9.30 Welcome on behalf of all challenge-owners (KVK)
9.45 The Odyssey Hackathon – What can you achieve by
participating? (Rutger van Zuidam – CEO of DutchChain &
10.00 Developments in Blockchain, exchanging privacy-
sensitive information and the future of a national digital
infrastructure (Zeki Erkin, Assistant Professor in Cyber
Security and Privacy at Delft University of Technology)
10.30 Challenge 1 by the Dutch Ministry of Justice and
Security – Presentation and Q&A: a Government Backed
Protocol for Digital Permissions (Flores Bakker – Enterprise
Architect for the Ministry of Finance)
11.15 Extra support of IOTA for Challenge 1 (Dave de Fijter,
11.30 Coffee Break and Early Lunch
12.00 Challenge 2 by Dutch Chamber of Commerce –
Becoming an oracle in the Digital Infrastructure of a Nation
(Geerten Verweij, developer of the Dutch Chamber of
Commerce’s Innovation Lab)
12.40 Challenge 3 by Kadaster – Building a Distributed Data
Ecosystem (Nick Apeldoorn, ICT Architect at Kadaster)
13.30 End of plenary program – Ample time to Connect
Rutger Van Zuidam
CEO of DutchChain & Odyssey
THE ODYSSEY HACKATHON
What can you achieve by
technology like blockchain, crypto currencies, AI, IOT,
open digital public infrastructure and the digital commons can
unlock completely new ways of interconnected mass
to establish the breakthrough progress we need in all fields of
our society and all sectors of our economy.
11-15 April 2019
Thursday April 11:
Arrive and register in Groningen
Opening party in DOT
11-15 April 2019
Friday April 12:
Validate & pivot
Saturday April 13:
Go go go!
Sunday April 14:
Monday April 15:
11-15 April 2019
Ultimate deadline to register
Delft University of Technology
Developments in Blockchain
Exchanging privacy-sensitive information and the
future of a national digital infrastructure
Enterprise Architect for the
Ministry of Finance
Challenge 1 by the Dutch Ministry of
Justice and Security
Presentation and Q&A: A Government
Backed Protocol for Digital Permissions
How to register and
permissions on a global scale
Enterprise Architect Ministry of Finance in cooperation
with the Ministry of Justice and Security
Approval and consent
› We approve and consent every
day in some form or way;
› We approve an action to be taken
or we consent with the status of
an entity (thing, process);
› We approve as business co-
worker, civil servant, civilian or
› We approve and consent
increasingly through digital
› More and more companies are
tracking individual persons
› More and more information is
being sold to third parties
› Approval is asked...
› ...but where is my ‘red button’
in case I want to retract my
› Do I really know and control
which parties are using my
personal information and in what
› Consent requests for the use of your
personal or your company’s
information by other parties
› Approval requests for copyright
› Approval requests for budgetting and
purchasing within an organisation
› Consent requests for the accurate
representation of a witness account
› Consent requests with the status of an
item of property or work (inspection)
› ...and many more
Why do we approve?
› We approve and consent because we
have the legal power to do so;
› We approve and consent because
there are legal consequences in
some form or way for us or the
organisations on behalf of whom we
are approving or consenting;
The power to consent
› The power to consent is actually
the power to change a legal
› Based upon the framework of
fundamental legal concepts by
› Approving or consenting leads to
a change in the legal position
of a stakeholder, resulting in
more or less rights and duties
for the stakeholder in question.
Theory: rational decision making
› Approving is a form of decision making;
› Decision Making Theory identifies seven
phases in the rational decision making
› Now we can define what is true informed
– Clear context
– Clear consequences
– Clear risks
› Approving needs trust in the accuracy,
completeness and up-to-date presentation
of this information position. 33
Reality: intuitive decision making
› In reality we are not always that
› Intuitive decision making is often
the way decisions are made in real
life, based on cues, patterns and
› Intuitive decision making needs
trust in the strength of those cues,
patterns and action scripts;
› Intuitive decision making should not
be denied as it is human to do so.
