptibility to confirmation bias.

Red flags signaling potential pseudoscience comprise claims lacking robust experimental support, absence of peer review, insistence on proprietary techniques, and promotion through sensationalism rather than substantiated findings. By cultivating healthy skepticism and adhering to established criteria for evaluating scientific claims, consumers can protect themselves from falling prey to deceptive marketing strategies or hollow promises.

Science Vs Pseudoscience

Conclusion

Exploring the intricate tapestry formed by science, art, and religion necessitates humility, patience, and keen observation. As responsible inhabitants of a rapidly changing world, embracing scientific literacy equips us with tools required to distinguish fact from fiction and exercise agency amidst competing narratives. Appreciating the nuanced boundaries separating science, art, and religion contributes to thoughtful engagement and informed dialogues across various sectors of society. Ultimately, celebrating diversity, cherishing wisdom, and preserving rationality remain essential objectives worth striving toward as we continue navigating the exhilarating journey of discovery.

- [Conceptual Physics, Paul G. Hewitt]

Bring Down Dictatorship

Achieving a society with both freedom and peace is of course no simple task. It will require great strategic skill, organization, and planning. Above all, it will require power. Democrats cannot hope to bring down a dictatorship and establish political freedom without the ability to apply their own power effectively.

But how is this possible? What kind of power can the democratic opposition mobilize that will be sufficient to destroy the dictatorship and its vast military and police networks? The answers lie in an often ignored understanding of political power. Learning this insight is not really so difficult a task. Some basic truths are quite simple.

Local candidates need to take away support from BJP

Local candidates and MLAs need to take away support from BJP. BJP is playing a dangerous game of fascism by trying to take over every possible institute they can. People need to stop supporting local candidates that are from BJP. Local candidates can join any party, including independent, but not BJP. Remember, in a one-party dictatorship, there is hardly any power left with local candidates, so why vote them? Democracy is about making decisions by consensus, by listening to everyone, not decisions made by a single supreme leader. Remember how a dictator gets its power. All support systems of dictator need to be broken. Bring Down Dictatorship.

Necessary sources of political power

The principle is simple. Dictators require the assistance of the people they rule, without which they cannot secure and maintain the sources of political power. These sources of political power include:

  • Authority, the belief among the people that the regime is legitimate, and that they have a moral duty to obey it;
  • Human resources, the number and importance of the persons and groups which are obeying, cooperating, or providing assistance to the rulers;
  • Skills and knowledge, needed by the regime to perform specific actions and supplied by the cooperating persons and groups;
  • Intangible factors, psychological and ideological factors that may induce people to obey and assist the rulers;
  • Material resources, the degree to which the rulers control or have access to property, natural resources, financial resources, the economic system, and means of communication and transportation; and
  • Sanctions, punishments, threatened or applied, against the disobedient and noncooperative to ensure the submission and cooperation that are needed for the regime to exist and carry out its policies.

All of these sources, however, depend on acceptance of the regime, on the submission and obedience of the population, and on the cooperation of innumerable people and the many institutions of the society. These are not guaranteed.

Full cooperation, obedience, and support will increase the availability of the needed sources of power and, consequently, expand the power capacity of any government.

On the other hand, withdrawal of popular and institutional cooperation with aggressors and dictators diminishes, and may sever, the availability of the sources of power on which all rulers depend.

Without availability of those sources, the rulers’ power weakens and finally dissolves.

Naturally, dictators are sensitive to actions and ideas that threaten their capacity to do as they like. Dictators are therefore likely to threaten and punish those who disobey, strike, or fail to cooperate.

However, that is not the end of the story. Repression, even brutalities, do not always produce a resumption of the necessary degree of submission and cooperation for the regime to function.

If, despite repression, the sources of power can be restricted or severed for enough time, the initial results may be uncertainty and confusion within the dictatorship. That is likely to be followed by a clear weakening of the power of the dictatorship. Over time, the withholding of the sources of power can produce the paralysis and impotence of the regime, and in severe cases, its disintegration. The dictators’ power will die, slowly or rapidly, from political starvation.

Conclusion

In conclusion, the struggle against authoritarianism necessitates a unified front comprising citizens, elected officials, and local representatives. It requires a concerted effort to undermine the sources of power upon which dictators depend, thereby weakening their stranglehold on society.

By refusing to support local candidates affiliated with authoritarian regimes, citizens can disrupt the regime's access to essential resources and undermine its authority. Democracy thrives on consensus and inclusive decision-making, not unilateral edicts from a supreme leader.

Remember, the power of a dictatorship lies not in its inherent strength, but in the acquiescence and compliance of the governed. Through collective action and steadfast resistance, we can dismantle the foundations of tyranny and usher in an era of genuine democratic governance. It is incumbent upon us all to stand firm in defense of liberty, justice, and the rule of law.

The “Monkey Master” fable

A Fourteenth Century Chinese parable by Liu-Ji, for example, outlines this neglected understanding of political power quite well: In the feudal state of Chu an old man survived by keeping monkeys in his service. The people of Chu called him “ju gong” (monkey master).Each morning, the old man would assemble the monkeys in his courtyard, and order the eldest one to lead the others to the mountains to gather fruits from bushes and trees. It was the rule that each monkey had to give one-tenth of his collection to the old man. Those who failed to do so would be ruthlessly flogged. All the monkeys suffered bitterly, but dared not complain.

One day, a small monkey asked the other monkeys: “Did the old man plant all the fruit trees and bushes?” The others said: “No, they grew naturally.” The small monkey further asked: “Can’t we take the fruits without the old man’s permission?” The others replied: “Yes, we all can.” The small monkey continued: “Then, why should we depend on the old man; why must we all serve him?” Before the small monkey was able to finish his statement, all the monkeys suddenly became enlightened and awakened.

On the same night, watching that the old man had fallen asleep, the monkeys tore down all the barricades of the stockade in which they were confined, and destroyed the stockade entirely. They also took the fruits the old man had in storage, brought all with them to the woods, and never returned. The old man finally died of starvation. Yu-li-zi says, “Some men in the world rule their people by tricks and not by righteous principles. Aren’t they just like the monkey master? They are not aware of their muddle headedness. As soon as their people become enlightened, their tricks no longer work.”

From Dictatorship to Democracy: A Conceptual Framework for Liberation

Why British Left India? | Reality of Mahatma Gandhi's Role | Quit India Movement | Dhruv Rathee

How to bring down a dictator

Buddha - Conquer Fear, Become Free

The general wanted the Zen master to submit to his will, and when the master would not submit, the general took out his sword and said,

“Fool, don’t you see? I’m the type of man that can put a sword through you without blinking an eye.”

To which the master calmly said, “don’t you see? I’m the type of man who can have a sword put through him without blinking an eye.”

That’s what true freedom is, isn’t it?

To be without fear.

India: extreme inequality in numbers

Let's look at the numbers in India

1%

The top 10% of the Indian population holds 77% of the total national wealth. 73% of the wealth generated in 2017 went to the richest 1%, while *670 million Indians who comprise the poorest half of the population saw only a 1% increase in their wealth.

70

There are 119 billionaires in India. Their number has increased from only 9 in 2000 to 101 in 2017. Between 2018 and 2022, India is estimated to produce 70 new millionaires every day.

10x

Billionaires' fortunes increased by almost 10 times over a decade and their total wealth is higher than the entire Union budget of India for the fiscal year 2018-19, which was at INR 24422 billion.

63 M

Many ordinary Indians are not able to access the health care they need. 63 million of them are pushed into poverty because of healthcare costs every year - almost two people every second.

941 yrs

It would take 941 years for a minimum wage worker in rural India to earn what the top paid executive at a leading Indian garment company earns in a year.

Oxfam Report: India: extreme inequality in numbers

What is free and fair election?

https://en.m.wikipedia.org/wiki/Free_and_fair_election

  • legal framework (whether there was a constitutional right of citizens to vote and seek office, whether elections were held at regular intervals, and whether election-related laws were not changed immediately before an election);
  • electoral management (whether gerrymandering occurred and whether election management bodies, if they existed, were independent, impartial, and accountable);
  • electoral rights (whether citizens were generally able to vote on the basis of equal suffrage and access);
  • voter registers (whether they were accurate, current, and open to voters for easy and effective voter registration);
  • nomination rules/ballot access (whether candidates had in practice a right to compete in the election, with rejections of candidate applications being based on "internationally recognizable and acceptable norms" and with no candidate receiving more than 75% of the votes, a signal of malpractice or election boycotts);
  • campaign process (whether elections were carried out without violence, intimidation, bribery (vote buying), use of government resources to advantage the incumbent, or a "massive financial advantages" for the incumbent);
  • media access (whether freedom of speech was protected and whether the ruling party was disproportionately benefited by government-owned media);
  • voting process (whether elections were conducted by secret ballot on a one person, one vote basis, with adequate security to protect voters and protection against ballot box stuffing, multiple voting, destruction of valid ballots, and other forms of manipulation);
  • role of officials (whether the election was administered with adequately trained personnel, free from campaigning or intimidation at polling places, and with the ability of international election observers and party representatives to observe polling places); and
  • counting of votes (whether votes were tabulated transparently and free of fraud or tampering)

Question raised about free and fair election in India?

https://thewire.in/politics/for-the-first-time-indias-elections-are-under-international-scrutiny

Do Indian citizens enjoy universal suffrage?

According to one estimate, millions of Muslim and Dalit voters were missing from electoral rolls across the country in 2019. There are similar reports of exclusion of Christians, as well as of internal migrants and the homeless.

Voters in Jammu and Kashmir, numbering about 10 million, have not had a chance to vote in elections to the state (and now union territory) assembly since 2018, denying them their basic right to take part in elections.

In Assam, ‘Doubtful Voters’ (Marked as “D-Voters” by the Election Commission of India), who number around 100,000 and are mostly Bengali-speaking Muslim, as well as the 1.9 million persons from different backgrounds excluded from the National Register of Citizens (NRC), risk their right to vote being denied.

Is EMV voting/counting democratic?

The ECI has refused to address concerns about flaws with electronic voting machines (EVM) used in elections in India in place of paper ballots. The design and implementation of EVMs, as well as the results of both software and hardware verification, have not been made public. They have also not been opened to full independent review. Though Voter Verified Paper and Audit Trails (VVPAT) are now installed in every EVM, no paper slips are counted and matched to verify or audit the votes polled, or votes counted before making the results public. It also does not provide guarantees against hacking, tampering, and spurious vote injections. According to experts, because of the absence of end-to-end verifiability, the present EVM-VVAPAT system is not robust and therefore unfit for democratic elections.

Do Indian voters have real political choice?

Since it gained power, the BJP-led Union government has systematically targeted opposition parties, whilst it has sought to strengthen its hold.

Central investigating agencies have initiated a slew of criminal cases against opposition leaders. According to one report, 90% of all cases against political leaders since 2014, by the CBI and the Enforcement Directorate, have been against those from opposition parties.

Between 2017 and 2023, the ruling party reportedly cornered an estimated $800 million of the $1.45 billion raised by all parties, via the electoral bond scheme (EBS). This was possible due to the opaque nature of EBS and the control that the BJP-led administration has on its operations.

There is evidence of brazen quid-pro-quo, arm-twisting and blackmailing by the ruling party and misuse of enforcement agencies while garnering these donations.

Are Indian voters able to make an informed choice?

The ruling party has monopolised the information space, to the exclusion of opposition political parties, and has deepened its already-expansive powers to control the free flow of information.

Indian media is increasingly concentrated in a few corporate hands and have been shown to have direct political ties to the ruling party. Their programming is also openly supportive of the ruling party and hostile to the opposition.

Pro-ruling party actors also dominate social media networks. BJP’s “IT Cell” has often been accused of deliberately stoking communal tensions and disseminating disinformation, under the protection provided by its top leadership.

Central government agencies have intensified their muzzling of independent media and fact-checkers, including through the use of anti-terror and national security laws.

Ruling party appear to have doubled down on religious polarisation for electoral gains. Direct calls to violence against Muslims and other minorities continue, alongside dehumanising rhetoric by influential leaders in online as well as physical fora.

Against a backdrop of a highly communally charged atmosphere that voters are heading into in the upcoming elections, the emerging threats posed by AI-powered deepfakes and other technology are particularly concerning.

Is the conduct of elections in India independent and objective?

Despite enjoying substantial powers, ECI has been wanting in its enforcement of existing laws, rules, and model codes to ensure free and fair elections. Allegations have included:

Pro-ruling party bias in its announcement of election schedule and dates.

Failure to strictly enforce the Model Code of Conduct (MCC), including guidelines against communal election speeches, particularly those conducted by top BJP leaders.

Failure to engage meaningfully with stakeholders, including political parties, on key concerns including integrity of electoral rolls and the lack of end-to-end verifiability in EVM-VVPATs.

Central to the ECI’s partisan performance is its lack of independence from control by the Executive. Recent changes to the appointments process give total control of ECI to the ruling party. This is a body blow to an already weak system for conducting free and fair elections, resulting in a very uneven playing-field for contestants. Recent hurried resignation of one Election Commissioner and appointment of two give further credence to fears that the General Election in 2024 will be conducted by officials subservient to the ruling party.

Draconian and unconstitutional PMLA and UAPA provisions

The PMLA law places the burden on suspects to prove their innocence rather than requiring the Enforcement Directorate (ED) to prove them guilty.

To understand this, we need to grasp the concept of the burden of proof.

Burden of Proof

Burden of Proof

The burden of proof is a concept in logic and argumentation that addresses the responsibility one has to provide evidence or support for a claim they make during a debate or discussion. It establishes which side in an argument is required to present evidence to justify or validate their assertions.

In simple terms, the burden of proof asks: Who needs to provide evidence to support their claim?

There are generally two position in an argument:

  • The Affirmative (or Positive) Claim: This is the side making an assertion, proposing something new, or making a claim about reality.

  • The Negative (or Skeptical) Position: This is the side that questions or rejects the affirmative claim.

The burden of proof usually rests on the party making the affirmative claim. The basic idea is that if you're asserting something new or making a claim, the responsibility is on you to provide evidence to support that claim. The other side is not required to prove the claim false; they can simply point to a lack of evidence or logical flaws in the argument.

For example:

  • Affirmative claim: "This herbal tea can cure insomnia."

    Burden of proof: The person making this claim is responsible for providing evidence, such as scientific studies or testimonials, to support the idea that the herbal tea is an effective cure for insomnia.

  • Negative position: "I don't believe that herbal tea can cure insomnia."

    Burden of proof: The person in the negative position doesn't necessarily have to prove that herbal tea cannot cure insomnia; instead, they can highlight the lack of evidence or flaws in the argument presented by the affirmative side.

In legal contexts, the burden of proof may shift based on the nature of the claim or the type of case. However, in everyday discussions and debates, the general principle is that the person making a claim is expected to provide evidence to support it.

So, as you can see, it is the responsibility of the ED to prove and provide evidence, rather than the suspect having to prove innocence. The defense is not required to prove the claim false; they can simply point out a lack of evidence or logical flaws in the argument.

Lack of falsifiability

Pseudoscience

Additionally, one needs to understand pseudoscience and its lack of falsifiability.

Lack of falsifiability

As you can see, the ED is exploiting the lack of falsifiability. One cannot prove whether money has been used or not.

It is the duty of the Supreme Court to protect the constitution. They need to remove such unconstitutional provisions through suo motu action. Laws are not intended to be abused or manipulated for wrongful purposes.

Reverse Burden of Proof

There is no good justification for jail with the reverse burden of proof. Yes, you can jail someone for a month or two (e.g.,in case of dowry or domestic violence, to protect the victim and give some time for the victim to collect and provide evidence). But a year or six months of jail with reverse burden of proof is a violation of fundamental rights. Trials can run with bail. What is the fear if the suspect stays outside? What is the danger? Is there any evidence that they will commit some heinous crime like killing someone?

We need a system of quicker trials; for that, courts need to scale, not shift dates for years or decades. By reducing the backlog of cases and streamlining court procedures, the justice system can deliver swifter resolutions while upholding the rights of the accused and also victim.

Additionally, assist victims or plaintiffs (the party initiating a lawsuit) in gathering the necessary evidence and provide them with protection if there is a threat to their safety. This could involve providing resources and support to help gather evidence, such as forensic analysis or witness testimony. By empowering victims and plaintiffs in this way, the justice system can ensure that cases are built on solid foundations of evidence rather than relying on incarceration of suspect.

Upholding Justice: The Role of Judges in Integrating Scientific Evidence and Constitutional Morality

In the realm of jurisprudence, judges hold an esteemed responsibility of upholding justice, protecting fundamental rights, and ensuring equality for all individuals. Central to this responsibility is the imperative for judges to base their judgments on objective criteria, free from personal biases and opinions.

Fundamental rights, enshrined in constitutions around the world, serve as the bedrock of a just and equitable society. These rights encompass a wide array of liberties, including freedom of speech, the right to privacy, and equality before the law. It is the duty of judges to safeguard these rights zealously, employing a balanced approach that respects both individual freedoms and societal interests.

In the pursuit of justice, scientific evidence plays a pivotal role. Whether in criminal trials, environmental disputes, or matters of public health, scientific findings can provide crucial insights that inform legal proceedings. From DNA analysis to climate change research, the integration of scientific evidence enables judges to make well-informed decisions grounded in empirical data rather than conjecture or speculation.

Moreover, in a world grappling with complex ethical dilemmas and social injustices, the concept of constitutional morality emerges as a guiding principle for judicial interpretation. Constitutional morality refers to an adherence to the spirit and values enshrined in the constitution, transcending mere legal formalism. It encompasses notions of justice, fairness, and human dignity, serving as a compass to navigate the intricacies of legal disputes.

However, the effective integration of scientific evidence and constitutional morality into judicial decisions requires a steadfast commitment to impartiality and objectivity. Judges must remain vigilant against the influence of personal biases and ideological predispositions that may cloud their judgment. The judiciary's credibility hinges on its ability to dispense justice without fear or favor, ensuring that all individuals are treated equitably before the law.

Furthermore, judicial education and training programs play a vital role in equipping judges with the requisite knowledge and skills to grapple with complex scientific concepts and constitutional principles. Continuing education initiatives focused on scientific literacy and constitutional jurisprudence can empower judges to adjudicate cases effectively, safeguarding fundamental rights while promoting societal welfare.

In addition to judicial competence, transparency and accountability mechanisms are essential to uphold the integrity of the judiciary. Public scrutiny and oversight serve as checks against judicial misconduct or partiality, fostering trust and confidence in the legal system.

Just learning law books by judges is not enough.

The Crucial Role of Interdisciplinary Knowledge in Judicial Decision Making

Introduction

Judges play a pivotal role in the administration of justice. Their decisions have far-reaching consequences, not only for the parties involved in a particular case but also for society as a whole. It is, therefore, essential that judges are equipped with the necessary knowledge and skills to make informed, fair, and just decisions. While a thorough understanding of the law is undoubtedly essential, it is increasingly evident that judges also need to be well-versed in interdisciplinary knowledge to navigate the complexities of modern society effectively.

The Importance of Interdisciplinary Knowledge in Judicial Decision Making

In today's fast-paced, technologically advanced world, the issues that come before the courts are becoming increasingly complex. Many of these issues require an understanding of scientific principles, methods, and findings to be properly evaluated and resolved. For example, cases involving environmental pollution, medical malpractice, or intellectual property disputes often hinge on scientific evidence.

As a result, judges must be able to understand and evaluate this evidence effectively. This requires a solid foundation in the relevant scientific disciplines, such as physics, chemistry, biology, and molecular biology. A judge who lacks this knowledge may struggle to grasp the implications of scientific evidence, leading to flawed decisions that fail to provide justice for the parties involved.

Moreover, an understanding of scientific methods and experimentation is crucial for evaluating the credibility of scientific evidence. Judges must be able to assess whether the methods used to generate the evidence were reliable, valid, and free from bias. Without this knowledge, judges may inadvertently admit unreliable or invalid evidence, which can lead to miscarriages of justice.

The Role of Neuroscience and Logical Fallacies in Judicial Decision Making

Another area in which interdisciplinary knowledge can be invaluable for judges is neuroscience. A growing body of research in this field has shed light on the workings of the human brain, including how it processes information, makes decisions, and forms beliefs. This knowledge can help judges to better understand the cognitive biases and heuristics that may influence their decision-making processes.

Questions like 'Does free will exist?' or 'What makes a criminal commit a crime?' can be answered by shedding light on neuroscience, molecular biology, and evolution.

