In our system, everything is based on trust.
The first trust is on our part, that we introduce you, in world preview, our innovation, which is an alternative, to all other systems, political, economic, financial, communication, social, and even sports. If we do it, it is because we trust you, and we consider you people with an above-average intelligence, with the necessary qualities, to understand our enormous potential, if we are united, in this long, difficult, but important, path that together.
Not everyone understands how important it is to be able to join us in our initial stages, and how many enormous advantages and facilities those who join us first will have, if they prove they deserve them, compared to those who do so later.
Knowing our existence before others, and knowing that our common projects exist, is a great privilege, that to be exploited in the best world, must be continued, knowing our public information, in a complete way, to be able to understand our rules, our methodologies, and above all our motivations, for each of our decisions, which are never taken, in a banal way, but have motivations based on logic, common sense, and mutual respect, of all people.
The second trust, is always on our part, in showing you the reasons, for which we were born, our way of working all together, and our goals, which are presented to everyone, in various public information articles, in videos, audio, and other means of communication, generally, with a presence reserved for our platforms, free, independent, self-financed, organized, orderly, and secure. Our presence outside, and on traditional social media, is limited and symbolic. It only serves to demonstrate, that we are the first in the world, to do certain things, in the way we do them.
We let you know many things about us, but obviously, there are not all the details, which are reserved, only for those who will join us, certainly not to hide things, but because for any person, to understand if they want, or do not want to join us, the few sentences of our informative article, on our first page, of our official website are enough. In a few words, they summarize a lot of fundamental information, which will surely be understood, and appreciated, only by people suitable to join us, in our big house, and be part of our huge family.
The third trust is our visitors, who inform themselves fully, and then decide to join us, according to our rules, which at first glance, might seem excessively safe, and perhaps a little complicated. But at this point, we ask you a question. Would you entrust your destiny to strangers, would you like to work with complete strangers? Our security measures, and our rules to guarantee everyone, the protection of personal data, of their privacy settings, and the guarantee of anonymity, are fundamental measures, to identify, and guarantee the identity, of anyone who is part of our system.
Many people ask us why we ask in some of our forms for an image file, with your face, next to a copy of an identity document, with a photo to anyone who joins us (we only accept valid identity cards and passports, registered to the person who wants to join us), and many people are afraid of the use we could make of this image. First of all, the file you send us is encrypted, and made invisible, and inaccessible, to anyone, but it is used, according to very efficient security rules, by our computer systems, to certify, that in the subsequent verification phases, the data initially sent, are the same as the subsequent phases. Anyone who lies to us with the image file, will certainly have no future, in our system, always for a question of trust, and mutual respect. We invite you to read this short informative article, which explains some things, about these image files:
https://www.directdemocracys.org/law/rules/activity-rules/security-all-rules/file-image
The next stages of identity verification are only 2, but they make this process foolproof. A video call, recorded, encrypted, and verified by our computer systems, in which after some security measures, to verify the real presence of the person, our guest is asked to place near his face, in the video, the identity document with photo, previously sent, as an image file, in our forms. Our computer system, automatically, will give a response on the authenticity of the initial file, and of the video call. Obviously, from time to time, unexpectedly, our security groups, will verify, that the person who has entered our systems, is actually, the person of the image file, and of the video call, to prevent the use of other people, of personal profiles, of those who have joined us. In this way we avoid front men, and infiltrators.
Finally, the last security measure, regarding identity verification, consists in having the identified person meet, in person, live, with some of our official representatives, who will have to verify, confirm, and certify, the authenticity of the identity document, and its correspondence, with the person registered in our system.
Obviously, from the first image file, that we receive, we verify through a very efficient methodology, the authenticity, and the validity, of the identity document, that is sent to us. In fact, by sending it to us, the person who fills out the form, authorizes us, to verify the data, at any time, wherever it is necessary.
Already the first 2 steps, make a person, with verified and guaranteed identity, and only in certain cases, we also do the verification in person, but in the future, we will do this important check, to every person who will join us, or, who has done it previously.
At this point, many people will ask: why do you want to know me, and I don't know any of you? Let's answer right away, with another question. Would you let complete strangers into your home and stay with your family? If someone wants to join us, and work together with all of us, we need to know who they are, where they come from, what they've done, what they want to do, and if they really exist. Traditional social media is full of fake profiles, people with multiple profiles, and especially bots, which are computer systems, with fake profiles, that publish content, to cheat, and often to manipulate, public opinion. Our security measures are not excessive, nor are they senseless. Others, more suspicious, will tell us, that they don't feel like sharing, with our computer systems, their face, with their identity document nearby, clearly visible. Still others, who don't trust making video calls, with our computer systems. Let's answer the previous sentences, with two questions. Do you know that you are already sharing all your personal data with many private commercial companies? Do you know what they do with it? Others will tell us that they do not want to be identified in person, by our official representatives. Finally, the most suspicious, will tell us, that they do not know what activities we could do, with the files of your face, with your identity document nearby. With everything that is heard around, scams, and various illicit activities, you never know who to trust.
