Thesis Is the Result of My Own Work and Includes Nothing Which Is the Outcome of Work Done in Collaboration Except As Declared in the Preface and Specified in the Text

Total Page:16

File Type:pdf, Size:1020Kb

Thesis Is the Result of My Own Work and Includes Nothing Which Is the Outcome of Work Done in Collaboration Except As Declared in the Preface and Specified in the Text Decentralised computer systems Mansoor Anwar Ahmed University of Cambridge Department of Computer Science and Technology Queens' College January 2021 This dissertation is submitted for the degree of Doctor of Philosophy Declaration This thesis is the result of my own work and includes nothing which is the outcome of work done in collaboration except as declared in the Preface and specified in the text. I further state that no substantial part of my thesis has already been submitted, or, is being concurrently submitted for any such degree, diploma or other qualification at the University of Cambridge or any other University or similar institution except as declared in the Preface and specified in the text. It does not exceed the prescribed word limit for the relevant Degree Committee. Decentralised computer systems Mansoor Anwar Ahmed Summary The architecture of the Web was designed to enable decentralised exchange of in- formation. Early architects envisioned an egalitarian yet organic society thriving in cyberspace. The reality of the Web today, unfortunately, does not bear out these vi- sions: information networks have repeatedly shown a tendency towards consolidation and centralisation with the current Web split between a handful of large corporations. The advent of Bitcoin and successor blockchain networks re-ignited interest in de- veloping alternatives to the centralised Web and paving a way back to the earlier archi- tectural visions for the Web. This has led to immense hype around these technologies with the cryptocurrency market valued at several hundred billions of dollars at the time of writing. With great hype, apparently, come great scams. I start off by analysing the use of Bitcoin as an enabler for crime and then present both technical solutions as well as policy recommendations to mitigate the harm these crimes cause. These policy recommendations then lead us on to look more closely at cryptocur- rency's tamer cousin: permissioned blockchains. These systems, while less revolutionary in their premise, nevertheless aim to provide sweeping improvements in the efficiency and transparency of existing enterprise systems. To see whether they work in practice, I present the results of my work in delivering a production permissioned blockchain sys- tem to real users. This involves comparing several permissioned blockchain systems, exploring their deficiencies and developing solutions for the most egregious of those. Lastly, I do a deep dive into one of the most persistent technical issues with permis- sioned blockchains, and decentralised networks in general: the lack of scalability in their consensus mechanisms. I present two novel consensus algorithms that aim to improve upon the state of the art in several ways. The first is designed to enable existing per- missioned blockchain networks to scale to thousands of nodes. The second presents an entirely new way of building decentralised consensus systems utilising a trie-based data structure at its core as opposed to the usual linear ledgers used in current systems. \The roots below the earth claim no rewards for making the branches fruitful." |Rabindranath Tagore, Stray Birds Acknowledgements A lot of people have directly and indirectly contributed to the completion of this thesis. I would like to start by thanking my supervisor, Ross Anderson, for giving me free reign over the research agenda and for pushing me to look beyond the traditional confines of computer science and see the broader context in which computer systems operate. I would also like to thank my examiners, Rainer B¨ohmeand Jon Crowcroft, for their helpful feedback and proactive engagement with this thesis. I would like to acknowledge nCipher Security and TODAQ for generously funding portions of my PhD. Thanks are due to Ilia Shumailov, my fellow PhD and frequent co-author, for helping me convert chats around the coffee table into full-fledged papers. I would also like to thank Alastair Beresford and the Digital Technology Group for supporting me through- out the PhD and for helping me find an academic community I could feel a part of. I am grateful to the founding engineering team at Jitsuin (Robin Bryce, Jon Geater, John Hartley and Waldemar Parzonka) for trusting a na¨ıve academic like me with building a production system and helping me understand real-world software engineering. I owe a