Art of Bitfulness
Art of Bitfulness
PENGUIN BOOKS
CONTENTS
Appendix
Acknowledgements
Follow Penguin
Copyright
To Tanush, Janhavi, Shray, Nihar and Rohini
—Nandan Nilekani
OUR TOOLS
About eight hours before his flight, Prabhkiran Singh got a text from his friend
that he was backing out of their vacation.
As the CEO of a growing start-up, Bewakoof, Prabhkiran often felt like he
could never switch off from work. He had made plans with a friend to take a
week-long vacation to Port Blair. He had booked flight tickets but had not done
much else to plan the vacation. Prabhkiran decided he still needed the break, so
he set an alarm and texted his friend to say he was still going to go.
Port Blair is the capital city of Andaman and Nicobar Islands, located in the
Bay of Bengal, about 1400 kilometres away from the Indian mainland. In August
2020, the Indian government finished laying an optical fibre between the islands
and the mainland. This optical fibre finally enabled 4G services and wired
broadband on the islands. What this means is that if you landed there in 2017, as
Prabhkiran had, you’d switch on your phone to find that you didn’t have any
cellular data or Wi-Fi and, consequently, no access to the internet.
Landing in a new place without the internet was strange and made Prabhkiran
slightly nervous. He couldn’t look up hotels or make reservations online. He
couldn’t look up a map to decide where to go or book a taxi to go there. He
hadn’t even saved any music on his phone because he was used to the idea of
streaming music on demand. Prabhkiran admits that when he first realized there
was no internet, he slightly regretted his decision to fly unprepared. But, over the
next seven days, he had the best vacation he has ever had.
Instead of looking things up on his phone, Prabhkiran had to talk to people to
make his way around. When bored, he couldn’t scroll social media or sneak a
peek at his email. Once he reached the resort, not only was there no internet,
there was no cellular reception either. Most days, he didn’t even carry his phone
with him. The best part was that everyone else on the island was disconnected
too. He found that people were more sociable and friendly. Strangers would join
him for dinner and share stories from their travels. Prabhkiran carried a book
every time he’d go on vacation, but this was the first time he actually finished
reading it. After a very long time, he felt present in the moment and at peace.
By the end of his vacation to the islands, Prabhkiran realized that being
unplugged wasn’t as scary as he had first imagined. He vowed to spend less time
on his phone and more time amidst nature or in the company of friends. He
deleted social media apps from his phone. After his return to Mumbai, every day,
at 5.30 p.m. sharp, he would leave his phone on his desk and walk with a friend
to Powai Lake to soak in the sunset. He found himself less stressed and more in
control of his day.
If this were a movie, this is where the story would have ended.
You probably know what happened next. For a few weeks, Prabhkiran still
caught the sunset every day, but he started taking his phone with him.
Eventually, he stopped going. First one, then another; soon, all the social media
apps came back. Work slowly started eating into his personal life, and
Prabhkiran found himself exactly where he began—feeling overworked,
overwhelmed and always connected.
We all know this conflict. Our devices make our lives incredibly convenient,
but at the same time, they take something away from the quality of our lives.
Yet, it is impractical to disconnect. Prabhkiran, for instance, would be unable to
run his company without his smartphone. Even cutting down screen time is very
hard. We may be able to do it for a few days or weeks, but, eventually, we all
slip up and get back to where we started.
In an ideal world, our technology would be less distracting, and we’d be less
easily distracted. We, however, do not live in an ideal world. Our technology is
addictive by design, and we’re easily addicted by nature. Focusing on only one
side of this problematic equation will tell an incomplete story. This book is an
attempt at fixing the relationship we have with our digital tools, by looking at
both sides of the equation.
We must begin by understanding how we shaped our tools and how they, in
turn, are shaping us.
One way to frame our toxic relationship with technology is that our extended
mind is wandering. Instead of helping our brains think, these technologies
amplify the tendency of our minds to wander. Our devices have given us the
ability to chase every train of thought, and it is hard to keep it focused on the
right one. Practising mindfulness helps focus our minds on the present, ignoring
stray thoughts. Can we learn how to focus our extended minds too?
Our struggle with our technology is part of a challenging class of problems.
We struggle to keep our weight in control in an age of readily available high-
sugar and high-fat foods. We know that obesity is associated with many diseases.
Yet, this knowledge is insufficient to cover the gap in practice. We experience
the same problem when trying to quit addictive substances such as cigarettes and
alcohol.
The most common misconception whether we’re trying to lose weight, quit
smoking or focus our extended mind is that it requires an iron will. In fact, for
success, we need precisely the opposite. There are numerous behaviour change
studies which demonstrate that instead of relying on maintaining willpower, we
are more likely to succeed if we change our environment to avoid junk food or
cigarettes. Instead of aiming to lose ten kilograms, you want to focus on
something in your immediate control, like not snacking between meals. You
want to make small changes, each adding up bit by bit, to create healthier habits
that are easy to maintain, even on days when your willpower is low. The desired
outcomes automatically follow.
While we can’t change our minds to start disliking high-sugar or high-fat
foods, the good news is that our extended minds are programmable. We can
spend some time becoming aware of how we falter and then put systems in place
to prevent it from happening. Instead of exerting willpower to stay focused, we
can design our technology to guide our attention to the task at hand. We can
sustain new digital habits much more effortlessly than dieting or exercising
because we can configure our devices to assist us instead of distracting us.
This awareness-driven environment design and habit change are what we call
The Art of Bitfulness.
We, the authors, have both personally experienced frustration from technology
overwhelming us. We have also found that it exists, to varying extents, amongst
our friends and colleagues. Everyone we know has come up with their own rules
and strategies to manage the overwhelm. Nandan, for example, does not use any
instant messaging apps—he sends and receives SMSes only. For Tanuj, most of
his contacts are on WhatsApp. But the way we deal with messages is similar.
Using them as and when required rather than letting incoming notifications
dictate our attention. Those few friends, family and colleagues who may need to
reach us urgently know which channels to use and our devices are configured to
let them. Some differences in our approach emerge due to the age at which we
started using these technologies. Nandan got a smartphone only at age fifty-five.
Tanuj had one since he was twenty-one. Being in very different stages of life, we
had different aims for our extended minds. Being connected to friends was
essential to Tanuj, and he made allowances for limited use of social media.
Nandan believes social media is not very useful for him. So, he sends emails to
his friends or picks up the phone to call them if he can.
Despite the thirty-four-year age difference between us, we found that we have
a lot in common in our approaches to manage our relationship with technology.
We realized that there were principles that remained common, even though the
specific apps or technologies we used to attain similar goals varied. We both also
acknowledge that giving up the internet is not a desired option for us. This book,
therefore, does not recommend quitting or detoxing from any particular
technology. The aim is to have a sense of calm and control over our interaction
with our technology.
We both believe taking a thoughtful approach towards when, where and how
we interact with our technology has greatly benefited our sense of well-being. So
how do we go about fixing our toxic relationship with technology and being
more bitful?
As with all toxic relationships, you don’t focus on the people; you focus on
the patterns.
2
THE PROBLEM WITH US
Researchers have found that most humans are terrible at multitasking. Yet, we
overestimate our ability to multitask. We can multitask when using different
physical faculties, such as walking and listening to a podcast. But when we have
to do two things that require the same attentional circuits, such as writing a
document and replying to texts simultaneously, we suffer on both tasks. It takes
time to switch contexts, and our focus doesn’t bounce back as quickly. Overall,
we feel more stressed and get less done.
Computers are general-purpose machines, i.e., unlike a screwdriver which can
only perform one function, people use computers for many different purposes.
Computers work significantly faster than humans and can do these many things
simultaneously. Multitasking is their strength, but our weakness. Humans are
good at doing only one thing at a time. Yet, our digital lives are designed around
the computers’ multitasking ability rather than humans’ single-tasking nature.
Every moment you spend on your devices, you must exert self-control to
maintain boundaries and preserve context. By design, it is incredibly easy to
falter.
#2 CHOOSING IS HARD
In 2000, psychologists Sheena Iyengar and Mark Lepper published a study on
the ‘paradox of choice’. They presented one set of shoppers at a supermarket
with an assortment of twenty-four gourmet jams. To another set of shoppers,
they displayed an assortment of only six jams. In their experiment, the larger
assortment drew more visitors. But those shoppers were only 1/10th as likely to
purchase something compared to those shown only six jams. Though the smaller
assortment pulled less of a crowd, its shoppers chose meaningfully and
purchased what they liked.
This anomaly in our behaviour came to be known as the ‘paradox of choice’.
Further studies have shown that excess choice not only produces a ‘choice
paralysis’, but even for those who do choose, it reduces satisfaction with their
choices. Choice paralysis holds when choosing between chocolates, paintings
and even jobs. Too many options lead to many ‘what-if?’s. Even with the
freedom to choose exactly what we want, we end up being more unhappy with
what we’ve chosen.
We already see this happening in the online sphere. Many users complain of
indecision due to the many choices of what to watch on Netflix or YouTube. Or
worse, of spending thirty minutes on deciding what to order from Swiggy or
Zomato. We browse through catalogues, hoping to find something that will
surprise or delight us. The endless choice encourages a behaviour where the act
of deciding itself becomes addictive, keeping us hooked to the product. We hear
a similar complaint about dating apps. The easy, instant reward of a new match
over the challenging, time-consuming task of building an authentic connection
keeps people addicted to swiping. We end up dissatisfied because we spend more
time deciding what we’d like than liking what we’ve decided.
One would think that given this paradox, the right thing for technology
companies to do would be to reduce the amount of choice that is available to us.
Yet, search results stretch on for thousands of pages and social media feeds are
infinite.
Growth is the primary driver for these companies. Having the widest choice
attracts the most people, just like in Iyengar and Lepper’s experiment. We are
drawn to novel information. ‘Stickiness’ can be solved using other ‘growth
hacks’ such as recommendations, personalization and social feeds.
In fact, recommendation technologies would be meaningless if we didn’t have
too much choice in the first place. We wouldn’t need gatekeepers, rating scores
and algorithms if the amount of content were manageable. Too much choice is
what keeps us coming back for more, hoping that luck will be in our favour this
time and we will discover something surprising or exciting. Too much choice is
why we let autoplay decide our next video. If we give people too much choice
and the option to let the machine decide for them, most will prefer to not exert
self-control and handover the reins to the machine.
Too much choice obfuscates the most meaningful choice—our choice to stop.
#3 THINKING IS HARD
We’ve all either said it ourselves or heard someone else say, ‘my head hurts to
think about that’.
Cognitive effort is known to be hard. Scientists from McGill University,
Canada, set up an experiment to ask people to choose between a cognitively
demanding task or experience painful heat. In their results published in 2020,
they conclude,
‘This provides compelling evidence that cognitive effort is aversive and the
desire to avoid it can be quite strong. Put simply, people preferred to
experience physical pain rather than do something mentally demanding. In
fact, participants made effort-avoidant choices even when faced with the
maximum ethically permissible pain level: on average, participants
accepted the painful stimulation, calibrated to 80/100 (100 = “extremely
intense” pain), approximately 28 per cent of the time to avoid performing
the cognitively difficult 4-back task.’
The resistance to cognitive effort varies across individuals, but all of us show
some degree of resistance. We can overcome it, but doing so feels tiring. When
we’re stressed, distracted or tired, we’re less likely to think about our own best
interests and do what’s mentally easy instead. Even if the mentally easy option
involves physical pain.
Aversion to thinking too hard makes us take all sorts of decisions that may not
be in our favour. We click the button to accept all cookies because it is coloured
a familiar blue. We don’t uncheck the box next to ‘sign me up for marketing
communications’ because it is selected by default. Not wanting to think is also
why habits are so successful. Familiar pathways of action are the ones of least
resistance for our brains.
In 2014, in a popular book called Hooked: How to Build Habit-Forming
Products, Nir Eyal lays out the process for piggybacking on this fundamental
human trait to make apps addictive. The mechanism for hooking users is simple
—present users with a trigger, and if they act on that trigger, reward them. But
there is a secret ingredient. On his website, the author advises businesses, ‘At the
heart of the Hook Model is a powerful cognitive quirk described by B.F. Skinner,
in the 1950s, called a variable schedule of rewards.’
The famous psychologist B.F. Skinner proved that you could teach animals
seemingly intelligent behaviours by reinforcing desired behaviours with rewards.
In a very popular video, Skinner uses reinforcement to teach a pigeon to make a
complete turn. He does this in under a minute. The ‘cognitive quirk’ that Eyal
mentions is that something strange happens when you make the rewards
unpredictable. Skinner demonstrated that variable rewards resulted in most
instances of the desired behaviour. It also led to behaviours that were the hardest
to extinguish. Skinner compares this effect to a slot machine in a casino. He says
that the uncertainty of rewards makes each iteration of the desired behaviour like
a spin of the slot machine. For the subject, the desired behaviour can become as
addictive as a slot machine.
The reason we find it so hard to look away from our phones is the same as the
reasons for which we procrastinate. It is an emotion-regulation problem. Instead
of doing what we know we should, we perform an easier, automatic and familiar
behaviour to avoid the task. It could be scrolling through social media, catching
up on group chats, reading the news, checking email or whatever particular way
you tend to lose time. Without even noticing it, we’ve learnt to perform a habit
whenever we feel discomfort.
Unsurprisingly, the strength of this automatic habit is strong. One detailed
2016 study installed special software on people’s phones to capture every
interaction with their phones over the day. They learnt that the average user
picks up their phone about seventy-six times a day. The average user will touch,
tap or swipe their phone 2617 times a day. The top 10 per cent of users in their
sample were touching their phones daily more than 5427 times over about 132
different sessions.
That’s approximately over one million touches per year over 27,000 sessions
for an average user.
Think of each of those sessions as micro-training for your brain. The
interactions where we pick up our phones in response to our boredom and
anxiety reinforce our toxic habits. Quitting our phones is, thus, tough. We’ve
conditioned ourselves deeply over millions of interactions to look at our phones
and avoid negative emotions.
Variable rewards create powerful habits. Whether rats pressing levers or
humans touching their phones, a variable reward schedule can make us behave
compulsively. It can ruin our ability to self-control, even when we know we
should. Smartphones aren’t the only technology to take advantage of this
behavioural oddity. To understand more, we need to look at casinos.
THE ZONE
In her book, Addiction by Design, researcher Natasha Dow Schüll documents
techniques used by casinos to keep people addicted.
There are fascinating insights in Schüll’s book about the attention to detail in
designing gambling environments. Various skilled professionals spend their time
maximizing ‘Continuous Gaming Productivity’, a metric that measures how long
gamblers are using slot machines. ‘Our best customers are not interested in
entertainment—they want to be totally absorbed, get into a rhythm’, says a game
designer in the book.
Casinos are built to have no sharp edges by design, to keep people from
thinking too hard about decisions on where to go. Casinos don’t display clocks.
They want to keep you from noticing the time and deciding to stop. The payment
mechanisms have gone digital. You don’t need to put coins in the machine or
fiddle with credit cards. The chairs are specially designed to keep the gambler’s
legs from falling asleep and allow them to be seated for hours without getting
up.
Schüll points out that slot machines are by far the most successful of all
gambling equipment. More people play slot machines than any other game in
casinos. Slot machines constitute about 70 per cent of the average US casino’s
income. She says there are three reasons in the design for this—continuity, speed
and solitude. Every other game—whether horse racing, roulette or blackjack—
has natural pauses that give you time to reconsider. However, the slot machine is
automatic, continuous and fast. There are slot machines that can have users play
as many as 1200 games an hour. Most insidious of all, it is private. There is
nothing between you and the machine, no human in the middle who can slow
things down. Slot machines are the smartphones of the casino world.
Schüll’s most insightful commentary is about why people use the slot
machine. You would imagine people want to win. But according to Schüll,
players are playing to ‘get in the zone’. Schull describes the zone as ‘a mental
state in which time falls away, space falls away, and importantly for the
gamblers, a sense of monetary value disappears, and sometimes even a sense of
self. Awareness of other people, everything drops away, and you’re just in that
loop with the machine.’
The most convincing arguments come from the user experiences she relates.
Schüll summarizes this surprising motivation for gambling in one of her
interviews.
‘Another gambler by the name of Shannon told me, “you know, it’s so strange,
but sometimes when I win, I get really tense and really frustrated and almost
angry.” And I heard this over and over again in my interviews. What was going
on was that winning interrupted the zone. It interrupted the flow of play because
the machine freezes up. Suddenly there’s music. Suddenly people are looking at
you. You’re back in time, you’re back in space, you’re exactly where you don’t
want to be.’
Think about the last time that you were in one of those rabbit holes.
Say you decided to check out your favourite distraction. It could be a news
site, social media, streaming video or something else. Each link you clicked,
feed you scrolled or the recommended video you watched; all of these pushed
you into automatic, fast and continuous behaviours. You probably lost more time
to them than you wanted. You were in the zone.
But what made you open the distracting app in the first place?
The likely answer is that you open it out of force of habit in the moments
between finishing a task and starting another. You probably even know what
important thing you should do next, but your brain pushes back on exerting self-
control. You feel a sense of discomfort that manifests either as boredom or
anxiety. That is when you seek the zone.
In the past, when you felt this discomfort, you may have decided to comfort
yourself by opening one of these apps. The infinite choices offered by these apps
never give you a sense of completion, so you keep going. Each scroll, refresh or
click gives you new content that may or may not be useful, just like the slot
machine’s variable rewards. These continuous, fast and variable rewards take
you into the zone. You’re able to avoid thinking about whatever anxiety that
triggered you to use the app because you’re in the zone.
From the brain’s perspective, this action actually resolves the task. We were
facing discomfort in anticipation of the task. When we avoid the task and are in
the zone, we don’t feel anything. Our brains now associate reaching for our
phones as the solution to all such discomfort. Over our millions of interactions
with our phones, we’ve repeated this behaviour enough for it to become a habit.
The apps have managed to train us to associate the cue of discomfort with the
behaviour of picking up our phone like Skinner trained pigeons. We reach for the
apps or news feeds that make us lose a sense of space and time.
Eventually, one would get bored of any slot machine and stop. But, our
computers and smartphones are portals to multiple slot machines. Moreover,
there are no boundaries between these apps and browser tabs. We end up moving
from one virtual slot machine to another, chasing the zone.
The next time you find yourself losing time as Dhruv did, ask if you were truly
present in what you were doing, or if you were simply chasing the zone. All of
us indulge in this escapist behaviour sometimes. But our devices can make this
escapism into an insidious habit. And the habits that have been reinforced
millions of times by our daily actions become very hard to break.
People often frame their phone-addiction problem in terms of what they do on
the phone. People believe they are addicted to Twitter or Instagram or YouTube.
The real problem is not what they use, but when they use their phones. We’ve
trained ourselves to reach for our phones in response to an unpleasant emotion.
We seek to get into the zone so that we don’t have to face these difficult
emotions.
Unlearning this deeply ingrained habit is going to take time and effort. It will
involve changing many behaviours that are now automatic and easy. Often, we
fail in our attempts because the challenge is vast, and we’re seeking quick and
easy answers.
The most toxic answer is that you simply need to do better.
WILLPOWER
One half of our toxic relationship with technology is due to our own lack of self-
control. Surely, if we managed to exercise our willpower better, we could stop
ourselves from getting into the zone and losing time?
While this approach sounds correct, it misses a critical point.
Runners and athletes often describe a similar experience of being in the zone
and losing a sense of time when they are fully engaged in their sport. Our digital
slot machines are designed to be engaging, but often when we lose time to them,
we feel guilt and shame. Now imagine if you spent an hour being in the zone,
but while running. You are likely to feel happy and fulfilled. The difference is
primarily that when we are lost on our phones, we are unintentionally in the
zone. Whereas, when we are running, we are intentionally looking to be in the
state of singular focus. The problem isn’t that we chase the zone but that we
spend our time in zones that we do not intend to.
It is the gap between our intention and our attention that makes us unhappy.
As we’ve said before, the goal of bitfulness isn’t to spend less time on our
phones. It is to spend time better.
Hence, depending on our willpower alone is a bad strategy. Not being able to
exert sufficient self-control is how we developed these behaviours in the first
place. Relying on willpower alone is like trying to quit smoking while carrying a
cigarette packet with you wherever you go—you can exert self-control on most
days, but sooner or later, you will have a moment of weakness and reach for that
packet.
The real problem is that our technology usage is often designed around who
we wish we were, not who we are.
We wish we were someone who only looks at their phone when necessary. We
wish we were not easily distracted and always made healthy choices. We wish
that we only checked messages and emails when convenient to us, and not
compulsively. We wish that we only used social media for entertainment and not
scroll through it mindlessly. In reality, we are capable of focusing but often slip
up. We are ambitious and conscientious but also prone to procrastination and
laziness. Apps and platforms exploit this gap between our self-image and our
reality.
Our self-image of being a conscientious, rational and motivated human being
only gets in the way of fixing our relationship with technology. Instead of fixing
the causes of toxic behaviour, we try to exercise more self-control on its
symptoms and fail. We blame ourselves for not being capable enough or strong
enough to change. We’ve been tricked into believing that because we have the
choice to switch off, not being able to switch off is a personal failing. This belief
is both untrue and unhelpful.
When it comes to addiction, we tend to focus on two things—the addict and
the substance. There is a third factor we often fail to consider—our environment.
In 1971, the US military noted that 15 per cent of American soldiers in
Vietnam were heroin addicts. Heroin is extremely addictive, and few thought
there was a chance for these soldiers to be de-addicted. But, when these soldiers
reached home, the statistics were astonishing. Less than 5 per cent of the soldiers
relapsed in the first year, and less than 12 per cent in three years. Scientists had
to challenge their current understanding of addiction.
