This presentation cuts through the confusion and hype surrounding blockchain, explains the key technical aspects of blockchain systems, and summarizes the point of view of different blockchain luminaries and open sourced systems. Originally presented as a guest lecture at Columbia University in April 2019.
BTCS Inc is engaged in the business of hosting an online e-commerce marketplace where consumers can purchase merchandise using Digital Assets, including bitcoin. The company focuses on blockchain and Digital Asset ecosystems. The firm operates a beta e-commerce marketplace, which accepts a range of digital currencies, has designed a beta secure digital currency storage solution BTCS Wallet.
BTCS Inc is engaged in the business of hosting an online e-commerce marketplace where consumers can purchase merchandise using Digital Assets, including bitcoin. The company focuses on blockchain and Digital Asset ecosystems. The firm operates a beta e-commerce marketplace, which accepts a range of digital currencies, has designed a beta secure digital currency storage solution BTCS Wallet.
This instrument is designed to replicate the performance of the 10 leading Digital Assets on the ethereum blockchain, also called ERC20 token. The index represents token from both centralised exchanges and Decentralised Finance (DeFi).
Introduction to blockchain & cryptocurrenciesAurobindo Nayak
This was an intro session on blockchain and cryptocurrencies. If you want to view the webinar for this talk checkout: https://www.youtube.com/watch?v=rl5mVI7jEK0
BTCS Inc is engaged in the business of hosting an online e-commerce marketplace where consumers can purchase merchandise using Digital Assets, including bitcoin. The company focuses on blockchain and Digital Asset ecosystems. The firm operates a beta e-commerce marketplace, which accepts a range of digital currencies, has designed a beta secure digital currency storage solution BTCS Wallet.
BTCS Inc is engaged in the business of hosting an online e-commerce marketplace where consumers can purchase merchandise using Digital Assets, including bitcoin. The company focuses on blockchain and Digital Asset ecosystems. The firm operates a beta e-commerce marketplace, which accepts a range of digital currencies, has designed a beta secure digital currency storage solution BTCS Wallet.
This instrument is designed to replicate the performance of the 10 leading Digital Assets on the ethereum blockchain, also called ERC20 token. The index represents token from both centralised exchanges and Decentralised Finance (DeFi).
Introduction to blockchain & cryptocurrenciesAurobindo Nayak
This was an intro session on blockchain and cryptocurrencies. If you want to view the webinar for this talk checkout: https://www.youtube.com/watch?v=rl5mVI7jEK0
Blockchain in Banking Bucharest Meetup C1 “The fourth industrial revolution will be built upon a Machine-to-Machine economy with autonomous vehicles, 3D printer, robots, drones and IoT.
Blockchain Primer - Founder Collective - December 2017Parul Singh
As 2017 comes to a close, blockchain is everywhere (or more accurately perhaps “bitcoin, bitcoin, bitcoin.”) here is a primer on blockchain that I prepared for my team at Founder Collective to help frame some of the exciting use cases we see coming down the pike. Further reading is on the last slide.
CoinDesk’s Q1 2016 State of Blockchain report summarizes key trends, data and events from the first quarter of 2016.
You'll be able to read analysis of the key trends in this article: http://www.coindesk.com/state-of-blockchain-q1-2016/
We'd appreciate feedback on our research:
https://www.surveymonkey.co.uk/r/6W6WHST
The blockchain is the technology the underpins digital currency (Bitcoin, Litecoin, Ethereum, and the like). The tech allows digital information to be distributed, but not copied. ... You may hear it described as a “digital ledger” stored in a distributed network.
Get in-depth insights on the emergence, growth and future prospects of Blockchain in India. The historical timeline of the Blockchain technology in India. A detailed breakdown of the Blockchain technology and decoding the types of Blockchain currently in use.
Stacks is a layer-2 blockchain solution that is designed to bring smart contracts and decentralized applications (DApps) to Bitcoin (BTC). These smart contracts are brought to Bitcoin without changing any of the features that make it so powerful — including its security and stability.
These DApps are open and modular, meaning developers can build on top of each other's apps to produce features that are simply not possible in a regular app. Since Stacks uses Bitcoin as a base layer, everything that happens on the network is settled on the most widely used arguably the most secure blockchain in operation — Bitcoin.
