SlideShare a Scribd company logo
Bitcoin and the Internet of
Value: A P2P World Using
IPv6
DR CRAIG WRIGHT – CHIEF SCIENTIST – NCHAIN GROUP
25.05.22
• Introduction – Bitcoin: A Peer-to-Peer System with IP-to-IP Connectivity
• Security in a World of IPv6 and Bitcoin
• Privacy and Accountability in a P2P Exchange
• IPv6 and the Direct Exchange of Digital Assets
• IP-to-IP Transactions Using IPv6
• IoT in a World of Bitcoin and IPv6
• Controlling the Performance of a Contract
INTRODUCTION
Bitcoin: A Peer-to-Peer System
with IP-to-IP Connectivity
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
Introduction
Bitcoin: A Peer-to-Peer System with IP-to-IP Connectivity
1 ‘Peer-to-peer’ refers to the direct exchange between two users
2 Bitcoin streamlines control of sensitive information
3 IPv6 and Bitcoin payment channels provide a new level of scale and efficiency
4 Identity can be determined without leaking private information to the public
5
The new model for commerce is one where records are permanent and allow parties to trade
securely and privately
Security in a World of IPv6 and Bitcoin
Security in a world of
IPv6 and Bitcoin
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
The growth of network systems will drive applications and
uses beyond light bulbs with web and IP addressing…
• Disposable communication tablets (including $1 devices)
• Milk, coke cans, and other products in supermarkets with IP
addresses and RFID tags for merchandising and stock control
Exchange of all things: Anytime, anywhere
IPv6 brings security to a mobile network.
In the domain world, Windows and other existing operating
systems allow the integration and simple deployment of secure
server and client-trust models.
Security in a world of
IPv6 and Bitcoin
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
IoT and the Mobile Experience
In case the user loses a tablet or other device, they are not
actually connected to the system and files, preventing the loss
of data.
With the right set-up, the location of the user no longer matters,
providing a truly mobile experience in accordance with IPv6.
Using flags in IPv6 and Bitcoin, we can directly and efficiently
integrate payment services.
A well-defined cloud and IPv6 system can be far more secure
than the traditional shell-firewall model.
With IPv6 jumbo blocks and Bitcoin payment channels, we have
a path to an on-demand Internet of value.
Privacy and Accountability in a P2P Exchange
In conducting a transaction,
user Alice transmits
information to Bob, whom she
is paying.
Bob then settles the
transaction on the network, by
sending it to the nodes.
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
In the exchange process of
simplified payment
verification (SPV), where
invoices and purchase orders
can be created and exchanged
between individuals or
companies, Bob and Alice
exchange information that
allows each party to determine
the identity of the other.
Privacy and Accountability in a P2P Exchange
P2P: The Way It Was Designed
In a peer-to-peer exchange
where a buyer and seller
directly exchange a Bitcoin
transaction using the original
IP-to-IP protocol, the
transaction would be said to be
instantaneous and, as such,
would occur at the location
where the recipient resides.
When a user exchanges
information with another user,
such as through the original IP-
to-IP protocol, they are simply
network clients. They can take
the form of an SPV client or a
web client or many other
forms, including one of a fat
client that self-propagates.
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
The original client was set to
use IP-to-IP connectivity, to
allow peers to communicate
directly. Communication
between Alice and Bob is
private and direct.
Tools mapping electronic data
interchange (EDI) to a Bitcoin
transaction would simply look
like EDI tools of today.
Privacy and Accountability in a P2P Exchange
Bitcoin Data Interchange & Accountability
Alice may record proof of
connection with Bob, which
can be signed, verifying that
only Bob received the
transaction. Bob can now
validate the transaction
received from Alice.
IP-to-IP Transactions Using IPv6
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
Non-Interactive Bitcoin
IP Transaction Using
IPv6 CGA(++)
The procedure here is a modification
that takes advantage of the beneficial
properties of IPv6 (and CGA).
To send a Bitcoin transaction to a
recipient who isn’t online (non-
interactively), the sender can take
advantage of the imbedded
authentication, using a signature, in
CGA++. 𝑇𝑥𝐼𝐷
Inputs Outputs
< 𝑆𝑖𝑔 𝑃> <𝑃>
OP_RETURN <IP_Tx prefix> <IPv6_CGA(++)>
<M>
OP_DUP OP_HASH160 <𝐻 𝑃𝐼𝑃 > OP_EQUAL
OP_CHECKSIG
OP_RETURN Output Format
Example Non-Interactive Bitcoin IP Transaction Using IPv6 CGA(++)
<IP_Tx prefix> || <Domain_Name> || <M>
Used to easily search
the blockchain for
OP_RETURN outputs
of this type
Used to identify who the
transaction is being made
out to
Can include
anything such
as the invoice
Domain Name Bitcoin
Payments Using IPv6
CGA(++)
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
To send a payment to a domain name
rather than an IPv6 CGA(++), the sender
simply adds an extra step in the
beginning of the procedure to resolve the
IP address that maps to the domain
name required.
In the CGA parameters, there is an
extFields parameter where an optional
variable-length field (default length 0) can
be added. If the receiver/server has a
domain name, they can put that there, so
that the client has added security
guarantees that the DNS mapping is
authentic.
Client issues DNS query to
resolve the IPv6 (AAAA DNS
record) address mapping to the
required domain name.
Verify DNS record(s) – if
DNSSEC is being used.
Check that the domain name in
