This document provides an overview of online privacy and identity. It discusses how current online identifiers are controlled by third parties rather than individuals. It then introduces decentralized identifiers (DIDs) as a new type of cryptographically-verifiable identifier that is owned by individuals rather than companies. DIDs allow for portable, privacy-respecting identifiers and verifiable credentials that do not depend on central authorities. The document outlines the potential benefits of this approach for data portability, privacy and security compared to the current internet identifier system.
The cryptographic asset market turns institutional with regulated ICOs, exchanges, and options. The retail market allows the long tail of personalized economic services to meet in “eBay for money” digital marketplaces and global financial inclusion. Digitized money and payments, and activity possibly being securely forward-committed in payment contracts, implies that the economy could settle on the basis of net rather than gross flows. A net-clearings contracts-for-difference economy could rethink crippling monolithic debt structures with streaming money disgorged in much smaller chunks that are more closely tied to costs and repayment possibilities. Pre-paid consumption and 30-60-90 day vendor credit terms models could be offset to facilitate a directed payment graph economy of just-in-time money.
Distributed ledgers imply peer-banking services offered by every network node to others for a small fee. Money becomes an accounting ledger running on a distributed computer network, a transaction, credit, and payment graph. Digitized money and payments, and activity possibly being securely forward-committed in payment contracts, suggests that the economy could settle on the basis of net rather than gross transfers. A net-clearings contracts-for-difference economy could enable us to rethink debt, replacing crippling monolithic capital structures with streaming money disgorged in smaller chunks that are more closely tied to costs and repayment possibilities. Pre-paid consumption and 30-60-90 day vendor credit terms models could be offset to facilitate a directed payment graph economy of just-in-time money. A wide slate of contemporary economic challenges might be addressed including health care price rationalization, global energy management, entitlements, and the automation economy.
Blockchain Economics
http://timreview.ca/article/1109
Blockchain Philosophy
http://onlinelibrary.wiley.com/doi/10.1111/meta.2017.48.issue-5/issuetoc
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...John Domingue
This in depth tutorial, presented at the 2018 International Semantic Web Research Summer School (ISWS), looks at the possibilities for a decentralised semantic web focusing primarily on the relationship between blockchains and linked data. The first part of the talk is an extensive explanation of what blockchains are and how they are used. This is followed by links to ongoing decentralised linked data research including Tim Berners-Lee's SOLID and Ruben Verborgh's Linked Data Fragments.
How Blockchains Are Transforming Adult EducationJohn Domingue
Slides from a session at the 9th Pan Commonwealth Forum giving an overview of the technology and concrete examples of how it is being used today to transform adult learning in a number of regions.
Blockchain Investing: Economics Implications of Distributed LedgersMelanie Swan
The investment market for cryptocurrencies is becoming increasingly institutional. In July 2017 (in the wake of the “ICO dotcom bubble”), the SEC signaled its stance on ICOs. “Stock-like” ICOs are likely to be deemed securities, and as such, would need to be registered offerings, which by implication, would target institutional investors. Also in July 2017, the CFTC granted a derivatives clearing license to New York-based LedgerX for cryptocurrency derivatives, and options listings may appear on the CBOE later in 2017. Since derivatives markets are already part of the institutional ecosystem, this means that cryptocurrency derivatives might be a more accessible, liquid, and large-scale means of obtaining exposure to crypto asset classes than investing in the underlying cryptocurrencies themselves. Finally, there is greater emphasis on institutional liquidity aggregation platforms for large-size cryptocurrency trading (i.e. $20+ million positions), with Genesis Trading, Cumberland Mining, Circle, and Project Omni.
Blockchains as a Component of the Next generation InternetJohn Domingue
This talk gives an overview of the blockchain technology describing its impact, the constituent elements and how it may be used. Related EU Funding opportunities are also covered.
The cryptographic asset market turns institutional with regulated ICOs, exchanges, and options. The retail market allows the long tail of personalized economic services to meet in “eBay for money” digital marketplaces and global financial inclusion. Digitized money and payments, and activity possibly being securely forward-committed in payment contracts, implies that the economy could settle on the basis of net rather than gross flows. A net-clearings contracts-for-difference economy could rethink crippling monolithic debt structures with streaming money disgorged in much smaller chunks that are more closely tied to costs and repayment possibilities. Pre-paid consumption and 30-60-90 day vendor credit terms models could be offset to facilitate a directed payment graph economy of just-in-time money.
Distributed ledgers imply peer-banking services offered by every network node to others for a small fee. Money becomes an accounting ledger running on a distributed computer network, a transaction, credit, and payment graph. Digitized money and payments, and activity possibly being securely forward-committed in payment contracts, suggests that the economy could settle on the basis of net rather than gross transfers. A net-clearings contracts-for-difference economy could enable us to rethink debt, replacing crippling monolithic capital structures with streaming money disgorged in smaller chunks that are more closely tied to costs and repayment possibilities. Pre-paid consumption and 30-60-90 day vendor credit terms models could be offset to facilitate a directed payment graph economy of just-in-time money. A wide slate of contemporary economic challenges might be addressed including health care price rationalization, global energy management, entitlements, and the automation economy.
Blockchain Economics
http://timreview.ca/article/1109
Blockchain Philosophy
http://onlinelibrary.wiley.com/doi/10.1111/meta.2017.48.issue-5/issuetoc
Decentralised Semantic Web @ International Semantic Web Research Summer Schoo...John Domingue
This in depth tutorial, presented at the 2018 International Semantic Web Research Summer School (ISWS), looks at the possibilities for a decentralised semantic web focusing primarily on the relationship between blockchains and linked data. The first part of the talk is an extensive explanation of what blockchains are and how they are used. This is followed by links to ongoing decentralised linked data research including Tim Berners-Lee's SOLID and Ruben Verborgh's Linked Data Fragments.
How Blockchains Are Transforming Adult EducationJohn Domingue
Slides from a session at the 9th Pan Commonwealth Forum giving an overview of the technology and concrete examples of how it is being used today to transform adult learning in a number of regions.
Blockchain Investing: Economics Implications of Distributed LedgersMelanie Swan
The investment market for cryptocurrencies is becoming increasingly institutional. In July 2017 (in the wake of the “ICO dotcom bubble”), the SEC signaled its stance on ICOs. “Stock-like” ICOs are likely to be deemed securities, and as such, would need to be registered offerings, which by implication, would target institutional investors. Also in July 2017, the CFTC granted a derivatives clearing license to New York-based LedgerX for cryptocurrency derivatives, and options listings may appear on the CBOE later in 2017. Since derivatives markets are already part of the institutional ecosystem, this means that cryptocurrency derivatives might be a more accessible, liquid, and large-scale means of obtaining exposure to crypto asset classes than investing in the underlying cryptocurrencies themselves. Finally, there is greater emphasis on institutional liquidity aggregation platforms for large-size cryptocurrency trading (i.e. $20+ million positions), with Genesis Trading, Cumberland Mining, Circle, and Project Omni.