The platform is powered by the Stacks token (STX), which is used for fueling the execution of smart contracts, processing transactions and registering new digital assets on the Stacks 2.0 blockchain.
The platform was formerly known as Blockstack, but was rebranded to Stacks in Q4 2020 in order to "separate the ecosystem and open source project from Blockstack PBC" — the company that built the original protocols.
The mainnet for Stacks 2.0 launched in January 2021.
Blockchain for Executives, Entrepreneurs and InvestorsFenbushi Capital
A brief summary of key issues that executives, entrepreneurs and investors across all industries should be aware of when considering blockchain.
First presented 8 June 2018 at the Longhash Incubator in Singapore.
Blockchain technology and applications from a financial perspectiveVittorio Zinetti
This article aims at explaining the blockchain opportunity for the financial industry. First the fundamentals of technology is introduced, then possible application of blockchain to three financial use cases are presented.
Blockchain and Hook model of engagement Rajeev Soni
This is a quick overview to Blockchains and the Hooked model of technology product engagement. I speak on Product Management, Digital Marketing and Technology topics.
This is a presentation I delivered at the Jamia Milia Islamia University in Delhi.
Blockchain in Banking Bucharest Meetup C1 “The fourth industrial revolution will be built upon a Machine-to-Machine economy with autonomous vehicles, 3D printer, robots, drones and IoT.
Blockchain Primer - Founder Collective - December 2017Parul Singh
As 2017 comes to a close, blockchain is everywhere (or more accurately perhaps “bitcoin, bitcoin, bitcoin.”) here is a primer on blockchain that I prepared for my team at Founder Collective to help frame some of the exciting use cases we see coming down the pike. Further reading is on the last slide.
CoinDesk’s Q1 2016 State of Blockchain report summarizes key trends, data and events from the first quarter of 2016.
You'll be able to read analysis of the key trends in this article: http://www.coindesk.com/state-of-blockchain-q1-2016/
We'd appreciate feedback on our research:
https://www.surveymonkey.co.uk/r/6W6WHST
The blockchain is the technology the underpins digital currency (Bitcoin, Litecoin, Ethereum, and the like). The tech allows digital information to be distributed, but not copied. ... You may hear it described as a “digital ledger” stored in a distributed network.
Get in-depth insights on the emergence, growth and future prospects of Blockchain in India. The historical timeline of the Blockchain technology in India. A detailed breakdown of the Blockchain technology and decoding the types of Blockchain currently in use.
Stacks is a layer-2 blockchain solution that is designed to bring smart contracts and decentralized applications (DApps) to Bitcoin (BTC). These smart contracts are brought to Bitcoin without changing any of the features that make it so powerful — including its security and stability.
These DApps are open and modular, meaning developers can build on top of each other's apps to produce features that are simply not possible in a regular app. Since Stacks uses Bitcoin as a base layer, everything that happens on the network is settled on the most widely used arguably the most secure blockchain in operation — Bitcoin.
The platform is powered by the Stacks token (STX), which is used for fueling the execution of smart contracts, processing transactions and registering new digital assets on the Stacks 2.0 blockchain.
The platform was formerly known as Blockstack, but was rebranded to Stacks in Q4 2020 in order to "separate the ecosystem and open source project from Blockstack PBC" — the company that built the original protocols.
The mainnet for Stacks 2.0 launched in January 2021.
Blockchain for Executives, Entrepreneurs and InvestorsFenbushi Capital
A brief summary of key issues that executives, entrepreneurs and investors across all industries should be aware of when considering blockchain.
First presented 8 June 2018 at the Longhash Incubator in Singapore.
Blockchain technology and applications from a financial perspectiveVittorio Zinetti
This article aims at explaining the blockchain opportunity for the financial industry. First the fundamentals of technology is introduced, then possible application of blockchain to three financial use cases are presented.
Blockchain and Hook model of engagement Rajeev Soni
This is a quick overview to Blockchains and the Hooked model of technology product engagement. I speak on Product Management, Digital Marketing and Technology topics.
This is a presentation I delivered at the Jamia Milia Islamia University in Delhi.