lot to Dann Toliver who has not only been a co-author but also a mentor and a friend; our weekly calls were the highlight of my work over these three years. Outside of the lab, there are more people to thank than the word limit allows me to mention. Starting off with the fantastic people I met at Queens' college: I am fortunate to consider Andrea Wessendorf a friend; she has been a patient listener and a source of benevolent peer pressure throughout this thesis. Another gem of a person that I've had the pleasure of knowing is Jasper Ma who has the distinction of not just being the best man but also the \minister" at my wedding. Elizabeth Weir has helped more than she knows, sharing many a warm cup over many a dreary day. I would be remiss if I didn't mention Apolline Blandin, Dante McGrath, Francesca van Tartwijk, Joe Stallard and Jolly Dusabe who have, in their own way, brought me joy. Next on the list are my fellow writers from the Creative Writing Sessions. Rhian Holvey, Maria Bolson, Grace Rosemin, Matt Cooper, Emily Sandford, Sophia Cameron- Christie and the rest of the group have been a constant source of camaraderie and support. No matter how difficult a given week might have been, our writing sessions and meandering conversations never failed to bring back some light. My parents, Asma and Anwar Ahmed, have always pushed me towards academic excellence and deciding to pursue this thesis is no doubt a direct consequence of that. My sister, Sarah Ahmed, has always been the invisible support structure that kept me safe even when I didn't realise it. Lastly, words cannot express my gratitude to whatever vagaries of the universe led to me meeting my wife, Emma. She is my family, my inspiration and my home. This thesis is dedicated to her and my sister. Contents 1 Preface 11 1.1 Declaration . 12 1.2 Contributions . 13 1.2.1 Textbook . 13 1.2.2 Academic papers . 13 1.2.3 Patents . 14 1.2.4 Invited talks . 15 1.2.5 Outreach and open source . 15 2 Background 17 2.1 The Promised Land . 17 2.1.1 2020 hindsight . 19 2.1.2 Problems with centralisation . 20 2.1.2.1 Single point of failure . 21 2.1.2.2 Power dynamics . 23 2.2 A new hope . 24 2.2.1 Bitcoin primer . 24 2.2.2 Ethereum and altcoins . 25 2.3 Next steps for the blockchain . 26 2.3.1 Out of the trough . 27 2.3.2 My contributions . 27 3 Mitigating cryptocurrency-enabled crime 29 3.1 Bitcoin and crime . 29 3.2 What the law says . 31 3.3 Bitcoin tracing . 32 3.3.1 Bitcoin mixing . 33 3.3.2 TaintChain: practical FIFO tracing . 35 3.4 Finding patterns in the noise . 37 3.4.1 Preliminary model . 37 3.4.1.1 Limitations of the preliminary model . 38 3.4.2 Interactive visualisation . 39 5 3.4.3 Other visualisation tools . 41 3.4.4 Future work for taint visualisation . 42 3.5 Understanding the theft reporting ecosystem . 42 3.5.1 Incentives of the taint tracking ecosystem . 42 3.5.2 Theft reporting in practice . 44 3.6 How the market really works now . 44 3.6.1 Who owns the bitcoin stock anyway? . 45 3.6.2 Off-chain transactions . 47 3.6.3 The E-Money Directive . 48 3.6.4 Directive PE CONS 72/17 . 50 3.6.5 Positions of UK stakeholders . 51 3.7 Policy recommendations . 52 3.7.1 Regulated exchanges . 52 3.7.2 Consumer protection . 53 3.7.3 Unregistered exchanges . 53 3.7.4 Innovation and the role of central bank cryptocurrency . 55 3.7.5 Nature of ownership . 57 3.7.6 Dark market currencies . 58 3.7.7 Capital requirements . 60 3.7.8 Mitigating environmental harm . 60 3.8 Conclusion . 61 4 Taming the blockchain 65 4.1 Why permissioned? . 66 4.1.1 Issues with permissionless blockchains . 66 4.1.2 Permissioned blockchain primer . 68 4.1.3 What is the point? . 69 4.2 Comparison of permissioned blockchain frameworks . 69 4.2.1 Hyperledger Fabric . 70 4.2.2 Hyperledger Sawtooth . 71 4.2.3 Hyperledger Burrow . 72 4.2.4 Hyperledger Iroha . 72 4.2.5 Hyperledger Besu . 73 4.2.6 JP Morgan Quorum . 73 4.2.7 R3 Corda . 73 4.2.8 Other permissioned models . 74 4.3 Blockchain archival . 75 4.3.1 Regenesis overview . 76 4.3.2 Regenesis request . 77 4.3.3 Transition block . 77 4.3.4 Regenesis block . 78 6 4.3.5 Validation . 78 4.3.6 Dealing with state . 78 4.4 Modifiable storage . 79 4.4.1 Modifiable transactions overview . 80 4.4.2 Modification request . 80 4.4.3 Processing a modification transaction . 81 4.4.4 Validating a chain with modified transactions . 81 4.5 Conclusion . 82 5 Scaling blockchain consensus 83 5.1 Motivation . 84 5.1.1 Naive random selection . 84 5.1.2 Sophisticated random selection . 84 5.1.3 Selection using TEEs . 86 5.1.4 A deterministic approach to consensus . 87 5.2 Robust Round Robin overview . 88 5.2.1 Assumptions . 89 5.2.2 Identity creation . 89 5.2.3 Starting point: deterministic selection . 90 5.2.3.1 Security and liveness challenges .
