Jump to content

Search the Community

Showing results for tags 'blockchain'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 10 results

  1. Drop whatever you’re doing and go read Maciej Cegłowski’s absolutely magnificent essay Our Comrade The Electron, an astonishing history of the amazing Russian engineer Lev Sergeyevich Termen. Make sure you read right down to its punchline, “the most badass answer imaginable.” But if time is short, or you struggle to read English, please at least read its angry rant, from which I quote: Technology concentrates power. In the 90′s, it looked like the Internet might be an exception, that it could be a decentralizing, democratizing force … but those days are gone … What upsets me, what really gets my goat, is that we did it because it was the easiest thing to do … Making things ephemeral is hard. Making things distributed is hard. Making things anonymous is hard. Coming up with a sane business model is really hard—I get tired just thinking about it. We put so much care into making the Internet resilient from technical failures, but make no effort to make it resilient to political failure. We treat freedom and the rule of law like inexhaustible natural resources, rather than the fragile and precious treasures that they are. And now, of course, it’s time to make the Internet of Things, where we will connect everything to everything else, and build cool apps on top, and nothing can possibly go wrong. He’s right. And so the Internet has, for most intents and purposes, evolved into a landscape dominated by centralized systems, epitomized by what Bruce Sterling calls the Stacks — Amazon, Apple, Facebook, Google, Microsoft. To quote, er, myself: They don’t want much, those Stacks. Just your identity, your allegiance, and all of your data. Just to be your sole provider of messaging, media, merchandise, and metadata. Just to take part in as much of your online existence as they possibly can, and maybe to one day mediate your every interaction with the world around you, online or off. The Stacks exist in part because less centralized systems are extremely difficult to build. Consider, for instance, Google+ architect Yonatan Zunger’s explanation of “distributed consensus,” i.e. the means by which data can be safely preserved in distributed systems with multiple editors. It’s absolutely brilliant — but none of its 8,000 words are wasted. The gold-standard “Paxos” algorithm is sufficiently complex that a pair of Stanford engineers recently published a paper entitled “In Search Of An Understandable Consensus Algorithm” (PDF) — the title of which sums up the state of the art nicely — in which they present a new alternative, “Raft.” Distributed algorithms, distributed data, distributed systems, distributed security: messy, tricky, complicated, a maze of vibrating tightropes stretched across an N-dimensional pit full of hungry failure modes with sharp teeth. Hard stuff. But not impossible. Just ask Satoshi Nakamoto. Beyond the hype and the greed, Bitcoin is powered by a genuine technical breakthrough(1), to a degree I did not properly appreciate when I first started writing about it. The “blockchain” — the engine on which Bitcoin is built — is a new kind of distributed consensus system that allows transactions, or other data, to be securely stored and verified without any centralized authority at all, because (to grossly oversimplify) they are validated by the entire network. Those transactions don’t have to be financial; that data doesn’t have to be money. The engine that powers Bitcoin can be used for a whole array of other applications… Antonis Polemitis @polemitis Follow Currently at 89 categories of things that can be placed on blockchain. Not bad BTC-Twitter for 3 hours work. :) http://ledracapital.com/blog/2014/3/11/bitcoin-series-24-the-mega-master-blockchain-list … 4:33 AM - 12 Mar 2014 …with one huge caveat. As Michael Nielsen puts it, in his excellent, detailed explanation of how Bitcoin actually works: For [the blockchain] to have any chance of succeeding, network users need an incentive to help validate transactions. Without such an incentive, they have no reason to expend valuable computational power, merely to help validate other people’s transactions. And if network users are not willing to expend that power, then the whole system won’t work. The solution to this problem is to reward people who help validate transactions. Satoshi Nakamoto’s genius was twofold; technically, he built the world’s first(1) blockchain; socially, he lured people into powering it, using good old filthy lucre as an incentive. Which was very effective, but is now also a little awkward, as Bitcoin-as-a-currency has attracted a large number of … er … let’s diplomatically call them “colorful personalities,” and also, money-as-a-store-of-value is one field where in fact you probably do want some centralized authority, or at least insurance. I agree with the mordant observations on Twitter that it’s highly amusing watching the extremist fringes of the Bitcoin community slowly rediscover from first principles exactly why financial regulation exists in the first place. Meanwhile, though, the noise and smoke of the ongoing endless (and endlessly entertaining) Bitcoin sturm und drang has — ironically — obscured its real breakthrough; the blockchain. You see, it’s not that hard to imagine other blockchain-based systems which aren’t currencies and don’t attract as many “colorful personalities.” Suppose you replaced the Internet’s centralized Domain Name System with a blockchain for Internet names (like Namecoin) such that every DNS request included some proof-of-work effort. Or you used any blockchain (including Bitcoin’s) as a notary service. Or you built a new blockchain for crowdfunding. Or you replaced a centralized system which absolutely does need to be scrapped — that horrific barrel of worms known as TLS/SSL Certificate Authorities — with a blockchain-based solution powered at the browser level. Or you built a new distributed email service, with a blockchain for email addresses, and every time you checked your email you contributed to the network. Or a new distributed social network, with a blockchain verifying identities, powered by code that ran every time its users launched its app or visited its web page. (Technical note: this would obviously be a far more diffuse and granular system than Bitcoin’s, which runs on machines generally devoted 24/7 to mining. I don’t think that would require substantive changes to the algorithm, but while I’m a pretty good engineer I’m not an expert. That said, there’s no reason why a