Blockchains as a Component of the Next generation InternetJohn Domingue
This talk gives an overview of the blockchain technology describing its impact, the constituent elements and how it may be used. Related EU Funding opportunities are also covered.
Towards the decentralisation of personal data through blockchains and linked ...John Domingue
A talk at the University of Bonn Computer Science Colloquium. It covers how distributed ledgers (blockchains) combined with decentralised linked data technologies such as Solid can support the management of personal data avoiding the issues highlighted in the media around for example, Facebook and Cambridge Analytica.
1. https://www.informatik.uni-bonn.de/de/kolloquium/2018ws/towards-the-decentralisation-of-personal-data-through-blockchains-and-linked-data
Future of AI: Blockchain and Deep LearningMelanie Swan
The Future of AI: Blockchain and Deep Learning
First point: considering blockchain and deep learning together suggests the emergence of a new class of global network computing system. These systems are self-operating computation graphs that make probabilistic guesses about reality states of the world.
Second point: blockchain and deep learning are facilitating each other’s development. This includes using deep learning algorithms for setting fees and detecting fraudulent activity, and using blockchains for secure registry, tracking, and remuneration of deep learning nets as they go onto the open Internet (in autonomous driving applications for example). Blockchain peer-to-peer nodes might provide deep learning services as they already provide transaction hosting and confirmation, news hosting, and banking (payment, credit flow-through) services. Further, there are similar functional emergences within the systems, for example LSTM (long-short term memory in RNNs) are like payment channels.
Third point: AI smart network thesis. We are starting to run more complicated operations through our networks: information (past), money (present), and brains (future). There are two fundamental eras of network computing: simple networks for the transfer of information (all computing to date from mainframe to mobile) and now smart networks for the transfer of value and intelligence. Blockchain and deep learning are built directly into smart networks so that they may automatically confirm authenticity and transfer value (blockchain) and predictively identify individual items and patterns.
There’s a lot of hype right now about blockchain, the technology that underpins the Bitcoin virtual currency, with speculation that it could transform just about every aspect of our lives. In this webinar I’ll consider possible blockchain applications in research and education, and do a little myth-busting about when and where it makes sense to use blockchain.
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedMelanie Swan
Beyond digitalizing money, payments, economics, and finance, and governance, smart property and smart contracts, blockchains secure automated fleet coordination
The implications could be an orderly transition to the automation economy and trust-rich digital smartnetwork societies of the future
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Alexia Maddox
Presentation at Concordia University October 2018
Dr Alexia Maddox, Lecturer in Communications, School of Communication and Creative Arts, Deakin University.
Email: a.maddox@deakin.edu.au
Keywords:
Social media analysis; twitter; cryptocurrencies; social disruption; digital trace data.
Abstract
Cryptocurrencies represent emerging financial technologies engendered through overlapping community values of decentralised peer-to-peer exchange, encryption technologies and an overarching agenda towards the disruption of centralised banking within the fiat economy. This paper will trace the development and shifts in public discourse within social media surrounding cryptocurrencies. The last five years have seen cryptocurrencies move from technological emergence to a broadening range of applications and history potholed with disputes, divergence, hacks and scams within the community. The accompanying influence of speculation has shifted the focus from social adoption to value volatility and seen the incorporation of associated technologies within banking and other organisational processes. The emphasis within public discourse has also followed a shift from bitcoin to blockchain. The study is grounded through a Twitter analysis of cryptocurrency-related social media discourse within the Australian context. The social media analysis works with social media archives of the Australian Twittersphere captured between early 2012 to May 2017. Access to this curated archive is through TrISMA and the timeframe under analysis aligns with the most detailed available dataset. The analysis seeks to characterise the emergence of public dialogue surrounding cryptocurrency use and application over time, focusing on peak engagement events. The key concepts directing the focus and interpretation of the social media analysis include financial inclusion, socio-technical disruption and social change. The whimsical quest of the study is to learn where the digital frontier has shifted to within this community and point to possible future developments. From a community studies perspective the case study represents an initial foray into data analytics to explore whether it is possible to detect the shifting shape and form of digital community through its environmental imprint (Maddox 2016). This methodological aspect of the work speaks to an attempt to generate a data recognition practice that can be deployed to search for signatures of social disruption within digital trace data.
Bio:
Alexia Maddox is a digital sociologist with research interests are community studies, research methods and digital frontiers. Here recent book, Research Methods and Global Online Communities: a case study with Routledge, combines these areas and forms the basis of her study of emerging communities forming through the internet and cryptography.
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACYSteven Rhyner
In {a report|a record} on Bitcoin, Merrill Lynch's {commodity|product|asset} {and|as well as|and also} {derivatives|by-products} {strategist|planner} Francisco Blanch, {has|has actually} {noted|kept in mind} the {similarities|resemblances} of {digital|electronic} {currencies|moneys} to gold {but|however|yet} {says|states|claims} it {can|could} take the {next|following} {step|action} up in {money|cash|loan}'s {evolution|development|advancement} if {issues|problems|concerns} on {safety|security|safety and security}, liquidity {and|as well as|and also} return are {addressed|dealt with|attended to|resolved}.
COVID-19 Antibody Test+Vaccination Certificates: There's an app for thatmeisenstadt
OVERVIEW AND ABSTRACT: This is the 'silent' slide deck, including extra Question-and-Answer session slides, from a presentation at The Open University's Knowledge Media Institute on 19th May 2020, in which we describe the workings of the world's first blockchain-based mobile app for certifying and verifying COVID-19 antibody test results and vaccinations. A full video replay of the 20-minute talk, as well as the full 30-minute followup question and answer session, and related academic papers, can be found at https://blockchain.open.ac.uk/#covid-19
----------[ABSTRACT OF TALK FOLLOWS]----------
As the COVID-19 Pandemic of 2019/2020 unfolds, a controversial 'Immunity Passport' has been mooted as a way to enable individuals to return back to work or be admitted to current off-limits locations. Our approach is less dramatic, concentrating on the soundness of certification and verification: While the quality of antibody testing and the likelihood of even attaining COVID-19 immunity continue to be researched, we address the issues involved in providing certification for antibody testing and likely future vaccination, in a tamper-proof, privacy-preserving, and ethically appropriate manner. To do this, we developed a prototype mobile phone app and requisite decentralised server architecture. Personally identifiable information is only stored at the user's discretion, and the app allows the end-user selectively to present only the specific test result with no other personal information revealed. Behind the scenes it relies upon (a) the 2019 World Wide Web Consortium standard called 'Verifiable Credentials', (b) Tim Berners-Lee's decentralized personal data platform 'Solid', and (c) a consortium Ethereum-based blockchain. Our approach enables both verifiability and privacy in a manner derived from public/private key pairs and digital signatures, generalized to avoid restrictive ownership of sensitive digital keys and/or data. The app and decentralised server architecture offer a prototype proof of concept that is readily scalable, applicable generically, and in effect 'waiting in the wings' for the biological issues, plus key ethical issues discussed in the presentation, to be resolved.
