How the block chain will make people master their own data


nnnAlthough the experts generally believe that the block chain can break the status of technology companies exclusive user data, better protection of data security, but ordinary people on its principles and functions may not understand. In order to give a better understanding of the role of the block chain in this regard, TechTalks founder Ben Dickson wrote this article, popular and detailed description of the technology will enable users to regain control of their own data, revealing the technology The superiority.n
nnTranslated by: Inan
nIn the past few years, the block chain has been a great recognition, known as the central network to the next major technology. Venture companies have acquired billions of dollars of funds through traditional financing and tokens to develop software and proof of concept, using block chains to solve many of the problems in centralized online services.n
nBut will the block chain technology be mainstream?n
nBlock chain commitment protects users from DDoS attacks and data tampering, preventing voter fraud, speeding up transactions, reducing costs, and improving transparency and audibility. These are the features that IT experts and software developers appreciate, but they also have the familiar features of the average user. Why does the user abandon the cloud service that has been created to choose an unknown alternative that looks like a function? As long as Skype is working in 99% of the time, why should users turn to block-based alternatives?n
nBlock chain If you want to get real traction, you need the general user recognized the specific value proposition. I think that this value proposition will be that everyone can have their own data.n
nFacebook and other large technology companies to collect and hoard a large number of user information, and use this information to improve the operation of the service and generate revenue algorithm. But the user does not have the ownership of the data, must rely on these centrality services to store and protect their information. This approach effectively locks users into these platforms, depriving them of their options and control. If the facebook closes the user’s account, the user will lose all the data, contacts, reputation, preferences, and interactions over the years. Google, YouTube, Amazon, Twitter, and so on is the case.n
nAnd then there will be large-scale data leakage events, such as last week reported Equifax, 143 million consumer social security number, address and other data have been exposed to hackers and identity thieves.n
nThe real value of the block chain and distributed books to the consumer is here. The block-chain architecture allows user data to be separated from the server application that uses it. A few companies are exploring this concept to enable users to regain control of their own data.n
nBlockstack is one such example. It is a block-based browser that aims to create a de-centric Internet where user data is not owned by service providers. The browser allows users to access a variety of websites through a chain-based identity to access a variety of services. This identity is owned by the user, and the user can bring the data to every new application they use, rather than storing the data in the application’s server. The browser also allows the user to encrypt and store the data on the application in the background of their choice to fully control the data. This background can be Google Drive, Dropbox, or any other service that has the correct API.n
nAnother similar open source block chain project is Pillar – the development of so-called personal data storage cabinets and “smart wallet”. Pillar is a mobile application for storing and managing users’ digital assets in the chain chain, giving users complete ownership and control. These assets can be digital currency, health records, contact information, documents and so on. Pillar also hopes to solve another fundamental problem, that ordinary consumers lack of interest in managing their own data. Pillar will be the user’s intention to express the AI ​​assistant, whether it is registered or purchased items that may involve personal data. The assistant will then find the services they need and provide them with the data in the wallet without copying and storing the sensitive information on their own servers.n
nEnigma and other projects use block chains to protect user data privacy while being shared with cloud services and third parties. Enigma’s platform protects data by encryption, divides it into several parts, and randomly distributes these non-decryptable data blocks among multiple nodes in its network. Enigma uses “safe multi-party computing” to operate: each node performs a calculation on its individual data block and feeds the result back to the user, which can then combine it with other people’s results to arrive at the final result. Users can maintain control and ownership of their own data blocks on the block chain. They can allow or deny access by third parties and services that want to perform calculations on their data.n
nSocial media is another area where block chain startups are subversive. Platforms such as Nexus and Indorse improve privacy and data ownership by storing information in the block chain and allow users to control access, sharing, and monetization of their data.n
nThe key idea of ​​a block-chain application is to transform the Internet from an application-centric approach to a user-centric structure that allows users to keep control of their digital footprint and to decide who can access it.n
nTo make the user truly understand the value of their personal data and digital assets, we still have a long way to go. But once they begin to understand the consequences of allowing the centric service to collect their data and decide to take back their control, then the block chain will be the technology they need.n

Leave a Reply

Your email address will not be published. Required fields are marked *