The basis for deciding if a substance is addictive was tests carried out on
laboratory rats who were isolated in small cages with two drips that they could
choose from. One drip usually contained water or food, and the other contained
addictive substances such as morphine or cocaine. What most of those studies
showed is that rats would obsessively choose the drugs over food or water, and if
they were allowed to, many would overdose.
Canadian psychologist Bruce K. Alexander set up a series of experiments in
the late 1970s to see if changing the environment that the rats were in would
change their behaviour. So, he designed a rat park—a space with 200 times the
floor area of a regular experiment cage. Other than the usual two drips, it
contained a play area, food, and most importantly, other rats to socialize with.
Alexander demonstrated that rats in this environment rarely chose the drugs.
Even those that did never overdosed. Surprisingly, even the same rats that would
obsessively choose drugs in the solitary cages would wean off their habit once
they were introduced into the rat park.
It is not simply the neurochemistry of our brain interacting with the substance.
It is also our environment and our social context. When the soldiers came back
to the very different environment of their homes, or rats came to the rat park,
even the most deeply ingrained habits learned on the battlefield could be
overcome.
The way to practise bitfulness is, therefore, awareness-driven habit and
environment change. In Part Two of this book, we will thoughtfully design our
extended mind. Instead of exercising willpower, make it easier to stay in
context, minimize choices and reinforce good habits. If we design our
environment around who we are, instead of who we wish we were, we can guide
ourselves towards making healthier choices automatically.
There are no tricks that will help you unlearn these toxic habits overnight. Our
focus isn’t on eliminating all toxic habits. Instead, we will focus on fixing our
relationship with technology by creating tiny good habits. We will design our
extended minds to make these good habits automatic. Some of these
environmental changes will help these habits stick instantly, and some may need
tweaking. Bit by bit, we can reset our relationship with technology.
Remember, it does take two to make a toxic relationship. This chapter only
covered how we contribute to the toxic patterns of behaviours. In the next
chapter, we will learn how our technology contributes to this toxicity.
3
THE PROBLEM WITH IT
TARGETING
All advertising has a particular weakness, best articulated over a hundred years
ago by department store magnate John Wanamaker: ‘Half the money I spend on
advertising is wasted; the trouble is I don’t know which half.’
When it began, advertising on the internet did not look very different from
advertising on billboards. It was a large banner designed to capture your
attention as you went around surfing the web on your own business. Marketers
soon realized the internet is not a billboard. It didn’t take long before someone
asked, ‘Why are we showing the same ads to everybody who visits our site?’ If
you were surfing an article about cars, wouldn’t it make sense to show you an ad
about cars? If you were reading an article about books, wouldn’t it make more
sense to offer you an ad about books instead of cars? Thus, ads began to be
targeted based on the content and context of the web page.
The internet promised to answer Wanamaker’s question. You could find out
how many people saw the ad, how many clicks your ads were getting, etc.
Getting data this fast was very unusual for marketers in the 1990s. Until that
point, a campaign cycle would take weeks to plan and execute. Feedback would
only arrive in a quarter or two when the sales results came in. Online advertising
was the first taste of data for advertisers, and they would soon get hungry for
more.
In 1996, DoubleClick was launched. This online ad agency changed the way
marketers thought about their jobs and would go on to be acquired in 2007 for an
eye-popping US$3.1 billion, all in cash, by Google. In the late 1990s, though,
DoubleClick was still a small operation. Through early tracking technologies,
they were able to tell their clients what ads people saw and when. Essentially,
data on ad performance. It wasn’t long before advertisers realized they could
target even better if they started asking who exactly is watching these ads.
That is, data on people.
Targeted advertising is a seductive idea. If you’ve ever had to sell anything,
you would know that getting people to part with their money is hard. But what if
you could put your product in front of those exact people who are looking for
something like it? This part-oracle, part-cupid matching of seekers and sellers is
the ultimate promise of all online advertising firms. They collect data to help
target ads to the customers who are likely to buy them. In theory, a win-win!
Targeted advertising is, hence, a lucrative industry. Companies such as
Google, Facebook, and others match ads with viewers at great scale and speed.
Global spending on digital advertising was roughly US$333 billion in 2019, i.e.,
50 per cent of all advertising spend globally. It is still growing.
Information wants to be free, but it still costs money to deliver it. Advertising
makes the internet accessible to everyone, claim its supporters. Google could
serve us all of the world’s information for free in exchange for a few ads.
Facebook connects you to all your friends in return for a few sponsored posts.
The web allows us to create more information than ever, cheaper than ever.
What’s the harm with tacking on a little more information on behalf of an
advertiser, if it pays the bill?
Nobel prize-winning economist Herbert Simon saw things differently. ‘What
information consumes is rather obvious: it consumes the attention of its
recipients. Hence, a wealth of information creates a poverty of attention.’ If you
think this is an accurate description of the internet, it is worth mentioning that
Simon said this in 1971.
The advertising model made attention the real currency of the internet. Selling
targeted ads was how companies encashed your attention. Targeting is why
AdTech companies like collecting user data. Data helps match users to
advertisers.
In effect, the lack of payments infrastructure on the early web has led us to our
current attention and data-hungry internet.
WINNERS, TECH, ALL
We’re facing the Third Crisis today because there was a vacuum at the core of
the internet.
David D. Clark, head of the Internet Architecture Board through most of the
1980s, recalls this exchange with an unnamed economist in his book, Designing
an Internet.
We, the authors, have spent nearly the entirety of our careers in the space of
information technology and related policy. Despite the thirty-four-year
difference in our ages, we share a sense of wonder and excitement in what
information technology has achieved and continues to achieve. For both of us,
the internet has been a fantastic opportunity to learn and connect with wonderful
people. It is full of exciting problems to work on. We’re both optimistic that the
answer to society’s problems lies in more, not less, technology.
Optimism is not the same as naivety. Our excitement about technology is
specifically about humanity’s increasing ability to do marvellous things. Using
that ability to benefit all of society is another challenge altogether. Our current,
winner-take-all internet does not meet this challenge.
Although the internet started as an open and decentralized network in the
1980s, private companies have built most of our modern web over the last three
decades. The original creators of the internet may have laid the foundation with
an open communications network. But, we’ve outsourced building the rest of our
internet infrastructure to players building walled gardens.
Companies such as Facebook, Google, Amazon or other such large tech
companies are large because they each fulfil an essential function on the web.
Facebook is how we communicate with our social networks. Google has built an
index of the web. Amazon has created the largest marketplace. They are all
digital infrastructure, and in the pursuit of market share growth, they have all
been designed to be winner-take-all.
A handful of tech companies effectively own the roads and highways of the
digital world. We are looking at a future in which these companies are not just
the winners of their own markets but also have the power to decide who wins in
all adjacent markets. For example, the online travel industry alleges that Google
favoured its own hotel and flight booking products in search results. Amazon has
been accused of propping up its own brands on its marketplace search results.
Uber drivers are often protesting about how the company’s fare policies work
against the drivers’ interests.
Tech companies maintain they are acting in the users’ best interests, but their
competitors see an unfair advantage in their ability to change search results or
set prices. Even without those systematic advantages, competing with these
giants is challenging because of the vast resources they have now amassed. In
April 2020, the top five tech companies alone were sitting on US$555 billion in
cash and cash equivalents. These companies have achieved their dominant
position by genuinely building innovative products and giving users what they
want. Just because they have near-monopoly power doesn’t automatically imply
they will abuse it.
But the question to ask ourselves is why even afford them the chance?
The original internet had a simple idea built into its design. The network that
connected everyone was not to be controlled by any single one. The internet
belonged to everyone and no one. This is not a radical decision. The precursor to
the internet was built as a defence research project by a collaboration of
scientists across many universities. In a few years, development of the
technology moved to academia. The time and effort that went into the internet
was essentially funded by public institutions, i.e., by all of us. It is hardly
surprising that the output of the combined efforts of thousands of scientists and
engineers, funded by public money, was a technology that belonged to all of us.
Our current internet infrastructure looks very different from what the internet
was supposed to be. Instead of belonging to all of us, critical parts of the internet
are under the control of a few players. Internet companies gloss over this
difference because they maintain that what’s good for the user is good for the
business. In the presence of alternatives, customers will choose the product that
serves their needs well, and affordably. This is true when the control over the
infrastructure is used to help users achieve their goals. However, it is when user
goals and the platform’s goals misalign, that we should be worried about their
power.
In 1998, two graduate students, funded by a public grant, wrote a paper
talking about this problem in the context of search engines. ‘The goals of the
advertising business model do not always correspond to providing quality search
to users,’ they wrote. ‘We expect that advertising funded search engines will be
inherently biased towards the advertisers and away from the needs of
the consumers.’
Who had this foresight in 1998? Sergei Brin and Larry Page, the co-founders
of Google.
We do not doubt that the people who start, or work at internet firms are honest
individuals trying to do good. But as they say, the road to hell is paved with good
intentions. The issues we have today with the internet—misinformation, loss of
privacy, losing attention, increase in polarization, election meddling, etc.—are
all questions around the design of our digital infrastructure, and hence, are all
questions about control over our digital infrastucture. The imbalance of power
over critical infrastructure is not amenable to an equal or just future.
Regulations can check some excesses of internet companies, but they can’t
resolve the fundamental paradox created by private infrastructure. If we continue
funding and building the internet the way we currently do, we risk upsetting not
just our livelihoods and our economy but all of our major societal institutions.
While we can learn how to manage ourselves better and practise bitfulness, we
also need to fix the underlying problem in our relationship with technology.
We need to rebuild our digital roads and highways in the way we build our
regular roads and highways—designed to serve us and not for us to serve them.
WORKING TOGETHER
Disease is as old as humans, but pandemics are a side-effect of civilization. The
COVID-19 virus may have originated in a single city in China, but our transport
and logistics networks made the new disease a global pandemic. Even the Black
Plague, which killed approximately a quarter of the population in the fourteenth
century, was spread from port city to port city by rats travelling on merchant
ships. Our transportation network also leads to increased fossil fuel consumption
and climate change. Every time humans have created networked technologies,
we have created a new class of complex problems.
When it comes to the other two existential crises facing humanity, we have a
reasonable plan to address problems emerging from our technology, even if it is
hard to follow.
During the pandemic, in just a few days, we figured out that to prevent
catching COVID-19, people must wash their hands, wear a mask, maintain a
minimum distance of six feet, and avoid unventilated rooms. For climate change,
we know that we must move to cleaner fuels, minimize consumption of plastic,
eat less meat, travel less and by foot where possible. These are simple measures
that we can all take to lessen the problem.
These individual solutions, however, help manage, not eliminate, the problem.
To end a pandemic, we need collective action. We need countries to invest in
testing and health infrastructure, develop and administer vaccines, implement
better pandemic preparation plans, among other measures. To fix climate change,
we need better policies such as carbon taxes, clean air legislation, better
monitoring of pollution, promotion of renewable energy, and other big ideas.
Every new global technology creates problems, but our history demonstrates
we can solve those problems if we coordinate and cooperate. Our most recent
progress on vaccines for the COVID-19 pandemic shows us what we can do if
we are willing to do what it takes and do it together.
The internet is the first technology to connect everyone and give everyone a
voice. It is connecting people who have never coordinated before. There are
bound to be complex problems that emerge as this technology becomes widely
adopted. We do not call the internet’s missing infrastructure a crisis to make it
sound graver than it is. We call it a crisis because it affects all of us, and like any
crisis, it will require collective action to fix. In the absence of our collective will,
our digital infrastructure become walled gardens. We have some freedom but no
control over the design of the infrastructure itself. As more of our lives become
digital, the power over this infrastructure will equate with power over all
dimensions of our lives. We need to reach a consensus on what our digital
infrastructure should look like and what values it should protect. In Part Three of
this book, we cover what we can do to solve The Third Crisis collectively.
Before we do that, we’re going to start by fixing our individual relationship
with our technology. We want to restore a sense of calm and control in how we
use our devices. In Part Two of the book, we go over some specific strategies to
reclaim our time, attention and privacy. We also cover the principles that guide
them so that you can adapt these ideas to your own personal situation.
Ultimately, these principles represent a simple truth—if you don’t design your
technology around your life, someone else will design your life around their
technology. If you want to control your time, attention, and privacy, you will
need more than just willpower or quick hacks.
You need a system.
PART TWO
THE INDIVIDUAL
4
HOW TO BE BITFUL
A QUIET MIND
In 1972, Timothy Gallwey, a college administrator and part-time tennis coach,
wrote a book that would change how all professional athletes trained. Instead of
teaching stances, grips, swings or other technical details of tennis, the book
called the Inner Game of Tennis focused entirely on what happens inside a
player’s mind.
Gallwey believes that most people need to stop consciously trying to play well
and instead quieten the mind. Our mind places obstacles between us and our best
performance in the form of self-doubt, criticism and lapses in concentration. We
all have an inner critic, telling us how we’re failing or that we need to do better.
Allowing these thoughts to take over can dampen any player’s performance. A
quiet mind silences the inner critic. It allows our subconscious to focus
exclusively on playing and not on judging how we played. Hence, Gallwey
believes that the most important skill for good tennis is relaxed concentration.
He offers a slightly unsportsmanlike method to test his theory.
The next time you are playing an opponent having a ‘hot streak’, Gallwey
suggests you ask them, ‘What are you doing so differently that’s making your
forehand so good today?’ Most will acknowledge the compliment and take your
question sincerely. They will reply with how they are swinging or meeting the
ball in front and other such details. When you get back to the game, your
compliment is likely to do more damage than any insult. Your opponent will try
to follow their own advice. Their mind is now paying attention to the very things
they advised you about. Their effortless hot streak will falter as they try to put
conscious effort into their shots.
The ideas in Gallwey’s book were groundbreaking for their time. The role of
psychology in sports performance hadn’t gained mainstream popularity when the
book was first released. The first Journal of Sports Psychology was published
only in 1979. The 1984 Olympics would see the first sports psychologists travel
with some of the teams. By the next Olympics, most teams had multiple of them.
Gallwey’s book clearly articulated what every professional sports team would
soon realize: ‘The opponent within your own head is more daunting than the one
on the other side of the net.’
Gallwey’s observation is just as valid outside the tennis court. The publishers
had expected this niche book to sell maybe 20,000 copies to budding tennis
players. The book has sold over a million copies, not only to athletes from all
disciplines but also business leaders, musicians and anyone else trying to
improve at something. None of these other readers wanted to learn about tennis.
They wanted to learn about the mental state of relaxed concentration that allows
one to excel at anything.
Unsurprisingly, scientists have since then given this mental state a name and
studied it extensively. In 1996, Mihaly Csikszentmihalyi wrote the seminal book
on this mental state titled Flow. He describes ‘flow’ as a mental state in which a
person performing an activity is fully immersed in a feeling of energized focus,
full involvement and enjoyment in the process of the activity.
All of us have experienced flow.
Whether in sports, at work or in pursuit of a hobby, we have had the
experience of being fully immersed in an activity. We have full concentration on
the task at hand. We lose a sense of time and place. Action and awareness merge,
and making the next move is effortless. We don’t need external motivation to
continue. Our minds naturally quieten, and we are intensely focused yet relaxed.
If the Flow mental state sounds familiar, it is because it describes exactly The
Zone from Chapter 2. Natasha Dow Schüll, the author of Addiction By Design,
claims that the designs of slot machines naturally lend themselves to this flow-
like state where players lose a sense of time and place. The two states are
indistinguishable in their effects on us. The only difference lies in the alignment
of our intention and attention.
Gallwey’s fundamental insight is as relevant to our screens as it is to sports. If
we are trying to spend less time on our screens or forcing ourselves to be
productive, we are not unlike the tennis player on a ‘hot streak’ reminded of their
forehand. Our conscious effort only makes it harder to actually do our best.
The more daunting opponent is within your own head. Self-doubt, self-
judgement and other negative emotions get in the way of our best work. Our
minds seek refuge from these unpleasant emotions and often find it in the
distractions on our devices. Over time, these toxic patterns get reinforced and
solidify.
Instead of giving in to these patterns, we need to learn the art of bitfulness.
HOW TO BE BITFUL
Most of us think of our devices in the same way in which we think of hammers.
We see our technology as a tool that we use to get things done. As the old
adage has taught us, a bad workman always blames his tools. Being good
workmen, when we are unable to focus, we blame ourselves instead. We think
the solution to our problems is to concentrate harder. We use willpower to direct
our minds to focus on the task. If we have a focused mind, we will be better
operators of our tools.
This model puts the cart before the horse.
Yes, we operate our phones as tools, but the relationship isn’t one way. These
tools affect us deeply in a way that no hammer ever can. An experiment was
conducted with 800 smartphone users by Professor Adrian Ward from University
of Texas. In the experiment, people were randomly divided into groups where
one group had to keep their phones on their desks, face down. Another group
had to keep their phones in their pockets or bags, but out of sight. The third
group of people were asked to leave their phones in another room during the
tests. In all three groups, some were asked to turn off their phones.
The participants were then given tasks that needed cognitive effort. Even
though all participants reported giving their full focus and attention to the task at
hand, the participants whose phones were in the other room significantly
outperformed those whose smartphones were on them.
It didn’t even matter if those who had their phones had turned them off. If the
phones were near or on them, their capacities diminished.
‘We see a linear trend that suggests that as the smartphone becomes more
noticeable, the participants’ available cognitive capacity decreases,’ Ward said.
‘Your conscious mind isn’t thinking about your smartphone, but that process—
the process of requiring yourself to not think about something—uses up some of
your limited cognitive resources. It’s a brain drain.’
In the internet age, our devices are more than just tools. Our devices don’t
merely connect to the internet. They also represent our connection to the world.
A large part of our social interactions now happen through these devices. Your
acceptance letter for college, that email about your promotion, the texts from
your partner, the results of your blood test, the graphs showing whether your
investments are going up or down—our phones are the physical manifestation of
all this information that affects us deeply. As Professor Ward discovered, simply
the presence of a smartphone is enough to reduce cognitive capacity as we try
not to check it.
Now imagine the ability of your phone to affect your mental and emotional
states when you are looking at it. We use our devices to get things done, but our
devices are also doing things to us.
Our attempts to spend less time on our personal distractions often fail because
we fail to consider the two-way nature of this relationship.
We look at restricting screen time the way we look at restricting calories—as
an act of self-deprivation. Trying to restrict screen time requires us to constantly
exert willpower against our desire to pick up our phones and check in on the
things we care and worry about. Exerting willpower is already hard but it
becomes harder when we’re fixating on a negative rule that deprives us. Trying
to not use your phone is like trying to not think of an elephant. The more you
think about NOT doing something, the harder it becomes to NOT do it.
Instead, we need to focus our energy on a different but positive rule. We need
to pay attention to the quality of the time we spend on our screens rather than its
quantity.
Each time we use our devices, we access them in one of two modes. Either we
can use them mindfully— in flow, focused on what we want to do, or we can use
them as an escape—mindlessly chasing the ‘zone’ to avoid doing what we
should do.
We think of bitfulness as the ability to spend our time on our devices better.
Specifically, we want to focus on making sure that the time we spend with our
devices is mindful and aligned with our intentions. We understand that advising
someone who is struggling with focus to be more mindful is akin to asking
someone feeling low to be happier instead.
The hard part is not knowing what to do but how to do it.
The next eight chapters of this book deal with the how. We cover practical
strategies to spend time on our devices mindfully and quieten the inner critic.
But to help us bridge the gap between knowing what to do and knowing how to
do it, it is useful to understand why these strategies help.
The art of bitfulness comes down to three fundamental principles.
1. Mirrors, not Windows
2. Don’t swim upstream
3. Define our selves
The first is to have a clear goal and clarity on how to achieve it.
Second, there must be immediate feedback to our actions.
Third, there must be a balance of skill and challenge.
In the context of ‘flow’, friction is anything that requires you to switch context
and apply cognitive effort to another task. This could be a notification from a
messaging app we decided to check or a noisy environment. Besides the usual
suspects, it can also be all the stuff that simply gets in our way.
Imagine you are making a presentation for your office. You need to pull up a
spreadsheet of the previous quarter’s results for a chart. You go looking for the
file on your computer. You know you saw it a few days ago, but don’t remember
what it’s called. Soon your focus has moved to the task of finding that
spreadsheet. You wander through folders and then eventually land up in your
email inbox. While you’re there, you end up checking your email. Even when
you eventually find the spreadsheet, switching back to the original task is now
more challenging since your ‘flow’ is lost. Your train of thought has been
derailed.
Friction is the most overlooked waste of our time. We often blame distractions
such as Facebook, email or other notifications for interrupting our work.
However, a study has shown that people who have just been interrupted for any
reason are more likely to check their email or Facebook before getting back to
the task they were doing. Thus, on average, workers in the study took anywhere
between fifteen and twenty-five minutes to get back to the same state as they
were before the interruption. We’ve all experienced this delay between being
interrupted and getting back on task. At twenty minutes per interruption, a dozen
such interruptions in a day can mean we waste half our working day trying to
work rather than working.
The concepts of flow and friction taken together tell us an interesting property
of our own attention: Our attention seems to have inertia.
Newton captured the idea of inertia with the first of his three laws of motion.
A body at rest or in motion continues to remain at rest or in motion unless acted
upon by a force. Something similar happens to our minds. A deeply engaged
mind continues to remain engaged on a single topic until context is switched. A
distracted mind continues to be distracted until we deeply engage with a new
context. Switching between the two states is cognitively hard and costly on our
time.
This summarizes the second principle of bitfulness: Don’t swim upstream.
You wouldn’t prepare for exams by taking your books to a nightclub. And
although you could, you wouldn’t want to drink and dance in a library in
daylight. In physical spaces, we understand the obvious idea of a conducive
environment. However, we lose sight of the same digitally.
Our technology habits are designed around the hammer model. We expect a
superhuman version of ourselves, who cannot be distracted, will show up and
execute the task no matter what the environment.
The human brain may have been the inspiration for computers, but it is not a
computer itself. We cannot shut down one task and start another seamlessly in
our heads as we can on our devices due to attentional inertia. If our environment
is distracting, we are spending effort in trying to stay focused rather than being
completely engaged such that focus is effortless.
Not swimming upstream means that instead of fighting the mind, we learn to
quieten it. Chapters 7-10 cover how we can achieve a quiet mind by maximizing
flow and minimizing friction.
CHOOSING CALMNESS
The mind, as they say, is a wonderful servant but a terrible master.
When we are able to control our attention, quieten our mind and focus on a
task, we can achieve great things. However, that is not how we behave by
default. Our mind’s default response is controlled by our emotions.
This is not a bug but a feature. Our brains help us process the information in
our complex environment and past memories to figure out what we should do
next. Logical, rational thinking is a useful skill, but survival depends on the
speed of our reaction to dangerous situations. We would not survive if we waited
for danger to occur before action.
Our emotions offer a shortcut to reasoning. For example, we feel scared when
we approach the edge of a cliff in anticipation of a fall. Our body stiffens, we
move more carefully and are more alert. From an evolutionary perspective, it
would be quite useless if we felt scared only after we fell.
While our emotions are good at predicting what happens if we fall off a cliff,
they aren’t necessarily well-calibrated to more modern perils. Our emotional
predictions are low-fidelity and biased towards survival, making them inaccurate
models for our modern, day-to-day tasks.
The Third Crisis further exploits our brain’s reward mechanisms. Our time,
attention and data drive a large part of the internet economy. We know variable
rewards, and other such user-hostile design keeps us addicted. However, even
without social media’s algorithmic feeds or the flow-inducing immersive worlds
of video games, the internet still offers infinite novelty. Novelty itself is highly
addictive because of the way it triggers a dopamine release in our heads. It’s
hard to not feel curious or excited about the unknown and the undiscovered, all
from the safety of your phone.
The dread we feel about an assignment is probably not a good prediction of
how dangerous it is to us overall. The excitement of a new video posted on
social media does not actually correspond to how much satisfaction that video
will give us in the long run. Both these emotions are counterproductive for the
situation we are in. They drive us to reach for our phones and use them
mindlessly instead.
The challenge isn’t to stop feeling these emotions. The brain will continue to
keep predicting what we should do next, and those predictions will continue to
manifest as emotions. The key idea of bitfulness is that we become more aware
of how our mind works and change the way we use these devices to reflect that
understanding.
The real trick is to listen to our emotions and notice when we feel
overwhelmed. Are our devices helping us calm down or are they causing the
overwhelm? The goal of bitfulness is for us to be more self-aware about our
emotions during the time we use our devices and change our behaviour so as to
be calm. A lot of advice in this book mirrors productivity advice, but the
objective isn’t to get maximum things done; it is to feel the least stress.
Productivity will follow.
In the next eight chapters of this book, we deep dive into each of these three
principles. We focus on how to reclaim our time, attention and privacy.
This is, undoubtedly, a hard task. We recommend making these changes one
tiny habit at a time. Identify and focus on one behaviour pattern that you want to
change. Apply whichever strategies fit you and your problem the best. The best
part is that our brains are constantly learning. Do the new behaviour often
enough, and you can actually update your brain’s defaults, making the new
behaviour a habit.
After all, the most daunting opponent is in your own head.
5
HOW TO THINK CLEARLY
WRITING IS THINKING
In an Oral History of Richard Feynman, a set of interviews recorded and
transcribed by historian Charles Weiner, there’s an interesting aside that reveals
how the great physicist went about his thinking. During the conversation,
Feynman has trouble remembering the details of the events Weiner was asking
about.
Feynman said, ‘If you’ll wait a second, I have things by which I can
remember. [. . .] So if I look at that thing, I can remember better what I was
doing at different times.’ The thing that Feynman was describing was his
notebooks. The audio breaks here, and the two return after having found the
notebooks. Weiner, the historian, sounds very pleased that a ‘record’ of
Feynman’s thoughts exists in written form. Feynman responds irritably. He
objects to the notebooks being called a ‘record’. Later in the same conversation,
we get this exchange:
Weiner: Well, the work was done in your head, but the record of it is still
here.
Feynman: No, it’s not a record, not really, it’s working. You have to work
on paper, and this is the paper. OK?
Some of the things I think I think, I find don’t make any sense when I start
trying to write them down. You ought to be able to explain why you’re
taking the job you’re taking, why you’re making the investment you’re
making, or whatever it may be. And if it can’t stand applying pencil to
paper, you’d better think it through some more.
The idea of using an extended mind to organize and develop your thoughts is not
new. The technology could be as simple as pen and paper. The real difference is
in our attitude towards it. We need to be humble about our own ability to think
clearly. Both Feynman and Buffett are often portrayed as geniuses of their own
respective domains. But even they don’t trust their head enough to do all their
thinking solely inside it.
Thinking is like any other skill. You get better at it through deliberate practice.
Writing is a time-tested, effective way to practise understanding and develop
your thoughts. Your extended mind can help make this deliberate practice an
effortless habit.
Which is why the first exercise we recommend to think clearly is Bitfulness
Meditation.
BITFULNESS MEDITATION
What is Bitfulness Meditation? It is easier to explain in comparison to the
Mindfulness Meditation you are probably familiar with.
Both are tools to increase your self-awareness. Mindfulness Meditation
teaches you how to ignore all stray thoughts in your mind. Bitfulness Meditation
teaches you how to focus on a single train of thought in your extended mind.
Mindfulness Meditation is about observing your thoughts without judgement and
letting them pass. Bitfulness Meditation is about observing your thoughts
without judgement and writing them down.
We recommend following along with this exercise.
Being disturbed in the middle of this process will not help. So, find a time and
place where you are sure you can commit at least fifteen minutes of
uninterrupted time.
This could be a text document on your laptop, the notes app installed by default
on your phone, or some other app. You only need to make sure this space is
easily accessible and what you write in it remains private. You can even change
this later, so just pick one now to get started.
Start a timer for at least five minutes. Now, simply start writing whatever is
presently on your mind, in a stream of consciousness style. Make it personal.
You can try starting with ‘I think . . .’ or ‘I feel . . .’. Do not try to sound smart or
even coherent. Ask yourself questions and then answer them honestly. No one is
reading this but you.
Write without any judgement or edits on what you are writing. You do not
need to fix typos. You don’t even have to stay on one topic. Simply focus on
letting your fingers translate your current thoughts into keystrokes till the timer
runs out. If you have more to say even after the timer is over, keep going. Many
find this part of the exercise is the most beneficial in becoming aware of their
emotional states.
4. Write about what you want to focus on
Once you feel like you’ve cleared your mind of all thoughts, you can now focus
on one task, thought or intention you want to work on. In all likelihood, this
worry would have featured in the text you just wrote down in Step 3. Simply
start writing about that task. Describe what needs to be done in the same style of
writing. If there are any problems or fears, write those down too.
In a fashion similar to Step 3, write without judgement or without correction.
If this is hard for you, cover your screen as you write. This way you simply can’t
read what you’ve written so far and will be less tempted to make corrections.
You may go off topic, and your mind may begin to wander. Whenever you sense
that you have gone too far astray, pause. Simply scan a few lines up, and pick up
from where you left off.
You can use a timer to decide when to stop or simply write till you feel clarity
of thought.
Now that all your worries and doubts are out of your head, you should be feeling
a slight sense of calm. Depending on how much you wrote, you must be feeling
either a slight or great increase in your sense of control. You’re no longer in the
grip of the ‘focussing illusion’. Read through what you’ve written and without
editing or deleting, summarize for yourself what your thoughts are telling you to
do.
Hopefully, the next immediate action for you to take is clear, and so is your
motivation to do it.
The way Weiner describes it, Feynman seemed to be mapping his thoughts to
work with them, rather than put down a record. The text wasn’t static, but
something that changed as his mind did.
Even in our digital world, Feynman’s notebooks have a lot to teach abut how
to build our working memory.
Feynman is also known to have said, ‘If you can’t explain something in
simple terms, you don’t understand it’. The notebooks tell us that Feynman
didn’t wait to find some novice to explain physics to. He used his working
memory to have a conversation with his own thoughts. He clarified his thoughts
by explaining them to himself, which is what probably made him such a great
explainer. He put a date on each page and then started writing what he thought
he should be doing, whom he spoke to, and even questions he’d answer months
later.
We recommend doing the same thing in your ‘working memory’. Make sure
there’s a new page or section for each date, and then note everything worth
noting that day on that page. You can plan your day. Ask yourself questions in
first-person form, and write down your own answers without judgement. If you
do the Bitfulness Meditation exercise, that could also be written here.
Essentially, you can capture any information that you want, as long as you’re
capturing it all in one place. Having determined an explicit place to do all your
thinking reduces the friction that comes from the question of ‘where do I store
this?’.
The rule to follow is simple—Everything you think today goes on today’s
page in your working memory.
Some of these thoughts will lead to actions. A lot of thoughts will simply
collect in your working memory, ready to be retrieved when you next need them.
We will cover how to process these in a later chapter. If you’re just beginning,
worry more about consistently capturing your thoughts than organizing them.
Habits are built by repetition.
Think of the working memory as a framework for daily reflection rather than
just a collection of notes. You can capture progress on a habit you’re trying to
build by noting down if you did or did not do it that day. You can make journal
entries to track your mood as well. You could also store external information you
came across that you find interesting or useful as Da Vinci did. It could be ideas,
quotes, jokes, recipes or stories too. All the half-thought thoughts that you plan
on thinking more about later can go here too.
There are advantages to being able to record things quickly and think about
them later. For example, you can understand how consistent you’ve been with
your habits by looking back over the data. There’s also the case of losing
information because you don’t use it in time. Often people recommend a book,
podcast, movie, article or artist to us just when we don’t have the time. You can
write this down in your working memory, including details on who
recommended what. Whenever you do have the time to read or watch something,
you can browse through your list of recommendations, rather than surfing the
internet. It might even prompt you to send the person who recommended it a
thoughtful thank you.
If you already do some version of note-taking, you may have observed a
problem. When your notes become numerous, it is hard to find something if you
only vaguely recollect what to search for. Search fails because it requires you to
remember exactly what you wrote. The easiest way around this problem is to
‘Save by Context’. In practice, saving by context means to tag extensively and
generously while making notes. In your notes, you can just add #idea, #quotes,
#recommendation, #habit or other such tags to group related ideas. There’s very
little penalty to over-tagging, and there is no such thing as too many tags. The
tags and links help create multiple paths to land at the same chunk of knowledge.
Since you save these notes by date anyway, they are already associated with the
context of other things on that day.
If you save by context sincerely, you are able to not only retrieve ideas you
had weeks or years ago but also retrace your steps and see what else you were up
to when you had that idea.
Over time, your working memory will become the starting point for all your
future work. It contains all the hard-earned knowledge and wisdom you’ve learnt
over the years. By writing down your own thoughts in one place, you ensure that
you don’t have to think the same thought twice. You can make reusable lego
blocks of knowledge that you can use to construct more advanced and original
thoughts.
LONG-TERM MEMORY
STORAGE AND SEARCH
The analogy between computer and human memory is useful in our quest on
how to think better.
Memory serves two purposes in computers and humans. We already spoke
about RAM or working memory. The other kind of memory is what goes on
your hard disks—basically, a space for long-term storage and retrieval.
Computers are excellent at long-term storage, and humans are prone to
forgetting. Theoretically, we could just store everything we need to remember on
our devices. But the problem is one of retrieval. Where should I keep this file, so
that future-me can retrieve it easily? Where should I write down this information
so that I won’t be hunting for it when I need it? Where do I save this task so that
I know it will be done in the future?
You may be thinking that computers have search. There is one wrinkle.
Computers search by comparison. Whereas, our memories work by association.
The most unique thing you may remember about a PDF you’re trying to find is
that your friend recommended it to you. If one can only remember a small
fragment of that document’s contents, search will be useless. Also, search results
become noisier the more you store.
Is there a way to organize our long-term storage that can guarantee we will
find the exact files we need when we need them?
Well, the simple answer is—No. The fundamental problem is that the only
person who can answer if an organizing system is useful is future-you. We do
not have a way of divining what our future self will be searching for. Organizing
systems often fail because of this fundamental unknowability. We overinvest in
creating structure, but that structure turns out to be useless anyway.
At the same time, clutter on our devices can feel stifling and overwhelm us.
We’ve all wasted time looking for that important file. Worse, we start looking for
the file, only to end up working on something else entirely. Organizing often
becomes an activity done for its own sake, to create a false sense of order and
peace.
Our take is that the system that is easiest to maintain is the system that works.
We need some organization, but don’t want to invest too much time in doing it.
If your system requires significant upkeep, it is not a good system. Since the best
organizational structure is fundamentally unknowable, it might be useful then to
leave most of the task to our future self. Instead of investing heavily in
organizing, we will do the least possible required. While you can’t be sure what
the future-you will be looking for, we can make sure the future-you is looking
for a needle in a drawer, not in a haystack. Anything more would be premature
optimization.
If you already have such a system in place, skip this section. But if you don’t,
we can tell you what works for us.
LOSING TIME
Have you experienced a long, busy day of much activity only to realize that you
didn’t even start what you set out to finish?
In 2016, Francesca Gino, a professor at Harvard Business School, and her
colleagues analysed the data from 43,000 patient encounters at Emergency
Departments of hospitals. They found that when the number of patients arriving
increases, the Emergency Department (ED) doctors start dealing with ‘easy’
patients first.
It is not an unreasonable system. Since more patients were coming in, more
patients needed to get out. The easy patients could be treated faster. However,
easy patients usually corresponded to less sick patients. They could probably
have waited without their condition deteriorating much. The ones who ended up
waiting were the serious patients, for whom the wait could make things worse.
Moreover, when the serious patients did get their turn, doctors were likely to be
more tired and less effective because of all the patients they had to treat before.
Behavioural scientists call this tendency to tackle easy things first ‘completion
bias’.
Completing a task gives us an immediate psychological reward. The quick
win can even help up our self-confidence and motivation for the next task. The
problem starts when this motivational trick turns into a toxic pattern. Like the
ED doctors faced with a surge of patients, we get into a habit of only doing the
easy things while the hard things get sicker.
Completion bias is why even when we don’t waste time on distractions, it
often still feels like time slipped through our fingers. We complete easier,
smaller tasks and it makes us feel productive in the short-run. But over the long
run, doing small tasks doesn’t feel like fulfilling progress.
Most of us are likely to have some system of calendars and to-do lists, but
success in sticking to these varies. Often the problem with these is that they are
designed for a narrow definition of productivity—i.e., getting the maximum
number of things done.
In the internet age, productivity is not a quantity problem, but a quality
problem. Doing things has become easier—you can get products delivered
straight to your house, you can hire professionals online, you can automate bill
payments, you can set up meetings on video and you can look up any
information at any time.
The progress goes both ways, though. It is now much easier for people to
reach us via email, text or call and add to our list of things to do. Because of all
that choice and incoming information, it is easy to get overwhelmed. Doing
things has become easier, but doing the right things has become much harder.
It doesn’t have to be this way. Your extended mind can not only help you
think better but can also help you decide what you should be thinking about.
This chapter is about how to focus your attention on the things that truly matter.
If you already have a system for picking the right things to do, you can safely
skip ahead to the next chapter (Chapter 7) where we cover strategies for sticking
to the task. If not, let us see how we can align our attention with our intentions.
1. Making Time
2. Using Time
MAKING TIME
SHOW ME YOUR CALENDAR,
AND I’LL TELL YOU YOUR PRIORITIES
If time is money, why do so many people pinch pennies but waste away hours?
Here’s a simple exercise to get you thinking about how your time aligns with
your intentions. In your working memory page for today, create a list of your
most important priorities—What are the top five goals in your life that you want
to give time to? Now, evaluate your calendar from the last week and write down
how much time you actually gave to these priorities. It is important to do this in
writing, so that you can hold yourself accountable. Be honest, and write zero if it
is zero.
The time and money equivalence is more than just a cliché. Your time is the
most valuable asset in the world. Every objective that you want from your life
needs time, and there’s only so much you can give. Unlike money, even if
someone else has time to spare, you cannot borrow or steal it from them. You
may be able to delegate some work, but no one else can spend time with your
family on your behalf, which means that your time should be focused on your
biggest priorities.
You need to realize that ultimate control over how you spend your time
resides only with you. All of us have obligations, but even if you only have an
hour to yourself every day, you decide how you spend that hour. You decide how
you’re going to get the maximum out of it. People say they can’t find the time to
work on their goals. However, time is something you make, not find.
If your biggest priorities do not have space on your schedule, then you’re not
busy, you’re just procrastinating.
Some people feel the same helplessness about their money. They think they
don’t have enough to save for the future. The most important advice financial
advisors give clients is to change the way they think about savings. Usually,
people think that their Savings = Income - Expenses. Financial advisors teach us
that this equation is actually Expenses = Income - Savings.
If we spend what we want and save the rest, we will always spend more and
save less. A better way is to treat our savings like rent, i.e., as our first and most
important expense that we cannot skip. When you get paid, first set aside the
amount you want to save to meet your goals. Then pay for all critical expenses
such as rent, food and utilities. What is leftover can be spent in any which way
you desire. When we budget money, we can save enough as well as enjoy
spending guilt-free. Building the habit of saving is extremely valuable, even if
we save a very small amount.
We want to budget our time in a similar way.
Rather than picking the easy things, we want to first spend time on our most
important priorities. Instead of responding to emails or clearing out your to-do
list, look at your priorities and ask—‘What’s the most important thing I can do
today to make progress towards my goals?’ Even if you do just one thing in a
day, as long as it is a step towards your goal, it is a day well spent. You can
spend the rest of the day doing whatever you feel like, and it would be a bonus if
you got any additional work done.
The easiest way to implement this strategy is a method called time blocking.
USING TIME
THE MOST EFFECTIVE PRODUCTIVITY
TRICK KNOWN TO MANKIND
We make much more prudent decisions with our money than we do with our
time.
You wouldn’t buy a Mercedes if you could only afford a Maruti. Yet we sign
up for tasks and projects, whether work or personal, that require more of our
time than we can afford. Moreover, the guilt of those unfinished projects weighs
on us, adding to our stress, clouding our mind.
The single biggest productivity trick known to mankind is saying ‘no’.
We say yes to projects because we see them as exciting or interesting. We
don’t think about whether they are exciting enough for the time they will require.
Every ‘yes’ is an investment of our time. Just like with money, if the investment
isn’t generating sufficient returns we should get out, and not sink more money
(or time) on a bad decision.
Ultimately, time is zero-sum. If you’ve signed up for more work at the office,
you are probably spending less time with family or on your hobbies. Unlike your
bank balance, you don’t see your time balance deplete when you overspend your
time on something you can’t afford. This lack of feedback can be actively
harmful.
One helpful tool in deciding when to say ‘no’ is a time budget.
On a new page in your working memory, create your time budget. Out of the
twenty-four hours in a day, we need at least seven or more hours for sleep. We
need another two to four hours for exercise, meals, hygiene and other daily
chores around the house. We should be making the time to spend with friends
and family too. Out of the 168 hours we have every week, just these would take
away roughly half or more of our time. We still need to subtract the unavoidable
things like meetings we can’t skip, time spent on commuting and social or
familial obligations. The idea is to not sweat the details but to just make an
estimate.
Your budget need not be precise down to the last minute. It is only a tool to
help us make better decisions about what we can and cannot commit to. Think of
it like the fuel gauge on our car. It won’t tell us exactly how many litres of fuel
we have, but over time, we get better at deciding if we have enough to make the
trip or not.
In any given week, on average, you may have maybe thirty hours to spend on
your goals—let’s call these your time balance. Your personal number may be a
bit higher if you have fewer obligations. Your time balance is the number of
hours that are actually available to you to split among your work, your hobbies
and any leisure time.
Now ‘invest’ your time balance towards things that matter to you. Use the
priorities you wrote down in the previous exercise. Be careful to not use up all of
your time balance, though. You should ideally also have spare time for
unplanned exigencies, serendipity or just being idle.
If it looks like you aren’t able to make enough time to actually do justice to
one or more of your goals, the problem isn’t that you’re not productive. The
problem is that you’re trying to do too much. You have to drop something or you
risk doing everything poorly. You also have to refuse any additional projects till
your time budget goes up again. Calculating your time budget every few weeks
or after the start and end of projects will help you make better decisions about
your commitments.
People feel uncomfortable saying no because they are concerned they will
come across as snobbish. In our experience, this is untrue. People appreciate
clear, rapid and genuine answers irrespective of whether that answer is
favourable to them or not. Going from a gut-based system to a framework-based
system of saying ‘no’ also helps communicate why you’re saying ‘no’
authentically.
Saying ‘no’ is the biggest superpower you have.
SHOWING UP
The maximum resistance we feel towards doing anything comes right at the
start.
The task ahead seems most daunting when we’ve made no progress towards it
at all. This is why almost all advice on getting something done is to just get
started. If you have already worn your running shoes and are out of the house, it
is more likely that you will run. Instead of trying to motivate yourself to run five
kilometres, just try getting yourself to put on your shoes and get out. If you can
bring yourself to simply take that first step, following through becomes much
easier.
If you’ve blocked time for your priorities on your calendar, just decide for
yourself what the simple first step for each is. If we want to focus on deep work,
maybe the first step is to put away our phones, close other distractions and sit at
our desks. Turn these first steps into rituals that you do consistently. The more
consistent your rituals, the better your mind becomes at knowing that it is time to
focus.