Full replay, academic papers, and related material can be found at
https://blockchain.open.ac.uk/#covid-19
Master of Sheets: A Tale of Compromised Cloud DocumentsJeremiah Onaolapo
Slides presented at IEEE EuroS&P WACCO (workshop) on June 20, 2019. Stockholm, Sweden. The full paper is available at https://jonaolapo.github.io/papers/wacco19sheetshoney.pdf
Crypto tokens imply optionality and the ability to better manage risk. The thesis of this talk is that smart contracts are options, and as such, can be used to control risk (unwanted future uncertainty) in a wider range of areas than has been possible previously, in finance, and in other areas too such as medicine. Options as a financial market instrument have long been used to control the amount and timing of risk in specific ways and tailor exposure with granularity. Smart contracts are an even more flexible species of options because they are programmable contracts that can be used to confer the right to buy or sell any blockchain-based asset or liability at a future moment in time (blocktime or “fiat” (regular) time) per certain terms and consideration. Therefore, smart contracts allow a greater variety in the degree and type of risks that might be brought under management. The impact of having greater control over risk is that intangible social goods are produced such as surety, confidence, and reliability, which help to engender a more trustful society.
Beyond digitalizing money, payments, economics, and finance, blockchains are a singularity-class technology that enables the secure, trackable, automated coordination of very large-scale projects, fleets, and swarms
The implications could be an orderly transition to the automation economy and trust-rich human-machine collaboration in the digital smartnetwork societies of the future
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGESteven Rhyner
Blockchain technology is ready to "take centre stage", says a new report by banking giant Goldman Sachs. The bank – which participated in Circle's $50m funding round earlier this year – notes in its Emerging Theme Radar research note sent to clients today that bitcoin might just be the "opening act" for blockchain technology.
There is increasing interest in the potential impact of Blockchain globally, across the business world. Blockchain is transforming data storage, security, digital property management, transactions in a variety of forms, and much, much, more. And the impact will be felt across a number of industries, including manufacturing, insurance, healthcare, retail, logistics, and more.
We believe Blockchain presents a unique opportunity for enterprises to leverage a revolutionary new technology and redefine how they function. The Blockchain Landscape Report 2019 by [X]cubeLABS discusses everything Blockchain ranging from its history, mechanism, and industry-wide adoption to its future potential.
A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. Each transaction in the public ledger is verified by consensus of a majority of the participants in the system. And, once entered, information can never be erased. The blockchain contains a certain and verifiable record of every single transaction ever made. To use a basic analogy, it is easy to steal a cookie from a cookie jar, kept in a secluded place than stealing the cookie from a cookie jar kept in a marketplace, being observed by thousands of people. In the report, it distinguishes between multiple types of blockchains and explains the two biggest platforms, namely Bitcoin and Ethereum. While introducing those two platforms we explain the most important technology and algorithms used such as proof of work concept. Some of the security issues and solutions are also covered. We conclude with some concrete Ethereum based applications that demonstrate the usage of blockchain technology beyond cryptocurrency and illustrate current developments in this field.
Overview of blockchain technology and architectureEY
The adoption of blockchain technology continues to accelerate across a wide array of industries, yet many of our clients are confused about how to deploy these solutions within their environment. EY has developed a blockchain stack that fits within the existing enterprise infrastructure, project and system development life cycle approaches that are customized to the new technology, and development frameworks to streamline our deployment.
Blockchain: a Singularity-class technology - No other technology has the power to
pull 2 billion people out of poverty overnight (with intermediary-free international remittances), produce a safe and orderly transition to the automation economy (with humans and machines in collaboration, and enacting friendly artificial intelligence), and fundamentally transform the only remaining sectors not yet re-engineered for the Internet era: economics and politics. There are growing classes of activities for smartnetwork execution, moving up the stack, pushing different qualitative states through the Internet pipes, building future smartnetworks. The smartnetworks thesis is that complex future operations will involve automated fleet coordination of “quantized” items via smartnetworks, using some kind of technology like blockchains with algorithmically-derived trust.
Blockchain for Executives, Entrepreneurs and InvestorsFenbushi Capital
A brief summary of key issues that executives, entrepreneurs and investors across all industries should be aware of when considering blockchain.
First presented 8 June 2018 at the Longhash Incubator in Singapore.
How do companies track people online, how have legal challenges played out, and what's coming next?
I gave this talk at University of California, Berkeley, School of Law (Boalt Hall) on April 12, 2016. Thanks to the Berkeley Center for Law and Technology, the Berkeley Technology Law Journal, and Winston & Strawn LLP for hosting.
A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. Each transaction in the public ledger is verified by consensus of a majority of the participants in the system. And, once entered, information can never be erased. The blockchain contains a certain and verifiable record of every single transaction ever made. Bitcoin, the decentralized peer to peer digital currency, is the most popular example that uses blockchain technology. The digital currency bitcoin itself is highly controversial but the underlying blockchain technology has worked flawlessly and found a wide range of applications in both the financial and nonfinancial world. The main hypothesis is that the blockchain establishes a system of creating a distributed consensus in the digital online world. This allows participating entities to know for certain that a digital event happened by creating an irrefutable record in a public ledger. It opens the door for developing a democratic open and scalable digital economy from a centralized one. There are tremendous opportunities in this disruptive technology and revolution in this space has just begun. This white paper describes blockchain technology and some compelling specific applications in both the financial and nonfinancial sector. Nandan Chitale | Yogeshchandra Puranik "Blockchain and Beyond" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42425.pdf Paper URL: https://www.ijtsrd.comcomputer-science/other/42425/blockchain-and-beyond/nandan-chitale
This talk articulates 1) what is a blockchain 2) why it is interesting 3) talks through use-cases grounded in real world projects. 4) Highlights questions government leaders should ask before deciding to use a blockchain.
Social Media Copyright Management using Semantic Web and BlockchainRoberto García
Solutions based on distributed ledgers require sophisticated tools for data modelling and integration that can be overcome using semantic and Linked Data technologies. One example is copyright management, where we attempt to adapt the Copyright Ontology so it can be used to build applications that benefit from both worlds, rich information modelling and reasoning together with immutable and accountable information storage that provides trust and confidence on the modelled rights statements. This approach has been applied in the context of an application for the management of social media re-use for journalistic purposes.
Towards the decentralisation of personal data through blockchains and linked ...John Domingue
A talk at the University of Bonn Computer Science Colloquium. It covers how distributed ledgers (blockchains) combined with decentralised linked data technologies such as Solid can support the management of personal data avoiding the issues highlighted in the media around for example, Facebook and Cambridge Analytica.
1. https://www.informatik.uni-bonn.de/de/kolloquium/2018ws/towards-the-decentralisation-of-personal-data-through-blockchains-and-linked-data
Future of AI: Blockchain and Deep LearningMelanie Swan
The Future of AI: Blockchain and Deep Learning
First point: considering blockchain and deep learning together suggests the emergence of a new class of global network computing system. These systems are self-operating computation graphs that make probabilistic guesses about reality states of the world.
