In the latest season of HBOs popular series Silicon Valley, the iconic CEO of Pied Piper, Richard Hendrick proposes a stunningly ambitious idea for his startup: rebuild the Internet as a decentralized network that utilizes the computing power of billions of phones in our pockets and spare computers in our living room.
This is in stark contrast to the world we live in today, where more than a third of all Internet traffic goes through the few dozen massive data centers of Amazon Web Services across the globe. Recently, that architecture led to a massive Internet meltdown after a regional outage at Amazons Virginia data center.
Hendricks big idea to decentralize the Internet was obviously inspired by the Ethereum project, a world computer based on complex cryptographic protocols led by now 23 year old russian whiz kid Vitalik Buterin. Recently, we witnessed Ethereum tokens meteoric rise to over $25B in market cap, all happening in less than three years since its launch. If Ethereum was a startup, it would be considered as one of the fastest growing unicorns in history.
Unlike the traditional cloud that can crash or be hacked, Ethereum is often referred to as a perfect virtual computer. It is unstoppable, uncensorable, tamper-proof, and impossible to catch malware or a virus. This is achieved by a complex piece of cryptographic protocol that runs over a large network of individual computers across the world; rather than being concentrated in a few data centers. Anyone can join that network and become a miner by lending their computation services and earn digital tokens, known as Ether.
Yet, despite its phenomenal growth and serious enterprise backing from worlds leading enterprises and financial institutions from Microsoft, Accenture, and JP Morgan, researchers in the space so far caution that were still at the earliest stages of development. Vlad Zamfir, a well-known crypto researcher and core member of Ethereum Foundation put it as follows:
Lets look at what he meant by not scalable. Take Twitter, a popular and centralized social media service as an example. The site processes hundreds of millions of tweets per day on average. And thats just a single service. The capacity limit of the entire Ethereum network is currently on a scale of less than a million per day. Yet, adding new computers, aka nodes, to the Ethereum network doesnt help it to scale, due to limitations of its current algorithm design.
Solving for coordination of millions of computers across the Internet while able to achieve scalability is certainly not a trivial task. Many of the brightest minds in mathematics, cryptography, and economics are in a major race to solve this hard problem, including Ethereums own next-generation research initiative, codenamed Casper.
Among many contestants, the DFINITY project is an intriguing one with its strong technical underpinnings and a particularly ambitious vision to focus on delivering a Decentralized Cloud, rather than automating trust which most blockchain projects tend to focus on.
Supported by DFINITY Stiftung, a not-for-profit headquartered in Zug, Switzerland, the project boasts over $20M in funding (with another main round fundraiser upcoming), and a strong team comprised of top engineers, scientists and economists, many with background from leading organizations such as Stanford, Google, Yale and University of Chicago.
Our objective is to deliver a public decentralized cloud computing resource, with vastly improved performance already seeing more than 50x that of Ethereum in its first release this year with the goal of ultimately achieving infinite capacity. says its founder Dominic Williams, a British-born serial entrepreneur. Williams last multi-million user startup in the massive multiplayer space brought him to the Valley, after fundraising from leading US venture investors.
The ingenious way that DFINITY achieves such performance boost comes partly from a piece of cryptography invented at Stanford, named BLS, standing for its three co-authors: Dan Boneh, Ben Lynn and Hovav Shacham.
Today, Boneh is best known as the head of applied cryptography at Stanford and one of the worlds leading cryptographers. Lynn, his former Ph.D. student, spent the last ten years at Google and recently joined String Labs, the incubator and a lead contributor to DFINITY Project, to work on its core protocol.
Seeing BLS cryptography been applied to power the next generation decentralized cloud, and potentially used by tens of millions of people makes me incredibly excited as a cryptographer and engineer. says Lynn, when asked about why he decided to join as a full-time contributor.
