Toggle light / dark theme

Anyone who has heard of Bitcoin knows that it is built on a mechanism called The Blockchain. Most of us who follow the topic are also aware that Bitcoin and the blockchain were unveiled—together—in a whitepaper by a mysterious developer, under the pseudonym Satoshi Nakamoto.

That was eight years ago. Bitcoin is still the granddaddy of all blockchain-based networks, and most of the others deal with alternate payment coins of one type or another. Since Bitcoin is king, the others are collectively referred to as ‘Altcoins’.

But the blockchain can power so much more than coins and payments. And so—as you might expect—investors are paying lots of attention to blockchain startups or blockchain integration into existing services. Not just for payments, but for everything under the sun.

Think of Bitcoin as a product and the blockchain as a clever network architecture that enables Bitcoin and a great many future products and institutions to do more things—or to do these things better, cheaper, more robust and more blockchain-01secure than products and institutions built upon legacy architectures.

When blockchain developers talk about permissionless, peer-to-peer ledgers, or decentralized trust, or mining and “the halving event”, eyes glaze over. That’s not surprising. These things refer to advantages and minutiae in abstract ways, using a lexicon of the art. But—for many—they don’t sum up the benefits or provide a simple listing of products that can be improved, and how they will be better.

I am often asked “What can the Blockchain be used for—other than digital currency?” It may surprise some readers to learn that the blockchain is already redefining the way we do banking and accounting, voting, land deeds and property registration, health care proxies, genetic research, copyright & patents, ticket sales, and many proof-of-work platforms. All of these things existed in the past, but they are about to serve society better because of the blockchain. And this impromptu list barely scratches the surface.

I address the question of non-coin blockchain applications in other articles. But today, I will focus on a subtle but important tangent. I call it “A blockchain in name only”

Question: Can a blockchain be a blockchain if it is controlled by the issuing authority? That is, can we admire the purpose and utility, if it was released in a fashion that is not is open-source, fully distributed—and permissionless to all users and data originators?

Answer: Unmask the Charlatans
Many of the blockchains gaining attention from users and investors are “blockchains” in name only. So, what makes a blockchain a blockchain?

Everyone knows that it entails distributed storage of a transaction ledger. But this fact alone could be handled by a geographically redundant, cloud storage service. The really beneficial magic relies on other traits. Each one applies to Bitcoin, which is the original blockchain implementation:

blockchain_logo▪Open-source
▪Fully distributed among all users.
▪ Any user can also be a node to the ledger
▪Permissionless to all users and data originators
▪Access from anywhere data is generated or analyzed

A blockchain designed and used within Santander Bank, the US Post Office, or even MasterCard might be a nifty tool to increase internal redundancy or immunity from hackers. These potential benefits over the legacy mechanism are barely worth mentioning. But if a blockchain pretender lacks the golden facets listed above, then it lacks the critical and noteworthy benefits that make it a hot topic at the dinner table and in the boardroom of VCs that understand what they are investing in.

Some venture financiers realize this, of course. But, I wonder how many Wall Street pundits stay laser-focused on what makes a blockchain special, and know how to ascertain which ventures have a leg up in their implementations.

Perhaps more interesting and insipid is that even for users and investors who are versed in this radical and significant new methodology—and even for me—there is a subtle bias to assume a need for some overseer; a nexus; a trusted party. permissioned-vs-permissionlessAfter all, doesn’t there have to be someone who authenticates a transaction, guarantees redemption, or at least someone who enforces a level playing field?

That bias comes from our tendency to revert to a comfort zone. We are comfortable with certain trusted institutions and we feel assured when they validate or guarantee a process that involves value or financial risk, especially when we deal with strangers. A reputable intermediary is one solution to the problem of trust. It’s natural to look for one.

So, back to the question. True or False?…

In a complex value exchange with strangers and at a distance, there must be someone or some institution who authenticates a transaction, guarantees redemption, or at least enforces the rules of engagement (a contract arbiter).

Absolutely False!

No one sits at the middle of a blockchain transaction, nor does any institution guarantee the value exchange. Instead, trust is conveyed by math and by the number of eyeballs. Each transaction is personal and validation is crowd-sourced. More importantly, with a dispersed, permissionless and popular blockchain, transactions are more provably accurate, more robust, and more immune from hacking or government interference.

What about the protections that are commonly associated with a bank-brokered transaction? (For example: right of rescission, right to return a product and get a refund, a shipping guaranty, etc). These can be built into a blockchain transaction. That’s what the Cryptocurrency Standards Association is working on right now. Their standards and practices are completely voluntary. Any missing protection that might be expected by one party or the other is easily revealed during the exchange set up.

