The Crypto What

When I first heard of cryptocurrencies, I immediately reflected back on the time when I sat with Mondex, in my portfolio of technologies.

We believed that you needed a point of origination responsible for issuing an amount of value that the economy could sustain in this card based electronic format.

Typically, the architecture assumed somebody would take monies on deposit or cash and exchange it for this digital currency, with the sovereign authority responsible for issuing the Mondex, multicurancy currencies, or its agents, the Banks.

It was assumed, when the digital currency form Mondex reached a critical element of the economy; transfer the origination function to the appropriate national authority.

My first memory, of bitcoin., is 2012, maybe 13. Here was this very ingenious cryptographic method of recording every transaction as a ledger entry created the ability to create a currency that was represented by records on a ledger that could only be written to, was signed.

And, had an immutable characteristic that guarantee nothing in the past could be changed.

Ok

Consensus leads to expense.

But, consensus assures trust

In an environment of zero trust.

The world then 2008

and

now 2025.

When did we stop trusting the party in the USA responsible for the money supply.

Do we intend to leave control with the speculators

BLOCKCHAIN Economy

A Conversation with Gemini

What is the economic reality of blockchain write only databases or ledgers.

Show thinking

Okay, let’s break down the economic reality of blockchain-based databases or ledgers, focusing on their characteristic as largely “append-only” (data is added, but extremely difficult to modify or delete once confirmed).

The economic reality is complex and highly dependent on the specific use case, the type of blockchain (public vs. private/consortium), and comparison to traditional database solutions. Here’s a breakdown:

  • 1. High Costs (Often Higher than Traditional Databases):
  • Development & Implementation: Building and integrating blockchain solutions requires specialized expertise, which is often expensive and less common than traditional database skills. Setting up nodes, smart contracts, and ensuring security is complex.  
  • Transaction Costs (Gas Fees): Particularly on public blockchains (like Ethereum), every transaction (writing data) requires a fee paid to network validators/miners. These fees can fluctuate wildly and become prohibitively expensive, especially for high-volume applications.  
  • Energy Consumption: Proof-of-Work (PoW) blockchains (like Bitcoin, though Ethereum has moved away) are notoriously energy-intensive, leading to high operational costs and environmental concerns. Proof-of-Stake (PoS) and other consensus mechanisms are more efficient but still require infrastructure and incentives.  
  • Storage Costs: Every node in the network typically stores a copy (or at least the headers) of the entire ledger. As the ledger grows, storage requirements increase across the network, although solutions like sharding aim to mitigate this.  
  • Scalability Limitations & Costs: Many blockchains face limitations in transaction throughput (transactions per second). Scaling solutions (like Layer 2 networks) add complexity and potential additional costs or trust assumptions.  
  • 2. Economic Benefits (The Value Proposition – Where Costs Might Be Justified):
  • Trust & Transparency: In scenarios involving multiple parties who don’t fully trust each other (e.g., supply chain, consortiums, international trade), the shared, immutable, and transparent nature of the ledger can reduce the need for costly intermediaries, audits, and reconciliation processes. This disintermediation is a key potential economic benefit.  
  • Immutability & Security: The high cost and difficulty of altering past records provide strong data integrity. This is valuable for applications where tamper-proofing is critical (e.g., land registries, intellectual property, voting systems – though practical implementations vary). This reduces risks associated with data manipulation or fraud.
  • Automation via Smart Contracts: Smart contracts can automate agreements and processes based on ledger data (e.g., automatic payment release upon verified delivery). This can reduce administrative overhead and speed up execution, potentially lowering costs.  
  • Resilience & Availability (Decentralization): A truly decentralized network has no single point of failure, potentially offering higher uptime and censorship resistance compared to centralized databases (though many “enterprise blockchains” are not fully decentralized).  
  • 3. The Crucial Question: Is Blockchain Economically Viable for a Specific Use Case?
  • Comparison to Alternatives: For many applications, a traditional, centralized database (SQL, NoSQL) managed by a trusted entity is far cheaper, faster, more scalable, and easier to manage. The key economic question is whether the unique benefits of blockchain (trustlessness, transparency, immutability) outweigh its significant costs and complexities for that specific problem.
  • Problem Fit: Blockchain makes the most economic sense when:
  • Multiple, mutually distrusting parties need to share and agree on data.
  • Immutability and auditability are paramount.
  • Disintermediation offers significant cost savings or efficiency gains.   A degree of decentralization is required for resilience or censorship resistance.
  • Private/Permissioned vs. Public Blockchains:
  • Public: Higher potential for true decentralization and censorship resistance, but often higher transaction costs (gas fees), lower throughput, and less control. Economic model often relies on native tokens.
  • Private/Permissioned: Controlled by a single entity or consortium. Generally faster, cheaper transactions (no public gas fees), and higher privacy, but sacrifices decentralization and potentially some trust benefits. Costs are shared among participants or borne by the managing entity. Often closer to a shared, immutable database than a truly decentralized system.
  • 4. Economic Reality Check:
  • Hype vs. Reality: Many proposed blockchain use cases haven’t proven economically superior to existing solutions after the initial hype.
  • Adoption: While adoption is growing in specific niches (DeFi, supply chain pilots, cross-border payments, NFTs), it’s far from mainstream for general database needs.
  • Immutability as a Drawback: The inability to easily change or delete data can be an economic liability, especially concerning errors, updates, or regulations like GDPR’s “right to be forgotten.” Workarounds exist but add complexity and cost.
  • In Conclusion:
    • The economic reality of blockchain ledgers is that they are often more expensive, slower, and more complex than traditional databases. Their economic viability hinges entirely on whether the specific problem requires the unique benefits of decentralization, transparency, immutability, and trust reduction among multiple parties, and whether these benefits provide value that significantly outweighs the higher costs and inherent limitations compared to centralized alternatives. For many standard data storage and retrieval tasks, traditional databases remain the far more economical choice