Second point: blockchain and deep learning are facilitating each other’s development. This includes using deep learning algorithms for setting fees and detecting fraudulent activity, and using blockchains for secure registry, tracking, and remuneration of deep learning nets as they go onto the open Internet (in autonomous driving applications for example). Blockchain peer-to-peer nodes might provide deep learning services as they already provide transaction hosting and confirmation, news hosting, and banking (payment, credit flow-through) services. Further, there are similar functional emergences within the systems, for example LSTM (long-short term memory in RNNs) are like payment channels.
Third point: AI smart network thesis. We are starting to run more complicated operations through our networks: information (past), money (present), and brains (future). There are two fundamental eras of network computing: simple networks for the transfer of information (all computing to date from mainframe to mobile) and now smart networks for the transfer of value and intelligence. Blockchain and deep learning are built directly into smart networks so that they may automatically confirm authenticity and transfer value (blockchain) and predictively identify individual items and patterns.
There’s a lot of hype right now about blockchain, the technology that underpins the Bitcoin virtual currency, with speculation that it could transform just about every aspect of our lives. In this webinar I’ll consider possible blockchain applications in research and education, and do a little myth-busting about when and where it makes sense to use blockchain.
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedMelanie Swan
Beyond digitalizing money, payments, economics, and finance, and governance, smart property and smart contracts, blockchains secure automated fleet coordination
The implications could be an orderly transition to the automation economy and trust-rich digital smartnetwork societies of the future
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Alexia Maddox
Presentation at Concordia University October 2018
Dr Alexia Maddox, Lecturer in Communications, School of Communication and Creative Arts, Deakin University.
Email: a.maddox@deakin.edu.au
Keywords:
Social media analysis; twitter; cryptocurrencies; social disruption; digital trace data.
Abstract
Cryptocurrencies represent emerging financial technologies engendered through overlapping community values of decentralised peer-to-peer exchange, encryption technologies and an overarching agenda towards the disruption of centralised banking within the fiat economy. This paper will trace the development and shifts in public discourse within social media surrounding cryptocurrencies. The last five years have seen cryptocurrencies move from technological emergence to a broadening range of applications and history potholed with disputes, divergence, hacks and scams within the community. The accompanying influence of speculation has shifted the focus from social adoption to value volatility and seen the incorporation of associated technologies within banking and other organisational processes. The emphasis within public discourse has also followed a shift from bitcoin to blockchain. The study is grounded through a Twitter analysis of cryptocurrency-related social media discourse within the Australian context. The social media analysis works with social media archives of the Australian Twittersphere captured between early 2012 to May 2017. Access to this curated archive is through TrISMA and the timeframe under analysis aligns with the most detailed available dataset. The analysis seeks to characterise the emergence of public dialogue surrounding cryptocurrency use and application over time, focusing on peak engagement events. The key concepts directing the focus and interpretation of the social media analysis include financial inclusion, socio-technical disruption and social change. The whimsical quest of the study is to learn where the digital frontier has shifted to within this community and point to possible future developments. From a community studies perspective the case study represents an initial foray into data analytics to explore whether it is possible to detect the shifting shape and form of digital community through its environmental imprint (Maddox 2016). This methodological aspect of the work speaks to an attempt to generate a data recognition practice that can be deployed to search for signatures of social disruption within digital trace data.
Bio:
Alexia Maddox is a digital sociologist with research interests are community studies, research methods and digital frontiers. Here recent book, Research Methods and Global Online Communities: a case study with Routledge, combines these areas and forms the basis of her study of emerging communities forming through the internet and cryptography.
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACYSteven Rhyner
In {a report|a record} on Bitcoin, Merrill Lynch's {commodity|product|asset} {and|as well as|and also} {derivatives|by-products} {strategist|planner} Francisco Blanch, {has|has actually} {noted|kept in mind} the {similarities|resemblances} of {digital|electronic} {currencies|moneys} to gold {but|however|yet} {says|states|claims} it {can|could} take the {next|following} {step|action} up in {money|cash|loan}'s {evolution|development|advancement} if {issues|problems|concerns} on {safety|security|safety and security}, liquidity {and|as well as|and also} return are {addressed|dealt with|attended to|resolved}.
COVID-19 Antibody Test+Vaccination Certificates: There's an app for thatmeisenstadt
OVERVIEW AND ABSTRACT: This is the 'silent' slide deck, including extra Question-and-Answer session slides, from a presentation at The Open University's Knowledge Media Institute on 19th May 2020, in which we describe the workings of the world's first blockchain-based mobile app for certifying and verifying COVID-19 antibody test results and vaccinations. A full video replay of the 20-minute talk, as well as the full 30-minute followup question and answer session, and related academic papers, can be found at https://blockchain.open.ac.uk/#covid-19
----------[ABSTRACT OF TALK FOLLOWS]----------
As the COVID-19 Pandemic of 2019/2020 unfolds, a controversial 'Immunity Passport' has been mooted as a way to enable individuals to return back to work or be admitted to current off-limits locations. Our approach is less dramatic, concentrating on the soundness of certification and verification: While the quality of antibody testing and the likelihood of even attaining COVID-19 immunity continue to be researched, we address the issues involved in providing certification for antibody testing and likely future vaccination, in a tamper-proof, privacy-preserving, and ethically appropriate manner. To do this, we developed a prototype mobile phone app and requisite decentralised server architecture. Personally identifiable information is only stored at the user's discretion, and the app allows the end-user selectively to present only the specific test result with no other personal information revealed. Behind the scenes it relies upon (a) the 2019 World Wide Web Consortium standard called 'Verifiable Credentials', (b) Tim Berners-Lee's decentralized personal data platform 'Solid', and (c) a consortium Ethereum-based blockchain. Our approach enables both verifiability and privacy in a manner derived from public/private key pairs and digital signatures, generalized to avoid restrictive ownership of sensitive digital keys and/or data. The app and decentralised server architecture offer a prototype proof of concept that is readily scalable, applicable generically, and in effect 'waiting in the wings' for the biological issues, plus key ethical issues discussed in the presentation, to be resolved.
Full replay, academic papers, and related material can be found at
https://blockchain.open.ac.uk/#covid-19
Master of Sheets: A Tale of Compromised Cloud DocumentsJeremiah Onaolapo
Slides presented at IEEE EuroS&P WACCO (workshop) on June 20, 2019. Stockholm, Sweden. The full paper is available at https://jonaolapo.github.io/papers/wacco19sheetshoney.pdf
Crypto tokens imply optionality and the ability to better manage risk. The thesis of this talk is that smart contracts are options, and as such, can be used to control risk (unwanted future uncertainty) in a wider range of areas than has been possible previously, in finance, and in other areas too such as medicine. Options as a financial market instrument have long been used to control the amount and timing of risk in specific ways and tailor exposure with granularity. Smart contracts are an even more flexible species of options because they are programmable contracts that can be used to confer the right to buy or sell any blockchain-based asset or liability at a future moment in time (blocktime or “fiat” (regular) time) per certain terms and consideration. Therefore, smart contracts allow a greater variety in the degree and type of risks that might be brought under management. The impact of having greater control over risk is that intangible social goods are produced such as surety, confidence, and reliability, which help to engender a more trustful society.
