Oyster Protocol Comes In
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Blockchain and the Future of the Internet: a Comprehensive Review
1 Blockchain and the Future of the Internet: A Comprehensive Review Fakhar ul Hassan1, Anwaar Ali2, Mohamed Rahouti3, Siddique Latif4, Salil Kanhere5, Jatinder Singh6, Ala Al-Fuqaha7, Umar Janjua8, Adnan Noor Mian9, Junaid Qadir10, and Jon Crowcroft11 1,8,9,10Information Technology University (ITU), Punjab, Pakistan 2,6,11Computer Laboratory, University of Cambridge, United Kingdom 3Computer & Information Science Dept., Fordham University, NY USA 4University of Southern Queensland, Australia 5University of New South Wales, Australia 7Hamad Bin Khalifa University, Qatar; Western Michigan University, USA Abstract—Blockchain is challenging the status quo of the can benefit from blockchain as it creates transparency and trust central trust infrastructure currently prevalent in the Internet in interactions among the stakeholders without involving any towards a design principle that is underscored by decentral- third party. That is the reason why industries such as transport, ization, transparency, and trusted auditability. In ideal terms, blockchain advocates a decentralized, transparent, and more energy sector, insurance, finance, and logistics have started to democratic version of the Internet. Essentially being a trusted and show their interest in blockchain technology to automate their decentralized database, blockchain finds its applications in fields solutions [2]–[5]. as varied as the energy sector, forestry, fisheries, mining, material It can be observed that although the onset of the Internet recycling, air pollution monitoring, supply -
Blockchain for the Trustworthy Decentralized Web Architecture
International Journal of Internet, Broadcasting and Communication Vol.13 No.1 26-36 (2021) http://dx.doi.org/10.7236/IJIBC.2021.13.1.26 IJIBC 21-1-4 Blockchain for the Trustworthy Decentralized Web Architecture Geun-Hyung Kim Professor, Game Engineering Major, Dong-eui University, Korea [email protected] Abstract The Internet was created as a decentralized and autonomous system of interconnected computer networks used for data exchange across mutually trusted participants. The element technologies on the Internet, such as inter-domain and intra-domain routing and DNS, operated in a distributed manner. With the development of the Web, the Web has become indispensable in daily life. The existing web applications allow us to form online communities, generate private information, access big data, shop online, pay bills, post photos or videos, and even order groceries. This is what has led to centralization of the Web. This centralization is now controlled by the giant social media platforms that provide it as a service, but the original Internet was not like this. These giant companies realized that the decentralized network’s huge value involves gathering, organizing, and monetizing information through centralized web applications. The centralized Web applications have heralded some major issues, which will likely worsen shortly. This study focuses on these problems and investigates blockchain’s potentials for decentralized web architecture capable of improving conventional web services' critical features, including autonomous, robust, and secure decentralized processing and traceable trustworthiness in tamper-proof transactions. Finally, we review the decentralized web architecture that circumvents the main Internet gatekeepers and controls our data back from the giant social media companies. -
Self-Sovereign Digital Identity Leveraging Blockchain Networks – Opportunities and Challenges
Self-Sovereign Digital Identity Leveraging Blockchain Networks – Opportunities and Challenges By Seetharaman Jeganathan [email protected] www.linkedin.com/in/seetharaman-jeganathan-56418b45/ Self-Sovereign Digital Identity (SSI) is a modern business and technology phenomenon. This article looks at some of the and opportunities it offers as well as the challenges it presents. Abstract a peer-to-peer (P2P) network. The backbone of the P2P network described in the original bitcoin publication is a “Distributed elf-Sovereign Digital Identity (SSI) is a modern business Ledger Technology (DLT)” network commonly referred as and technology phenomenon focusing on enabling indi- Blockchain network. Blockchain is presently viewed as the next viduals (personas) to own, control, and safeguard their generation of the Internet and is also referred to as a Decen- Sdigital identity in the online/cyber space. Verifying and vali- tralized Web or the Web3. It is a decentralized database that dating an individual’s online identity is more important now, handles a growing number of digital transactions which are more than ever, in order to conduct business online securely, cryptographically secured for data confidentiality and integrity. and to comply with the legal and regulatory requirements of It removes the need for a third party, or middleman, to validate any industry. Due to widespread digital adoption and transfor- the transactions in the network. Instead, these transactions are mation, technology has been a significant part of many people validated by the P2P network participants and stored in the in their daily life. While it simplifies personal and business ledger network as individual blocks. -