the DNS record matches the
domain name in the extFields
CGA parameter.
Procedure continues as with
Non-Interactive Bitcoin IP
Transaction Using IPv6 CGA(++)
or Interactive Bitcoin IP
Transaction Using IPv6 CGA.
IoT in a World of Bitcoin and IPv6
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
An IoT Communication
Protocol on Bitcoin
(BSV)
Theme IoT requirement Blockchain solution
Scalability
Automation Automated contracts
Internet traffic P2P transaction throughput
Resource-constrained devices Lightweight clients
Security/
Privacy
Cybersecurity in the cloud
Distributed data storage;
Validation
Access control
Key management;
Derivative keys
• Integration of payment and control into
one network
• Using existing infrastructure to
piggyback messages regarding device-
state changes
• Faster user-device interaction
Multilevel IOT (MIOT)
Controller
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
By combining a multilevel hierarchy and blockchain-based
communication protocol, MIOT enables:
• large scale P2P communication using low-fee microtransactions;
• integration of digital asset transfer and control into one platform;
• independently verifiable identity and access management;
• secure timestamped storage of IoT communication;
• IoT metadata accessible for auditing and performance monitoring; and
• privacy protection for user devices with override, key-update, and
privacy features.
With BSV’s high-capacity and low-fee
microtransaction throughput and
scalable network infrastructure, devices
can be connected reliably and on a global
scale, communicating at minimal costs.
MIOT Architecture
Localised control
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
MIOT topology
MIOT
Master
MIOT
Servant
MIOT
Slave
MIOT
Devices
The MIOT combines a command-control
hierarchy with the use of a blockchain
network infrastructure.
MIOT users create their own multilevel
control hierarchy, which includes client-
server and peer-to-peer relationships.
MIOT Architecture
MIOT devices
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
Devices on the MIOT network are
classified according to computing
resource and connectivity constraints.
MIOT wallet
• Secure messaging using Bitcoin
transactions
• Including new peers with digital
certificates
• Command acknowledgment using
sighash
• Command approval using multisig
transactions
MIOT topology
with example devices
MIOT
Master
MIOT
Servant
MIOT
Slave
MIOT
Devices
Master, servant, and slave devices use the MIOT-configured Bitcoin wallet to communicate with
each other and the Bitcoin network
Devices Wallets Miners
Payment for Printing
Example use case
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
The MIOT network for
public-library printing services
MIOT
Master
MIOT
Servant
MIOT
Slave
MIOT
Devices
Library Administrator
Device
Library User
Devices
Devices
Controllers
Printer
Devices
Devices
Controlling the Performance of a Contract
Licensing music and
computer software
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
Blockchain technology can be used to facilitate an inexpensive,
secure, and transparent procedure for the purchase, integrity,
and licensing of proprietary software.
Consumers benefit from continuous integrity and transparency.
Software vendors can ensure that the conditions associated
with their license are adhered to on a continuous and cost-
effective basis.
The software vendors could enhance their reputation and
increase their trustworthiness by being seen to be transparent.
The immutable record of transactions between the software
vendors and consumers could be valuable for both audits and
cases of dispute resolution.
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
Software Signing
Distributed hash table (DHT)
Stores Alice’s public key and a hash of Alice’s
hardware string
Bob (software vendor)
Populates the DHT with software licence, a
hash of the encrypted executable and the URL
for the software download
Alice (end user)
Can sign transaction on the blockchain
Can query whether the licence is valid
Can revoke licence
Oracle (trusted third party)
Signs transactions when a user-provided
expression evaluates to true
Employs a DHT
Can revoke licence
ContractHash
Contract details (the licence)
URL for the software
Alice’s public key
Bob’s public key—or Bob’s company identifier or other legally
binding identifier
hardware hash
hash of the encrypted software
expiry date
any other contractually binding date
Top-level fields
stored in the DHT
Contract details (the licence)
Field Sub-field Comments
Metadata1
ContractType Coded value indicates type of contract.
ContractPointer IPv6 address identifying the DHT.
ContractTypeData1 Format depends on value of ContractType. Padded with zeros.
Metadata2
ContractHash
RIPEMD-160(SHA256(actual contract file addressed by
ContractPointer))
ContractTypeData2 Format depends on value of ContractType. Padded with zeros.
Generic contract metadata format
Example use case
Digital Artwork
BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6
Token-protected objects can be secured using a third-party
access token.
For instance, if Charlie creates digital artwork, he can issue an
access token that decrypts it.
Charlie sells the access token to Alice.
Alice can send the access token to Bob.
As Alice no longer has the token, the system is configured to
only allow authorised access, in accordance with the latest
updates.
Both access controls and payments services can be directly
integrated using IPv6 and Bitcoin.
Benefits
• Security: Access control
• Monetisation: Automated payments
Example use case
THANK YOU
Switzerland
Grafenauweg 6,
6300 Zug,
Switzerland
Contact us
contact@nchain.com
United Kingdom
30 Market Place,
London W1W 8AP
United Kingdom

