Today at CryptoNewsZ, we are joined by entrepreneur, blockchain enthusiast, and crypto expert Johann Polecsak, CTO at QAN blockchain platform, CTO and co-founder of Centrum Circle.
CryptoNewsZ: Hello and welcome to CryptoNewsZ, Johann, our readers would love to know more about you and your journey which brought you into the blockchain space.
Hi, thank you very much for the opportunity.
Well, I got into the ecosystem like most techies did I think, and that is through mining. A friend of mine asked me if I could source GPUs every month because there was no supply. I said sure, because it was a significant amount, I felt pretty assured I could make a deal with a distributor. But then realized that there were no GPUs for sale at that moment in Europe. Wow. This must be huge, I thought. So, I started digging deep, its all hardware and software, so why not try it? We eventually bought some machines and never looked back from crypto since then.
CryptoNewsZ: QAN is building a quantum-proof, energy-efficient, and fast platform. Please tell us more about the QAN platform and its key features?
The crypto world is at a crossroads it either continues to run its vital transactions on outdated, slow, archaic platforms like Bitcoin and Ethereum or it reforms and adopts a new platform which can provide a strong, stable, and economically viable base to accommodate the requirements and growth pattern of all industries actively using blockchain technology.
QAN is a quantum-resistant blockchain platform powered by blockchain fintech brand Centrum Circle. QAN uses Lattice based cryptography, making it resilient to quantum attacks that are expected to become possible within the next five years, and which all major crypto networks are vulnerable to. QAN is based on a Proof of Randomness (PoR) consensus mechanism, with verifiable pseudorandomness. It is a new development that is basically a generalization of Algorands algorithm, with added scalability. By creating a permissioned ledger, QAN allows much more energy efficiency and better sustainability, especially when comparing to PoW networks. When comparing to PoS networks, they are considered not biased due to wealth distribution and first mover advantage. With PoR, the process is random, therefore unbiased, and theres no advantage for your wealth. Lastly, QAN offers Multi Programming Language support which helps mass adoption. Developers can write smart contracts in the language they already know.
CryptoNewsZ: Security features are inherent in blockchains which make them resistant to attack but do not make them totally immune. Do you think QANs fully quantum-resistant stack of security will usher in the much-needed security in the blockchain domain?
I always believe in showing a good example. In this case, it means we have to begin preparing for Quantum Computing related attacks right now, as the Quantum problem is closer than anyone would imagine. The issue, by the way, is actually a lot broader than the blockchain ecosystem. Every large enterprise and government is aware of the risk Quantum computing has to its data systems, and we cannot expect them to wait 5 years and adopt Quantum-resistant cryptography when the attack is so near. They need to start preparations at this very moment.
CryptoNewsZ: Quantum computing is the next generation computing machine that aims to make every work easy and fast; According to you, how will quantum computing impact blockchain technology?
Quantum Computing will force all cryptocurrencies to adopt new signing algorithms, as current ones (the ones used by Bitcoin and Ethereum as well) are proven to be vulnerable to signature forgery. Asymmetric cryptography relies on keypairs, namely a private and public key. Public keys can be calculated from their private counterpart, but not the other way around. This is due to the impossibility of certain mathematical problems. For instance, you would need to factorize a number thats a product of large primes in the case of RSA, or calculate the multiplicand of the generator (that resulted in a public key) in the case of Elliptic Curves, which most blockchains and cryptographic systems use.
Quantum computers are more efficient in accomplishing this by magnitudes, and if the calculation is done the other way (we could calculate private keys FROM public keys) then the whole scheme breaks. This is proven and we only need more qubits and stability in these systems, which are continuously developed further. QAN released an ebook, Quantum Computing and Blockchain: The Definitive Guide, if you want to learn more about the topic.
CryptoNewsZ: What are your thoughts on the increased scalability and tremendous adoption of blockchain technology? Is the present rate satisfactory?
Scalability is one of the biggest problems our industry is facing. Over time, it will be addressed using off-chain methods built in a secure and safe way.
However, while scalability is a concern these days, I believe mass adoption doesnt really depend on it. In fact, it has not started yet because the backbone of the whole infrastructure is basically missing, and the UI / UX in the whole ecosystem is almost non-existent, if we inspect it from a regular user perspective.
If we want to bring blockchain closer to end-users, we need credible brands behind the movement, education about how it works and to be able to emphasize how and why its different from traditional systems.
Whether this is satisfactory, it is a subjective question. We at QAN are working hard to bring this technology closer to everyday people by helping the inclusion of blockchain at enterprise level.
CryptoNewsZ: Blockchain has immense power to unleash the potential in enterprises; according to you, how is QAN one step ahead compared to the existing players in the highly competitive industry?
We are in close relation with many enterprises (10+) from different industries, and what we clearly see that their Tech departments fancy blockchain and are mostly experimenting with it as private individuals. But when it comes to including the technology on the corporate level, things become difficult. The reason is that the current staff is usually busy with other tasks, the entry barriers are quite high (different hardware and network architecture, different execution model, new programming languages etc.), and the additional HR costs reach the level these companies mostly are not willing to take if there is no direct, calculable profit for establishing a separate Blockchain Development Department.
How we combat these barriers is that we give the current staff education, easy-to-use tools, combined with QAN Platforms ability to write smart contracts in any major programming language they already know.
This reduces like 90% of the overhead (which equals 90% of otherwise wasted time), and enables the companys existing developers to start experimenting and working with blockchain right away.
CryptoNewsZ: Any parting advice to novices and young entrepreneurs who want to start their careers in the blockchain industry?
Sure, our (harsh) advice is not to waste time learning about 20 different platforms to find out which will give you the least overhead to start, and cause you compromises on many other sides.
Wait for QAN to release the beta and testnet, and start experimenting without the hassle, we will provide you a much smoother learning curve, and give you the satisfaction which you are looking for.
Develop in (almost) any of the languages you already know, and spin up a blockchain network with a click of a button to start right away.
Team CryptoNewsZ thanks you for sharing your valuable insights and time with us, Johann and wish you tremendous success for the future.
The rest is here:
QAN's CTO and Co-founder Johann Polecsak in an Exclusive Interview with CryptoNewsZ - CryptoNewsZ
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]