This talk will focus on the role of blockchain in the new digital economy and the characteristics of a sustainable blockchain company. Professor Lee will talk about the 4Ds and LASIC, Hinternet and the type of deep business skill and strategy that are needed to excel in the blockchain industry. Those who are looking into fundraising by ICO/ITS’s and investing in Blockchain technology will find this talk interesting.
Block chain and Bitcoin. A blockchain is a data structure that makes it possible to create a digital ledger of transactions and share it among a distributed network of computers.
An introductory presentation discussing the basics of technology behind blockchain, cryptocurrency mining, and an attempt to value a cryptocurrency. Further discussion on altcoins, and a preview on ICOs.
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
In this keynote, delivered at the Blockchain Forum of BPM 2019, I summarized and reflected on research on BPM and blockchain over the last four years, including model-driven engineering, process execution, and analysis and process mining. I also covered selected use cases and applications, as well as recent insights on adoption. The keynote closed with a discussion of open research questions.
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
Blockchain Technology for Public and Commercial LibrariesDavid Nzoputa Ofili
This was a Q & A session with the residents of Library of Africa & the African Diaspora (LOATAD), Ghana. The meeting held on the 23rd of November 2021, and it was virtual.
Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
This presentation gives an overview of SPEC Cloud (TM) IaaS 2016, the first industry standard benchmark that measures the performance of infrastructure as a service clouds. More details on benchmark at https://www.spec.org/cloud_iaas2016/ .
A Survey of Container Security in 2016: A Security Update on Container PlatformsSalman Baset
This talk is an update of container security in 2016. It describes the security measures that containers provide, shows how containers provide security measures out of box that are prone to configuration errors when running applications directly on host, and finally lists the ongoing in container security in the community.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. My goals for this talk…
• Blockchain is a new and emerging technology. As it is the case with any emerging technology,
there are claims and counter-claims on competing technologies, and their applications. Generally
speaking, there is a lot of confusion and lots of buzz words get thrown around.
• Eventually clarity will emerge, given time and effort by folks (remember OSI vs TCP/IP?)
• My goal is
• (1) to not make you more confused than you already were about blockchain
• (2) to help cut through confusion through examples, definitions, concepts, and solution examples.
2
3. Outline
• What is trust?
• What is blockchain?
• Design options for blockchain
• CAP theorem, perspectives of key folks in blockchain space
• Consensus algorithms
• Hyperledger
• Blockchain applications
• Hyperledger internships
3
4. “We have proposed a system for electronic
transactions without relying on trust.”
4
5. “We have proposed a system for electronic
transactions without relying on trust.”*
* https://bitcoin.org/bitcoin.pdf
Not true – says Bruce Schneier – Hyperledger Forum, December 2018
5
6. What is trust? (1/2)
Reference: Bruce Schneier’s example from Hyperledger Forum 2018
My building
lobby
(1)
(2) (3)
(4)
6
7. What is trust? (2/2)
• Can trust ever be eliminated?
• Trust is not eliminated. It is shifted.
• In the case of Bitcoin, the trust shifts from Governments and Banks to
a piece of software.
7
8. Bitcoin “paper” – Conclusion
We have proposed a system for electronic transactions without relying on trust.
We started with the usual framework of coins made from digital signatures, which
provides strong control of ownership, but is incomplete without a way to prevent
double-spending. To solve this, we proposed a peer-to-peer network using proof-
of-work to record a public history of transactions that quickly becomes
computationally impractical for an attacker to change if honest nodes control a
majority of CPU power. The network is robust in its unstructured simplicity. Nodes
work all at once with little coordination. They do not need to be identified, since
messages are not routed to any particular place and only need to be delivered on a
best effort basis. Nodes can leave and rejoin the network at will, accepting the
proof-of-work chain as proof of what happened while they were gone. They vote
with their CPU power, expressing their acceptance of valid blocks by working on
extending them and rejecting invalid blocks by refusing to work on them. Any
needed rules and incentives can be enforced with this consensus mechanism.
https://bitcoin.org/bitcoin.pdf 8
9. Bitcoin “paper” – Conclusion
We have proposed a system for electronic transactions without relying on trust.