large number of relatively ephemeral clients would be fundamentally incompatible with a Hashcash-esque proof-of-work system, though I guess you might need a smaller subnet of persistent “supernodes” to maintain the blockchain.) To be clear, I’m not suggesting that some smart startup might turn around tomorrow and replace Gmail or Facebook with a blockchain-powered solution. But I am saying that some indeterminate number of years hence, as bandwidth improves, and processors grow ever more powerful, and storage gets ever cheaper, it’s not inconceivable that those massive server farms could be replaced, not with a “personal cloud” — a bad idea for many reasons — but by massive distributed peer-to-peer networks: open-source, encrypted end-to-end, and orchestrated in part by blockchains. I’m saying that I can at least envision, albeit vaguely, the decline of the Stacks. Which if you look at the Internet today seems like a pretty striking and revolutionary thing to say. For what it’s worth, I’m by no means alone in left field shouting that the blockchain is a big deal; heck, just look at Andreessen Horowitz over the last few months. And it seems likely that the blockchain, and Raft, and Spanner, and that great granddaddy of distributed peer-to-peer data called BitTorrent, are only the beginning; I expect more and more distributed-computing breakthroughs of comparable magnitude over the next decade, as the world’s searchlight minds turn to the forthcoming Internet Of Things. Last year I argued that “The Internet: we’re doing it wrong.” Now, though, only six months later, I see traces and hints that we’re finally making the first faltering motions towards doing it right. BitTorrent is thirteen years old, but it has only just now been done right (at least for pirates) in the form of Popcorn Time. Raft might be, in a sense, Paxos done right. Threadable looks like group communications done right (and, again, distributed, at least to the extent that email is distributed.) Keybase.io seems like a step towards PGP done right. TextSecure is cross-platform end-to-end-encrypted messaging done right. Maybe, just maybe, our online future is actually bright, and peer-to-peer, and encrypted end-to-end, and maybe even open-source and far less overtly commercial than today — and built, in part, on blockchains. Source
  2. Monash Uni claims reputation-based blockchain capable of defending itself The miner has their 'reputation' lowered to prevent malicious activity, the university says. Researchers at Monash University have claimed the development of a blockchain system that is capable of defending against malicious activity, or at least making it very expensive for the attacker to do so. According to Monash, its RepuCoin system introduces the concept of "reputation" to blockchain. The university believes that its system makes recoding blockchain information very hard. "When RepuCoin has operated for a year, attacking the system with 68 percent of its total mining power would take at least six months and would be at least 5,760 times as expensive as conducting the same attack on bitcoin," Dr Jiangshan Yu from Monash said. The university believes its RepuCoin would make recoding the blockchain's data and using it for malicious purposes, such as reversing government decisions, "thousands of times more expensive to attack than bitcoin". RepuCoin is also claimed to be capable of performing 10,000 transactions per second. The reputation is based on the miner, not the coin or token itself. "RepuCoin is different as it defines a miner's power by its 'reputation', as a function of its work integrated over the time of the entire blockchain, rather than through instantaneous computing power which can be obtained quickly," Monash wrote in a statement on Thursday. Essentially, when a miner goes outside the boundaries of system specification, RepuCoin lowers the miner's reputation to prevent any malicious activity "without significant consequences". "But make no mistake, this is not about subjective reputation in the sense of social networks; it is about physics," Professor Paulo Esteves-Verissimo from the University of Luxembourg, who was also involved in the proof of concept, said. "Voting power takes time to build, accumulating through consistent and honest mining work. It's like charging a battery before being able to use it. "RepuCoin provides an elegant solution to a problem that many thought was insoluble. Existing systems always linked computational power to voting power. We separated them and now someone could join RepuCoin with 99 percent of the total computing power and they still wouldn't be able to attack it." The announcement from the Australian university follows the federal government's Digital Transformation Agency (DTA) recently handing out advice to those getting lost in the buzz of blockchain. "It is the DTA's current position that blockchain is an emerging technology worthy of ongoing observation. However, without standardisation and additional work, for many uses of blockchain, there are currently other mature technologies that may be more suitable for immediate use," is the agency's official position. Addressing Senate Estimates in October, DTA chief digital officer Peter Alexander dunked on its use, adding to the above that "for every use of blockchain you would consider today, there is a better technology -- alternate databases, secure connections, standardised API engagement". "Blockchain: Interesting technology but early on in its development, it's kind of at the top of a hype cycle," he said. The government entity has even published a questionnaire for organisations to self-evaluate before bothering with something that can just be stored in a secure database. Source
