DoubleDash
Will Stop It!

Identity Matrixes

Identity matrixes allow for errors and support hacking attempts.

They take up room and require extensive management. They also make it a requirement to manage the same information across all your devices.

Service First Model

Services are regional, temporary and changeable.

Currently when you think of contacting someone, you first have to choose how you are going to contact them; maybe a message, maybe a phone call, or maybe even an email. Then you go to your trusty device and start that app or tool and then you find their address and attempt to connect with them. That is the App Centric Model and this methodology has been passed down through the ages since we first began trying to connect.

However, this method offers several vexing problems. Firstly, we have to know in advance that our connection even has that connection app. With todays’ ever expanding communication service industry our contact may have moved on or removed that method.

Another troublesome aspect is that we need to keep track of their different addresses in several different locations, one for each app. As communication channels expand we find ourselves having to manage an ever growing number of contact apps and their respective contact lists. Each list offering their own methods for backing up, protecting and storing the data.

What then becomes rather suddenly apparent is that as addresses change keeping dozens of contact lists current is going to be a struggle.

This App Centric methodology is exactly what happened back in the early days of computers where you first loaded the program, say a word processor, and let them manage your documents. This method was unwieldy then and we changed to a more easy to manage system where we chose the document first and let the system choose our program.

With DoubleDash, you choose the person or organization you want to connect with and then choose from the available communication methods that your contact offers whether that is email, message or snail mail. By letting your contact determine which address is available for you to use, you are always assured of having a current address and no longer need to manage a few contact lists within each app.

Identity Leaks

Your connection addresses aren't private.

Our identity is firmly tied to our connection addresses. We use our name, email address, and phone number to connect with the public and in turn we are forced to use these very same pieces of data to connect to our private areas. This means that whenever we connect we are leaking our identity information along the way.

Another identity leak is in the credentials we use that have to contain enough identifying information to let others know that you are the legitimate holder of the credential.