Golden Rule Passages – Comprehensive Source List

Abrahamic Religions

Christianity

  1. Matthew 7:12 – Gospel of Matthew, Chapter 7, Verse 12
    “So in everything, do to others what you would have them do to you, for this sums up the Law and the Prophets.”
  2. Luke 6:31 – Gospel of Luke, Chapter 6, Verse 31
    “Do to others as you would have them do to you.”
  3. Mark 12:31 – Gospel of Mark, Chapter 12, Verse 31
    “Love your neighbor as yourself.”
  4. John 13:34-35 – Gospel of John, Chapter 13, Verses 34-35
    “A new command I give you: Love one another. As I have loved you, so you must love one another. By this everyone will know that you are my disciples, if you love one another.”

Judaism

  1. Leviticus 19:18 – Torah, Book of Leviticus, Chapter 19, Verse 18
    “Love your neighbor as yourself.”
  2. Talmud, Shabbat 31a – Oral Tradition
    “What is hateful to you, do not do to your fellow: this is the whole Torah; the rest is the explanation; go and learn.”

Islam

  1. Hadith (Nawawi’s Forty Hadith, Hadith 13)
    “None of you [truly] believes until he wishes for his brother what he wishes for himself.”

Eastern Religions

Buddhism

  1. Udana-Varga 5:18
    “Hurt not others in ways that you yourself would find hurtful.”

Hinduism

  1. Mahabharata (Anusasana Parva, Section CXIII)
    “One should never do that to another which one regards as injurious to one’s own self. This, in brief, is the rule of righteousness.”

Jainism

  1. Acaranga Sutra
    “One who disregards ethics and treats others as he would not wish to be treated himself acts wrongly and not rightly.”

Eastern Philosophical Traditions

Confucianism

  1. Analects 15:23
    “Do not do to others what you do not want done to yourself.”

Other Religious Traditions

Sikhism

  1. Guru Granth Sahib
    “Treat others as you would have them treat you.”

Baha’i Faith

  1. Writings of Baha’u’llah
    “Blessed is he who preferreth his brother before himself.”

Zoroastrianism

  1. Dadistan-i-Dinik
    “That nature only is good when it is helpful to others and does not injure them.”

Indigenous and Philosophical Traditions

Native American Wisdom

  1. A common saying among various tribes
    “Respect for all life is the foundation of a good life.”

Archaeological and Ancient Sources

Ancient Egypt

  1. Papyrus of Ani (Egyptian Book of the Dead)
    “Do for one who may do for you, that you may cause him thus to do.”

Ancient Greece

  1. Pittacus of Mytilene (c. 640-568 BCE)
    “Do not do to your neighbor what you would take ill from him.”

Comparative Analysis

The universality of the Golden Rule suggests a fundamental human ethical insight that transcends cultural, religious, and geographical boundaries. Each tradition expresses the core principle slightly differently, but the essence remains consistent: empathy, reciprocity, and mutual respect form the cornerstone of ethical behavior.