Beyond digitalizing money, payments, economics, and finance, blockchains are a singularity-class technology that enables the secure, trackable, automated coordination of very large-scale projects, fleets, and swarms
The implications could be an orderly transition to the automation economy and trust-rich human-machine collaboration in the digital smartnetwork societies of the future
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGESteven Rhyner
Blockchain technology is ready to "take centre stage", says a new report by banking giant Goldman Sachs. The bank – which participated in Circle's $50m funding round earlier this year – notes in its Emerging Theme Radar research note sent to clients today that bitcoin might just be the "opening act" for blockchain technology.
There is increasing interest in the potential impact of Blockchain globally, across the business world. Blockchain is transforming data storage, security, digital property management, transactions in a variety of forms, and much, much, more. And the impact will be felt across a number of industries, including manufacturing, insurance, healthcare, retail, logistics, and more.
We believe Blockchain presents a unique opportunity for enterprises to leverage a revolutionary new technology and redefine how they function. The Blockchain Landscape Report 2019 by [X]cubeLABS discusses everything Blockchain ranging from its history, mechanism, and industry-wide adoption to its future potential.
A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. Each transaction in the public ledger is verified by consensus of a majority of the participants in the system. And, once entered, information can never be erased. The blockchain contains a certain and verifiable record of every single transaction ever made. To use a basic analogy, it is easy to steal a cookie from a cookie jar, kept in a secluded place than stealing the cookie from a cookie jar kept in a marketplace, being observed by thousands of people. In the report, it distinguishes between multiple types of blockchains and explains the two biggest platforms, namely Bitcoin and Ethereum. While introducing those two platforms we explain the most important technology and algorithms used such as proof of work concept. Some of the security issues and solutions are also covered. We conclude with some concrete Ethereum based applications that demonstrate the usage of blockchain technology beyond cryptocurrency and illustrate current developments in this field.
Overview of blockchain technology and architectureEY
The adoption of blockchain technology continues to accelerate across a wide array of industries, yet many of our clients are confused about how to deploy these solutions within their environment. EY has developed a blockchain stack that fits within the existing enterprise infrastructure, project and system development life cycle approaches that are customized to the new technology, and development frameworks to streamline our deployment.
Blockchain: a Singularity-class technology - No other technology has the power to
pull 2 billion people out of poverty overnight (with intermediary-free international remittances), produce a safe and orderly transition to the automation economy (with humans and machines in collaboration, and enacting friendly artificial intelligence), and fundamentally transform the only remaining sectors not yet re-engineered for the Internet era: economics and politics. There are growing classes of activities for smartnetwork execution, moving up the stack, pushing different qualitative states through the Internet pipes, building future smartnetworks. The smartnetworks thesis is that complex future operations will involve automated fleet coordination of “quantized” items via smartnetworks, using some kind of technology like blockchains with algorithmically-derived trust.
Blockchain for Executives, Entrepreneurs and InvestorsFenbushi Capital
A brief summary of key issues that executives, entrepreneurs and investors across all industries should be aware of when considering blockchain.
First presented 8 June 2018 at the Longhash Incubator in Singapore.
How do companies track people online, how have legal challenges played out, and what's coming next?
I gave this talk at University of California, Berkeley, School of Law (Boalt Hall) on April 12, 2016. Thanks to the Berkeley Center for Law and Technology, the Berkeley Technology Law Journal, and Winston & Strawn LLP for hosting.
A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. Each transaction in the public ledger is verified by consensus of a majority of the participants in the system. And, once entered, information can never be erased. The blockchain contains a certain and verifiable record of every single transaction ever made. Bitcoin, the decentralized peer to peer digital currency, is the most popular example that uses blockchain technology. The digital currency bitcoin itself is highly controversial but the underlying blockchain technology has worked flawlessly and found a wide range of applications in both the financial and nonfinancial world. The main hypothesis is that the blockchain establishes a system of creating a distributed consensus in the digital online world. This allows participating entities to know for certain that a digital event happened by creating an irrefutable record in a public ledger. It opens the door for developing a democratic open and scalable digital economy from a centralized one. There are tremendous opportunities in this disruptive technology and revolution in this space has just begun. This white paper describes blockchain technology and some compelling specific applications in both the financial and nonfinancial sector. Nandan Chitale | Yogeshchandra Puranik "Blockchain and Beyond" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42425.pdf Paper URL: https://www.ijtsrd.comcomputer-science/other/42425/blockchain-and-beyond/nandan-chitale
This talk articulates 1) what is a blockchain 2) why it is interesting 3) talks through use-cases grounded in real world projects. 4) Highlights questions government leaders should ask before deciding to use a blockchain.
Social Media Copyright Management using Semantic Web and BlockchainRoberto García
Solutions based on distributed ledgers require sophisticated tools for data modelling and integration that can be overcome using semantic and Linked Data technologies. One example is copyright management, where we attempt to adapt the Copyright Ontology so it can be used to build applications that benefit from both worlds, rich information modelling and reasoning together with immutable and accountable information storage that provides trust and confidence on the modelled rights statements. This approach has been applied in the context of an application for the management of social media re-use for journalistic purposes.
Science B.0 Blockchain, Cryptoeconomics and autonomous agentsSoenke Bartling
First idea cloud about what blockchain technology and cryptoeconomics could mean for the sciences, humanities and overal knowledge creation.
(Various openly available image sources in the internet have been used, reverse image search will lead you to the source).
Blockchain for Land Records and Real EstateJohn Mirkovic
An in-depth presentation on why and how blockchain technology can be applied to keeping government records of real estate transactions. Information on how bitcoin and blockchains function.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
Blockchain for Business: What, How, Why & USE CASESmichaelmcgowan27
What is so special about Blockchain? How does this ledger really work? Why would I even consider using Blockchain? Find answers to these questions. More importantly, find real USE CASES where Blockchain is being used in the market place.
Data Con LA 2018 - From the Panama Papers by Mark QuinslandData Con LA
From the Panama Papers to Russian Trolls - How Graph Databases are Revealing Hidden Relationships and Exposing Corruption. by Mark Quinsland, Field Engineer, Neo4J
With the assistance of Neo4j's graph experts, the International Consortium for Investigative Journalism won the Pulitzer Prize for exposing the complex relationships hidden away in the Panama Papers of the wealthy, their money, government officials, and tax havens. Neo also provided them with expertise for analyzing the subsequent Paradise Papers. More recently, Neo helped MSNBC use graph techniques to successfully identify the Russian Trolls responsible for over 200k fake tweets during the 2016 election This presentation will show the techniques used in these projects and how they are being used successfully by many global organizations for their cybersecurity, identity resolution, and fraud use cases.