Neuroscientific research has revealed that our thoughts and actions are the result of complex neural processes that occur within the brain. For instance, functional magnetic resonance imaging (fMRI) studies have shown that different regions of the brain are activated when we make decisions, suggesting that our choices are not entirely arbitrary but rather influenced by our neural architecture.

Moreover, molecular biology research has identified specific genes and proteins that play a role in decision-making processes. For example, certain genetic mutations have been linked to impulsive behavior, indicating that our genetic makeup can influence our choices.

For example, judges may be susceptible to the confirmation bias, which is the tendency to seek out and interpret information in a way that confirms their existing beliefs. By understanding the cognitive mechanisms underlying this bias, judges can take steps to mitigate its influence on their decision making.

Similarly, an understanding of logical fallacies can help judges to identify and avoid common errors in reasoning that can lead to flawed decisions. For instance, the ad hominem fallacy involves attacking the person making an argument rather than the argument itself. By recognizing this fallacy, judges can ensure that their decisions are based on the merits of the case, rather than personal biases or prejudices.

The Benefits of Interdisciplinary Knowledge for Judicial Decision Making

The benefits of interdisciplinary knowledge for judges are manifold. First and foremost, it enables judges to make more informed, evidence-based decisions that are grounded in a thorough understanding of the issues at hand. This, in turn, can lead to more just and equitable outcomes for the parties involved in a case.

Moreover, an interdisciplinary approach to judicial decision making can help to bridge the gap between law and science, fostering greater collaboration and cooperation between these two fields. This can lead to the development of new legal frameworks and policies that are better suited to addressing the complex challenges of the modern world.

Conclusion

In conclusion, while a solid understanding of the law is essential for judges, it is not enough to ensure just and fair decisions. Judges must also be well-versed in interdisciplinary knowledge, including physics, chemistry, biology, molecular biology, neuroscience, scientific methods, experimentation, logical fallacies, and paradoxes. By acquiring this knowledge, judges can better navigate the complexities of modern society, making more informed, evidence-based decisions that provide better social justice for all.

How to tackle disinformation?

date: "2023-12-07"


categories:

  • "politics"
  • "psychology"
  • "social-media"

India ranks 1st in Misinformation and disinformation

Disinformation

- Global Risks Report 2024

India's fake news epidemic

1) Deep Canvassing

Dave Fleischer told me that people don’t get a chance to reflect like this very often. Daily concerns take up people’s cognitive resources: providing lunch money for their kids, evaluating their performance at work, planning who will take the car to get repaired. Without a chance to introspect, we remain overconfident in our understanding of the issues about which we are most passionate. That overconfidence translates to certainty, and we use that certainty to support extreme views.

One of the most striking examples of this comes from experiments into what psychologists call the illusion of explanatory depth. When scientists asked subjects to rate how well they understood things like zippers, toilets, and combination locks, most people tended to say they had a pretty good grasp of their mechanics. But when experimenters asked those same subjects to explain how they worked in detail, people tended to go back and update their answers, admitting they had pretty much no idea how those things worked. 

The same was true for political issues.

When asked to provide opinions on health-care reform, a flat tax, carbon emissions, and so on, many subjects held extreme views. When experimenters asked people to provide reasons for their opinions, they did so with ease. But if asked to explain those issues in mechanistic detail, they became flustered and realized they knew far less about the policies than they thought they did. 

As a result, their opinions became less extreme.

Why do we argue? What purpose does it serve?

Cognitive scientist Hugo Mercier, an expert on human reasoning and argumentation, explained that we evolved to reach consensus—sometimes on the facts, sometimes on right and wrong, sometimes on what to eat for dinner—by banging our heads together. Groups that did a better job of reaching consensus, by both producing and evaluating arguments, were better at reaching communal goals and out-survived those that didn’t. That led to the innate psychology that compels us to persuade others to see things our way when we believe our groups are misguided.

Mercier told me that if we couldn’t change our minds or the minds of others, there would be no point in arguing in the first place. He asked me to imagine a world where everyone was deaf. “People would stop talking,” he said. The fact that we so often disagree isn’t a bug in human reasoning; it’s a feature. How arguing had led to sudden shifts, all we had to do was look at the history.

How to have a respectful argument?

2) Truth Sandwich

https://en.wikipedia.org/wiki/Truth_sandwich

A truth sandwich is a technique in journalism to cover stories involving misinformation without unintentionally furthering the spread of false or misleading clams.

https://www.pbs.org/standards/blogs/standards-articles/what-is-a-truth-sandwich/

Lead by Truth

Berkeley linguist George Lakoff recently came up with the strategy that he decided to call the truth sandwich. Here’s how to build one: Lead with the truth. In the middle of the report, briefly describe the falsehood. And then fact-check the misinformation and repeat the truth.

Amplification Give them Power

Lakoff has said that he thinks media organizations are unintentionally spreading misinformation when they repeat lies or quote politicians who are asserting falsehoods.

“Avoid retelling the lies. Avoid putting them in headlines, leads or tweets,” Sullivan wrote of Lakoff’s advice. “Because it is that very amplification that gives them power.”

Don't engage with disinformation and propaganda

Engaging in disinformation and propaganda can lead to its amplification through various mechanisms, taking advantage of psychological, social, and technological factors. Here are some key reasons:

Confirmation Bias

People tend to be more receptive to information that aligns with their existing beliefs. Disinformation often targets pre-existing biases, leading individuals to accept and share it without critically evaluating its accuracy.

Echo Chambers

Online communities and social networks tend to form echo chambers where like-minded individuals reinforce each other's beliefs. Disinformation spreads rapidly within these closed circles, as it resonates with the shared worldview of the group.

Algorithmic Amplification

Social media algorithms are designed to maximize engagement by showing users content they are likely to find interesting. Disinformation that generates reactions (likes, shares, comments) often gains more visibility, leading platforms to amplify it further.

Distrust in Authentic Media

If individuals have a distrust in authentic media or established institutions, they may be more susceptible to alternative narratives of godi Media, even if they lack credibility. Disinformation campaigns often exploit this distrust to undermine the authority of legitimate sources.

Selective Exposure

People tend to seek information that confirms their existing beliefs and avoid contradictory information. Disinformation providers take advantage of this by tailoring content to specific audiences, making it more likely to be accepted and shared within those groups.

The primary task of a truth teller is to navigate the intricate landscape of disinformation without succumbing to distractions. This involves a strategic approach to counter false narratives and resist the temptation to engage in posting leaders photos as criticisms, especially when dealing with leaders obsessed with attention.

Crafting a Counter-Narrative: The Power of Truth Sandwich

To effectively counter disinformation, the focus shifts to delivering accurate and reliable information. The "truth sandwich" technique emerges as a powerful tool, allowing truth tellers to construct arguments by sandwiching the false statements between layers of truth. This method not only addresses misinformation but also reinforces the importance of presenting correct information without perpetuating falsehoods.

Breaking Echo Chambers: Constructing Compelling Counter-Narratives

Breaking the echo chamber requires truth tellers to go beyond simply debunking false information. It involves the construction of compelling counter-narratives that are well-supported by evidence. This process demands a departure from emotional appeals, emphasizing instead the use of facts and logical reasoning to persuade individuals within the echo chamber to reconsider their perspectives.

Unmasking Deception: Exposing Fallacies in Disinformation

An integral part of the truth teller's task is the identification and exposure of fallacies within disinformation. This involves a meticulous process of unraveling the logical errors, misleading tactics, and manipulative techniques employed in false narratives. By shining a light on these fallacies, truth tellers not only educate their audience but also undermine the credibility of the disinformation itself.

Repeat the truth to tackle disinformation

Repeating the truth is a fundamental strategy in combating disinformation. By consistently and clearly reaffirming accurate information, individuals and communities can establish a foundation of reliable knowledge. Repetition not only reinforces the veracity of the facts but also helps to counteract the effects of misleading narratives and false claims. It builds a collective understanding based on evidence and promotes critical thinking skills, enabling people to discern between credible information and misinformation. In the face of the persistent spread of disinformation, the repetition of truth becomes a powerful tool in fortifying the public against deceptive influences and fostering a more informed and resilient society.

Staying True: A Holistic Approach for Truth Tellers

In summary, the holistic approach for truth tellers encompasses staying true to the facts, avoiding distractions, and breaking echo chambers through the presentation of well-supported counter-narratives. The incorporation of the "truth sandwich" method becomes a crucial aspect of this endeavor, ensuring that efforts to counter disinformation are effective without inadvertently amplifying false statements.

3) Learning Strategies

Use pairing graphics with words, linking abstract concepts with concrete representations, posing probing questions, and retrieval practice (asking people to explain) etc to explain things. 

Learning strategies link

4) The 25% Revolution

The 25% Revolution—How Big Does a Minority Have to Be to Reshape Society?

Understanding Diffusion

The things that we would like to spread often fail to diffuse. At the same time, the things that we want to prevent from spreading often succeed despite our best attempts to stop them. 

This basic problem of diffusion—that is, the failure to spread behavior—occurs whenever behavior change encounters resistance. At tempts to spread everything from vaccinations to innovative technologies to environmentally friendly business practices have faced similar difficulties. The less familiar an innovation is, and the more inconvenient, uncomfortable, or expensive it is, the greater the resistance will typically be, and the less likely it will be to diffuse. 

Weak Ties

The basic idea of the strength of weak ties is that while our strong ties that is, our friends and close family—all tend to know each other, our weak ties—that is, our casual acquaintances – connect us to remote parts of the social network. As the sociologist Mark Granovetter famously put it, Whatever is to be diffused can reach a larger number of people, and traverse a greater social distance, when passed through weak ties rather than strong.

Strategic complementarity: The value of a behavior increases with the number of others who adopt it.

Credibility: The more people who adopt a behavior the more believable it is that the behavior is beneficial or that it is worth the cost of adoption.

Legitimacy: The more people who adopt a behavior, the greater the expectation is that other people will approve of the decision to adopt and the lower the risk of embarrassment or sanction.

Emotional contagion: The excitement associated with adopting a behavior increases with the number of others who adopt it.

Cooperation

The secrets of cooperation

Reasons for Cooperation Vary: Cooperation occurs at different social scales. Small groups may rely on family bonds and direct reciprocity, while larger groups may depend on reputation when direct interactions are less frequent. Norms become crucial in very large groups where individuals can't rely on personal connections.

Reputation Matters More Than Financial Incentives: Research suggests that reputational rewards are more effective than financial incentives in encouraging prosocial behavior. Publicizing individuals' cooperative actions consistently boosts participation, while financial rewards can sometimes muddle the perception of motivations.

Financial incentives such as contribution-matching or cash, or rewards for participating, such as offering T-shirts for blood donors, sometimes worked and sometimes didn’t, they found. In contrast, reputational rewards — making individuals’ cooperative behavior public — consistently boosted participation. The result has held up in the years since. “If anything, the results are stronger,” says Yoeli.

Financial rewards will work if you pay people enough, Yoeli notes — but the cost of such incentives could be prohibitive. One study of 782 German residents, for example, surveyed whether paying people to receive a Covid vaccine would increase vaccine uptake. It did, but researchers found that boosting vaccination rates significantly would have required a payment of at least 3,250 euros — a dauntingly steep price.

The Role of Gossip in Norm Enforcement: Gossip, the sharing of information about norm violations, is a powerful tool in enforcing social norms. It serves multiple functions, including strengthening social bonds, providing information for social interaction, and influencing behavior by making individuals less likely to trust and cooperate with those who violate norms.

Gossip recipients reported that this negative information made them less likely to help the untrustworthy and more likely to avoid them.

Communication Strategies for Cooperation: Informing people about what others actually do is more effective than telling them what they should do. Messages emphasizing social expectations and the increasing trend of a behavior can positively influence cooperation.

“If you just say that 15 percent do that, you normalize the fact that 85 percent don’t,” says Bicchieri. But there’s a work-around: It turns out that even a minority can nudge people toward a desired behavior if the number is increasing, thus providing a trendy bandwagon to hop on. In one experiment, for example, researchers measured the amount of water volunteers used while brushing their teeth. People who had been told that a small but increasing proportion of people were conserving water used less water than those who heard only that a small proportion conserved.

Remaining Unknowns: While researchers have made progress in understanding cooperation, many questions remain. Little is known about why cultures hold specific norms or how norms change over time. Natural selection is expected to play a role in determining which cultural norms enhance survival and persist over generations.

How to actually change someones mind?

Book: Edge Turning Adversity into Advantage

The Cognitive Conversation

When to use it: The detractor may be opposed to your argument because of an objective reason. If they’ve clearly articulated a logical set of objections, and they don’t appear to be hiding ulterior motives, approach them with a cognitive conversation. This is especially useful when the detractor is known to have a no-nonsense attitude and can easily set aside emotions in their decision-making process.

How it works: A successful cognitive conversation requires two things: sound arguments and good presentation. Take, for example, a situation where you are pushing to switch suppliers and you’ve found one whose materials and products are superior to the current supplier, whose products have been causing numerous downstream issues. But your colleague is in favor of sticking with your current supplier with whom he has a long-standing relationship. He expresses his resistance to your proposal by pointing out the higher prices the new supplier charges. You want to prepare sound arguments that disprove the detractor’s objections. In this instance, you might point out that the new supplier is actually less expensive in the long run, when you take into account all the additional production costs cause by the current supplier. You also want to use a logical framework and clear storyline to force the detractor to reassess their thinking. For example, you can emphasize that the decision is based on cost, quality, and service, but above all, cost and quality.

Be cautious about not introducing emotions into the discussion, which could give the impression that you and your detractor are not on common ground. For example, you don’t want to make it seem as if you believe your colleague’s relationship with the former supplier is irrelevant. The goal is to show the person that, on an objective and factual basis, their initial stance on the situation isn’t as reasonable as your argument. Be warned, these detractors are not easily swayed by broad generalizations. Be ready to mentally spar with them and come prepared with facts that back up each aspect of your overall argument.

The catch: Don’t assume that getting a “yes” from this type of detractor signals a conversion into an everlasting supporter. You may have persuaded them on this specific issue, but they may disagree with you again in the future. If that’s true, expect to have another cognitive conversation on that separate argument.

The Champion Conversion

When to use it: When the detractor isn’t easily persuaded through cognitive arguments, or when they harbor a grievance in your relationship with them, engaging in debates may be futile. Take, for example, a management decision where you’d like to promote a qualified individual who performed brilliantly under your supervision, but a counterpart of yours argues that your subordinates often get promoted over hers. Even if your promotion candidate is objectively more deserving, others may still feel resentment and refuse to provide support.

How it works: Don’t jump in and try to convince the other person. Instead, invest time in personally learning about and building rapport with them. Here, it’s not about arguments or presentation, at least initially, but understanding their perspective and why they might feel personally affronted. For instance, you might ask questions about her team, and which team members she feels have the most potential. Gradually convert this detractor into someone who is your champion or advocate, perhaps by shedding more light on the qualities that you value in individuals, both on your team as well as your counterpart’s team, or showing how you value her leadership style. By the time the decision must be made, try to make sure you’re both on the same page as to which qualities matter for promotion decisions and that you’ve clearly articulated how your candidate exemplifies those qualities.

The catch: No matter how much of a champion the other person becomes, don’t expect them to agree with a decision that’s fundamentally illogical. You can’t rely on relationship alone; your stance still needs to be backed by clear logic. Additionally, these types of detractors can easily sense if you’re trying to manipulate the situation to get them on your side. Authenticity is key: allow the other person to see who you are so that they can more fully understand your point of view.

The Credible Colleague Approach

When to use it: There are times when the detractor’s deeply-held personal beliefs make them fundamentally opposed to your proposal. Take, for example, a colleague who might disagree with you on the need to run a necessary clinical trial for a new product. Because they believe that the clinical trial might be harmful in some way or run counter to their values, they oppose the idea, even though the evidence shows that the benefits outweigh the harm. It’s sometimes tough to pinpoint where these personal beliefs stem from, but some combination of the person’s upbringing, personal history, and unspoken biases will, at times, make it seemingly impossible for them to accept a decision, no matter what logical or emotional argument you throw their way. In these situations, there isn’t much you can say or do to change their mind.

How it works: Rather than trying to argue with someone who seems resistant, bring in a credible colleague. A champion of your position from another part of the organization, whether they are a peer or superior, may be better-suited to convince this detractor. This forces the detractor to disentangle who you are from what your argument might be and evaluate the idea based on its objective merits. If you and the detractor are at an impasse, the credible colleague might just tip the scales in your favor.

The catch: Calling in an external supporter is a double-edged sword. While it can achieve the outcome you want, it may exacerbate your detractor’s opposition, especially if the detractor feels that the credible colleague has forced them to take your side. It’s critical to find the right colleague who can tactfully advocate for your position while maintaining a cordial relationship.

Features of good books or curriculum

Learning About Learning Resources
https://github.com/amiyatulu/teacher_resources

Textbook must cover six fundamental instructional strategies while presenting the information, defined by rigorous research.

  1. Pairing graphics with words
  2. Linking abstract concepts with concrete representations

Why we face difficulty to remember abstract concepts?

https://iambrainstorming.wordpress.com/2017/03/08/why-we-face-difficulty-to-remember-non-concrete-information/

3) Posing probing questions

http://mrkempnz.com/2014/06/questioning-the-most-powerful-tool-in-the-classroom-an-action-research.html

"What Makes a Great Question?" rubric
Why, how, what if, how do you know, what are the evidences

What if and why not
helps you to find alternatives to a solution

  1. Repeatedly alternating problems with their solutions provided and problems that students must solve.

Solved example and unsolved problem 
with steps of problem-solving strategy: 1) sort 2)strategize 3) solve and 4) check. 
- Chemistry, A Molecular Approach by Nivaldo J. Tro

Interleaving and Component Practice can be used for better transfer of learning with appropriate cognitive load.

  1. Distributing practice
  2. Assessing to boost retention

Detailed explanation of the strategies is given here, NCTQ learning about learning   https://drive.google.com/file/d/0B8x9dkicaW23bFMyeS1WZ1NYT2c/view?usp=sharing
and http://www.learningscientists.org/

The problem with our education system:
Most (99%) books referred by our teachers (whether its schools or higher education), not even meet a single criterion, most importantly posing probing questions and linking abstract concepts with concrete representations, which are the foundation for learning and comprehension/understanding.
The result is the student just try to score marks by repeating facts without being critical about it.
The bad books are the main reason why we have bad teachers and bad students. It's not that teacher doesn't work hard, they just don't teach which meet the criteria, so that learning happens.
It's not even fault of the administration, they put the books in the library what teacher recommend to them, and also naive students prefer books recommended by teachers.

Some of the books that meets all the criteria and can be used as a reference to identify the patterns of good books:

(You can skip this section for later analysis and jump to the patterns and features of good books)

Conceptual Physics, by Paul G. Hewitt
The book is very well written, the book almost unraveling everything in physics with real-world examples. You will understand physics with concrete examples rather than just with abstract formulas and equations. Also, it has a practice book equally important. This book is right for understanding physics at the undergraduate and high school level.

Chemistry a Molecular Approach,  Nivaldo J Tro
Books with lots of diagrams, probing questions, all abstract concepts are represented with concrete examples and analogy, repeatedly alternating problems with their solutions provided and problems that students must solve, regular assessments with right questions.

Organic Chemistry as a Second Language, David Klein (First and Second Semester)
Author has terrifically written the book on organic chemistry. You will understand organic chemistry like never before, and no need to memorize just the equations and reactions day and night which are just a junk for students.

Campbell Biology, Reece, Urry, Cain et. al.
In India, biology is taught in most horrible manner. Biology means how much memory you have, how much memorization you can do, not how much you understand the subject.
This book addresses the problem. You will understand biology and connect it to the real world. The diagrams in it are also wonderful. The questions in it promote inquiry and critical thinking.

Genetics A Conceptual Approach, Benjamin Pierce
Even though it's not for high school students, but a must for undergraduate teachers. Teachers should follow the book and come for an inquiry-based lecture.

Molecular Biology of the Cell, Alberts
A must for undergraduate and high school teachers. It has also got a problems book which contains gem like questions, which needs to be discussed among the students at the undergraduate and higher secondary level.

Lehninger Principles of Biochemistry
It's another book, which lazy teachers are scared of. But without making an effort to understand biology, how will a teacher promote understanding among students?

Fundamentals of Anatomy and Physiology, Martinin, Nath
Meticulously well-written book of anatomy and physiology, which an undergraduate teacher must follow.