More Related Content

Similar to Bitcoin & the Internet of Value

Blockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessBlockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessDavid Joao Vieira Carvalho
 
Union of bitcoin and APIs
Union of bitcoin and APIsUnion of bitcoin and APIs
Union of bitcoin and APIsBBVA API Market
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computingkumar641
 
Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainMatteo Masi
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed IntelligenceNuri Cankaya
 
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
WHAT IS CRYPTOCURRENCY  EXPECTED APPLICATIONS.WHAT IS CRYPTOCURRENCY  EXPECTED APPLICATIONS.
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.Qutomatic
 
The Bitcoin Lightning Network
The Bitcoin Lightning NetworkThe Bitcoin Lightning Network
The Bitcoin Lightning NetworkShun Shiku
 
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAINBLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAINETCenter
 
Beyond Bitcoin: Understanding the full potential of blockchain
Beyond Bitcoin: Understanding the full potential of blockchainBeyond Bitcoin: Understanding the full potential of blockchain
Beyond Bitcoin: Understanding the full potential of blockchainrajeshdhuddu
 
Transfiguring enterprise ecosystems with Blockchain development services
Transfiguring enterprise ecosystems with Blockchain development servicesTransfiguring enterprise ecosystems with Blockchain development services
Transfiguring enterprise ecosystems with Blockchain development servicesSeven Bits Technologies
 
Vlad Trifa, Chief Product Officer ,Ambrosus - Bridging Blockchains and the Io...
Vlad Trifa, Chief Product Officer ,Ambrosus - Bridging Blockchains and the Io...Vlad Trifa, Chief Product Officer ,Ambrosus - Bridging Blockchains and the Io...
Vlad Trifa, Chief Product Officer ,Ambrosus - Bridging Blockchains and the Io...Techsylvania
 
Get Ready for Coinbase Node
Get Ready for Coinbase NodeGet Ready for Coinbase Node
Get Ready for Coinbase NodeTinaBregovi
 
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)Data Driven Innovation
 
IRJET - Framework for Realtime Bitcoin Transaction
IRJET -  	  Framework for Realtime Bitcoin TransactionIRJET -  	  Framework for Realtime Bitcoin Transaction
IRJET - Framework for Realtime Bitcoin TransactionIRJET Journal
 
The blockchain imperatives - Kevin osullivan
The blockchain imperatives - Kevin osullivanThe blockchain imperatives - Kevin osullivan
The blockchain imperatives - Kevin osullivanSITA
 
apidays LIVE London 2021 - Open Insurance & Smart Contracts by Giovanni Lesna...
apidays LIVE London 2021 - Open Insurance & Smart Contracts by Giovanni Lesna...apidays LIVE London 2021 - Open Insurance & Smart Contracts by Giovanni Lesna...
apidays LIVE London 2021 - Open Insurance & Smart Contracts by Giovanni Lesna...apidays
 