  3. How Blockchain Can Improve Cyber Security The advent of the internet and related technologies has impacted many people’s ways of life and the way organizations are run. It has led to easy access to information, necessary for running the day to day undertakings and in diverse platforms. However, all these positive impacts of the internet have also come at a cost. It has not been easy to use and depend on the internet and related technologies. With many people and organizations relying on the internet and connected systems these days, it has not been easy to secure data and computerized devices. Cyber threats have been a major issue that has been costly to solve or eradicate for good. Access to effective database backup solutions has also not been a hassle-free journey. Cybersecurity problems have been a major issue affecting millions of people and organizations on a daily basis. Solutions for solving internet threats have been limited and this incapability has affected the lives of many internet users and daunted many organizations. Cybersecurity affects the whole world. It does not just affect governments or businesses, but you can also wake up and find it hard to even use your smartphone or laptop. Anyone using the internet and computerized systems needs to understand the role of cybersecurity and figure out what incredible ways can help improve cyber threats. Cyber threats can be in the form of malware, ransomware, phishing or social engineering. These cyber-attacks have been a major challenge because many people lack knowledge and awareness about why cybersecurity is crucial. Some don’t care or pay any attention to cybersecurity whereas others lack time and money to secure their data and systems. How to Embrace Blockchain and Improve Cyber Security If you embrace cybersecurity, you will find it easy to avert cyber-attacks, identity theft, data breaches as well as be able to handle any management risk. But, is it possible? Many organizations, governments, and individuals have relied on different strategies to improve cybersecurity. They include the use of anti-virus, firewall, anti-spyware, anti-spam, backing up data as well as Windows update. All these strategies have helped in one way or another secure data and computerized systems. But, did you know blockchain is the way to go and good news to internet users? Probably you have not. Blockchain has the potential to improve cyber-attacks in many incredible ways that you should not hesitate to know. If you are among many internet and computerized devices users who don’t know what blockchain is all about, don’t get demoralized at all. It is simply a system of computers whereby information is easily stored and shared between all participants of the network. This simple definition should expose you to the incredible capabilities of blockchain that can effectively aid improve cybersecurity. Have a look; Through decentralization The decentralized nature of blockchain has played great roles in helping internet users secure their information. Through a peer-to-peer network, blockchain users have been able to maintain their activities in their network. It has become easy to ensure the chain does not breakdown or fail. If an intruder is trying to certain unauthorized data, the entire system will verify every detail and locate what diverges from what in the network. It will then exclude the block and recognize it as fraudulent. This means that everyone in the blockchain network has to verify his or her data ensuring the existing data is not easily tampered with and cannot be controlled by a single source. By tracking and tracing Many companies have over the years been facing the challenge of tracking their products as well as keeping their transactions secure. Thanks to the advent of blockchain technology, every transaction an individual or an organization makes to a block is timestamped and signed up digitally. This makes it easy for users to easily track and trace the history of transactions. It is also easy to track account and use the data whenever the need arises. Those who embrace blockchain in their transaction will be able to maintain valid data without any shortcomings. Through its sustainability Thanks to the multiple copies of the blockchain ledger, in case of a DDoS attack or related threat, an individual or organization is able to overcome these challenges and secure its data. Blockchain technology does not allow any failure that can be a threat to any confidential information By ensuring the authenticity of data Through blockchain, it has become easy to authenticate computerized systems and users without the need of providing a password. Human factor or impact of the man in the middle of cyber-attacks has been reduced via blockchain technology. All you need is to publish your public key on the blockchain. The data in your system will then be distributed across millions of nodes and connected to blocks stored on the ledger. Hence, it will be hard for intruders or hackers to publish fake public keys and your data will be secure. By guaranteeing a secure network access In many institutions, employees will need to access to a blockchain from different systems and they may end up losing their passwords or private keys. Fortunately, with REMME’s blockchain, such employees will have unique Secure Socket Layer certification and they will not require any passwords to undertake their duties. Hence, it will be hard for hackers to get unauthorized access to the network. To Sum Up If you are looking for the best and most transparent means to store your vital data, blockchain is the way to go. You will not only have a data backup solution but also an opportunity to form a block of secure data. As cyber attacks surge, you need to make a bold decision and trust blockchain technology. It’s a reliable and decentralized platform you will love. Source
  4. IBM sends Blockchain World Wire for global payments into limited production Big Blue's latest blockchain play sees cross-border payments being sent via digital tokens in near real-time. How IBM Blockchain World Wire works (Image: IBM) IBM has announced that its blockchain-based global payments network has been sent into limited production, with the company touting it as the "new financial rail" that clears and settles cross-border payments in near real-time. IBM Blockchain World Wire, Big Blue claims, is the first blockchain-based network that integrates payment messaging, clearing, and settlement on a single network. "The concept of money is 2,000 years old. The world has been using the same network to process financial transactions for 50 years. And even though globalisation has changed the world, payment fees and other financial barriers remain the same. But now there's a new way to move money," the company pitches. "We've created a new type of payment network designed to accelerate remittances and transform cross-border payments to facilitate the movement of money in countries that need it most," IBM Blockchain general manager Marie Wieck added. "By creating a network where financial institutions support multiple digital assets, we expect to spur innovation and improve financial inclusion worldwide." World Wire uses the Stellar protocol -- an open-source, decentralised protocol for digital currency to fiat currency transfer -- to transmit monetary value in the form of digital currency. The blockchain-based network will support settlement using Stellar Lumens (XLM) and the US dollar stable coin through IBM's existing partnership with Stronghold. IBM said that pending regulatory approvals and other reviews, six international banks, including Banco Bradesco, Bank Busan, and Rizal Commercial Banking Corporation (RCBC), have signed letters of intent to issue their own stable coins on World Wire. If successful, this will see the addition of the euro, Korean won, Brazilian real, Indonesian rupiah, and Philippine peso stable coins to the network. According to IBM, World Wire has enabled payment locations in 72 countries, with 47 currencies and 44 banking endpoints. "Local regulations will continue to guide activation, and IBM is actively growing the network with additional financial institutions globally," the company said. Source