We started with the usual framework of coins made from digital signatures, which
provides strong control of ownership, but is incomplete without a way to prevent
double-spending. To solve this, we proposed a peer-to-peer network using proof-
of-work to record a public history of transactions that quickly becomes
computationally impractical for an attacker to change if honest nodes control a
majority of CPU power. The network is robust in its unstructured simplicity. Nodes
work all at once with little coordination. They do not need to be identified, since
messages are not routed to any particular place and only need to be delivered on a
best effort basis. Nodes can leave and rejoin the network at will, accepting the
proof-of-work chain as proof of what happened while they were gone. They vote
with their CPU power, expressing their acceptance of valid blocks by working on
extending them and rejecting invalid blocks by refusing to work on them. Any
needed rules and incentives can be enforced with this consensus mechanism.
https://bitcoin.org/bitcoin.pdf
So, no non-electronic (aka paper) transactions? enuf said.
do not pay more than once really? what is work?
for ever?
distributed? anonymity is a goal ?
churn consensus algorithm
is fixed.
interesting the core …
9
10. The origins of the word blockchain…
Ehrsam, Meyer, Smith and Tuchman - Cipher Block Chaining (CBC) mode of operation - 1976
https://patents.google.com/patent/US4074066A/en
https://satoshi.nakamotoinstitute.org/emails/cryptography/6/
Hal Finney – “block chain” – two letter word. 2008-11-09 01:58:48 UTC
Earliest…
As recently
understood…
(approx.)
10
11. The emergence of “standard” definitions to buzz word terms…
• What is a standard definition?
• A definition created by a standards body such as National Institute of Standards and Technology (NIST) – US, or ISO.
The definition is typically first published as a draft version for feedback from public at large or a select group.
• Cloud Computing
• Utility Computing (McCarthy – 1961), Cloud computing (1996, Compaq Business plan per MIT TR), AWS 2006
• NIST.SP.800-145 - November 2009 (first draft), October 2011 (published).
• https://www.nist.gov/news-events/news/2011/10/final-version-nist-cloud-computing-definition-published
• ISO – ISO/IEC 17788:2014
• https://www.iso.org/standard/60544.html
• Blockchain (~2008)
• NIST.IR.8202 - Blockchain Technology Overview – January 2018 (first draft), October 2018 (published)
• https://csrc.nist.gov/publications/detail/nistir/8202/final
• ISO definition still in progress
• https://www.iso.org/standard/73771.html?browse=tc
11
12. What is blockchain?
• NIST.IR.8202
• (first two lines of intro) Blockchains are tamper evident and tamper resistant
digital ledgers implemented in a distributed fashion (i.e., without a central
repository) and usually without a central authority (i.e., a bank, company, or
government). At their basic level, they enable a community of users to record
transactions in a shared ledger within that community, such that under
normal operation of the blockchain network no transaction can be changed
once published.
What is a block? – grouping of transactions
What is a transaction? – a state changing mechanism
Does the definition clearly state append-only aspect of ledger?
12
13. What is a “ledger”?
• https://www.merriam-webster.com/dictionary/ledger
• a book containing accounts to which debits and credits are posted from books
of original entry
• a horizontal board used for vertical support (as in scaffolding)
• The ledger familiar to “most” of us…?
• Personal journal
13
14. Ledger vs. personal journal
Ledger Personal journal
Written on Paper with typically pen Paper, with pen or pencil
Can also be written with IT system (e.g., computer, SaaS) IT system (e.g., computer, SaaS)
Record of who made changes Important Not so much
Common primary application Recording monetary
transactions
Thoughts
Information lay out Structure (tabular), credit/debit,
with dates
Usually with dates
Information is appended? Typically, yes Typically, yes
Shared with others Employees (probably). Other
entities, no, unless IRS J
Depends J
14
15. What is a digital ledger?
• A ledger stored in a digital form
• On a (personal) computer or a set of computers
• Can contain data ranging from few bytes to peta bytes, and beyond
• What is distributed paper ledger?
• Create copies of paper and distribute it to relevant folks whenever there is a change?
• What is a distributed digital ledger? (or simply distributed ledger)
• Ledgers stored in digital form on a set of computers (e.g., cloud), where data
repository is not confined to a single computer (NIST: without central repository).
The structure of the information stored within the ledger depends on the
application.