Half the battle is showing up.
The other half is doing what you’re supposed to do. We know that we
procrastinate because of our inability to cope with our negative emotions around
a task. But most people would rather admit to being busy than to being afraid.
We often try to minimize the guilt of procrastination by being busy doing
something else instead.
The second most important habit for successful time blocking is to treat
blocked time as non-negotiable. Once we’ve scheduled a block for work or for a
hobby, we only have two choices—use it or lose it. That is, either you spend
time doing what you scheduled, or you don’t do anything at all. No other
projects, no reading news, no checking emails, no browsing social media or
anything else if it is not on the schedule. Prolific author Neil Gaiman describes
how this rule works for him.
‘I think it’s really just a solid rule for writers. You don’t have to write. You
have permission to not write, but you don’t have permission to do anything
else. What I love about that is I’m giving myself permission to write or not
write, but writing is actually more interesting than doing nothing after a
while. You sit there and you’ve been staring out the window now for five
minutes, and it kind of loses its charm. You’re going, “Well, actually, let’s
all write something.”’
No matter how good our system of managing our to-dos and appointments, there
will be days when we don’t feel like starting. Like Muhammed Ali, the record-
breaking boxer, once said, ‘Everyone has a plan till they get punched in the
face.’ Our plans are often upset by our own emotions, energy levels, the weather,
events around us, and many other reasons. It is on those days that we need to
remember just two simple rules for keeping our promises with our past selves.
No matter what, show up.
You have permission to do nothing, but you do not have permission to do
anything else.
Writing down what you were just working on and how to wrap it up allows you
to close the ‘open loop’ in your head. Every time you finish one thing or are
about to start another, take a moment to make an entry in your working memory
page on today’s date.
10.05 a.m. I’m now starting preparation for next week’s board meeting. I
will first read the reports that were sent and note my comments.
Sometimes your attention will want to wander in the middle of a task. Instead of
acting on your urge for distraction, get it out of your head and into your journal.
By writing down your thoughts, you slow down enough to be able to not react to
your instincts and choose carefully.
10.14 a.m. What happened to the report that was supposed to be launched
last week? Must follow up with Kamya. #call #followup
If you get distracted anyway, make it a point to spend a minute in your journal to
reorient yourself before starting.
10.43 a.m. Was looking up that tweet by Ganesh for the article. Ended up
spending 20 mins on twitter. I am now going to rewrite the first three
paragraphs based on the information I just found.
What we described in this and the previous chapter are thinking tools. They help
you think clearly and help think about the things that matter. And you don’t just
think at work. The reasons we put meetings with others on our calendars are the
same reasons we should do it for our own selves or with our loved ones. It shows
us our commitments in one place so that we can make better decisions with our
time. It helps us to prepare and show up for important events on schedule. It tells
our loved ones we respect their time. If you feel embarrassed, you don’t have to
share the invite with them, but it is still useful to have it on your own calendar.
Having a system is even more critical for those who tend to go with the flow.
If we make a habit of quickly capturing all tasks and appointments as they occur,
this system doesn’t require much upkeep. If we are in a habit of capturing
everything, we can start relying on our digital systems entirely. It is a wonderful,
calming feeling to know that we don’t have to think about what to do next. It
frees us up to go with the flow of our thoughts, without worrying about whether
we’re missing, forgetting or falling behind on something. It lets us be truly
present in the moment.
Another common mistake is that we tend to design personal productivity
systems for an ambitious version of ourselves to do the maximum number of
things. We design the system for someone who always shows up, does every task
in exactly the time available, takes copious notes and files everything
systematically.
Instead, to have maximum peace of mind, design your personal productivity
systems for your laziest self, the one who forgets to add tags, who writes ‘send
email’ as a to-do but doesn’t specify what email or to whom, and the one who
will take notes but will forget where they took them. You will have more success
when future-you does not expect past-you to be extremely diligent. If your
system works even on days you don’t feel like working much, you’ve made the
best system.
It is very easy to start over-engineering these systems such that they become a
form of distraction themselves. On the internet, this tendency even has a name
—‘productivity porn’. You should iterate, experiment and personalize till you
find something that matches your personal workflow. Do remember that
designing the perfect system is meaningless, because our lives are too dynamic
and constantly evolving for there to be one perfect, static system.
Success comes from the compounding effect of consistent habits. Instead of
maximizing ‘productivity’ or number of to-dos completed in a day, maximize the
number of promises met by your future self. Building a consistent habit of
reflection by using your extended mind as a mirror allows you to think clearly
about your long-term goals. Most importantly, it helps you make the time to
achieve them.
7
A POVERTY OF ATTENTION
1. Create
2. Curate
3. Communicate
The Create mode is one where we want to bring our full and deep attention to the
task at hand. We want no distractions in this mode. We want to be Ulysses tied to
the mast, not changing course, no matter what the Sirens are singing. What one
wants in this mode is to create—to make meaningful progress on the goals that
matter.
The Curate mode is the opposite of the Create mode. Whether we’re looking
to get inspired, catch up on the news or simply take a break, we seek content to
consume. But we often get swept up in consumption. What one wants to do is
curate—to be deeply immersed in the content—while still being in control at a
high level of the quality and quantity of what we consume.
The Communicate mode is our planning and management mode. Emails,
instant messages, group chats and other inboxes contain a stream of information
that we must deal with. These streams contain a mix of signal and noise. Some
are urgent, some are important, many are neither. The critical task is to quickly
decide how one wants to deal with this information. In the Communicate mode,
we want to be able to parse a large amount of information, but not get too caught
up in any one thing. Instead, we want to strategize and communicate. We want to
be able to respond to incoming requests from others with clear responses. We
also want to communicate to our future selves the shifting priorities to help us
rethink what we should do next.
The next three chapters are deep dives into how we can set up these three
modes. We also go over strategies on how to split your time between them. But
first, we want to dive deeper into why we believe you should be splitting your
personality by mode of attention.
The first thing to do is to turn off all notifications that don’t really require our
immediate attention. Most people who have done this report feeling less stressed
and having a better sense of control over their time. This is an action that won’t
take two minutes to set up but the pay-offs are tremendous. The hard part of this
exercise consists in deciding which notifications are truly urgent, and should be
kept on.
We suggest starting by turning everything off. Let your calendar and phone
notifications pass through as these require your immediate attention. As you
experiment with this for a few days, you’ll realize which other notifications need
your urgent attention.
If you haven’t already turned off all notifications on your phone, do it now.
From today onwards, every time a new notification appears on your screen, and
it appears useless, don’t just dismiss it. Take an extra second to block all future
notifications of that type from that app by long-pressing the notification.
Notifications can be useful in one very narrow way. A lot of us are in the habit of
checking text messages. With all notifications blocked, we do not know if there
are new messages without opening the app. We might just tend to go overboard
in picking up our phones and checking the instant messaging apps every few
minutes, even when no new messages have arrived.
On the other hand, if we do turn on notifications, when new messages do
arrive, they will keep bothering us at times we’re trying to focus. One way to
deal with this problem is to get an app to batch the notifications. All the
notifications will be sent at fixed periodic intervals of our choice. For example,
you could choose to get all your email notifications at 11 a.m. and then only
again at 4 p.m. Or you could get all your text notifications five minutes past
every hour. This way, instead of constantly checking in, you can quickly glance
at your phone to see if it requires your attention.
If you do batch notifications, remember it is still critical to block the useless
ones. You can block notifications entirely from useless apps, but at times, you
can also block specific notifications from within an app. In WhatsApp, muting a
group or a sender prevents notifications from them while still allowing
notifications from others to be batched. See the Appendix for a list of such apps
under the heading ‘Batch your Notifications’.
Due to the nature of their work, some people may simply be unable to avoid
turning notifications off completely. If you’re a doctor, then maybe calls from
your office are critical for you to attend. Almost all phones come with a ‘focus
mode’ or ‘do not disturb mode’ where your notifications do not ring and only
specific callers or messages are screened through. Learn where this option is on
your phone, and make a shortcut to it. Use it often!
Our problems don’t end with simply managing notifications. Our smartphones
have slowly turned into everything-devices and it is very easy to lose context.
The University of Texas study from Chapter 4 told us that people lost
cognitive capacity to their phones, even when it was switched off but in front of
them. If you can create on your laptop only, consider simply putting away your
phone, out of sight while you’re creating. You won’t be spending all your time in
this mode, so you can afford to stay away from your phone. But if you need to
have your phone on you, you can still choose to make it a more focused device.
Most Android phones also allow us to create new user accounts on our phones.
Just like we did with our laptops, it is a great idea to create a second account on
our smartphones for focused work only. For most phones, this is done in the
phone’s settings, under an option called ‘Users and Accounts’.
It is as good as getting a second phone, with a fresh install. When creating this
account, you will be asked to login to a Google account. Make sure the email
you use to login is not your primary email account. Using your primary account
means you’ll be able to check your email from this identity as well, which we
want to avoid. Get a fresh email so that this second identity is completely air-
gapped from your primary identity. You should now be very intentional about
which apps you add to this account.
Ideally, this profile should only be able to make calls, check your calendar and
take notes. Any utilities that do not have an infinite feed of new information are
okay to keep. This could mean maps, taxi apps, listening to music, etc., are ok.
But email, instant messages and others are not. Do not install any games or other
possible distractions on this second account. Just like you did on your laptop,
make sure this identity has no extraneous apps that become time-sucks.
You can also set everything from ringtone to do-not-disturb settings
differently, without affecting your main account. Try to stay in this account
whenever you’re in Create mode. If you notice yourself on some apps that are
making you lose time, delete them from this identity and reinstall them in your
primary account if needed.
Switching between identities is easy, but not smooth. This friction is
intentional and will help you stay in the right mode.
We strongly recommend getting a website blocking app that syncs with your
smartphone as well. The appendix lists some of these apps that allow you to start
a focus session on one or more of your devices simultaneously. When you’re
trying to be focused in the Create mode, the software should block distracting
apps on your phone as well. This way, even if you do accidentally or out of habit
try to open a distracting website on your phone, it will stop you from doing so.
If you do follow Step 1 above and create a second identity for the Create
mode on your phone, we strongly recommend blocking all websites by default
on this profile at all times. The advantage of creating a second identity is that
most software services treat this as a completely new device. You can set
blocking rules for the Create mode differently from the other user identities on
your phone. If you really need access, you can switch accounts. We’re trying to
increase friction just enough to block the unintentional, automatic behaviours
that we have learnt.
3. CHANGE YOUR HOME SCREEN
The home screen was designed to let us access all our apps quickly. At least for
the Create mode, this is the wrong principle. We want to be able to only access
the apps that let us create easily and increase friction for those that don’t.
On Android phones, you can change your home screen to be significantly less
distracting by changing the default home screen to a minimalistic launcher. See
the Appendix for some suggestions. Even if you don’t change the launcher itself,
do remove all shortcuts to distracting apps from your home screen.
MAKE IT PERSONAL
Finally, make your Create mode personalized to your needs.
The Create mode is your personal mute button for the internet. Don’t be afraid
to ruthlessly block websites, apps and other distractions that you find too
tempting from this mode. Whenever things get overwhelming, you can simply
log in to this account to block out the noise.
Customize the theme on this account to make sure it looks visually different
from your other accounts. Change the wallpaper to something that motivates
you. It could be a quote, a scene, a goal, your role model, but anything that is
deeply personal to you. You could simply write in a large font what your most
important goal is. This cues your brain into remembering that when you’re here,
you should be in a state of flow, working towards what’s important to you.
Remind yourself not just of what you need to create but why you’re doing it.
Standing at the base of any hill, the path ahead always seems formidable. True
motivation comes from progress. While it sounds like a strict set of rules,
remember that the Create mode is ultimately about making progress on your
most important goals. Over time, you will actually enjoy coming back to this
distraction-free space because you will get addicted to the feeling of progress
you create when you aren’t distracted.
The Create Mode maximizes flow, and minimizes friction. If you spend time
in Create mode every day as a ritual, your brain will learn to be focused at that
point every time. You will see tremendous returns on the habit. After all, in a
distracted world, true focus is a superpower.
9
COMMUNICATE MODE
The central idea always is to have a well-defined, limited set of choices for how
to process each item in your inbox. Each choice should not take too long to
execute. Do NOT leave items pending in the inbox. Also, one feels a clear sense
of completion and achievement when one gets to zero.
The specific algorithm for your own inbox can be modified as per need and
type of inbox. Inbox Zero applies to all categories of inboxes, even if the apps
don’t call them that. For example, Tanuj religiously archives his conversations
on WhatsApp. WhatsApp and other direct messaging tools can be overwhelming
because conversations online don’t really seem to end. Every new reply feels
like it requires a reply too. A conversation then slowly degrades into single
emojis or generic lols. Instead, use the archive button to take it out of your
inbox, and tell yourself that the conversation has ended. Having a visual
representation of no open threads is helpful to bring calm to our minds.
Some user-hostile platforms have actually not enabled or removed the ability
to archive. One can still use the delete chat option. A lot of people are
uncomfortable with deleting chats. In which case, ask your friends to move the
conversation over to other channels that you do prefer. Having fewer active chats
or threads ensures we don’t get lost in a rabbit hole or stretch a conversation.
When cleaning our inboxes, we want to stay focused on the act of triaging
rather than getting deep and solving any particular item. You want to have your
attention focused on high-level executive decisions around processing.
The Inbox Zero strategy is very aligned to the pre-conditions of flow we
discussed in Chapter 4. It has a clear goal—getting to zero. The set of choices or
rules to attain these goals are well-defined. The feedback is immediate—one can
see the unprocessed/unread count dropping towards zero in real-time. Inbox
Zero turns processing emails or tasks from an amorphous chore into a more
well-defined, almost-fun activity.
Inbox Zero is easy to maintain if you do it consistently. However, it is hard if
you don’t do it already or only do it sporadically. If you can’t naturally get to
zero, feel free to declare bankruptcy.
DECLARE BANKRUPTCY
For many people, getting to Inbox Zero can be daunting because of the number
of items that you already have pending in your inbox. Most often, people tend to
have unread emails from weeks ago. Those who have to-do lists also tend to
have a lot of residual tasks from long ago. For all of these, feel free to declare
bankruptcy.
Declaring bankruptcy is the act of allowing yourself to fall short on your
inbox obligations. Bankruptcy is accepting that it is time to let go of the 12,478
unread emails that, to be honest, you were never going to get to anyway.
Specifically, this is how you go about declaring inbox bankruptcy.
Newsletters are one common reason why email inboxes get overwhelmed.
Newsletters are more suited for ‘feeds’ such as social media, rather than
‘inboxes’ such as your email. If you do subscribe to more than a couple of
newsletters, consider creating a completely new email account for them.
Whenever you’re subscribing to a newsletter, use this new newsletter-only email
ID rather than your personal or work email ID. This way you can deal with those
feeds in the Curate mode, rather than in the Communicate mode.
Declaring bankruptcy is almost always less drastic than we believe. Do not be
afraid to use this as often as you need. If you’re thinking about bankruptcy, you
probably need to do it. But do try to use this moment to reflect on what you need
to do to prevent this next time? Do you not check email regularly? Should you
be unsubscribing to some emails or groups? Should your work team move some
discussions away from group chats to email or vice versa?
So declare bankruptcy if you need to, and then, let’s set up the Communicate
mode on our devices based on the ideas of Inbox Zero.
Install all the apps you need to manage your inboxes. This includes, but is not
restricted to:
Email
Instant messaging
Direct messages from social media
Group chats
Tasks
Any other app that functions as an inbox you care about
Where possible, try to use a single app to manage all your different services
rather than using a browser. For example, most modern email applications let us
manage multiple email ids. This way we get a unified inbox across all our email
inboxes. Similarly, software such as Rambox lets us see a unified inbox across
all our messaging apps. See Appendix for a list of such apps.
You also want to make sure that you do NOT install any apps that may distract
you. Do set up the website blockers to block your personal time-sinks. If you
need access to social media, try to make sure you have blocked the newsfeed at
least. Try not to login to social media from this personality at all.
Unlike in the Create mode, your smartphones are actually well-suited for the
Communicate mode. The mobile user interface makes implementing Inbox Zero
on smartphones easy. Most inbox apps allow us to use swipe gestures to archive,
delete, etc. We can make them a part of our Inbox Zero routine. We can even
choose to respond to emails or messages only from our phones, forcing
ourselves to be quick about it.
Often people can’t switch off their phones, because they worry about missing
critical communication from their colleagues. Even though none of us explicitly
asked for it, we have inadvertently ended up creating unhealthy expectations
about response times. Because we’re always connected, we feel the pressure to
reply. More often than not, this pressure is self-imposed.
The real problem is that we have not set expectations clearly.
Add a little note to your email signature that lays out your own personal
communication preference. For example, ‘I usually read emails within 3 days
and respond to each item. If it’s urgent, call’. You can even put a similar message
on your WhatsApp or Slack status.
Like with any other problem, if you’re overwhelmed by emails or texts, 80 per
cent of the problem will come down to 20 per cent of the actors. Most people are
respectful and will comply with your instructions on how to communicate. You
only need to put in effort to set expectations with these 20 per cent bad actors.
You can prepare a saved, polite template to send to someone who texts instead
of emailing or vice-versa. ‘Hi, could you please make sure this is sent on my
work email john@work.com and not text next time? I’m unable to keep track
and this may result in something important being missed or overlooked.’ You’ll
be surprised at how few times you actually have to do this once you start
communicating clearly.
It is easier to set expectations with people messaging you one on one. The
harder problem is in social settings and groups. Group culture is hard to change
once it’s set. If you’re overwhelmed by too many group texts, find the noisiest
group chats and mute or exit them. You don’t need to be present in all
conversations.
If you can’t exit, find whoever is posting the most on them, and message them
privately to request them to slow down. Alternatively, make a duplicate group
with the same members that are ‘Announcements Only’. Meaning, these groups
must be strictly used for important announcements only, no memes, forwards or
‘good morning’ messages should be allowed. Remove those that don’t comply.
In some workplaces, the problem is systemic. Everyone is in one large chat
group, and everyone is expected to be available all the time. People CC everyone
in their email chains because they don’t want to be accused of leaving someone
out. Everyone’s inboxes are flooded, but individual employees don’t want to be
the ones to call it out, because they don’t want to be seen as the ones
complaining.
If you feel this way about your workplace, you may want to talk to your
colleagues one-on-one first to check if they feel the same way too. If others are
also feeling overwhelmed by the state of affairs, then a change in how the office
communicates may be required. Usually, communication culture devolves
because no one attempted to design it mindfully. Like the emperor’s new clothes,
these broken systems chug along till someone stands up and points out the
obvious. Voice your opinion along with others who feel this way, and you’ll be
surprised how many people agree.
No one wants to work all the time. But in today’s distracting world, even
leisure can’t hold our undivided attention. To really switch off and play, needs a
little bit of work. That’s why you need Curate mode.
10
CURATE MODE
Make sure that this password is only stored in the password manager in your
Curate mode. If you don’t remember the password, you simply won’t be able to
access your Twitter feed from anywhere else. You should also make sure that the
password to your website blocker app is also only available from the Curate
mode. This way you won’t be able to fiddle with the blocking settings from
inside the Create or Communicate mode.
You can apply this approach to the passwords of the three user accounts
themselves. You can choose shorter passwords for your Create and
Communicate accounts and a longer password for your Curate account. You may
even choose a password that will remind you of your priorities. For example,
you can set your password to ‘Have I spent time with family?’
If you’re on a deadline and trying to stop yourself from accessing all
distractions, you can change the password to your Curate account to a random,
long string. Write down this random password carefully on a piece of paper, and
seal it. This password is the master key to all your distractions. Depending on
your ability to self-regulate, you can either hide it or leave it with a trusted
friend. You can even ask your friend to not give it back to you till you prove you
are done with the work you were supposed to finish.
Bear in mind, however, that the objective isn’t to avoid spending any time in
the Curate mode. If anything, this is probably where you will have your best
ideas. If used well, you can learn a lot from the internet and meet interesting
people too. But like with focused work or efficient communication, it needs to be
done mindfully.
Let’s understand how we can do this.
OUR SELVES
Before the COVID-19 pandemic threatened our lives, an increasing number of
researchers had begun to identify a new epidemic. Just like we discovered that
obesity is linked to heart disease or smoking is linked to cancer, this lifestyle has
been linked to various physical and mental health issues. Douglas Nemecek,
chief medical officer for behavioural health at the large insurance firm Cigna,
said that this new epidemic ‘has the same impact on mortality as smoking 15
cigarettes a day, making it even more dangerous than obesity’. What is this silent
killer?
Loneliness.
Scientists have proven that isolation can have various detrimental effects, not
just on humans, but on many social animals. Isolation increases the levels of
cortisol, the stress hormone, in pigs and monkeys, just as it does in humans. Fruit
flies have reduced lifespans when isolated. Rats are more at risk of obesity and
Type II diabetes when isolated. It isn’t surprising that loneliness is deadly in
humans too. Group foraging and hunting may have been critical for human
survival thousands of years ago, but they seem much less important in today’s
modern economy. Then why does loneliness persist?
Humans are social animals. Our ability to cooperate was selected by evolution
because it helped us thrive. The pain of loneliness made us socialize, just like
hunger makes us eat or feeling cold makes us seek shelter. Even the language we
use for social failures—‘She broke my heart’, ‘He hurt her feelings’, ‘I was
burning with shame’—speak of it as if it is literal pain. We’ve managed to
overcome our primitive lifestyles, but the social instincts that made us who we
are still persist. It is in our very nature to care about our relationships and our
social standing. All humans have a deep need for connection and belonging. We
find it hard to be ourselves, without also belonging to something larger than our
selves.