You are absolutely right, you should not trust anyone without first investigating the entity to which you send your personal data. Our security measures have been created with a lot of hard work, over a very long time, to effectively prevent any possible problem. These security rules of ours contain implementing rules that encrypt the data and prevent people of any kind from connecting the real data to the various people. In fact, all the checks are done by our computer system, and only the third phase is done in person, and only in certain cases. The people who work in our special security groups, and those who manage our computer systems, cannot decrypt the personal data, and cannot know who the person is, linked to the personal profile, whose identity they verify. We use encryption methods, and unconnected codes, and in various parts, that guarantee everyone anonymity, while verifying the identity of anyone who joins us.
People with a blue tick, next to their username (usually anonymous, and not identifiable), in our social area, are all real, reliable people, with verified and guaranteed identity.
But why, in some of our activities, do we want only identified people? To be able to reward the best, to be able to punish the worst, and to be able to know who is responsible for every possible problem.
In almost all civilized countries, where you vote, in the various elections, first of all, before you can vote, you are identified, and you do it, at least once, and often, in many countries, you are identified, every time, you go to the polls. Only those who have something to hide, or those who have bad intentions, can refuse identification.
But in our system, those who have the blue tick next to their username have many advantages and benefits, which are not limited to just being able to vote, in each of our decisions, based on very detailed and secure rules and methodologies.
Thanks to our website, for digital electronic signatures, according to detailed implementing rules, we consider legal, and binding, the signatures of our identified users, both internally and externally.
Having a digital identity, and digital signatures, for our higher-level user types, allows us to work in a faster, safer, more organized, tidier, more reliable, and more secure manner.
In addition to having a digital identity, and a digital signature, those who join us will have many potentials, and many activities, of all kinds to do, in total safety.
Of course, we start with our registered users, with verified and guaranteed identity.
Digital identity, with the ability to digitally sign all the documents you want internally, and 12 documents per year, also recognized externally.
Personal profile, with all the basic activities, including, we recall, participation in groups, pages, events, discussions, and many activities, reserved for this type of user.
A direct chat, to talk with other users, based on very detailed rules.
Encrypted and secure individual and group messaging service.
Notifications, in our system, via messages to your email address, and with a small payment, direct notifications are possible, on your smartphone, tablet, and PC.
Our official members, in addition to having all the potential, and access to all the activities, of our registered users, with verified and guaranteed identity, free of charge, and in an unlimited manner, also have other advantages.
The right to ownership, management, and control, shared with all our official members, of every activity in our system, according to very detailed implementing rules.
The possibility of choosing to carry out management activities of our system, or, alternatively, to run as our political representative, first in our primary elections, online, closed, and in case of good results, also to become our candidates in the real elections, representing us in the various institutions.
2 more personal profiles, the first institutional as an official representative, and the second to be used as an alternative to the previous one, as a political representative, with 2 personal email addresses (with the ending @directdemocracys.org), combined with the new personal profiles.
The possibility to invest, together with all our official members, in many economic, financial, social, multimedia and sporting activities.
A telephone number, available 24 hours a day, 7 days a week, for emergencies, and for direct contacts, to receive information, and support, in a practically immediate manner.
Access, according to specific rules, to all our websites, with many free services, or, at very affordable prices.
Access to private areas of our websites and our entire platform, such as the “community” area, and other more direct information, with many advantages and facilities.
The possibility of obtaining higher types of users, and with roles of greater importance, and of great responsibility, in our system, for free, with further advantages, and facilities.
For all types of users, from the first minute, our points are active, which are very important, to evaluate the concrete activities of each of our users, to create our inevitable hierarchies, meritocratic, based on equality, loyal and useful, to reward the best, but also, to punish the worst. But we will talk about the points, how they are obtained, and their enormous importance, at the right time.
We understood, reading this informative article, that mutual trust is the basis of our system, and that we can truly change and improve the world, working all together.
Add comment
a. To accept full responsibility for the comment that you submit.
b. To use this function only for lawful purposes.
c. Not to post defamatory, abusive, offensive, racist, sexist, threatening, vulgar, obscene, hateful or otherwise inappropriate comments, or to post comments which will constitute a criminal offense or give rise to civil liability.
d. Not to post or make available any material which is protected by copyright, trade mark or other proprietary right without the express permission of the owner of the copyright, trade mark or any other proprietary right.
e. To evaluate for yourself the accuracy of any opinion, advice or other content.