  5. ICON Becomes Latest Blockchain to Support Security Tokens ICON, a platform that is aimed at providing blockchain interoperability, has announced that it is introducing a new security token standard. The new IRC16 specification will allow token creators to issue security tokens—a special type of blockchain token that represents certain assets and investments. Unlike Bitcoin, security tokens don’t derive their value from blockchain activity. Instead, security tokens represent ownership of assets like real estate, precious metals, or corporate equity. And whereas ICO tokens have faced regulatory issues over the past year, security tokens are seen as very promising due to their capacity to work within regulations. The IRC16 Standard Like other initiatives of its type, ICON’s new standard is meant to facilitate regulatory compliance. IRC16 is intended to simplify security token creation, support smart contracts that manage trading, and, above all, help token issuers comply with rules and regulations. The standard has four important features: Check For Token Transfer, which can verify whether those who buy and sell tokens have passed KYC and AML checks, and can put limits on participation. Token Control By Operator, which allows tokens to be taken control of when keys are lost or fraud occurs, as demanded by some regulations. Document Management, which manages the legal documents that pertain to the rights and obligations of participants. Partition, which allows token issuers to create “partially fungible tokens” and introduce lock-up periods into those tokens. In addition to explaining the technical aspects, ICON has expressed its hope that security tokens will “increase the liquidity of high-value assets” by dividing them into easily tradeable tokens. Eventually, ICON says, this will “expand the size of existing investor pools”—turning securities into a more accessible market. Security Tokens Elsewhere ICON is just one of several platforms that have added support for security tokens. Ontology has recently added a similar standard in a major capacity. Meanwhile, on Ethereum, the ERC-1400 range has accumulated many different security token specifications. NEO has expressed interestin security tokenization as well. Additionally, there are several blockchains that are dedicated exclusively or primarily to security tokens, such as Swarm, Tokeny, and OpenFinance. Regardless of the platform, security tokens are coming out swinging in 2019, and several major salesare scheduled for the coming months or are already underway. But although security tokens are growing quickly, the model is controversial, as only accredited investors are legally allowed to own securities. The fact that blockchain technology is being used to exclude those who are not wealthy investors is often seen as a violation of cryptocurrency’s fundamental promises: financial inclusion and freedom. Source
  6. China’s internet censorship agency has approved a set of regulations for blockchain service providers in the country that will take effect in mid-February. The Cyberspace Administration of China (CAC) published its new “Regulation for Managing Blockchain Information Services” on Thursday, defining blockchain information service providers as “entities or nodes” that offer information services to the public using blockchain technology via desktop sites or mobile apps. The rules become official on February 15, according to the release. Among the 23 articles listed in the document, one requires blockchain service providers to register with the CAC within 10 working days of starting to offer services to the public. The agency also mandates that blockchain startups must register their names, service types, industry fields and server addresses. Further, it bans startups from using blockchain technology to “produce, duplicate, publish, and disseminate” information or content that is prohibited by Chinese laws. If blockchain startups fail to comply with the rules, the CAC said it would first issue a warning, while failure to act within the specified timeline would bring a fine ranging from 5,000 yuan ($737) to 30,000 yuan ($4,422), depending upon the offense. The CAC first published draft rules in October of last year. At that time, one of the articles also recommended that blockchain startups operating in fields such as news reporting, publishing, education and the pharmaceutical industry must also obtain licenses from relevant authorities prior to registration with the CAC. The final rules have dropped this article altogether. Previously, blockchain technology has been utilized to bypass China’s strict internet censorship – often dubbed “The Great Firewall.” For example, as part of the #Metoo movement and a recent pharmaceutical scandal in the country, individuals posted information on the ethereum blockchain to avoid censorship. Source
  7. The AchieVer

    How blockchain may kill the password

