Decentralized Tech - The Next 5 Years Conrad Barski, M.D. CEO, Forward Blockchain
Privacy
"The digital signing mechanism in Bitcoin & Ethereum is the most secure one ever created"
"The digital signing mechanism in Bitcoin & Ethereum is the most secure one ever created" - me, today
Private Key Signature Message
Private Key Signature Message
Code Private Key Code Code Code Code Code Code Code Code Signature Message Code Code Code Code Code
Code Private Key Code Code Code Code Code Code Code Code Signature Message Code Code Code $ Code Code Wallet
alteration security read security (privacy)
The "easy way" to solve blockchain privacy: Firewall Public Private/Consortium Chain Chain
Adding Privacy to Blockchains Private Chains Factom-like Systems ● ● Consortium Chains Zero-Knowledge Systems ● ● Public Chain Encryption Plasma Chains ● ● Blockchain Permission Payment/State Channels ● ● Systems
The Blockchain Privacy Triangle Available in 2018 Pick Two Useful Private
In Defense of Private/Consortium Chains Firewall 1. Protections against internal fraud 2. Sandboxing 3. Maintaining data with complex structure
Privacy
TOP SECRET
Before the Internet Database Data
After the Internet anyone can read some can read some can write anyone can write
After the Internet anyone can read some traditional can databases read some can write anyone can write
After the Internet anyone can read some traditional communications can databases read some can write anyone can write
After the Internet anyone can social media read some traditional communications can databases read some can write anyone can write
After the Internet anyone can blockchain social media read some traditional communications can databases read some can write anyone can write
Computation on the "Edge" public chain Client PC Firewall private database
Benefits of Public Blockchains 1. Security 2. Reliability 3. Zero Infrastructure
The Next 5 Years: Second Layer Systems
Main Chain contract address resolution Second Layer P2P Nodes deposit Client Node
Second Layer Systems - Benefits 1. Security 2. Reliability Second 3. Zero Infrastructure Layer 4. Privacy Systems 5. Performance
Second Layer Systems - Examples ● Sharding ● Casper ● Swarm ● Plasma ● Lightning Networks/Raiden ● Publishing Systems
Anatomy of a Second Layer Publishing System ● The System will be less of an "application" and more of a "utility" ● Trusted Authorities will authorize access to the platform ● Users will maintain whitelist of authorities ● It will decouple publishing, hosting, payment handling and content validation ● Will be optimized for highly dynamic datasets (mailing lists, research study data, etc.) ● Automatic support for subscriptions
Contact conrad@forwardblockchain.com
(Licenses For Images in this Presentation) https://www.freeimages.com/photo/indian-elephant-1393532 https://pixabay.com/en/globe-world-earth-planet-1339833/ https://www.freeimages.com/photo/computers-1242862
Recommend
More recommend