Key observations:

  • The principle appears in virtually every major world religion and philosophical tradition
  • The formulation varies between positive (“do unto others”) and negative (“do not do to others”) constructions
  • The rule typically implies treating others with the same respect, kindness, and consideration one would desire for themselves

This comprehensive list demonstrates that the Golden Rule is not just a religious concept, but a fundamental human ethical principle that has emerged independently across different cultures and time periods.

We are all Kings of the World

Jesus the King of the World for 18 years wandered this earth. As our teacher he stands before us with one truth. Love each other. In so doing you love and honor God.

Matthew 25:40 And the king will answer them, ‘Truly I tell you, just as you did it to one of the least of these who are members of my family,* you did it to me.’ 

Tomorrow Immutability and Trustless is this what we want?

2 words immutability and trustless. 

Such big words. The idea something is once written can never be changed, altered, or deleted as well as elegant. Or that there is no need to worry about anything, what is presented simply is one instance of knowledge not until more than two can be found is there the possibility of trust. But if more than a few assemble and not sure then!

In a trustless environment, there is no single entity that has authority over the system, and consensus is achieved without participants having to know or trust anything but the system itself. A definition from one of the major institutions helping to establish this new.  New what?

https://academy.binance.com/en/glossary/trustless

It is the removal of relationships so they can be replaced by something, no someone new that is bothersome.  Words like usury invade reality, and a few get very wealthy as the mass spend to survive, always being driven to need more. 

We have lost the ability to commune.  We lost track if the responsibility to be good stewards of the garden we were given responsibility for .

Democracy is at Stake

Democrats cannot give up on voting reform. The nation can’t afford it.
Opinion by the Editorial Board

https://www.washingtonpost.com/opinions/2021/06/23/voting-reform-cannot-die-future-democracy-is-stake/

When I think about democracy I wonder about how long it will take to truly become democratic.

This transformation requires the agility to accept change as society moves forward and expands on all sides, Be our differences density, education, technology, automation, learning, health, family, place, or position.

Van Buren v United States

Date & Time:
Tuesday, June 29th, 2021
10:30 AM PT | 1:30 PM ET

Explained: A Legal Perspective on the Future of Cybersecurity Research

The Supreme Court’s Van Buren decision earlier this month aimed to clarify the ambiguous meaning of “exceeding authorized access” in the Computer Fraud and Abuse Act, the federal computer crime law.

In the context of protecting critical infrastructure from hackers, this particular ruling will define how we manage, report, and handle unauthorized access.

It also raises some foundational questions that, if weighed carefully, have the potential to foster a collaborative relationship between researchers and companies. How should good-faith researchers conduct themselves? Does this redefine the relationship between companies and hackers? Is every researcher considered to be in violation of CFAA if they’ve not sought permission to access a system?

Jared L. Hubbard and Christopher Hart have followed this ruling closely and worked on amicus briefs to aid the Court in this matter. They will discuss the case and answer questions.

Speakers:

Jared L. Hubbard, Partner, Fitch LP
Christopher Escobedo Hart, Partner, Co-Chair, Privacy & Data Security Practice – Boston, FoleyHoag LLP


Register on Eventbrite


Follow us on Twitter and LinkedIn to stay in the loop with updates!

Copyright © 2021 Voatz. All rights reserved.

Thinking Voting

Today we seek to ensure each citizen eligible to vote can vote. Issues like location, geography, education are all elements of the values we must embrace as we work to assure the citizens ability to vote.