Sovrin: a Protocol and Token for Self-Sovereign Identity & Decentralized Trust Pg 2 of 42 PART ONE
Sovrin™: A Protocol and Token for Self- Sovereign Identity and Decentralized Trust A White Paper from the Sovrin Foundation Version 1.0 January 2018 Abstract Digital identity is one of the oldest and hardest problems on the Internet. There is still no way to use digital credentials to prove our online identity the same way we do in the offline world. This is finally changing. First, the World Wide Web Consortium is standardizing the format of digitally-signed credentials. Secondly, public blockchains can provide decentralized registration and discovery of the public keys needed to verify digital signatures. These two steps pave the way to establish a global public utility for self-sovereign identity—lifetime portable digital identity that does not depend on any central authority and can never be taken away. The Sovrin Network has been designed exclusively for this purpose, including governance (the Sovrin Foundation and the Sovrin Trust Framework), scalability (validator and observer nodes and state proofs), and accessibility (minimal cost and maximum availability). Most importantly, Sovrin implements Privacy by Design on a global scale, including pairwise pseudonymous identifiers, peer-to-peer private agents, and selective disclosure of personal data using zero-knowledge proof cryptography. The emergence of this infrastructure can transform at least four major markets: identity and access management, cybersecurity, RegTech, and data integration. To provide economic incentives for credential issuers, owners, and verifiers, the Sovrin protocol will incorporate a digital token designed expressly for privacy-preserving value exchange. The Sovrin token should enable a global marketplace for digital credentials of all types and value levels together with ancillary markets for digital credential insurance and permissioned first party data (direct from the customer). -
THE GREAT DECENTRALIZATION: HOW WEB 3.0 WILL WEAKEN COPYRIGHTS Amendment Protection in These Cases
[15:117 2015] The Conflict Between an Athlete's 135 Right of Publicity and the First Amendment THE JOHN MARSHALL REVIEW OF INTELLECTUAL PROPERTY LAW V. CONCLUSION A celebrity’s fame is a valuable commodity.149 Celebrities, including professional athletes, have used that commodity in conjunction with modern technology and the media to become brand names.150 Fantasy sports providers have been licensing athletes’ publicity to promote their own product and gain a commercial advantage within their respective businesses.151 Recently, however, these providers began claiming they have a First Amendment fair use exception that allows them to use the athletes’ identities.152 Courts must determine whether fantasy sports providers should have to pay lucrative licensing agreements and clearly define the scope of First THE GREAT DECENTRALIZATION: HOW WEB 3.0 WILL WEAKEN COPYRIGHTS Amendment protection in these cases. The courts should consider implementing a test that factors in the First Amendment defense, but still considers a purely commercial NICK VOGEL use as infringement. However, these fantasy sports cases are mere illustrations of the problems inherent in allowing disparate state laws to govern actions that take place on a ABSTRACT national scale.153 The major branches of intellectual property have each implemented federal statutes to govern them.154 Congress should recognize the conflict between the Bitcoin’s popularity increased as its value increased and people became excited about the prospect of First Amendment and state publicity laws. Federal law would avoid both the problem a trustless, decentralized currency that could be used on the Internet. Within the last two years, of federal courts expanding state law or even applying the wrong state’s laws. -
Running Head: PEER-TO-PEER DECENTRALIZED PLATFORMS
Running head: PEER-TO-PEER DECENTRALIZED PLATFORMS Peer-to-Peer Decentralized Social Media Platform Using Second-Layer Blockchain Technology Tristan Lamonica Thesis submitted to the University of Ottawa in partial fulfillment of the requirements for the Master of Arts Communication Department of Communications Faculty of Arts University of Ottawa © Tristan Lamonica, Ottawa, Canada, 2020 Running head: PEER-TO-PEER DECENTRALIZED PLATFORMS ii Acknowledgements I would love to express my gratitude to Dr. Constance Crompton, my thesis supervisor, for her mentoring throughout my undergraduate and graduate degree at the University of Ottawa. My journey into academia was filled with invaluable experiences and friendships due to her inclusion, openness, and expertise. Thank you for taking me on as your student, and for providing me with unparalleled assistance. I would also like to thank Dr. Jada Watson for her diligent and valuable insight into my research. In addition to being a crucial part of my academic journey, Dr. Watson’s courses reinvigorated my academic curiosity and pushed me to pursue further intellectual challenges. Additionally, I want to thank Dr. Stefanie Haustein who not only had a big impact on my academic trajectory for the same reasons mentioned above but my professional development as well. Through my time as her research assistant, and a student in her classes, I gained incredible knowledge that completely opened a career path for me and I owe much of my success to her teachings. I would also like to thank my family and friends who supported me along the way, and a special thank you to my mother Sylvie and father Gord who pushed me to continue challenging myself intellectually. -