Recommended publications
  • Blockchain in the Integrated Energy Transition
    dena MULTI-STAKEHOLDER STUDY Blockchain in the integrated energy transition Study findings (dena) Blockchain in the integrated energy transition energy in the integrated Blockchain dena MULTI-STAKEHOLDER STUDY STUDY dena MULTI-STAKEHOLDER Legal information Publisher: All content has been prepared with the greatest possible care Deutsche Energie-Agentur GmbH (dena) and is provided in good faith. dena provides no guarantee for German Energy Agency the currency, accuracy, or completeness of the information Chausseestrasse 128 a provided. dena shall not be liable for damages of a material 10115 Berlin, Germany or intangible nature resulting from the use or non-use of the Tel.: + 49 (0)30 66 777-0 information provided, whether indirectly or directly, unless Fax: + 49 (0)30 66 777-699 proof of intentional or grossly negligent culpability on its part www.dena.de is provided. Authors: All rights reserved. Consent from dena is required for any use. Philipp Richard (dena) Sara Mamel (dena) Lukas Vogel (dena) Scientific experts: Prof. Dr. Jens Strüker (INEWI) Dr. Ludwig Einhellig (Deloitte) Last updated: 02/2019 Conception & design: Heimrich & Hannot GmbH Content Foreword 4 Executive summary 6 The dena multi-stakeholder study “Blockchain in the integrated energy transition” 6 Recommended courses of action 8 Checklist for blockchain in the integrated energy transition 10 Technical findings 12 Economic findings 14 Regulatory findings 17 1 Blockchain in the integrated energy transition 20 2 Blockchain technology: status quo and development prospects
    [Show full text]
  • Beauty Is Not in the Eye of the Beholder
    Insight Consumer and Wealth Management Digital Assets: Beauty Is Not in the Eye of the Beholder Parsing the Beauty from the Beast. Investment Strategy Group | June 2021 Sharmin Mossavar-Rahmani Chief Investment Officer Investment Strategy Group Goldman Sachs The co-authors give special thanks to: Farshid Asl Managing Director Matheus Dibo Shahz Khatri Vice President Vice President Brett Nelson Managing Director Michael Murdoch Vice President Jakub Duda Shep Moore-Berg Harm Zebregs Vice President Vice President Vice President Shivani Gupta Analyst Oussama Fatri Yousra Zerouali Vice President Analyst ISG material represents the views of ISG in Consumer and Wealth Management (“CWM”) of GS. It is not financial research or a product of GS Global Investment Research (“GIR”) and may vary significantly from those expressed by individual portfolio management teams within CWM, or other groups at Goldman Sachs. 2021 INSIGHT Dear Clients, There has been enormous change in the world of cryptocurrencies and blockchain technology since we first wrote about it in 2017. The number of cryptocurrencies has increased from about 2,000, with a market capitalization of over $200 billion in late 2017, to over 8,000, with a market capitalization of about $1.6 trillion. For context, the market capitalization of global equities is about $110 trillion, that of the S&P 500 stocks is $35 trillion and that of US Treasuries is $22 trillion. Reported trading volume in cryptocurrencies, as represented by the two largest cryptocurrencies by market capitalization, has increased sixfold, from an estimated $6.8 billion per day in late 2017 to $48.6 billion per day in May 2021.1 This data is based on what is called “clean data” from Coin Metrics; the total reported trading volume is significantly higher, but much of it is artificially inflated.2,3 For context, trading volume on US equity exchanges doubled over the same period.
