d o c u m e n t c o i n
play

D O C U M E N T C O I N Chris Anderson @jchris jchris@gmail.com - PowerPoint PPT Presentation

C RY P T O C U R R E N C Y F O R T H E G I F T E C O N O M Y D O C U M E N T C O I N Chris Anderson @jchris jchris@gmail.com QCon London 2016 TA K E H O M E L E S S O N S Blockchain without global consensus is interesting


  1. C RY P T O C U R R E N C Y F O R T H E G I F T E C O N O M Y D O C U M E N T C O I N Chris Anderson @jchris jchris@gmail.com QCon London 2016

  2. TA K E H O M E L E S S O N S • Blockchain without global consensus is interesting • WebCrypto APIs will bring innovation to blockchain applications • Application developers not cryptographers?!? • IETF JOSE means standardized implementations

  3. https://www.flickr.com/photos/ultimatekiwi/5154416336/ T H E D O Y L E O W L

  4. B A C K G R O U N D A S S U M P T I O N S I D E O L O G Y

  5. W H E R E W O U L D Y O U R A T H E R L I V E ? L E G I B I L I T Y

  6. H O W W E K N O W S O M E T H I N G I S I M P O R TA N T VA L U E

  7. 9 9 % O F P E O P L E H A V E 6 0 % O F T H E W E A LT H I N E Q U A L I T Y

  8. A D J U S T I N G T H E C U R V E P R O G R E S S I V I S M

  9. D O W E N E E D I T ? G L O B A L PA R T I A L O R D E R I N G

  10. W E C A N L I V E W I T H O U T N U M B E R S P I R A H Ã

  11. C A N W E S C A L E I T ? G I F T E C O N O M Y

  12. E V E RY O N E S E E S A D I F F E R E N T PA R T I A L O R D E R I N G S U B J E C T I V E VA L U E

  13. P R I O R A R T W E B O F T R U S T

  14. W H O WA T C H E S T H E WA T C H E R S ? C E R T I F I C AT E A U T H O R I T Y

  15. K E Y S I G N I N G PA R T Y N O W W E H AV E N P R O B L E M S

  16. O B J E C T B L O C K C H A I N • Blockchain allows us to create digital objects • Heirlooms • Gamify the web of trust

  17. F R O M C L A S S E S T O I N S TA N C E S I N T E R N E T T H I N G S

  18. G I V E T R E E • Per document blockchain • Don’t wait for global consensus • Data provenance structures allows the tracking of how ownership of a piece of data got to you • TODO: Encrypt the content of the coins.

  19. G I V E T R E E mint Child nodes are signed by the keys encoded as owner of parent blocks. s(mint) A 1 A 2 s(A 1 ) B 1

  20. VA L I D AT E T H E G I V E T R E E • Verify the root content hash and mint signature match the unique coin id. • For each child in the tree, verify that the signature is correct and comes from the public key listed in the parent block. • Application level policy can flag branches of the tree that exceed a give limit . Physical objects are simulated with a give limit of one.

  21. G I V E T R E E mint mint Maude to (Maude keys) on (content hash) signed (Maude)

  22. G I V E T R E E mint A 1 Maude to (The Dude) on (parent hash) s(mint) A 1 The Dude signed (Maude)

  23. G I V E T R E E mint B 1 Maude to (Donny keys) on (parent hash) s(mint) A 1 The Dude signed (The Dude) s(A 1 ) Donny B 1

  24. G I V E T R E E mint B 2 Maude to (Walter keys) on (parent hash) s(mint) A 1 The Dude signed (The Dude) s(A 1 ) "It went OK, the old Donny Walter man told me to take any rug in the house." B 1 B 2

  25. G I V E T R E E mint B 1 Maude to (Walter keys) on (parent hash) s(mint) A 1 A 2 Bunny The Dude signed (The Dude) s(A 1 ) Donny Walter B 1 B 2

  26. G I V E T R E E mint C 1 Maude to (Larry keys) on (parent hash) s(mint) A 1 A 2 Bunny The Dude signed (Bunny) s(A 2 ) s(A 1 ) Donny Larry Walter B 1 B 2 C 1

  27. L I M I TAT I O N S • The model, even if perfectly implemented, isn’t designed to prevent double spending, just to detect it. • Research project, currently only dealing with public content and signatures. • Haven’t implemented the Bill Murray rule yet. • Want multi-sig mint blocks

  28. I M P L E M E N TAT I O N • Cisco’s JOSE https://github.com/cisco/node-jose • Prova test runner http://github.com/azer/prova • Recursion!

  29. T E S T I N T H E B R O W S E R W I T H O U T A N Y B U I L D S C R I P T S P R O VA

  30. A U T O M A G I C A L R E L O A D A N D R U N P R O VA

  31. E A S Y A N D C O N S I S T E N T W R A P P E R A R O U N D W E B C RY P T O C I S C O N O D E - J O S E

  32. VA L I D AT E A C O I N • Validate the root of the Give Tree • Coin ID is correct • Content signature matches • Recursively validate all child nodes • Give limit policy violations are business errors, not validation errors

  33. VA L I D AT E T H E R O O T

  34. VA L I D AT E T H E R O O T

  35. VA L I D AT E C H I L D R E N Empty Callback!

  36. VA L I D AT E C H I L D R E N Recursion!

  37. N E X T S T E P S • Encrypted content • PouchDB storage & sync • Photo sharing application • Public key graph browser

  38. … P R O F I T • Distributed PKI • Illustrate to users the value of partial disclosure • Ecosystem interop • Native HTML5 blockchain • Platform for p2p social apps

  39. C O N C L U S I O N • We are the world computer, build expressive software • Blockchain assumptions can be inverted • There is more room for innovation than we think

  40. C RY P T O C U R R E N C Y F O R T H E G I F T E C O N O M Y D O C U M E N T C O I N Chris Anderson @jchris jchris@gmail.com QCon London 2016

Recommend


More recommend