Decentralized Identity Management for Public Transporation
Decentralized Identity Management for Public Transporation Authors Georgios Kokosioulis (121735) & Lukas Stockburger (121695) Programme MSc Business Administration and E-Business Course Master's Thesis Place, Date Copenhagen, 16.03.2020 Supervisor Raghava Rao Mukkamala Pages/Characters 98/192.244 Table of Contents Table of Contents _________________________________________________________________________________________ 1 Table of Figures ___________________________________________________________________________________________ 4 Table of Tables ____________________________________________________________________________________________ 5 Table of Abbreviations ___________________________________________________________________________________ 6 Abstract _____________________________________________________________________________________________________ 7 1. Introduction _____________________________________________________________________________________________ 8 1.1 Motivation _____________________________________________________________ 10 1.2 Current State of Public Transportation ______________________________________ 12 1.3 Current State of Digital Identity Management _________________________________ 13 1.4 Blockchain Technology in Identity Management ______________________________ 14 1.5 Problem Formulation ____________________________________________________ 16 1.6 Scope ________________________________________________________________ 18 1.6.1 Aim _______________________________________________________________ 18 1.6.2 Delimitations -
Crypto, What Is It Good For? an Overview of Cryptocurrency Use Cases
Global Future Council on Cryptocurrencies Crypto, What Is It Good For? An Overview of Cryptocurrency Use Cases DECEMBER 2020 Cover/Inside: spainter_vfx/Getty Images Contents 3 Foreword 4 1 Base layer blockchain and cryptocurrencies 5 Bitcoin 6 Ethereum 7 Ripple 8 Tezos 9 Celo 10 Litecoin 11 Zcash 12 Filecoin 13 Arweave 14 2 Second layer protocols 15 Bancor 16 Lightning 17 Compound Protocol 18 Uniswap 19 Etherisc 20 OMG Network 21 3 Financial products and services 22 XBT Provider 23 Deutsche Bank 24 BitGo 25 Gemini 26 Cowrie 27 Binusu 28 Metamask 29 Ripio 30 PayPal 31 LocalBitcoins 32 4 Non-financial applications and services 33 Rally 34 SuperRare 35 UNICEF CryptoFund 36 World Food Programme © 2020 World Economic Forum. All rights reserved. No part of 37 Acknowledgements this publication may be reproduced or transmitted in any form or by any means, including photocopying and recording, or by 37 Contributors any information storage and retrieval system. Crypto, What Is It Good For? An Overview of Cryptocurrency Use Cases 2 December 2020 Crypto, What Is It Good For? An Overview of Cryptocurrency Use Cases Foreword Over a decade ago, a white paper by Satoshi communities that upgrade, maintain and operate Nakamoto was distributed to a cryptography them. Innovators, entrepreneurs and engineers mailing list outlining a novel proposal for a “peer- are rapidly building and bringing to market new to-peer electronic cash system” called bitcoin. This products and solutions that provide access to or innovation spurred a new, global industry and asset leverage these new networks. class that has created hundreds of billions of dollars in value, and inspired a generation of entrepreneurs The World Economic Forum Global Future and innovators. -
Candid: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
1 CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability Deepak Maram∗{, Harjasleen Malvaiy{, Fan Zhang∗{, Nerla Jean-Louisz{, Alexander Frolovy{, Tyler Kell∗{, Tyrone Lobbanx, Christine Moyx, Ari Juels∗{, Andrew Millerz{ ∗Cornell Tech, yCornell University, zUIUC, xJ. P. Morgan, {IC3, The Initiative for CryptoCurrencies & Contracts Abstract—We present CanDID, a platform for practical, user- 1) Legacy compatibility: Most proposed decentralized identity friendly realization of decentralized identity, the idea of empow- systems presume the existence of a community of issuers ering end users with management of their own credentials. of digitally signed credentials. But such issuers may not While decentralized identity promises to give users greater control over their private data, it burdens users with management arise—and existing credential issuers may not begin to of private keys, creating a significant risk of key loss. Existing and issue digitally signed variants of existing credentials—until proposed approaches also presume the spontaneous availability DID infrastructure sees use. The result is a bootstrapping of a credential-issuance ecosystem, creating a bootstrapping problem. A big impediment to DID adoption is the inability problem. They also omit essential functionality, like resistance to of proposed systems to leverage the data on users available Sybil attacks and the ability to detect misbehaving or sanctioned users while preserving user privacy. in existing web services that don’t issue credentials. CanDID addresses these challenges by issuing credentials 2) Sybil-resistance: Proposed decentralized identity systems in a user-friendly way that draws securely and privately on do not deduplicate user identities. Unique per-user iden- data from existing, unmodified web service providers. -