Here are some of the more features and patterns that a good book should contain:

1) Statements or ideas or concepts should be backed by adequate examples and research data as evidence. Formulas should be provided with its implementation examples in physical situations.
e.g.
Have you ever heard the phrase “form follows function?” It’s a philosophy practiced in many industries. In architecture, this means that buildings should be constructed to support the activities that will be carried out inside them. For example, a skyscraper should be built with several elevator banks; a hospital should be built so that its emergency room is easily accessible.

One example is not enough, provide as many as you can to explain its use in a different context and situations

example

Function and Limits from book Essential Calculus by James Stewart

Give example questions to classify from several antagonistic observations.

e.g. In probability, a simple event is an outcome that cannot be further broken down into simple components. So its example can be:
Roll one die: 5 (simple event)
Rolling one die has 6 simple events: 1, 2, … 6
Roll two dice: 7 (not a simple event)
Rolling two dice have 36 simple events: 1-1, 1-2,….., 6-6, and 7 is NOT a simple event because it CAN BE broken down into simpler events, such as 3-4 or 6-1.

A classification Problem

2) Diagrammatic representation of text with proper labeling and caption containing enough description should be provided.
e.g.

Molecular Biology of the Cell, Alberts

  1. Books should have analogies with the diagram in abundance to convert all abstract, new and tough concepts into concrete. It's an important feature, that makes a book exceptionally great and boosts learning

Analogies can be misleading if it's not too close to the model you are explaining. Always provide contrasting characters of analogy in comparison to the real model.

Example of an analogy: Converting AC to DC

The converter uses a diode, a tiny electronic device that acts as a one-way valve to allow electron flow in one direction only. Since alternating current changes its direction each half-cycle, current passes through a diode only half of each period. The output is a rough dc, and it is off half the time. To maintain continuous current while smoothing the bumps, a capacitor is used. The capacitor acts as a storage reservoir for a charge.
Diagram with analogies:

Conceptual Physics, by Paul G. Hewitt

4)After the text has explained a concept, it must give few questions on the particular concept in the same place. The questions should be prepared in a manner that, it checks the understanding of the concept, not just recall of the concept.
5) Questions should be probing, also many questions should be graphics/diagrams with texts. Most books that are recommended usually don't contain visual questions. For example, if you look our books of biology, very less visual, and almost no probing questions are present, do compare with questions of Campbell Biology, Molecular Biology of the Cell, how they bring probing questions with visuals in them.

Question from Campbell Biology

  1. Length of the book should respect the time of students. It doesn't mean book can't be long or elaborative. Being elaborative is not about giving lots of different concepts or topics, it means explaining a few topics elaborately so that it requires least effort to grasp. A narrow but precise statement can take more time to comprehend than elaborative explanations with examples, images, and analogies.  Each sentence should have a purpose of being in the book.

Don't make it (the content) simple, teach the complexity by simplifying it. The curriculum should cover the depth of a concept and breadth of the subject without the clutter.

  1. Books should be written in a manner that they talk with the students, not throwing information like short notes.

  1. A book should also provide memory assistance for hard to remember information.

Karaoke players can order free grape soda” 

Kingdom–phylum–class–order–family–genus–species

9)Questions should have relevance to real problems, concrete situations, application based, not all hypothetical questions detached from reality.

  1. Questions and distractor in the case of MQCs should be very clear, that checks the comprehension, without creating confusion. Many times questions are written in a way that is just difficult to understand, you can't even know what the question is actually asking, so how can you even try to solve it even if you understood the concepts.
  2. Each question in the textbook should have its purpose, problems shouldn't be designed just for the sake of doing it, it should improve the understanding of the concept at a deeper level, eliminate misconceptions and fix concept into memory.

A formula from NCERT Book

Why are our books filled with unnecessary short cut formulas?

https://iambrainstorming.wordpress.com/2017/06/01/why-are-our-books-filled-with-unnecessary-short-cut-formulas/

  1. Real photograph and funny cartoons with explanations and questions (e.g. in case of representing resistance as zigzag wire, it can be represented as bulbs)

Conceptual Physics, by Paul G. Hewitt

  1. Scientists interview or how they discovered a particular phenomenon along with their real photographs

Venkatraman Ramakrishnan interview: Nobel prize for chemistry for work on ribosome structure

Venkatraman Ramakrishnan

"I remember reading a Scientific American article about the use of new physical techniques – including neutron scattering – as a method for unraveling the structure of the ribosome. I was fascinated. I knew ribosomes were a big fundamental problem in science and this was a method for chipping away at it."

Proteins carry oxygen in our blood, form antibodies that fight microbes, and even sense light inside our eyes – and each protein that makes up a human is manufactured in a ribosome inside our cells. Each of our genes codes for a particular protein and the ribosome takes that piece of DNA code and uses it to assemble chains of amino acids until a protein is formed. "That is the central dogma which explains how information stored in our DNA is transformed into the proteins that make up a living being," says Venki.

  1. Posing a probing question before explaining the topic.

Conceptual Physical Science by Hewitt, Suchocki, Hewitt

15) Books should include questions that address life skills like collaboration, and 21st-century skills like the ability to analyze and interpret data. It must have questions with a section for data interpretation and analysis and questions for group work along with conceptual, mathematical and review questions. 

Chemistry a Molecular Approach,  Nivaldo J Tro

An example of question that promotes critical thinking. Critical thinking questions are hard to develop and require a lot of time for research and effort:

Questions should be brain friendly. Memory is reconstructive not reproductive.

https://iambrainstorming.wordpress.com/2018/02/17/question-designing-should-be-brain-friendly-cue-based/

  1. Each section should give a message or lesson about big ideas that help to make a judgment or transfer of learning in different situations.  The essence of the message should be in the title that is descriptive and a further descriptive subtitle. 

A descriptive title
from book Molecular Biology of the Cell, Alberts

A descriptive subtitle
from book Inorganic Chemistry
by Shriver, Weller, Overton, Rourke and Armstrong

Is the content clever?
It's not adequate to have a comprehending content, its more to do with smart content (big ideas, learning it to apply in the real world thinking, building connections to link ideas to get the complete picture, encourage critical thinking and inquiry) for smart teaching and smart learning. 

17)Engaging style of telling is essential in scientific writing. A chapter may begin with a narrative/storytelling of scientific experiences of researchers and their comments, history and progression in the discussed field or example events relevant to the subject matter. Even narratives can be used in a separate text box to discuss example events or how researchers reach their conclusions.

The narrative technique provides a deeper meaning for the reader and helps the reader to use imagination to visualize situations.

Colonization of Plants in the barren landscape
Campbell Biology, Reece, Urry, Cain et. al.

But narratives should be used with caution as "the plural of anecdote is not data"

http://www.pnas.org/content/111/Supplement_4/13614.full

Anecdotal evidence (evidence collected in a casual or informal manner and relying heavily or entirely on personal testimony) are not reliable evidences.

How to make stories with ABT (And, But, Therefore)?

There are three main forces involved in creating a story — agreement, contradiction, consequence.

ABT: All you need to know to tell stories

I WONDER Magazine http://www.azimpremjiuniversity.edu.in
https://github.com/amiyatulu/teacher_resources/raw/master/Stories:AndButTherefore.pdf

ABT: All You need to know to tell stories by Randy Olson
i wonder

The conclusion should be supported by the premises and the arguments with contradictions, inconsistencies, and exceptions mentioned in the arguments.

Extremely simplified models are useful to anyone who understands the assumptions, understands how the assumptions drive outcomes, understands how violation of assumptions affects outcomes, and understands how this defines the scope of the original model and its extensions.

There are three parts to any proposition:

  The premises – i.e. facts which are already known or assumed.
  The argument – i.e. the logical chain of reasoning that leads from the premises to the conclusion.
  The conclusion - i.e. that which must be true if the premises are true and the argument is valid.

The conclusion must be true IF the premises are true AND the argument is valid.

http://www.yitsplace.com/Programming/prop_parts.htm

A concise Introduction to Logic
by Patrick J. Hurley, Lori Watson

Without logic, your working long hours will make things even worse

18) Topics can have connection boxes containing discussion about situations that are surprising, nonintuitive or widely-held false ideas.

Why do males exits? Why bdelloids have completely abandoned sex?
Biology, the unity and diversity of life, by Starr, Taggart, Evers et al.

19) The author should have the liberty to include new relevant chapters, innovate in their subjects and shouldn't be hitched by the syllabus of the board. Students learning according to recent technology is most important. The author should only take that into consideration, not preparing them for syllabus or entrance.

e.g. Writing mathematics book linking with programming.
Students should be taught according to the availability of quality material not according to the syllabus. A syllabus without quality material is meaningless.

  1. Content must be designed to accord with cognitive load theory. Cognitive load theory is built upon two commonly accepted ideas. The first is that there is a limit to how much new information the human brain can process at one time. The second is that there are no known limits to how much-stored information can be processed at one time.

Cognitive overload occurs when the total cognitive load exceeds the working memory capacity of the learner.

e.g. This material creates a high intrinsic cognitive load because of use of too many technical terminologies (many times hard to imagine and comprehend)  in a single sentence or paragraph.

NCERT Biology

Cognitive load theory in detail:
https://github.com/amiyatulu/teacher_resources/raw/master/cognitive_load_theory_report_AA1.pdf

Education Centre for Education Statistics & Evaluation

New information should be presented slowly after the previous one is mastered by elaboration and practice.

https://iambrainstorming.blogspot.in/2017/10/practicing-one-component-in-one-time-to.html

  1. Books should have learning outcomes or objectives at the beginning or end of each chapter. Examples, practice, and exercises that test your confidence and expertise in each learning objectives must be provided.

An example of learning outcomes design in the textbooks:

Learning outcomes can have checkboxes, for pre-check, post-check.
Students may mark the checkboxes with the following symbols
❌ : Novice
⭕: Developing
►: Forgotten
▣ : Expert

It checks the level of confidence in the topics before and after learning. Students can use a pencil to mark the checkboxes, erase and reuse the checkboxes.
The preface of the book can have guidelines about "How to use the learning outcomes?" Learning outcomes can include each small components of learning in the checklist.

Key Learning Outcomes from Book: Chemistry A Molecular Approach, Nivaldo J. Tro

Blog on the importance of sharing learning outcomes:
Should I share my learning outcomes with students?

  1. End of the chapter can provide references to the texts. Referencing is a way to provide evidence to support the assertions and claims in the content. It also helps the reader to dig deeper into the scientific methodology that validates the assertions and claims.

The Psychology of Human Sexuality by Justin J. Lehmiller

  1. Test what you write with students.

Test the comprehension of every paragraph or section you write with a diverse group of students without previous knowledge about the subject. Ask students to explain the content you write and check whether they understand the text. Obtain feedback from them and improve the writing that answers their confusions and questions.

the curse of knowledge bias

Once you understand something you presume it to be obvious to everyone.

https://en.wikipedia.org/wiki/Curse_of_knowledge

  1. And last, books should have least mistakes, in texts as well as questions.

Lecture of the teacher reflects the book they follow. So it's most important they know which criteria a book should meet, and how learning happens.
Students should also be made aware of it, how learning happens.

Books should be concise (giving a lot of information clearly and in a few words; brief but comprehensive) with precise, specific and explicit (no room for confusion or doubt) wording without unnecessary repetition yet elaborative to assist students in learning and should also be a guide for teachers that instruct them how they will explain the concepts to students in the class.

The guidelines are biased towards science, not all points are applicable to arts and literature.

One can identify such books with 15 mins of reading and turning pages.
But after you have learned all these attributes, and investigated these patterns by reading a few chapters of the given reference books.

The best, urgent and topmost thing our education ministry can do is take away and stop referring all the books and resources that don't meet these criteria.

Why NCERT and other state board books are just toxic junk for our students?
http://technoperiod.blogspot.in/2016/04/critical-analysis-of-12th-chemistry.html

https://iambrainstorming.wordpress.com/2017/06/08/comparative-analysis-of-openstax-biology-and-ncert-biology/

International books are expensive, what the solution?
There are open access books such as https://openstax.org/ that are written with effective learning standards. All pdf of the books are freely available under Creative Commons Attribution 4.0 International License in which you are free to Share — copy and redistribute the material in any medium or format or Adapt — remix, transform, and build upon the material for any purpose, even commercially as long as you are providing attribution.
Also, the author of other international books can be asked for low price edition.

Smartphones: An Evil Device Stealing Children's Childhood

The Dark Side of Smartphones

The excessive use of smartphones can lead to significant neurological changes in children's developing brains. Research has found elevated levels of gamma-aminobutyric acid (GABA) in the brains of individuals with excessive smartphone use, resulting in poorer attention, control, and an increased tendency to be easily distracted. The constant flow of information and instant gratification provided by smartphones can also reduce children's attention spans and negatively impact their ability to focus. As children's brains are still developing, they are more susceptible to becoming dependent on the instant rewards and stimulation provided by these devices.

Impact on Emotional and Social Development

The excessive use of smartphones can also disrupt the healthy emotional and social development of children. The constant connectivity and instant gratification provided by these devices can interfere with their ability to regulate emotions effectively. Excessive screen time can lead to irritability, mood swings, and even depression when children are unable to access their devices. Moreover, the virtual world can become a substitute for real-life interactions, hindering the development of essential social skills and empathy. The overreliance on smartphones may also contribute to a sense of isolation and loneliness, as children spend less time engaging in face-to-face interactions and forming meaningful connections with peers and family members.

Smartphone addiction

Brick Phones for children

School phone ban: Blandford pupils to be offered 'brick phones'

While smartphones may have their drawbacks when it comes to children's use, it is important to recognize their utility in facilitating communication and ensuring children's safety. A viable alternative to consider is brick phones, which offer a simpler approach to communication. These basic devices prioritize voice calls and text messaging, eliminating the distractions and potential pitfalls associated with smartphones. Research consistently highlights the power of the human voice in fostering understanding and connection. By focusing on vocal communication, brick phones can provide a more intimate and meaningful interaction, allowing children to develop essential social skills without the distractions and potential risks of excessive screen time. This option strikes a balance between safety and healthy development, ensuring children can stay connected when needed while minimizing the negative impacts of excessive smartphone usage.

Being able to see another person, in short, did not make people feel any more connected than if they simply talked with them.This is consistent with several other findings suggesting that a person’s voice is really the signal that creates understanding and connection

The GI Joe Fallacy: knowing is not half the battle

While awareness of potential smartphone misuse is crucial, it is important to recognize that knowing about the issue is not enough to address it effectively—a phenomenon known as the "G.I. Joe Fallacy." Simply being informed about the potential dangers does not automatically lead to positive change. To truly protect children from the negative effects of smartphone overuse, we must take proactive steps and implement solutions. This involves educating both children and adults about healthy digital habits, setting boundaries and limits on screen time, and encouraging alternative activities that foster creativity, social interaction, and physical well-being. By taking action and not falling into the trap of the G.I. Joe Fallacy, we can ensure that smartphones become a positive tool in children's lives rather than a hindrance to their development.

But technology can also aid in learning

We indeed need specialized, high-security FOSS operating systems for children, stripping out all social media and other potentially harmful modes of communication. This way, only beneficial and educational tools remain accessible. It is doable, but the dangerous influence of big tech lobbyists trying to take over the education system and invade our privacy and freedom must be stopped at all costs.

Software should not be under the power of a software developer who unilaterally makes decisions that nobody else can change. Educational institutions should not allow proprietary software companies to impose their power on the rest of society and its future.

Do we have to fear machine learning or AI?

date: "2023-08-23"


categories

  • "blockchain"
  • "machine-learning"

tags:

  • "artificial-intelligence"

Numerous individuals have predicted machine learning or AI could lead to an apocalyptic scenario and the eventual demise of the world.
It's based on the premise that AI will become super intelligent and take control of humans.

But can we define superintelligence? Does any such thing exist?

We attain intelligence through experimentation and data. To predict something accurately, we need lots of variables, so increase in computation. There is no evidence that the rules of physics or the rules of the universe can be broken. So, AI running on the hardware of the universe can't break the laws of physics. For example, even AI will take thousands of years to crack a secure cryptography with current computing power. Maybe, with future quantum computers, if it is possible at all, some things can be done easily. However, quantum-safe cryptography still exists.

Some things are clear, though. To carry out a quantum computation, you need to keep all your qubits coherent. And this is very hard. Interactions of a system of quantum-coherent entities with their surrounding environment create channels through which the coherence rapidly “leaks out” in a process called decoherence. Researchers seeking to build quantum computers must stave off decoherence, which they can currently do only for a fraction of a second. That challenge gets ever greater as the number of qubits — and hence the potential to interact with the environment — increases.

[The Era of Quantum Computing Is Here. Outlook: Cloudy]

Weather forecast still require huge amount of computation and data, AI can't predict weather by scratch.

In the world of internet we can't know what is real and unreal, with emergence of deep fakes.

In this case, I don't think it's the AI that is creating the problem. It's the big tech social media platforms that maintain control of the algorithms and amplify propaganda, junk information, and viral content for profit.

With better moderation tools and a governance system for apps, it's possible to tackle disinformation. For example, it's hard to fill Wikipedia with disinformation generated from AI.

Generating sophisticated deep fakes requires significant computation, and many detection algorithms are one step ahead, but with time detection can become more and more difficult.

You can look at discussion of deepfake in crypto stackexchange:

Cryptography to tackle deepfake, proving the photo is original

crypto.stackexchange.com

Deepfake technology has become very difficult to tackle due to sophisticated machine learning algorithms. Now, even when a journalist or bystander provides photo or video evidence, the culprit denies it, claiming that it is the result of deepfake manipulation. Can TEE (Trusted Execution Environment) cryptography technology, like SGX, be used to validate whether a photo is original, taken directly from a camera, and free from any manipulation? This would ensure that the culprit cannot deny the authenticity of the photo. Does it require separate camera hardware, or can the right piece of software alone accomplish this? We can provide these special tools for journalists, etc., to decrease the harm caused by deepfake.

Further, producing accurate and reliable inference necessitates high-quality data and substantial computational resources, whereas generating false information barely hinges on data and computation. Good AI can predict false inferences.

AI models may not detect content written by AI, but well-trained AI, relying on accurate data, can predict whether content generated by AI is disinformation. Obviously, AI can't predict what you ate in your last dinner if you lie about it because AI doesn't have that information, neither AI can predict what you will eat in dinner tomorrow in the probabilistic universe.

Depending on closed-source AI systems for decision-making can result in biased and exploitative decisions made by companies and the government. For example, using them for surveillance to provide personalized ads, or some big tech companies and the government can attempt to take control of the political system. It's better to use locally open-source AI models to make predictions from your data.

There are also dangers associated with governments using AI to automate their military capabilities for mass killing, genocide and warfare. Implementing better democratic structures, designs, and international laws can help address such issues.

Some of the dangers associated with AI include the creation of atom bombs, bioweapons, and the escalation of cyber-attacks. Although there are obstacles in obtaining the necessary knowledge, raw materials, and equipment for such attacks, these barriers are diminishing, potentially accelerated by advancements in AI.

It is essential to note that the decrease in these barriers is not solely due to AI but is rather a result of advancements in other technologies. For example, a graduate biology student can build a virus with access to technologies such as DNA printers, chemical reagents for DNA mutation, NGS, etc.

AI can't create perpetual machines through its intelligence; it will consume energy and natural resources to function. Therefore, it needs to be used efficiently, only when necessary. Additionally, it cannot fully replace human labor.

AI, or artificial intelligence, operates as a statistical model, meaning that it relies on patterns and probabilities rather than providing deterministic results. Due to its statistical nature, errors are inherent in its functioning, and complete precision cannot be guaranteed. It is a tool that excels in tasks governed by well-defined protocols.

To illustrate, consider the analogy of cooking. If an AI system is trained on a specific menu, it can proficiently replicate those recipes. However, its limitations become evident when tasked with creating a new recipe. In such cases, there is no assurance that the outcome will be palatable.

Moreover, it's essential to recognize that AI doesn't possess the ability to think or make decisions in the way humans do. Its responses are generated based on patterns observed in the data it has been trained on. Unlike humans, AI lacks a physical body with innate needs such as hunger, thirst, or the desire for love or companionship.

Consequently, its outputs are based on the information contained in human-written data of human experiences. It cannot independently seek or comprehend fundamental human experiences.

AI can't fight for your privacy, women's rights, LGBTQ rights, disabled people, workers rights or climate change because they are not built with the same structure as humans and can't feel like humans. They don't have any evolutionary goals.

We make hundreds of decisions throughout the day based on how our human body feels. AI can't decide for us on its own because it can't feel like humans. It can't even make simple decisions, such as whether to take a bath, take a nap, or wash our hands, as AI doesn't need sleep and can't sense the coldness of water during a bath.

