Uncategorized

History of Cryptocurrencies

Posted on

Even though cryptocurrencies are just now gaining media attention, the concepts have been around for decades. These concepts have evolved during this time period and have given rise to many cryptocurrencies, each hoping to achieve the most scalable and decentralized system. 1. DLT (Distributed Ledger Technology) DLT’s have existed for a long time and are already in use by most of the world’s largest companies. Any cloud- based system is a distributed ledger. Over time, technology has evolved from being able to store data on the cloud, to being able to have logic on the cloud. This provided countless benefits to applications such as more uptime and faster communications. 2. Consensus Algorithms While the blockchain scene was just starting out, consensus algorithms focused on PoW. But as users grew, this became more and more unscalable. The algorithms that are being used today are much more complex and incorporate other factors to find consensus. 3. BFT (Byzantine Fault Tolerance) BFT has been practice for decades and applies to any distributed system. Even space crafts such as SpaceX Dragon needed to have BFT in the design. 4. Smart Contracts Smart contracts are the future of the blockchain/cryptocurrency space. Since they were first […]

Uncategorized

Self-Sovereign Identity

Posted on

We live in a world where data is everything. While advances in technology have made the management of data easier, they have also created a need for people to have digitized identities. Like a key to a person’s life, control of an identity may grant the user unfiltered access to private information. Identity fraud and theft are some of the most frequent crimes today, and it is due to the fact that we are still not entirely in control of our own identities. We are at the mercy of the centralized powers that control our information. HISTORY To understand why self-sovereign identity is necessary, we must understand how Identity has developed in recent history. We can separate it into 3 sections: Centralized Identity: In the 1900’s, certain organizations assigned identities. Even governments needed a way to assign identities to individuals for various reasons. Ex. Social security numbers were created as a way for the government to track lifetime earnings. The validation of IP Addresses and the distribution of domain names was also forms of centralized identities. Federated Identity: A single identity allows access to multiple sites. This type of identity faces the same problem of being controlled by an organization. […]