Loneliness may be a killer, but that also doesn’t mean that we’re designed to
be with everyone all the time. We need and enjoy solitude just as much as we
need and enjoy company. Sometimes, we just want to be left alone or be wholly
interested in our own pursuits. We want space from others so that we can relax
and be who we truly are. We may have thoughts and feelings that we do not want
to share with others. Sometimes privacy is a need that arises precisely because
we care so much about our social standing. We have secrets, often embarrassing,
that we do not want widely known because we care about what people think
about us.
As humans, all of us have had to learn to walk the fine line between figuring
out who we truly are, while also managing what others think we are—a
balancing act between our desire for socializing and our desire for privacy.
In the digital age, this fine line has become vanishingly thin. We leave digital
breadcrumbs wherever we go, revealing things about ourselves to corporations
and prying governments we don’t even tell our closest friends. Moreover, a lot of
our social interactions have shifted online, and social media has become the
place where we go to fulfil our desire for connection and belonging. Social
media has become critical to our lives, but does it really give us the social
connections and sense of belonging we seek? If not, then why do so many
people spend so much time there?
In this chapter and the next, we try to develop a bitful approach to both these
competing desires. In this chapter, we cover how to keep to your self, i.e., how to
reclaim your privacy. In the next chapter, we cover strategies for how we can use
our technology more mindfully when connecting with others online.
Let us start by learning how to be left alone.
PRIVACY IN PRACTICE
Many companies now market privacy as a feature. This leads many to believe
that privacy is simply a binary, either something has privacy or it doesn’t. In
practice, depending on what measures you have taken, you will have a degree of
privacy.
Configuring for privacy almost always involves some trade-offs. At the very
least, you’ll need to put in a little bit of time to configure your devices and learn
the habits you need to maintain your desired level of privacy. To do this
optimally without feeling overwhelmed, one first needs to answer—what is my
desired level of privacy? and what am I willing to do to meet it?
To be able to answer what your desired level of privacy is, you must be aware
of what you are protecting and from whom. For some people, merely the idea of
being tracked makes them shudder. It makes them willing to invest in any
measure to protect themselves. For some, browsing history being tracked for ads
does not seem creepy, but privacy to them may mean the right to not be
bombarded with spam emails or incessant marketing calls.
Most of our privacy is not lost to clever hackers; instead, we lose it through
oversharing. The companies that benefit from advertising are also the ones in
charge of configuring our privacy preferences. By default, these preferences
favour their business model over the individual. If you really want to protect
your privacy, you will need to put in the effort to change settings and learn new
behaviours.
Once you understand the risks and your own preferences, you need to design a
plan for yourself that you can implement easily. We list some strategies below
that might help you decide what you are willing to realistically protect.
First, you need to be practical. It is more likely that you will abandon an ill-
designed plan that was too ambitious. A simpler plan that protects your basics
without much effort might serve you better in the long run.
We recommend that, at a bare minimum, everyone must learn what it takes to
protect:
It is also important to understand what you cannot control. Every time you use
an online service for a transaction—to order food, do shopping, call a taxi, book
a hotel, etc.—you will generate a log on their server, and possibly with some
intermediaries such as your payments provider. These companies and
intermediaries will retain this information for as long as their privacy policy
states. These companies may then sell this data or hand it to the government if
requested, as per their policies and the laws of the land. This is not something
you can individually change, but you can be mindful of when deciding your
desired privacy level.
Since these individual transactions happen on different websites, once again it
is your identity that helps them connect these pieces together and create a deep
profile of you. If you are concerned about details from various aspects of your
life being associated, do pay attention to which identifiers (emails, phone
numbers, etc.) you are revealing to them.
Ultimately, there is no magic bullet solution to privacy on the internet. There
are only measures you can take to be a harder target to trace. In the sections that
follow, we’ll be going over how to attain specific types of privacy.
The other way hackers attack is password reuse. If you use the same password
everywhere, the security of your bank account is only as much as the security of
neopets.com. Hackers simply guess passwords you’ve used on other sites to get
into more sensitive apps or websites.
Ideally, you should have different passwords for each website. This will
prevent password reuse attacks, but it leads to using a lot of passwords. You can
use a password manager to store all your passwords. Password managers help
you generate random, long passwords that are hard to guess. It then fills in these
passwords automatically when you are browsing, if you have logged into the
password manager. This means that you don’t reuse passwords on any site, but
still only have to remember one master password.
Most password managers also allow you to save other secrets such as your
banking details, credit card numbers, ID numbers, software license keys, etc., in
an encrypted manner. The advantage is that all your secrets are safely stored as
encrypted files rather than plain text. They are in one convenient location and
can even be autofilled directly where you need them. The trade-off is that there
is now a single point of failure. But you can offset some of that risk by using
two-factor authentication (2FA) on your password manager.
A second factor of authentication is basically an additional way of confirming
that you are really you. Ideally, your password is a secret that only you know.
However, in case your password has leaked, the 2FA confirms your identity by
sending a one-time password to a device that is known to be in your control.
In fact, as far as possible, you should be using 2FA on all your important
accounts, especially your financial accounts. There are multiple choices for
second factors as well, and they have their own trade-offs between security,
convenience and costs. If you can afford it, try to get a physical security key
based on an open standard such as U2F to act as your second factor.
1. Trusted Contacts: This includes friends, family and others who should be
able to reach you whenever they desire.
2. Utility Contacts: This includes services like a plumber or a delivery person
whom you share contact details with for a specific utility. During a specific
context or time period, you want them to be able to reach you, but not otherwise.
3. Burner Contacts: These are places that force you to hand over your email or
phone number. You don’t really want to hear from them, but it is the price of
admission. You may want to share an identifier to gain a one-time entry, but you
don’t care at all about hearing from them again.
The internet makes creating new email ids very easy. The appendix lists some
places where you can create burner email ids for temporary use. The most
common use of temporary email ids is to get to content on sites that force you to
register and then later bombard you with emails. Burner email ids are completely
air-gapped from your real one, so you don’t have to worry about future spam.
Today, there are services available that let you make virtual numbers as well.
Virtual numbers are numbers different from your main number and can be
operated through apps. They can be set up to receive calls and SMSes without
requiring an additional subscriber identity module (SIM). Calls from unknown
numbers can be automatically blocked, while those from trusted numbers can be
redirected. These numbers can also be used to register and create a secondary
account on services like WhatsApp, Telegram or Signal.
We can use different identities for different levels of privacy. Setting up a new
email or virtual number should take you ten minutes at most. Once you do, you
now have an air-gapped email or phone number, which you can use as a utility or
burner and share without fear.
Instead of using your real name, number or email, consider creating a
completely unique, unrelated identity for e-commerce deliveries. This way even
if the address leaks, they are not linked to your real-world identity.
It is helpful in general to use a burner email to subscribe to new, unimportant
services. This has multiple advantages. First, the email ID that makes it to most
databases is not the primary email you use for services such as banking or for
private correspondence. As we discussed in Chapter 10, you can even use
another email ID for collecting newsletters. Separating newsletters into another
ID means your personal inbox is not filled with newsletters, promotional emails
or spam, drastically cutting down the volume of email you have to deal with.
It may seem like a task to juggle multiple identities, but most of it becomes
automatic if you’re using a password manager. Password managers don’t just
remember your passwords, they remember usernames too. When you visit any
website or app, they let you simply pick from all the identities you have
registered on that website.
Even important services require you to register using an email address, and
some of them don’t respect your privacy from being annoyed. You can set up a
dedicated email ID only to sign up for these services. This way, all the
unnecessary notification emails do not crowd your primary inbox, protecting not
just your privacy but also your attention.
1. In transit by intermediaries
2. Through compromised personal devices
3. Intentional or unintentional disclosure by the receiver of communications
The first scenario is when the people responsible for delivering your messages
can read them. Lately, end-to-end encryption has become widely available on
our instant messaging apps. Due to their design, SMSes should be considered not
private for all practical purposes. You may want to look for an end-to-end
encrypted email service as well. See the Appendix for a complete list of services.
Even if your communication channel is end-to-end encrypted, the ends
themselves can still leak. It is alleged that the assassination of journalist Jamaal
Khashoggi was coordinated with the help of information obtained from leaked
WhatsApp conversations with another Saudi dissident, Omar Abdulaziz.
Abdulaziz’s phone had spyware delivered by a masked link, masquerading as a
tracking link for a package. There is little one can do if the devices themselves
have been compromised by motivated attackers. If you’re really in need of
strong privacy, you have to make sure that both you and your conversation
partner are using a secure device.
All of us may not have to worry about protection from heavily resourced state
intelligence apparatus. However, there is no saying which of the conversations
we had today will leak in the future and create a problem for us. The problem
with maintaining privacy is that it is not a bounded problem. An end-to-end
secure chat between you and a loved one today may end up being compromised
in 5 years’ time due to a malicious app that your child accidentally downloaded
while playing a game.
Our best hedge against this unbounded risk is to choose ephemerality.
Sometimes you might need to be extra sure that there is no trace of what you’re
doing. You may find it useful to use Tor Browser.
Tor is short for The Onion Router. The internet is basically one large open
network. You can use encryption such that only the intended recipient will be
able to read the contents of your request. However, the meta-data, i.e., the data
about who sent the request, when and to whom is sent openly. Think about the
postman and the envelope. The envelope protects the contents of the message,
but what’s on the address is public, so that the postman can deliver the message
to the right address. There is a certain degree of privacy loss if someone can read
the addresses you communicate with, even if they can’t read what you’re
communicating about.
Instead of taking the shortest route, the Tor browser routes every request
through multiple, random servers. At each hop, information is masked, and a
layer of encryption is added (hence, the ‘onion’ router). Even if a hop is
compromised, it could, at best, only know the addresses of one hop ahead and
one hop behind. Because of the layers of encryption, no hop individually can
decrypt the information. At no point in the journey does any one computer know
both the original sender and the receiver, offering a truly anonymous browsing
session.
Tor is the safest browser, but also the slowest. Tor’s multiple hops make page
loading slower. An alternative strategy is to simply protect yourself from
tracking at two levels. First, protection from the ISPs who track you using the
hardware they provide to connect to the internet. Second, protection from
advertisers who track you using browsers, apps and other software you use to
use the internet.
MANAGING IDENTITY
The primary way that ad networks track you is because you’ve logged into their
products. For browsing that you do not want to be linked to your identity, you
can use the incognito mode. Or even install a different browser if that works
better for you. If you do install another browser, remember to never login to your
existing social media or email accounts, else advertising companies will be able
to set a cookie knowing that you are you. If you’ve already split by identity, you
can set up your browsers in each personality for the level of privacy you desire.
There are a few steps you can take to prevent adtech networks from creating
profiles of you. You can also stop re-targeting ads which will no longer try and
tempt you with things you almost purchased. The following checklist
summarizes the steps you can take to prevent your data being collected at all.
Some specific sites may not function correctly because of some of these, but
those should be the exceptions, not the rule.
THE DRESS
In 2015, Cecilia Bleasdale used her phone to take a picture of a dress at Cheshire
Oaks Designer Outlet north of Chester, England. Bleasdale planned on wearing
this dress to her daughter’s wedding and sent her daughter the picture to get her
opinion. Her daughter would eventually post the photo to Facebook to ask her
friends a simple question:
What colour was The Dress?
The picture Bleasdale’s daughter posted is the famous meme that divided the
planet on whether The Dress is black and blue or gold and white. It originated on
Facebook but went viral across all social media networks. Major television and
print news outlets covered the story. Fans wanted to know whether celebrities
saw blue or gold. News items about The Dress itself went viral. Wired
Magazine’s article by Adam Rogers on The Dress got over 32.8 million unique
visitors. The hashtag ‘#TheDress’ was generating more than 11,000 tweets a
minute. At one point, there were more than 8,40,000 views a minute of the
Tumblr post. Buzzfeed’s poll on The Dress broke its then-record for most
concurrent users live on the site.
The Dress exemplifies how social media really works.
If you are curious to know, The Dress was black and blue, but more than two
thirds who saw the picture saw it as white and gold. There is no scientific
consensus as to why people saw discordant colours. But The Dress went viral
precisely because it divided opinion in a manner that can’t be settled definitively.
In a rare instance, The Dress was one of the things that divided us but was also
incredibly low stakes. You could disagree with someone but also laugh about it
together. Usually, for more high-stakes questions such as politics, policy, gender,
justice or even sports, the conversations can get acrimonious rather quickly. The
resulting hate attracts even more people into the brawl and drives more
engagement.
Social media has its upsides too. For example, in the second wave of the
COVID-19 pandemic in 2021, Twitter users in India self-organized to move
huge amounts of relief in the form of oxygen cylinders, medicines, plasma and
other materials. Cryptocurrency founders put together a relief fund for India that
received nearly US$400 million in relief funds from across the globe. Although
the verdict is still out, it is a group of Twitter users who incessantly researched
and collaborated to put the lab leak hypothesis back on the table. Social media is
undeniably interesting and covers niches you wouldn’t even dream existed. You
can genuinely build connections with people across the globe, or across the
room, in a new and different way. There have been real social movements that
have been born and grown on social media.
Social media has become an inextricable part of society. Whether you
individually decide to opt-in or opt-out of social media, it still deeply affects
your life anyway. Hence, it deserves much more of our scrutiny.
People are often worried, and rightfully so, about What is social media doing
to society? Or, at a more personal level, What is social media doing to my data?
We believe we need to start with a more basic question—What is social
media?
SPECIALIZE
To design your own usage, you need to first answer: what do you use social
media for? There are many uses and it would be impossible for us to list them
all. But broadly, you can classify the uses into four categories—Connection,
Fraternity, Community and Entertainment.
Connection represents our intimate relationships. People with whom we
would like to share our personal joys, sorrows and everything else. Fraternity is
those relationships where we share a common passion or interest. We want to
share our knowledge, our questions and curiosities. Community represents the
roles we play as members of society. We want to present our best selves and
participate in conversations about the future of our communities. Finally,
entertainment is just that. It is leisure that doesn’t require a reason.
Our simple strategy is to separate these four uses into four different social
media networks or, at the very least, into four different accounts. Similar to how
we split our personalities by attention mode in Chapter 7, we want to split our
social media use by intent. The biggest upside is that it makes social media use
much more intentional, with much less effort.
For example, if your friends are on Instagram, you can limit its use only to
catch up with friends. Remove all content sources that are unrelated to your
friends and family. You can use other networks such as Twitter, Reddit or
Facebook to catch up on the news and explore your interests. Yes, this split adds
friction, but that is the point. You want to be deliberate about which self you’re
being, rather than letting the social media algorithm decide your mood for you.
On a daily basis, instead of trying to limit your overall social media use, you
can specifically limit use for Entertainment or Community or whatever you want
to balance. It becomes easier to save your time and mental health, because you
can block the specific social media app that is making you lose time or causing
you distress. Connecting with friends on social media and seeing their happy
moments is a true joy. Especially when in a world without social media, those
moments may never have reached us at all. However, we start using social media
with one intent, but often end up scrolling mindlessly till we’re doing something
else entirely.
Using social media to engage with our friends online has been shown to
actually be positive for our well-being. Studies have shown that shallow
engagements such as likes don’t really make us feel connected online. When you
see something that’s interesting, try to leave a comment. If you’d rather talk to
them one-on-one, even better!
In fact, if you truly want to use technology for connection, the best social
network can be one you make. Let’s call it a simple social to-do list. Write down
a list of people you want to stay in touch with. Whenever you next have time,
scroll till you find someone you haven’t spoken to in a while. Drop them a
message with a few updates about your life. Maybe mention a fond memory the
two of you shared. Ask them when they’re next available to talk over a phone or
a video call. Once you’ve spoken to them, move them to the bottom of the list,
so that your list always surfaces those whom you haven’t spoken to in a while.
Once a year or so, add or subtract names from the list to make sure it truly
represents the people that matter to you. This simple list will help you create
more meaningful connections than liking or sharing posts ever can.
CONTROL THE AUDIENCE
Social media’s emphasis on follower counts and friend counts has led us all to
add everyone to our one account, leading to the collapse of context. Today your
best friend from college is as much as your ‘friend’ on Facebook, as Raj from
accounting with whom you shared 6 sentences at the office party. Managing your
privacy and preventing harm is harder if you use the same account for your inner
and outer social circles.
If you do use social media to not just check but also to post updates, then the
second dimension of control is very important. You should tightly control the
audience of your Connection network to only your most trusted network and
make your profile unsearchable. This allows you to be more vulnerable and
share more intimate details with less fear of unintended consequences. This
automatically improves your experience on social media, since you have a space
where you can express yourself safely.
This is already how teenagers are using their social media. Many of them feel
the need to present their best selves on their primary account—perfect pictures,
celebratory moments and support for serious causes. However, they are also still
teenagers. Sometimes they just want to be goofy or weird. So, they create a
finsta, that is, a fake Instagram account. Here, the audience is limited to only
other finstas of their closest friends, so that they can express their unedited
selves to a more intimate audience.
It is easy to create a new account with a limited audience, but it is hard to keep
your audience limited once you get going. Sometimes, you will meet people in
real life who will ask to connect with you on social media. Often, this is an
awkward moment where most people can’t decline the request. Having separate
accounts for Community and Connection lets you easily manage this problem.
Give your Connection profile only to those whom you want to have in your inner
circle. Treat your Community profile as you would the classifieds section in a
newspaper. Only post that which you are comfortable knowing that the whole
town could be reading tomorrow.
FORGET
The idea of Ephemerality is useful in social media as well. Recently, most
platforms have moved to a ‘stories’ format of posting, where the post disappears
in 24 hours or so. This increases our privacy tremendously. When we post about
more intimate areas of our lives such as where we eat or where we are travelling,
we reveal a lot more than we like. Especially, with a whole timeline of such
posts, we cannot fully know what a malignant actor might be able to derive
about us.
In September 2020, a cybersecurity expert was able to decipher the location of
a secret bunker from just one picture. The picture showed some mountain peaks
and a helicopter taking off. Anonymous sleuths on the internet were able to
identify the make and the maximum range of the helicopter, as well as its take-
off spot from publicly available data and reverse image searches. The
cybersecurity expert then used Google Maps to identify the peaks which were
visible and drew some perspective lines to figure out where the hidden bunker
was!
Data is weird that way. Each of our individual posts may not reveal much, but
taken in aggregate, it could reveal something even we don’t know. Moreover, if
not the data itself, the meta-data—when we post, how often we post, where we
post from, etc.—also tells a story about us. The easiest protection against this
unbounded risk is to create a bound on how long the data is ‘live’ for. Posting
stories on social media allows us to keep our privacy by reducing this risk to 24
hours.
The flip side of course is that these ephemeral formats also create the craving
for more social media. For those consuming content, it creates the incentive to
check in regularly, because of the short half-life of the content. Similarly, for
content creators, it requires them to keep posting to stay visible.
Over time, from the pages-long discussion forums of the early internet, to now
with TikTok, the format in which we communicate has become a race to the
bottom towards ever shorter attention spans. This isn’t coincidental. Just like the
slot machines from Chapter 4, one way to keep us hooked is to increase the
speed of play. TikTok, Instagram/WhatsApp Stories, YouTube Shorts—all have
adopted the latest 15–30 second vertical, auto-advancing, full-screen video
format.
Even with every strategy we outlined here implemented rigorously, it is
genuinely hard to not get hooked to the short format videos that are popular
these days. This is why the path to bitfulness doesn’t just stop at our own use of
social media.
If we’re going to really fix our relationship with technology, we need to fix the
fundamental dynamic.
THE FUNDAMENTAL DYNAMIC
Underneath every social network, there is a fundamental problem to solve. Out
of the literally millions of things posted every second online, social media
companies need to select the exact content that would most engage each of their
users. Social networks solve this by building recommendation engines.
The belief is that the more data a company has about an individual, the better
this engine understands the taste of that individual. Like the Netflix documentary
Social Dilemma depicted, with more data, it can create deep psychological
profiles and recommend the exact content that would resonate with you or
change your mind.
This is not entirely incorrect, but it is not exactly correct either.
The primary asset of any social network is its social graph. The social graph is
basically a dataset representative of all user behaviour that happens on the social
network. First of all, all individual accounts on the social network are nodes of
the graph, as are all the posts, pictures and other objects on the social network.
Every interaction between your account and a post, picture or another account is
stored as an edge of the graph. Over time, a vast and complex maze of
connections emerges.
Recommendation engines are typically built using machine learning over the
social graph. Specifically, the most common machine learning technique to
recommend content, or even people to follow, is called collaborative filtering.
Collaborative filtering is simple to understand. Each of us ends up creating a
footprint on the internet based on our activity. This footprint is not used to create
a deeper psychological profile. Instead, your footprint is used to find other users
like you. Two users whose footprints are similar are assumed to have similar
interests. Recommendation algorithms are simply filtering people who behave
like you do online. They recommend to you what people with footprints like you
are seeing.
Collaborative filtering is the real secret sauce of advertising giants online, not
just on the content side, but also on the monetization side. Ad platforms offer
advertisers the ability to target ‘similar audiences’. For example, advertisers
upload a list of users who have already purchased from them. Ad platforms then
use all the data they have about the users on the list to filter similar users who
are not on the list. These new similar users are then served the ads that
advertisers want.
Often people worry their social media is listening to their conversations. If
your friend was telling you about a mattress they just bought, many are surprised
they start seeing mattress ads too.
The ad companies aren’t spying on either of your conversations, picking up
mentions of the word ‘mattress’. The mattress company your friend purchased
from adds the ID of your friend to their ‘similar audiences’ list. Ad platforms are
then simply making guesses about who is similar to your friend based on their
data footprint. It is much more likely that we will buy similar goods and
services, or relate with similar content as our friends. Especially those who live
in the same area and have similar interests.
