This document discusses how blockchain technology can transform security. It begins by defining blockchain as a distributed electronic ledger maintained by a network of nodes that reduces the cost of verification. It then provides examples of how blockchain is being used for applications like cryptocurrencies, smart contracts, supply chain visibility, digital advertising, voting and more. However, it also outlines potential risks like darknets enabling illegal activity, security vulnerabilities in wallets and mining, and centralization problems. It concludes by encouraging proceeding with blockchain technology with caution.
3. BLOCKCHAIN DEFINED
• A BLOCKCHAIN IS A DISTRIBUTED (ELECTRONIC/ONLINE) LEDGER MAINTAINED
BY A NETWORK OF PARTICIPATING NODES (COMPUTERS)
• IT RADICALLY REDUCES THE COST OF VERIFICATION AND NETWORKING
• IT DOES NOT REQUIRE TRUST - RATHER IT RELIES ON CRYPTOGRAPHY AND
GAME THEORY TO PROVIDE CONFIDENCE
7. BLOCKCHAIN BONANZA
• According to @CoinMarketCap
there are 1326 “public”
cryptocurrencies available for
trading.
• It should be assumed there are
private blockchains that we
cannot track.
DENTACOI
N
11. ATTENTION BASED ECONOMY
“As marketers, we face scarcity when we
want the attention of our audience, but are
competing with thousands of other
marketers, companies, people, and things
for that finite resource.”, Kimbe MacMaster
Basic Attention Token
16. DARKNETS
• Contraband: drugs, weapons and
stolen data
• Targeted hacking
• Extortion/Ransomware
• Distributed Denial of Service
attacks
• Sex trafficking
• Kidnapping
• Murder for hire
ONION ROUTING + ZERO KNOWLEDGE
SYSTEM + “TUMBLING”/MIXING + OPSEC =
ANONYMITY
17. BACKDOORS, BUGS & BAD CRYPTO
• PROOF OF WORK (RESOURCE THEFT)
• WALLETS
• HOT
• COLD STORAGE (OFFLINE)
• “WARM” (ESCROW)
• CONFIDENCE = TRUST + CONTROL
18. MINING, EXCHANGES & ICO’S
• POOLS & CAPACITY
• COLLUSION
• TRANSACTION THROTTLING – LOGICAL FUSES
• SEE ABOVE (THE POWER OF BRAND, TRIBES AND
CONSORTIA)