Currently, I frequently utilize chat AI, particularly open-source ones, to check the grammar, enhance the sentences I compose, and effectively convey well-established ideas and theories that AI is trained on. I am unable to use AI for generating new ideas and perspectives. AI does not possess a human brain or body and cannot feel or think like us.

If we were to simulate either our brain or our entire body, would it behave exactly like us?

No, as it violates the principle of form following function. A robot equipped with a simulated brain may replicate sensations like hunger, even that with an approximation, but it cannot consume actual food to satisfy that hunger or drink water to quench its thirst. The interaction with the environment will inevitably differ, leading to decisions that deviate from human decision-making processes.

Simulation is not the same as the real world; they behave differently, no matter how much computational resources you use. It cannot capture the full complexity of real situations. It's like attempting to feed the entire universe into a computer. Computer silicon hardware/ CPU can only execute machine code (opcode) based on the properties of silicon. Similarly, quantum computers behave differently due to their use of superconductors. To replicate the properties of water entirely, you need water itself; no simulation can achieve this. Simulations can only make simplified assumptions, and this process is not automatic; you must manually input rough mathematical models and algorithms describing how water behaves into the opcode, whereas real water can do this automatically.

Take for example Molecular dynamics simulation:

Unfortunately, the calculations required to describe the absurd quantum-mechanical motions and chemical reactions of large molecular systems are often too complex and computationally intensive for even the best supercomputers. Molecular dynamics (MD) simulations, first developed in the late 1970s , seek to overcome this limitation by using simple approximations based on Newtonian physics to simulate atomic motions, thus reducing the computational complexity.

These successes aside, the utility of molecular dynamics simulations is still limited by two principal challenges: the force fields used require further refinement, and high computational demands prohibit routine simulations greater than a microsecond in length, leading in many cases to an inadequate sampling of conformational states. As an example of these high computational demands, consider that a one-microsecond simulation of a relatively small system (approximately 25,000 atoms) running on 24 processors takes several months to complete.

Simulating our world will always be costly. Instead of fearing the intelligence of AI as a doomsday scenario for the world, we should also focus on the environmental impact of running AI, which could potentially be detrimental to our future.

Generative AI’s environmental costs are soaring — and mostly secret

One assessment suggests that ChatGPT, the chatbot created by OpenAI in San Francisco, California, is already consuming the energy of 33,000 homes. It’s estimated that a search driven by generative AI uses four to five times the energy of a conventional web search. Within years, large AI systems are likely to need as much energy as entire nations. A lawsuit by local residents revealed that in July 2022, the month before OpenAI finished training the model, the cluster used about 6% of the district’s water.

Humans cannot entirely rely on AI for decision-making due to its limitations; it can only serve as an assistant.

Reputed AI models like ChatGPT and a open source model like HuggingFace's Chat have the potential to make the world more truthful by providing a single source of truth trained on high-quality academic information.

Why Do People Believe the Earth Is Flat?

http://web.archive.org/web/20230802193056/https://nautil.us/why-do-people-believe-the-earth-is-flat-305667/

So there is a chunk of Flat-Earth believers who brand themselves as the only true skeptics alive. (“No, I will not believe anything that I cannot test myself.”) There are many things that are very difficult to test. It sometimes takes a certain amount of skill, or knowledge of mathematics, to be able to conclusively prove some things. Even people who dedicated their lives entirely to science have only so much time. Most of what we take as empirically falsifiable scientific truth we cannot falsify ourselves.

Let's set aside the realm of deep fakes, which involve the manipulation of celebrities' photos and are shared by some anonymous user. Instead, consider how one can trust an infographic or news article crafted by a journalist or scientist. Ultimately, it boils down to placing trust in institutions. Institutions with strong governance, ethical individuals, and well-designed incentives foster trust. Conversely, poorly governed institutions erode that trust.

Through the decentralization of computing resources (blockchain), AI remains under the control of users rather than corporations or govt, and game theory can be employed to disincentivize its misuse.

What do we need to decentralize in the coming years?

Here, is how we can stop AI from misuse, given by chatgpt:

Preventing the misuse of AI involves a combination of technical, ethical, and regulatory measures. Here are some steps that can be taken to address AI misuse:

  1. Ethical Guidelines and Regulation: Governments and organizations can establish clear ethical guidelines and regulations for the development, deployment, and use of AI technologies. These guidelines should address issues such as bias, privacy, security, and potential harm.

  2. Transparency and Accountability: AI systems should be designed with transparency in mind. Developers should provide explanations for AI decisions, making the decision-making process understandable and traceable. Accountability mechanisms should be in place to hold individuals and organizations responsible for AI misuse.

  3. Bias Mitigation: Developers should actively work to identify and mitigate biases in AI systems. Bias can lead to unfair or discriminatory outcomes. Regular audits and assessments of AI systems can help identify and rectify bias issues.

  4. User Education: Educating users about the capabilities and limitations of AI can help prevent its misuse. Users should be aware of the potential for AI-generated content to be manipulated or used for misinformation.

  5. Oversight and Review: Establish mechanisms for independent oversight and review of AI systems. This could involve third-party audits or regulatory bodies that assess the ethical and legal implications of AI applications.

  6. Collaborative Efforts: Governments, industry stakeholders, researchers, and civil society organizations should collaborate to establish norms, standards, and best practices for AI development and usage.

  7. Whistleblower Protections: Encourage individuals within organizations to report concerns about AI misuse without fear of retaliation. Whistleblower protections can help expose unethical practices.

  8. Continuous Research: Ongoing research in AI ethics and safety is essential to stay ahead of potential misuse scenarios. Researchers can develop techniques to detect and counteract AI-generated misinformation, deepfakes, and other harmful content.

  9. Global Cooperation: Given that AI has a global impact, international collaboration is crucial. Countries can work together to develop harmonized regulations and share best practices.

  10. Responsible Innovation: Tech companies and AI researchers should consider the ethical implications of their work from the outset and prioritize the development of AI that aligns with societal values.

Preventing AI misuse requires a multifaceted approach involving technology, policy, education, and ethical considerations. It's an ongoing challenge that requires vigilance and adaptation as AI technology evolves.

Understanding free will and how it can impact our behavior

date: "2023-11-28"


tags:

  • "philosophy"

Do you control your destiny? Is it you who makes choices throughout the day, including what you will eat for dinner and which movie you will watch? Our everyday existence rests upon a seemingly unshakable foundation: that we possess free will, the ability to consciously dictate our actions and decisions.
However, as we delve deeper into unraveling the intricate connections between conscious experience and the brain, the molecular biology of the body, and various organs, including the brain, as well as the molecular biology of cells, the certainty of this assumption begins to waver.

Can physics rescue our concept of free will?

Classical physics asserts that all future states can be determined from previous states, implying a predetermined course of events. In other words, all future states are already predetermined. A deterministic interplay of cause and effect. However, this perspective is challenged by quantum mechanics. At the quantum level, particles exhibit wave-like behavior, and their positions are described by probabilities. It's inherently probabilistic; for example, one can assign a probability value, such as a 16.66% chance for a die to land on six.

Double Split Experiment

Other atomic-scale entities, such as electrons, are found to exhibit the same behavior when fired towards a double slit. Additionally, the detection of individual discrete impacts is observed to be inherently probabilistic, which is inexplicable using classical mechanics.

Being probabilistic doesn't imply randomness or unpredictability. Instead, it means we can make predictions with a certain probability or accuracy. Cause and effect still exist, but there is always a chance that the same cause may not consistently produce the same effect.
To add complexity, there can be multiple variables or causes. However, even if you account for all variables, you still cannot predict the effect with absolute accuracy; there will always be some margin of error.
As a jest, we can predict the sunrise with 99.9999% accuracy, yet there remains a 0.0001% chance that unforeseen events, such as a black hole devouring the sun or a celestial dislocation, could prevent it. While 0.0001% may still seem big, it can also be infinitesimally small.

But the existence of probabilities does not imply the existence of free will, where we autonomously make our own decisions.

Impact on our behavior

A life with less anger:
Anger can arise when you dislike how others have acted or treated you, or when they treat your loved ones unfairly.
Although it's okay to feel angry, but you can delve deeper into the root causes of their actions.While it may sometimes be challenging to understand the causation, the effort to think rationally and seek understanding is valuable, preventing emotional drain.

A remedy for guilt and shame:
Guilt is rooted in the acknowledgment that one has committed a wrongdoing, potentially causing harm to others, whereas shame implies a personal flaw. Embracing the realization that not everything is within your control and that numerous external factors play a role can be emancipating.

An enlightened view of pride and privilege:
Whatever you achieve in life, whatever you have acquired, whether wealth or successful relationships, can be recognized as a confluence of factors beyond your control. Therefore, you are less likely to become a narcissist with inflated pride.

Increased empathy for others:
Understanding others' situations and trying to feel them can increase empathy. Understanding means trying to know the causation, which can prompt you to act with compassion to offer help. It can also contribute to a high degree of self-awareness.

Potential pitfall while talking about free will

It can also have a different and potentially negative impact if it's taken with a casual meaning.

Taking responsibility for your own actions:
You might start thinking that nothing is within your control, so why feel responsible for your actions? If everything is predetermined, why bother to act? The absence of free will is linked to the cause-and-effect relationship, and quantum mechanics posits that it is probabilistic. Your thoughts—how you think—have an impact on how you act, and how you act has an impact on others.

It's a feedback loop.

Meaning of life:
Thinking about the brain in terms of atoms, molecules, and chemical pathways can make life feel meaningless. One may fall into the fallacy of composition—no atoms are alive, so, therefore, nothing made of atoms is alive. However, being alive has a specific definition involving processes like respiration and growth. Form follows function, and different forms lead to different functions. Atoms don't have the same properties as molecules, and similarly, a human body doesn't have the same properties as individual atoms. At the system level, we are all interdependent and play specific, meaningful roles in terms of family, community, or the ecosystem.

Knowing about free will won't change the meaning that evolution has given us. Most of the time, you are likely to forget it. You will still continue to cook and enjoy tomorrow's food, gossip and laugh with friends, and work for your family or community.

It's a different matter that some big tech companies want us to transform into transhumans by attaching chips or producing genetically modified humans, disrupting the natural process of evolution. Such transhumans may not need food and won't experience human emotions. We derive meaning from our function, and altering our form will lead us out of existence.

Book Review: Tackling the Riddle of Free Will

Two provocative books explore the question of whether humans have control over their personalities, actions, and fates.

Feedback Loop for understanding free will

Thermostat a simple feedback loop

A thermostat is a simple feedback loop system that helps maintain a desired temperature in a room or building. It consists of four main components: a sensor, a controller, an actuator, and a setpoint.

Sensor

The sensor measures the temperature of the room. It is usually a thermistor or a thermocouple that changes its resistance or voltage output with temperature variations.

Controller

The controller compares the measured temperature with the desired temperature (setpoint). If the measured temperature is lower than the setpoint, the controller sends a signal to the actuator to turn on the heating system. If the measured temperature is higher than the setpoint, the controller sends a signal to turn off the heating system.

Actuator

The actuator is responsible for controlling the heating system (such as a furnace, boiler, or air conditioner). It receives the signal from the controller and adjusts the heating system accordingly.

Setpoint

The setpoint is the desired temperature that the user wants to maintain in the room or building. It can be adjusted manually or automatically based on the user's preferences and environmental conditions.

Our body also works through feedback loops at the cellular level

  • Book: Molecular Biology of the Cell, Bruce Alberts

In positive feedback, the output stimulates its own production; in negative feedback, the output inhibits its own production. Feedback loops are of great general importance in biology, and they regulate many chemical and physical processes in cells. Those that regulate cell signaling can either operate exclusively within the target cell or involve the secretion of extracellular signals. Here, we focus on those feedback loops that operate entirely within the target cell; even the simplest of these loops can produce complex and interesting effects.

Positive and negative feedback

In these simple examples, a stimulus activates protein A, which, in turn, activates protein B. Protein B then acts back to either increase or decrease the activity of A.i

Positive feedback in a signaling pathway can transform the behavior of the responding cell. If the positive feedback is of only moderate strength, its effect will be simply to steepen the response to the signal, generating a sigmoidal response like those described earlier; but if the feedback is strong enough, it can produce an all-or-none response.

Sigmoidal and all and none response

This response goes hand in hand with a further property: once the responding system has switched to the high level of activation, this condition is often self-sustaining and can persist even after the signal strength drops back below its critical value. In such a case, the system is said to be bistable: it can exist in either a “switched-off” or a “switched-on” state, and a transient stimulus can flip it from the one state to the other.

Feeback Loop

Cell memory and positive feedback loop

Through positive feedback, a transient extracellular signal can induce long-term changes in cells and their progeny that can persist for the lifetime of the organism. The signals that trigger muscle-cell specification, for example, turn on the transcription of a series of genes that encode muscle-specific transcription regulatory proteins, which stimulate the transcription of their own genes, as well as genes encoding various other muscle-cell proteins; in this way, the decision to become a muscle cell is made permanent. This type of cell memory, which depends on positive feedback, is one of the basic ways in which a cell can undergo a lasting change of character without any alteration in its DNA sequence.

Summary of feedback loop in cell

Each cell in a multicellular animal is programmed to respond to a specific set of extracellular signal molecules produced by other cells. The signal molecules act by binding to a complementary set of receptor proteins expressed by the target cells. Most extracellular signal molecules activate cell-surface receptor proteins, which act as signal transducers, converting the extracellular signal into intracellular ones that alter the behavior of the target cell. Activated receptors relay the signal into the cell interior by activating intracellular signaling proteins. Some of these signaling proteins transduce, amplify, or spread the signal as they relay it, while others integrate signals from different signaling pathways. Some function as switches that are transiently activated by phosphorylation or GTP binding. Large signaling complexes form by means of modular interaction domains in the signaling proteins, which allow the proteins to form functional signaling networks.

Target cells use various mechanisms, including feedback loops, to adjust the ways in which they respond to extracellular signals. Positive feedback loops can help cells to respond in an all-or-none fashion to a gradually increasing concentration of an extracellular signal and to convert a short-lasting signal into a long-lasting, or even irreversible, response. Negative feedback allows cells to adapt to a signal molecule, which enables them to respond to small changes in the concentration of the signal molecule over a large concentration range.

Feedback loop in brain

Take for example, feedback loop of anger and fear, activated by rumination and involving the amygdala, can be quite complex but generally follows a pattern:

Trigger

The loop typically begins with a trigger, which could be an external event or an internal thought or memory that provokes feelings of anger or fear. This trigger activates the amygdala, a region of the brain associated with processing emotions, particularly those related to survival instincts like fear and aggression.

Emotional Response

When the amygdala is activated, it sends signals to various parts of the brain that regulate emotions, resulting in an emotional response. In the case of anger, this might manifest as feelings of frustration, irritation, or hostility. In the case of fear, it might lead to feelings of anxiety, panic, or a heightened sense of danger.

Cognitive Appraisal

Following the emotional response, the brain engages in cognitive appraisal, where it interprets and evaluates the situation. Rumination, or repetitive thinking about the trigger and its consequences, plays a significant role here. Rumination often involves dwelling on negative thoughts, replaying scenarios, and focusing on perceived threats or injustices.

Amplification

Rumination can amplify the emotional response, making the feelings of anger or fear more intense and prolonged. This is where the feedback loop comes into play. The more one ruminates on the trigger and its implications, the more the amygdala is activated, leading to stronger emotional responses.

Physiological Effects

Alongside the cognitive and emotional processes, there are physiological effects associated with anger and fear. These can include increased heart rate, elevated blood pressure, muscle tension, and changes in breathing patterns. These physiological changes can further fuel the emotional response and perpetuate the feedback loop.

Behavioral Responses

Finally, the loop influences behavioral responses. For example, someone caught in this feedback loop might act out aggressively when experiencing anger or avoid situations that trigger fear. These behaviors can, in turn, reinforce the initial trigger or create new triggers, perpetuating the cycle.

Breaking this loop often requires interventions that address both the cognitive and emotional components, such as cognitive-behavioral therapy (CBT), mindfulness techniques, or stress-reduction strategies. These approaches aim to disrupt rumination, regulate emotional responses, and promote healthier coping mechanisms.

Important fallacies, paradox and biases

Correlation is not causation

"Correlation is not causation" is a principle that reminds us that just because two things are related or occur together, it doesn't mean that one causes the other. Here's a simple explanation with an example:

Imagine you notice that whenever the number of ice cream sales increases, the number of drowning incidents at the beach also increases. It might be tempting to think that buying more ice cream somehow leads to more drownings, or vice versa. However, the correlation between ice cream sales and drownings doesn't mean that buying ice cream causes drownings or that drownings cause people to buy more ice cream.

In reality, both the increase in ice cream sales and the rise in drowning incidents may be influenced by a third factor—warm weather. During hot summer days, people are more likely to buy ice cream to cool off, and they're also more likely to visit the beach, increasing the chances of drowning incidents. So, the correlation between ice cream sales and drownings is coincidental and doesn't imply a direct cause-and-effect relationship.

This example illustrates the importance of being cautious when interpreting correlations and highlights the need to consider other factors before concluding causation.

Dunning–Kruger effect

The Dunning–Kruger effect is a cognitive bias in which people with limited competence in a particular domain overestimate their abilities. Some researchers also include the opposite effect for high performers: their tendency to underestimate their skills. In popular culture, the Dunning–Kruger effect is often misunderstood as a claim about general overconfidence of people with low intelligence instead of specific overconfidence of people unskilled at a particular task.

Wikipedia: Dunning–Kruger effect

P-Hacking

P-hacking refers to the questionable practice of manipulating or "tweaking" various aspects of statistical analyses in research studies to achieve a statistically significant result, typically represented by a p-value less than a chosen significance level (often 0.05). The p-value is a measure that helps researchers determine if their results are statistically significant or if they might have occurred by chance.

Researchers may engage in p-hacking with the intention of finding patterns or results that seem significant, even if the underlying data do not genuinely support such conclusions. P-hacking can involve various tactics, such as:

  • Selective reporting: Choosing to report only certain aspects of the data that support the desired conclusion while omitting others.

  • Data dredging or fishing: Analyzing data in multiple ways until a statistically significant result is found, without pre-specifying the analysis plan.

  • Stopping data collection when significance is reached: Continually collecting data and stopping the analysis as soon as a significant result is achieved.

  • Exclusion of data points: Removing outliers or specific data points that would undermine the significance of the findings.

P-hacking is problematic because it can lead to false-positive results, making it seem like there is a significant effect when, in reality, there isn't. It undermines the reliability and validity of scientific research by introducing bias and inflating the likelihood of making Type I errors (incorrectly concluding that an effect exists). To address this issue, researchers are encouraged to follow pre-registered study protocols, clearly state their analysis

Wikipedia: Data dredging

Motte-and-bailey fallacy

The Motte-and-Bailey fallacy is a way of making an argument that involves switching between two positions: a "Motte" position and a "Bailey" position.

The "Motte" is a defensible but not very controversial position, and the "Bailey" is a more controversial and less defensible position. When someone is challenged on the controversial "Bailey" position, they retreat to the more defensible "Motte" position. Essentially, it's like having a strong fortress ("Motte") and a less defensible but more desirable piece of land ("Bailey"). When under attack, you retreat to the fortress, then return to the desirable land when the threat has passed.

In simpler terms, it's a way of arguing where someone defends an easy-to-defend position but really wants to promote a more controversial idea. If their controversial idea is challenged, they fall back on the safer, more defensible position.

For example, imagine someone arguing that "All desserts are healthy because they contain fruits." If questioned about the healthiness of a specific sugary cake, they might retreat to saying, "Well, I meant fruit salads are healthy." In this case, the "fruit salads are healthy" is the defensible "Motte," and the initial claim that "All desserts are healthy" is the controversial "Bailey."

Wikipedia: Motte-and-bailey fallacy

Burden of Proof

The burden of proof is a concept in logic and argumentation that addresses the responsibility one has to provide evidence or support for a claim they make during a debate or discussion. It establishes which side in an argument is required to present evidence to justify or validate their assertions.

In simple terms, the burden of proof asks: Who needs to provide evidence to support their claim?

There are generally two positions in an argument:

  • The Affirmative (or Positive) Claim: This is the side making an assertion, proposing something new, or making a claim about reality.

  • The Negative (or Skeptical) Position: This is the side that questions or rejects the affirmative claim.

The burden of proof usually rests on the party making the affirmative claim. The basic idea is that if you're asserting something new or making a claim, the responsibility is on you to provide evidence to support that claim. The other side is not required to prove the claim false; they can simply point to a lack of evidence or logical flaws in the argument.