Collecting data is important to the model, but it is neither for mind-reading
nor mind-control. It is to help with collaborative filtering. The underlying data
about who you speak to is much more important from a targeting perspective,
rather than what you actually said. What collaborative filtering does is to create
cohorts of similar users, who are then shown similar content because of their
similar history of consumption.
Your preferences and privacy are betrayed more by what people like you are
doing online, rather than because they have built a deep profile of you. In fact,
this creates what researchers at Google DeepMind call a ‘degenerate feedback
loop’. Based on a guess, the algorithm selects for you content that it thinks you
will like. Even if it is not what you like, you end up going through some of the
content and maybe even engaging with some of it.
Since the algorithms are now all AI, the data about our usage is fed back to
the algorithm as a score of its accuracy. Because we engage with the content, no
matter what we’re shown, it cements the algorithm’s assessment of you. Since
the collaborative filtering guesses are being reinforced by its own
recommendations, it may become impossible to escape the algorithm’s
judgement of you. The feedback loop confirms its own beliefs and becomes
degenerate.
It is not a surprise, therefore, that social media is driving polarization. The
fundamental dynamic at the heart of social media is dividing us into groups that
each sees a different reality. If you share posts about a certain topic or follow
certain people from a group, the algorithm will then encourage more of it
because of degenerate feedback loops. Moreover, the algorithm then promotes
content that magnifies the differences between these groups. Because that
maximizes conflict and, hence, engagement.
While we do have the choice to deactivate or delete our social media, we can’t
control everything about it. Collaborative filtering, the attentional race to the
bottom and all their consequences are not problems that we as individuals can
change or fix. However, these problems affect us deeply.
The fundamental dynamic that creates the problems also makes the good parts
of social media what they are. Fixing these problems will require not just one
small change but probably a massive overhaul of social media. There are no easy
answers, but that doesn’t mean there are no answers.
We just have to ask the right question.
You can’t create economic value from something that is not scarce. To create
scarcity, one has to ensure that the subset of user data they have is meaningfully
unique from data that others have.
Google has a large, unique collection of user search data because it has more
than 92 per cent market share of online search. In exchange for search results,
we tell the search bar things we probably do not tell our closest friends.
Facebook has unique social data. We tell Facebook who we are friends with and
whom we follow. Our interactions further betray which of these bonds are
stronger and which are not.
We cannot limit the creation of data. Our every online action and interaction
will leave a trail. In fact, sometimes we would want this data to exist for our own
sake. Imagine if your bank lost data about your transaction history. What we
need is more control over what happens after that generation. Should it be
stored? Who gets to store it? What can they use it for? What if we don’t like
what they do with it? Can we ask them to delete it?
Companies like Facebook and TikTok have control over the social
infrastructure. This enables them to get our data and prevent the competition
from having that unique subset of user data. Also, why wouldn’t they? It makes
definite business sense to do so. Anyone else in their position would’ve done the
same.
The original sin of the internet was that we decided to sell our attention to pay
for the missing infrastructure of the internet. Today, this logic has given rise to a
few players who essentially own the critical infrastructure of the internet. The
owners of this infrastructure are using our data to further their control. No matter
what we do individually, we can’t fix this till we fix the vacuum at the heart of
the internet. This is why The Third Crisis is a collective problem, and we need to
find solutions collectively.
Social media is likely to remain a broken place till we make sure that our data
is on our networks, so that we can be truly free to be our selves.
PART THREE
THE COLLECTIVE
13
SLIPPERY SLOPES OF SCALE
EXPONENTIALS
In mid-April of 2020, when most countries struggled to get the testing
infrastructure in place for the COVID-19 pandemic, an intriguing news item
found its way around the Indian internet. A technology developed by three
young bioinformatics students from Mumbai was being piloted by a university in
Rome. The technology could, allegedly, diagnose COVID-19 from voice
recordings of the patients. Put simply, you would speak into a smartphone, and it
would tell you whether you were infected with the coronavirus or not.
If you’re reading this in the year 2021 or beyond, you’d be looking at the
news of a voice-based AI test sceptically. If there was a voice-based AI test for
coronavirus, we’d have seen it by now. But that wisdom is the gift of hindsight.
In mid-April 2020, India was still in week 3 of a very stringent lockdown. All
news channels were busy explaining the nature of exponential growth curves to
audiences. What seemed like a few cases today would become many thousands
of cases in two weeks. In a couple of months, we’d be looking at hundreds of
thousands of cases. Rapid testing was crucial to flattening the boundless, ever
upward-climbing growth curve of COVID-19.
The authors of this book are unqualified to predict the efficacy or accuracy of
this voice-based diagnosis technology, and it also is beside the point. We’re
using this story as a springboard to ask a different question: what would happen
next if this technology had actually delivered even some of what it promised?
If we suspend our disbelief and imagine that such a technology was possible,
it would be a breakthrough discovery in April 2020. At that time, a cheap,
widely available, non-invasive, self-administered test could’ve genuinely
changed the course of the global pandemic. Even if the test wasn’t 98 per cent
accurate, and needed reconfirmation via an RT-PCR, it would still give us more
and better information to make wiser policy choices. It could be deployed
globally because of the nature of digital technologies. Even if the voice-based
test was not accurate, but simply good enough, it would still be a powerful tool
in civilization’s arsenal against COVID-19. Individuals would be able to check
on their own health and reduce their anxiety.
Instead of blunt lockdowns at a national scale that crippled many economies,
countries could selectively target and enforce lockdowns in hotspots. Even in
countries with a milder lockdown, businesses were still crippled by the public’s
lack of trust in the safety of going outside. Physical businesses would be able to
screen patrons at the door by checking their voices. Along with masks and social
distancing, this test would help ensure confidence of the public in their
establishment.
This voice-based diagnostic technology could collectively save billions of
dollars and maybe tens of thousands of lives. The advantages of this hypothetical
scenario are obvious and easy to imagine. What we don’t usually imagine are the
side effects. What would be the path of this technology from an early pilot to
potentially testing everyone worldwide? What would be the other consequences
of taking that path?
We said in Chapter 3 that the real crisis is that how we are going digital will
lead to an imbalance of power. We want to explain what we mean through a
hypothetical scenario. For this next part, imagine that it is April 2020 and that
you are in the driver’s seat of this ground-breaking innovation. If you had just
invented this technology to diagnose COVID-19, you’d be asking the obvious
question—how do you get this technology to everyone, everywhere fast?
In Silicon Valley parlance, you’d be asking—How do I scale?
STAYING SAFE
In startup culture, ‘bigness’ is proof of goodness.
This is often the first and the foremost defence against criticism of internet
companies. Supporters claim companies wouldn’t be big if they weren’t
innovative and customer-centric. They claim that to become big, a company
must be good at what they do and serve a real customer need.
The argument isn’t entirely without merit. No tech company can grow to a
meaningful size if it doesn’t actually solve a consumer need for a reasonable
number of people. But once they have found a consumer need, to grow to a
stratospheric size requires a different approach.
To demonstrate, let’s go back to the example of the Artificial Intelligence-
enabled, voice-based COVID-19 diagnostic test and see how you would scale
this product.
First things first, you pick a name for your new invention. ‘Artificial
Intelligence enabled voice-based COVID-19 diagnostic test’ is quite a mouthful,
so you choose ‘SaySafe’. It is easy to remember, a clever play on ‘stay safe’ and
highlights the voice-based nature of your technology. Most importantly, the web
domain saysafe.ai is available.
You built the pilot using your university’s computers. For the real world,
you’re going to need to put your algorithms on dedicated hardware to ensure
they run reliably. You have a few critical choices to make on distribution. You
could install the technology on specialized, portable devices so that people can
carry out this test anywhere, anytime, even without the internet. Imagine
Amazon’s Echo smart speakers, but for the singular purpose of COVID-19
detection.
However, it is April 2020 and the manufacturing hub for such devices, China,
is under a severe lockdown. Global supply chains have been disrupted. Suppose
you try to make a dedicated device. In that case, you’d be unlikely to make and
ship enough devices in the pandemic for your technology to benefit enough
people. Besides, as any tech pundit will often tell you, hardware doesn’t scale as
well as software.
You realize that people already have microphones in their smartphones. It
would be best if you simply made your test work on the internet and let people
use their own devices to access your technology via an app. This distribution
method has advantages of maximum reach and minimum maintenance. You only
have to make it once and can then deploy it everywhere. Serving the app online
allows you to collect data and improve your model over time. The updates make
their way to all users immediately—no waiting to buy another version or need to
replace their devices. The problem is you’ve never made anything that can
handle the volumes you’re targeting. You start looking for good engineers to
help you.
To get engineers on this task, you’re going to have to pay them. You don’t
have the money to spare for that, nor does your university. A research grant
would take weeks, if not months, to come through. Given that this technology
can save billions of dollars, your professor suggests that you build a start-up and
raise venture capital. The government had recently launched a mobile app to
help entrepreneurs such as yourself set up a new company in under a day. On
Monday, you register your company online and email VC firms. Because your
app is so timely, they all want to see you on Zoom on Wednesday.
The VCs go over a demo and are impressed. They all tell you that they’ve
seen four other companies trying to do what you do, but you are ahead on the
pilot due to your university’s data. If they give you the money, they want to
make sure you get a lead in the market and retain it. They ask, ‘what is your
business model?’ You say you’re going to charge per test to cover the costs of
servers and engineers. They tell you that this is a bad idea. One of the other four
companies might charge lower than you and people will opt for the cheaper test.
‘What’s important,’ one of the VCs says, ‘is that you show consistent growth.
How about making the test free? HealthTech is a hot space right now, you can
always figure out how to make money later’.
You decide that it is much more important to let people know their COVID-19
diagnosis than make money. Moreover, the VCs seem reluctant to give you
money if you charge people and eager to sign a cheque if you don’t. You see this
as a win–win and accept an offer from a reputed VC firm. In return, you hand
over some equity, a board seat and agree to hire a ‘growth hacker’. You’re
excited to have the money to hire the engineers you wanted and get to work.
It is now June, and the SaySafe online app is ready to go. Customers log in
with their email address or phone number. You give them a fixed prompt to read.
They simply read out the text in their own voice, record it and send it to your
cloud. An AI algorithm analyses the fresh voice sample against previous voice
samples from that user on the cloud. Some of your most eager users submit their
temperature every day or submit their results if an RT-PCR test came back
positive. The algorithm is continuously tweaked by your engineers based on this
feedback. People begin to use your service, and in just a few days you’ve done
more than 10,000 tests.
Your user base is growing fast. With the volumes you’re expecting, you’re not
going to be able to serve all your users without footing a costly server bill. Your
algorithms need quite a lot of computational power, and your engineers need to
be paid astronomical salaries. You begin to see your bank balance dwindle. So
you go to a bigger VC firm which offers you more money. Once again, they ask
for equity, and another board seat and that you hire a ‘Head of Business’ in
exchange for the money you need to keep going. You had started this company
with the vision of ubiquitous testing, and you’re still far from that goal. So you
agree, sign the deal, and soon the money hits your bank account. You get back to
work.
When you reach a million users, your new Head of Business asks what
SaySafe does with the user once the test is over. You explain that you’re a
diagnostics app and after you show the results your job is done. The new
business head looks disappointed with you. He explains that this is a wasted
opportunity. ‘We’re not a diagnostics company, we’re a Health Tech company.
We need to leverage technology to provide our users with the best end-to-end
healthcare solutions.’
Your business head recommends that SaySafe start diagnosing for more than
merely COVID-19. Lots of other diseases can be detected by voice. If the results
are positive, SaySafe can directly connect users to the hospitals and clinics
around them. By asking users to give data about their insurance, SaySafe can
even recommend hospitals covered by your provider. SaySafe can earn money
by getting independent doctors and hospitals to bid for incoming leads from your
diagnostics app. This will all be free for users, since you get paid by the doctors.
Your board of directors, largely comprising the two VCs who funded you,
thinks this is a wonderful idea. The VCs recommend you raise more money to
grow the team and hire the new engineers you now need. You also realize you
now need a ‘Head of Product’ to manage all the engineers you hired.
Patients who login to check their COVID-19 status and are now also being
diagnosed for other diseases at no additional cost. Doctors and hospitals who had
seen fewer patients due to the lockdown start lowering prices, outbidding each
other to get your leads. Since you allow users to conveniently book
appointments, you see some growth in the number of users. It helps that booking
through your platform is cheaper than booking with the clinic directly, thanks to
the money provided by your VCs.
Your head of product made it a point to measure every little detail of how
users are behaving by recording their data. People are logging in less frequently
to check if they are sick, he points out. They are also getting stressed by
worrying about COVID every day, so they’re avoiding the voice tests. Good for
them, but bad for SaySafe’s business. You still are spending on salaries and
servers but don’t have enough income. Your board suggests you need to keep the
growth going if you don’t want to run out of money.
Someone in your engineering team suggests that SaySafe can pivot into
mental health diagnostics. ‘What if we could replace the fixed prompts with
open-ended questions instead? Prompts like “How are you feeling today?” or
“What’s on your mind?” While we will continue to use the voice samples to
diagnose their diseases, we will use AI to recognize variations in stress levels
day-to-day. I’ve already written a proposal and can help you present it to the
board.’ The engineers are excited. Your board is elated. An investor is willing to
sign another big cheque if you expand from merely Health Tech into the growing
‘Wellness’ industry.
Still, SaySafe won’t sustain its lofty valuation if you can’t convert some of
that traffic into revenue. You call your team for brainstorming, and many suggest
selling the data. You put your foot down and say that constitutes a breach of
trust. You don’t want to sell user data; you’re not that kind of company. So you
agree to sell ads instead. However, the ads are targeted to users depending on
what they said, to make them more relevant. Your team starts building the
upgrades.
The clickthrough rates on these ads initially were high, but in a few months,
they begin to fall as people grow tired of the ads. The board pulls you up for not
delivering on the promised numbers. You are now desperate for anything that
will turn around the revenue numbers. When getting more users was no longer
an option, someone from the ads team had another suggestion on increasing
revenues. ‘People aren’t just using SaySafe for health anymore. They’re
discussing their problems like they would with a friend. We know who’s
thinking of buying a car, who’s thinking of taking a vacation, etc. Moreover, the
daily prompts guide what they talk about. What if we could allow advertisers to
pay for prompts to their target audience. An e-commerce retailer would pay to
ask someone in their mid-twenties “What are you thinking of buying for your
mother this Mother’s Day?” etc. This could be as big for us as video ads were for
Facebook.’
Your board approves the idea, and your team implements the feature. Slowly,
your prompts start driving sales more than ads. Soon, your valuation triples. The
public starts worshipping you as a tech genius.
What started as a diagnostic app becomes a full-fledged surveillance tool.
Eventually, even surveillance does not suffice for the manic growth that
everyone expected of you. The only way to surpass that expectation was to
incept thoughts into the minds of your users. You started in April 2020 with a
wonderful idea and a genuine desire to change the world. In a few short years,
you realize that your nightmare is that you did change the world but not in the
way you intended.
The specifics of this hypothetical example are deliberately far-fetched, but the
trajectory is not that far from reality. ‘How do we scale?’ is a fundamental
question every new technology or business idea faces at some point in time.
Thirty years ago, when the worldwide web didn’t exist, there was a different
playbook for information technology products to grow. But over the last thirty
years, we’ve seen various models emerge, fail and reinvent themselves till a
particular model has become the de facto method to succeed.
The model is to scale at any cost or perish trying. Profits are not what they’re
chasing; an unshakeable control over a large part of the market is what they are
after. VCs invest billions of dollars in these start-ups, who in turn subsidize users
by providing services for free, or cheaper than analogue competitors to grow
their online business. Often, this means the companies are making losses
happily. Once they reach a certain size, economies of scale and network effects
work together to cement their market position. This strategy has become the
default across many domains and products—whether online advertising
(Google/Facebook), digital payments (Alipay/Wechat), ridesharing (Uber/Ola)
or food delivery (Zomato/Swiggy).
This strategy has many names, but let’s stick with the name that Reid
Hoffman gave it, blitzscaling.
BLITZSCALING
Reid Hoffman was one of the co-founders of PayPal. PayPal was one of the early
successes of the internet. Veterans from PayPal, such as Elon Musk or Peter
Thiel, would go on to become successful tech entrepreneurs with multiple
ventures. Hoffman went on to found LinkedIn, which was eventually sold to
Microsoft for US$34 billion. Hoffman coined the term blitzscaling for this
strategy of dazzling growth fuelled by burning investor money.
According to Hoffman, ‘Blitzscaling means that you’re willing to sacrifice
efficiency for speed, without waiting to achieve certainty on whether the
sacrifice will pay off. If classic start-up growth is about slowing your rate of
descent as you try to assemble your plane, blitzscaling is about assembling that
plane faster, then strapping on and igniting a set of jet engines (and possibly their
afterburners) while you’re still building the wings.’
If the proximity to ‘blitzkrieg’ bristles, do remember that he coined this term
in early 2016. This was a different era. This was before news of the Cambridge
Analytica scandal broke and the public mood soured on tech. At that time, these
startups were darlings, not just on Wall Street, but in public opinion too. Reid
Hoffman wasn’t writing a takedown of tech by comparing it to a Nazi Germany
strategy. He was praising the strategy for its counter-intuitive nature.
As Hoffman put it in an April 2016 interview to Harvard Business Review, ‘I
have obvious hesitations about the World War II association with the term
“blitzkrieg”. However, the intellectual parallels are so close that it is very
informative. Before blitzkrieg emerged as a military tactic, armies didn’t
advance beyond their supply lines, which limited their speed. The theory of the
blitzkrieg was that if you carried only what you absolutely needed, you could
move very, very fast, surprise your enemies, and win. Once you got halfway to
your destination, you had to decide whether to turn back or to abandon the lines
and go on. Once you made the decision to move forward, you were all in. You
won big or lost big. Blitzscaling adopts a similar perspective.’
What’s wrong with scaling? Inherently, nothing. Economics has always lauded
efficiencies of scale as a way of increasing productivity and prosperity. Lots of
companies borrow money from the stock markets or through bond markets to
grow bigger and compete. In fact, to make the distinction clear, Hoffman calls
this regular kind of growth fastscaling. Fastscaling is where companies sacrifice
some efficiency to favour growth. The catch here is that when a company which
has figured out its market and product, but is now trying to grow market share
scales, it is only considered fast. It is not blitz.
To be blitz, you have to deliberately throw caution to the wind and take huge
bets on things you don’t fully understand. According to Hoffman, ‘When a
market is up for grabs, the risk isn’t inefficiency—the risk is playing it too safe’.
Hoffman recommends blitzscaling precisely for those new technologies whose
consequences and impact on society are not fully understood. If you’re hesitant,
then blitzscaling start-ups is not for you. ‘Do or Die’, reminds Hoffman.
Where you stand on a matter depends ultimately on where you sit. Investing in
blitzscaling companies gives huge returns in a blitz. As a general of the tech
industry and a partner at the VC firm Greylock Ventures, Hoffman is glorifying a
strategy that typifies what he likes to invest in. However, if you were one of the
incumbents being disrupted, maybe the other World War II metaphor that you
would find more apt for this strategy would be kamikaze.
Hoffman is by no means an outlier, or the lone purveyor of this strategy. Even
before Hoffman, others have said essentially the same thing. One of the biggest
names to promote the same strategy has been Peter Thiel, another co-founder of
PayPal. In his very popular book, Zero to One, Peter Thiel essentially advocates
a similar approach in an effort to ‘escape’ competition, ‘Monopoly is the
condition of every successful business . . . All happy companies are different:
each one earns a monopoly by solving a unique problem. All failed companies
are the same: they failed to escape competition.’ Hoffman spoke of the process,
whereas Thiel is explicit about the end goal—a unique monopoly.
Blitzscaling might be a great strategy to differentiate yourself from your fast-
scaling peers. However, if you blitzscale, it usually means that your competition
has to blitzscale too or they will get left behind in winner-take-all races. As a
society, we all hurtle towards an uncertain and risky future at jet speed with the
afterburners on. One of the blitzscaling entrepreneurs might even succeed in
building the wings, but no one really has a working steering and absolutely no
one is building the brakes.
We believe the real problem here is the one left unsaid. When chasing a
unique monopoly, or trying to grow really fast, you enter a dangerous game we
call the Slippery Slopes of Scale. By making certain decisions early on, such as
raising capital that’s premised on hyper-growth, entrepreneurs essentially force
their own hand. This is what we wanted to demonstrate with the SaySafe
example. It is not evil people looking to conquer the world, but reasonable
people trying to do something good that causes The Third Crisis. Burning
bridges, going big or going home, whatever metaphor you may choose to phrase
it, the strategy is designed to be self-fulfilling. You may have your initial doubts,
but once you commit to it, you really have no way out except to go further in.
The problem goes back to the internet’s original sin. Because there was no real
way to send money on the internet, businesses had to take their money from
elsewhere. This money from investors came with the expectation of phenomenal
growth, and even today, technology start-ups are synonymous with a chance at
rapid, astronomical wealth creation. Advertising made the first wave of internet
businesses such as Google and Facebook free.
However, since mobile devices and the internet have become more
commonplace, a second, and more pervasive internet business model has
emerged called ‘Aggregation’. If we don’t address it soon, this model threatens
to spread The Third Crisis from a few industries, such as online advertising, to
every industry and job.
AGGREGATION
Conducting commerce on the internet makes a lot of sense.
For consumers, e-commerce provides the widest variety of suppliers. For
sellers, it reaches the widest audiences. However, as economists would say, the
marginal utility of every additional choice quickly falls. Add enough choice and
it may even turn negative.