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
This week’s Open Source Insight features a powerful visualization tool displaying the world’s biggest data breaches at name brands such as Ebay, Equifax, Anthem, and Target. The White House and British Foreign Office have condemned a cyber-attack launched by the Russian military on Ukraine and hint at reprisals. Black Duck brings open source vulnerability detection to Kubernetes, and Synopsys will host Elevate, an evening thought leadership event at Embedded World 2018 featuring an elite group of international cyber security experts leading a discussion about IoT and embedded systems security threats and solutions.
Read on for all the open source security and cybersecurity news you need to know this week.
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
http://ssimeetup.org/did-resolution-given-did-how-do-retrieve-document-markus-sabadello-webinar-13/
Markus Sabadello, CEO of Danube Tech, will talk about DID Resolution and how to retrieve a DID document. As we know, Decentralized Identifiers (DIDs) are a key component in SSI architecture. They are used as building blocks for verifiable credentials, wallets, agents, and data exchange protocols. To make all this work, we need to be able to “resolve” DIDs to their associated DID Documents. This process fulfills a similar purpose as DNS does in the classic web. And while DID Resolution is not a very complicated topic, it is still important to understand how it works and how it relates to other topics. In this webinar, we will give a general introduction to DID Resolution, discuss a few in-depth topics, and also demo concrete tools that are available today.
Most DID Resolution implementations envision an architecture where a common base component invokes a set of “drivers” or “plugins” or “modules” to implement method-specific functionality, e.g. see the DIF Universal Resolver, Digital Bazaar’s did-client, or the uPort JavaScript DID Resolver. We envision such “DID Resolver” tools to become as central to SSI infrastructure as DNS is for the web today.
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docxarnit1
Chapter
Ethics and Privacy
3
c03EthicsandPrivacy.indd Page 60 02/12/11 9:19 AM F-497c03EthicsandPrivacy.indd Page 60 02/12/11 9:19 AM F-497 208/MHBR201/ben29421_disk1of1/0073529421/ben29421_pagefiles208/MHBR201/ben29421_disk1of1/0073529421/ben29421_pagefiles
[ LEARNING OBJECTIVES ] [ CHAPTER OUTLINE ] [ WEB RESOURCES ]
1. Defi ne ethics, list and
describe the three fundamental
tenets of ethics, and describe
the four categories of ethical
issues related to information
technology.
2. Identify three places that store
personal data, and for each one,
discuss at least one potential
threat to the privacy of the data
stored there.
Student Companion Site
wiley.com/college/rainer
• Student PowerPoints for note taking
• Interactive Case: Ruby’s Club
Assignments
• Complete glossary
WileyPlus
All of the above and
• E-book
• Mini-lecture by author for each
chapter section
• Practice quizzes
• Flash Cards for vocabulary review
• Additional “What’s in IT for Me?”
cases
• Video interviews with managers
• Lab Manual for Microsoft Offi ce
2010
• How-to Animations for Microsoft
Offi ce 2010
3.1 Ethical Issues
3.2 Privacy
POMFIN HRMKT MISACCT
Ensure correctness of
annual reports
Adhere to regulatory
environment
Monitor labor laws
overseas
Monitor appropriate
use of IT in workplace
Monitor correct use
of sensitive company
data
Ensure privacy of
customers
What’s In
ITFor Me?
T H I S C H A P T E R W I L L H E L P P R E P A R E Y O U T O . . .
61
c03EthicsandPrivacy.indd Page 61 02/12/11 9:19 AM F-497c03EthicsandPrivacy.indd Page 61 02/12/11 9:19 AM F-497 208/MHBR201/ben29421_disk1of1/0073529421/ben29421_pagefiles208/MHBR201/ben29421_disk1of1/0073529421/ben29421_pagefiles
62 CHAPTER 3 Ethics and Privacy
[ What to
Do About
WikiLeaks?]
The Problem (?)
O
ne of the major controversies generated by the Vietnam War occurred in 1971, when
The New York Times and other sources publicized excerpts from a secret Defense
Department study—quickly labeled The Pentagon
Papers—that detailed the history of U.S. involvement
in Southeast Asia. These documents had been copied by defense
analyst Daniel Ellsberg, one of the contributors to the study. Given
the existing technologies, Ellsberg had to photocopy thousands
of documents by hand. Today, whistleblowers—employees with
insider knowledge of an organization—can capture huge amounts
of incriminating documents on a laptop, memory stick, or por-
table hard drive. They can send the information through personal e-mail accounts or online drop
sites, or they can simply submit it directly to WikiLeaks (www.wikileaks.org).
WikiLeaks was offi cially unveiled in December 2006. Julian Assange, one of the founders,
was reportedly inspired by the leak of the Pentagon Papers. Assange intended WikiLeaks to
serve as a dropbox for anyone, anywhere, who disagreed with any organization’s activities or
secrets. According to its Web site, WikiLea ...
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
Presented at the Ethereum Engineering Group Meetup in Brisbane, Australia, on 13 Nov 2019. We report on research to use an Ethereum blockchain as an MFA and/or MPA device to secure command channels on IoT networks, even when the underlying network may be compromised.
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...David Wood
Presentation at ICSSC 2019 (see http://www.kaconf.org) associated with the following academic paper:
David Hyland-Wood, Peter Robinson, Roberto Saltini, Sandra Johnson, Christopher Hare. Method for Securing Spacecraft Tasking and Control via an Enterprise Ethereum Blockchain. Proc. 37th International Communications Satellite Systems Conference (ICSSC), 29 October - 1 November 2019.
Implementing the Verifiable Claims data modelDavid Wood
The W3C Verifiable Claims data model arguably requires a decentralised, distributed database controllable by three types of parties; issuers, inspectors, and holders. This presentation explores the benefits of implementing the Verifiable Claims data model using the RDF and Linked Data technology stack.
Metaphors define civilized life. They are all around us in the stories that we teach our children and tell each other to justify our actions. But social metaphors have a dark side. They can cause entire civilizations to self destruct. Metaphors can kill. This presentation explores the power, and danger, of metaphors as social memes.
These slides are from a talk given to the Fredericksburg Secular Humanists (FSH) in Fredericksburg, Virginia, on 8 November 2015. FSH is sub-chapter of the United Coalition of Reason (unitedcor.org). The talk compared the secular societies of the United States and Australia.
Building a writer's platform with social mediaDavid Wood
This presentation reports on my progress in trying to build my writer's platform using social media. It focuses on Twitter, but the advice is generally applicable. Kudos to my mentors @DanCitizen and @RayneHall.
A summary of the Hero's Journey, Joseph Campbell's formulation of the "monomyth" in mythology and literature. Originally presented to the Fredericksburg Writing as a Business Meetup, 24 January 2015.
Open Data is the idea that "certain data should be freely available to everyone to use and republish as they wish, without restrictions from copyright, patents or other mechanisms of control”. Open Data follows similar “open” concepts that have proven to be valuable in the information economy such as Open Standards, Open Source Software, Open Content and has been followed more recently by variations on the theme such as Open Science and Open Government.