For example:

  • Affirmative claim: "This herbal tea can cure insomnia."

    Burden of proof: The person making this claim is responsible for providing evidence, such as scientific studies or testimonials, to support the idea that the herbal tea is an effective cure for insomnia.

  • Negative position: "I don't believe that herbal tea can cure insomnia."

    Burden of proof: The person in the negative position doesn't necessarily have to prove that herbal tea cannot cure insomnia; instead, they can highlight the lack of evidence or flaws in the argument presented by the affirmative side.

In legal contexts, the burden of proof may shift based on the nature of the claim or the type of case. However, in everyday discussions and debates, the general principle is that the person making a claim is expected to provide evidence to support it.

The GI Joe Fallacy: knowing is not half the battle

The phrase "Knowing is half the battle" is a slogan associated with the animated television series "G.I. Joe: A Real American Hero," which aired in the 1980s. The idea behind the slogan is that being informed or aware of a situation is a significant step toward addressing or solving it. However, the concept of the "G.I. Joe Fallacy" suggests that simply knowing about a problem or having information is not enough to effectively address or resolve it.

In other words, while knowledge is valuable, taking action is the other crucial part of the equation. The fallacy highlights the misconception that awareness alone is sufficient for overcoming challenges. It emphasizes the importance of not stopping at acquiring information but also actively applying that knowledge to achieve a desired outcome.

For example, if someone is aware of the negative health effects of a sedentary lifestyle, simply knowing about it is not enough. The person needs to take action by incorporating regular physical activity into their routine to experience the benefits.

In summary, the "G.I. Joe Fallacy" is a reminder that awareness or knowledge is only a part of the solution, and meaningful action is necessary to address and overcome challenges effectively.

Tradeoff and Opportunity Cost

The concepts of tradeoff and opportunity cost are fundamental in economics and can be observed in various aspects of our daily lives.

Tradeoff:

Tradeoffs are omnipresent because resources are limited. In the context of building codes, entrepreneurs face a tradeoff between ensuring consumer safety and the cost of implementing safety measures. For instance, installing sprinklers and safety glass may enhance safety but also increase the overall cost of products. This tradeoff means that entrepreneurs must decide how much safety they can afford without significantly raising prices or hindering their ability to open new businesses.

Example: The coffee shop's decision to install sprinklers is a tradeoff. While it enhances safety during a fire, it incurs additional costs. The tradeoff is between making the building safer and potentially increasing the cost of coffee. The example expands to the decision of opening a second location, where a more stringent building code increases both direct monetary costs and the opportunity costs of time and effort. This demonstrates how tradeoffs are inherent in various aspects of life, from business to education.

Opportunity Cost:

Opportunity cost is the value of the next best alternative. In the scenario of building improvements, the opportunity cost is the potential alternative uses of the resources spent on safety measures. For instance, the money used for sprinklers and safety glass could have been invested in research and development, marketing, or other aspects of the business. The opportunity cost highlights what is foregone in terms of potential benefits when a particular choice is made.

Understanding these concepts is crucial because they apply not only to monetary decisions but also to choices involving time and resources. Even non-monetary decisions, such as spending time with loved ones, involve opportunity costs that are not easily measured in dollars and cents. Economics provides a framework for comprehending these tradeoffs and opportunity costs, allowing individuals and businesses to make informed decisions in a world where resources are limited.

Example: Jenny's decision to go on a third date with Adam has associated costs like the Uber ride and the chai tea latte. However, the opportunity cost, in this case, is the value of the next best alternative, such as having breakfast with her sister. It emphasizes that decisions involve tradeoffs, and considering alternatives is crucial to avoid wasting scarce resources like time and energy.

Marginal Thinking and the Sunk Cost Fallacy

Marginal Thinking:

  • Definition: Marginal thinking involves evaluating the additional or incremental benefit and cost of a specific action when making decisions.
  • Explanation: When faced with a decision, instead of considering the total or overall cost and benefit, marginal thinking focuses on the extra or additional impact of the next unit of the activity. If the marginal benefit outweighs the marginal cost, it is considered a rational decision. This approach allows individuals to optimize their choices by assessing the impact of small changes on the overall outcome.
  • Example: When deciding how long to watch TV, marginal thinking involves considering whether the additional enjoyment gained from watching one more episode exceeds the cost of the time spent. Similarly, a clothing shop using marginal thinking in pricing would assess whether lowering the price slightly would attract more customers without significantly reducing overall profit.

Sunk Cost Fallacy:

  • Definition: The sunk cost fallacy is a cognitive bias where individuals consider the resources (time, money, effort) already invested in a decision and let those sunk costs influence future choices.
  • Explanation: Instead of focusing on the marginal benefit and cost of the next action, people fall into the sunk cost fallacy by dwelling on what has already been invested. This fallacy can lead to irrational decision-making, as past investments should not impact the assessment of future opportunities. The key idea is to recognize that sunk costs are irreversible and should not be a primary factor in determining the value of future actions.
  • Example: If someone has paid for a ticket to a movie they find boring, applying marginal thinking would involve evaluating whether staying for the rest of the film provides more enjoyment than leaving. The sunk cost fallacy occurs if the decision is influenced by the fact that money has already been spent on the ticket, despite the lack of enjoyment.

In summary, while marginal thinking involves comparing the additional benefits and costs of the next action to optimize decisions, the sunk cost fallacy warns against letting past investments unduly impact future choices. It's about focusing on what can be changed in the future rather than dwelling on irreversible past expenditures.

Nudge Theory

Nudge theory involves subtly influencing individuals' behavior without imposing mandates. In education, the expert or teacher acts as a "nudger," guiding students to recognize the relevance and benefits of a subject. By highlighting the practical applications and fostering curiosity, they encourage a positive attitude toward learning. This approach aims to gently steer individuals toward making informed choices and embracing the intrinsic value of education.

In 2008, Richard Thaler and Cass Sunstein's book Nudge: Improving Decisions About Health, Wealth, and Happiness brought nudge theory to prominence. The authors refer to the influencing of behaviour without coercion as libertarian paternalism and the influencers as choice architects.

Thaler and Sunstein defined their concept as the following:

A nudge, as we will use the term, is any aspect of the choice architecture that alters people's behavior in a predictable way without forbidding any options or significantly changing their economic incentives. To count as a mere nudge, the intervention must be easy and cheap to avoid. Nudges are not mandates. Putting fruit at eye level counts as a nudge. Banning junk food does not.

Nudge theory offers a cost-effective approach to influencing behavior because it focuses on small, strategic interventions that are easy and cheap to implement, non-intrusive, and scalable. By encouraging intrinsic motivation and voluntary participation, nudge interventions can lead to long-term behavioral change without the need for significant financial investments or disruptive changes to existing systems.

Non-intrusive refers to actions or interventions that do not interfere with or disrupt the normal functioning, routine, or autonomy of an individual or system.

Open Source or Free Software or FOSS Philosophy

gnu.org Philosophy

What is a Free Software

“Free software” means software that respects users' freedom and community. Roughly, it means that the users have the freedom to run, copy, distribute, study, change and improve the software.

Thus, “free software” is a matter of liberty, not price. To understand the concept, you should think of “free” as in “free speech,” not as in “free beer.”

When users don't control the program, we call it a “nonfree” or “proprietary” program. The nonfree program controls the users, and the developer controls the program; this makes the program an instrument of unjust power.

The four essential freedoms

A program is free software if the program's users have the four essential freedoms:

  • The freedom to run the program as you wish, for any purpose (freedom 0).
  • The freedom to study how the program works, and change it so it does your computing as you wish (freedom 1). Access to the source code is a precondition for this.
  • The freedom to redistribute copies so you can help others (freedom 2).
  • The freedom to distribute copies of your modified versions to others (freedom 3). By doing this you can give the whole community a chance to benefit from your changes. Access to the source code is a precondition for this.

The freedom to study the source code and make changes

In order to the freedom to make changes and the freedom to publish the changed versions to be meaningful, you need to have access to the source code of the program. Therefore, accessibility of source code is a necessary condition for free software. Obfuscated “source code” is not real source code and does not count as source code.

Source code is defined as the preferred form of the program for making changes in. Thus, whatever form a developer changes to develop the program is the source code of that developer's version.

Proprietary Software Is Often Malware

Proprietary software, also called nonfree software, means software that doesn't respect users' freedom and community. A proprietary program puts its developer or owner in a position of power over its users. This power is in itself an injustice.

Power corrupts; the proprietary program's developer is tempted to design the program to mistreat its users. (Software designed to function in a way that mistreats the user is called malware.) Of course, the developer usually does not do this out of malice, but rather to profit more at the users' expense. That does not make it any less nasty or more legitimate.

Yielding to that temptation has become ever more frequent; nowadays it is standard practice. Modern proprietary software is typically an opportunity to be tricked, harmed, bullied or swindled.

Injustice Techniques

GNU Org: Proprietary

Free is not free access to closed source app

The term "free" in FOSS does not mean that users have free access to api of closed-source applications.

You have access to use the program for free, but in closed source software you have no control over the app; neither can you distribute it freely. For example, an ed tech company can provide some material within the app for free, but make it patented and illegal to share or modify it by others.

In this scenario, the term "free" refers to the lack of monetary cost associated with using the app, but it does not equate to freedom in terms of control and usage. Users have limited rights and are subject to the conditions set by the company, which may restrict their ability to modify, share, or distribute the app.

Proprietary software, such as the example mentioned, often relies on patents and copyrights to protect its intellectual property and maintain control over its users. This creates an imbalance of power, where the developer or owner holds all the rights to the software and its users must abide by their terms and conditions.

In contrast, Free and Open Source Software (FOSS) offers users the freedom to run, copy, distribute, study, change, and improve the software without any restrictions. The source code of FOSS is openly available for anyone to inspect, modify, and share. This ensures that users have control over their software and are not subject to the limitations imposed by proprietary software companies.

By choosing FOSS, users can avoid the risks associated with proprietary software, such as restrictions on usage, distribution, and modification. FOSS fosters a collaborative and transparent environment, where users can contribute to the development and improvement of the software, ensuring that it remains safe, secure, and trustworthy.

“Free” as in freedom, to show we do not mean the software is gratis

When we say that open source software is "free" as in freedom, we mean that users have the liberty to use, study, modify, and distribute the software without any restrictions. This freedom empowers users to take control of their software, adapt it to their needs, and contribute to its development.

However, this does not imply that developers working on open source projects must work unpaid. While many developers contribute to open source projects out of passion or as a hobby, there are several ways in which developers can be compensated for their work. Some of these include:

  • Employment: Developers can be employed by companies or organizations that use, maintain, or contribute to open source projects. In this case, they are paid for their work on the project as part of their job responsibilities.
  • Grants and sponsorships: Some organizations and foundations provide grants or sponsorships to fund the development of open source projects. This can help cover the costs of development, including paying developers for their work.
  • Donations: Open source projects can receive donations from individuals or organizations who support their work. These donations can be used to fund development, including paying developers for their contributions.
  • Decentralized Governance: With the development of decentralized fair governance using blockchain, open source developers can be paid more fairly for their contributions. Some governance systems, such as Polkadot's OpenGov, are already paying open source developers.

There are several ways in which developers can be compensated for their work on open source projects, ensuring that they can continue to contribute to the community without sacrificing their livelihood.

Open source and security

Open source software has gained immense popularity over the years, and for good reason. One of the primary benefits of open source software is the increased security it offers. The open source model encourages collaboration and transparency, which allows for a more thorough examination of the code, leading to the identification and correction of security vulnerabilities.

Free and Open Source Software (FOSS) refers to software that is both free to use and modify, as well as open for anyone to examine the source code. This transparency allows for a wider pool of experts to review the code, leading to the identification and correction of security vulnerabilities. In contrast, proprietary software is often developed behind closed doors, with only a select few individuals having access to the source code. This limited review can result in security vulnerabilities going undetected for extended periods, leaving users vulnerable to attacks.

The open source community is quick to address security issues as they arise. When a vulnerability is discovered, developers from around the world collaborate to develop and distribute patches to fix the issue. This rapid response helps to minimize the potential impact of security breaches and protect users from harm. Additionally, the open source community often has a culture of responsible disclosure, where security researchers inform developers of vulnerabilities before publicly disclosing them, giving developers time to develop and release patches before the vulnerability becomes widely known.

Open source software is also less susceptible to targeted attacks, such as zero-day exploits, which are vulnerabilities that are unknown to the developers and for which no patch exists. Since the source code is available for inspection, security researchers can identify and report these vulnerabilities more quickly than they can with proprietary software. This increased scrutiny helps to reduce the likelihood of zero-day exploits being successfully used against open source software.

In conclusion, open source software offers a higher level of security compared to proprietary software. The collaborative nature of the open source community and the transparency of the code allow for a more thorough examination of the software, leading to the identification and correction of security vulnerabilities. The rapid response to security issues and the reduced susceptibility to targeted attacks make open source software a more secure choice for users and organizations alike.

- Schneier on Security

Bread and Circus in the Digital Age: A Modern-Day Distraction from Reality

In ancient Rome, the phrase "bread and circus" referred to the political strategy of keeping the masses entertained and fed, thereby distracting them from the harsh realities of their lives. Today, we have entered a new era of distraction, where fast food and apps have replaced the traditional circus and bread. However, the underlying concept remains the same: to divert attention away from what's truly happening in society and the world.

Fast food, with its alluring taste and convenience, has become an integral part of modern life. While it may seem harmless at first glance, the negative impact of fast food on public health is well-documented. Obesity, heart disease, and diabetes are just a few of the health issues that have been linked to the consumption of fast food. Yet, the industry continues to thrive, and its products are often marketed to the most vulnerable populations, including children and low-income families.

Similarly, the proliferation of apps and social media platforms has led to a culture of constant distraction. The average person spends hours each day scrolling through their smartphone, immersed in a world of memes, viral videos, and personalized content. While these platforms can provide entertainment and a sense of connection, they can also be used to manipulate and exploit users. Misinformation, targeted advertising, and addiction to social media are just a few of the negative consequences associated with our reliance on technology.

Despite the benefits digital technology, we must consider the broader implications of these distractions. In the same way that the Roman elite used bread and circus to maintain control over the masses, modern society is increasingly using these tools to keep people complacent and disengaged from important issues.

As we grapple with pressing global challenges such as climate change, political polarization, and wealth inequality, it is crucial that we do not allow ourselves to be distracted by the allure of fast food and apps. Instead, we must strive to stay informed, engaged, and committed to creating a better world for ourselves and future generations.

So, the next time you find yourself mindlessly scrolling through your phone or craving a burger and fries, take a moment to reflect on the true purpose of these distractions. Are they providing genuine fulfillment and nourishment, or are they merely keeping you from confronting the uncomfortable truths of our world? By recognizing the role that bread and circus play in our lives, we can begin to break free from their hold and work towards a more conscious and connected society.

Meta's decision to downrank or hide political content

First look: Meta won't recommend political content on Threads

The modern-day "bread and circus" phenomenon, Meta's decision to downrank or hide political content on its Threads platform can be seen as a continuation of the age-old strategy of distracting the masses from pressing societal issues. By choosing to suppress content related to politics, Meta effectively perpetuates a culture of disengagement and apathy, preventing users from staying informed about critical matters that affect marginalized communities and the world at large.

The company's decision to label certain topics as "political" and downrank it is particularly problematic, as it conflates legitimate news and discourse with partisan politics. Issues such as race, gender, disability, climate change, and public health are often politicized, not because they inherently belong to a specific political ideology, but because they involve power dynamics and systemic inequalities that challenge the status quo.

By framing these issues as "political," Meta not only discourages users from engaging with crucial information but also contributes to the silencing of marginalized voices. This censorship further perpetuates the marginalization of historically oppressed groups and hinders progress towards a more equitable and just society.

Moreover, the fact that Meta's algorithm determines what counts as "political" content raises concerns about the platform's potential for manipulation and censorship. With the power to shape the online discourse, Meta holds significant influence over public opinion and the spread of information.

How to know who’s trustworthy

https://psyche.co/guides/how-to-spot-whos-trustworthy-and-whos-not-on-what-matters

We need others’ help to figure out what and how to think. Many issues are just too complex for us to tackle on our own. They’re often the subject of bewildering and vociferous debate, and it’s not always easy to know whom to turn to as a guide. We have to make difficult decisions about who should influence our thinking.

Think about any complex issue you’ve recently considered. Perhaps you’ve been thinking through where you land on the antiracism protests, on reopening the economy after the pandemic, or on the presidential election in the United States. You’re almost certainly not considering any of this in an isolated vacuum. You’re depending on others, for better or worse.

You might think we could fix this problem simply by asking the experts. They know what they’re talking about, even if the rest of us don’t. This is sound advice as far as it goes – but it doesn’t go far enough. Sometimes it’s hard to identify who the experts are. Sometimes the experts themselves disagree. Sometimes we lack access to experts. Sometimes experts are manipulated by perverse incentives.

Even more importantly, expertise alone can rarely settle the questions that matter to us. This is because settling these issues isn’t just about making a list of facts. It’s about deliberating about these facts in light of our values and objectives. We have to figure out what we, in our particular situation, should do about the facts. And we can’t figure that out without moral clarity and knowledge of ourselves.

Key points – How to know who’s trustworthy

Ask yourself these questions about those you might depend on:

Do they get excited when I make intellectual progress, or only when they influence my views?

The foundational virtue of an intellectually trustworthy person is a genuine care for your intellectual wellbeing. If they’re interested only in influencing your views, research suggests that they might attempt to lead you in more extreme directions.

Are they fearful about sharing their ideas? Are they over-eager for others to approve of their ideas?

What you need is someone who’s transparent in sharing their perspective with you. If the other person is too fearful or eager to please, this can lead them to misrepresent their views, leaving you misinformed.

Are they willing and able to clarify their meaning if I ask them to?

Intellectually dependable people realise that beneficial communication needs to make sense. If the other person shies away from clarifying their meaning, or insists it’s your problem for not getting it, you’re unlikely to learn much from them.

Do they demonstrate an appreciation of my unique perspective, needs and abilities?

It’s important for those you depend on to fit their communications to who you are. If they’re too interested in themselves to pay attention to you, or if they take a distorted view of who you are, this can prevent them from sharing what it’s most important for you to know.

Do they show patience in trying to understand the complexities of my predicament, or are they in a hurry to identify a solution?

A hallmark of the wisdom demanded by an intellectual guide is the ability to patiently suss out the intricacies of the dilemmas you face. Being over-eager to recommend a solution can lead the other person to misdiagnose your case.

Grit: The power of passion and perseverance

Learning strategies are undeniably crucial, but so is grit. The kinds of things you need to learn in seventh grade math, sure, they're hard: ratios, decimals, the area of a parallelogram. But these concepts are not impossible, and I was firmly convinced that every one of my students could learn the material if they worked hard and long enough.

Growth Mindset

So far, the best idea I've heard about building grit in kids is something called "growth mindset." It is the belief that the ability to learn is not fixed, that it can change with your effort. Dr. Dweck has shown that when kids read and learn about the brain and how it changes and grows in response to challenge, they're much more likely to persevere when they fail, because they don't believe that failure is a permanent condition.

Growth Mindset: Clearing up Some Common Confusions

Employment Data

Why 75% of Indian Women are Unemployed ??

Three out of four Indian women are unemployed. That’s more than Saudi Arabia — a country where women have only been allowed to drive since 2018. This is no statistical sleight of hand. In fact, “three out of four” is wildly conservative.

This number — called the “labor force participation rate” includes both anyone with or without a job — as long  as they’re looking, however passively.

Of those 24% of women technically in the “labor force”, many don’t actually work. Then there’s the question of “what counts as ‘employment’?” In this case, the answer is as little as one hour each week of paid labor.

Put differently: of India’s 1.4 billion people, 681 million are women, 509 million of those are at least 15 years old, 122 million officially in the “labor force”,  and a tiny 38 million — 8.8% — according to the Indian think-tank — meaningfully employed.

In a country of 1.4 billion, in other words, just 38 million women have jobs.  The United States, by contrast,  has twice as many women employed — in absolute terms — with only one-fourth the population.

How can that possibly be true? Could it be that Indian households are now rich enough to comfortably subsist on one income?

No, far from it. The country’s per capita GDP is less than $2,400 — just  one-fifth the world average and where China was about twenty years ago.

Is it because women lack access to education?

According to the World Bank, “better educated women are more likely to  participate in the formal labor market”.

Again, no.

Strangely, in India, educated women are less likely to find employment.