    [Show full text]
  • The Mont Pelerin Society
    A SPECIAL MEETING THE MONT PELERIN SOCIETY JANUARY 15–17, 2020 FROM THE PAST TO THE FUTURE: IDEAS AND ACTIONS FOR A FREE SOCIETY CHAPTER FORTY-ONE CHINA, GLOBALIZATION, CAPITALISM, SILICON VALLEY, POLITICAL CORRECTNESS, AND EXCEPTIONALISM PETER THIEL & PETER ROBINSON HOOVER INSTITUTION • STANFORD UNIVERSITY 1 1 China, Globalization, Capitalism, Silicon Valley, Political Correctness, and Exceptionalism A Conversation Between Peter Theil and Peter Robinson January 17, 2020 Peter Robinson: The late economist and foreign policy analyst Hoover fellow Henry Rowen writing in 1996, quote, "When will China become a democracy? "The answer is around the year 2015. "This prediction is based on China's steady "and impressive economic growth, "which in turn fits the pattern of the way in which freedom "has grown in Asia and elsewhere in the World." Worked in South Korea, worked in Taiwan. Economic growth leads to democracy. In China, what went wrong? Peter Thiel: Well, Peter, this is always a set up for me to start by both flattering you and criticizing you a little bit, since there was that very famous Reagan speech you gave, that you wrote for Reagan, where it was, you know, tear down that wall, Mr. Gorbachev, and it was very effective. But it was perhaps, it was not only in the West that we learned lessons from it, the Chinese communists also paid very careful attention to it, and they learned that you had to have perestroika without glasnost. You had to get rid of the Marxism without getting rid of the Leninism, and they learned somehow the very opposite lessons of that fateful year 1989.
    [Show full text]
  • DFINITY Technology Overview Series Consensus System
    DFINITY Technology Overview Series Consensus System Rev.1 Timo Hanke, Mahnush Movahedi and Dominic Williams ABSTRACT Dfinity will be introduced in a series of technology overviews, The Dfinity blockchain computer provides a secure, performant each highlighting an independent innovation in Dfinity such as and flexible consensus mechanism. While first defined for a permis- the consensus backbone, smart contract language, virtual machine, sioned participation model, the consensus mechanism itself can be concurrent contract execution model, daemon contracts, peer-to- paired with any method of Sybil resistance (e.g. proof-of-work or peer networks and secure broadcast, governance mechanism and proof-of-stake) to create an open participation model. Dfinity’s scaling techniques. The present document will focus on the con- greatest strength is unfolded in the most challenging proof-of-stake sensus backbone and cryptographic randomness. case. Dfinity has an unbiasable, verifiable random function (VRF) At its core, Dfinity contains a decentralized randomness beacon built-in at the core of its protocol. The VRF not only drives the which acts as a verifiable random function (VRF) that produces a consensus, it will also be the foundation for scaling techniques such stream of outputs over time. The novel technique behind the beacon as sharding, validation towers, etc. Moreover, the VRF produced relies on the existence of a unique-deterministic, non-interactive, by the consensus layer is available to the application layer, i.e., to DKG-friendly threshold signatures scheme. The only known ex- the smart contracts and virtual machine. In this way, the consensus amples of such a scheme are pairing-based and derived from BLS backbone is intertwined with many of the other topics.
