SlideShare a Scribd company logo
Decentralized Consensus 
1 
and the 
Death of the Server
2 
sp0rkyd0rky 
gordonwritescode
3 
The Client-Server 
Model is Broken
4 
Popular services become 
susceptible to targeted attacks 
Use of software requires an active 
network connection
5 
Your data is stored, handled, and 
secured by a third party 
The remote server is a single point 
of failure
6 
Necessitating Trust has 
Consequences
7 
You are only as secure as the 
remote host and there is no 
means to audit remote software 
Experience is controlled by a man 
behind a curtain
Using centralized social 
networking software is the 
most widely demonstrated 
form of a MITM attack. 
8
(centralization === tyranny) 
9
Monetization becomes more 
important than user privacy and 
freedom 
Software products begin manifesting 
as instruments of power 
10
●Users are reduced into 
tools serving the interest 
11 
of the software.
12 
Which, in turn, serves 
the interests of the 
developer.
13 
while(true) { resist() }
14 
To say that anarchists 
subscribe to anarchism is like 
saying that pianists subscribe 
to pianism
15 
Anarchy is simply cooperative 
self-determination – it is part 
of everyday life.
16 
It is a mode of being, a manner 
of responding to conditions and 
relating to others, a class of 
human behavior.
17 
Peer-to-peer networking 
undermines the necessity of 
authority. 
Decentralized systems empower 
users to compute freely.
Trust is not vital to the operation of 
decentralized systems. 
18 
Cryptography replaces the need 
for trust with math.
19 
Really, really hard math.
20 
This enables you to restrict who 
can access information that 
belongs to you. 
And can verify the authenticity of 
information shared with you.
21 
Decentralized 
or 
Distributed 
(or the difference between agnostic and atheist)
22
23
24 
The difference lies in 
trading some trust for 
some performance.
25 
if (centralized > decentralized) process.exit(1);
26 
Centralized application design is 
popular because it is easy to 
control. 
Peer-to-peer problems are more 
difficult to solve.
Software should improve life by 
enabling users to solve problems 
they have in common, collectively. 
27 
Why do you write software?
28 
Building Decentralized 
Consensus with Node.js
29 
Node.js is a platform built on Chrome's 
JavaScript runtime for easily building fast, 
scalable network applications. 
Node.js uses an event-driven, non-blocking I/O 
model that makes it lightweight and efficient, 
perfect for data-intensive real-time 
applications that run across distributed 
devices.
30 
I mean, duh.
31 
SmokeSignal is P2P networking in 
a box. 
Tiny is an in-process key/value 
store.
32 
The protocol defines how peers 
communicate. 
Defining this is more than half of 
your application design.
33 
{ 
message: JSON({ 
id: String(base64(sha1(pubkey)), 
key: String, 
value: Mixed, 
time: Date 
}), 
pubkey: String, 
signature: String(privkey.sign(message)) 
}
The public key and signature allow 
peers to verify the authenticity and 
origin of the message. 
The timestamp prevents old 
messages from taking precedence. 
34
The message ID lets peers store the 
record under a namespace that is 
unique to the message author. 
35 
Key/value pairs are unique per 
identity.
36 
Consensus can be defined as the 
aggregate of values for a given 
key. 
This resembles a vote for a arbitrary 
topic.
37 
When peers connect, they stream 
their record of history from each 
other. 
This is used to synchronize the 
consensus.
All peers have the same 
38 
record of history. 
Trusting nobody unless 
it's everybody.
39 
Streams are your best friend. 
They are indispensable for both 
performance of nodes and 
maintainability of software.
40 
var parser = new MsgParser(); 
var handler = new MsgHandler(); 
node.pipe(parser).pipe(handler);
41 
npm install -g dside
42 
(decentralization === 
liberty)

More Related Content

What's hot

Cryptointro
CryptointroCryptointro
Cryptointro
losalamos
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technology
Alket Cecaj
 
US Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David MertzUS Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David Mertz
OSCON Byrum
 
Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)
Gayathridevi120
 
What makes BlockChain secure.pptx
What makes BlockChain secure.pptxWhat makes BlockChain secure.pptx
What makes BlockChain secure.pptx
ManishDevkar1
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake
 
fucking shit
fucking shitfucking shit
fucking shit
eyalrav
 

What's hot (7)

Cryptointro
CryptointroCryptointro
Cryptointro
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technology
 
US Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David MertzUS Patriot Act OSCON2012 David Mertz
US Patriot Act OSCON2012 David Mertz
 
Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)
 
What makes BlockChain secure.pptx
What makes BlockChain secure.pptxWhat makes BlockChain secure.pptx
What makes BlockChain secure.pptx
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
fucking shit
fucking shitfucking shit
fucking shit
 

Viewers also liked

Презентация для ИОП по химии
Презентация для ИОП по химииПрезентация для ИОП по химии
Презентация для ИОП по химии
Евгения Андросова
 
Current Job Description
Current Job DescriptionCurrent Job Description
Current Job DescriptionBrian Miller
 
Засоби комунікаціі депутата та громади, застосовані в проекті "Модельний окру...
Засоби комунікаціі депутата та громади, застосовані в проекті "Модельний окру...Засоби комунікаціі депутата та громади, застосовані в проекті "Модельний окру...
Засоби комунікаціі депутата та громади, застосовані в проекті "Модельний окру...
Lena Sotnyk
 
C 3_danyou_guide
C 3_danyou_guideC 3_danyou_guide
Where Food Comes From - Overview
Where Food Comes From - OverviewWhere Food Comes From - Overview
Where Food Comes From - Overview
Where Food Comes From, Inc.
 
Partitial values
Partitial valuesPartitial values
Partitial values
MARIA KATRINA MACAPAZ
 
Chauca, 1997
Chauca, 1997Chauca, 1997
Chauca, 1997
Quiteria Becerra
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
Niva tharan
 
QUARTILES, DECILES AND PERCENTILES
QUARTILES, DECILES  AND PERCENTILESQUARTILES, DECILES  AND PERCENTILES
QUARTILES, DECILES AND PERCENTILES
MARIA KATRINA MACAPAZ
 

Viewers also liked (9)

Презентация для ИОП по химии
Презентация для ИОП по химииПрезентация для ИОП по химии
Презентация для ИОП по химии
 
Current Job Description
Current Job DescriptionCurrent Job Description
Current Job Description
 
Засоби комунікаціі депутата та громади, застосовані в проекті "Модельний окру...
Засоби комунікаціі депутата та громади, застосовані в проекті "Модельний окру...Засоби комунікаціі депутата та громади, застосовані в проекті "Модельний окру...
Засоби комунікаціі депутата та громади, застосовані в проекті "Модельний окру...
 
C 3_danyou_guide
C 3_danyou_guideC 3_danyou_guide
C 3_danyou_guide
 
Where Food Comes From - Overview
Where Food Comes From - OverviewWhere Food Comes From - Overview
Where Food Comes From - Overview
 
Partitial values
Partitial valuesPartitial values
Partitial values
 
Chauca, 1997
Chauca, 1997Chauca, 1997
Chauca, 1997
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
 
QUARTILES, DECILES AND PERCENTILES
QUARTILES, DECILES  AND PERCENTILESQUARTILES, DECILES  AND PERCENTILES
QUARTILES, DECILES AND PERCENTILES
 

Similar to Decentralized Consensus and the Death of the Server

Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
Patricia Viljoen
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
IJNSA Journal
 
Distributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebDistributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic Web
Editor IJCATR
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
MohamedOmerMusa
 
Identify your next Asia business opportunity with Corda
Identify your next Asia business opportunity with Corda Identify your next Asia business opportunity with Corda
Identify your next Asia business opportunity with Corda
I AM Consulting
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
AdiseshaK
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
Prof. Dr. K. Adisesha
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
AdiseshaK
 
blockchain governance : opportunities and challenges
 blockchain governance : opportunities and challenges blockchain governance : opportunities and challenges
blockchain governance : opportunities and challenges
Rachid Meziani, PhD, CGEIT, PMP
 
50+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 202250+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 2022
Temok IT Services
 
Blockchian introduction
Blockchian introductionBlockchian introduction
Blockchian introduction
kesavan N B
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
IJCNC
 
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKSECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
IJNSA Journal
 
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
DSIVABALASELVAMANIMC
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
Haris Chughtai
 
Understanding the Basics of Decentralized Applications (dApps)
Understanding the Basics of Decentralized Applications (dApps)Understanding the Basics of Decentralized Applications (dApps)
Understanding the Basics of Decentralized Applications (dApps)
Capital Numbers
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
IJMER
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Security
ijceronline
 
H0362052056
H0362052056H0362052056
H0362052056
inventionjournals
 
DWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For MakersDWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For Makers
TechSoup
 

Similar to Decentralized Consensus and the Death of the Server (20)

Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
 
Distributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebDistributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic Web
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
Identify your next Asia business opportunity with Corda
Identify your next Asia business opportunity with Corda Identify your next Asia business opportunity with Corda
Identify your next Asia business opportunity with Corda
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
 
blockchain governance : opportunities and challenges
 blockchain governance : opportunities and challenges blockchain governance : opportunities and challenges
blockchain governance : opportunities and challenges
 
50+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 202250+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 2022
 
Blockchian introduction
Blockchian introductionBlockchian introduction
Blockchian introduction
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKSECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
 
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
 
Understanding the Basics of Decentralized Applications (dApps)
Understanding the Basics of Decentralized Applications (dApps)Understanding the Basics of Decentralized Applications (dApps)
Understanding the Basics of Decentralized Applications (dApps)
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Security
 
H0362052056
H0362052056H0362052056
H0362052056
 
DWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For MakersDWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For Makers
 

Recently uploaded

top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 

Recently uploaded (20)

top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 

Decentralized Consensus and the Death of the Server

  • 1. Decentralized Consensus 1 and the Death of the Server
  • 3. 3 The Client-Server Model is Broken
  • 4. 4 Popular services become susceptible to targeted attacks Use of software requires an active network connection
  • 5. 5 Your data is stored, handled, and secured by a third party The remote server is a single point of failure
  • 6. 6 Necessitating Trust has Consequences
  • 7. 7 You are only as secure as the remote host and there is no means to audit remote software Experience is controlled by a man behind a curtain
  • 8. Using centralized social networking software is the most widely demonstrated form of a MITM attack. 8
  • 10. Monetization becomes more important than user privacy and freedom Software products begin manifesting as instruments of power 10
  • 11. ●Users are reduced into tools serving the interest 11 of the software.
  • 12. 12 Which, in turn, serves the interests of the developer.
  • 13. 13 while(true) { resist() }
  • 14. 14 To say that anarchists subscribe to anarchism is like saying that pianists subscribe to pianism
  • 15. 15 Anarchy is simply cooperative self-determination – it is part of everyday life.
  • 16. 16 It is a mode of being, a manner of responding to conditions and relating to others, a class of human behavior.
  • 17. 17 Peer-to-peer networking undermines the necessity of authority. Decentralized systems empower users to compute freely.
  • 18. Trust is not vital to the operation of decentralized systems. 18 Cryptography replaces the need for trust with math.
  • 19. 19 Really, really hard math.
  • 20. 20 This enables you to restrict who can access information that belongs to you. And can verify the authenticity of information shared with you.
  • 21. 21 Decentralized or Distributed (or the difference between agnostic and atheist)
  • 22. 22
  • 23. 23
  • 24. 24 The difference lies in trading some trust for some performance.
  • 25. 25 if (centralized > decentralized) process.exit(1);
  • 26. 26 Centralized application design is popular because it is easy to control. Peer-to-peer problems are more difficult to solve.
  • 27. Software should improve life by enabling users to solve problems they have in common, collectively. 27 Why do you write software?
  • 28. 28 Building Decentralized Consensus with Node.js
  • 29. 29 Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices.
  • 30. 30 I mean, duh.
  • 31. 31 SmokeSignal is P2P networking in a box. Tiny is an in-process key/value store.
  • 32. 32 The protocol defines how peers communicate. Defining this is more than half of your application design.
  • 33. 33 { message: JSON({ id: String(base64(sha1(pubkey)), key: String, value: Mixed, time: Date }), pubkey: String, signature: String(privkey.sign(message)) }
  • 34. The public key and signature allow peers to verify the authenticity and origin of the message. The timestamp prevents old messages from taking precedence. 34
  • 35. The message ID lets peers store the record under a namespace that is unique to the message author. 35 Key/value pairs are unique per identity.
  • 36. 36 Consensus can be defined as the aggregate of values for a given key. This resembles a vote for a arbitrary topic.
  • 37. 37 When peers connect, they stream their record of history from each other. This is used to synchronize the consensus.
  • 38. All peers have the same 38 record of history. Trusting nobody unless it's everybody.
  • 39. 39 Streams are your best friend. They are indispensable for both performance of nodes and maintainability of software.
  • 40. 40 var parser = new MsgParser(); var handler = new MsgHandler(); node.pipe(parser).pipe(handler);
  • 41. 41 npm install -g dside

Editor's Notes

  1. 1. Introduction 2. State and demonstrate the problem 3. 4. Demonstrate solution in practice 5. Summary