15
16. Tamper evident and tamper resistant
• Immutable: Merriam-Webster
• https://www.merriam-webster.com/dictionary/immutable
• not capable of or susceptible to change
• Why do we write personal checks with a pen and not with a pencil?
• May be, no one writes personal checks these days J
• tamper evident and tamper resistant – to an extent
• Can a (distributed) digital ledger be changed?
• Of course!
• How to detect changes to a (distributed) digital ledger and prevent changes?
• Detect changes: audit logs
• Prevent changes: authz, authn (requires identity)
16
17. [Lack of] Central authority or central repository - Examples
• I run a database on my single machine.
• Central repository?
• Central authority?
• A big search engine has a massive farm of distributed machines connected over network, that work
together to respond to search queries.
• Central repository?
• Central authority?
• A music file-sharing system (Napster) has a central list of which users have files, but files are
downloaded peer-to-peer.
• Central authority?
• Central repository?
• A file-sharing network has a distributed index of files and file chunks.
• Central repository?
• Central authority?
17
18. Lets look at Bitcoin again
1. Decentralized – without central
authority?
• Hash power concentration
• https://www.blockchain.com/en/pools
• Crypto exchange concentration
• https://www.bbc.com/news/world-us-
canada-47203706
2. Distributed?
• Yeah
3. Anonymity?
• Public key per transaction
4. Energy efficiency?
• No
4. Non-crypto currency applications
• Not easy
5. Storage capacity per node (~30 GB)
• Ever increasing
6. Mining reward
• Decreasing with time. 12.5 bitcoins today
7. Transaction fees
• How a transaction ends up in a block
• Increasing with time
• Resistance to Sybil attacks
• Sybil attack: Create ‘fake identities’ to take
over portion of id space in a system
• Resistance: Yes, proof of work
18
19. Bitcoin: transaction types
Input 0 from
Alice, signed
by Alice
Output 0
“To Bob”
Output 1
“To Alice”
(change)
Common transaction
Alice pays Bob
1
2 Input 0
Output 0
Transaction aggregating funds
Input 1
Input N
3
Transaction distributing funds
Input 0
Output 0
Output 1
Output N
Payment is to a “public key”
19
Output => UTXO: unspent transaction output
20. Bitcoin: transactions are grouped into blocks
Block N
T1
T2: A -> B
T3
T4
Block N+1
B->C
Block N+2
C->D
H(N) H(N+1)
T1 T2 T3 T4
H() H() H() H()
H() H()
H(N) Mining: find a nonce such hash of merkle tree + nonce
is less than target and takes on avg 10 minutes to compute
Which transaction to include in block? Transaction fee higher
than some minimum. [decentralized or distributed?]
20
22. The design options in Blockchain
• Scalability – as many nodes as possible
• Performance – write to chain as quickly as possible
• Anonymity (or conversely, strong identity) – not “easily traceable” back to entity
• Privacy – keep transactions data and transaction occurrence confidential among
involved parties
• Often informed by:
• Application-specific (crypto-currency) vs. agnostic
• One network to rule them all vs. many networks
• Environmental friendly (Bitcoin proof-of-work is energy inefficient)
22
23. The design options in Blockchain –
Scalability Triangle – Vitalik Buterin
Assume the total computational/bandwidth capacity of a
regular computer is O(c), and the total load of a blockchain is
O(n)
Decentralization: the system can run in an environment where
all nodes have O(c) resources
• Possible weakening: can have supernodes, but require only 1 of N supernodes to be
honest
Security: the system can survive attacks up to some specific
percentage of all
miners/validators (eg. 33%)
Scalability: the system can handle a load of O(n) > O(c)
• Computation
• State storage
• Bandwidth
https://vitalik.ca/files/Ithaca201807_Sharding.pdf
Scalability
Security
Decentralization
Claim: we can reach the middle of the triangle, though we do need to use some more complex tools to get
there (slide 6 of link below)
23
24. The design options in Blockchain –
Matt Corello – aka Bluematt - Bitcoin
• Trustlessness
• Scalability
• Identity (or lack of it)
http://diyhpl.us/wiki/transcripts/baltic-honeybadger/2018/trustlessness-scalability-and-directions-in-security-models/
24
25. The design options in Blockchain –
Hyperledger architecture group white paper
• Linux foundation project for creating open source permissioned blockchain networks
https://www.hyperledger.org/wp-content/uploads/2017/08/Hyperledger_Arch_WG_Paper_1_Consensus.pdf
Comparison of permissioned consensus approaches and standard proof of work
25
26. What is Finality?
• “Finality means that once a transaction is committed, it cannot be
reversed, i.e. the data cannot be rolled back to the previous state.