Why Developers Should Choose ICON Network?
Why Developers Should Choose ICON Network?Why Developers Should Choose ICON Network?
Why Developers Should Choose ICON Network?Bong An Ha
 

Similar to Bitcoin & the Internet of Value (20)

BitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed ComputingBitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed Computing
 
Blockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessBlockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your business
 
Union of bitcoin and APIs
Union of bitcoin and APIsUnion of bitcoin and APIs
Union of bitcoin and APIs
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computing
 
Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & Blockchain
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed Intelligence
 
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
WHAT IS CRYPTOCURRENCY  EXPECTED APPLICATIONS.WHAT IS CRYPTOCURRENCY  EXPECTED APPLICATIONS.
WHAT IS CRYPTOCURRENCY EXPECTED APPLICATIONS.
 
The Bitcoin Lightning Network
The Bitcoin Lightning NetworkThe Bitcoin Lightning Network
The Bitcoin Lightning Network
 
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAINBLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
BLOCKCHAIN & THE HOLLYWOOD SUPPLY CHAIN
 
Beyond Bitcoin: Understanding the full potential of blockchain
Beyond Bitcoin: Understanding the full potential of blockchainBeyond Bitcoin: Understanding the full potential of blockchain
Beyond Bitcoin: Understanding the full potential of blockchain
 
Transfiguring enterprise ecosystems with Blockchain development services
Transfiguring enterprise ecosystems with Blockchain development servicesTransfiguring enterprise ecosystems with Blockchain development services
Transfiguring enterprise ecosystems with Blockchain development services
 
Vlad Trifa, Chief Product Officer ,Ambrosus - Bridging Blockchains and the Io...
Vlad Trifa, Chief Product Officer ,Ambrosus - Bridging Blockchains and the Io...Vlad Trifa, Chief Product Officer ,Ambrosus - Bridging Blockchains and the Io...
Vlad Trifa, Chief Product Officer ,Ambrosus - Bridging Blockchains and the Io...
 
Coinbase Node
Coinbase NodeCoinbase Node
Coinbase Node
 
Get Ready for Coinbase Node
Get Ready for Coinbase NodeGet Ready for Coinbase Node
Get Ready for Coinbase Node
 
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
Blockchain per le imprese: applicazioni reali! (Rossella De Gaetano , IBM Cloud)
 
IRJET - Framework for Realtime Bitcoin Transaction
IRJET -  	  Framework for Realtime Bitcoin TransactionIRJET -  	  Framework for Realtime Bitcoin Transaction
IRJET - Framework for Realtime Bitcoin Transaction
 
Bitcoin data mining
Bitcoin data miningBitcoin data mining
Bitcoin data mining
 
The blockchain imperatives - Kevin osullivan
The blockchain imperatives - Kevin osullivanThe blockchain imperatives - Kevin osullivan
The blockchain imperatives - Kevin osullivan
 
apidays LIVE London 2021 - Open Insurance & Smart Contracts by Giovanni Lesna...
apidays LIVE London 2021 - Open Insurance & Smart Contracts by Giovanni Lesna...apidays LIVE London 2021 - Open Insurance & Smart Contracts by Giovanni Lesna...
apidays LIVE London 2021 - Open Insurance & Smart Contracts by Giovanni Lesna...
 
Why Developers Should Choose ICON Network?
Why Developers Should Choose ICON Network?Why Developers Should Choose ICON Network?
Why Developers Should Choose ICON Network?
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfEasyPrinterHelp
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxEasyPrinterHelp
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdf
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 