Humans are not good at dealing with infinite choice. Once you could buy
anything from anyone, anywhere, it became harder to decide what to buy, from
where. Thus, the internet gave rise to a second kind of business model to solve a
problem it had itself created. This business model was aggregation. It involved
aggregating sellers and matching them with interested buyers.
The adoption of the smartphone has spurred the aggregation model to expand
from simply selling products to selling services. Once we all had a portable
computer in our pockets, we could use it to order cabs, get food delivered, and
purchase other services on the fly.
The fundamental aim of the aggregation model is to create an online
marketplace where buyers and sellers transact. The transaction infrastructure is
provided by the aggregator and is called the platform.
Aggregators solve two key problems for e-commerce transactions—Discovery
and Trust. Discovery is the ability to find the right thing that you need from the
right sellers. Trust is making sure that both parties are playing fair and don’t
commit fraud. Many tech companies deploy the aggregation model. AirBnB,
Alibaba, Amazon, eBay, Etsy, GrubHub, Oyo, Ola, Swiggy, Uber, UberEats,
Zomato, etc., are all aggregators. The difference in their approaches is how they
solve for transactions, discovery and trust.
Online shopping for products is often cheaper. E-commerce shortens the
supply chain and brings in efficiencies of scale. Inventory & logistics can be
optimized, wastage & returns can be reduced, and automation can drive down
costs.
However, the fundamental cost of driving a taxi does not reduce when one
company aggregates millions of them. So what makes the aggregation model so
popular for services?
Because it is the model most amenable to blitzscaling. The aggregation model
relies on two ideas. The first is that aggregation will cause the markets to
concentrate. Second, you can speed up that concentration by blitzscaling.
Aggregation naturally encourages concentration in any industry due to
Network Effects. If there were two platforms, all else being equal, as a buyer,
you’d prefer the one with more sellers. Similarly, as a seller, you’d prefer a
platform with more buyers. Basically, when we want to participate in a network,
the bigger it already is, the more attractive it is. Any platform that is able to take
a lead on either buyers or sellers, therefore, usually manages to draw the other
side. The big networks get bigger, and the winners take all. This results in a
virtuous cycle of growth, helping these companies grow even faster.
Network effects are everywhere in internet companies because they offer a
defence against competition. Most famously, Amazon explicitly made network
effects their strategy. They called this model the ‘flywheel’. Better customer
experience—wide selection, two-day shipping, easy returns, etc.—means more
traffic, which improves the variety of products by attracting sellers and makes
overheads cheaper. The money saved is invested in making the customer
experience even better, driving even more traffic.
The Blitzscaling strategy combines very well with network effects. VCs
bankroll companies to build a pool of sellers and buyers inorganically, without
worrying about near-term profits. While capital remains cheap, these tech
companies are often subsidizing the real costs of goods and services. The Indian
start-up ecosystem is awash with stories of how people have gotten goods and
services at below costs, because of cashbacks and promotional offers by
blitzscaling start-ups.
Our personal favourite (possibly apocryphal) example is the gentleman who
wanted to move his bed from one apartment to another in Delhi. Simply hiring a
truck and labour would have cost him nearly a thousand rupees. Instead, he had
the genius idea of selling it on OLX and using another account to purchase it
from himself. OLX took zero fees and paid for the transportation and labour. He
used PayTM to pay for the purchase, which gave him a cashback for the
purchase. He moved his bed, and ended up netting 200 rupees profit, funded by
blitzscaling VCs.
Analogue competitors find it hard to compete with Blitzscaling. Without
access to the kind of deep and cheap capital that internet startups get, these
analogue competitors tend to fall behind. This increases our dependence on these
big platforms and accelerates The Third Crisis. Only those who are playing a
well-capitalized blitzscaling strategy can compete, but network effects make
even this competition hard to sustain. The result in the long run, one way or
another, is concentration.
Once demand concentrates on their infrastructure, these aggregators have a
much larger role to play than simply connecting a buyer and a seller. They have
a thumb on the scales. They can redirect traffic to their preferred sellers, extract
fees or even compete with independent sellers. They own critical data such as
user purchases across all sellers, which is not available to any individual seller
on the marketplace. Moreover, even when consumers don’t purchase, only the
aggregator knows what people are searching for and clicking on. Aggregators,
hence, know consumer interest and trends better than any seller.
Information about what sells is incredibly valuable. Independent sellers invest
what little capital they have in experiments with new products and positioning to
learn about consumer demand. Aggregators get this knowledge off of the sellers’
backs for free. This can be problematic since some aggregators have in-house
brands that compete with their own sellers for user demand.
If you think you’re simply a consumer and are not going to be affected by
aggregation, think again.
The move to e-commerce has been accelerated. The supply chain of products
was already being rewired. The massive opportunity now is in the supply chain
of labour.
Your income is either the result of selling goods directly in a market or
indirectly as an employee, selling your labour as a service. Somewhere upstream
or downstream of you in the supply chain is a tech company planning to
aggregate the market. Unless you earn your income purely from capital such as
being a landlord, or an investor, aggregation will eventually affect you. It has
already happened to cab drivers and delivery riders. There is no reason why
aggregation can’t happen to accountants, brokers, consultants, doctors and
engineers too.
For that much power over the fate of so many businesses and employees, there
is hardly any oversight or rules that require aggregators to compete fairly.
EVITABLE
When asked about the disruption Amazon caused to the books and publishing
industry, CEO Jeff Bezos has an oft-repeated quote, ‘Amazon did not happen to
the book business. The future happened to the book business.’
Many, like Bezos, do not believe that The Third Crisis is a man-made
problem. They claim that the changes to individual lives and entire industries are
due to more powerful, mysterious forces outside of themselves. Jeff Bezos
blames ‘the future’ for the plight of publishers today. He claims that Amazon is
merely the messenger of an inevitable disruption.
According to this world view shared by some in the industry, the future is
what it is. Its consequences on people’s lives and livelihoods are unfortunate in
the same manner that being in a tornado’s path is. Stand in their way, and they
will imply you simply do not understand the future nor their role in it. Internet
companies claim that the rewiring of every business, not just books, is
inevitable. They are merely trying to deliver the future the way they do
everything else—guaranteed one-day delivery and free shipping.
To their credit, they aren’t entirely wrong. Most people would agree that
calling a taxi by wandering on the streets and waving your hand is a lot more
unpleasant and uncertain than ordering a taxi from an app.
The catch is that this does not make an Uber or an Amazon inevitable. In the
long run, most things will get digitized. But the way they get digitized is not an
immutable law of physics. The current set of aggregators are simply a model
amongst many others. Usually, they end up becoming the model because they
are the blitzscaling-friendly model.
Founders, VCs, tech employees and other beneficiaries of the Slippery Slopes
of Scale want you to believe that ‘the future’ is an inevitable force of progress.
They want you to believe what they’re doing is innovative. Therefore, the
business practices that go along with the innovation must be justified. Businesses
today use questionable practices to get more users and then use the growing
number of users to justify their practices.
If you want to find an honest admission from the internet startups of what they
are really up to, you’ll find it in surprising places. Uber’s former CEO and
founder, Travis Kalanick, speaking at a conference in 2014, before the public
mood turned on Uber, said ‘We’re in a political campaign, and the candidate is
Uber and the opponent is an asshole named Taxi.’ Opponents would disagree on
who the asshole is but would agree that the structure of our economy is a public
affair.
This is about politics and power, as much as it is about innovation and
technology.
In the early years of information technologies, decisions and compromises
were made in designing the internet. There was a vacuum in the centre of the
internet, which we overcame with the original sin of choosing advertising. It is
now being compounded by aggregation. We are where we are then, not because
of the future, but because of the past.
Even though it does feel like we’re headed towards a winner-take-all future,
powered by a jet engine with afterburners on, there’s still reason to hope. The
point of this chapter is to convince you that the future isn’t inevitable; it is an
extrapolation of design choices we made in the past. As a society, we’ve faced
similar big questions of how to design society, and often, we’ve come out ahead
with ideas such as liberal democracy, human rights and peace winning in the
long run. There’s no particular reason to believe we can’t do the same again.
Therefore, it is not the future that happened to the books business, but merely
a future, favourable to some tech companies. The next two chapters describe two
alternative models for a future that do not slide us up the Slippery Slopes of
Scale. We want to describe the alternatives for our future, because we cannot
predict it. The choice of what future we get is still open and depends on how we
act as a collective.
To know the future, it is wise to look at the past. History has repeatedly shown
us that this particular future where a handful of people hold all the power is, in
fact, very evitable.
14
CRYPTOMANIA
DESIGNED-IN DANGERS
The enduring narrative around technology, especially touted by those who build
it, is that it is a tool, neither good nor bad in itself. They claim that the toxic
patterns in our relationship with technology are problems arising from how
people use these tools.
Before 1965, this was precisely the argument around fatal automobile
accidents. The American automobile industry was very similar to the tech
industry of today. It had consolidated into 3 companies. Over 93 per cent of the
cars sold in America and 48 per cent of those sold worldwide were American,
majorly sold by these three companies. The number of fatal accidents had been
rising every year. Many in the industry argued that it is not the cars, it is the
drivers. The industry narrative was that the drivers should be driving under the
speed limits or paying more attention while on the road.
In 1965, consumer advocate Ralph Nader wrote a book called Unsafe at Any
Speed: The Designed-In Dangers of the American Automobile. The title itself
gives away the key argument—It wasn’t the drivers, it was the design of the car
itself. Chasing ever cheaper and more fuel-efficient cars, the automobile
manufacturers were prioritizing costs over safety. The specific examples in the
book are still challenged by some experts. However, few doubt the results of the
conversations that followed. In a 2015 article in The New York Times, a reporter
summarized the changes fifty years after the book was published.
A host of new safety requirements led—often after stiff opposition—to new technologies such
as airbags, anti-lock brakes, electronic stability control and, recently, rear-view cameras and
automatic braking.
Indeed, the death rate has dropped strikingly. In 1965, there were about five deaths for every
100 million miles travelled according to the traffic safety agency. In 2014, the most recent year
available, there was one death for every 100 million miles.
We believe it is time for a similar conversation in technology. Yes, when
someone posts graphic or violent messages on social media, it is not Facebook or
Mark Zuckerberg who got them to do so. However, the fact that millions of
people feel addicted to their phones or social media is not because we are using
the tools wrong. In fact, this is the outcome of these tools doing exactly what
they were designed to do.
There is no denying that these platforms are tools. However, that doesn’t
absolve internet startups of responsibility from the consequences of the
platform’s usage. Every little design detail they choose has a ripple effect on our
lives as consumers and businesses. How they configure our software determines
how we spend our time, money and attention online. Just a few tweaks can make
lasting changes in the moods and lives of billions of people, affecting our lives
and livelihoods in profound ways. In short, the design of these tools is the design
of our individual and collective future. As long as we can change the design of
these tools, no one future is inevitable.
The question then becomes—how can we design our technology to serve all
of us rather than serve its makers?
KNIFE TO A GUNFIGHT
Regulations are an oft mentioned solution to make technology serve us all.
It is a widely accepted position that these companies need to be regulated. In
fact, the biggest of ‘Big Tech’ actually welcome regulation. The debate comes
down to the finer points of how these companies should be regulated.
Aggregators find lacunae in existing regulations. Uber, Lyft or Ola may fight
amongst each other for a market share of ride-sharing, but they are all competing
against existing taxicab operators, public transport and car ownership. By using
elaborate but legal arrangements, aggregators manage to shirk responsibilities
traditional employers and service providers have to bear. Moreover, they claim
this is progress and, thus, inevitable.
When the pandemic hit, Uber and Lyft contractors in the US weren’t eligible
for unemployment insurance, because Uber and Lyft hadn’t paid those taxes
claiming drivers were contractors. Studies have now shown that rather than
decrease car ownership, ride-sharing apps increase congestion in cities.
Similarly, AirBnBs and other short-term rentals can drive up rents in zoned
areas. They make local housing unaffordable in tourist destinations, while
simultaneously taking away tax revenues from local governments.
On their mission to blitzscale, some even go a step further into potential
malpractice. The US-based food delivery aggregator GrubHub set up as many as
23,000 misleading websites for restaurants on its platform without the consent of
the restaurant owners. They optimized these websites to be the top hits on search
engines, sabotaging the restaurant’s own web presence. However, this fake
website had GrubHub’s phone number instead of the restaurant’s. Customers
believe they are placing an order directly at their local restaurants. Whereas, they
were actually placing it on an automated line set up by the aggregators. The
restaurants still got charged commissions on these orders.
Governments try to bring into effect newer legislations to level the playing field
but can be often outgunned by the aggregators. Aggregators are able to finance
both legal challenges as well as policy advocacy efforts. In California, Uber, Lyft
and Doordash came together and spent US$205 million to campaign for a ballot
initiative called Prop-22, wielding more than 10x the funding of the campaign
against Prop-22.
Prop-22 allowed these particular aggregators to seek exemption from a law
that required them to classify their delivery and transportation agents as
employees. Instead, they created a new category of employment called the
contract gig worker. Contract gig workers are not afforded the same protections
as full-time employees.
Of course, many gig workers and platform sellers are happy with the way
things are right now. When the tide is rising, it lifts all boats. The problems start
on the downturn when the low prices and high commissions do not leave enough
on the table. During the pandemic lockdowns, food delivery apps became the
primary source of orders for struggling restaurants. Without walk-in customers,
the price of commissions on the delivery orders pinched already struggling
restaurants.
Tech companies like regulations once they are big, because they impose
disproportionately larger costs on those smaller than them. Moderation of
content, for example, takes human reviewers or massive investment in AI
systems. Both of these investments see efficiencies of scale. AI systems, further,
get better with more data. Regulations that are not designed to be progressive
and proportional have the counter-intended effect of reducing competition from
smaller platforms. Thereby, increasing concentration and aggravating The Third
Crisis.
Instead of a reactive approach to the excesses of the technology industry, we
can orient policy towards proactive measures. Internet startups adapt and
respond to changes in the regulatory landscape by updating their software and
their business model. Regulators are slow by design, whereas startups move with
blitz. While the legal challenge is being disputed, analogue markets continue
being eroded, and the aggregators continue to accrue network effects. Purely
legal instruments will always be a step or two behind tech companies. If we want
our information infrastructure to serve our goals, we need a bigger say in its
design.
A few internet startups are building the core information infrastructure and
networks of our digital future. Hence, they have control over critical questions
about our collective well-being, such as: How is the value generated on these
platforms distributed? Who decides the pricing and the rules? What agency do
users have in voicing their complaints, or exiting the platform? Who has the
ultimate say in matters under dispute? Are we fine with a group of privately
controlled entities taking these decisions for us?
If we want to take back control, we can’t bring a knife to a gunfight. We need
to bring technology to bear on this problem created by technology. Instead of
trying to check power with just regulation, the answer is to build the digital
infrastructure we desire, in the manner we desire. We can re-architect the
infrastructure so that we can transact digitally, without centralizing market power
to a handful of entities. Instead of weakly enforced laws, we can then embed the
rules we desire in the code of these platforms itself.
Starting in 2009, two different ideas took root in two different parts of the
world. They both put individual sovereignty at the heart of their mission to build
technology for society. In the rest of this chapter, we deal with the first of those
ideas—Cryptocurrencies and the decentralized web.
Although a full and detailed discussion of these topics would need a book of its
own, we want to summarize the key arguments in a manner that readers
unfamiliar with cryptocurrencies can follow. Thus, we will be generalizing in
some places, and we encourage our readers to do their own research to dive
deeper. We recommend the essay ‘On Collusion’ by Vitalik Butalin, the founder
of the world’s second-largest cryptocurrency, Ethereum. Also, none of what
follows is investment advice.
First of all, Web 3.0 is a decentralized technology where, in theory, anyone
can participate in the consensus building. In practice, it often becomes a
plutocracy. Often, validating or verifying the public ledger is done by specialized
entities that we will call ‘miners’ for ease of discussion. All these miners spend
computational energy, or stake capital, towards building consensus on the
blockchain, and some are rewarded for the work they do. Moreover, the way the
incentives work, bigger miners often have a better chance of winning that
reward. Becoming a miner is not yet so easy that any one of us can do it. It may
require specialized equipment, and definitely requires specialized skills. This
often leads to outcomes where a majority of the miners are just a small group of
people who have power over what is recorded (or not) on the blockchain. Other
individuals such as founders of cryptocurrencies, by virtue of their holdings and
influence in the community, have a large say in what happens on the blockchain
too.
This brings us to the second, even more worrying problem of collusion. The
decentralized web depends on the decentralized actors not being able to
coordinate easily. If enough of them could coordinate, they could rewrite the
blockchain to benefit themselves at the cost of others. As long as malicious
collusion is hard, it makes the ‘right’ outcome the easiest one to coordinate.
However, in practice, since there may be only a handful of actors, collusion may
not be that hard.
Anonymity—one of the key weaknesses due to which collusion is hard to
defeat on the decentralized internet—is a feature that the Web 3.0 often touts as a
strength. Anyone can create an account on the blockchain, without revealing
who they are. This also means that anyone can create many accounts on the
blockchain. The design of the decentralized system will then determine the kind
of collusion that can subvert it. If you give each account one vote, then you
incentivize the creation of many sock puppet accounts to get extra votes. If you
make each vote cost money, then you create a system that again favours the
interest of the wealthy over that of the masses, leading to a plutocracy. This is a
trade-off that even Butalin admits is going to be hard to solve in an identity-free
environment.
In the real world, we already have a centralized answer to the problem. Think
about secret ballot elections in a democracy to solve a similar problem. You want
to guarantee every citizen a vote, and to protect democracy, you need to ensure
no one gets more than one vote. The answer is in the voter ID card issued by the
centralized, sovereign government. The voting list in most countries is also a
public ledger albeit a centralized one. Everyone is guaranteed a vote, and only
one vote. Moreover, the votes are counted, while keeping the voting preferences
of each voter secret. If their privacy is not protected, they may be subjected to
coercion by those in power.
It is interesting how some simple problems in the centralized world become
complex problems in the decentralized world, and vice versa.
Just as we blitzscaled our way into the centralized and monopolized internet,
there is a feverish, almost cult-like reverence for decentralization that’s gripping
the tech world now. If connecting the world was the rallying cry of the
centralized web, freedom from regulators/governments seems to be the rallying
cry of the decentralized web. There’s no doubt in our minds that decentralization
offers advantages and protections that the centralized web simply cannot offer.
However, the converse is true as well. The decentralized web leaves us
vulnerable in ways that the centralized web didn’t.
If, heaven forbid, your house gets burned down or flooded and you lose all
your documents, you will still be able to go to your bank, prove who you are and
get your money. If the bank itself tries to steal your money or goes under, federal
insurance on deposits protects citizens from losing all their money. The trust-no-
one feature of cryptocurrencies means that if you lose a password, no one can
help recover that money. It is estimated that at least 2.56 million coins, i.e., more
than US$ 100 billion worth of bitcoins are lost due to forgotten passwords or
keys. This isn’t just about bitcoins; it happens across all decentralized
cryptocurrencies.
The other trade-off is that preventing centralized control means we can’t use
centralized regulations to prevent things we would not want as a society.
Cryptocurrency is disrupting the criminal economy, the way the internet
disrupted the regular economy. It is leading to increased sophistication and
specialization of the criminal supply chain. As one anonymous researcher said in
a ZDnet article. ‘The centralization of fraudulent activity in a handful of markets
mirrors similar economic and commercial patterns in real-world financial
markets. This phenomenon may seem like a ripe opportunity for law
enforcement agencies to effectively shut down a sizable portion of cybercriminal
activity; however, as we’ve seen in the past with the shutting down of markets
like Alphabay, Hansa, and Silk Road, threat actors quickly migrate their
activities to other markets.’
Decentralization is not a silver bullet, and centralization is not always a
problem. So how do we design a system that is not under the control of a few
players, while also being able to use the law to protect the vulnerable?
To answer this, we need to go back to the other idea that started in 2009,
halfway across the world in India.
15
INDIA’S STACKS
IDENTITY CRISIS
The New Yorker’s most reproduced cartoon ever is from July 1993. Two dogs are
in front of a computer—one sitting atop a swivel chair, with one paw on the
keyboard. The dog using the computer is talking to the other dog, seated on the
floor, listening intently. ‘On the internet, nobody knows you’re a dog’, reads the
caption.
The cartoon is obviously facetious, but like every great political cartoon, this
too managed to put a finger on the heart of the issue in a single panel. Being
online was synonymous with being anonymous. The internet connected you with
anyone, anywhere in the globe, but no one had any way of knowing who was
behind the keyboard.
But this feature of the internet was not very compatible with the business
model that eventually powered it. Advertisers needed to know if you are indeed
a dog, or a dog parent, or just hate dogs, so that they could sell things to you
accordingly. How do they figure this out?
This is the problem of identity. Every individual website or app, for the
purposes of analysing traffic, or storing data about you, or transacting with you,
or displaying a personalized advertisement, needs to identify if you have visited
before. It is a much more involved problem than it appears. Even today, one
can’t always be entirely certain that on the other end of the line, one is
transacting with a human. Although today the offender is more likely to be a bot
than a dog.
India in 2009 was also facing a crisis of identity.
A significant portion of its residents lacked formal, individual identity
credentials that were universally accepted. Take Rajni, a vegetable seller from
rural Maharashtra. Rajni had a voter ID, and was also listed on the family’s
ration card, though it didn’t have her picture on it. But for purposes such as
opening a bank account, the voter ID alone is not considered enough, and the
ration card identifies a family, not an individual. Rajni was invisible to the
system, for no particular fault of hers. When in need, she couldn’t borrow at
reasonable rates from banks and had to turn to informal money lenders. As an
unfortunate consequence, people like Rajni, who needed money the most, had to
take the most expensive loans.
