Summary of ‘Zero to One’, Chapter 8: Secrets
Summary:
Every valuable business is founded on a secret.
Today, most people don’t believe in secrets,
for many cultural reasons.
But secrets do exist:
each change in the world,
such as a financial bubble, a new mathematical proof, or a new big company,
reveals a secret.
There are many more secrets to be discovered,
but you will only discover them if you believe they exist,
and if you know where to look.
Look where others aren’t looking!
Everyone looks for secrets about nature;
try looking for secrets about people instead.
Everyone looks for secrets in the educational syllabus;
try looking outside that.
When you find a secret,
tell only who you need to -
and those people are a company.
A valuable business is founded on a secret:
something hard to do (but still doable).
The Pythagorean theorem is no longer a secret,
so it won’t give you an edge.
The world has secrets to give up;
discover them with contrarian thinking.
There are three kinds of truth:
easy, hard, and impossible.
Ted Kaczynski, the Unabomber, wrote a 35,000-word manifesto.
In it, he argued that people require hard goals in order to be happy,
but all goals left in the world are either easy or impossible.
Kaczynski wanted to fix this by destroying knowledge and technology.
He’s not so far from today’s hipsters,
with their vintage cameras and vinyl.
All fundamentalists think this way.
Religions:
there are easy Biblical truths and there are the impossible mysteries of God,
but in the middle lies only heresy.
Environmentalism:
protecting the environment is an easy truth,
but how Nature works is an impossible mystery.
Finance:
current stock values are easy,
but future stock values are an impossible mystery.
Why do we believe there are no hard secrets left?
One reason is geography: a world map today shows no remaining secrets.
Additionally, there are four social reasons:
- Incrementalism:
schools rewards learning the known facts,
not discovering new ones.
University measures success in publications and citations,
not in long-term impact.
- Risk aversion:
finding secrets is a lonely task.
- Complacency:
those with the free time to find secrets
don’t really need to:
their lives are comfortable.
- Flatness:
“if it were possible to discover something new,
wouldn’t someone ... have found it already?”
Evidence:
today, you can’t start a cult.
In the 1970s, you could (Communist Party, Hare Krishnas).
The world according to convention
If you believe there are no secrets,
then you believe there is no injustice,
and that financial bubbles are impossible.
Hewlett-Packard shows what happens when a company stops believing in secrets.
Through innovation in the 1990s, HP grew from $9B to $135B,
But in early 2000s,
HP’s board was conquered by a factions led by Patricia Dunn,
arguing that the board was not competent to identify new technologies,
and should instead just be a watchman over the company.
As a result, by 2012, HP had plunged back to $23B.
The case for secrets
Pierre de Fermat’s “last theorem”, conjectured in 1637,
remained unproven after 358 years of mathematicians studying it.
Shouldn’t this show that it’s unprovable?
No!
Andrew Wiles finally proved the conjecture in 1993,
after 8 years of work.
To succeed, he had to believe in secrets.
There are many more secrets to be found.
Not just marginal gains -
we could cure cancer, even cure aging.
But these secrets will yield only to relentless searchers.
Airbnb is an example:
we all had space we weren’t using,
and we all wanted space when travelling;
Airbnb saw supply and demand
where others saw nothing.
How to find secrets
There are two kinds of secret:
secrets about nature,
and secrets about people.
Secrets of nature can seem more important:
we give authority to physicists and engineers.
Secrets about people are under-appreciated.
Consider, what is taboo?
“Competition and capitalism are opposites.”
This truth is one of nature and people.
You can find it by studying the market (nature),
or you can find it by studying what people can’t say.
Look where others aren’t looking.
Schooling applies a predictable bias:
look to important topics outside the syllabus.
Example: nutrition.
It’s important to everyone,
but (for some reason)
sits outside mainstream academia.
What to do with secrets
If you find a secret,
should you tell anyone?
You should tell whoever you need to, and no more.
That golden mean is a company,
a collection of people built around a secret.