Bitcoin & the Internet of Value

  • 1. Bitcoin and the Internet of Value: A P2P World Using IPv6 DR CRAIG WRIGHT – CHIEF SCIENTIST – NCHAIN GROUP 25.05.22
  • 2. • Introduction – Bitcoin: A Peer-to-Peer System with IP-to-IP Connectivity • Security in a World of IPv6 and Bitcoin • Privacy and Accountability in a P2P Exchange • IPv6 and the Direct Exchange of Digital Assets • IP-to-IP Transactions Using IPv6 • IoT in a World of Bitcoin and IPv6 • Controlling the Performance of a Contract
  • 3. INTRODUCTION Bitcoin: A Peer-to-Peer System with IP-to-IP Connectivity
  • 4. BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 Introduction Bitcoin: A Peer-to-Peer System with IP-to-IP Connectivity 1 ‘Peer-to-peer’ refers to the direct exchange between two users 2 Bitcoin streamlines control of sensitive information 3 IPv6 and Bitcoin payment channels provide a new level of scale and efficiency 4 Identity can be determined without leaking private information to the public 5 The new model for commerce is one where records are permanent and allow parties to trade securely and privately
  • 5. Security in a World of IPv6 and Bitcoin
  • 6. Security in a world of IPv6 and Bitcoin BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 The growth of network systems will drive applications and uses beyond light bulbs with web and IP addressing… • Disposable communication tablets (including $1 devices) • Milk, coke cans, and other products in supermarkets with IP addresses and RFID tags for merchandising and stock control Exchange of all things: Anytime, anywhere IPv6 brings security to a mobile network. In the domain world, Windows and other existing operating systems allow the integration and simple deployment of secure server and client-trust models.
  • 7. Security in a world of IPv6 and Bitcoin BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 IoT and the Mobile Experience In case the user loses a tablet or other device, they are not actually connected to the system and files, preventing the loss of data. With the right set-up, the location of the user no longer matters, providing a truly mobile experience in accordance with IPv6. Using flags in IPv6 and Bitcoin, we can directly and efficiently integrate payment services. A well-defined cloud and IPv6 system can be far more secure than the traditional shell-firewall model. With IPv6 jumbo blocks and Bitcoin payment channels, we have a path to an on-demand Internet of value.
  • 8. Privacy and Accountability in a P2P Exchange
  • 9. In conducting a transaction, user Alice transmits information to Bob, whom she is paying. Bob then settles the transaction on the network, by sending it to the nodes. BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 In the exchange process of simplified payment verification (SPV), where invoices and purchase orders can be created and exchanged between individuals or companies, Bob and Alice exchange information that allows each party to determine the identity of the other. Privacy and Accountability in a P2P Exchange P2P: The Way It Was Designed In a peer-to-peer exchange where a buyer and seller directly exchange a Bitcoin transaction using the original IP-to-IP protocol, the transaction would be said to be instantaneous and, as such, would occur at the location where the recipient resides.
  • 10. When a user exchanges information with another user, such as through the original IP- to-IP protocol, they are simply network clients. They can take the form of an SPV client or a web client or many other forms, including one of a fat client that self-propagates. BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 The original client was set to use IP-to-IP connectivity, to allow peers to communicate directly. Communication between Alice and Bob is private and direct. Tools mapping electronic data interchange (EDI) to a Bitcoin transaction would simply look like EDI tools of today. Privacy and Accountability in a P2P Exchange Bitcoin Data Interchange & Accountability Alice may record proof of connection with Bob, which can be signed, verifying that only Bob received the transaction. Bob can now validate the transaction received from Alice.
  • 12. BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 Non-Interactive Bitcoin IP Transaction Using IPv6 CGA(++) The procedure here is a modification that takes advantage of the beneficial properties of IPv6 (and CGA). To send a Bitcoin transaction to a recipient who isn’t online (non- interactively), the sender can take advantage of the imbedded authentication, using a signature, in CGA++. 𝑇𝑥𝐼𝐷 Inputs Outputs < 𝑆𝑖𝑔 𝑃> <𝑃> OP_RETURN <IP_Tx prefix> <IPv6_CGA(++)> <M> OP_DUP OP_HASH160 <𝐻 𝑃𝐼𝑃 > OP_EQUAL OP_CHECKSIG OP_RETURN Output Format Example Non-Interactive Bitcoin IP Transaction Using IPv6 CGA(++) <IP_Tx prefix> || <Domain_Name> || <M> Used to easily search the blockchain for OP_RETURN outputs of this type Used to identify who the transaction is being made out to Can include anything such as the invoice
  • 13. Domain Name Bitcoin Payments Using IPv6 CGA(++) BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 To send a payment to a domain name rather than an IPv6 CGA(++), the sender simply adds an extra step in the beginning of the procedure to resolve the IP address that maps to the domain name required. In the CGA parameters, there is an extFields parameter where an optional variable-length field (default length 0) can be added. If the receiver/server has a domain name, they can put that there, so that the client has added security guarantees that the DNS mapping is authentic. Client issues DNS query to resolve the IPv6 (AAAA DNS record) address mapping to the required domain name. Verify DNS record(s) – if DNSSEC is being used. Check that the domain name in the DNS record matches the domain name in the extFields CGA parameter. Procedure continues as with Non-Interactive Bitcoin IP Transaction Using IPv6 CGA(++) or Interactive Bitcoin IP Transaction Using IPv6 CGA.
