Answer:  What information technology provides to the online world is no more mysterious than what architects, contractors, and property managers provide to the physical world. The Ontology Component requires the use of standardized terminology in the permitting of new facilities. By using the well-understood language of real estate, management can finally direct information technology, rather than the other way around.
     As you can see, the real estate theme is not just an illustrative metaphor. QEI is indeed about indoor spaces. Think about it: where do you go to get things done, to pursue your life’s various agendas? While we enjoy the outdoors, we get things done in buildings.
     Some people a long time ago told us that the Internet was a highway and that our use of it resembled the use of a highway. Fine. A principal use of highways is to bring us to buildings. Learning, shopping, and doing business by the side of a busy highway is just a nutty idea. It is the source of our problems.
What is Authenticity?
Contact
The Quiet Enjoyment Infrastructure (QEI)
Twelve Components
Brief Descriptions of the Function
of Each QEI Component
Twelve questions answered by the 
Twelve Components of the Quiet Enjoyment Infrastructure
Question:  Authenticity calls for pervasive digital signatures by reliably identified human beings. How do you protect the PENs (private keys), while making them available for digital signatures?
Answer:  Nothing we do with computers, phones, tablets, or other information appliances will be secure until there is a sound way to keep files, directories, identifiers, and other important items in a truly protected space. That in turn requires isolation of PENS (private keys), as specified in the PEN Component.
The PEN™ component (Personal Endorsement Number) 
answers this Authenticity question:
The Public Authority component  
answers this Authenticity question:
Answer:  On March 7, 2005 the City of Osmio was chartered at the Geneva headquarters of the oldest international governance body in the world, the International Telecommunication Union.  On that day, Osmio inherited the goals of the ITU’s recently terminated PKI — called the World e-Trust Initiative — and at the same time became completely independent of the ITU.
     Osmio’s Vital Records Department is a certification authority that limits its practice to creating, maintaining, and protecting identity certificates. Osmio’s Professional Licensing Department issues certificate-based licenses that allow architects, contractors, and building inspectors of non-physical facilities to sign plans for facilities and occupancy permits, among other professional licenses.
     While the Public Authority Component may appear to oppose the principle of decentralization, Osmio's governance is as participatory as that of a small New England town. Osmio is owned by, and governed in an open and accessible way by, those who accept its authority as a source of attestation of identity and professional licensing. There is no dark bureaucracy between you and Osmio. Those who run the CA server are directly accountable to you.
1
2
Question:  Reliable digital identity certificates, professional licenses, and occupancy permits call for a reliable source of issuing public authority that is independent of any geographic jurisdiction. Where do we find such a source of duly constituted global public authority?
Part I of QEI
PEOPLE: The Authenticity Infrastructure
Question:  How do you establish identity in the first place?
Answer:  Enrollment can be costly or not, depending upon the level of rigor needed by relying parties. The ENROLLMENT Component ensures that evidence supporting a claim of identity is gathered properly for the requisite level of rigor and presented along with the PCN (public key) in a certificate signing request(CSR) to the Osmio Vital Records Department (VRD).
The ENROLLMENT component  
answers this Authenticity question:
3
Question:  When someone identifies themself to you, how do you know how reliable is that claim of identity?
Answer:  The foundational identity certificate is accompanied by other certificates and by an identity quality record. Very little might be revealed to a relying party about the person identified other than their identity quality information and the fact that the identity certificate has not been revoked. Despite that anonymity, the Identity Reliability Component establishes accountability.
The IDENTITY RELIABILITY component  
answers this Authenticity question:
4
Question:  Personal control of information about oneself has been a long-sought goal of privacy activists. How can a universal identity credential restore privacy rather than erode it even further?
Answer:  The foundation of real privacy is your own control over information that identifies you. Without such strong controls, individuals will rightfully resist the idea of a strong identity infrastructure. While the companies that accumulate information about you regard that information as their own corporate asset, the PIOC provides technological and legal tools by which you can reclaim that asset as your own personal property. property. The PIOC uses accountable anonymity, letting you assert your identity without disclosing your identity.
The PERSONAL INFORMATION OWNERSHIP 
component answers this Authenticity question:
5
Question:  We value anonymity, but at the same time we want others to be accountable. What happens when someone whose privacy is protected anonymously harms me, my community, or my country?
Answer:  As QEI must protect your privacy, it must also protect your right to recourse if you are harmed by someone whose privacy is similarly protected. Law enforcement must also be able to seek a court order to intercept communications when a legitimate court deems it necessary to protect public safety. The Accountability Component ensures that due process prevails even in jurisdictions that are not known for adherence to due process.
The ACCOUNTABILITY component 
answers this Authenticity question:
6
Part II of QEI
PLACES: The InDoors™ Infrastructure
Question:  By what standards are we assured that an information facility is habitable — that is, secure and manageable?
Answer:  Your information is never secure in a private, cryptographic tunnel if it is exposed at the ends of the tunnel. Indeed, a tunnel can be less secure than the outdoor space around it, because it gives its occupants a false sense of security. Building codes are sets of standards and procedures that ensure the integrity of the virtual buildings that enclose, for example, the ends of tunnels.
The BUILDING CODES component 
answers this Authenticity question:
7
Question:  How do we bring the benefits of InDoor™ spaces to our computers, tablets, phones, and other devices?
Answer:  Established operating systems are invitations to plantation owners to help themselves to the contents of your information home.
With the new "continents," we will exchange the vulnerable and cranky old operating system foundation in computers and phones for a more reliable, secure, and manageable set of foundations for places rather than “apps.” Montaigne, Dorren, and Glenda are continents.
The TECTONICS component 
answers this Authenticity question:
8
Question:  Who decides whether a facility is habitable — that is, that it conforms to building codes? How do we apply the methods used in answering that question to answer other procedural questions?
Answer:  As with physical real estate, our bounded online spaces need qualified architects, contractors, property management people and building inspectors to ensure that they serve our purposes. The Professional Licensing Component provides a system of certification of their professional credentials and of the results of their work. The Professional Licensing Component does the same for the attestation profession and for other professions as well.
The PROFESSIONAL LICENSING component 
answers this Authenticity question:
9
Question:  How do we bring privacy and authenticity to social media?
Answer:  Where are these online buildings built? Who owns them? Who pays for them? How do they connect to each other in a rational way? How does online real estate become economically sustainable —
that is, profitable? We find our answer in the surprising intersection between skills and methods in the media industry and those of the urban planning profession.
The COMMUNITY component 
answers this Authenticity question:
10
Question:  Can the outdoor public transport system also benefit from QEI?
Answer:  The roadway system, the Internet, is far ahead of the real estate — the secure online places where people can safely gather. Its protocols, like those for the next generation of concrete Interstate highways, are well established. But the facilities that control the Internet are entirely too vulnerable to criminals and vandals. Access controls based upon measurably reliable identities must be put in place.
The PUBLIC ROADWAYS component 
answers this Authenticity question:
11
Part III of QEI
THINGS: The ONTOLOGY Infrastructure
Question:  Strict definitions of terms reduces confusion in the world of building codes and permits. Can terminology standards reduce rampant “FUD factor” confusion in information technology?
The ONTOLOGY component 
answers this Authenticity question:
12
About Osmio
Governance