The first question of voter and eligibility takes us into the realm of who or how elections are managed. Candidates, contests, question are all elements of what is presented to the voter as a ballot. According to practices and rules, contests involve selecting candidates. While questions focus on yes/no answers or a score.

Anonymity creates a need to construct a mechanism to assure one vote per voter while preserving the privacy of the voters identity. This one requirement solved reduces the risk landscape significanttly and complicates the angle of attack.

Adhering to a security first continous improvement principles and integrating prevention and detection into the design of the source code.

I believe Voatz has solved the most challenging task and embraced best of breed components and partners to build a secure immutable record of each unique anonymously signed ballot.

The rest, as long as vendor certification mechanisms and coherent standards exist, has been done over and over again in: financial services, government services, defense, health, and retail. With sound software design and release procedures, built on quality principles inherent in the companies ethos

All we need is the right to improve democracy.

No one is chosen

How can any tribe claim to be chosen?  When so many other cultures and tribes emerged in other parts of the globe.  Each grew up with an understanding of the unimaginable Creator. God, by whatever name.

This elemental craving to be better than another goes back to the emergence of language. When we learned to communicate with together we began to wonder: how or why?

These two questions get more complicated when we wonder how those lights appear in the night sky or why the rain does not soak the earth.

Yet up against the Mediterranean this band of escaped Egyptian slaves claim lands from the inhabitants.

A long time ago out of Northeastern Africa Homosapien emerged.

Homo sapien an interesting evolution of the primate. They settled in tribal communities. Evolved and seeking shelter, food source, drinking water, and sanitation together.

A new world order seems to be the next step in man and woman’s evolution. Division twin tribes, cultures, people and religion create animosity. It is this animosity built on fear often times we we must address as we evolve.

Where would I live if both ice caps melted and all glaciers disappeared. How much water did you put on the Earth? Somewhere on what will become Eastern seaboard is where Philip wants to build, I’m home.

The next question, when does it matter. If I think of myself 2050 I would be 96. If I think beyond, 21 sounds like a good number.

What is a DAO and how do we govern tomorrow

Distributed autonomous organizations, a DAO.

When we think of governance and how we control society, we immediately must consider the realities of people in the tribes they belong to.

Recently the emergence of bitcoin, the understanding of the power of a distributed ledger, the use of a hash chain, the power of cryptographic processes, and the security of the devices we carry establishes a foundation for a brave new world.

What is governance? It is the method processes and mechanisms a society puts in place to establish order and ensure harmony?

The ancient Turks, Greeks, slave spoke of democracy, the idea that each member of the tribe, the town, the city, or the state could assemble and determine new laws, regulations, and best practices. We then evolved into Republican governments the concept of a group of people representing a larger number of citizens.

Influence and power define what shall evolve. In my lifetime, the idea of being able to plug the handset of your telephone into the back of a terminal and establish a connection to a computer somewhere out there was a novelty. For my father it is Time in Geneva when Aryanism stood out as a challenge, opportunity or threat. Telephones were just emerging and radios were available. TV was still not present. Paper books and libraries surrounded the environment we will call Geneva.

City on the Lake, what is this thing place in his history his is as relevant as your or mine.

One question why anonymity at the profound process of engagement. When you are something called anonymous I am not sure I want to play. If your anonymous is mandatory; I don’t want to play.

The innovative spiritual and the. Nurturing essence of life.. How this evolves involves countless engagements.

Each sublime note to the fabric of the virtual environment we present to the public is.

And, all of us form the fabric of the public.

He answered them, “And why do you break the commandment of God for the sake of your tradition? 4 For God said,* ‘Honor your father and your mother,’ and, ‘Whoever speaks evil of father or mother must surely die.’ 5 But you say that whoever tells father or mother, ‘Whatever support you might have had from me is given to God,’* then that person need not honor the father.* 6 So, for the sake of your tradition, you make void the word* of God. 7 You hypocrites! Isaiah prophesied rightly about you when he said:

8 ‘This people honors me with their lips,

but their hearts are far from me;

9 in vain do they worship me,

teaching human precepts as doctrines

“Listen and understand: 11 it is not what goes into the mouth that defiles a person, but it is what comes out of the mouth that defiles.”