    Blockchain technology is being piloted as the basis for self-sovereign identities, which can eliminate user names and passwords for logging into corporate sites or verify sensitive information such as income for purposes of a loan without revealing personally identifiable information. Thinkstock MORE LIKE THIS Blockchain 2019: How crypto will convert cash, property into digital assets Blockchain to generate more than $10.6B in revenue by 2023 Coming soon: Public blockchains for private business data VIDEO Tech Talk: Where blockchain's going this year Related Articles Blockchain in 2019 and beyond: 5 predictions How to decide whether to deploy blockchain 10 ways to work better with G Suite See all Insider Imagine a company that can verify the background of a new employee and onboard them with the click of a single virtual button, or a banking customer who can verify their identity for a loan without exposing personally identifiable information – again with a click of a button. That's the potential blockchain holds for decentralized identity management. It's done by creating a digital wallet that serves as a repository for all kinds of personal and financial data, info that can only be shared after a specific request and only with the permission of the owner. [ Further reading: What is blockchain? The most disruptive tech in decades] Blockchain distributed ledger technology (DLT) – in combination with digital identity verification – holds the potential to solve online privacy issues that plague everything from consumer sales and bank know-your-customer regulations to employee credentials that allow access to confidential business systems. "There are multiple vendors in this space that are either in the early R&D stage or testing their products in pilot projects," said Homan Farahmand, a senior research director with Gartner. "It is too early to declare any winner, by any means, because just having a working product is not enough. Decentralized identity requires a vibrant ecosystem, a robust identity trust fabric built on a distributed ledger or blockchain, tools to support user-friendly functionality and good developer experience to support broad adoption." One considerable security attribute of storing digital identities on an encrypted, distributed blockchain ledger is eliminating "honey pots," or central repositories for customer account information, according to Julie Esser, chief engagement officer for CULedger, a Denver-based Credit Union Service Organization (CUSO). Those repositories are prime targets for hackers. Credit Unions are already testing ID management Like other CUSOs, CULedger is a cooperative owned by multiple credit unions for the purpose of providing back-office services; it was created a year ago to build out a blockchain-based identity management platform called My CUID. The platform is expected to launch in the second half of 2019 and will hand the keys to data protection over to customers who sign up for an app. CULedger has 36 investors – 26 credit unions and several CUSOs. In October, CULedger began piloting My CUID with five other credit unions and another CUSO; it eliminated the need for user names and passwords and relieved credit union call centers from the obligation of resetting them when a customer loses them. [ Become a Microsoft Office 365 administrator in record time with this quick start course from PluralSight. ] How it works: a new or current customer of a member credit union contacts a customer service call center, which sends a text message to the customer's mobile device with a link to download the My CUID app. The credit union's rep then issues the customer their credentials – a digital wallet, which holds personally identifiable information obtained during the initial customer contact. That information is encrypted and can only be accessed with the member's authorization, which is requested when they make a transaction. Each time a customer using My CUID contacts the credit union – or vice versa – their smartphone or tablet receives a pop-up dialogue requesting they confirm their membership before any transaction is completed. "You'd click OK or Not OK. It doesn't feel a lot different than what happens with other apps on your phone," Esser said. "It's all based on...the encrypted channels we've created, which is really cool. You're creating a two-way secure communication channel. So, not only does your credit union know it's you they're talking to, but you also you know it's your credit union calling you." CULedger has set a goal of issuing 1 million digital identities to credit union members in 2019. Because credit unions must comply with Know-Your-Customer federal regulations, the blockchain-based digital ID service would also fulfill regulatory compliance, Esser said. Along with giving the customer control over their identity by handing them the blockchain encryption keys, My CUID would eliminate the need for user login names and passwords and dramatically reduce the time it takes for a credit union call center representative to authenticate a member. It can take a rep from 60 to 90 seconds to authenticate a member before a transaction even starts. That can be reduced to 5 seconds or less with My CUID, according to Esser. "It's not a pleasant experience to phone a call center because the customer is welcomed with 20 questions to identify who you are, so it's a wonky process that needs fixing." Traditionally, credit unions and other financial services firms rely on third-party service providers for call center and customer authentication services, many of which are located outside the U.S. CULedger would place control back in the hands of member credit unions, Esser said. In 2019, CULedger plans to begin building out its production customer permission network; it is currently considering several blockchain platforms, including IBM's Hyperledger Fabric service and R3's Corda, the biggest commercial blockchain consortium among banks, insurers and other financial service firms. CULedger is also considering working with the Hedera Foundation, the creator of Swirlds, a software platform for creating distributed applications (dApps). Swirlds is based on the Hashgraph protocol, a DLT well suited to the financial services industry because it can process more than 100,000 transactions per second, unlike bitcoin, which processes three to four transactions per second. "We need the ability to conduct transactions instantaneously – in real time," Esser said. "We'd planned to create our own platform, but with the focus on a decentralized identification piece, this allows us to not recreate the wheel. There may be some applications that require different [blockchain] platforms." How a self-sovereign ID works For consumers who are mindful of their online information – credit card numbers, date of birth, annual income, etc. – blockchain has the potential for "self-sovereign" identities like CULedger is creating, meaning the user controls who can see their data or get purchasing approval without releasing their income details. Self-sovereign identities work like this: the user has a bank confirm a credit limit or an employer confirm annual income; that confirmation information is then encrypted, but available, on a public blockchain ledger to which the consumer holds the private and public cryptographic keys. If a buyer wants a car loan from an auto dealership, for example, the consumer can give them permission through a public key to confirm that he or she has enough credit or annual income without revealing an exact dollar amount. So, for example, if the car