A Decentralized Information Sharing Platform Based on Blockchain
Infnote: A Decentralized Information Sharing Platform Based on Blockchain Haoqian Zhang1, Yancheng Zhao2, Abhishek Paryani3, Ke Yi4 Computer Since & Engineering Department The Hong Kong University of Science and Technology Hong Kong, China Email: f1haoqian.zhang,[email protected], [email protected], [email protected] Abstract—Internet censorship has been implemented in several deep packet inspection or white-listing on gateway firewalls. countries to prevent citizens from accessing information and to Sneakernet allows a user to access information under any level suppress discussion of specific topics. This paper presents Infnote, of censorship, but it cannot guarantee validated information. a platform that helps eliminate the problem of sharing content in these censorship regimes. Infnote is a decentralized information Peer-to-peer networks provide an approach to transferring data sharing system based on blockchain and peer-to-peer network, within the boundaries of censorship regions and there is no aiming to provide an easy-to-use medium for users to share their single point of failure, making it difficult to block. ZeroNet [4] thoughts, insights and views freely without worrying about data is a peer-to-peer web hosting project, based on the BitTorrent tampering and data loss. Infnote provides a solution that is able protocol, which can be used to circumvent Internet censorship, to work on any level of Internet censorship. Infnote uses multi- chains architecture to support various independent applications but the ZeroNet site owners have full control over the content or different functions in an application. of their websites. This paper will apply blockchain techniques to circumvent Internet censorship. -
Crypto Currency & Blockchain Technology: a Decentralized Future
RBC Capital Markets, LLC Mitch Steves (Analyst) (415) 633-8535 [email protected] January 3, 2018 Crypto Currency & Blockchain Technology: A Decentralized Future A Potential Multi-Trillion Dollar Opportunity The $10tril Bull Case: While the Crypto-Currency space has many risks, the opportunity appears vast with constant technology updates. With a rapid rise in prices we outline the bull case for building a EQUITY RESEARCH decentralized future: 1) A Secure World Computer: a decentralized world computer without a third-party intermediary. If there is one positive technology item that we can agree on, it is that the Blockchain has never been hacked. What happens if we build on top of this secure layer?; 2) Store of Value: this is the most commonly cited use case for crypto currencies and the least interesting, in our view: offshore accounts valued at an estimated ~$21 trillion and gold at $8 trillion; 3) International Remittance: the sending of payments overseas estimated at half a trillion dollars per year; 4) “Fat Protocols”: ability to own the protocol layer which increases in value as the applications grow – reverse model compared to today’s environment; 5) Mining: computing power being used to secure the network through Proof- of-Work which is currently a multi-billion dollar market; and 6) Improved scaling: development efforts (including Lightning Network) appear on track to deliver scaling that accommodates higher transactions/ second, ultimately driving higher utility and network value. Net Net: by utilizing decentralized computing and opensource software, we see a multi-trillion dollar market emerging. RBC Will Host a Crypto-Currency Call On January 19 with Alex Rampell, General Partner at Andreessen Horowitz • Central vs. -
The Nail Finds a Hammer
October 2018 The Nail Finds a Hammer Self-Sovereign Identity, Design Principles, and Property Rights in the Developing World Michael Graglia, Christopher Mellon, & Tim Robustelli Last edited on October 17, 2018 at 4:01 p.m. EDT Acknowledgments The authors would like to thank the following individuals for their time and valuable insights: Dr. Sari Stenfors, who sent us on this identity journey; Bob Reid, Brad Witteman, and Mike Kail of Everest; Drummond Reed, Elizabeth Renieris, James Monaghan, Tyler Ru�, and the rest of the Evernym team; Robby Green�eld and Paul Kohlhaas of ConsenSys; Rouven Heck and Alice Nawfal of uPort; Titus Capilnean of Civic; Arjun Raman of Mooti; Paige Nicol of Omidyar Network; Peter Simpson of iRespond; John Jordan of the Government of British Columbia; Chris Worman of TechSoup; Shailee Adinol�; and Kaliya Young, “the Identity Woman.” The majority of the insights here are to their credit, any errors or omissions are entirely the fault of the authors. newamerica.org/future-property-rights/reports/nail-�nds-hammer/ 2 About the Author(s) Michael Graglia is the director of the Future of Property Rights program at New America. Christopher Mellon is a policy analyst with the Future of Property Rights program at New America. Tim Robustelli is a graduate of the MA Program in International Relations at NYU. He is part of the Future of Property Rights Program at New America. About New America We are dedicated to renewing America by continuing the quest to realize our nation’s highest ideals, honestly confronting the challenges caused by rapid technological and social change, and seizing the opportunities those changes create.