Different blockchain systems may provide different types of finality.
Typically, this is defined in the consensus protocol. Different types of
consensus exist, such as voting-based consensus with immediate
finality and lottery-based consensus with probabilistic finality.”
https://www.hyperledger.org/wp-content/uploads/2018/10/HL_Whitepaper_Metrics_PDF_V1.01.pdf
26
27. The design options in Blockchain –
CAP theorem equivalent for blockchain
• Decentralization, consistency, scalability
• http://msrg.org/publications/pdf_files/2018/bcbi-icdcs18-
Towards_Dependable,_Scalable,_an.pdf
27
28. What is CAP-theorem-equivalent for blockchain?
• Which blockchain?
• Which consensus algorithm?
• Which model?
• …
Will be a nice contribution….
28
29. Consensus algorithms
• Background
• Crash-tolerant consensus
• Byzantine consensus
• Nakamoto consensus (aka proof of work)
• Proof of stake
• Proof of elapsed time
https://hackernoon.com/a-hitchhikers-guide-to-consensus-algorithms-d81aae3eb0e3
Cachin, Vucolic - https://arxiv.org/pdf/1707.01873.pdf
29
30. Consensus algorithms - Background
• Lamport Byzantine generals problem [1982]
• Schneider – task of reaching and maintaining consensus among nodes
involves [1990]:
• A (deterministic) state machine that implements the logic of the service to be
replicated
• A consensus protocol to disseminate requests among the nodes, such that
each node executes the same sequence of requests on its instance of the
service.
• Traditionally in literature, consensus means reaching agreement on
single request (first) – atomic broadcasts provide agreement on
sequence of requests.
Cachin, Vucolic - https://arxiv.org/pdf/1707.01873.pdf
30
31. Crash-tolerant consensus
• Survive node crashes
• Progression in epochs or views with a unique leader for each view
• Replace leader
• N/2-1 failures
• Paxos (Zoo-keeper), Raft (etcd)
31
32. Byzantine consensus
• Practical Byzantine Fault Tolerance (PBFT)
• < n/3 (note the inequality) nodes can be malicious (or system must
have 3k+1 nodes for k nodes to be malicious)
• Commercial implementations hard to find
32
33. Nakamoto consensus aka proof of work
• (Nodes) vote with their CPU power, expressing their acceptance of
valid blocks by working on extending them and rejecting invalid
blocks by refusing to work on them. Any needed rules and incentives
can be enforced with this consensus mechanism.
33
34. Proof of stake
• Miners stake their tokens on which blocks are valid
• Miners spend their tokens on which fork to support
• If most people vote on the correct fork, miners who work on the
wrong fork can loose their stake
34
35. Distributed Ledger Technologies aka Blockchain categorization
Drive value of cryptocurrency Cryptocurrency for a business use-case
Blockchain for business
Anonymous Permissioned
CryptocurrencyNon-Cryptocurrency
Standards bodies and consortiums
35
36. Blockchain types
• Public blockchain
• Ledger is public, anyone can join?
• Private blockchain
• Ledger is private, anyone can join?
• Permissioned blockchain
• Ledger can be public or private, join requires consent of existing parties
36
37. What is Hyperledger?
• Hyperledger is an open source collaborative effort created to advance cross-industry blockchain
technologies. It is a global collaboration, hosted by The Linux Foundation, including leaders in finance,
banking, Internet of Things, supply chains, manufacturing and Technology.
• Launched in February 2016
https://www.hyperledger.org/about
Frameworks
Tools
Hyperledger
Indy
Hyperledger
Fabric
Hyperledger
Iroha
Hyperledger
Sawtooth
Hyperledger
Burrow
Hyperledger
Composer
Hyperledger
Explorer
Hyperledger
Cello
37
38. Hyperledger Projects Design Philosophy
• Consensus Layer
• Responsible for generating an agreement on the order and confirming the correctness of the set of transactions that constitute a block
• Smart Contract Layer
• Responsible for processing transaction requests and determining if transactions are valid by executing business logic.