College enrollment has soared since the turn of the century, yet women’s participation in the labor force has actually been on a steady decline until very recently.

Perhaps it’s precisely because women are in school — studying, rather than working.

Nope. It’s not that either, since older women are also missing from the labor force.

Finally, could it be an issue of personal safety or cultural expectations?

Certainly this is a major piece of the puzzle. India is one of the world’s most dangerous countries for women. Just getting to and from work safely presents a not insignificant challenge.Meanwhile, 99% of Indian women eventually get married, 90% of those marriages are arranged,  and women are expected to do nearly all of the housework.An extraordinary six percent of men report doing any cooking whatsoever and only 8% do at least some cleaning. More of women’s time spent cooking and cleaning is less time for paid labor.

Case: closed.

Bangladesh vs India

Except, hang on — take a look at India’s neighbor-on-three-sides, Bangladesh.

The two countries rank nearly identically on the “Women’s Peace and Security Index” — that is,  very poorly. They share many of the same cultural norms, practices, and beliefs. And yet, women in Bangladesh work at a much higher rate.

Clearly there’s much more to this story. What’s really going on?

The answer lies in this graph.

But first, a brief aside.

In India, like many countries, a family’s honor depends on the “purity” of its daughters. Any time spent outside the home — for example,  at work — exposes women to accusations of promiscuity, tarnishing her family’s honor. Parents, therefore, strongly pressure their daughters to stay home. Of course, working also has its benefits — children are expected to contribute financially.

This presents a trade-off between income and honor.

And since honor is more-or-less a constant, the important variable here are wages — for any given family, is the extra money generated by allowing your daughter to work worth the damage to your reputation, and, by extension, her marriage prospects?

When families are poor, this loss of honor is strongly preferable to the alternative — starvation. Women have no choice; they have to work.

Conversely, when wages are high, they offset this honor “penalty”, causing women to rejoin the workforce.

The U curve

India, as a country, is stuck at the bottom of this “U” curve — what Dr. Alice Evans of King's College London calls the “patrilineal trap”.Wages are just barely high enough that families can scrape by on one income,  but not high enough to draw women back to the workplace.Women are trapped between low wages and suffocating social norms. They do go to college — though mainly to find a husband.And they do want to work. In a recent survey, 75% of teenage girls said they hoped to find a job after graduating.

The problem is that wages aren’t high enough to convince their families. The real mystery, then, is why Indian wages are still so incredibly low.

Since 1990, its economy has grown at an impressive average rate of 6% a year — not so far behind China’s miraculous 8.8%. Back then, India was only the world’s twelfth-largest economy. Today, it’s the fifth. Yet somehow this spectacular growth failed to create any jobs.

Now, economists call the number of new jobs produced for every 1% change in  GDP the “elasticity of labor”. Well, between 2011 and 19, the Indian labor force grew by 0.26%, imputing an elasticity of 0.04 — which is a polite way of saying  virtually zero jobs were created over 10 years. This implies that if its economy were to double overnight, employment would only increase by 4%.

Between 1999 and 2005, 60 million new jobs appeared. Between 2004 and 10, just 3. The result is fierce competition for every last scrap of paid work. In 2019, 12 million people applied for 35,000 railroad jobs, and 1.7 million for 1,500 jobs at a state-owned bank. Most of these applicants are young, and the vast majority college-educated. Those who are both young and college-educated don’t stand a chance. Today, 42% of Indians under 25 with graduate degrees can’t find work.

So, what do all these young scholars do? They go back to school, of course — fueling a race to acquire an increasing number of unnecessary credentials or else fall behind. Others simply lose hope and spend their days doing what Indians call “timepass” — aimless leisure. Now, one clue to the whereabouts of these missing jobs is the country’s most common occupation — not salesperson, waiter, or janitor but “CEO”. Truly. You see, contrary to the image of sweatshops many around the world imagine, Indian employers are  actually quite tightly regulated. Legally, they must provide workers with paid leave, pensions, and health insurance. They even need permission  from the government to fire or lay them off.

At least, in principle.

In practice, most of these laws only apply to businesses with 10 or more employees.And, unrelatedly, for some odd reason Indian  companies seem to have decided nine is the optimal number of workers.

So, what do you know — the vast majority of businesses are exempt from these regulations.

Another reason they stay small is to evade corruption.

Companies with 10 or more workers are visited by labor inspectors, many of which enforce arcane rules to extract bribes.Thus, whereas China has a healthy balance of mid-size companies — many of which have between 51 and 200 workers, over 80% of Indian apparel firms, for instance, have less than eight.

With so many small businesses, it’s no wonder India has perhaps the  world’s highest density of “CEOs”. As companies grow, rather than hire more workers, they simply outsource this additional labor to other small companies.

But this loophole — clever as it is — has a cost: smaller companies are less productive.

On average, those with 50-199 workers are about 60% less productive than those with over 200, and those with 5-49 workers about 90% less productive.

Lower productivity means lower wages. Lower wages mean less consumer demand. And less demand means fewer jobs. Not just fewer but also lower quality. Only 21% of Indian workers earn regular wages. Of them, 46% don’t receive any paid leave, 53% don’t receive social security, and nearly 60% have no written contract at all.

This “flexibility” — as employers call it — is  stressful and unpredictable  during the best of times.When things are anything less than peachy, these informal jobs become downright catastrophic. Like, say, during a global pandemic.

In 2020, the Prime Minister declared what began as a three-week national lockdown which immediately put 100 million Indians out of work, who fled en masse to the countryside — the only place they could go.By December of that year, 75 million people had been plunged below the poverty line of $2 a day, according to Pew Research.

But there’s another, bigger, structural, reason why India has so few jobs. Of the countries that successfully escaped poverty in the last hundred years, almost all have pursued the same,  tried and true development recipe: a rapid progression from agriculture to manufacturing to services — in that order. It worked for Taiwan, Hong Kong, Singapore, South Korea, and now China. India, on the other hand, seems to have somehow missed this memo. By the time its economy  liberalized in the early 1990s, China was already ten years into this journey. And having started so late, Indian factories couldn’t compete with their Chinese competitors. So, they largely gave up. I

Instead, India skipped straight from agriculture to services — leaving out that very critical middle step in the recipe: manufacturing.

Today, Vietnam — with a population of less than a hundred million — exports more clothing than India, with a population of 1.4 billion. Now, there’s nothing wrong with services. Nearly all rich countries are service economies — from the U.S. to Japan and Switzerland. So you might think India found a shortcut. The country has an impressive depth of finance, insurance, real estate, and technology expertise. Deloitte, Goldman, and Tata pay their Indian consultants and bankers top-dollar — much more,  of course, than most factory workers.

The problem is that there just aren’t that many of these jobs. As Indian farmers have grown more productive, as they have across the globe, agriculture has been on a steady decline. No surprise there. Usually, however, all these farmers would become factory workers. One labor-intensive industry replaced with another.But, as you can see, manufacturing hasn’t absorbed these displaced farmers. Sure, these new service jobs have helped — just not nearly enough.

So, in order to make up the difference, Indians have flocked to construction.

These jobs are often temporary, low-paid, and physically dangerous.But this trend is particularly bad for women. In East Asia, where manufacturing replaced agriculture — women became factory workers, which slowly influenced social expectations and afforded them newfound freedom. In India, women were pushed out of farming but discouraged from taking on construction. A few lucky women secured lucrative service jobs. But the vast majority simply left the labor market altogether. They had nowhere to go.T his is why India’s economy continued to grow — those new service jobs are  very very productive — while the number of jobs did not — they’re few and far between.

It’s why women in Bangladesh work at much higher rates — its many factories provide  them with a socially-acceptable place to do so, whereas India has no such scale. What India does have — that most of Asia does not — is time.China’s population peaked last year and its labor force is expected to decrease by about 1% every year starting in 2030.

India, meanwhile, is still very much young and growing. 40% of its population is under the age of 25, and 53% under 30. Its median age is a youthful 28, compared to China’s 38, or Japan’s 48.

With any luck, India has about two-decades remaining in its “demographic window” — a critical transition period during which a country has a large number of working-age people compared to children and retirees.

If the country can harness this labor, it could still experience a taste of the demographic dividend that propelled China from a poor to a middle-income country. By merely employing women at the same rate as men, according to Bloomberg, India’s economy could grow by nearly a third by 2050.

But, if it wastes this opportunity, these excess young people could become a demographic burden.

In that case, it would be stuck with millions of angry, aimless, and unemployed 20, 30, and 40 year-olds. Simply put: India has no time to  waste.

Protest against unemployment

Population data


{
    "year": "2021",
    "reference": "https://en.wikipedia.org/wiki/Demographics_of_India",
    "data": [
        {
            "age": "0-14 years",
            "male": 183695000,
            "female": 166295000,
            "percentage": 25.68
        },
        {
            "age": "15-64 years",
            "male": 472653000,
            "female": 447337000,
            "percentage": 67.49
        },
        {
            "age": "65 and over",
            "male": 44275000,
            "female": 48751000,
            "percentage": 6.83
        }
    ]
}

Percentage by payroll

Payroll Data EPFO Dec 2023

epfindia.gov.in

Net payroll Dec 2023: 1529277

Percentage of people got payroll in dec 2023 (age: 15-64) = 0.16

percentage = (1529277/(472653000+447337000))*100
print(percentage) 
# 0.16622756769095318

To do (Not found the data yet)

  • State wise calculation
  • District wise calculation
  • By male
  • By female
  • By other gender
  • By Salary range

Navigating the Coding Odyssey: A Glimpse into a Coder's Experience

Introduction:

Coding, often hailed as the language of machines, is an intricate dance between creativity and logic. As one delves into the world of programming, a myriad of experiences unfold. From the initial spark of an idea to the inevitable debugging sessions, a coder's journey is marked by challenges, triumphs, and a relentless pursuit of efficiency. In this article, we'll explore the rollercoaster of emotions that accompanies a coder's experience.

The Blank Canvas of Creativity:

Every coding project begins with a blank canvas – a fresh file waiting to be filled with lines of code. The coder is an artist armed with a keyboard, transforming abstract concepts into tangible solutions. The initial stage is a mix of excitement and uncertainty, as the coder contemplates the best approach to bring the envisioned program to life.

The Puzzle of Problem-Solving:

Coding is akin to solving a complex puzzle. As the coder weaves through algorithms and data structures, each line of code is a piece of the puzzle falling into place. Problem-solving becomes an exhilarating challenge, pushing the boundaries of logical thinking. The satisfaction derived from conquering a coding conundrum is a unique thrill that keeps coders hooked.

The Debugging Dilemma:

Amidst the beauty of coding lies the inevitable companion – debugging. As lines of code accumulate, so do the bugs. Debugging is a meticulous process of hunting down errors, unraveling the mystery behind unexpected outcomes. A coder's patience is tested, and perseverance becomes the key to overcoming the frustrating moments when the code seems to resist all attempts at correction.

The Elegance of Efficiency:

In the realm of coding, efficiency is king. Coders strive to write clean, concise, and optimized code. The pursuit of elegance is not merely aesthetic; it is deeply rooted in functionality. A well-crafted piece of code not only performs its intended task but does so with efficiency, ensuring that resources are utilized judiciously.

The Collaboration Chronicle:

Coding is not always a solitary endeavor. Collaboration is a vital aspect of the coder's experience. Whether working on open-source projects or contributing to a team effort, effective communication and code collaboration are essential skills. Navigating version control systems and merging diverse lines of code become part of the collaborative journey.

The Ever-Evolving Learning Curve:

The coding landscape is dynamic, with new languages, frameworks, and tools emerging regularly. A coder's experience is an ongoing learning curve. Staying abreast of industry trends, adopting new technologies, and continuously honing skills are integral to thriving in the fast-paced world of coding.

Conclusion:

In the realm of coding, each line of code is a stroke on the canvas of innovation. A coder's experience is a tapestry woven with the threads of creativity, problem-solving, collaboration, and a perpetual quest for efficiency. Embracing the challenges and celebrating the victories, coders navigate the coding odyssey with a passion for turning ideas into reality through the language of machines.

90-90 Rule

The first 90 percent of the code accounts for the first 90 percent of the development time. The remaining 10 percent of the code accounts for the other 90 percent of the development time.

— Tom Cargill, Bell Labs

The rule states that the first 90 percent of code consumes 90 percent of the development time, while the remaining 10 percent of code accounts for another 90 percent of the time. This seemingly contradictory math, totaling 180%, sardonically reflects the common tendency of software projects to exceed their initially estimated schedules.

The rule sheds light on the dual nature of programming tasks, distinguishing between the relatively straightforward aspects and the more intricate, time-consuming components that often arise unexpectedly. The initial phase of development tends to encompass the visible and seemingly manageable aspects of a project, while the final 10 percent often involves unforeseen complexities and challenges. This insight serves as a cautionary tale for project managers and developers, emphasizing the need for realistic expectations and comprehensive planning.

In agile software development, the 90-90 rule can manifest when a task is considered "relatively done." This scenario highlights a common challenge where planned work is completed, but finalizing the project is delayed due to a single remaining activity. This activity may introduce additional complexities or may be subject to unforeseen delays, leading to an extended timeline for project completion. The 90-90 rule, therefore, serves as a humorous yet insightful commentary on the intricacies and uncertainties inherent in software development efforts.

The Power of Interdisciplinary Knowledge: Breaking Down Barriers in Education

Introduction

In today's rapidly advancing world, the boundaries between academic disciplines are becoming increasingly porous. No field stands alone; instead, each is intricately linked to others, fostering a need for interdisciplinary knowledge. This interconnectedness is vital for addressing complex challenges and pushing the boundaries of innovation. This article explores the significance of interdisciplinary knowledge through examples from various fields, emphasizing the benefits it brings to education and societal understanding.

Bioinformatics: A Fusion of Sciences

Bioinformatics stands as a testament to the power of interdisciplinary collaboration. This field integrates computer science, mathematics, physics, computer programming, information engineering, and statistics to analyze and interpret biological data. In the realm of modern biology and medicine, bioinformatics plays a pivotal role in managing vast datasets. By consolidating science, software engineering, data engineering, mathematics, and statistics, bioinformatics enables researchers to conduct in-silicon analyses using advanced mathematical and statistical techniques. The Minor in Bioinformatics exemplifies how students from diverse disciplines can acquire foundational knowledge in this field, enhancing their skill sets and contributing to the interdisciplinary approach.

Geoscience: A Tapestry of Disciplines

Geoscience, by its very nature, embodies interdisciplinary collaboration. Courses in geoscience, particularly those with an environmental component, delve into chemistry, physics, biology, and geology. For instance, Oceanography covers a spectrum of topics that cross traditional disciplinary boundaries. Natural Disasters, on the other hand, incorporates elements of psychology, human geography, and population dynamics. The effectiveness of this interdisciplinary approach is evident in the engagement and understanding of students, as they connect real-world events to scientific principles.

If you are biologist, do you need to learn computer science or programming?

As a biologist, acquiring programming skills opens the door to the world of bioinformatics, where advanced algorithms and computational techniques are harnessed to analyze complex biological datasets.

Bioinformatics plays a pivotal role in modern biology and medicine. Researchers use computational tools to sift through massive datasets, identify patterns, and extract meaningful insights. The fusion of biological knowledge with programming expertise enables scientists to conduct in-silico experiments, accelerating the pace of discovery. Students, regardless of their primary field of study, can benefit from a Minor in Bioinformatics, gaining a foundational understanding of programming and its application in biological research.

What about social sciences?

Even in the realm of social sciences, where human behavior and societal structures are the focal points, programming skills can be transformative. Social scientists often grapple with large datasets and intricate networks of human interactions. Programming languages such as Python and R empower researchers to analyze social patterns, model behaviors, and derive meaningful conclusions from extensive datasets.

For example, in sociology, programming facilitates the analysis of survey data, the creation of computational models to simulate social phenomena, and the exploration of large-scale social networks. By incorporating programming into social science curricula, researchers gain the ability to leverage computational tools, enhancing their analytical capabilities and contributing to a more nuanced understanding of human societies.

The Synergy of Geosciences and GIS: Unlocking Potential with Programming

Introduction

In the vast realm of geosciences, the integration of Geographic Information Systems (GIS) has become an indispensable tool for understanding and managing the complexities of our Earth's processes. From environmental monitoring to natural resource management, GIS has revolutionized the way geoscientists collect, analyze, and interpret spatial data. However, to fully harness the potential of GIS in geosciences, a complementary skillset in programming is increasingly becoming a necessity. This article explores the symbiotic relationship between geosciences and GIS, emphasizing the need for programming skills to unlock the full spectrum of possibilities in this dynamic field.

GIS: The Backbone of Geoscientific Endeavors

GIS, a powerful technology that captures, analyzes, and visualizes spatial and geographic data, has become a cornerstone in geosciences. It allows researchers to overlay diverse datasets, ranging from geological formations to climate patterns, creating a comprehensive view of the Earth's intricate systems. GIS applications extend across various domains within geosciences, including geology, meteorology, hydrology, and environmental science.

From mapping fault lines and studying soil compositions to tracking changes in sea levels, GIS enables geoscientists to make informed decisions based on spatial relationships and patterns. However, to extract maximum value from GIS, geoscientists must complement their domain expertise with programming skills.

The Need for Programming in GIS

1. Automation and Efficiency:

Programming languages such as Python and R empower geoscientists to automate repetitive tasks in GIS workflows. From data preprocessing to map production, automation not only saves time but also ensures accuracy and consistency in analyses.

2. Customization of Analyses:

Standard GIS software may not always provide specific tools needed for a particular geoscientific analysis. Programming allows geoscientists to develop custom scripts and tools tailored to their unique requirements, expanding the analytical capabilities of GIS.

3. Handling Big Data:

Geosciences deal with vast datasets, such as satellite imagery, climate models, and geological surveys. Programming enables efficient processing, manipulation, and analysis of big geospatial data, overcoming the limitations of traditional GIS tools.

4. Integration of Models:

Geoscientific modeling often involves complex algorithms and simulations. Programming facilitates the integration of these models into GIS, allowing for a seamless transition from data analysis to predictive modeling within a unified framework.

5. Web Mapping and Visualization:

With the increasing emphasis on data sharing and accessibility, programming skills are crucial for developing web-based mapping applications. Geoscientists can use programming languages to create interactive and dynamic visualizations for communicating their findings to a broader audience.

Examples of Programming in Geosciences and GIS

1. Python for GIS Automation:

Python, with its extensive libraries such as arcpy and geopandas, is widely used for automating GIS workflows. Geoscientists can script repetitive tasks, automate data processing, and create custom tools to enhance their analytical capabilities.

2. R for Spatial Analysis:

R, a statistical programming language, is gaining popularity in geosciences for its powerful data analysis capabilities. With packages like sf and raster, R facilitates spatial data manipulation, statistical modeling, and visualization.

3. JavaScript for Web Mapping:

JavaScript is instrumental in creating interactive web maps. Geoscientists can use frameworks like Leaflet and Mapbox to develop web-based applications that enable dynamic exploration of spatial data.

If one enjoys a particular field of study, should they dedicate all their efforts to a narrow field of study?

Navigating the educational landscape often presents students with a common dilemma: the inclination to specialize exclusively in a preferred subject. However, the reality of the professional world starkly contrasts with this mindset. The dynamics of real-world challenges are intricate and interconnected, requiring individuals to possess a broad spectrum of knowledge and skills.

One of the primary issues lies in the fact that our college curricula often lag behind the complexities of the advanced world we now inhabit. The traditional approach of compartmentalizing subjects into isolated silos overlooks the interwoven nature of contemporary issues. Problems faced in the real world are rarely confined to a single domain; they transcend disciplinary boundaries, demanding a holistic understanding that spans various interconnected fields.

Consider, for instance, the challenges posed by environmental issues. Tackling climate change requires expertise not only in environmental science but also in policy-making, economics, and technology. A narrow focus on a single discipline fails to equip individuals with the diverse knowledge needed to comprehend the multifaceted nature of such global challenges.

In the professional realm, success often hinges on the ability to navigate the intersections between different disciplines. A biologist working on biodiversity conservation may find it crucial to understand socio-economic factors influencing communities in a particular ecosystem. Similarly, a software engineer involved in developing healthcare applications may benefit significantly from a nuanced understanding of medical practices and ethical considerations.

To address this disparity between academic preparation and real-world demands, students must embrace a more interdisciplinary approach to learning. The integration of subjects allows individuals to cultivate a comprehensive skill set that extends beyond the confines of a single field. Instead of viewing subjects in isolation, students should recognize the interconnectedness of knowledge and the invaluable insights gained from diverse perspectives.