    [Show full text]
  • Initial Crypto-Asset Offerings (Icos), Tokenization and Corporate Governance Stéphane Blémus, Dominique Guegan
    Initial Crypto-asset Offerings (ICOs), tokenization and corporate governance Stéphane Blémus, Dominique Guegan To cite this version: Stéphane Blémus, Dominique Guegan. Initial Crypto-asset Offerings (ICOs), tokenization and corpo- rate governance. 2019. halshs-02079171 HAL Id: halshs-02079171 https://halshs.archives-ouvertes.fr/halshs-02079171 Submitted on 25 Mar 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Documents de Travail du Centre d’Economie de la Sorbonne Initial Crypto-asset Offerings (ICOs), tokenization and corporate governance Stéphane BLEMUS, Dominique GUEGAN 2019.04 Maison des Sciences Économiques, 106-112 boulevard de L'Hôpital, 75647 Paris Cedex 13 https://centredeconomiesorbonne.univ-paris1.fr/ ISSN : 1955-611X Initial Crypto-asset Offerings (ICOs), tokenization and corporate governance Stéphane Blemus* & Dominique Guégan** * Paris 1 Panthéon-Sorbonne University, LabEx ReFi, Kalexius law firm, ChainTech ** Centre d’Economie de la Sorbonne, Paris 1 Panthéon-Sorbonne University, Labex ReFi, Ca’Foscari University, Venezia, IPAG Business School This interdisciplinary paper by a mathematician and a legal counsel, both from the Paris 1 Panthéon-Sorbonne University, discusses the potential impacts of the so-called “initial coin offerings”, and of several developments based on distributed ledger technology (“DLT”), on corporate governance.
    [Show full text]
  • The Rise & Role of Venture Studios in Healthcare Innovation
    The Rise & Role of Venture Studios in Healthcare Innovation Session # 195, August 12, 2021 Le s Wilkins on Chief Operating Officer, Hashed Health DISCLAIMER: The views and opinions expressed in this presentation are solely those of the author/presenter and do not necessarily represent any policy or position of HIMSS. 1 Welcome Le s Wilkins on Chief Operating Officer, Hashed Health #HIMSS21 2 Conflict of Interest Les Wilkinson, COO, Hashed Health Has no real or apparent conflicts of interest to report. #HIMSS21 3 Agenda • Current State of Innovation. • Studios are innovating innovation. • Studio value proposition. • Studio characteristics and structure. • Studio results. #HIMSS21 4 Learning Objectives – By the end of this session, the audience will be able to: • State common reasons healthcare startups fail and how new innovation models can de-risk the innovation process. • Describe traditional corporate innovation challenges in her/his own words. • Design a venture studio process for moving ideas to commercialization. • Apply the principles of a venture studio process to their own innovation efforts. • Identify how to differentiate between accelerators, incubators, corporate innovation programs and new venture studio models. • Recognize whether a venture studio model could be a fit for their organization. #HIMSS21 5 Startup Mythology The Garage 6 Startup Reality >90% 75% 1% Percentage of Venture Backed Startup Failure Rate Companies that NEVER Return Cash Odds of achieving Unicorn Status to Investors Source: Startup Genome, 2019 Source: CBInsights Report Source: Failory #HIMSS21 7 No Market Need Ran Out of Cash Poor User Experience Why Not the Right Team Startups Fail Pricing and COGS Competition Source: CBInsights #HIMSS21 8 Innovation is a Priority for Enterprise .
    [Show full text]
  • The Convergence Ecosystem
    The Convergence Ecosystem Convergence 2.0 Building the Decentralised Future This document (the “Document”) has been prepared by Outlier Ventures Operations Disclaimer Limited (“Outlier Ventures”). Outlier Ventures Operations Ltd is registered in England and Wales, company registration number 10722638. Outlier Ventures Operations Ltd is an appointed representative of Sapia Partners LLP (“Sapia”) which is authorised and regulated by the Financial Conduct Authority (Firm Reference Number 550103). No undertaking, warranty or other assurance is given, and none should be implied, as to, and no reliance should be placed on, the accuracy, completeness or fairness of the information or opinions contained in this Document. The information contained in the Document is not subject to completion, alteration and verification nor should it be assumed that the information in the Document will be updated. The information contained in the Document has not been verified by Sapia, Outlier Ventures or any of its associates or affiliates. The Document should not be considered a recommendation by Sapia, Outlier Ventures or any of its directors, officers, employees, agents or advisers in connection with any purchase of or subscription for securities. Recipients should not construe the contents of this Document as legal, tax, regulatory, financial or accounting advice and are urged to consult with their own advisers in relation to such matters. The information contained in the Document has been prepared purely for informational purposes. In all cases persons should conduct their own investigation and analysis of the data in the Document. The information contained in the Document has not been approved by the Financial Conduct Authority. This Document does not constitute, or form part of, any offer of, or invitation to apply for, securities nor shall it, or the fact of its distribution, form the basis of or be relied upon in connection with any contract or commitment to acquire any securities.