dealer wants to ensure a consumer earns more than $50,000 a year, that's all the blockchain ledger will confirm (not that they actually earn $72,587). The confidentiality technique is known as zero knowledge proof (ZKP), a cryptography technology that allows a user to prove that funds, assets or identifying information exist without revealing the information behind it. Ernst & Young has created a public blockchain prototype it plans to launch in 2019 that lets companies use ZKPs to complete business transactions confidentially. Sovereign IDs in the enterprise CULedger is also working with the Sovrin Foundation, a new nonprofit\ that has created the blockchain-based Sovrin Network; it enables anyone to globally exchange pre-verified data with any entity also on the distributed ledger. The online credentials issued via the Sovrin Network are akin to a physical ID you might carry in your wallet, such as a driver's license, a company ID or a bank debit card. The virtual encrypted wallet (or crypto wallet) would link back to the institutions that created them, such as a bank, a government agency or even an employer, which, through the blockchain, would automatically verify the needed information to a requestor. "Our market strategy involves working with enterprise partners to solve their ID problems rather than trying to go direct to end users, so yeah, we're working hard in that area and have a number of partners who are doing things there. Three who come to mind are Government of British Columbia, CULedger and IBM/ATB Financial," said Phil Windley, chair and co-founder of the Sovrin Foundation. The Government of British Columbia and the Government of Ontario have already rolled out a production system using the Sovrin Network for business registration and licensing; together they've issued over 6 million credentials, according to Windley. Sovrin development partners IBM, Workday and ATB Financial (a bank in Alberta) have also started pilot tests of the Sovrin Network. The partners are demonstrating how digital credentials could work for IBM employees. ATB Financial issues a digital credential, which can be used for both logging into the bank and IBM's user network. Along with validating the employees' financial information, the distributed ledger application eliminates the need for employees to have a username or password, Windley said. "Because it's cryptographically based, it has a public key associated with them, and you [the employee] own the private key," Windley said. Gartner's Farahmand said self-sovereign identities based on blockchain distributed ledgers are being eyed for all kinds of enterprises uses, including onboard new hires. Each time a new employee is hired, a new decentralized identifier is generated by the that employee and passed to the enterprise. That identifier can then be propagated within the internal systems for user authentication to the enterprise network and applications, Farahmand said. "This can be a powerful proposition as it speeds up the onboarding process and subsequent identity life cycle management activities, as well as enabling password-less authentication. It also helps with converging multiple personas a person can have relevant to the organization," Farahmand said, explaining that the digital IDs can be used to access multiple systems within a company based on organization-based permissions. A popular design pattern for decentralized identity is comprised of a core identifier and a set of "pairwise" identifiers, each for a relationship the user has with an organization. Pairwise identifiers are cryptographically derived from the core identifier. The pairwise identifier enables an enterprise system to uniquely verify a user identity for each relationship and potentially prevent correlation of user activity across different relationships, enabling privacy-by-design principles at the protocol level, Farahmand said. For example, a bank employee can be a bank customer at the same time while using the same self-sovereign ID. The two personas are typically represented by two digital identities in two siloed systems – one as an employee and one as a customer of the bank. "In case of a decentralized identity model, the same person can have two sets of identifiers ... mapped to the same core digital identity, which can potentially simplify reconciliation of user activities," Farahmand said. Another benefit to a self-sovereign ID is the ability to streamline B2B scenarios where an employee of one organization can have access to systems in another. For example, Farahmand said, if the host organization trusts the decentralized identity that is attested by the guest organization, then a new pair-wise decentralized identifier can be generated to authenticate the user; that simplifies the onboarding and access governance for business customers or other partners. Significant hurdles remain While self-sovereign IDs based on blockchain hold significant promise for increasing privacy and efficiency, there are also significant technology hurdles that have yet to be vaulted. For one, trust in blockchain. A 2018 Gartner CIO survey revealed on average that only 3.3% of companies worldwide had actually deployed blockchain in a production environment. In a blog post, Avivah Litan, a Gartner vice president and distinguished analyst, listed eight hurdles blockchain needs to surmount before it can become a cure-all for virtually any international, transactional network need – from fee-less, cross-border payments to supply chain tracking. One significant challenge is integrating DLT systems with legacy databases, the current repositories for corporate employee identities. A decentralized identity system also requires a vibrant ecosystem, a roust identity trust fabric built on a distributed ledger or blockchain, tools to support user-friendly functionality and good developer experience to support broad adoption. "While we encourage our clients to watch this space and do some limited experimentation or even proof-of-concept projects," Farahmand said, "we also caution them to make sure these products are battle tested, hardened and ready to withstand different types of attacks." source