A vastly performant decentralized network could replace todays unnecessarily complicated IT systems on centralized infrastructure. In Williams words, Enterprise IT systems running on this computer will be unstoppable and won't need to involve complex components such as databases, backup and restore systems or Amazon Web Services, allowing costs to be cut by 90% or more by reducing the supporting human capital required.
The disruption potential doesnt stop with that, he stated, A highly performant decentralized cloud will also enable the creation of open source decentralized businesses using self-updating autonomous software systems that may eventually be able to disintermediate and beat out monopolistic organizations such as Uber, eBay, Gmail and others.
Still, theres another major hurdle it must overcome. The blockchain computer, while featuring immutability and trust, carries with it a new dimension of challenges that hasnt been seen in traditional cloud computing. What if the software on blockchain is buggy? What if the funds on it are stolen by malicious hackers? Will these problems be immutable as well?
This class of problems are commonly known as governance issues in the blockchain community. Consider the infamous The DAO heist in the summer of 2016. A decentralized venture fund robot, named the DAO, on Ethereum collected $150M worth of Ether tokens from 20,000 individual anonymous investors in less than 50 days. An amazing feat by all accounts.
Yet only a week later, an anonymous hacker was able to exploit vulnerability in its code that caused a loss of $90M. This ultimately led to a decision to fork Ethereum into a new network that reversed the hack and rescued the user funds.
That decision came from months of endless debates and controversies that haunt it even today. In absence of a formal governance process, people questioned the legitimacy of such a decision in a decentralized system, where software code is often believed to be the ultimate law and immutable.
The DFINITY team took apparently a different philosophy:
While Code is Law is indeed valuable in some cases, we think a different paradigm is needed for mainstream business uses. A world where a twenty-something hacker could happily walk away with multi-million dollars of theft by watching and exploiting software vulnerabilities on the blockchain, is not particularly an appealing one for enterprises or commercial applications. We need a blockchain algorithmic court to settle these cases.
They propose a solution to such problem called the Blockchain Nervous System, which adopts an AI is Law design. By utilizing a hybrid human and AI governance algorithm, this algorithm could essentially overrule any previous code execution result when deemed necessary.
It also borrows a page from the political governance experience, something known as Liquid Democracy, that allows anyone in the community to delegate decisions to their trusted person, in order to reach high quality and rapid decisions en masse. For example, a DAO-like hack could potentially be reversed in a matter of hours given its non-controversy among community members with a strong following relationship, yet without risk of fragmenting the community with a hard fork.
Yet, with these powerful designs comes inevitably many uncertainties. What kind of proposal would be made? What if controversial proposals are mysteriously passed by the AI? Will crowd wisdom bend toward long-term optimizations or short-term market gains?
For now, the DFINITY team seems to confidently stand by this new experimental philosophy, and believes that it introduces a level of governance protocol that is desirable by mainstream enterprises. Leading organizations including Boston Consulting Group seem to concur with this in partnering with the project.
With its recent briefing, the SEC deemed the sale of digital assets the same as selling securities, which means tokens may be subject to the same laws and regulations. While some say this may have a chilling effect on the industry in the short-term, more regulation will benefit the industry in the long term. The market also seems to have already priced in this decision by the SEC, ruling out the worst case scenario of a complete ban of tokens.
I see this as a positive long-term development. The SEC alluded to the same thing in 2013 and 2014. The real issue is secondary sales. Free movement of tokens is an essential part of the value of the token. So it has to qualify as not being a security which means structuring it as such needs to be front and center from day one, said Artia Moghbel, DFINITYs Head of Operations and Communications.
Controversies and obstacles aside, what DFINITY has successfully accomplished has expanded the scope of what blockchain systems are capable of, and offers a glimpse of what the future of the Internet could become. Its indeed be an interesting time to watch how decentralized computation, crowd wisdom combined with artificial intelligence, could perhaps finally make blockchain the challenger to the Amazon Web Services and the like.
The Morning Email
Wake up to the day's most important news.
More:
Can A Blockchain Computer With Governance Be The Future of Cloud? - HuffPost
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]