• Communication Layer
• Responsible for peer-to-peer message transport between the nodes that participate in a shared ledger instance
• Data Store Abstraction (Ledger)
• Allows different data-stores to be used by other modules.
• Crypto Abstraction
• Allows different crypto algorithms or modules to be swapped out without affecting other modules.
• Identity Services
• Enables the establishment of a root of trust during setup of a blockchain instance, the enrollment and registration of identities or system entities during network
operation, and the management of changes like drops, adds, and revocations. Also, provides authentication and authorization.
• Policy Services
• Responsible for policy management of various policies specified in the system, such as the endorsement policy, consensus policy, or group management policy. It
interfaces and depends on other modules to enforce the various policies.
• APIs
• Enables clients and applications to interface to blockchains.
• Interoperation
• Supports the interoperation between different blockchain instances
38
40. Overview of Hyperledger Fabric – Key Design Goals
• The four P’s
• Permissioned
• Privacy
• Pluggability
• Performance
40
41. Permissioned: Existing members determine who can join the network,
and update configuration
Public blockchains
• Download software and connect to network
• Configuration updated through developer
or community consensus
Hyperledger Fabric
• Policy-based mechanism to admit new
members and to update configuration
6/8 votes
(admit A: majority vote)
A
A
B
I want to invite A to network
A
B
A
B
A
B A
B
A
B
A
B
A
B
B
I want to invite B to network
A
B
3/8 votes
(reject B: majority vote)
Permissioned != Private 41
42. Privacy: Smart contract execution, and transaction data storage limited to a
set of nodes in the network based on policy
Public blockchains
• Every node runs smart contract
• Every full node can potentially have a full copy
of the ledger
Hyperledger Fabric
• A subset of nodes will run smart contracts
• The ledger updates are limited to set of
nodes (channel).
• Nodes in a channel can directly share private
data with subset of nodes (collections,
v1.1 feature)
SC
SC
SC
SC
SC
SC
SC
SC
SCSC
SC
Channel /
Private data collection
42
43. Pluggability: consensus, identity provider, crypto, data format, smart
contract language
Public blockchains
• Fixed or hard to change consensus algorithm (proof of work)
• Fixed encryption (e.g., secp256k1)
• Identity = public key - self
• Domain specific language (DSL) for writing smart contracts
Hyperledger Fabric
• Pluggable consensus algorithm (PBFT, Kafka)
• Pluggable crypto service provider
• Pluggable identity provider, zero knowledge
proofs
• General data format, key / value pair
• General purpose languages for writing smart contracts
(Javascript, Go)
43
44. Performance: transactions should commit quickly
Public blockchains
• Use proof of work / proof-of-stake as consensus
algorithm due to which it may be a while before
transactions are final (e.g., 60 minutes)