  8. Casanova graph. Credit: Pyrofex Corporation. A team of researchers at Pyrofex Corporation recently introduced Casanova, a leaderless optimistic consensus algorithm suited for use in a blockchain. Rather than producing a chain, Casanova produces blocks in a directed acyclic graph (DAG), which is essentially a directed graph with no cycles. Casanova pipelines voting rounds and block production to improve scalability and has a unique 'line item veto' for conflicting transactions such as double spends. "We were looking for a scalable consensus algorithm that we could use to implement a couple of different blockchain projects we have going," the Pyrofex research team told TechXplore, via e-mail. "We initially thought Casper might be right and tried to prove it was safe and live under ideal network conditions. It didn't take long at all to show that wasn't the case and to conclude that we would have to make some significant changes. Our new algorithm addresses all the issues we were facing, but it required a lot of deviation from previous approaches." Most existing blockchain technologies waste considerable time and resources getting the entire network to agree on the global ordering of each single transaction. While this might appear reasonable, the researchers feel that a good blockchain approach should be able to process transactions in any order. "We should only use the energy and resources to come to consensus when it's necessary to do so—i.e., when there are two conflicting transactions and the network must choose exactly one," the researchers said. "Other blockchains have tried something similar, but with Casanova we were able to specify exactly how to accomplish this." A notable characteristic of Casanova is that it does not build a blockchain per se, but rather builds a DAG. The researchers refer to the structure of Casanova as a 'blockdag'. If a blockchain's structure can be compared to a string, a blockdag resembles a piece of fabric with several strings woven together. "Therefore, instead of confirming one block at a time, Casanova confirms one block at a time per member of the network," the researchers said. "So if the network has 1,000 members, we can confirm 1,000 blocks at once instead of just 1. We do all this work in the same time a regular blockchain would spend coming to consensus on a single block." Casanova has validators instead of miners and these produce blocks on a regular basis, once every minute or so. When the validators receive a transaction from a client, they include it in their next block and sign the block to show that they have seen it. Validators also exchange blocks with each other, to ensure that everyone sees all transactions. When a validator is ready to produce a new block, it includes information about blocks that it has seen from everyone else. "The only worry is when two conflicting transactions arrive, like when a user tries to double spend," the researchers explained. "When validators see a conflict, they include information about it in their next block. Using the information from everyone's blocks, the network decides which transaction will be valid and which they'll throw away." While it might feel like this process is not enough to guarantee security, the validators use mathematical structures to track both transactions and the other validators' votes. According to the researchers, this allows them to make important inferences, which ultimately ensure security. "One of Casanova's more beautiful features is this: you can spam the network with double spends, which will slow it down, but the network will only slow down for the spammer's account," the Pyrofex research team said. "Everyone else's transactions get processed at the usual speed, because you can't force them to conflict with your transactions. Casanova has a sort of 'line item veto' on spammy transactions that's unique in the industry, as far as we know." Although there are several blockdag algorithms out there, most of them are proof of work (PoW), while Casanova is proof of stake (PoS). In addition, most existing protocols try to give a total order in instances where a partial order would suffice. "We're the first proof-of-stake blockdag consensus algorithm that we know of, and we keep transactions in a partial order," the researchers wrote. "We've also made some fundamentally new observations about how the members of a blockchain should record and track information." The researchers are set to publish a new paper in which they will explain why their observations are more general, mathematically stronger and have a clearer meaning than those gathered using other blockchains or cryptocurrencies. A great advantage of Casanova is that it is quite general, making it easy for users to tailor the algorithm around their specific needs. "The attestation observation is also important; it's one of the main reasons that we expect our consensus algorithm to be screaming fast," the researchers explained. "We designed a consensus algorithm to be fast, secure, and robust against network failures. Then, we built a transaction model for it that could be used to build a blockchain. This is why we think our technology will be faster and simpler than most technologies available today." To broaden the scope of their study, the researchers are now working on implementing a proof of concept and formally verifying it in the proof assistant Agda. Developing Casanova allowed them to gather valuable insight into the existing pool of consensus literature, which they plan to write up and publish over the next few months. "We have also developed a ledger model suitable for use with Casanova, which we're going to build into a blockchain in the near future," the researchers said. "We are working on a computation model that is suitable and will allow us to build a smart contracting blockchain. There's a lot to be done, including much of the proof-of-stake machinery like rewards, fees, bonding, unbonding, and so forth. It's going to be a busy year." source
  9. New policy will require users to provide identity information to use any blockchain service After killing all legitimate cryptocurrency businesses in the country, Chinese authorities are now turning their attention to other blockchain service providers. The country’s apex internet regulator, Cyberspace Administration of China (CAC), released a draft policy on Friday that will require all companies to collect their users’ real names and national identification card numbers before offering them any blockchain related service. The draft regulations are open to comments from the public until November 2, but CAC hasn’t given any timeline for when they will actually come into force. If the policy is implemented, the companies will be required to store their users’ data — to be made available for any investigation by the authorities. In addition, they also have to censor any content “deemed to pose a threat to national security.” Blockchain service providers will need to register with the CAC within ten days of starting the service. If they are