For complex or high value transactions, some of the added protections involve a trusted authority. blockchain-02But not the transaction itself. (Ah-hah!). These outside authorities only become involved (and only tax the system), when there is a dispute.

Sure! The architecture must be continuously tested and verified—and Yes: Mechanisms facilitating updates and scalability need organizational protocol—perhaps even a hierarchy. Bitcoin is a great example of this. With ongoing growing pains, we are still figuring out how to manage disputes among the small percentage of users who seek to guide network evolution.

But, without a network that is fully distributed among its users as well as permissionless, open-source and readily accessible, a blockchain becomes a blockchain in name only. It bestows few benefits to its creator, none to its users—certainly none of the dramatic perks that have generated media buzz from the day Satoshi hit the headlines.

Related:

Philip Raymond is co-chair of The Cryptocurrency Standards Association,
host & MC for The Bitcoin Event and editor at A Wild Duck.

The new Wherecom S3, from Omate, has the ability to send the wearer’s GPS location to specific contacts in the event of an emergency.

A new smartwatch is promising something different: Keeping your grandparents safe. The new Wherecom S3, from Omate, was launched on Tuesday. It’s an Android-powered smartwatch with GPS, Wi-Fi, and 3G cellular connectivity, this means that the tech can function without a smartphone.

The watch has the ability to text, call, track paths through GPS, and remind individuals when it’s time to take medication. The S3 also has an emergency alert function in the form of a red SOS button on the side of the watch, which can be pressed in the event of an emergency to send the wearer’s GPS location to specific contacts.

Read more

Math isn’t everyone’s strong suit, especially those who haven’t stretched that part of their brain since college. Thanks to the wonders of image recognition technology, we now have Mathpix, an iOS app that lets you point your phone camera at a problem and calculates solutions in seconds.

The interface looks like any standard camera app: simply drag the on-screen reticle over the equation and the app solves it and provides graph answers where appropriate. More useful is a step-by-step guide offering multiple methods to reach a solution, making this a bona fide educational tool. It uses image recognition to process problems and pings its servers to do the mathematical heavy lifting, so it likely requires an internet connection to work.

Mathpix was envisioned by Stanford PhD student Nico Jimenez, who was advised by Stanford grad Paul Ferrell. The app’s other developers are high schoolers Michael Lee and August Trollback, which is impressive for an app that claims to be the first to visually recognize and solve handwritten math problems.

Read more

Privacy is practically a joke anymore.


A hacker known as “Peace” is selling what is reportedly account information from 117 million LinkedIn users. The stolen data is said to include email addresses and passwords, which a malicious party could use to gain access to other websites and accounts for which people used the same password.

LinkedIn says it has about 433 million members worldwide, so this data could represent 27% of its user base.

The hacker says the credentials were obtained during a LinkedIn data breach in 2012 that saw 6.5 million encrypted passwords posted online, according to Motherboard. But the leak now appears to be much larger than was thought at the time. Peace is selling the data for about $2,200 (5 bitcoin) on the Dark Web, the part of the internet accessible only with a special browser that masks user identities.

Read more

Given the fact that Los Alamos Labs have been and continue to advance cyber security work on the Quantum Internet as well as work in partnerships with other labs and universities; so, why isn’t Mason not collaborating with Los Alamos on developing an improved hacker proof net? Doesn’t look like the most effective and cost efficient approach.


Imagine burglars have targeted your home, but before they break in, you’ve already moved and are safe from harm.

Now apply that premise to protecting a computer network from attack. Hackers try to bring down a network, but critical tasks are a step ahead of them, thanks to complex algorithms. The dreaded “network down” or denial of service message never flashes on your screen.

That’s the basic idea behind new research by George Mason University researchers, who recently landed some $4 million in grants from the Defense Advanced Research Projects Agency (DARPA). George Mason’s researchers are leading an effort that includes Columbia University, Penn State University and BAE Systems.

Read more

WEST LAFAYETTE, Ind. – A new highly efficient power amplifier for electronics could help make possible next-generation cell phones, low-cost collision-avoidance radar for cars and lightweight microsatellites for communications.

Fifth-generation, or 5G, mobile devices expected around 2019 will require improved power amplifiers operating at very high frequencies. The new phones will be designed to download and transmit data and videos faster than today’s phones, provide better coverage, consume less power and meet the needs of an emerging “Internet of things” in which everyday objects have network connectivity, allowing them to send and receive data.

Power amplifiers are needed to transmit signals. Because today’s cell phone amplifiers are made of gallium arsenide, they cannot be integrated into the phone’s silicon-based technology, called complementary metal-oxide-semiconductor (CMOS). The new amplifier design is CMOS-based, meaning it could allow researchers to integrate the power amplifier with the phone’s electronic chip, reducing manufacturing costs and power consumption while boosting performance.

Read more