Skip to main content

BLOCKCHAIN: BEYOND HORIZON

BLOCKCHAIN: BEYOND HORIZON



"The blockchain cannot be described just as a revolution. It is  the tsunami-like phenomenon, slowly advancing and gradually enveloping everything along its way by the force of its progression"
A blockchain is a growing list of records, called blocks, which are linked using cryptography.
Each block contains a cryptographic hash of the previous block a timestamp, and transaction data.

The main purpose of this component of blockchain technology is to create a  secure digital identity reference. Identity is based on the possesion of a combination of private and public cryptographic keys.
The combination of these keys can be seen as a dexterous form of consent, creating an extremely useful digital signature. 
In turn, this digital signature provides strong control of ownership.

The three main properties of blockchain technology which has helped it gain widespread acclaim are as follows:

  • Decentralization
  • Transparency
  • immutability
Working of Blockchain:

One party to a transaction initiates the process by creating a block. This block is verified by thousands, perhaps millions of computers distributed around the net. The verified block is added to a chain, which is stored across the net, creating not just a unique record, but a unique record with a unique history. Falsifying a single record would mean falsifying the entire chain in millions of instances. That is virtually impossible. Bitcoin uses this model for monetary transactions, but it can be deployed in many other ways.

The reason why the blockchain has gained so much admiration is that:
·         It is not owned by a single entity, hence it is decentralized
·         The data is cryptographically stored inside
·         The blockchain is immutable, so no one can tamper with the data that is inside it.
·         The blockchain is transparent so one can track the data if they wa
nt to

Applications:
The blockchain gives internet users the ability to create value and authenticates digital information.
  •  AML and KYC: Anti-money laundering (AML) and know your customer (KYC) practices have a strong potential for being adapted to the blockchain. Currently, financial institutions must perform a labor-intensive A multi-step process for each new customer. KYC costs could be reduced through cross-institution client verification and at the same time increase monitoring and analysis effectiveness. Once verified through the bank data is cryptographically stored on block chain.
  •  SMART CONTRACTS: Smart contracts can be programmed to perform simple functions. For instance, a derivative could be paid out when a financial instrument meets a certain benchmark, with the use of blockchain technology and Bitcoin enabling the payout to be automated.
  • THE SHARING ECONOMY: By enabling peer-to-peer payments, the blockchain opens the door to direct interaction between parties — a truly decentralized sharing economy results.An early example, OpenBazaar uses the blockchain to create a peer-to-peer eBay.


The interesting thing about blockchain is that it has made it possible for humanity to reach a consensus about a piece of data without having any authority to dictate it.      "Everything will be tokenized and connected by a blockchain one day."



Comments

Popular posts from this blog

ROBOTIC PROCESS AUTOMATION

                             ROBOTIC PROCESS AUTOMATION: Robotic process automation (RPA), also known as software robotics, uses automation technology to simulate back-office functions performed by human employees, such as extracting data, filling out forms, moving files, etc. To integrate and carry out repetitive operations between enterprise and productivity applications, it mixes APIs and user interface (UI) interactions.   WORKING: RPA is not a physical robot but software running on physical and virtual machines. RPA is used when we have to handle repetitive tasks like sometimes, we fill in the same information at different places. It is operated by running a set of workflow tasks. It gives some instructions about what to do and how to do it at different stages of the workflow. Once the task is requested, the software runs and completes the whole task accordingly as many times as we want. If there is any incorrect data in bots, the software will send a request for correct

Unhackable Internet

  W hy it matters?   The internet is increasingly vulnerable to hacking; a quantum one would be unhackable. Quantum Computing    A quantum internet could be used to send unhackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a the quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss.   Now, Harvard and MIT researchers have found a way to correct for signal loss with a prototype quantum node that can catch, store and entangle bits of quantum information. The research is the missing link towards a practical quantum internet and a major step forward in the development of long-distance quantum networks.   The U.S Department of Energy (DoE) explains how a quantum link will make it happen through two quantum phenomenon: the first is quantum entanglement, where two-particle can become so inextricably li

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the