This document discusses challenges and solutions for mass adoption of blockchain technology. It outlines four stages of a technology's lifecycle and argues that blockchain is currently in the "ascent" stage. Key barriers to mass adoption are usability and key management problems. It then examines lessons learned, such as making key management trivial and providing incentives to reduce reliance on exchanges. Finally, it presents solutions like multi-level permissions, multisig accounts, distributed key management, and identity layer services to address challenges and enable broader blockchain use.
2. Technology lifecycle
Every new technology goes through similar
stages of growth and decline.
Those phases describes costs vs profits of a
new technology as it matures.
There are four distinct stages: research and
development, ascent, maturity and decline.
You are here
Source: http://oer2go.org/
3. Barriers for Mass Adoption
Crossing “The Chasm”: Good Usability “UX” and Key Management problem.
Source: http://oer2go.org/
5. Lost private keys
● Private keys are frequently lost
○ Fishing attacks
○ Mismanagement
○ Accidental deletion
○ Hard drive failure
○ Failing to take backup
○ Losing physical note paper / usb stick
○ etc..
● There is no “reset your private key” functionality
6. Lessons learned
● Humans are the weakest link in Blockchain
● We don’t need/can’t teach people cryptography
● People prefer “easy” and “convenient”
● Integrate with existing authentication mechanisms
● Lost key recovery mechanism needed
● Make managing your own account trivial
● Create incentives for people to move funds from exchanges
7. BTC | ETH Key EOSIO Key
Your lock and key are made to match.
Key can not be changed!
Two lock secrets can be installed.
Keys can be changed!
8. Multi-level permissions on account
If Active key is compromised - the owner can minimize damage by using
his Owner key to reset/change the Active key.
9. Multisig model for an account
Owner permission shared by a set of guardians, user keeps active key.
Guardians can collectively change active key when lost.
10. Distributed Key Management
• Distributed cryptography - no
single point of compromise
• Key material is never in the
clear
• Supports any device and
platform
• Async approval of transactions
• Ledger Agnostic
• Sophisticated MofN Quorums
11. 11
Never Whole. Never Compromised.
Keys Protected by Math, Not Matter
You can’t steal what isn’t there…
Each private key exists
as two separate random shares
stored on separate locations &
refreshed constantly
Key shares are never
combined at any point
in time – not even when
used or when created
Key material never exists in
the clear at any point of
its lifecycle
1 2 3
12. New Blockchain Model
Blockchain layer
Identity layer
Internet
Physical Network
dApps
Transport
Session
Internet
Physical Network
Application
TCP/IP StackBlockchain Stack
13. AIKON’s ORE ID for Identity layer
Oauth Login for Blockchain as a solution for mass adoption
15. Challenges ahead
● Making solution that both secure and usable
● Applying different levels of security
● Hiding complexity for ordinary users with smaller balances
● Providing flexibility to enterprises for increased security