Article: Inflationary cryptocurrency and domain based identity: A recipe for a decentralized social network

Crypto, Decentralized Internet

Inflationary cryptocurrency and domain based identity: A recipe for a decentralized social network

If these measures are implemented then we will have created an ecosystem where everyone has an equal opportunity to participate in the network and earn real money for the content that they create. Using domain names to prove decentralized identity for the social network encourages everyone to own a domain name. This is well aligned with the original vision of the decentralized internet where every user is in control of their own identity and data. It could encourage more platforms to embrace domain identity as a standard authentication method and make your personal domain and website to become your user profile page of a global decentralized social network.

Read full article

Article: How Blockchain Can Help Upgrade KYC Processes

Blockchain, Decentralized Internet

How Blockchain Can Help Upgrade KYC Processes

The existing KYC processes are defunct and a natural progression is occurring, whereby data intelligence and blockchain technology are coming forward as alternatives. The benefits are undeniable and companies must look towards blockchain for the effective outsourcing and decentralizing of personal data. The use of trustless mechanisms to reduce the resource heavy identity verification processes that are required of traditional financial institutions will reflect how the gap between DeFi and TradFi can be bridged in a way that is mutually beneficial for both.

Read full article

Article: What if we Gave Users Control of Their Own Digital Identity?

Decentralized Internet, Web 3.0

What if we Gave Users Control of Their Own Digital

This is sometimes called decentralized or self-sovereign identity and it represents a radical shift in the power dynamic between service providers, identity providers and users.

It’s not just a pipe dream either – but a rising current in the sector. In early 2020, Gartner proposed that “decentralized identity and the renewed interest in protecting privacy and data ownership will be transformational. There is a reasonable indication that the winners in the next decade will be those that figure out the new formulas for adopting a decentralized identity.”

Decentralized identity could put users in control of their own identity. It reduces their level of risk when the next mega breach hits, releases businesses from the burden of storing personal information and as a result, improves compliance with privacy regulations.

Read full article

Article: The Dawn Of Data Ecosystems

Blockchain, Data, Decentralized Internet

The Dawn Of Data Ecosystems

Data ecosystems are interconnected, seamless networks that represent the next phase of data management. They allow companies with common interests to securely and dynamically collaborate around information. For example, a bank could be able to access and confirm the employment details of someone applying for a mortgage without needing to call their employer or see private details beyond what’s absolutely necessary.

The rise of blockchain-secured data ecosystems can eliminate these costs by building trust and integrity directly into the system. Due to the immutable nature of the blockchain ledger, companies can easily prove that they were in compliance at all times. This will save enormous amounts of time and money by essentially automating governance and compliance needs.

Read full article

Article: 5 ways to protect your documents with open source software

Open Source, Software

5 ways to protect your documents with open source software

Users have every right to be concerned about the safety and security of their data. When you create data on a computer, it’s reasonable to want exclusive control over it.

There are many ways to protect your documents. At the filesystem level, you can encrypt your hard drive or just a file. A good office suite affords you many more options, though, and I’ve gathered five of the methods I use to secure my documents with open source software.

  • Keeping documents in secure cloud storage services
  • Enabling encryption at rest, in transit, and end-to-end
  • Using digital signatures
  • Watermarking
  • Protecting documents with passwords

Read full article

Article: Blockchain in digital marketing: More consumer trust – and new ways of advertising

Blockchain, Innovation

Blockchain in digital marketing: More consumer trust – and new ways of advertising

Digital marketing is facing concerns relating to online activities, be it cyber security, data protection or transparency. Blockchain can help to consolidate customer trust in the digital world. It can give more online ad authenticity, brand transparency, support cross-promotion with influencers and reward customers for data sharing.

Platform businesses like Facebook pose challenges to many market players in digital marketing as they hold monopoly or duopoly. Furthermore, data scandals caused skepticism about the digital advertising scene. Both users and advertisers feel that control over their data is slipping out of their grasp. Blockchain provides marketing organisations with new options to operate more autonomously in the advertising market, and to increase the authenticity of their product and corporate communications.

Read full article

Article: Interview: Web inventor Tim Berners-Lee thinks his creation is out of control. Here’s his plan to save it

Data, Decentralized Internet, Software

Interview: Web inventor Tim Berners-Lee thinks his creation is out of control. Here’s his plan to save it

Berners-Lee himself is trying to turn our online world upside-down (or, as he says, “the right way up”). His idea: Solid, a new system aiming to drastically decentralise the web. At its core, it’s a platform allowing you to store your private information in Personal Online Data Stores (PODS) which you have full power and sight over.

While most sites and apps currently take your data and move it into a ‘silo’ out of your reach, Solid’s vision is for these services to ask permission to use specific information from your PODS – permission that, crucially, you can remove at any time. In short: it’ll be you who holds full control over your data, not Big Tech. While currently in its experimental stage, the platform is already trialling its system with the likes of the NHS, the BBC, NatWest and even the Belgian government.

Read full article

Article: How MPC can solve blockchain’s data privacy conundrum


How MPC can solve blockchain’s data privacy conundrum

There has been much excitement about blockchain’s potential to replace less secure forms of digital identification and digital collaboration like passwords and emails. In theory, blockchains are able to store personal information in a safe and secure manner due to their immutable ledger format. However, this format also plays a part in limiting privacy for users because it means that information that exists on the ledger can never be removed. This may pose a risk for people who have originally agreed to provide certain information but then wish to remove it from public records, something that becomes especially poignant when you consider that international regulations such as Europe’s GDPR (General Data Protection Regulation) require “the right to erasure” of personal data.

Read full article

Article: Can We Rid the Open Web of Its “Gatekeepers”?

Decentralized Internet

Can We Rid the Open Web of Its “Gatekeepers”? - CPO MagazineCan We Rid the Open Web of Its “Gatekeepers”?

The notion of an “open web” is one that is defined by and for all of its users — not by governments or institutions, nor by private companies and select individuals. While the novel services that we rely on today have played a significant role in boosting digitalization and interconnectedness, they’ve also benefited an exclusive few. Today’s existing data sharing systems for the purposes of consumer targeting are ultimately determined by closed, centralized ecosystems — each offering limited visibility and inefficiencies due to the pipeline of intermediaries involved. With advertising largely funding the many platforms, services, and infrastructures that we rely on today, what’s needed is a neutral, decentralized infrastructure that can ensure the same levels of personalization and compliance that we see in a “walled” environment.

Read full article

Article: Privacy activist takes on Google over Android tracker

Cyber-Security, Software

Privacy activist takes on Google over Android tracker

A pressure group set up by Austrian privacy activist and lawyer Max Schrems has launched a new campaign in France, this time complaining that Google’s Android advertising tool violates European Union rules by failing to get users’ consent.

noyb (none of your business), established by Schrems to take on the Internet giants and others over perceived privacy violations in Europe, said it launched action against the Android Advertising Identifier (AAID) claiming that the “somewhat hidden ID” allows Google and all apps on the phone to track a user and combine information about online and mobile behavior.

“While these trackers clearly require the users’ consent (as known from ‘cookie banners’), Google neglects this legal requirement,” said noyb.

Read full article