Similar posts
Summary of ‘Zero to One’, Chapter 9: Foundations
Startups must get the foundations right from the start. Choose co-founders carefully, keep the board small, hire full-time employees, and compensate with equity over high salaries, even for the CEO. 2019-10-07
Summary of ‘Zero to One’, Chapter 7: Follow the money
The power law distribution is key in venture capital, companies, and careers. Focus on finding and growing the few with vast potential, rather than trying to fix failures. 2018-09-23
Summary of ‘Zero to One’, Chapter 6: You are not a lottery ticket
The USA believes in the future is unpredictable but will get better. A false contradiction. Success is not random, as evidenced by serial entrepreneurs who have founded multiple billion-dollar businesses. 2018-09-19
Summary of ‘Zero to One’, Chapter 5: Last mover advantage
To build a lasting monopoly, focus on proprietary technology, network effects, economies of scale, and branding. Start small, sequence your markets, and aim to be the last mover in your industry. 2018-09-17
Summary of ‘Zero to One’, Chapter 3: All happy companies are different
Profitable companies are monopolies, not competitors. Competition drives down prices but also wages and quality. Monopolies are not permanent, as new markets and products can create new monopolies. 2018-09-15
Summary of ‘Zero to One’, Chapter 2: party like it’s 1999
The dot-com bubble showed that conventional wisdom is often wrong. Lessons learned, like being “lean” and avoiding new markets, prevent bold visions and are the opposite of what companies like Google and PayPal needed. 2018-09-14
More by Jim
What does the dot do in JavaScript?
foo.bar
, foo.bar()
, or foo.bar = baz
- what do they mean? A deep dive into prototypical inheritance and getters/setters. 2020-11-01
Smear phishing: a new Android vulnerability
Trick Android to display an SMS as coming from any contact. Convincing phishing vuln, but still unpatched. 2020-08-06
A probabilistic pub quiz for nerds
A “true or false” quiz where you respond with your confidence level, and the optimal strategy is to report your true belief. 2020-04-26
Time is running out to catch COVID-19
Simulation shows it’s rational to deliberately infect yourself with COVID-19 early on to get treatment, but after healthcare capacity is exceeded, it’s better to avoid infection. Includes interactive parameters and visualizations. 2020-03-14
The inception bar: a new phishing method
A new phishing technique that displays a fake URL bar in Chrome for mobile. A key innovation is the “scroll jail” that traps the user in a fake browser. 2019-04-27
The hacker hype cycle
I got started with simple web development, but because enamored with increasingly esoteric programming concepts, leading to a “trough of hipster technologies” before returning to more productive work. 2019-03-23
Project C-43: the lost origins of asymmetric crypto
Bob invents asymmetric cryptography by playing loud white noise to obscure Alice’s message, which he can cancel out but an eavesdropper cannot. This idea, published in 1944 by Walter Koenig Jr., is the forgotten origin of asymmetric crypto. 2019-02-16
How Hacker News stays interesting
Hacker News buried my post on conspiracy theories in my family due to overheated discussion, not censorship. Moderation keeps the site focused on interesting technical content. 2019-01-26
My parents are Flat-Earthers
For decades, my parents have been working up to Flat-Earther beliefs. From Egyptology to Jehovah’s Witnesses to theories that human built the Moon billions of years in the future. Surprisingly, it doesn’t affect their successful lives very much. For me, it’s a fun family pastime. 2019-01-20
The dots do matter: how to scam a Gmail user
Gmail’s “dots don’t matter” feature lets scammers create an account on, say, Netflix, with your email address but different dots. Results in convincing phishing emails. 2018-04-07
The sorry state of OpenSSL usability
OpenSSL’s inadequate documentation, confusing key formats, and deprecated interfaces make it difficult to use, despite its importance. 2017-12-02
I hate telephones
I hate telephones. Some rational reasons: lack of authentication, no spam filtering, forced synchronous communication. But also just a visceral fear. 2017-11-08
The Three Ts of Time, Thought and Typing: measuring cost on the web
Businesses often tout “free” services, but the real costs come in terms of time, thought, and typing required from users. Reducing these “Three Ts” is key to improving sign-up flows and increasing conversions. 2017-10-26
Granddad died today
Granddad died. The unspoken practice of death-by-dehydration in the NHS. The Liverpool Care Pathway. Assisted dying in the UK. The importance of planning in end-of-life care. 2017-05-19
How do I call a program in C, setting up standard pipes?
A C function to create a new process, set up its standard input/output/error pipes, and return a struct containing the process ID and pipe file descriptors. 2017-02-17
Your syntax highlighter is wrong
Syntax highlighters make value judgments about code. Most highlighters judge that comments are cruft, and try to hide them. Most diff viewers judge that code deletions are bad. 2014-05-11
Want to build a fantastic product using LLMs? I work at
Granola where we're building the future IDE for knowledge work. Come and work with us!
Read more or
get in touch! This page copyright James Fisher 2019. Content is not associated with my employer. Found an error? Edit this page.