On the flip side, the government too could not be sure if all the people on its
beneficiary lists were real people who existed or were simply forged entries to
siphon resources from the state’s welfare budget. The government of India in
2005 estimated that 58 per cent of subsidized foodgrains and 38 per cent of
subsidized kerosene disbursed under various government programmes did not
reach their intended beneficiaries. Billions of dollars of welfare money from a
developing nation were lost to unscrupulous middlemen instead of helping the
poor.
On the internet, advertising giants, especially Google and Facebook, set out to
solve the identity problem.
Google gave away free email accounts, and Facebook made you create your
own profile for free to connect with your friends. This incentivized people to tell
them who they were. They invented ‘login with Google’ and ‘login with
Facebook’, doing away with the need to remember multiple logins and
passwords. They even contributed money and effort to open source projects in
the space of identity management such as OAuth. These made it possible and
convenient to use your Google or Facebook identity on other websites, making it
more likely that you would use them as your identity credentials across the web.
This also allowed services to integrate better, such that various apps could share
your data between themselves. Your social media app, for example, may add
birthday reminders to your personal calendar because of a shared identity—your
email.
Just as highways, bridges and ports are physical infrastructures, components
such as identity or payments are digital infrastructure. They are essential to a
smooth internet experience, as roads and railways are to a country’s people. Like
infrastructure, these systems are complex to build in a safe and secure manner
and require specialized talent. They require large investments upfront but also
offer economies of scale.
Investing in identity infrastructure on the internet was not just necessary but
also lucrative. By building this critical touchpoint that affected every website, ad
networks were able to track your activities across the whole web, not just their
own products. This allowed them to offer better targeted advertising than anyone
else, and led to their dominance in the online advertising market. Advertisers
were willing to pay hand over fist for the data these companies had. In 2019, at
about US$ 333 billion, the total global spending on digital ads exceeded that of
ads in the physical world.
But in India, no private player found it lucrative to solve Rajni’s problem.
The US advertising market, online and offline put together, is worth US$ 240
billion. The same number for India is only US$ 8.5 billion, despite having
roughly four times as many people. Although Rajni would benefit as much as
anyone from the internet and a digital footprint, advertising revenues were just
not incentive enough for private players to take Rajni digital.
This is a classic example of what economists call a market failure. India in
2009 realized that to bring the kind of prosperity, progress and convenience that
the internet promised, it needed to take digital to everyone, not just the rich.
In the West, private players were willing to invest because of the size of the
market, and because they could see people conducting commerce online. In
India, even if they could somehow get it to her, people found it hard to imagine
what Rajni would do with the internet.
The reality is, tragically, the opposite. In the West, the internet made a lot of
new things possible, but it mostly made old things more convenient. To Rajni,
the internet brought a world of opportunities she had never experienced before.
The internet didn’t care if Rajni was illiterate. It could bring her videos of things
she’d never seen and help her learn skills she never knew before. She could get
welfare benefits digitally, saving her time, money and peace of mind. Rajni
could even get a loan, start a business and lift herself out of poverty. The
difference that the internet can make to Rajni’s life is much more meaningful to
her than simply bringing her convenience. Yet, in the advertising model, she gets
left behind.
India decided that it was going to have to build its own digital infrastructure.
And, crucially, India would build this digital infrastructure as a public good.
PUBLIC GOODS
Economists define public goods as non-rivalrous and non-excludable.
To understand what public goods are, think of the humble street light which,
once installed, gives light to everyone equally on the street. Short of destroying
the street light, no one can block another person from using it, i.e., street lights
are non-excludable. Nor does one person’s use of the street light affect the use by
another. The same light is shared by all, making street lights non-rivalrous.
We all derive benefit from the street light, but someone has to pay for it. The
simple and fair thing to do is that since it benefits all of us, it should be paid for
by all of us. This is why governments fund the creation of many public goods
with the taxpayer’s money. It is not just street lights; public parks, open
highways, the public health system, and the public education system are funded
with public money. Remember, a public good is not defined by who funds it, but
by who can use it. Andrew Carnegie, steel baron from the 1800s and
philanthropist, funded the creation of almost 1700 public libraries across the
United States. They remain non-excludable and for all practical purposes, non-
rivalrous, and so are public goods funded by private capital.
Essential services such as identity, payments and data exchange are critical
touchpoints of the internet that all of us need. By allowing these critical
touchpoints to be entirely under private control, we give up a lot of power over
our digital lives to the companies that build and run this infrastructure.
One simple fallout of letting this infrastructure be private is that they often
build it to capture network effects. Network effects are the positive externalities
that come from creating a network, because the value of the interconnected
whole is more than the sum of its parts. Take the example of WhatsApp versus
email. You can send an email from your Gmail account to someone else’s
Hotmail account. But WhatsApp restricts you from sending messages only to
other WhatsApp users. The problem here isn’t technical capability, it is a
business decision by WhatsApp to capture network effects. Thus, what could be
a public good becomes an exclusive club.
In India, the critical digital infrastructure for identity was built by the
government instead.
Aadhaar is a digital identity system which has issued a unique identity to more
than 1.25 billion residents of India. Residents can authenticate their identity with
their own biometrics or by using an OTP, allowing them to prove they are who
they claim to be. It is used to solve the problem of identity in many different
contexts. But, since Aadhaar is funded by the Indian Government and not
designed for targeted advertising, it is designed to collect as little data about you
as possible. The logs of authentication, i.e., where you used your Aadhaar, are
designed to protect the privacy of citizens from the UIDAI itself. Moreover, the
logs are required by law to be deleted after a certain period.
With the ability to prove their identity at the fingertips of every resident,
millions of Indians were no longer invisible to the system.
Between 2011 and 2017, more than half a billion people in India opened a
bank account. Simply opening an account may not sound like a big deal.
However, for many like Rajni, who had been excluded from the formal financial
system, it was their first ever bank account.
These bank accounts then powered the country’s move to Direct Benefits
Transfer. Corruption in the public welfare delivery system has been a problem
hounding India for decades. In 1985, the then prime minister publicly announced
that of every rupee spent by the government, only 15 paise reaches the needy.
Welfare delivery systems were elaborate. There were many layers and
middlemen in the supply chain. Each had discretionary power, and therefore,
there was a lot of leakage. With Direct Benefits Transfer, instead of elaborate
systems, money could be sent directly into the accounts of those who need it.
With a unique identity, the government could also have more confidence in the
legitimacy of the beneficiary lists that they maintained.
Of course, Aadhaar is no magic pill. It can’t prevent all forms of fraud, nor
can it plug every leakage. But it does make it easier, cheaper and faster to prove
that you are truly you and make a claim on your benefits while making it harder
for fraudsters to forge a claim on the benefits that are yours. It reduces the power
that local tyrants and black marketers have over residents, since the subsidy is
not going through a middleman.
Aadhaar was the backbone needed to digitize and modernize government
welfare delivery experience. A simple example is benefits portability. Earlier, to
prevent double-dipping, residents could only purchase ration from the ration
shop they were assigned to. With Aadhaar, local governments can track in real-
time the subsidy consumed against each account. Since the people’s identity was
simply a number and their own biometrics, they could authenticate anywhere. So
some state governments have done away with the assignment system completely.
They allow any citizen to take their ration from any shop, as long as they use
Aadhaar to prove who they are and not double-dip. This is extremely useful in a
country of more than 400 million internal immigrant workers, who travel from
their villages to other districts for seasonal employment. The ration shops which
used to be mini-monopolies because of the assignment system now faced the
heat of competition. Many ration shops started offering home-delivery and other
services to attract eligible residents.
There are other advantages to having your own digital public good for
identity. In April 2020, the government was able to transfer relief payments to
more than 200 million women within a few days because this digital financial
infrastructure existed. Aadhaar was also crucial to the rapid rollout of the
vaccine program.
However, Digital Public Goods don’t always have to look like Aadhaar did.
Remember they are public goods because of how they are used, not because of
who funds them. One simple example would be Wikipedia. Wikipedia is non-
rivalrous and non-excludable. It is not, however, built by a government or any
public entity. Wikipedia is run by the not-for-profit Wikimedia Foundation,
which in turn gets its money from donations, and also the in-kind efforts of its
volunteers and community.
Aadhaar was only the first in a long line of digital infrastructure that India
invested in. Once Aadhaar’s versatility was understood, India started building
layer upon layer of digital infrastructure in other critical areas such as payments
and data exchange. The collection of these layers came to be known as the India
Stack.
The digital public goods approach has proven itself worthwhile.
As of today, more than US$ 240 billion of subsidies have been transferred
directly from the coffers of the government to the intended beneficiaries. This
money is leading to an increase in the use of bank accounts. The Bank of
International Settlements, the central bank of central banks, in a paper published
in 2019, said that the outcomes that India achieved in financial inclusion with
digital infrastructure in seven years, would have taken nearly half a century by
traditional growth processes.
It was not long before many started wondering if the effect that digital public
goods had on financial inclusion, could be repeated in other critical development
areas such as improving healthcare access or education outcomes.
Even before digital, we have required interoperability from our other network
infrastructure. Telecom services do not require both users to be on the same
network, you can call any number irrespective of who their provider is. Telecom
companies are also required to provide mobile number portability. That is,
TelCos must provide a mechanism to change providers without the user facing
the inconvenience of changing their phone number. We should be demanding the
same from modern digital infrastructure.
Protocol-driven interoperability is probably our most effective tool against
concentration. Remember, there is nothing technically stopping these platforms
from being open: it is a careful business decision to not do so. Instead of
regulating their behaviour, which is often hard, countries can think of a
combination of a digital public good such as a protocol, and a law which
compels internet platforms to be interoperable to the protocol.
There is now an effort to apply these principles to the markets where
aggregators operate. Beckn is a not-for-profit organization building an open
protocol for distributed commerce. Beckn aims to create interoperable networks
of sellers, starting with the domain of ride-sharing and final-mile delivery. It
creates a shared infrastructure whereby each of the sellers can come to the
network directly, through their preferred service provider. However, once on the
network, these sellers are interoperable. This means that a cab on the Beckn
network is available through any ride-sharing app on the Beckn network. This
means drivers and users have portability, the way our mobile numbers are
portable.
Protocols do not kill platforms, they simply change what they do and how they
compete. Protocols make platforms amenable to competitive pressures. In the
blitzscaling models, competitors would have to reinvent the wheel. They would
have to make their own competing network, and spend on acquiring users to
make the network viable. Via interoperability, protocols make it easy for anyone
to build alternatives to part or whole of the dominant platforms.
Interoperability dramatically reduces the cost of switching services. Your data
is not lost to a walled garden when you leave. Individual sellers are independent
and have a choice between the platforms that are aggregating demand. The
aggregator platforms will not cease to exist. However, the strategic playing field
changes considerably.
Without lock-ins to protect their network, a blitzscaling strategy only makes it
easier for the next competitor to poach your customers once you’ve spent money
on acquiring them. The network effects accrue at the network level, rather than
with any one player. Users can select providers that suit their own privacy levels
and feature requirements. This forces innovation and competition to focus on
what users want rather than use large amounts of capital to buy the loyalty of
users and suffocate competitors.
Today, the private provision of digital infrastructure has led us to outcomes
where even what truly belongs to us is being captured by internet startups.
For example, the data around traffic and congestion in a city. Uber and Google
Maps have better information about things like how transportation is affected by
weather patterns. This data could help us understand and build better physical
infrastructure to decongest cities. However, scientists do not often get access to
this data, and even when they do, it is costly or comes with strings attached.
Even though this data is generated by the public, it is not a public good.
Interoperable protocols solve many problems with the current blitzscaling
approach, but not all of them. Private platforms will continue to provide major
services due to the size of their investments, the speed of their execution and
their innovation. However, their current business model requires controlling
access over the generated data.
We must remember that even if it is their network, it is still our data.
Digital Public Goods, thus, offer a public-policy solution that is much more
effective than regulations for a simple reason: it is proactive rather than reactive.
Regulations try to coerce companies into following both the letter and spirit of
the law, through the use of penalties, punishments and permissions. However, in
Digital Public Goods, the code is the law. User rights can be enshrined in the
architecture of the underlying design itself. Privacy and anti-trust rules can be
embedded into the design. For example, no private operator on UPI can block
payments to a specific competitor. If they do, they risk losing their access to the
network. Of course, we will still need supporting laws and policies, but they
have a much better chance of being implemented well if there’s an underlying
DPG.
Digital Public Goods also make our collective data generated by the
underlying digital infrastructure into a public good. The anonymized insights
from our behaviour as a collective will be available to citizens, scientists and
entrepreneurs alike. We can channel this data into research and development,
better governance, or to make services like insurance cheaper.
A lot of these goals are shared by the decentralized web. A public blockchain
is non-rivalrous and non-excludable by definition, and thus, a public good. We
do not believe that there is even a debate between centralized versus
decentralized technologies. They are both different philosophies of building
technologies, and each offers different trade-offs of advantages and
disadvantages.
While a centralized system and its creators have tremendous power, they can
be held accountable with the force of law. A decentralized system has no leader
issuing orders, and instead depends on the infallibility of its code and economic
incentive structure to keep the system running as intended. Neither one is
‘better’. In fact, the best probable outcome for us as a society is two thriving
ecosystems. This gives users the choice between these two different systems.
The force of competition between them will nudge both to keep innovating and
improving.
If you believe that the reason for our current set of problems is because some
corporation is evil, you’d be wrong. The concept of good and evil is not
sufficient to describe the complex set of incentives and interactions that drive the
behaviour of platforms and people. Like we described with the SaySafe example
in Chapter 13, even with good intentions, companies can end up on the Slippery
Slopes of Scale.
Ultimately, this book is not anti-tech, it is pro-you.
Our essential argument here is that the digital infrastructure we create has
significant influence over our lives, and thus, is too important to be left only to
the private sector to control. The current model, blitzscaling, prizes the full and
complete capture of user time, attention and data above all else. They fund
building the underlying infrastructure as a winner-take-all to support this goal
and ‘escape competition’. The private sector brings innovation and choice to the
table, while the public sector brings stability and inclusion.
The real trick is achieving balance.
Governments, civil society and the private sector each play an important part
in our society. They each have their own strengths, weaknesses and blind spots.
Letting any one of them have absolute control over our technology is probably
not a good idea. We need to find a way to build Societal Platforms. That is,
where everyone in society plays their respective part in shaping our collective
technology, and hence, shaping our collective future.
Our proposal for the future is not very radical. In 2005, Stanford held a big
event to commemorate the birth of the internet. They revealed a plaque
acknowledging not one creator, but about thirty people working in different
teams at different universities. The plaque acknowledges that even that list of
thirty is incomplete. It says, ‘Ultimately, thousands if not tens to hundreds of
thousands have contributed their expertise to the evolution of the internet’.
This is a heartening representation of what the internet was supposed to be.
The internet was supposed to be a way for curious humans to share knowledge
with each other, even if they are oceans apart. The point was that ideas are non-
rivalrous. As George Bernard Shaw had said, ‘if you have an idea and I have an
idea and we exchange these ideas, then each of us will have two ideas.’
The internet, our social networks, and our marketplaces are too important to
be controlled by anyone. They should belong, simultaneously, to all of us, and to
none of us.
Now is the time we architect that future.
APPENDIX
MANAGING TIME
The single biggest problem with our smartphones is how much time we lose to
them. The tools below can help change the way we use our devices. Chapters 5
(How to Think Clearly) and 6 (What to Think About) provide more detail on
how to spend our time on our devices better.
3. Time blocking
Google Calendar
Clockify
Skedpal
Plan
Hourstack
TogglTrack
Calendly
Even though time is more valuable than money, people pinch pennies but waste
hours. Create a time budget so that you have access to high-level awareness of
where your time should be going. A detailed description is given in Chapter 6
(What to Think About), under the heading Using Time. This table is available
digitally on bitfulness.com/time.
MANAGING ATTENTION
Technological conveniences come with massive flows of information. Get free
from information overload by being smart about where your attention goes.
Since you have finite mindspace, occupy it with tasks that matter to you. Given
below are some tools for dividing your attention in a savvy way.
The noisier your environment, the less likely you are to focus. Using new user
accounts allows you to create different virtual environments for different kinds
of focus. Chapters 7-10 describe in detail how to create three personalities to get
into three modes of attention.
It is easier to make a new user account sparse and clean than to make your
current user account less distracting. Here are the steps to create a new user on
your device.
Web browsers are rife with distractions that encourage mindless scrolling. Block
these distractions during specific periods of time, or even permanently. Here is a
list of browser-based website blockers.
StayFocusd (Chrome)
LeechBlock (Chrome, Firefox, Opera, Brave, Vivaldi, Edge) – Browser
extension
Limit (Chrome)
WasteNoTime (Safari, Chrome)
Pause (Chrome)
Remove distracting apps from your home screen to help yourself get to the work
that really matters. Here are some launchers for Android phones that are meant
to increase productivity and make it easier for you to focus.
Email addresses are one of the most requested pieces of information online. You
might be filling a form or surfing websites that force you to sign up to gain
access to their content. Sharing your actual email address might lead to a flood
of unwanted promotional emails. Here’s where temporary email addresses come
in useful. Since they expire within a set period of time, they make for secure
anonymous correspondence and file transfers as well. Here are some websites
that provide temporary email service:
https://tempmail.dev/
https://10minutemail.com/
https://www.guerrillamail.com/
https://www.throwawaymail.com/en
https://temporarymail.com/
3. Virtual Number
Keep your personal phone number private by using a virtual number. It’s
common to have to verify an account login or signup by using your phone
number. Giving out your actual phone number might lead to spam or make you
vulnerable to security leaks.
Doosra
Receive SMSes—to receive one-time SMSes
Using an encrypted email service protects you against snooping. Here are some
secure email services with whom you can create an account.
Google: 8.8.8.8
Quad9: 9.9.9.9
OpenDNS Home: 208.67.222.222
Cloudflare: 1.1.1.1
CleanBrowsing: 185.228.168.9
Alternate DNS: 76.76.19.19
AdGuard DNS: 94.140.14.14
6. Anti-Malwares
Malwares are all kinds of malicious software, including viruses. Malware attacks
often hold your computer hostage and steal your passwords and usernames.
Anti-malwares protect your device from phishing, ransomware and key-logging.
See below for some well-known anti-malwares.
Malware Bytes
Avast
Comodo
AVG
Spybot
Use a VPN
Use a secure browser, like Tor
Pay anonymously and securely (cash, cryptocurrency)
Delete your search history and Google activity regularly
Switch to a secure messaging platform like Signal or Jitsi.
1 In an interview at a bitcoin conference in 2021, Twitter CEO Jack Dorsey said
that he believes bitcoin will bring world peace. His argument is detailed at
bitfulness.com/worldpeace.
ACKNOWLEDGEMENTS
The book cover says this book is by Nandan Nilekani and Tanuj Bhojwani.
However, we consider that to be an oversimplification. This book is built on
inputs and ideas from many people, and we are grateful to each and every one of
them.
First of all, we’d like to thank Arun Mohan Sukumar, Matt Sheehan, NS
Ramnath, Onaiza Drabu, Rahul Matthan, Ramachandra Guha, Rob Fitzpatrick
and Samar Halarnkar, who offered words of encouragement and advice, drawing
from their own experience of writing books. If you like our words, you’ll love
theirs.
Brave souls like Kamya Chandra, Karthik Sivaram, Mandakini Chandra and
Priyanka Asera volunteered to be our test readers and suffered through the early
drafts so that you didn’t have to. We are very grateful to them.
Secondly, we’d like to thank the teams from iSpirt and EkStep for their
extraordinary patience. The volunteers and builders at these organizations make
the work you read about (in Part Three of the book) a reality. We’d like to thank
Karthik KS, Pramod Varma, Sanjay Jain, Shankar Maruwada, Sharad Sharma,
Siddharth Shetty, Sudhanshu Shekhar and Vivek Raghavan for their support. A
special mention to Sanjay Purohit of Societal Platforms and Viraj Tyagi of eGov
Foundation for always being available to answer our questions.
What we wrote wouldn’t be so slick without our in-house and Penguin India’s
design and editorial teams. Special thanks to Meru Gokhale, who called the first
draft of this manuscript incoherent (and rightly so). Along the way, we had
editorial guidance from Sandra Wendel, and a herculean effort from Ila Deep to
get every detail correct. We’d also like to thank Akangksha Sharma, Aparna
Abhijit, and Shreya Punj from Penguin for helping put polish on the book and its
cover. Most of the diagrams you see in the text are from Esha Singh and Nancy,
who have been very patient with our frequently changing requests.
It is not just what goes into the book, though. The most valuable contribution
came from those who have kept us calm and sane during the hardest parts of the
writing process, in an already hard pandemic year. Tanuj would like to thank his
friends Anna Rego, Deepender Singla, Hobbes, Meghana Reddyreddy, Mubeen
Masudi, Naman Pugalia, Nikhil Kumar, Prabhkiran Singh, Prajakta Kuwalekar,
Roshni Durai Rajan, Sahil Kini, Sambhunath Barik, Shalini Prasad, Srijoni Sen,
Susan Atai, and Vivek Nair for being available when he needed them. There is a
big list of people who have helped us in many little ways. We remain thankful to
all of them.
Both authors are grateful to their family for putting up with their obsession to
retreat and write. We can only hope they find this book worth the sacrifices they
made for us.
Finally, thank you, dear reader. We’ve been told reliably by many in the
publishing industry that no one reads acknowledgements anymore. So, if you’re
reading this sentence, know that we’re grateful to you for getting this far. We
hope it was worth your time. Find a little treat for yourself at
https://bitfulness.com/thankyou.
THE BEGINNING