in highly regulated fields in the country, such as education, media & publishing, or the pharmaceutical industry, they will also have to obtain licences from relevant authorities before registering with the CAC. According to South China Morning Post (SCMP), an anonymous open letter published on the Ethereum blockchain in April alleging sexual harassment at a top university could be the motivation behind the new regulations. While the authorities were able to remove the post from social media platforms like WeChat and Weibo, they were hopeless on the blockchain. The new regulations come hardly as a surprise. China’s aversion to free dissemination of information isn’t exactly a secret — with media giants such as Google, Facebook, Twitter, and Youtube banned in the country. Blockchain as a concept is even more opposed to Chinese government’s totalitarian communist ideology. China has been rigorously cracking down on “all things cryptocurrencies—” banning all exchange desks, media platforms, initial coin offerings (ICO), and any platform promoting or trading virtual currencies in any way. But research shows that the country’s outright bans haven’t exactly deterred illegitimate cryptocurrency businesses from operating in the country. It is likely that its blockchain regulations will end up with a similar fate. Source
  10. Researchers at Delft University of Technology have released a major update to their decentralized and pseudo-anonymous BitTorrent client. The new Tribler has its very own blockchain that tracks how much people are sharing, so users can be rewarded accordingly. This should ultimately improve the efficiency of the client's Tor-like protection. The Tribler client has been around for over a decade. We first covered it in 2006 and since then it’s developed into a truly decentralized BitTorrent client. Even if all torrent sites were shut down today, Tribler users would still be able to find and add new content. The project is not run by regular software developers but by a team of quality researchers at Delft University of Technology. There are currently more than 45 masters students, various thesis students, five dedicated scientific developers, and several professors involved. Simply put, Triber aims to make the torrent ecosystem truly decentralized and anonymous. A social network of peers that can survive even if all torrent sites ceased to exist. “Search and download torrents with less worries or censorship,” Triber’s tagline reads. Like many other BitTorrent clients, Tribler has a search box at the top of the application. However, the search results that appear when users type in a keyword don’t come from a central index. Instead, they come directly from other peers. Thriber’s search results With the latest release, Tribler 7.0, the project adds another element to the mix, it’s very own blockchain. This blockchain keeps track of how much people are sharing and rewards them accordingly. “Tribler is a torrent client for social people, who help each other. You can now earn tokens by helping others. It is specifically designed to prevent freeriding and detect hit-and-run peers.” Tribler leader Dr. Johan Pouwelse tells TF. “You help other Tribler users by seeding and by enhancing their privacy. In return, you get faster downloads, as your tokens show you contribute to the community.” Pouwelse, who aims to transform BitTorrent into an ethical Darknet, just presented the latest release at Stanford University. In addition, the Internet Engineering Task Force is also considering the blockchain implementation as an official Internet standard. This recognition from academics and technology experts is welcome, of course, but Triber’s true power comes from the users. The client has gathered a decent userbase of the years but there sure is plenty room for improvement on this front. The anonymity aspect is perhaps one of the biggest selling points and Pouwelse believes that this will greatly benefit from the blockchain implementation. Triber provides users with pseudo anonymity by routing the transfers through other users. However, this means that the amount of bandwith used by the application inceases as well. Thus far, this hasn’t worked very well, which resulted in slow anonymous downloads. “With the integrated blockchain release today we think we can start fixing the problem of both underseeded swarms and fast proxies,” Dr. Pouwelse says. “Our solution is basically very simple, only social people get decent performance on Tribler. This means in a few years we will end up with only users that act nice. Others leave.” Tribler’s trust stats Tribler provides users with quite a bit of flexibility on the anonymity site. The feature can be turned off completely, or people can choose a protection layer ranging from one to four hops. What’s also important to note is that users don’t operate as exit nodes by default. The IP-addresses of the exit nodes are public ouitside the network and can be monitored, so that would only increase liability. So who are the exit-nodes in this process then? According to Pouwelse’s rather colorful description, these appear to be volunteers that run their code through a VPN a or a VPS server. “The past years we have created an army of bots we call ‘Self-replicating Autonomous Entities’. These are Terminator-style self-replicating pieces of code which have their own Bitcoin wallet to go out there and buy servers to run more copies of themselves,” he explains. “They utilize very primitive genetic evolution to improve survival, buy a VPN for protection, earn credits using our experimental credit mining preview release, and sell our bandwidth tokens on our integrated decentral market for cold hard Bitcoin cash to renew the cycle of life for the next month billing cycle of their VPS provider.” Some might question why there’s such a massive research project dedicated to building an anonymous BitTorrent network. What are the benefits to society? The answer is clear, according to Pouwelse. The ethical darknet they envision will be a unique micro-economy where sharing is rewarded, without having to expose one’s identity. “We are building the Internet of Trust. The Internet can do amazing things, it even created honesty among drugs dealers,” he says, referring to the infamous Silk Road. “Reliability rating of drugs lords gets you life imprisonment. That’s not something we want. We are creating our own trustworthy micro-economy for bandwidth tokens and real Bitcoins,” he adds. People who are interested in taking Tribler for a spin can download the latest version from the official website. source
×
×
  • Create New...