    [Show full text]
  • View the Slides
    Pixel: Multi-Signatures for Consensus Manu Drijvers (DFINITY) Sergey Gorbunov (Algorand & University of Waterloo) Gregory Neven (DFINITY) Hoeteck Wee (Algorand & CNRS, ENS, PSL) 1 Permissioned/Proof-of-Stake Blockchains Consensus: nodes agree on sequence of blocks Proof of stake (PoS): nodes vote on block proposals, weighted by stake e.g., Algorand, Cardano, Ethereum Casper Permissioned: nodes vote by access structure e.g., Ripple, Hyperledger Fabric Permissioned/Proof-of-Stake Blockchains Consensus: nodes agree on sequence of blocks Proof of stake (PoS): nodes sign block proposals, weighted by stake e.g., Algorand, Cardano, Ethereum Casper Permissioned: nodes sign by access structure e.g., Ripple, Hyperledger Fabric Multi-Signatures in Blockchains single multi-signature Σ under pk1,...,pkn on m short signature, efficient verification (preferably ≈ single signature) [IN83, OO91, MOR01, BLS01, B03, BN06, BDN18, ...] The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption: ≤ fraction f of nodes/stake corrupt The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption: ≤ fraction f of nodes/stake corrupt The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption: ≤ fraction f of nodes/stake signing keys corrupt The Problem of Posterior Corruption [BPS16] aka long-range attacks [B15], costless simulation [P15] Chain integrity assumption:
    [Show full text]
  • Facebook Timeline
    Facebook Timeline 2003 October • Mark Zuckerberg releases Facemash, the predecessor to Facebook. It was described as a Harvard University version of Hot or Not. 2004 January • Zuckerberg begins writing Facebook. • Zuckerberg registers thefacebook.com domain. February • Zuckerberg launches Facebook on February 4. 650 Harvard students joined thefacebook.com in the first week of launch. March • Facebook expands to MIT, Boston University, Boston College, Northeastern University, Stanford University, Dartmouth College, Columbia University, and Yale University. April • Zuckerberg, Dustin Moskovitz, and Eduardo Saverin form Thefacebook.com LLC, a partnership. June • Facebook receives its first investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its base of operations to Palo Alto, California. N. Lee, Facebook Nation, DOI: 10.1007/978-1-4614-5308-6, 211 Ó Springer Science+Business Media New York 2013 212 Facebook Timeline August • To compete with growing campus-only service i2hub, Zuckerberg launches Wirehog. It is a precursor to Facebook Platform applications. September • ConnectU files a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three-year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment. April • Venture capital firm Accel Partners invests $12.7 million into Facebook. Accel’s partner and President Jim Breyer also puts up $1 million of his own money.
