The Blockchain Might Be The Next Disruptive Technology

To process a transaction, you need first to make sure the sender owns the asset he wants to transfer, and make sure he will not trade it twice.

In the blockchain, information is stored in blocks that record all transactions ever done through the network. Hence, it allows validating both the existence of assets to be traded and ownership.

To avoid double spending, the technology requests several nodes to agree on a transaction to process it. A validation is also artificially difficult to achieve: miners leverage computer power to solve complex cryptographic problems (the proof-of-work). Every time a problem is cracked, a block is added to the chain, and all the transactions it includes are thus validated. The updated chain, including the new block, is shared with other nodes and becomes the new reference; this process leverages cryptography to prevent duplicate transactions.

New blocks issued are also linked to previous ones, so that it is almost impossible to go back on a transaction. This technology addresses all the issues to validate a transaction, so that processing one doesn’t request a third-party any more: the network replaces institutions. Now, transferring assets through the blockchain is done almost in real time as it takes around 10 minutes to add a new block to the ledger. The complexity of the math problem to solve is increasing with time and computer power. And it is cheaper than ever as miners get rewarded at around 0.0001 Bitcoin (BTC) every time they process a transaction. This is a game changer.

Of course, Bitcoin was the first use case of the blockchain, and the most famous one. Its founder developed this technology to process money transfers and to solve many cryptocurrency issues. Instead of having a central bank that issues money, and banks to validate financial transactions, Bitcoin relies on the blockchain. Abra, for instance, is leveraging this technology to ease money transfers across borders — they rely on Bitcoin to disrupt the remittance market.
But beyond this monetary use, many applications of the blockchain could be explored. And startups are already working on this technology to disrupt industries. Indeed, every time a third-party is involved to process a transaction, the blockchain could replace it.

Overstock developed “tØ” a public equities trading platform based on the blockchain. And in the same area, NASDAQ announced a partnership with Chain a few months ago: They are working on disrupting shares trading by using the blockchain. More generally, financial institutions, like Goldman Sachs or Barclays are teaming up with the startup R3 to create a new framework for the markets based on the blockchain.

A few startups are going even further, and plan to use the blockchain to trade physical assets. Thus, Bitproof and Blocknotary are disrupting contracts by recording them on the blockchain; instead of completing your house sale in front of a notary, just store the contract on the public ledger. Colu, on its side, is using the blockchain to manage property through digital tokens that can unlock either online services or physical objects. This also could be applied to intellectual property. For instance, Verisart is using this decentralized technology to verify art pieces. It encodes copyrights of artwork and records them on the blockchain. ProofOfExistence, as well, is leveraging the public ledger to keep track of files you have created.

To go further, the blockchain could be used to identify people. ShoCard encodes and stores personal information regarding identity. It could enable smart contracts, as well: As soon as terms are met, the contract is processed, thanks to the decentralized infrastructure. IBM is currently working on this application. It also unveiled a partnership with Samsung ADEPT, a proof of concept using the blockchain in the Internet of Things area.

But to go ahead, the blockchain technology needs to fix a few issues. Starting with the network capacity. As we saw earlier, a block is added to the ledger every 10 minutes. Due to the limited size of a block (1MB), the network is restricted to processing 7 transactions per second (tps). This is way far from what VISA can handle, with up to 56,000 tps.
A debate around the block size appeared a few weeks ago and a fork happened in the blockchain: A few miners started increasing block size to 8MB. And this sized is scheduled to double every two years. To solve this debate, if the Bitcoin XT reaches 75 percent of the network, the network will entirely switch to the new block size. More generally, the debate is around whether the blockchain should process a huge amount of transactions for a small transaction fee, or a small number of transactions at a higher rate.

Security is also a threat, as a few Bitcoin trading platforms were hacked or closed, making millions of BTC disappear. This also could happen with assets that could be traded over the blockchain.
These issues highlight the need to have governance, which is a challenge for a decentralized network. But stability is a key success factor for the technology to expand widely.

If Bitcoin has been everywhere for years, its underlying technology — the blockchain — might be the most interesting and disruptive part of it. Indeed, for the first time in history, the technology seems to be able to replace institutions. When the decentralized network replaces third parties, there is a wide range of potential use cases, as it eases and reduces the cost of transactions. Startups are now accelerating on this technology, and famous VC investors, like Marc Andreessen, even compare it to previous tech revolutions: “Personal computers in 1975, the Internet in 1993 and Bitcoin in 2014.”

TechCrunch:http://http://tcrn.ch/1MT5T9V

 

 

« Nuclear Facilities Have Poor Cyber Security
Blackphone: Privacy-obsessed Smartphone »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Quantropi

Quantropi

Quantropi is bound to be the standard for quantum-secure data communications – forever unbreakable, no matter what.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Finesse Global

Finesse Global

Finesse is a global system integration and digital business transformation company.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.