Kadan Stadelmann is a blockchain developer, operations security expert, and Komodo platforms chief technology officer (CTO). He started life writing code before he started school, before going on to work in operations security in the government sector in Austria and eventually working in the cryptography business. In this interview he explores his journey into blockchain, and why markets aren't a good measure of projects with the most promise.
I first came across decentralized technologies when I was in high school, a time when I was actively coding a lot. Bitcoin wasnt around back then but we used file-sharing clients, which utilized similar technologies. From 2011 to 2012, I spent some time traveling on the African continent and went through a period of personal deliberation.
I came to realize that my true passion was actively engaging with technologies that could make our world a more liberal, fair, and peaceful place. One of these technologies was Bitcoin and its underlying blockchain technology, as it has the power to offer a secure, borderless and non-inflationary form of currency, to provide global financial services to those without access to traditional banking services, and to create the foundation of a decentralized global economy thats more equitable to all people.
I started GPU mining the same year just as a non-lucrative hobby and, later, in 2013 and 2014, I started actively contributing to various crypto-related projects while keeping my main focus on security and vulnerability detection and analysis.
Be the first to get Decrypt Members. A new type of account built on blockchain.
The Komodo project was publicly announced by the team in September 2016. The ICO was held in October and November of the same year. We raised 2,639 BTC, or a little less than $2 Million USD at the market price of BTC at the time, which is still a pretty modest raise compared to most blockchain projects that hold ICOs. The KMD coins bought in the ICO were distributed in January 2017 and the mainnet went live that same month.
Did you know?
I dont have a main residence so I am largely nomadic. I travel around the world and work from wherever I am. Usually, I spend between one to three months in the same spot. Sometimes, I fall in love with a place and stay for six to 12 months or keep going back to certain places on a regular basis like Spain and Africa, for example.
When we first started Komodo, it was an enhanced fork of the privacy project Zcash. In fact, in the early days, Komodos first value proposition was Protecting Your Privacy With Bitcoins Hashrate, but since then we have evolved and challenged the larger issues of blockchain sovereignty and scalability. The Komodo vision is to provide an easy set of tools that developers, startups, and enterprise businesses can all use to launch customized, application-specific blockchains, each of which is protected with the hash rate of the Bitcoin network.
Currently, some of the barriers stopping businesses from integrating blockchain technology are the cost of hiring blockchain developers, lack of advanced coding experience, or challenges with forking existing blockchains such as Ethereum or EOS. Blockchain developers are few and far between so we aim to provide business-friendly solutions where anyone can create their own custom and autonomous blockchain, regardless of blockchain development experience. Komodos real purpose is to provide an adaptable framework for blockchain development, from customizing and launching the chain itself to programming applications and software that run directly on ones own independent chain.
Blockchains killer app is going to be a decentralized client that runs on all operating systems and devices.
Prior to Komodo, I launched an IT company in the operations security space with former university colleagues. The company was successful and we were able to sell the company for a profit but, unfortunately, Im not able to discuss this in detail, as Im still under a non-disclosure agreement. I moved away from traditional IT entrepreneurship when I began getting involved with blockchain technology.
My passion for information and electronic technologies appeared at a very young age. I was raised in Northern Africa as the son of an Austrian diplomat and an African school teacher, so I received a multilingual education. I actually coded my first simple applications, like a calculator and a text-manipulation app, before entering primary school. Later, I studied IT and economics at universities in Germany and Vienna.
After my formal education was complete, I gained deep practical experience in IT security and network development while working in operations security in the government sector in Austria. Then, my career in the crypto industry began with penetration testing and bug-hunting various blockchain projects, codebases, apps and web platforms. This was also how I first got in touch with James jl777 Lee, who is now the lead developer of Komodo.
At first, no one takes you seriouslybanks, lawyers, accounting firms and even friends or relatives. Everyone just said, What is this? Why arent you doing something real? Of course, everyone has now seen how important blockchain technology has become around the world, so their attitudes have changed since I first got involved in the industry.
Forming a cohesive team was also a pretty tough task. The initial Komodo team was basically a dozen crypto enthusiasts and the first community members, many of whom were anonymous. Over time, we became a bit more formalized, such as requiring employees to sign contracts and non-disclosure agreements, while still remaining globally distributed and fully decentralized. The team has really evolved into a group of talented, hardworking, and extremely professional crypto experts.
There are a lot of times when you know the odds are against you and there is a high chance that what you are doing or creating will not succeed or take off immediately. In those times, its important to accept the challenge and take the risk. Deliver more than what is expected and prove your potential to yourself! There is nothing more satisfying that delivering on your promises and showing everyone what you are capable of.
You need to believe in yourself and your project. Youll also need to invest a great deal of time in forming the initial team. Only with a solid team will you be able to achieve big things.
Do not look at crypto markets and financial capitalization of the various blockchain projects. The markets arent always a true reflection of which projects show the most promise. Only by distinguishing between the technology and the market will you be able to experience the true potential of blockchain technology. Money is the wrong motivation in this industry.
Be the first to get Decrypt Members. A new type of account built on blockchain.
In the beginning, Komodo didnt have the ecosystem layers we see today, which include third-party service providers, as well as many independent developers with different backgrounds and areas of expertise. So if I were to go back and do things over again, I would likely try to bring third-party projects and devs into the Komodo ecosystem earlier on.
I am really excited about new technologies that aim to bring decentralized governance to the industry, like what Tezos is doing, for example. Recently, I have also been following VerusCoin closely, a project that solved the two biggest proof-of-stake issues, the nothing at stake problem and the weak subjectivity problem.
Blockchains killer app is going to be a decentralized client that runs on all operating systems and devices (PC, smartphones, IoT, etc.) and interconnects all blockchain networks and even other p2p networks/technologies to build a base foundation layer for a trustless and meritocratic society. It would be an app that enables anyone from anywhere at any time to participate in this virtual world to communicate, earn money and/or respect and to build a reputation. Essentially, a software-collage of social networks, blockchain, fintech/banking, freedom of speech, economic systems, and meritocracy. This is something that Komodo looks to build in the long-term so not something on our immediate roadmap, but a goal that we have in the back of our minds as we continue to develop and innovate new technologies.
The biggest difference is in the people you will work with but also the structure and organizational aspects. Most blockchain companies arent just technically decentralized but also work in a decentralized manner meaning working remotely, in different timezones, and sometimes without ever meeting each other in real life. Instead of a traditional office building, encrypted channels and chat-rooms are our workspaces.
Its a decentralized and distributed network that allows different people to exchange data and value without having to trust one another. These peer-to-peer exchanges are completely secure, based on advanced cryptographic and mathematical techniques, and once a transaction is complete, no one can delete, shut down, spoof or edit.
Continue reading here:
Komodo CTO Kadan Stadelmann: Markets arent a true reflection of projects with the most promise - Decrypt
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]