Educational institutions play a pivotal role in shaping the future workforce. It is imperative for curricula to adapt to the evolving needs of the professional landscape. Emphasizing interdisciplinary studies can bridge the gap between academic knowledge and real-world application. Courses that encourage collaboration across disciplines and foster a holistic understanding of complex issues can better prepare students for the challenges they will encounter in their careers.

In conclusion, the common dilemma faced by students—whether to specialize in a single subject or embrace a more interdisciplinary approach—is a critical consideration in the contemporary educational landscape. Real-world challenges demand a diverse skill set that extends beyond the boundaries of any one discipline. By acknowledging the interconnected nature of problems and adapting educational curricula accordingly, students can better equip themselves for success in the complex and advanced world we navigate today.

What is Pseudoscience?

Pseudoscience refers to ideas, theories, or practices that are presented as scientific, but lack the rigorous methodology, empirical evidence, and critical evaluation that are hallmarks of genuine scientific inquiry. Pseudoscience often relies on anecdotal evidence, personal beliefs, and unproven claims to support its ideas, rather than adhering to the scientific method and peer-reviewed research.

🇮🇳 ଓଡିଆ ସିଉଡୋ ସାଇନ୍ସ (Pseudoscience) ଧାରଣା ବା ଥିଓରୀ କୁ ବୁଝାଏ ଯାହା ବଜ୍ଞାନିକ ବୋଲି କୁହାଯାଏ, କିନ୍ତୁ କଠୋର ପଦ୍ଧତି, ପରୀକ୍ଷାମୂଳକ ପ୍ରମାଣ ଏବଂ ସମାଲୋଚନାମୂଳକ ମୂଲ୍ୟାଙ୍କନର ଯାହା ପ୍ରକୃତ ବଜ୍ଞାନିକ ଅନୁସନ୍ଧାନର ଚିହ୍ନ ଅଟେ ତାହା Pseudoscience ରେ ଘୋର ଅଭାବ ଥାଏ| ବଜ୍ଞାନିକ ପଦ୍ଧତି ଏବଂ ସମୀକ୍ଷା-ଅନୁସନ୍ଧାନକୁ ଅନୁସରଣ କରିବା ପରିବର୍ତ୍ତେ ଛଦ୍ମ ବିଜ୍ଞାନ କିମ୍ବା Pseudoscience ପ୍ରାୟତ ଅପ୍ରମାଣିତ ଦାବି, ଲୋକ ମାନଙ୍କ କାହାଣୀ, ବ୍ୟକ୍ତିଗତ ବିଶ୍ୱାସ ଉପରେ ନିର୍ଭର କରେ |

Some common characteristics of pseudoscience include:

  • Lack of falsifiability: Pseudoscientific claims are often difficult or impossible to disprove because they are vague, flexible, or based on subjective experiences.

e.g. Claims of precognition, or the ability to predict future events, are difficult to falsify. A person might claim to have predicted a natural disaster or stock market crash, but without a way to definitively determine whether the prediction was based on genuine precognition or simply a lucky guess, the claim remains unfalsifiable.

  • Cherry-picking evidence: Pseudoscientists tend to selectively choose data that supports their claims while ignoring or dismissing contradictory evidence.

  • Appeal to authority: Pseudoscientists often rely on the opinions of respected figures or historical precedents to support their claims, rather than presenting empirical evidence.

  • Conspiracy theories: Pseudoscience often involves elaborate conspiracy theories to explain why the scientific community has not accepted its claims, rather than addressing the lack of evidence.

  • Use of scientific-sounding jargon: Pseudoscientists may use technical terminology or complex-sounding explanations to make their ideas seem more credible, even if the underlying concepts are not scientifically valid.

  • Over-reliance on anecdotal evidence: Pseudoscientific claims often rely on personal experiences, testimonials, and anecdotes rather than empirical data and controlled studies.

  • Failure to progress: Genuine scientific theories and ideas are continually tested, refined, and improved upon through ongoing research and experimentation. Pseudoscience, on the other hand, tends to remain stagnant, with little or no progress in understanding or application.

Examples of pseudoscience include astrology, homeopathy, psychic readings, and many alternative medicine practices. While some of these may have some beneficial effects for individuals, they lack the empirical evidence and scientific rigor to be considered legitimate scientific theories or practices.

Science vs Pseudoscience

Science Vs Pseudoscience

Science is a systematic and empirical approach to understanding the natural world, while pseudoscience is a collection of beliefs or practices that are presented as scientific but lack the rigor and methodology of true science. Let's break down the differences between science and pseudoscience in more detail.

Follows the evidence wherever it leads vs. Starts with a conclusion, then works backwards to confirm:

Science follows a process of observation, hypothesis formation, experimentation, and conclusion, always following the evidence wherever it leads. This means that if the evidence contradicts the hypothesis, scientists will change their hypothesis accordingly. On the other hand, pseudoscience starts with a conclusion and then works backward to confirm it, often ignoring or dismissing any evidence that contradicts the conclusion.

Example: In the case of climate change, scientists have gathered extensive evidence through the study of ice cores, tree rings, and other sources, showing that the Earth's temperature has been rising at an alarming rate. Pseudoscientists, however, may start with the conclusion that climate change is a hoax and then cherry-pick data or use flawed methods to support that conclusion.

Embraces criticism vs. Hostile to criticism:

Science encourages critical thinking, open debate, and constructive criticism to advance knowledge and understanding. Pseudoscience, on the other hand, is often hostile to criticism and may attack those who question its methods or conclusions.

Example: When a new scientific study is published, it is subject to scrutiny and criticism by other scientists in the field, who may try to replicate the study or challenge its conclusions. Pseudoscientists, however, may dismiss or discredit any criticism, even if it comes from experts in the field.

Uses precise terminology with clear definitions vs. Uses vague jargon to confuse and evade:

Science uses precise terminology and clear definitions to communicate ideas and findings. Pseudoscience often uses vague jargon or technical-sounding language to create the appearance of scientific legitimacy, but without clear definitions or meaning.

Example: In the field of nutrition, scientists use precise terms like "macronutrients" and "micronutrients" to describe the different types of nutrients our bodies need. Pseudoscientists may use vague terms like "energy fields" or "cleansing" to describe their methods, without providing clear definitions or evidence for their claims.

Claims are conservative and tentative vs. Grandiose claims that go beyond the evidence

Science is conservative in its claims, always acknowledging the limitations of the evidence and the tentative nature of scientific knowledge. Pseudoscience, on the other hand, often makes grandiose claims that go beyond the evidence, promising cures or solutions that are not supported by scientific research.

Example: A scientific study may find a correlation between a certain diet and improved health outcomes, but scientists would be careful to note that the study does not prove causation and that more research is needed. Pseudoscientists, however, may claim that a particular diet can cure all diseases or reverse aging, without any scientific evidence to support these claims.

Properly considers all evidence and argument vs. Cherry picks on favorable evidence, relies on testimonials or weak evidence:

Science considers all relevant evidence and arguments, even if they contradict the prevailing theory or hypothesis. Pseudoscience, on the other hand, may cherry-pick evidence that supports its claims while ignoring or dismissing evidence that contradicts it. Pseudoscientists may also rely on testimonials or anecdotal evidence, which are not considered reliable by the scientific community.

Example: A scientific study on the effectiveness of a new drug would consider all relevant data, including any adverse effects or side effects, before drawing conclusions. Pseudoscientists, however, may focus only on the positive testimonials of people who claim to have benefited from the drug, while ignoring any negative outcomes.

Use rigorous and repeatable methods vs. Uses flawed methods with unrepeatable results:

Science relies on rigorous and repeatable methods, ensuring that experiments can be replicated by other scientists and that the results are reliable. Pseudoscience, on the other hand, may use flawed methods or rely on one-time events that cannot be replicated, making it difficult to determine the validity of the claims.

Example: A scientific study on the effects of a new drug would use a carefully designed experiment, with controls and randomization to ensure that the results are reliable and reproducible. Pseudoscientists, however, may rely on anecdotal evidence or uncontrolled studies, which cannot be replicated and may not be reliable.

Engages with peers and community vs. Lone mavericks working in isolation:

Science is a collaborative and community-based endeavor, with scientists sharing their findings and working together to advance knowledge. Pseudoscience, on the other hand, often involves lone mavericks working in isolation, who may reject the scientific consensus and refuse to engage with the broader scientific community.

Example: Scientists working in a particular field will often attend conferences, publish papers, and collaborate with other researchers to advance their understanding of a particular topic. Pseudoscientists, however, may work in isolation, rejecting the scientific consensus and refusing to engage with the broader scientific community.

Follows careful and valid logic vs. Uses inconsistent and invalid logic:

Science follows careful and valid logic, using established principles of reasoning and inference to draw conclusions from the evidence. Pseudoscience, on the other hand, may use inconsistent or invalid logic, making false assumptions or drawing conclusions that do not follow from the evidence.

Example: A scientific study on the effects of a new drug may use valid logic to analyze the data and draw conclusions, such as using statistical methods to determine the significance of the results. Pseudoscientists, however, may use invalid logic, such as assuming that correlation implies causation or drawing conclusions based on personal beliefs rather than evidence.

Changes with new evidence vs. Dogmatic and unyielding:

Science is open to new evidence and is willing to change its conclusions based on new data. Pseudoscience, on the other hand, is often dogmatic and unyielding, refusing to change its beliefs even in the face of overwhelming evidence to the contrary.

Example: When new evidence emerges that challenges a scientific theory, scientists will reevaluate the evidence and may revise the theory accordingly. Pseudoscientists, however, may dismiss or ignore new evidence that contradicts their beliefs, and may continue to promote their claims even in the face of overwhelming evidence to the contrary.

Homeopathy

PBS Video on Homeopathy

What are Scholarly Activities?

Academician

An academic is a person who is engaged in scholarly activities, often but not necessarily within higher education institutions. Academics are typically involved in teaching, research, and other intellectual pursuits related to their field of expertise.

Scholarly Activities

Scholarly activities refer to intellectual pursuits that contribute to the advancement of knowledge within a particular academic discipline. These activities include conducting research, publishing scholarly articles or books, presenting findings at conferences, and engaging in critical discourse with peers. Scholars often aim to contribute new insights, theories, or perspectives to their field through rigorous and systematic inquiry.

Scholarly Activity in Medicine

Defining Scholarly Activity in Graduate Medical Education

Scholarly activities are essential in advancing the field of academia and fostering intellectual growth. They encompass a wide range of pursuits that contribute to the expansion and dissemination of knowledge within various disciplines. Below, we will explore scholarly activities in detail, focusing on four primary categories: discovery, integration, application, and teaching.

Discovery: Advancing Knowledge

The discovery category involves activities that contribute to the creation of new knowledge through rigorous research and investigation. These activities often result in the publication of original research articles, books, or reports that present novel findings or theories. Scholars in this category aim to push the boundaries of their fields by asking critical questions, developing innovative methodologies, and exploring uncharted territories.

Examples of scholarly activities in the discovery category include:

  • Publishing original research articles in peer-reviewed journals
  • Writing and publishing books or monographs that present new insights or theories
  • Presenting research findings at academic conferences
  • Participating in research collaborations with other scholars

Integration: Synthesizing Knowledge

Integration involves the synthesis of existing knowledge to create new perspectives, frameworks, or models. Scholars in this category engage in activities that combine different bodies of knowledge, identify patterns and relationships, and generate novel interpretations. This type of scholarly activity often results in the production of case studies, reports, or literature reviews.

Examples of scholarly activities in the integration category include:

  • Conducting comprehensive literature reviews to identify trends, gaps, or inconsistencies in existing research
  • Developing case studies that explore complex phenomena or situations from multiple perspectives
  • Creating conceptual frameworks or models that integrate diverse theories or perspectives
  • Writing book reviews or commentaries that synthesize the key arguments and contributions of published works

Application: Applying Existing Knowledge

Application involves the practical application of existing knowledge to address real-world problems or challenges. Scholars in this category engage in activities that apply theories, methods, or findings from their disciplines to solve problems, inform policy, or improve practice.

Examples of scholarly activities in the application category include:

  • Participating in professional societies or organizations that apply academic knowledge to real-world issues
  • Developing educational materials or resources that translate complex concepts into accessible formats for practitioners or the general public
  • Collaborating with industry partners or government agencies to inform policy or practice based on academic research
  • Conducting evaluations or assessments of programs, policies, or interventions to determine their effectiveness and identify areas for improvement

Teaching: Disseminating Current Knowledge

Teaching involves the dissemination of current knowledge to students, colleagues, or the broader public. Scholars in this category engage in activities that share their expertise and facilitate learning through the development of curricula, lectures, or other educational materials.

Examples of scholarly activities in the teaching category include:

  • Designing and delivering lectures or courses that introduce students to key theories, concepts, and methods in a particular field
  • Developing and implementing curricula or educational programs that address specific learning objectives or goals
  • Creating web-based learning modules or resources that provide accessible and engaging instruction on specific topics or issues
  • Participating in professional development activities or workshops to enhance teaching skills and stay current with best practices in education

In conclusion, scholarly activities are crucial in advancing knowledge, fostering intellectual growth, and addressing real-world problems. By engaging in discovery, integration, application, and teaching activities, scholars contribute to the ongoing development and dissemination of knowledge within their respective disciplines.

Evidence Based Medicine (EBM)

Use the term 'Evidence-Based Medicine' to represent medicine that works, rather than Allopathy, Ayurveda, Yoga, or Alternative Therapies.

The terms "allopathy" and "alternative medicine" can be misleading and confusing. Instead, it is more accurate and useful to refer to "Evidence-Based Medicine" (EBM), which is the conscientious, explicit, and judicious use of the best available research evidence in making decisions about the care of individual patients. EBM integrates clinical experience and patient values with the best available research information, and it requires new skills such as efficient literature searching and the application of formal rules of evidence in evaluating clinical literature.

The key difference between EBM and traditional medicine is that EBM demands better evidence than has traditionally been used. Evidence-based medicine categorizes different types of clinical evidence and ranks them according to the strength of their freedom from various biases that affect medical research. This ranking system helps clinicians make better-informed decisions about patient care.

By focusing on EBM, we can promote a more accurate understanding of modern medical practice and ensure that healthcare decisions are based on the best available evidence.

Evidence Based Medicine – New Approaches and Challenges

CLASSIFICATION OF EVIDENCE – INFORMATION LEVELS

Evidence-based medicine categorizes different types of clinical evidence and ranks them according to the strength of their freedom from the various biases that beset medical research.

  • 1. Evidences obtained by meta-analysis of several randomized controlled research (RCR).
  • 1b. Evidences from only one RCR.
  • 2a. Evidences from well designed controlled research RCR.
  • 2b. Evidences from one quasi experimental research.
  • 3. Evidences from non experimental studies (comparative research, case study), according to some, for example Textbooks.
  • 4. Evidences from experts and clinical practice.

HOW TO START: 5 STEPS PROCESS FOR USE OF EVIDENCE ORIENTED APPROACH IN FAMILY MEDICINE

How will family medicine doctors start, if they want to apply evidence based approach in their daily practice? Group for Evidence Based Medicine Resource from McMaster University identified the approach in 5 steps that each individual physician in the application of this approach must follow.

a. problem definition,

b. search for wanted sources of information,

c. critical evaluation of the information,

d. application of information of the patient,

e. efficacy evaluation of this application on a patient.

Step 1. Defining problem

Each doctor several times a day is in the position of making various medical decisions. Often in the process of medical decision-making occur questions such as: for and against the use of certain therapies, whether to use a diagnostic test or screening procedure, the risk or prognosis of a particular disease or cost-effectiveness of specific interventions. It is clear that the already busy doctor, will not be able to answer in this way all the questions that come in practice and therefore must resort to the process of determining priorities, as well as refining issues that needs to be asked.

A clinician starts his or her search for the best and newest data needed to solve individual patient’s problem by formulating an answerable clinical question. Good clinical question must be clear, directly focused on the problem, and answerable by searching the medical literature.

a. PICO format

A good clinical question should have four essential components structured in the PICO format (Patient or problem, Intervention, Comparison, Outcome).

PICO format:

  • the patient or problem – who are the relevant patients, what kind of problem we try to solve?
  • the intervention – what is the management strategy, diagnostic test or exposure (drugs, diagnostic test, foods or surgical procedure)?
  • comparison of interventions – what is the control or alternative management strategy, test or exposure that we will compare? - the outcome – what are the patient-relevant consequences of the exposure in which we are interested?

b. Type of clinical question

The most common type of clinical question is about how to treat a disease or condition. Such questions are questions about intervention.

Types of clinical questions:

  • questions about intervention

  • questions about etiology and risk factors

  • questions about frequency and rate

  • questions about diagnosis

  • questions about prognosis and prediction

  • question about cost-effectiveness

  • question about phenomena

Step 2. Search for wanted sources of information

After formulating the clinical question, which stems from a concrete patient, the next step is to search for relevant evidence that will provide the answer to the question.

This is not always easy, especially in Family medicine, in which the problems caries the poorly defined problems in the start. However, there are numerous sources of information that may be of assistance, including medical journals, which treat certain problems in the field of Family medicine, search of electronic databases and communication with colleagues.

The ideal information source is valid (contains high quality data), relevant (clinically applicable), comprehensive (has data on all benefits and harms of all possible interventions), and is user-friendly (is quick and easy to access and use).

Step 3. Critical evaluation of the information

When we decide which magazine to read, it is important to read it carefully, because not all the published information is of equal importance and value. Critical assessment of the articles is a process that involves careful reading and analysis of methodology, contents and conclusions. A key question that should be kept in mind is “Do I believe in the results enough that I’ll be ready to a similar approach, or in achievement of similar results with my patients?” Skills to obtain the ability of critical evaluation should be learned and practiced as any other clinical skills.

Step 4. Application of information of the patient

The fourth step in the process of the use of Evidence Based Medicine in practice is the decision how to apply acquired information on the special circumstances pertaining to each patient. This is probably a crucial step in the process, if not the most complex. Now it is necessary to decide whether there is something in relation to our patient because of which it would be necessary to discard the acquired information.

The questions that we should ask before the decision to apply the results of the study are:

a. Are the participants in the study similar enough to my patient?

b. Is the treatment available and is health care system prepared to fund it?

c. What alternatives are available?

d. Do the potential side effects of the drug or procedure outweigh the benefits?

e. Are the outcomes appropriate to the patient? Does the treatment conflict with the patient’s values and expectations?

If something does not exist, it is necessary to weigh the potential harm from the benefit and do all that in partnership with the patient, where our decision in the end, in fact, will be shared.

Step 5. Efficacy evaluation of EBM application on a patient

The final step is the evaluation of Evidence - based approach and efficiency of its application to a specific patient. During this process it is important to assess whether certain evidence, which is applied to the patient, caused changes to better and that to the extent that it is confirmed by research. If the data differ significantly, it would be necessary to investigate why some patients did not respond to the changes introduced in the expected way and what can be done to change it.

The EBM-oriented clinicians of tomorrow have three tasks:

  1. To use evidence summaries in clinical practice;
  2. To help develop and update selected systematic reviews or evidence-based guidelines in their area of expertise; and
  3. To enrol patients in studies of treatment, diagnosis and prognosis on which medical practice is based.

Comprehensive Approaches to Managing Lifestyle Diseases: Beyond Pharmaceuticals

Some examples include diseases like diabetes, high blood pressure, and depression, which often require a comprehensive approach beyond pharmaceutical interventions alone. Incorporating various strategies such as yoga, exercise, a balanced diet, herbal medicine, cognitive-behavioral therapy, and relationship management can significantly enhance disease management.

When do self-managed institutes work?

While self-management offers numerous benefits, such as increased flexibility and employee satisfaction, it also presents unique challenges, particularly in a remote work environment. In this article, we explore the importance of leadership in guiding self-managed teams and ensuring productivity and cohesion.

Self-management entails entrusting employees with the responsibility to organize and execute their tasks independently, without constant supervision or micromanagement. However, this autonomy can lead to disarray, especially when employees are working from home. Without the structure of a traditional office setting and the presence of colleagues and supervisors, workers may struggle to stay focused and meet deadlines.

One of the key roles of a leader in a self-managed institute is to provide guidance and support to employees, helping them navigate the challenges of remote work and stay on track. While it's not about micromanaging every aspect of their work, leaders can employ strategies such as nudge theory to subtly influence behavior and encourage productivity.