  • 14. IoT in a World of Bitcoin and IPv6
  • 15. BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 An IoT Communication Protocol on Bitcoin (BSV) Theme IoT requirement Blockchain solution Scalability Automation Automated contracts Internet traffic P2P transaction throughput Resource-constrained devices Lightweight clients Security/ Privacy Cybersecurity in the cloud Distributed data storage; Validation Access control Key management; Derivative keys • Integration of payment and control into one network • Using existing infrastructure to piggyback messages regarding device- state changes • Faster user-device interaction
  • 16. Multilevel IOT (MIOT) Controller BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 By combining a multilevel hierarchy and blockchain-based communication protocol, MIOT enables: • large scale P2P communication using low-fee microtransactions; • integration of digital asset transfer and control into one platform; • independently verifiable identity and access management; • secure timestamped storage of IoT communication; • IoT metadata accessible for auditing and performance monitoring; and • privacy protection for user devices with override, key-update, and privacy features. With BSV’s high-capacity and low-fee microtransaction throughput and scalable network infrastructure, devices can be connected reliably and on a global scale, communicating at minimal costs.
  • 17. MIOT Architecture Localised control BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 MIOT topology MIOT Master MIOT Servant MIOT Slave MIOT Devices The MIOT combines a command-control hierarchy with the use of a blockchain network infrastructure. MIOT users create their own multilevel control hierarchy, which includes client- server and peer-to-peer relationships.
  • 18. MIOT Architecture MIOT devices BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 Devices on the MIOT network are classified according to computing resource and connectivity constraints. MIOT wallet • Secure messaging using Bitcoin transactions • Including new peers with digital certificates • Command acknowledgment using sighash • Command approval using multisig transactions MIOT topology with example devices MIOT Master MIOT Servant MIOT Slave MIOT Devices Master, servant, and slave devices use the MIOT-configured Bitcoin wallet to communicate with each other and the Bitcoin network Devices Wallets Miners
  • 19. Payment for Printing Example use case BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 The MIOT network for public-library printing services MIOT Master MIOT Servant MIOT Slave MIOT Devices Library Administrator Device Library User Devices Devices Controllers Printer Devices Devices
  • 21. Licensing music and computer software BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 Blockchain technology can be used to facilitate an inexpensive, secure, and transparent procedure for the purchase, integrity, and licensing of proprietary software. Consumers benefit from continuous integrity and transparency. Software vendors can ensure that the conditions associated with their license are adhered to on a continuous and cost- effective basis. The software vendors could enhance their reputation and increase their trustworthiness by being seen to be transparent. The immutable record of transactions between the software vendors and consumers could be valuable for both audits and cases of dispute resolution.
  • 22. BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 Software Signing Distributed hash table (DHT) Stores Alice’s public key and a hash of Alice’s hardware string Bob (software vendor) Populates the DHT with software licence, a hash of the encrypted executable and the URL for the software download Alice (end user) Can sign transaction on the blockchain Can query whether the licence is valid Can revoke licence Oracle (trusted third party) Signs transactions when a user-provided expression evaluates to true Employs a DHT Can revoke licence ContractHash Contract details (the licence) URL for the software Alice’s public key Bob’s public key—or Bob’s company identifier or other legally binding identifier hardware hash hash of the encrypted software expiry date any other contractually binding date Top-level fields stored in the DHT Contract details (the licence) Field Sub-field Comments Metadata1 ContractType Coded value indicates type of contract. ContractPointer IPv6 address identifying the DHT. ContractTypeData1 Format depends on value of ContractType. Padded with zeros. Metadata2 ContractHash RIPEMD-160(SHA256(actual contract file addressed by ContractPointer)) ContractTypeData2 Format depends on value of ContractType. Padded with zeros. Generic contract metadata format Example use case
  • 23. Digital Artwork BITCOIN AND THE INTERNET OF VALUE: A P2P WORLD USING IPV6 Token-protected objects can be secured using a third-party access token. For instance, if Charlie creates digital artwork, he can issue an access token that decrypts it. Charlie sells the access token to Alice. Alice can send the access token to Bob. As Alice no longer has the token, the system is configured to only allow authorised access, in accordance with the latest updates. Both access controls and payments services can be directly integrated using IPv6 and Bitcoin. Benefits • Security: Access control • Monetisation: Automated payments Example use case
  • 25. Switzerland Grafenauweg 6, 6300 Zug, Switzerland Contact us contact@nchain.com United Kingdom 30 Market Place, London W1W 8AP United Kingdom