    [Show full text]
  • Peter Thiel: What the Future Looks Like
    Peter Thiel: What The Future Looks Like Peter Thiel: Hello, this is Peter. James Altucher: Hey, Peter. This is James Altucher. Peter Thiel: Hi, how are you doing? James Altucher: Good, Peter. Thanks so much for taking the time. I’m really excited for this interview. Peter Thiel: Absolutely. Thank you so much for having me on your show. James Altucher: Oh, no problem. So I’m gonna introduce you, but first I wanna mention congratulations your book – by the time your podcast comes out, your book will have just come out, Zero to One: Notes on Startups or How to Build a Future, and, Peter, we’re just gonna dive right into it. Peter Thiel: That’s awesome. James Altucher: So I want – before I break – I wanna actually, like, break down the title almost word by word, but before I do that, I want you to tell me what the most important thing that’s happened to you today because I feel like you’re – like, every other day you’re starting, like a Facebook or a PayPal or a SpaceX or whatever. What happened to you today that you looked at? Like, what interesting things do you do on a daily basis? Peter Thiel: Well, it’s – I don’t know that there’s a single thing that’s the same from day to day, but there’s always an inspiring number of great technology ideas, great science ideas that people are working on, and so even though there are many different reasons that I have concerns about the future and trends that I don’t like in our society and in the larger world, one of the things that always gives me hope is how much people are still trying to do, how many new technologies they’re trying to build.
    [Show full text]
  • PETER THIEL Palantir Technologies; Thiel Foundation; Founders Fund; Paypal Co-Founder
    Program on SCIENCE & DEMOCRACY Science, Technology & Society LECTURE SERIES 2015 HARVARD KENNEDY SCHOOL HARVARD UNIVERSITY PETER THIEL Palantir Technologies; Thiel Foundation; Founders Fund; PayPal co-founder BACK TO THE FUTURE Will we create enough new technology to sustain our society? WITH PANELISTS WEDNESDAY Antoine Picon Travelstead Professor, Harvard Graduate School of Design March 25, 2015 Margo Seltzer Harvard College Professor, School of Engineering and 5:00-7:00pm Applied Sciences Science Center Samuel Moyn Professor of Law and History, Harvard Law School Lecture Hall C 1 Oxford Street MODERATED BY Sheila Jasanoff Harvard University Pforzheimer Professor of Science and Technology Studies CO-SPONSORED BY Program on Harvard University Harvard School of Harvard University Center for the Engineering and Graduate School Science, Technology & Society Environment Applied Sciences of Design HARVARD KENNEDY SCHOOL HARVARD UNIVERSITY http://sts.hks.harvard.edu/ Program on SCIENCE & DEMOCRACY Science, Technology & Society LECTURE SERIES 2015 HARVARD KENNEDY SCHOOL HARVARD UNIVERSITY Peter Thiel is an entrepreneur and investor. He started PayPal in 1998, led it as CEO, and took it public in 2002, defining a new era of fast and secure online commerce. In 2004 he made the first outside investment in Facebook, where he serves as a director. The same year he launched Palantir Technologies, a software company that harnesses computers to empower human analysts in fields like national security and global finance. He has provided early funding for LinkedIn, Yelp, and dozens of successful technology startups, many run by former colleagues who have been dubbed the “PayPal Mafia.” He is a partner at Founders Fund, a Silicon Valley venture capital firm that has funded companies like SpaceX and Airbnb.
    [Show full text]
  • Ensuring Audit Log Accountability Through Hash Based Techniques
    International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012 Ensuring Audit Log Accountability through Hash Based Techniques Rashmita Jena, M. Aparna, Chinmaya Sahu, Rajeev Ranjan, and Rajesh Atmakuri trying to meet his sales requirements for a fiscal year. He Abstract—Audit logs are now considered good practice and a might attempt to change the transaction dates to make it standard approach for business systems. The integrity of the appear that they had transpired within the previous fiscal year auditing records themselves is critical. By simply storing all the when, in reality, they had not. Consider a school database interactions in a separate audit log does not guarantee the where a student who receives a “F” in one of his subjects, in integrity of the log. Data tampering can be done through unauthorized access and in some cases through authorized users. which he needs at least a “B”, could be highly tempted to try Results of such action can be unpleasant for business and their to dishonestly change his grade to a “B” in the database. This clients. Therefore, a demand for audit log security is needed would be an example of a student who would have to hack more than ever. This paper describes a mechanism based on into the system, unless of course the student somehow had cryptographic hash functions and trusted timestamping that access to the database containing the grade. prevents an outsider or inside intruder from silently corrupting The above discussed examples provide just a few of the the audit log. In addition it is shown that the proposed mechanism can be realized in database systems with little reasons why someone might want to tamper with a database.
    [Show full text]