Open Data allows information of common value to be reused without needing to be recreated. The economic benefits of Open Data include cost reduction, organizational efficiencies and the facilitation of commonly held understanding. The costs of implementing Open Data deployment strategies tend to be iterative on top of existing information infrastructure.
This presentation will describe Open Data and its place in the ecosystem of economic and governmental discourse.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
1. 1
Returning to Online Privacy?
Dr. David Hyland-Wood
david@hyland-wood.org
5 November 2019
2.
3. The people held the government,
but they did not hold the power.
“
4.
5.
6.
7.
8. ”
When the missionaries came to Africa,
they had the Bible and we had the land.
They said “let us close our eyes and
pray.” When we opened them, we had
the Bible, and they had the land.
17. W3C Verifiable Credentials
19
The mission of the W3C Verifiable Claims Working Group:
Express credentials on the Web in a way that is
cryptographically secure, privacy respecting, and
automatically verifiable.
18. The laws of mathematics are very
commendable, but the only law that
applies in Australia is the law of Australia.“
19. The Web’s Identifier Problem
21
To date, every identifier you use online
does not belong to you; it belongs to
someone else.
This results in problems related to cost, data
portability, data privacy, and data security.
20. Why is this a problem?
22
500 Million guests
412 Million users
145 Million users
110 Million shoppers
3,000 Million users
21. Web Identifiers Today
23
Domain Name System
(Identifiers are leased to individuals)
Issuer
(Website)
Government, Employer,
etc.
Verifier
(Website)
Company, Bank, etc.
Holder
(Digital Wallet /
Personal Data Store)
Citizen, Employee, etc.
Issue
Credentials
Present
Profiles
22. What is missing?
24
Many portable identifiers for any person, organisation,
or thing that does not depend on a centralised
authority, are protected by cryptography, and enable
privacy and data portability.
23. Decentralised Identifiers
25
A new type of globally resolvable,
cryptographically-verifiable identifier, registered
directly on a distributed ledger or blockchain
24. What does a DID look like?
26
did:example:123456789abcdefghijk
Schem
e
DID
Method
DID Method Specific String
did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD
Example:
25. DIDs Resolve to DID Documents
27
{
"@context": "https://w3id.org/veres-one/v1",
"id": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD",
"authentication": [{
"type": "Ed25519SignatureAuthentication2018",
"publicKey": [{
"id": "did:v1:test:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD#authn-key-1",
"type": "Ed25519VerificationKey2018",
"owner": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD",
"publicKeyBase58": "DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD"
}]
}],
"service": [{
"type": "ExampleMessagingService",
"serviceEndpoint": ”https://example.com/services/messages”
}],
… more DID-specific information here …
}
1. Authentication Mechanisms
3. Service Discovery
2. Public Key Material
26. Decentralized Identifiers
28
Decentralized Identifiers
(Identifiers are owned by individuals)
Blockchains / DHTs
(Decentralized Ledger)
Veres One, Sovrin, Bitcoin, Ethereum, etc.
Issuer
(Website)
Government, Employer,
etc.
Verifier
(Website)
Company, Bank, etc.
Holder
(Digital Wallet /
Personal Data Store)
Citizen, Employee, etc.
Issue
Credentials
Present
Profiles
29. (David) Wheeler’s Law
All problems in computer science can be solved by
another level of indirection, but that will usually
30. (David) Wheeler’s Law
All problems in computer science can be solved by
another level of indirection, but that will usually
create another problem.
32. Acknowledgments
34
● Vintage 1984 movie poster modified from a version by Flikr user “book radio”, CC-BY-2.0 license,
https://www.flickr.com/photos/bookdio/14164592302
● Photo of the bombing of La Moneda (Chilean presidential palace) on 11 Sep 1973 by Biblioteca del Congreso Nacional, CC-BY-3.0-CL
license, https://commons.wikimedia.org/w/index.php?curid=16325488
● Photo of Salvador Allende, CC-BY-3.0-CL license, https://commons.wikimedia.org/wiki/File:Salvador_Allende_1952.JPG
● Salvador Allende quote from United States Congress, House Committee on Foreign Affairs (1789-1975), “Hearings, Reports and Prints of
the House Committee on Foreign Affairs”, U.S. Government Printing Office, 1975, pp 585
● Project Cybersyn operations room photo by Source, fair use due to historical significance (low resolution) for educational purposes,
https://en.wikipedia.org/w/index.php?curid=12937653,
https://en.wikipedia.org/wiki/Project_Cybersyn#/media/File:Cybersyn_control_room.jpg
● Nuremburg Laws illustration German Government (“Entwurf Willi Hackenberger”, “Copyright by Reichsausschuß für
Volksgesundheitsdienst”, government agency apparently part of the Reichs- und Preußisches Ministerium des Innern), in the public domain,
https://commons.wikimedia.org/wiki/File:Nuremberg_laws_Racial_Chart.jpg
● Photo of birth and death records in a family bible by Chuck Coker, CC BY-ND 2.0 license,
https://www.flickr.com/photos/caveman_92223/3288595909
● IDC projections from IDC White Paper, The Digitization of the World - From Edge to Core, Doc# US44413318, November 2018,
https://www.seagate.com/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf
33. Acknowledgments
35
● Illustration of “Saltbush Bill's Second Fight” by Frank Mahony, The Antipodean, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=37814122
● Illustration of Henry Lawson’s The Team by an unknown artist, The Australian Town and Country Journal, Public
Domain, https://en.wikipedia.org/wiki/The_Teams#/media/File:The_Teams_-_illo.png
● Brisbane City Hall photo by Tanya Dedyukhina, CC-BY-3.0 license,
https://commons.wikimedia.org/wiki/File:Brisbane_City_Hall_-_panoramio.jpg
● Photo of Desmond Tutu provided by Lavinia Browne under the public domain,
https://commons.wikimedia.org/wiki/File:Archbishop-Tutu-medium.jpg
● Desmond Tutu quote from Steven Gish, Desmond Tutu: A Biography, 2004, pp. 101 (although potentially
originally attributable to Rolf Hochhuth, The Deputy, a Christian tragedy, Grove Press, 1964, pp. 144)
● Credit cards photograph by Nick Youngson, CC BY-SA 3.0 license, http://www.picserver.org/c/credit-cards26.html
● Wiretap meme courtesy of Reddit user benjaminikuta, February 2018
● Privacy vs. Anonymity chart used by many, but possibly originally by Adam Ludwin, 20 January 2015,
https://coincenter.org/entry/how-anonymous-is-bitcoin
34. Copyright and Trademark Attribution
36
Corporate logos used in this presentation are the registered trademarks of their
respective companies.
Logos are used for educational purposes only under fair use provisions of
copyright law. The lowest resolution visible to the audience was used.
Editor's Notes
On the 11th of September, warplanes bombed the presidential mansion. Within five hours, the president committed suicide in his office as Army troops supporting the coup stormed the building.
The oldest and most apparently stable democracy in its region was toppled by its own federal police and military.
