Telecommunication network above city, wireless mobile internet technology for smart grid or 5G LTE ... [+] data connection, concept about IoT, global business, fintech, blockchain
In 2015 The Economist magazine hailed blockchain as the trust machine, capable of replacing governance structures, displacing institutions, and bringing a new level of transparency to transactions and information, with implications across public life.
In the years since, the technology has produced trillion-dollar decentralized financial markets and a slew of innovation over blockchains especially in financial services, with the rise of bitcoin, stabelcoins, decentralized finance or DeFi, Central Bank Digital Currencies (CBDCs), and other industries such as shipping, logistics and supply chains are starting to scale use cases.
OECD research, however, shows little breakthrough in blockchain innovation in government and minimal impact in the public sector - the technology is often described as a solution in search of a problem. While the technology is rapidly maturing, we are starting to see governments take an interest in blockchain and distributed ledger technology (DLT) in areas such as tax, standards and certification, digital identity, and data privacy.
For governments, assessing blockchains disruptive potential is both a practical challenge and a philosophical one. The raison detre of many public institutions is the provision of public goods, and the underwriting of rights and the social contract functions that blockchains pioneers sought to replace with cryptography, networks, and protocols. Whether this technology will be used to displace or complement traditional governance models is an open question, as is its ability to deliver such transformation.
This years opening discussion at the OECDs 4th Annual Blockchain Policy Forum addressed several the main opportunities and challenges at the intersection of technology and governance to disentangle blockchains promise from reality and explored the extent to which the technology can and should be guided by governments towards better models of social and economic connection.
In global trade, the leaders in blockchain technologies are the Indo-Pacific based governments like China and Singapore. Trade is the lifeblood of this region which is considered the global trading hub. China and Singapore have been early to understand the benefits of the blockchain for supply chain management, not just for the provenance and tracking of goods, but for tax, customs, and digital rights.
Blockchain has dramatically scaled the 14th century Venetian innovation of the double-ledger into a theoretically infinite multidimensional ledger which is public, open, transparent, and immutable, and secures access using cryptography. Its like another layer of the Internet, with greater resilience against cybercrime, and integrates multiple stakeholders in much better management of the economy, says Alex Sandy Pentland, MIT professor and director of MIT Connection Science.
In a world with geo-political turbulence and trade headwinds, digital leadership in sectors like central bank digital currencies and supply chains using new digital technologies really matter welcome to the digital space race. The intellectual property, technologies, and standards in blockchain are now being used to gain a global foothold in trade. Importantly, this is helping to drive rapid adoption with low friction use cases and easy to access services.
Blockchain is helping counties that are early movers and leaders in this space to position themselves to generate decades of industrial, societal, and economic growth.
Governments need to learn how to adopt and adapt to polycentric governance models to better engage the broad range of actors and stakeholders required to compete in the digital world without having to create new overarching bureaucratic institutions, says Primavera De Filippi, permanent researcher at the National Center of Scientific Research in Paris (CNRS) and faculty associate at the Berkman Klein Center for Internet & Society at Harvard University.
Most of the blockchain DLT technologies are developed in open source with large pools of developers participating by voting through digital protocol governance models which extend in many protocols to other entities becoming governance nodes. This is akin to a large mutual society and is risk adjusted both by the volume of experienced participants and stakeholders and its polycentric nature.
There are two big benefits for governments building out their programs on the blockchain; the first is COLLABORATION governments can attract a larger and more diverse range of stakeholders to build out and adopt the digital infrastructure for trade, tax, identity, financial services, etc., and use the power of the crowd this is markedly different to large enterprise software projects which have significant concentration risks including the number of commercial stakeholders that can engage. The second is CERTIFICATION governments can move away from using sticks by offering carrots to stakeholders that exhibit measurable compliant behaviors this could dramatically change the way we look at regulation and compliance.
This is all achievable through smart contracts on the blockchain and can be accomplished now without new contract law if we adopt functional equivalence for smart contracts, just as we adopted it moving from paper to electronic contracts. The only big decision that governments need to make upfront is whether to use public or private blockchains, or a mix, and this decision merits significant consideration of the specific use case, says De Filippi.
Adds Pentland, there is a great transfer of soft power taking place with blockchain technologies, and when it comes to trade, it is Indo-Pacific led. It is important as the systems grow that they focus on a level of interoperability with each other through standards, to ultimately deliver the benefits that distributed ledger technologies offer multi-dimensional participation. If countries seek to go down the walled garden route, interoperability will go down the drain and the global trade system will be open to further arbitrage opportunities by those that seek to exploit this situation.
Governments and industry must recognize that blockchain is now mature, here to stay, and ready to use, today. The technology is more than a decade old and the underlying technologies of distributed databases, cryptography, and peer to peer networking have been with us since the dawn of computing.
Software developers are delivering blockchain use cases to market quicker than most industries, governments, and regulators can keep up with that is the power of the polycentric networked crowd. There is more innovation going on outside your four walls than inside, and you need to know how to plug into it.
As is often the case, it is the systematic factors coupled with institutional bias that are barriers to governments and managers understanding how and when to mobilize new innovative technologies and methods for society, and in many instances, few are really incentivized to make it happen.
The blockchain revolution provides the platform to engage large numbers and dimensions of stakeholders in the economy through shared mutual governance the major incentive is already there, it is baked into the governance model greater and more efficient economic participation in the economy.
Governments would be wise to be serious about prioritizing the digital space race. If the revolution is tokenized, it will be because large public blockchain consensus protocols are tokenizing it, and large swathes of global business and consumers are using it.
You can watch this panel and learn more about this and much more from the OECDs 4th Annual Blockchain Policy Forum.
See the original post:
Will The Revolution Be Tokenized: Governments, Blockchain, And The Digital Space Race - Forbes
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]