The solution lies in combining it with
rational decision making. 34
Trust is an important aspect of consent
› Trust is built upon:
– Fully Informed Consent
– Non-repudiation (authenticity, integrity)
– Adequate infrastructure
– Strong cues, patterns, action scripts
– User friendliness
› Develop an open source, decentralized
and government backed protocol for
registering and communicating digital
› Re-usable for any type of stakeholder,
approval process and application;
› High trust;
› For civilian, governmental and
Properties of the solution
› Supports non-repudiation (authenticity and
integrity) and other trust aspects;
› Supports fully informed consent (context,
consequences and risks) but also strong cues and
› Registers exact information position upon which
a stakeholder will give his response;
› Uniform protocol across the globe;
› Evolvability – future changes to the protocol
(new laws, new processses, etcetera) should be
implemented easy and without the possibility of
corrupting older approval transactions;
› Open Source.
Innovation – think outside the box
› Standardised contract terms across the globe?
› Contract terms satisfaction/reputation score?
› Anonymous statistics in how other users have
responded in similar cases?
› What is the role of incentives and tokenization? I.e.
artificial intelligence or third party experts explaining me
the contract terms, risks and consequences of approval in
› What is the role of gamification?
› Self-sovereign: my wallet of consent?
› Taxonomy for approval contracts? The use of Linked
› Paving the way for automated decision making?
› Dare to experiment!
DigiAkkoord – approval application
“DigiAkkoord” at department
of Justice and Security,
release somewhere in 2019;
Focuses on a re-usable
application for all approval
processes within the
DigiAkkoord is not really a
protocol but a business
Challenge has more global
perspective and more
emphasis on protocol
development compared to
The IOTA Protocol
the limitations of
$100M+ to date
Hubs in Berlin, Tel Aviv,
More than 80 employees
around the globe
Ecosystem of more
than 100 entities
> 70k active
> 120k content followers
Ecosystem Development Fund
$13M+ in funding
nearly $100k awarded to date
A global Foundation, based in Berlin
Creating a government backed
protocol for digital permissions
Using IOTA technology
- No fees, no hassle
- Data transactions supported
- Open source and permissionless
- Quantum immune, ready for the future
Due to the nature of IOTA, you are able to send
transactions on the Mainnet without fees. This lets
you publish transactions with data directly on the
Mainnet for no cost.
However, it is best to use the Devnet to build Proof
of Concept applications. This network is run by the
IOTA Foundation for developer to use and test on as
they please. We also have a Faucet which dispenses
tokens for use on the Devnet.
We also have a Spamnet for testing the protocols
resilience to high TPS.
The configuration of the `Devnet`
● Go and Java libraries
● C libraries (Entangled, WIP)
● Python and C++
● Secure message streams over the tangle
● Feeless messages
● New C-based implementation in the works
● Both public and private messages possible
??? ???????? ????
2nd Layer libraries like MAM do not require protocol
changes or hardforks, they can be built and
supported by anyone to ensure that IOTA fits their
New documentation portal
Relevant projects done with IOTA
● TangleID project (https://tangleid.github.io)
● Digital identity Proof of concept by VX Company
What will the IOTA Foundation provide
We will be there with 2 coaches (Jedi’s) to support
teams working with IOTA
Content packages and support for teams will be
available before and during the hackathon
We will publicly communicate about the event and
the participating projects before, during and after
#odyssey-hackathon on Discord
• Protect your personal identity by using
your business identity through the KVK
• The KVK is the Oracle for business
• Next step: integrating these concepts
into the Digital Nations Infrastructure..
How do we challenge you?
Build innovative solutions that help
entrepreneurs be in control of their identity.
Or even better: help entrepreneurs succeed
in conducting business using their online
identity using these experimental new
For example: Flash Company
• Smart contract
• One-off collaboration
• Backed by KVK verified
Digitization of the built environment.
Making all information on real objects readily available for authorized persons and
Distributed data ecosystem: distributed ledger as backbone.
Validating information and the parties adding and accessing the data.
Solution at the protocol level.
How to include existing standards, e.g. BIM?
How to tie existing solutions / applications and data sources into the ecosystem?
How to manage access to (private or commercially sensitive) data in this distributed
How to engage data owners to contribute data to the building wallet?
How to govern this public-private infrastructure in an effective and responsible way?
Open geographic datasets.
A transaction and ownership database for real estate.
The Proof of Concept built last year.
A relevant network: Kadaster, Dutch Ministery of the Interior, building companies.
Nick van Apeldoorn – ICT Architect
Kadaster – Emerging Technology Center
+316 52 48 19 06
End of Plenary Program - Time to Connect
REGISTER TODAY AT THE ODYSSEY STAND!