d o c u m e n t c o i n
play

D O C U M E N T C O I N Chris Anderson @jchris jchris@gmail.com - PowerPoint PPT Presentation

C RY P T O C U R R E N C Y F O R T H E G I F T E C O N O M Y D O C U M E N T C O I N Chris Anderson @jchris jchris@gmail.com QCon London 2016 TA K E H O M E L E S S O N S Blockchain without global consensus is interesting


  1. C RY P T O C U R R E N C Y F O R T H E G I F T E C O N O M Y D O C U M E N T C O I N Chris Anderson @jchris jchris@gmail.com QCon London 2016

  2. TA K E H O M E L E S S O N S • Blockchain without global consensus is interesting • WebCrypto APIs will bring innovation to blockchain applications • Application developers not cryptographers?!? • IETF JOSE means standardized implementations

  3. https://www.flickr.com/photos/ultimatekiwi/5154416336/ T H E D O Y L E O W L

  4. B A C K G R O U N D A S S U M P T I O N S I D E O L O G Y

  5. W H E R E W O U L D Y O U R A T H E R L I V E ? L E G I B I L I T Y

  6. H O W W E K N O W S O M E T H I N G I S I M P O R TA N T VA L U E

  7. 9 9 % O F P E O P L E H A V E 6 0 % O F T H E W E A LT H I N E Q U A L I T Y

  8. A D J U S T I N G T H E C U R V E P R O G R E S S I V I S M

  9. D O W E N E E D I T ? G L O B A L PA R T I A L O R D E R I N G

  10. W E C A N L I V E W I T H O U T N U M B E R S P I R A H Ã

  11. C A N W E S C A L E I T ? G I F T E C O N O M Y

  12. E V E RY O N E S E E S A D I F F E R E N T PA R T I A L O R D E R I N G S U B J E C T I V E VA L U E

  13. P R I O R A R T W E B O F T R U S T

  14. W H O WA T C H E S T H E WA T C H E R S ? C E R T I F I C AT E A U T H O R I T Y

  15. K E Y S I G N I N G PA R T Y N O W W E H AV E N P R O B L E M S

  16. O B J E C T B L O C K C H A I N • Blockchain allows us to create digital objects • Heirlooms • Gamify the web of trust

  17. F R O M C L A S S E S T O I N S TA N C E S I N T E R N E T T H I N G S

  18. G I V E T R E E • Per document blockchain • Don’t wait for global consensus • Data provenance structures allows the tracking of how ownership of a piece of data got to you • TODO: Encrypt the content of the coins.

  19. G I V E T R E E mint Child nodes are signed by the keys encoded as owner of parent blocks. s(mint) A 1 A 2 s(A 1 ) B 1

  20. VA L I D AT E T H E G I V E T R E E • Verify the root content hash and mint signature match the unique coin id. • For each child in the tree, verify that the signature is correct and comes from the public key listed in the parent block. • Application level policy can flag branches of the tree that exceed a give limit . Physical objects are simulated with a give limit of one.

  21. G I V E T R E E mint mint Maude to (Maude keys) on (content hash) signed (Maude)

  22. G I V E T R E E mint A 1 Maude to (The Dude) on (parent hash) s(mint) A 1 The Dude signed (Maude)

  23. G I V E T R E E mint B 1 Maude to (Donny keys) on (parent hash) s(mint) A 1 The Dude signed (The Dude) s(A 1 ) Donny B 1

  24. G I V E T R E E mint B 2 Maude to (Walter keys) on (parent hash) s(mint) A 1 The Dude signed (The Dude) s(A 1 ) "It went OK, the old Donny Walter man told me to take any rug in the house." B 1 B 2

  25. G I V E T R E E mint B 1 Maude to (Walter keys) on (parent hash) s(mint) A 1 A 2 Bunny The Dude signed (The Dude) s(A 1 ) Donny Walter B 1 B 2

  26. G I V E T R E E mint C 1 Maude to (Larry keys) on (parent hash) s(mint) A 1 A 2 Bunny The Dude signed (Bunny) s(A 2 ) s(A 1 ) Donny Larry Walter B 1 B 2 C 1

  27. L I M I TAT I O N S • The model, even if perfectly implemented, isn’t designed to prevent double spending, just to detect it. • Research project, currently only dealing with public content and signatures. • Haven’t implemented the Bill Murray rule yet. • Want multi-sig mint blocks

  28. I M P L E M E N TAT I O N • Cisco’s JOSE https://github.com/cisco/node-jose • Prova test runner http://github.com/azer/prova • Recursion!

  29. T E S T I N T H E B R O W S E R W I T H O U T A N Y B U I L D S C R I P T S P R O VA

  30. A U T O M A G I C A L R E L O A D A N D R U N P R O VA

  31. E A S Y A N D C O N S I S T E N T W R A P P E R A R O U N D W E B C RY P T O C I S C O N O D E - J O S E

  32. VA L I D AT E A C O I N • Validate the root of the Give Tree • Coin ID is correct • Content signature matches • Recursively validate all child nodes • Give limit policy violations are business errors, not validation errors

  33. VA L I D AT E T H E R O O T

  34. VA L I D AT E T H E R O O T

  35. VA L I D AT E C H I L D R E N Empty Callback!

  36. VA L I D AT E C H I L D R E N Recursion!

  37. N E X T S T E P S • Encrypted content • PouchDB storage & sync • Photo sharing application • Public key graph browser

  38. … P R O F I T • Distributed PKI • Illustrate to users the value of partial disclosure • Ecosystem interop • Native HTML5 blockchain • Platform for p2p social apps

  39. C O N C L U S I O N • We are the world computer, build expressive software • Blockchain assumptions can be inverted • There is more room for innovation than we think

  40. C RY P T O C U R R E N C Y F O R T H E G I F T E C O N O M Y D O C U M E N T C O I N Chris Anderson @jchris jchris@gmail.com QCon London 2016

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend