mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-16 19:14:33 -05:00
edgechains
This commit is contained in:
parent
5c47334885
commit
8af13d1ee5
@ -286,7 +286,7 @@ Blockstack is a network for decentralized applications where users own their ide
|
|||||||
* [BTCR DID Method](https://w3c-ccg.github.io/didm-btcr/) — The Bitcoin Reference DID method (did:btcr) supports DIDs on the public Bitcoin blockchain. The Bitcoin Reference method has minimal design goals: a DID trust anchor based on the Bitcoin blockchain, updates publicly visible and auditable via Bitcoin transactions, and optionally, additional DID Document information referenced in the transaction OP_RETURN data field. No other Personal Identifiable Information (PII) would be placed on the immutable blockchain.
|
* [BTCR DID Method](https://w3c-ccg.github.io/didm-btcr/) — The Bitcoin Reference DID method (did:btcr) supports DIDs on the public Bitcoin blockchain. The Bitcoin Reference method has minimal design goals: a DID trust anchor based on the Bitcoin blockchain, updates publicly visible and auditable via Bitcoin transactions, and optionally, additional DID Document information referenced in the transaction OP_RETURN data field. No other Personal Identifiable Information (PII) would be placed on the immutable blockchain.
|
||||||
* [btcr tx conversion playground](https://weboftrustinfo.github.io/btcr-tx-playground.github.io/)
|
* [btcr tx conversion playground](https://weboftrustinfo.github.io/btcr-tx-playground.github.io/)
|
||||||
* [Interplanetary Identifiers IPID](https://github.com/jonnycrunch/ipid) - Implementation of the DID spec over IPFS (Interplanetary File System)
|
* [Interplanetary Identifiers IPID](https://github.com/jonnycrunch/ipid) - Implementation of the DID spec over IPFS (Interplanetary File System)
|
||||||
* [Peer DID Method Spec](https://github.com/dhh1128/peer-did-method-spec)
|
* [Peer DID Method Spec](https://dhh1128.github.io/peer-did-method-spec/index.html)
|
||||||
* [Spidchain](http://www.spidchain.com/) [[**wp**](https://drive.google.com/file/d/0B89WE3IIHmy1Z0ZSSWVmVEtaaG8/view)]
|
* [Spidchain](http://www.spidchain.com/) [[**wp**](https://drive.google.com/file/d/0B89WE3IIHmy1Z0ZSSWVmVEtaaG8/view)]
|
||||||
* "offers a platform for self-sovereign identity, including desktop and mobile apps for end-users. It uses Decentralized Identifiers (DIDs) - backed by optionally Bitcoin or Ethereum - to implement a marketplace for verifiable claims. The Spidchain applications allow individuals to create, recover, and revoke DIDs, to authenticate, to sign and verify files and claims, and more."
|
* "offers a platform for self-sovereign identity, including desktop and mobile apps for end-users. It uses Decentralized Identifiers (DIDs) - backed by optionally Bitcoin or Ethereum - to implement a marketplace for verifiable claims. The Spidchain applications allow individuals to create, recover, and revoke DIDs, to authenticate, to sign and verify files and claims, and more."
|
||||||
* [did:ockam:](https://medium.com/ockam/an-introduction-to-did-ockam-8626d5aecc53) [[**ϟ**](https://twitter.com/Ockam_io/status/1064589363269365763)]
|
* [did:ockam:](https://medium.com/ockam/an-introduction-to-did-ockam-8626d5aecc53) [[**ϟ**](https://twitter.com/Ockam_io/status/1064589363269365763)]
|
||||||
|
@ -21,6 +21,13 @@
|
|||||||
* [Teleomergent - More than a decentralized app](#teleomergent---more-than-a-decentralized-app-)
|
* [Teleomergent - More than a decentralized app](#teleomergent---more-than-a-decentralized-app-)
|
||||||
* [Dapps vs Edgechain Protocols](#dapps-vs-edgechain-protocols-)
|
* [Dapps vs Edgechain Protocols](#dapps-vs-edgechain-protocols-)
|
||||||
* [Defining an Edgechain Protocol](#defining-an-edgechain-protocol-)
|
* [Defining an Edgechain Protocol](#defining-an-edgechain-protocol-)
|
||||||
|
* [Trust Ping Protocol](#trust-ping-protocol-)
|
||||||
|
* [Tic Tac Toe](#tic-tac-toe-)
|
||||||
|
* [DID method for peer (private pairwise) DIDs](#did-method-for-peer-private-pairwise-dids-)
|
||||||
|
* [Peer DID Method Spec](#peer-did-method-spec-)
|
||||||
|
* [Megaphone Protocol](#megaphone-protocol-)
|
||||||
|
* [Call to Action](#call-to-action-)
|
||||||
|
* [Q&A](#q&a-)
|
||||||
|
|
||||||
## Microledgers and Edge-Chains [**^**](#contents)
|
## Microledgers and Edge-Chains [**^**](#contents)
|
||||||
**Lightly edited transcript from Youtube.**
|
**Lightly edited transcript from Youtube.**
|
||||||
@ -243,302 +250,130 @@ You have to start by doing step one and then you go to step two and then you go
|
|||||||
|
|
||||||
The kinds of messages that get exchanged in this protocol: we have an offer to buy, a counter-offer, an acceptance or rejection, a home report, a title search. These are messages.
|
The kinds of messages that get exchanged in this protocol: we have an offer to buy, a counter-offer, an acceptance or rejection, a home report, a title search. These are messages.
|
||||||
|
|
||||||
What are the state rules that apply? well this is an example state machine I drew you start by negotiating and you can go round and round in circles in negotiating eventually you exit the
|
What are the state rules that apply? well this is an example state machine I drew. You start by negotiating and you can go round and round in circles in negotiating, eventually you exit the negotiating phase. you're in the preparing phase where you order a title search and a home report and all these things and anyway you end up consummating the deal or not consummating it
|
||||||
negotiating phase
|
|
||||||
you're in the preparing phase where you
|
That is an edge protocol.
|
||||||
order a title search and a home report
|
|
||||||
and all these things and anyway you end
|
Why is it an edge protocol?
|
||||||
up consummating the deal or not
|
|
||||||
consummating it but that is an edge
|
There's no blockchain involved, right? it's people out at the edge.
|
||||||
protocol why is it an edge protocol
|
|
||||||
there's no blockchain involved right
|
There's a hundred thousand things like this, ordering a hamburger is a protocol. You can't just walk up to somebody nd say, "here's seven twenty five." You have to walk up to him and say, "I want number three on the menu," then give him $7.25 after they ask you "is that to go or not?" "to go" right?
|
||||||
it's people out at the edge but there's
|
There's this whole protocol involved in that, that we all know. The reason I'm harping on this is because all kinds of business problems are solved by protocols all the time, and in fact, they're mostly edge protocols.
|
||||||
a hundred thousand things like this
|
|
||||||
ordering a hamburger is a protocol right
|
That's a cool thing if you can just hook them up to blockchain for just the parts that you need them for, and not all of it. The weight of what you're building goes way down.
|
||||||
you can't just walk up to somebody and
|
|
||||||
say here's seven twenty five you have to
|
## Trust Ping Protocol [**^**](#contents)
|
||||||
walk up to him and say I want number
|
|
||||||
three on the menu would then give him
|
<img src="http://i.imgur.com/pUnUIiD.png"/>
|
||||||
725 after they ask you whether you want
|
|
||||||
it to be is that to go or not to go
|
Here's a simple edge protocol that's techy. this one is relevant to the identity space. This is the trust ping protocol, and in Indy there is a HIPE (which is like an RFC) about how you ping another person.
|
||||||
right there's this whole protocol
|
|
||||||
involved in that that we all know so the
|
You have their DID, for them that's their identifier, and given that identifier you should be able to reach out and talk to that person.
|
||||||
reason I'm harping on this is because
|
|
||||||
all kinds of business problems are
|
So how do you do it? According to the whole Indy technology should be able to do it no matter what transport you're used to send messages whether it's HTTP or mail or Bluetooth or whatever.
|
||||||
solved by protocols all the time and in
|
|
||||||
fact they're mostly edge protocols and
|
You should know some things when you engage in this trust ping about whether the person on the other side is trustworthy and how much trust might have been eroded by the kind of mechanisms you used in between you.
|
||||||
that's a cool thing if you can just hook
|
|
||||||
them up to blockchain for just the parts
|
There's a HIPE about that, you can see the roles, the pinger and the pingee; and the message types.
|
||||||
that you need them for and not all of it
|
|
||||||
the the weight of what you're building
|
let me give you a quick demo of this protocol. I'm gonna start up an indie agent, and that agent is going to be listening on email, and I'm going to talk to it by email, and I'm gonna use the trust ping protocol to to interact with it.
|
||||||
goes way down so here's a simple edge
|
|
||||||
protocol that's techy this one is one
|
<img src="http://i.imgur.com/SA01z4J.png"/>
|
||||||
that's relevant to the identity space
|
|
||||||
this is the trust ping protocol and in
|
This is the [trust ping protocol documentation](https://github.com/hyperledger/indy-hipe/pull/67), and the trust ping documentation says that if I want to ping somebody this is the kind of JSON message I need to send it.
|
||||||
Indy there is a hype which is like an
|
|
||||||
RFC about how you ping another person
|
So, I'm gonna send it one. Let's go over here to my email, and I'll bring up my little trust ping. nothing up my sleeve. here's the the JSON that I'm sending, which is just a direct copy and paste out of this HIPE here... so that's the that's the stuff that I sent.
|
||||||
you have their D ID for them that's
|
|
||||||
their identity their identifier excuse
|
and let's see... message was sent. that's good. now what we've got to see is if the message is going to come back... there we go.
|
||||||
me and given that identifier you should
|
|
||||||
be able to reach out and talk to that
|
<img src="http://i.imgur.com/qe7MocA.png"/>
|
||||||
person so how do you do it
|
|
||||||
and according to the whole indie
|
so the agent on the other side pinged me back and let's see what it sent me: it sent me an aim style message.
|
||||||
technology should be able to do it no
|
|
||||||
matter what transport you're used to
|
This is the JSON that I got back, it says "hi" from Indy agent. So, I've just engaged in a protocol.
|
||||||
send messages whether it's HTTP or mail
|
|
||||||
or Bluetooth or whatever and you should
|
Now what does blockchain add to this? I could do this entirely without blockchain, but there's some things I wouldn't have: I wouldn't have confidence in the other sender. Somebody could sit in between me in this protocol and mess with my mind, right? be a man-in-the-middle.
|
||||||
know some things when you engage in this
|
|
||||||
trust pink about whether the person on
|
So most of the protocol is not modified, but by adding a little bit of blockchain pixie dust, I'll call it, I can increase the trust behind this protocol.
|
||||||
the other side is trustworthy and how
|
|
||||||
much trust might have been eroded by the
|
That's the kind of thing that I'm seeing over and over again as I get my head wrapped around this paradigm is you start with a paradigm that's really not very blockchain heavy, and then you say "what are the things that's wonderful about blockchain, that I need to add into this? and how can I do it as light as possible?"
|
||||||
kind of mechanisms you used in between
|
|
||||||
you and stuff like that so there's a
|
## Tic Tac Toe [**^**](#contents)
|
||||||
hype about that you can see the roles
|
|
||||||
the ping ER and the ping e and the
|
<img src="http://i.imgur.com/Ym9zesW.png"/>
|
||||||
message types let me give you a quick
|
|
||||||
demo of this protocol what I have here
|
okay so on to the next thing... here. Tic Tac Toe. We could also play tic-tac-toe. I'm gonna wait and see if I have enough time. I'll do a demo of tic-tac-toe if you feel like it later. but anyway I have a demo of that if you want to. this one was not there's no blockchain goodness on this this is all the way to the complete right side is being a pure hedge protocol because you don't need a blockchain to play tic-tac-toe okay.
|
||||||
I'm gonna start up an indie agent and
|
|
||||||
that agent is going to be listening on
|
## DID method for peer (private pairwise) DIDs [**^**](#contents)
|
||||||
email and I'm going to talk to it by
|
|
||||||
email and I'm gonna use the trust ping
|
<img src="http://i.imgur.com/T3nCl47.png"/>
|
||||||
protocol to to interact with it so this
|
|
||||||
is the yeah this is a trust ping
|
This is a more serious one. What if you want to manage a relationship? Alice and Bob live across the world, they use complicated technologies. Each of them has different technologies. One of them has a laptop, and a cell phone; and the other one has a desktop computer at work, and two cell phones, and something in the cloud.
|
||||||
protocol documentation and the trust
|
|
||||||
ping documentation says that if I want
|
They want to talk to each other and there's different pieces of software running on all these different things at different version levels and all this kind of stuff.
|
||||||
to ping somebody this is the kind of
|
|
||||||
JSON message I need to send it so I'm
|
How does Alice tell Bob: "you shouldn't accept messages anymore from my old cell phone that I just sent to the recycling"?
|
||||||
gonna send it one let's go over here to
|
|
||||||
my email and I'll bring up my little
|
I think they told me they were gonna wipe the hard drive on it but I just don't trust I'm gonna tell Bob not to do that. How does Alice say, "I upgraded my own world here, and I've got a new device, and now if I send messages from that device you
|
||||||
trust ping nothing up my sleeve here's
|
should trust them."
|
||||||
the the JSON that I'm sending which is
|
|
||||||
just a direct copy and paste out of this
|
how does Alice say I'm gonna rotate my keys? all of these are concerns of managing a relationship, and you need a protocol to manage a relationship... and guess what? it's mostly an edge protocol.
|
||||||
pipe here so that's the that's the stuff
|
|
||||||
that I sent and let's see
|
## Peer DID Method Spec [**^**](#contents)
|
||||||
message was sent that's good now what we
|
|
||||||
got to see is if the message is going to
|
This is a more serious one that has pretty high stakes. I've been working on a method to describe how DIDs can be created, and the DID docs associated with those DIDs can be shared.
|
||||||
come back there we go so the agent on
|
|
||||||
the other side pinged me back and let's
|
You can see the the roles here are the participants in the relationship and there's some message types that are described here there's actually a [DID method spec draft](https://dhh1128.github.io/peer-did-method-spec/index.html) and I'll show that to you really briefly here and you can go look it up yourself later if you want to
|
||||||
see what it sent me it sent me a name
|
|
||||||
style message except it's not fully
|
<a href="https://dhh1128.github.io/peer-did-method-spec/index.html"><img src="http://imgur.com/QlhWEmfl.png" /></a>
|
||||||
encrypted right now I turned off the
|
|
||||||
encryption this is the JSON that I got
|
|
||||||
back it says hi from indie agent so I've
|
I'll give you the URL and you can go read it, but there's this whole spec behind this, and this is what has caused, I think, the most ruminating on the concept of a microledger... because the microledger as a persistence mechanism could provide high trust to back the did method that I'm mentioning.
|
||||||
just engaged in a protocol here now what
|
|
||||||
does blockchain add to this I could do
|
## Megaphone Protocol [**^**](#contents)
|
||||||
this entirely without blockchain but
|
|
||||||
there's some things I wouldn't have I
|
Let me go on to another one that's maybe a little bit more interesting so this is just an imaginary one but I think I'd love if somebody in the audience wants to build this I'd be super excited and I would buy your app.
|
||||||
wouldn't have confidence in the other
|
|
||||||
sender somebody could sit in between me
|
<img src="http://i.imgur.com/wzji3sc.png"/>
|
||||||
in this protocol and mess with my mind
|
|
||||||
right be a man-in-the-middle so most of
|
A megaphone protocol, what I'd like is something where if I'm sitting on the beach in Indonesia and a tsunami happens... I can grab my phone and push a button and say "run a tsunamis coming" and my phone contacts all the phones all around the resort where I'm staying which in turn contact all the phone's a mile inland and everybody starts running not just the people who can see the wave. Would that be cool?
|
||||||
the protocol is not modified but by
|
|
||||||
adding a little bit of blockchain pixie
|
I want basically a virtual megaphone, but here's a "why do I need blockchain?" there's a really good answer to this, I can't build this right now, because if everybody had a real megaphone in real life you'd have problems with people using it irresponsibly, wouldn't you?
|
||||||
dust I'll call it I can increase the
|
|
||||||
trust behind this protocol and and
|
So there's a trust problem, I can use blockchain to require people to put stake, or put their identity in escrow against their responsible behavior. So that a person can say, when it's a life-or-death situation, "I need an EpiPen right now!"
|
||||||
that's the kind of thing that I'm seeing
|
|
||||||
over and over again as I get my head
|
I'm willing to you know have a hundred dollars on the line or I'm willing to have my identity disclosed if I am shown to use that irresponsibly and that protocol can hook back to the blockchain as a basis for that trust but most of everything that's happening is all out on the edge.
|
||||||
wrapped
|
|
||||||
around this paradigm is you start with a
|
you can see some of the other ones, you know, "my child is lost at Disneyland," or "I'm desperate to get on this plane as somebody in this line willing to send me to sell me their plane ticket 4000 euros?"
|
||||||
paradigm that's really not very
|
|
||||||
blockchain heavy and then you say okay
|
any of these kinds of things could be done with this kind of protocol, and you would just need peer-to-peer communication in your app. Or you could have the app go back to the cloud and talk to other apps through the cloud, if you needed to.
|
||||||
what are the things that's that's
|
|
||||||
wonderful about blockchain that I need
|
that would be more centralized but anyway there's some roles in this a speaker a listener and a relay so you could have an app and a person could talk through your app to another phone that was close to you and so the word would spread right if anybody's interested there's a link to the concept doc when you download the slides you can go read more about that protocol
|
||||||
to add into this and how can I do it as
|
|
||||||
light as possible okay so on to the next
|
## Call to Action [**^**](#contents)
|
||||||
thing here
|
|
||||||
Tic Tac Toe we could also play
|
<img src="http://i.imgur.com/xLHfZ7b.png"/>
|
||||||
tic-tac-toe I'm gonna wait and see if I
|
|
||||||
have enough time I'll do a demo of
|
I hope that I haven't gone too too deep, I've tried to stay really high-level and I hope that I've been general enough that even if you're not in the Indy space, the identity space, you're thinking a little bit to yourself yeah maybe there's some ways that I'm taking for granted
|
||||||
tic-tac-toe if you feel like it later
|
|
||||||
but anyway I have a demo of that if you
|
that we need to use the blockchain for something... and maybe I should think from the other direction instead start thinking about the problem as an edge protocol problem and then say how do I sprinkle the the magic pixie dust a blockchain just enough to get the properties of trust or the constraints that I need
|
||||||
want to this one was not
|
|
||||||
there's no blockchain goodness on this
|
what I've found is that this is a very liberating experience. Two and a half years in, a lot of the problems that I initially thought were really yucky, I'm now thinking, "well if I flip it on its head I can get what I need to and I
|
||||||
this is all the way to the complete
|
don't have the performance problem or I don't have the scaling problem or I don't have the centralization and trust problem or the regulatory problem.
|
||||||
right side is being a pure hedge
|
|
||||||
protocol because you don't need a
|
So I want to encourage you to do that. Think in terms of the edge, with a blockchain as a useful foundation that you can refer to but not necessarily as the place where it all happens. You don't have to compute everything in a smart contract.
|
||||||
blockchain to play tic-tac-toe okay this
|
|
||||||
is a more serious one what if you want
|
there are some problems that you must use blockchain for but I'm just saying use it wisely, and not just peanut butter spread it on everything.
|
||||||
to manage a relationship so Alice and
|
|
||||||
Bob live across the world they use
|
I would love to get some people here to work with me on this peer did method I think it's a very high value for the identity space that's one specific to my area of expertise so with that I'll go back and demo something if you want or we can go into QA I think we got about ten minutes
|
||||||
complicated complicated technologies
|
left which is good
|
||||||
each of them has different technologies
|
|
||||||
one of them has a laptop and a cell
|
## Q&A [**^**](#contents)
|
||||||
phone and the other one has a desktop
|
|
||||||
computer at work and two cell phones and
|
<img src="http://i.imgur.com/HNmcUfN.png"/>
|
||||||
something in the cloud and they want to
|
|
||||||
talk to each other and there's different
|
I was trying hard to not go till the very last second well it doesn't necessarily have to be a person but some entity on the edge yeah and I'm really using the term edge of course is really vague but what I mean by it mostly is it's not the thing in the center of the architecture diagram okay and then the second question the concept of the micro ledger is there any concept of persisting the final values of the micro ledger onto a blockchain yeah so this is if I go back to let's see the notion of anchoring something on a blockchain a number of people in industry are exploring different ways to do that and one of the things you could anchor on a blockchain is a micro ledger so if you needed to prove for example to a third party let's say Alice and Bob are interacting and it's it's a private personal relationship but let's say Bob doesn't fully trust Alice and maybe he's afraid that alice is gonna steal all of his cool music for his next album even because he's been sharing it with her so