• Transaction commitments are often
probabilistic
Hyperledger Fabric
• Uses a voting based consensus mechanism
• Transaction commitments are immediately final
44
45. Ok, so where is mining in Hyperledger Fabric?
• There is no mining – however, the consensus algorithm is pluggable
• Consensus properties: safety, liveness
• The Kafka service used in Hyperledger Fabric is crash tolerant, but not Byzantine fault tolerant
source: https://www.hyperledger.org/wp-content/uploads/2017/08/Hyperledger_Arch_WG_Paper_1_Consensus.pdf
Hyperledger Fabric
Hyperledger Sawtooth
45
46. Hyperledger Fabric and Ethereum* – A summary
Hyperledger Fabric Ethereum
Open source Yes Yes
Live network No – create your own network Yes
Who can join the network? Depends on the rules created by network
creators – default majority vote (Permissioned)
Anyone
Smart contract language Javascript, Go
Smart contracts called chaincode in Fabric
Solidity, Vyper, LLL
Rogue smart contract prevention Explicit review and installation of smart code
before execution (no notion of gas)
Gas
Who executes smart contracts? Subset of nodes (or all) All nodes by default / channels
Who stores the blocks? (state visibility) Subset of nodes (or all) All nodes by default / channels
Consensus algorithm Execute-order-validate (voting) – no mining PoW, PoS
Identity X.509 certificate issued by membership service
provider of a peer. Contains public key
Public key
Incentive for running a node Business network Ether
*comparing apples to oranges? (open source software vs live public network)
46
47. Blockchain Applications
• Cryptocurrency (enuf said)
• Food Safety (provenance of goods from source to destination)
• The physical to digital correlation problem…
• Vitalik’s view on Blockchain applications (Dec 2018) tweet
• 50 examples of blockchain real world use cases
• Self-“Sovereign” Identity
47
48. Food Safety
Seller Crop / Quantity Buyer
Joe (farmer) sold crops (SKU#j1) Mangoes / 100 lbs Alice
Alice (distributor) sold crops (SKU#j1) Mangoes / 10 lbs Walmart
Alice (distributor) sold crops (SKU#j1) Mangoes / 90 lbs Kroger
Tina (farmer) sold crops (SKU#t1) Mangoes / 200 lbs Walmart
‘Joe’ the
farmer
‘Alice’ the distributor
“Tina” the
farmer
Seller Crop/Quantity Buye
r
Joe(farmer)soldcrops(SKU#j1) Mangoes/100lbs Alice
Alice(distributor)soldcrops(SKU#j1) Mangoes/10lbs Wal
mar
t
Alice(distributor)soldcrops(SKU#j1) Mangoes/90lbs Krog
er
Tina(farmer)soldcrops(SKU#t1) Mangoes/200lbs Wal
mar
t
Seller Crop/Quantity Buye
r
Joe(farmer)soldcrops(SKU#j1) Mangoes/100lbs Alice
Alice(distributor)soldcrops(SKU#j1) Mangoes/10lbs Wal
mar
t
Alice(distributor)soldcrops(SKU#j1) Mangoes/90lbs Krog
er
Tina(farmer)soldcrops(SKU#t1) Mangoes/200lbs Wal
mar
t
Seller Crop/Quantity Buye
r
Joe(farmer)soldcrops(SKU#j1) Mangoes/100lbs Alice
Alice(distributor)soldcrops(SKU#j1) Mangoes/10lbs Wal
mar
t
Alice(distributor)soldcrops(SKU#j1) Mangoes/90lbs Krog
er
Tina(farmer)soldcrops(SKU#t1) Mangoes/200lbs Wal
mar
t
Seller Crop/Quantity Buye
r
Joe(farmer)soldcrops(SKU#j1) Mangoes/100lbs Alice
Alice(distributor)soldcrops(SKU#j1) Mangoes/10lbs Wal
mar
t
Alice(distributor)soldcrops(SKU#j1) Mangoes/90lbs Krog
er
Tina(farmer)soldcrops(SKU#t1) Mangoes/200lbs Wal
mar
t
Seller Crop/Quantity Buye
r
Joe(farmer)soldcrops(SKU#j1) Mangoes/100lbs Alice
Alice(distributor)soldcrops(SKU#j1) Mangoes/10lbs Wal
mar
t
Alice(distributor)soldcrops(SKU#j1) Mangoes/90lbs Krog
er
Tina(farmer)soldcrops(SKU#t1) Mangoes/200lbs Wal
mar
t
Block N
Block N+1
Block N+2
Block N+3
48
49. Vitalik’s view on blockchain applications
• https://twitter.com/VitalikButerin/status/1072162014498148355
49
50. 50+ examples of blockchains in real world
https://medium.com/@matteozago/50-examples-of-how-blockchains-are-taking-over-the-world-4276bf488a4b
50
51. Self-sovereign identity (SSI)
• What is SSI? (def. by Christopher Allen)
• http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html
• The principles
• Existence. Users must have an independent existence.
• Control. Users must control their identities.
• Access. Users must have access to their own data.
• Transparency. Systems and algorithms must be transparent.
• Persistence. Identities must be long-lived.
• Portability. Information and services about identity must be transportable.
• Interoperability. Identities should be as widely usable as possible.
• Consent. Users must agree to the use of their identity.
• Minimalization. Disclosure of claims must be minimized.
• Protection. The rights of users must be protected.
• Decentralized identity foundation (https://identity.foundation/)
• Sovrin foundation (https://sovrin.org/) – Columbia can be a steward node
(https://sovrin.org/stewards/)
51