The Blockchain Might Be The Next Disruptive Technology

To process a transaction, you need first to make sure the sender owns the asset he wants to transfer, and make sure he will not trade it twice.

In the blockchain, information is stored in blocks that record all transactions ever done through the network. Hence, it allows validating both the existence of assets to be traded and ownership.

To avoid double spending, the technology requests several nodes to agree on a transaction to process it. A validation is also artificially difficult to achieve: miners leverage computer power to solve complex cryptographic problems (the proof-of-work). Every time a problem is cracked, a block is added to the chain, and all the transactions it includes are thus validated. The updated chain, including the new block, is shared with other nodes and becomes the new reference; this process leverages cryptography to prevent duplicate transactions.

New blocks issued are also linked to previous ones, so that it is almost impossible to go back on a transaction. This technology addresses all the issues to validate a transaction, so that processing one doesn’t request a third-party any more: the network replaces institutions. Now, transferring assets through the blockchain is done almost in real time as it takes around 10 minutes to add a new block to the ledger. The complexity of the math problem to solve is increasing with time and computer power. And it is cheaper than ever as miners get rewarded at around 0.0001 Bitcoin (BTC) every time they process a transaction. This is a game changer.

Of course, Bitcoin was the first use case of the blockchain, and the most famous one. Its founder developed this technology to process money transfers and to solve many cryptocurrency issues. Instead of having a central bank that issues money, and banks to validate financial transactions, Bitcoin relies on the blockchain. Abra, for instance, is leveraging this technology to ease money transfers across borders — they rely on Bitcoin to disrupt the remittance market.
But beyond this monetary use, many applications of the blockchain could be explored. And startups are already working on this technology to disrupt industries. Indeed, every time a third-party is involved to process a transaction, the blockchain could replace it.

Overstock developed “tØ” a public equities trading platform based on the blockchain. And in the same area, NASDAQ announced a partnership with Chain a few months ago: They are working on disrupting shares trading by using the blockchain. More generally, financial institutions, like Goldman Sachs or Barclays are teaming up with the startup R3 to create a new framework for the markets based on the blockchain.

A few startups are going even further, and plan to use the blockchain to trade physical assets. Thus, Bitproof and Blocknotary are disrupting contracts by recording them on the blockchain; instead of completing your house sale in front of a notary, just store the contract on the public ledger. Colu, on its side, is using the blockchain to manage property through digital tokens that can unlock either online services or physical objects. This also could be applied to intellectual property. For instance, Verisart is using this decentralized technology to verify art pieces. It encodes copyrights of artwork and records them on the blockchain. ProofOfExistence, as well, is leveraging the public ledger to keep track of files you have created.

To go further, the blockchain could be used to identify people. ShoCard encodes and stores personal information regarding identity. It could enable smart contracts, as well: As soon as terms are met, the contract is processed, thanks to the decentralized infrastructure. IBM is currently working on this application. It also unveiled a partnership with Samsung ADEPT, a proof of concept using the blockchain in the Internet of Things area.

But to go ahead, the blockchain technology needs to fix a few issues. Starting with the network capacity. As we saw earlier, a block is added to the ledger every 10 minutes. Due to the limited size of a block (1MB), the network is restricted to processing 7 transactions per second (tps). This is way far from what VISA can handle, with up to 56,000 tps.
A debate around the block size appeared a few weeks ago and a fork happened in the blockchain: A few miners started increasing block size to 8MB. And this sized is scheduled to double every two years. To solve this debate, if the Bitcoin XT reaches 75 percent of the network, the network will entirely switch to the new block size. More generally, the debate is around whether the blockchain should process a huge amount of transactions for a small transaction fee, or a small number of transactions at a higher rate.

Security is also a threat, as a few Bitcoin trading platforms were hacked or closed, making millions of BTC disappear. This also could happen with assets that could be traded over the blockchain.
These issues highlight the need to have governance, which is a challenge for a decentralized network. But stability is a key success factor for the technology to expand widely.

If Bitcoin has been everywhere for years, its underlying technology — the blockchain — might be the most interesting and disruptive part of it. Indeed, for the first time in history, the technology seems to be able to replace institutions. When the decentralized network replaces third parties, there is a wide range of potential use cases, as it eases and reduces the cost of transactions. Startups are now accelerating on this technology, and famous VC investors, like Marc Andreessen, even compare it to previous tech revolutions: “Personal computers in 1975, the Internet in 1993 and Bitcoin in 2014.”

TechCrunch:http://http://tcrn.ch/1MT5T9V

 

 

« Nuclear Facilities Have Poor Cyber Security
Blackphone: Privacy-obsessed Smartphone »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Tech Industry Forum (TIF)

Tech Industry Forum (TIF)

Tech Industry Forum is a not-for-profit, membership driven trade body. We bring together end users and some of the UK’s leading cloud, software, platform, infrastructure, and service providers.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Blancco Technology Group

Blancco Technology Group

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMi Level 3 certified Global Consulting and IT Security Services company.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Ontinue

Ontinue

Ontinue ION is an MXDR service that provides Nonstop SecOps through five key capabilities that enable your organization to respond to attacks and continuously reduce risk.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.