|
||||||
pieces of software running on all these
|
|
||||||
different things at different version
|
|
||||||
levels and all this kind of stuff how
|
|
||||||
does Alice tell Bob hey you shouldn't
|
|
||||||
accept any messages anymore from my old
|
|
||||||
cell phone that I just sent to the
|
|
||||||
recycling I think they told me they were
|
|
||||||
gonna wipe the hard drive on it but I
|
|
||||||
just don't trust I'm gonna tell Bob not
|
|
||||||
to do that you know how do you how does
|
|
||||||
Alice say hey I upgraded my own world
|
|
||||||
here and I've got a new device and now
|
|
||||||
if I send messages from that device you
|
|
||||||
should trust them
|
|
||||||
how does Alice say I'm gonna rotate my
|
|
||||||
keys
|
|
||||||
all of these are concerns of managing a
|
|
||||||
relationship and you need a protocol to
|
|
||||||
manage a relationship and guess what
|
|
||||||
it's mostly an edge protocol so this is
|
|
||||||
a more serious one that matters has
|
|
||||||
pretty high stakes and I've been working
|
|
||||||
on a method to describe how di DS can be
|
|
||||||
created and the did Docs associated with
|
|
||||||
those di DS can be shared and there's
|
|
||||||
you can see the the roles here are the
|
|
||||||
participants in the relationship and
|
|
||||||
there's some message types that are
|
|
||||||
described here there's actually a did
|
|
||||||
method spec draft and I'll show that to
|
|
||||||
you really briefly here and you can go
|
|
||||||
look it up yourself
|
|
||||||
later if you want to I'll give you the
|
|
||||||
URL and you can go read it but anyway
|
|
||||||
there's this whole spec behind this and
|
|
||||||
so this one is the thing that has caused
|
|
||||||
I think the most ruminating on the
|
|
||||||
concept of a micro ledger because the
|
|
||||||
micro ledger as a persistence mechanism
|
|
||||||
could provide high trust to back the did
|
|
||||||
method that I'm mentioning here
|
|
||||||
let me go on to another one that's maybe
|
|
||||||
a little bit more interesting so this is
|
|
||||||
just an imaginary one but I think I'd
|
|
||||||
love if somebody in the audience wants
|
|
||||||
to build this I'd be super excited and I
|
|
||||||
would buy your app a megaphone protocol
|
|
||||||
what I'd like is something where if I'm
|
|
||||||
sitting on the beach in Indonesia and a
|
|
||||||
tsunami happens I can grab my phone and
|
|
||||||
push a button and say run a tsunamis
|
|
||||||
coming and my phone contacts all the
|
|
||||||
phones all around the resort where I'm
|
|
||||||
staying which in turn contact all the
|
|
||||||
phone's a mile inland and everybody
|
|
||||||
starts running not just the people who
|
|
||||||
can see the wave would that be cool I
|
|
||||||
want basically a virtual megaphone but
|
|
||||||
here's a why do I need blockchain
|
|
||||||
there's a really good answer to this I
|
|
||||||
can't build this right now because if
|
|
||||||
everybody had a real megaphone in real
|
|
||||||
life you'd have problems with people
|
|
||||||
using it irresponsibly wouldn't you so
|
|
||||||
there's a trust problem I can use
|
|
||||||
blockchain to require people to put
|
|
||||||
stake or put their identity in escrow
|
|
||||||
against their responsible behavior so
|
|
||||||
that a person can say look when it's a
|
|
||||||
life-or-death situation I need an EpiPen
|
|
||||||
right now I'm willing to you know have a
|
|
||||||
hundred dollars on the line or I'm
|
|
||||||
willing to have my identity disclosed if
|
|
||||||
I am shown to use that irresponsibly and
|
|
||||||
that protocol can hook back to the
|
|
||||||
blockchain as a basis for that trust but
|
|
||||||
most of everything that's happening is
|
|
||||||
all out on the edge okay and you can see
|
|
||||||
some of the other ones you know my child
|
|
||||||
is lost at Disneyland or I'm desperate
|
|
||||||
to get on this plane as somebody in this
|
|
||||||
line willing to send me to sell me their
|
|
||||||
plane ticket 4000 euros any of these
|
|
||||||
kinds of things could be done with this
|
|
||||||
kind of a protocol and you would just
|
|
||||||
need peer-to-peer communication in your
|
|
||||||
app or you could have the app go back to
|
|
||||||
the cloud and talk to other apps through
|
|
||||||
the cloud if you needed to that would be
|
|
||||||
more centralized but anyway there's some
|
|
||||||
roles in this a speaker a listener and a
|
|
||||||
relay so you could have an app and a
|
|
||||||
person could talk through your app to
|
|
||||||
another phone that was close to you and
|
|
||||||
so the word would spread right if
|
|
||||||
anybody's interested there's a link to
|
|
||||||
the concept doc when you download the
|
|
||||||
slides you can go read more about that
|
|
||||||
protocol so here's my suggestion to you
|
|
||||||
I hope that I haven't gone too too deep
|
|
||||||
I've tried to stay really high-level and
|
|
||||||
I hope that I've been general enough
|
|
||||||
that even if you're not in the Indy
|
|
||||||
space the identity space you're thinking
|
|
||||||
a little bit to yourself yeah maybe
|
|
||||||
there's some ways that I'm taking for
|
|
||||||
granted that we need to use the
|
|
||||||
blockchain for something and maybe I
|
|
||||||
shouldn't
|
|
||||||
maybe I should think from the other
|
|
||||||
direction instead start thinking about
|
|
||||||
the problem as an edge protocol problem
|
|
||||||
and then say how do I sprinkle the the
|
|
||||||
magic pixie dust a blockchain just
|
|
||||||
enough to get the properties of trust or
|
|
||||||
the constraints that I need and what
|
|
||||||
I've found is that this is a very
|
|
||||||
liberating experience two and a half
|
|
||||||
years in a lot of the problems that I
|
|
||||||
initially thought were really yucky I'm
|
|
||||||
now thinking well if I flip it on its
|
|
||||||
head I can get what I need to and I
|
|
||||||
don't have the performance problem or I
|
|
||||||
don't have the scaling problem or I
|
|
||||||
don't have the centralization and trust
|
|
||||||
problem or the regulatory problem so I
|
|
||||||
want to encourage you to do that think
|
|
||||||
in terms of the edge with a blockchain
|
|
||||||
as a useful foundation that you can
|
|
||||||
refer to but not necessarily as the
|
|
||||||
place where it all happens you don't
|
|
||||||
have to compute everything in a smart
|
|
||||||
contract and you don't have to and if
|
|
||||||
you say well I don't know how to do that
|
|
||||||
there are some problems that you must
|
|
||||||
use
|
|
||||||
blockchain for but I'm just saying use
|
|
||||||
it wisely and not just peanut butter
|
|
||||||
spread it on everything and then I would
|
|
||||||
love to get some people here to work
|
|
||||||
with me on this peer did method I think
|
|
||||||
it's a very high value for the identity
|
|
||||||
space that's one specific to my area of
|
|
||||||
expertise so with that I'll go back and
|
|
||||||
demo something if you want or we can go
|
|
||||||
into QA I think we got about ten minutes
|
|
||||||
left which is good I was trying hard to
|
|
||||||
not go till the very last second well it
|
|
||||||
doesn't necessarily have to be a person
|
|
||||||
but some entity on the edge yeah and I'm
|
|
||||||
really using the term edge of course is
|
|
||||||
really vague but what I mean by it
|
|
||||||
mostly is it's not the thing in the
|
|
||||||
center of the architecture diagram okay
|
|
||||||
and then the second question the concept
|
|
||||||
of the micro ledger is there any concept
|
|
||||||
of persisting the final values of the
|
|
||||||
micro ledger onto a blockchain yeah so
|
|
||||||
this is if I go back to let's see the
|
|
||||||
notion of anchoring something on a
|
|
||||||
blockchain a number of people in
|
|
||||||
industry are exploring different ways to
|
|
||||||
do that and one of the things you could
|
|
||||||
anchor on a blockchain is a micro ledger
|
|
||||||
so if you needed to prove for example to
|
|
||||||
a third party let's say Alice and Bob
|
|
||||||
are interacting and it's it's a private
|
|
||||||
personal relationship but let's say Bob
|
|
||||||
doesn't fully trust Alice and maybe he's
|
|
||||||
afraid that alice is gonna steal all of
|
|
||||||
his cool music for his next album even
|
|
||||||
because he's been sharing it with her so
|
|
||||||
he goes and he anchors some things on
|
he goes and he anchors some things on
|
||||||
the blockchain to provide evidence so
|
the blockchain to provide evidence so
|
||||||
that if anybody ever you know if there's
|
that if anybody ever you know if there's
|
||||||
|
Loading…
Reference in New Issue
Block a user