What shall we do? Simple honor the one Jesus answered, “The first is, ‘Hear, O Israel: the Lord our God, the Lord is one; 30 you shall love the Lord your God with all your heart, and with all your soul, and with all your mind, and with all your strength.’ 31

You commit to what you believe in with a robust desire to adhere to the moral imperatives. The one God is the same God written about in so many different ancient lore.

The second is this, ‘You shall love your neighbor as yourself.’ There is no other commandment greater than these.” 32

32

Who is your neighbor?

Anyone you engage in an event. An event is is anything we all seek to record. By the way any unit of one can record as long as all parties are aware. It is our contracts and promises. Those such as payment, voting, identity and influence.

See you next time.

Digital Identity and Authentic Relationships

When we think of investing in various businesses the goal, of course, is revenue. One of the keys to such success is loyalty. Loyalty is all about the relationship companies create with their customers and the revenue these relationships assure.

If the buyer has something the seller wants, in exchange for the good or service they desire, then a transaction occurs. The challenge is simple, each party defines the value of what they are providing or exchanging and presto the trade occurs.

When society grows and the complexity of what each of us produces and when our needs are not aligned to this process called barter, a means of monetization is established. Society creates a trusted means of exchange – pebbles, coins, money, a promissory note or now even, some would argue, cryptocurrencies.

In other words, society created an answer to enable the exchange of goods and services between parties, who do not have the goods and services the other party seeks.

With cash, coins or other tangible representations of value, commerce is easy. When society does not develop a secure and trusted means of facilitating the exchange of things commerce, innovation and a good life cannot be achieved. To this end, paper money is imbued with ‘value’ based on the integrity of the party issuing the physical or now electronic ‘money’. The addition of the word ‘electronic’ brings technology, computers, and networks into the conversation. One network, typically referred to as the Automated Clearing House ‘ACH’ allows banks to electronic instruct the movement of ‘money from an account at one bank to an account at another.

The addition of the word ‘electronic’ brings technology, computers, and networks into the conversation. One network, typically referred to as the Automated Clearing House ‘ACH’ allows banks to electronic instruct the movement of ‘money from an account at one bank to an account at another. The use of an ach check processing system for business transactions between vendors and customers has become increasingly common in addition to banks. The advantage of this system is that it usually allows businesses to transfer money automatically between bank accounts so that their payments can be cleared out in a short period of time.

In the 1958 Bank of America created Visa Inc., in 1964 the Wallenberg family created Eurocard, and then in 1966 a collection of banks banded together to create the Interbank Card Association, Mastercharge and now MasterCard.

These payment networks, by necessity, add complexity. They create the need to establish a two sided market. On one side the relationship with the buyer, consumer, or cardholder. On the other side if this market the seller, merchant, or retailer.

Issuance and Acceptance. Two words to describe the two sides of a network. It’s only when the two sides of the market have sufficient participants. Only at the tipping point, when critical mass exists, can one claim to have created a self-sustaining network. A network of people promoting use to buyers and a network of merchants willing to accept payment based on the terms and conditions defined by the network. Beginning at this tipping point, the network and it’s Brand blossoms. If either side of the market does not achieve critical mass, the network collapses.

Relationships – The oil of commerce

Any two entities familiar and trusting in the Brand, or each other, can easily establish a temporary relationship with entities associated with the brand. If one or more of the entities require anonymity increases the level of trust and recognition the Brand must establish with these participants.

In a digital environment, we are in need of mechanisms to share and establish trust across trillions of electrons. The two sides of a relationship, in other words, the market, will not take the time to understand or appreciate the need for network and endpoint security; until the risk exceeds a threshold understood by the participants.

The Artifact of Trust

When a mutually trusted set of parties gives the citizen, consumer, employee or courtier a letter, card, device or any uniquely registered object, and provides every acceptor with a reader capable of recognizing the trusted thing. Then the two parties are in a position to establish “trust”. The consumer has a thing which is recognized and trusted by the acceptor. This is often referred to as “What You Have”.

Once the thing is recognized by the acceptor, then, the process of identification and authorizations (the transaction) can take place. The object – the artifact – carries an identifier. It possesses unique characteristics. The object also possesses a means of assuring the acceptor the presentation of that identifier represents a unique representation of that identifier.