This was no simple power grab. The culprits were well known: A deadly combination of foreign interference in elections, including from a superpower’s intelligence agencies, and the raw greed of those controlling access to rich mineral deposits combined to create an atmosphere of political bifurcation. Right wing parties controlled the legislature while the left controlled the executive.
The date was the 11th of September 1973. The place was La Moneda the presidential palace of Santiago, Chile.
The president was Salvador Allende, a physician and the first Marxist ever elected to lead a democratic country.
In the three years that followed, the government of dictator General Augusto Pinochet imprisoned 130,000 people in country where 50% of the GDP was controlled by only 300,000.
What, I hear you ask, does this have to do with libraries? Everything, it turns out, because it has to do with data and how we choose to use it in our societies.
Librarians, and a few philosophers, have been the only ones asking questions about data, its organisation, its long term storage and the ethics of its access for many centuries. This has been true across many forms of government since Aristotle first organised his books in a hierarchy and Callimachus of Cyrenae expanded that system in the Pinakes.
Allende’s government had spent three years attempting to remove foreign control of the key mining industries, especially copper. They did that by nationalising those industries, and attempting to run them from the government.
This is not the bridge of the original Star Trek series; it is the operations room of Project Cybersyn, the government control centre of the new economy. Cybersyn collected an unprecedented amount of data from 500 factories via a network of telex machines. Data was collected on individual workers, such as when they did or not show up for work, as well as production schedules.
Data from Cybersyn was used to organise relief supplies coming into Santiago during a truckers strike. The breaking of that strike would be used to justify the following year’s coup.
NB: Cybersyn is a portmanteau of the words "cybernetics" and "synergy".
It was not the first time in history data collection was used to facilitate a coup or the brutal crackdown that followed.
The Nazi Party used census data first collected in 1840s Prussia to perpetrate the Holocaust. A question regarding household religion was added to the census nearly a century before it was used by Nazi eugenicists under the Nuremberg Laws to determine who was allowed to marry, who could be permitted to have children, and finally who was sent to concentration camps for enslavement and execution.
The amount of data involved was tiny: How many people in a house, their ages and gender, what was the family religion? By 1970s Chile, when did they show up for work?
It was not much more than the birth and death listings most often kept in a family Bible.
NB: My own father’s birthday was originally written in such a document, and eventually transferred to county records. But my grandmother was off by a year. It was easy to happen after ten children and while running a family farm, but it was a source of frustration to my father when he went to enlist in World War II, or to acquire his retirement benefits.
These basic forms of data collection were the common experience of Australia’s current culture’s formative years.
It wasn’t that long ago.
We don’t think about how quickly this has changed.
The Brisbane City Hall was built, mostly by hand, just two generations after Patterson and Lawson wrote their most well-known works. Elsewhere, countries were already creating skyscrapers that would require the marriage of people and increasingly capable machinery to build.
NB: Within the living memory of my parents
Brisbane City Hall, started 1920, finished 1930
Empire State Building, started 1930, finished 1931
Last year I watched a house across the street from me being built in St. Lucia by only two men - and some very capable remote controlled robots.
Our machines have moved well beyond their ability to help us physically. They are now helping us create, manipulate, distribute and communicate information.
As our populations grew, it was our Governments who would act as trusted third parties for transactions that would prove situational identity, e.g. library card, door pass, drivers license.
These are all done in advance for later use.
They help us navigate a world full of strangers with whom we must interact.
But those abilities come with a warning label.
Power and greed can change a society very, very quickly.
We are now in a period of time when the data we both produce and collect for use is growing at an unprecedented rate.
Our machines are also creating data for us and about us. 2013 was the first year Internet traffic was created majority by machines. Human Internet traffic has been in the minority ever since.
Our data is also (disproportionally) moving out of our hands.
We are giving this data to others to hold for us, and often for it to be used to advertise to us, sell to us, manipulate our behaviours, and sometimes to control our behaviours.
Our new sources of data come predominately from corporations, not from governments. In most cases, it comes from our actions as we move through our digital world.
Our credit cards are joined by loyalty cards, such as Fly Buys, Velocity, coffee cards, etc. These are all opportunities to give data about your life and your habits to someone.
The key to collecting information is to develop systems where users willingly provide it.
Facebook and other social networks followed the card companies in this business model.
Google performs 2.3M searches per minute, and considers 200 factors to arrive at each search result. That is a staggering amount of data about our personal lives. It is, in short, the greatest tool for authoritarianism ever produced.
We are even inviting these systems into our personal lives, sometimes in very intimate ways.
We have learned this year that Google, Apple and others have been able to distinguish when home users of these technologies have been sleeping, eating, working, and having sex. Of course, they also know when you are home and when you are not.
You might think this is hardly mainstream, but last year Fortune magazine reported “32% of the country already owns a smart speaker and another 16% plan on getting one this holiday season.”
Children, and their habits, are now often tracked from birth.
Starting in 2016, China’s Social Credit System is actively implementing a system based on strong knowledge of identity and reputation to decide who is more valuable for work, housing, social mobility, and travel.
What kind of society do we want?
The Social Credit System has been called, in headlines, a privacy invasion, state innovation, a way to restore trust in society, an Orwellian degree of control.
Which is it? Well, all of them, of course.
What are we to do? Should we go “all in” as China has (and India might), defer entirely to corporations like the U.S., legislate privacy like the E.U.?
We do have hints of other options if we analyse what we mean by privacy.
The Bitcoin and Ethereum blockchains have shown us it is possible to conduct anonymous transactions in plain sight.
The W3C, the organisation that brought you the Web and ensured it was built to be accessed by all of humanity, has taken up this challenge.
However reluctantly.
Let’s have a quick look at a credential. They all have similar characteristics.
We get our credentials from somewhere (e.g. Government, Facebook), they are stored somewhere, and used to prove who we are (and what we should have access to).
Cryptographically secure… could be a problem at the moment.
This is a problem because we cannot trust the people currently doing it for us.
Marriot: 2018
Equifax: 2017
AFF: 2016
Ebay: 2014
Yahoo: 2013
Target: 2013
Australia 2019 (Jan only!):
Nova Entertainment
Victorian Public Servants
Hawthorn Football Club
Big W
Early Warning Network
Marriott (again) and Starwood Hotels
NSW Department of Planning and Environment
First National Real Estate
Fisheries Queensland
Collection #1
Optus
SkoolBag
My Health Records
Facebook
The companies working to implement verifiable credentials generally wish to offer you a service, for a fee. There are currently 13, including some of the big ones, who have committed to an implementation of the upcoming standard.
We have yet to determine how blockchain-based monetary systems, distributed identifiers, or similar technologies will impact our societies. Of particular note is our involvement with law enforcement.
Sometimes the only thing that protects us is the aphorism that “real data is dirty”.
The data others hold about us is not always accurate, nor timely. However, it is getting more so on a daily basis.
It is time to protect ourselves by design.
This suggestion is simply another level of indirection. So, a caveat.
David Wheeler: First PhD in CS (Cambridge, 1951) and inventor of the subroutine.
Wheeler is most often misquoted by leaving off the end of his sentence. It is wise to take heed.