Nudge theory, popularized by behavioral economists Richard Thaler and Cass Sunstein, suggests that small, positive reinforcements or gentle reminders can lead to significant changes in behavior. In the context of self-managed teams, leaders can use intermittent feedback sessions to provide guidance, address concerns, and keep employees motivated. These sessions, held every hour or two, serve as checkpoints to assess progress, offer assistance, and ensure alignment with organizational goals.

For example, in an economics class, a teacher might begin by summarizing or explaining a video lesson. Then, they can ask the students to engage in retrieval practice for 45 minutes. After this period, the teacher can provide feedback, clarify any doubts, and answer questions for 15 minutes.

Also, one can set up local community centers for individuals to sit and work remotely, especially in cases where the home environment might not be suitable, particularly for working women.

Furthermore, the success of self-managed institutes hinges on the presence of effective leaders who possess strong leadership qualities and self-control. Identifying individuals with these attributes and entrusting them with leadership roles is crucial for the smooth functioning of self-managed teams. Leaders who can inspire and motivate their team members, maintain discipline, foster a culture of collaboration, and have the necessary skills to evaluate evidence to determine what works and what does not, are invaluable assets in a self-managed environment.

Equitable money distribution as motivation to work

Equitable money distribution and inclusivity


title: "Moonlighting in a Remote Work World" date: "2023-12-17" categories:

  • "policies"
  • "remote-work" tags:
  • "business"
  • "productivity"
  • "technology"
  • "work-life-balance"

Moonlighting in the context of remote work refers to the practice of employees taking on additional employment or engaging in secondary work activities outside their primary job, often without the knowledge or approval of their primary employer. In a remote work setting, where individuals have more flexibility in managing their schedules and may not be physically monitored during working hours, moonlighting can be more challenging for employers to detect.

Why Moonlight? The Motivations Behind the Second Shift

Plan B:
In times of economic uncertainty, having a backup plan becomes crucial. Moonlighting often serves as a safety net for individuals insecure about their present jobs, especially in industries facing layoffs and understaffing.

Multiple Sources of Income:
Financial advisors advocate for diversifying income streams. For some, a second job provides an additional source of revenue, complementing their primary income and contributing to overall financial stability.

Paying off Debt:
Job losses during the pandemic have left many with financial burdens. Moonlighting becomes a means to pay off debts accrued during challenging times, whether it's a home loan, a laptop purchase, or other financial commitments.

Change of Career:
Individuals contemplating a career change often engage in moonlighting to gain experience and skills in their desired field. It allows them to explore new opportunities without fully committing to a transition.

Pursuing Passion:
Moonlighting isn't solely driven by financial motives. Some individuals take on a second job to pursue their passion projects, allowing them to explore creative outlets or engage in activities they love.

Creativity Boost:
Mundane jobs can stifle creativity. Moonlighting provides a way for individuals to keep their minds engaged, overcome challenges, and tap into their creative sides, fostering innovation.

Impact on Mental Health

The pressure of managing dual careers can take a toll on mental health. Burnout, stress, and anxiety may arise if individuals struggle to find a balance between their primary job and moonlighting activities. Employers need to be mindful of the well-being of their workforce, recognizing the challenges associated with moonlighting and offering support where needed.

The Controversy Surrounding Moonlighting in Remote Work

Remote work has opened new possibilities for moonlighting, with some employees taking on additional roles or pursuing side hustles. However, it has also sparked debates, particularly in industries like tech, where companies have varying stances on employees working for competitors or engaging in secondary employment.

Ethical Dilemma:
Moonlighting has sparked ethical debates, with some arguing that it amounts to "cheating," while others see it as a legitimate way for employees to monetize their skills and build financial stability.

Conflict of Interest:
Companies often include exclusivity clauses in employment contracts, prohibiting employees from engaging in activities that may conflict with their primary job or compromise the company's interests.

Nuanced Perspectives:
While some condemn moonlighting outright, others acknowledge the potential benefits, citing instances where successful companies originated as side hustles. Striking a balance and defining clear boundaries become critical.

Whom to blame: employees who moonlight or employers who are ineffective in assigning tasks in a remote environment?

The question of blame in the context of moonlighting often involves a nuanced assessment of both employees and employers. Moonlighting can result from various factors, including economic uncertainties, personal aspirations, or the need for additional income. Employees may seek secondary employment as a response to challenges faced in their primary job, such as job insecurity or financial strain. On the other hand, employers bear responsibility for creating an environment that promotes effective task management, especially in remote work settings. If employers fail to provide clear expectations, proper task assignments, and adequate support, employees may feel compelled to seek alternative sources of income. Therefore, the blame cannot be solely attributed to one party; instead, it underscores the importance of a collaborative approach between employees and employers to foster a work environment that addresses challenges and supports mutual success.

Task Reporting: A Tool for Employers in Remote Work Environments

Task reporting plays a pivotal role in addressing the challenges posed by moonlighting in remote work settings. Employers can leverage effective task reporting to:

Ensure Visibility and Transparency:
Task reporting provides transparency into an employee's workload, reducing misunderstandings and allowing employers to assess time allocation effectively.

Enhance Accountability:
Regular reporting fosters accountability, motivating employees to meet deadlines and fulfill their commitments to both primary and secondary roles.

Facilitate Communication:
Reporting offers a structured communication channel for employees to discuss progress, challenges, and resource needs. Open dialogue helps prevent misunderstandings.

Prioritize Tasks:
Employers can work with employees to prioritize tasks, helping them manage workloads across multiple commitments more effectively.

Adapt to Changing Circumstances:
Task reporting allows for adaptability. If an employee is taking on additional commitments, employers can adjust priorities and redistribute tasks to maintain a balanced workload.

Conclusion: Striking the Right Balance

Moonlighting, while presenting opportunities for financial gain and personal growth, comes with ethical considerations and challenges for employers. In the remote work landscape, effective task reporting emerges as a valuable tool to navigate and address these challenges. By fostering clear communication, transparency, and adaptability, employers can create a work environment that accommodates moonlighting while ensuring productivity and ethical standards are upheld. As the debate on moonlighting continues, finding a nuanced approach that aligns with the evolving nature of work remains key to striking the right balance.

Sources:

Micromanagement

Micromanagement is a management style characterized by excessive control, close scrutiny, and involvement in the minute details of tasks and processes. Here are some attributes or characteristics commonly associated with micromanagement:

  1. Excessive Control: Micromanagers tend to exert an excessive level of control over their employees' work. They often feel the need to be involved in every decision and aspect of a project, regardless of its significance.

  2. Close Supervision: Micromanagers closely supervise their employees' work, frequently checking in on their progress and demanding frequent updates. They may require constant reports or status updates, leading to a sense of being constantly monitored.

  3. Lack of Trust: Micromanagers often demonstrate a lack of trust in their employees' abilities to perform their tasks independently. They may believe that they are the only ones capable of ensuring quality and efficiency, leading to a reluctance to delegate tasks or responsibilities.

  4. Difficulty Delegating: Micromanagers struggle to delegate tasks effectively. They may hoard responsibilities, fearing that others will not meet their standards or will make mistakes. This reluctance to delegate leads to an overwhelming workload for the micromanager and stunts the growth and development of their team members.

  5. Focus on Process Over Results: Micromanagers tend to prioritize the process of completing tasks over the actual results. They may become overly fixated on minor details or procedural matters, losing sight of the bigger picture and overall objectives.

  6. Lack of Autonomy: Employees working under a micromanager often feel a lack of autonomy and independence in their work. They may feel stifled or demotivated, as their creativity and problem-solving abilities are not being utilized or valued.

  7. High Turnover and Low Morale: Micromanagement can lead to high employee turnover and low morale within a team or organization. Constant scrutiny and lack of trust can create a toxic work environment, resulting in decreased job satisfaction and productivity.

  8. Inefficiency: Despite the micromanager's intentions to ensure quality and efficiency, micromanagement often has the opposite effect. Constant interruptions, second-guessing, and excessive revisions can slow down the pace of work and impede progress.

Overall, micromanagement is detrimental to both individuals and organizations, as it undermines trust, stifles creativity, and inhibits growth. Effective leaders recognize the importance of delegation, trust, and empowerment in fostering a positive and productive work environment.

Complicatedness of Sexuality


date: "2019-04-10"

  • categories:

    • "compilation"
    • "sex"
    • "sexual-orientation"
    • "sexuality"
  • tags:

    • "asexual"
    • "demisexual"
    • "homosexuality"
    • "lgbtqa"

Sexuality definition

Human sexuality is the way people experience and express themselves sexually. This involves biological, erotic, physical, emotional, social, or spiritual feelings and behaviors. So definition of sexuality is nuanced, broad and multifaceted.

Multidimensional components indicate a specific sexual orientation and can include whether an individual:

  1. Engages in sexual behaviour with men, women, both or neither.

  2. Feels sexual desire for men, women, both or neither.

  3. Falls in love with men, women, both, or neither.

  4. Identifies himself or herself with a specific sexual orientation.

The complexity and ambiguity of defining sexual orientation.

The complexity and ambiguity of defining sexual orientation result from the varying combinations and degrees of these four components. For example, how much sexual attraction to and experience with the same sex can someone have and still be heterosexual? And, vice versa, how much sexual attraction to and behavior with the other sex can someone have and still be homosexual? Or, is everyone who does not consistently and completely meet these four components bisexual? Further, can someone who self-identifies as heterosexual but is sexual exclusively with same-sex partners really be heterosexual? Even scientists who do research about sexual orientation do not use consistent criteria in categorizing subjects according to sexual orientation. In some studies, subjects are included in the bisexual/homosexual category if they have had any element of same-sex attraction, behavior, or self-identity. In other studies, subjects are not considered homosexual unless their sexual behavior, attraction, and self-identity have been consistently with the same sex since puberty.

A Continuum of Sexual Orientations
The Kinsey scale did not include asexaulity

sexual fluidity

Variability in same-sex and other-sex attraction and involvement at different times and in different situations throughout the life span.

The Kinsey scale may be interpreted incorrectly to indicate that all people have a fixed, stable sexual orientation. In fact, sexual orientation is more accurately determined by patterns over time rather than at any given point in time (Baumgardner, 2007). Psychologist and researcher Lisa Diamond (2008a) uses the term sexual fluidity to describe variability in same-sex and other-sex attraction and/or involvement at various times and situations throughout the life span. Her research indicates that, for some women, sexual self-identity and the biological sex of preferred sexual partners can vary over time and experience unexpected transitions.

Lisa Diamond’s research on sexual fluidity followed almost 80 women ages 18 to 25 over a 10-year period. At the beginning of the study, all the subjects were involved with other women and labeled themselves variably as lesbian, bisexual, or unlabeled. At the end of the study, about one third of the women were consistent in their self-identification as lesbian and in their attraction to and sexual involvement with women. However, the remaining women—initially self-identified as lesbian, bisexual, or unlabeled—had changed their self-identification at least once during the 10 years. Notably, these changes were variable: Lesbian changed to bisexual or unlabeled, bisexual changed to lesbian or unlabeled, unlabeled changed to bisexual or lesbian, and some previously self-identified lesbian, bisexual, and unlabeled changed to heterosexual. Some of the changes in self-labeling were due to sexual and/or romantic attraction to or involvement with men. However, the women who became involved with men continued to feel the same amount of attraction toward other women as they had at the beginning of the study 10 years earlier (Diamond, 2008b).

Asexuality: The Invisible Orientation

ASEXUALITY IS:

A sexual orientation currently estimated to describe 1 percent of the population. Asexuality is usually defined as the experience of not being sexually attracted to others. Less commonly, it is defined as not valuing sex or sexual attraction enough to pursue it.

WE’RE NOT:

Asexuality isn’t a complex. It’s not a sickness. It’s not an automatic sign of trauma. It’s not a behavior. It’s not the result of a decision. It’s not a chastity vow or an expression that we’re “saving ourselves.” We aren’t by definition religious. We aren’t calling ourselves asexual as a statement of purity or moral superiority.

We’re not amoebas or plants. We aren’t automatically gender confused, anti-gay, anti-straight, anti-any-sexual-orientation, anti-woman, anti-man, anti-any-gender, or anti-sex. We aren’t automatically going through a phase, following a trend, or trying to rebel. We aren’t defined by prudishness. We aren’t calling ourselves asexual because we failed to find a suitable partner. We aren’t necessarily afraid of intimacy. And we aren’t asking for anyone to “fix” us.

WE DON’T:

Asexual people don’t all look down on sex or people who have sex. We don’t all avoid romantic or emotionally close relationships, and we aren’t automatically socially inept. We aren’t defined by atypical biology or nonfunctional genitals. We aren’t defined by mental illness, autism, or disability. We don’t try to recruit anyone.

We don’t have a hole in our lives where sexual attraction “should” be. We can’t be converted by trying sex. We aren’t, by definition, lonely or empty. We aren’t, by definition, immature or incompetent. We aren’t, as a group, uglier or prettier than anyone else. We don’t tell people not to have sex in the name of our orientation, nor do we use the term asexual to imply perceiving ourselves to be “above” sex.

An asexual person does not experience sexual attraction – they are not drawn to people sexually and do not desire to act upon attraction to others in a sexual way. Unlike celibacy, which is a choice to abstain from sexual activity, asexuality is an intrinsic part of who we are, just like other sexual orientations. Asexuality does not make our lives any worse or better; we just face a different set of needs and challenges than most sexual people do. There is considerable diversity among the asexual community in the needs and experiences often associated with sexuality including relationships, attraction, and arousal.

Attraction
Many asexual people may experience forms of attraction that can be romantic, aesthetic, or sensual in nature but do not lead to a need to act out on that attraction sexually. Instead, we may get fulfillment from relationships without sex, but based on other types of attraction. Romantic attraction is the desire to be romantically involved with another person. Aesthetic attraction is appreciation for a person’s appearance. Sensual attraction is the desire to engage in sensual (but not sexual) activities with a person, such as cuddling, hugging, or kissing. Asexual people who experience these other forms of attraction will often be attracted to particular gender. These people may still identify as lesbian, gay, bi, or straight. The split attraction model has led some people to identify separate sexual and romantic attractions. For example, a person who’s asexual but wants relationships with the opposite sex may identify as a “heteroromantic asexual”. Most sexual people may not view their orientation that way, and may simply combine their sexual and romantic attractions into one characteristic if they’re aligned. Asexual people often feel the need to specify both sexual and romantic attractions to make it clear what drives them and what they’re seeking from other people.

Arousal
For some asexual people, arousal (sometimes interchanged with “libido” in asexual dialogue) is a fairly regular occurrence, though it is not associated with a desire to find a sexual partner or partners. This could include, but is not limited to, arousal from hormone variation in a person’s menstrual cycle, or erections at certain times of the day. Some may occasionally masturbate, but feel no desire for partnered sex. Other asexual people may experience little or no arousal, often called non-libidoist asexuals. Both types are equally valid in identifying as asexual, as sexual orientation is about attraction and desire towards other people, rather than strictly physiological reactions.

Because we don’t have an intrinsic need for sex, asexual people generally do not see a lack of sexual arousal as a problem to be corrected, and if they do have a libido or experience arousal, they do not feel needs are unmet by a lack of sexual activity.

It is important to note that asexuality is different from medical conditions such as Hypoactive Sexual Desire Disorder (HSDD). HSDD is listed in the DSM-V, while asexuality is not. In cases of HSDD, there are underlying sexual needs that are not being met, to the point of personal distress. If not experiencing arousal or suddenly losing interest in sex is distressing, it is advisable to discuss this with a medical professional to get a diagnosis.


Relationships

Asexuality does not limit a person’s emotional needs. As is the case for sexual people, we vary widely in how we fulfill those needs. Some asexual people may still desire romantic relationships. Other asexual people may be most satisfied with close friendships, or happier on their own.

Sexual or nonsexual, all relationships are made up of the fabric of interpersonal connection. Communication, closeness, fun, humor, excitement, and trust are all just as important in nonsexual relationships as in sexual ones. Asexual people who desire romantic relationships may have fewer cultural scripts to rely on, but they are still seeking an emotional connection of shared romantic love. 
For asexual people who desire romantic relationships, the dating pool for other asexual people is very small, as we are a very small minority of the population. In addition to that, asexuality is often invisible and has a shorter history as an identity/community than other minority sexual orientations that may have established cultural venues of courtship. Due to this, many asexual people end up in mixed relationships with sexual people. Mixed relationships face challenges that often require compromise.

Definitions

Asexual: Someone who does not experience sexual attraction or an intrinsic desire to have sexual relationships (or the adjective describing a person as such).

Demisexual: Someone who can only experience sexual attraction or desire after an emotional bond has been formed (or the adjective describing a person as such). This is different from the choice to abstain from sex until certain criteria are met.

Gray-asexual (gray-a) or gray-sexual: Someone who identifies with the area between asexuality and sexuality (or the adjective describing a person as such). For example, they may experience sexual attraction very rarely, only under specific circumstances, or of an intensity so low that is ignorable and not a necessity in relationships. (Note: the spelling of gray/grey may vary by country.)

Criticism or inappropriate comment or nagging faced by asexual people

Criticism or inappropriate comment or nagging faced by asexual people

Is human sexuality polygenic?

Let's look at the definition of polygenic trait: 

A polygenic trait is a characteristic, such as height or skin color, that is influenced by two or more genes. Because multiple genes are involved, polygenic traits do not follow the patterns of Mendelian inheritance. Many polygenic traits are also influenced by the environment and are called multifactorial.

So polygenic traits involves many more genes and many are also influenced by the environmental factor. 

Although no “gay gene” has been discovered, studies of identical twins find they are more likely to have the same sexual orientation (gay or straight) than would be expected from chance alone (Kendler, Thornton, Gilman, & Kessler, 2000; Santtila et al., 2008). Because identical twins have the same DNA, this similarity suggests, but does not prove, a genetic basis for sexual orientation. Keep in mind, however, that any physical or behavioral trait that is totally due to genetics should show up in both twins or in neither twin. Because many identical twins do not have the same sexual orientation, this dissimilarity suggests that genetics are far from the only cause of sexual orientation, to the extent they cause it at all. Several methodological problems also cast doubt on findings from many of these twin studies.

Reference Book: Social Problems: Continuity and Change

Further defining sexuality is broad and can be very complicated. It's not as simple as being attracted to the same or different sex or both. Take, for example, demisexuality, where attraction occurs only when an emotional attachment is formed. Moreover, emotional attachment itself is not straightforward. You might be emotionally attached to your friends without experiencing any sexual attraction to them, even if the other party is interested. The dynamics can be highly specific. While you may appreciate someone's looks, it doesn't necessarily mean you are not sexually attracted to men or women. You can remain completely neutral during the first encounter or multiple encounters.

References:

  1. Our Sexuality, Crooks and Baur Pdf Link

  2. The Invisible Orientation, Julie Sondra Decker

  3. https://asexuality.org/

  4. Social Problems: Continuity and Change

Air pollution due to construction

Draft

In construction zones, a notable source of pollution is found, which includes air, water, noise, and soil pollution, affecting nearby homes, businesses, and residents. The construction sector is a significant contributor to pollution, with the United States showing that it accounts for

  • 23% of air pollution
  • 40% of drinking water pollution,
  • 50% of pollution related to climate change, and
  • 50% of the environmental pollution from landfills.

In London, construction contributes to 30% of PM10 emissions, 8% of PM2.5 emissions, and 4% of nitrous oxide emissions, according to the 2019 London Atmospheric Emissions Inventory.

Furthermore, construction activities account for 25-40% of the world's carbon emissions, highlighting its impact on climate change. Additionally, the construction sector in the U.K. uses over 400 million tons of material annually, generating a large amount of waste.

https://www.clarity.io/blog/air-quality-monitoring-in-construction-zones-minimizing-health-risks-enhancing-sustainability

Using green infrastructure to improve urban air quality (GI4AQ)

https://link.springer.com/article/10.1007/s13280-019-01164-3

Effectiveness of plants and green infrastructure utilization in ambient particulate matter removal

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8475335/

Air Quality Data

https://www.who.int/data/gho/data/themes/air-pollution/who-air-quality-database

Important Cite

https://airquality.cpcb.gov.in/ccr/#/caaqm-dashboard-all/caaqm-landing/aqi-repository

https://www.kaggle.com/datasets/rohanrao/air-quality-data-in-india?resource=download

https://aqs.epa.gov/aqsweb/airdata/download_files.html

Links

iambrainstorming

https://iambrainstorming.github.io

https://iambrainstorming.4everland.app/

https://iambrainstorming.on-fleek.app/

Git

https://github.com/iambrainstorming/iambrainstorming.github.io

https://gitlab.com/iambrainstorming/blog