The simplest artifact of establishing “trust” is a handheld thing, be it a key, fob, card, watch, pendant, phone, earpiece. It does not matter what it is, all that counts is that the merchant recognizes it and that the consumer is willing to carry and present it.

Trust, for the merchant, means they can, according to defined procedures, recognize and authenticate the thing. They are then in a position to pursue a temporary and trusted relationship. What can be achieved during the time the relationship of trusted is bounded, is constrained by an additional layer. In this layer the consumer, the acceptor and any third parties address which the rights and privileges are to be granted or pursued. This is when the exchange, sale, conversation, tranaction, event or access is granted.

What has this world come to

When we listen to the news, we must think first of the bias of the reporter. This unfortunate truth is troubling in a world where the United States leader speaks of fake news and uses Twitter to stir up the masses. This body of citizens struggles with truth and is easily bent to believe what the leader says.

This particular charismatic leader, like many others in the past, can cause people to believe anything. The challenge, these same people will follow both those with high morals and those without.

Jesus Christ, Siddhartha Gautama, Confucius, Laozi, and a few others spoke wisely and became spiritual leaders many continue to follow.

To name one well remembered, Hitler, like the recent President of this great country, spread lies, and fermented hatred.

How can we rise above when so many are unwilling or unable to see the truth.  We must rise above the madness these charismatic immoral individuals ferment.

That is the concern I have felt since first I looked upon the control a church exerts upon the mass.

Is Identity Dead – The answer is Authentication

Today 2019-12-12 I found my way to the following article and associated podcast.

https://diginomica.com/fall-event-highlight-steve-wilson-says-digital-identity-dead-so-where-do-we-go-here 

https://www.constellationr.com/blog-news/identity-dead

Below is a flow of thought as I read and listened. to Jon Reed and linkedin.com/in/lockstep Stephen Wilson discuss this most interesting topic.

Surveillance Capitalism – So many are taking advantage of our data!

We need to evolve through the pony express stage of data management, and get to a point where there are responsible data intermediaries who are being held to account.

Identity management, for me, is about proving things about myself. I want to log onto a bank and prove that I have a particular bank account. Sometimes I want to log on and prove that I am the controller of a multi-party bank account with my wife. And sometimes I want to log onto a health service and prove my health identity. So this is all about proving things about me in different contexts.

In the podcast, they beg the question “Why is the Digital Identity problem still any issue”?  This leads one to think about the scale and expectation so many have surrounding this idea of “DIgital Identity”!

They then go on to ask the question What is two-factor authentication and remind us that our phone is a two-factor device, exactly what the standards FIDO Alliance worked to develop.  They remind us of the reality that people look after their phones.  We know when our phone is not with us.

Why not simply bind my identity to my phone.

Mr. Wilson sees the phone as the second factor.  I would suggest our devices, bond to our identity, is the primary factor.

Mr. Wilson reminds us that Identity is all about Verifying Claims. We claim to be someone and the relying party seeks to confirm that I am who I claim to be.  Or, when I seek to log back into a website, the relying party needs to make sure it is I – the same person who the relying party originally proofed, registered and agreed on an identifier and an associated means of authentication.  

Attributes are more interesting than Identity

Attributes are what matters in the various relationships we have when we interact with another.  As we think about our data we need to think seriously about what other parties need to know about us and what we wish to share with them.  Efforts in Europe to institute GDPR and the efforts in California to implement CCPA

As I continued to read and follow the thread I ended up at a W3C working group working on “Verifiable Claims” and found the following:

Abstract

verifiable claim is a qualification, achievement, quality, or piece of information about an entity’s background such as a name, government ID, payment provider, home address, or university degree. Such a claim describes a quality or qualities, property or properties of an entity which establish its existence and uniqueness. The use cases outlined here are provided in order to make progress toward possible future standardization and interoperability of both low- and high-stakes claims with the goals of storing, transmitting, and receiving digitally verifiable proof of attributes such as qualifications and achievements. The use cases in this document focus on concrete scenarios that the technology defined by the group should address.

The truth is that Identity Providers, as imagined, can’t deliver. Identity is in the eye of the Relying Party. The state of being identified is determined by a Relying Party (RP) once it is satisfied that enough is known about a data subject to manage the risk of transacting with them.

We are expecting people to be better than smarter than the crooks.  This is an interesting thought that begs the question.

How do “we the people” trust anything we hear, read or otherwise come across.

How does each of us keep up with all of the various products, standards, specifications and other efforts to develop stuff capable of securing our “IDENTITY”?

I am a firm believer in the work the FIDO ALLIANCE and W3C’s work on Web Authentication and recommend its adoption and use based on authenticators capable of adhering to a level of security certification commensurate with the associated risk of the acts, transactions, information, and services offered by the relying party to the user.

Where are we

Today.

How many passwords are you trying to manage!  Does your LinkedIn contact list connecting you to more than  4,000 individuals?  Does Facebook, Instagram, and other social media websites inundating you with news and stories about your friends, colleagues and interesting people?

How many cookies have your computers accumulated?  How many databases have more information about you than they need?  If we search the dark web, how valuable is your data?

Cando seeks to help you manage your data, identity, assets, and relationships.

Philip lives on Sea Island with his 93-year-old father, the Doctor.  They pursue travel and Philip keeps his head into what is happening in financial services, blockchain, authentication, digital identity, and, whatever else people seeking to understand the transformation; particularly those in the identity and payments space.

What is happening means we can unlock our hotel rooms, cars, and homes from our phones. Our security system iwill be another app we have to find on our phone.

Instead, we need an intuitive assistant seeking to simplify our lives by taking on repetitive tasks like driving, working inside a data table or simply opening up the house for the season.

Normalizing data and performing the analysis capable of earning value is the name of the game.  Management is about stimulating a team to work in the mutual interest of the organization.  Executives define the strategy and articulate the vision in a manner conducive to success.

Cando seeks to help you manage your assets and relationships.  Assets those places and things you use doing your daily life and those interactions you have with people and entities seeking to serve, sell and partner with you.

Then there are friends who we expect to be part of our lives and therefore have privileges and access capabilities.

All of this with a target of selling integration services to the top million and simply assuring each person has an identity thus serving the bottom billion.  ultimately earning $1 per year per user to simply be there when it all breaks and you wish to restore your digital life.

At the core, your digital security will be based on the use of cryptography and sophisticated matching algorithms designed to assure anyone that you are that one individual in the populatations of the universe.

What You possess, What You Are, What You Claim … Your Certificates

NCCOE NIST Multi-Factor Authentication

What you Possess — The Thing

What you Are — You

Your Relationships

Responsibilities

Authority

Advice

— Secrets

My Certificates

 

 

 

 

 

 

 

 

Seven Words

World Wide Web Consortium

FIDO Alliance

Global Platform

The Trusted Computing Group

Future interests

  • Artificial Intelligence
  • Machine Learning
  • Nature Language Interface
  • Predictive Analytics

Another short description of Blockchain

WTF is The Blockchain? The ultimate 3500-word guide in plain English to understand Blockchain.

This technology called the Blockchain is built on the desire to create a new model to assure “trust”. 

To establish trust between ourselves, we depend on individual third-parties.

Could there be a system where we can still transfer money without needing the bank?

This statement begs the question, What is a Bank.  Is it simply an institution for recording the value we deposit with them and then allow us to move/transfer some portion of that value to another.  This then means the loans a bank makes, based on the sum of the deposits we trust them with, is not part of what a bank does.

If the only role of the intermediary is to maintain a ledger capable of recording and facilitating the transfer to electronic facsimiles of something, then, yes a distributed ledger removes the need for the middle man the trusted intermediary.  Instead of trusting a third party we agree to a methodology “The Distributed Ledger” to record these intangible assets or rights of ownership of a tangible asset in a manner where each of us has a copy of the ledger.  The beauty of this concept is for someone to attempt to change a record in the ledger, recording the disposition of a tangible or intangible asset; 51% of us would have to agree to that alteration.

In the above-linked article, all of what happens can be summaries with this quote

Earlier the third-party/middleman gave us the trust that whatever they have written in the register will never be altered. In a distributed and decentralized system like ours, this seal will provide the trust instead.