We use the blockchain to combat corruption and cyberbulling
A question that I can't stop asking myself - what is the practical use of blockchain technologies here and now? What needs technology can close at the current stage of development? In search of an answer over the past year, I took part in a dozen hakatons, experimenting with technology, developing one concept after another. On hakatone Binary District which took place after the Blockchain Developer course, our team (me and Denis Moskovchenko 3r3-36. Di0niz
) was required to create a file-stamping system similar to r3r38. OpenTimestamps
As a result, a concept was born that solved the task using a combination of blockchain technology and IPFS. A year later, this concept grew into service Chainify , allowing you to easily save data in the blockchain and conveniently work with them. In this article I will tell you how the service works and what problems it can solve.
ipfs.io developed an open source client that allows anyone who wants to become a member of the network and run their node. An IPFS client gives access to all files that have ever been uploaded to the network. The file address is its hash, which the client returns when the file is successfully downloaded. The hash is formed based on the contents of the file by crushing it into small pieces and composing the Merkle tree from the hashes of these pieces. What does it mean? Having downloaded the novel "War and Peace", we get a certain hash. Having downloaded it again, we will get the same hash, because the contents of the file has not changed.
This is the essence of the IPFS network design, because what's the point of burning traffic and space on the media, duplicating files already uploaded to the network. But if in the novel we add, for example, a comma that did not exist before, the file will be loaded and the output hash will be fundamentally different. A similar rule applies to images with a modified pixel, and audio /video with the cut fragment.
So, IPFS protocol allows us to upload a file to the network and have access to it from any node. However, at the same time, the protocol does not imply the deletion of previously downloaded files, although technically it is possible.
3r3202. Why do we need the blockchain
IPFS provides information only about the presence of the file and its contents, but it does not answer the question by whom and when was this file downloaded. But the blockchain can provide answers to these questions.
Chainify uses the blockchain platform solution from r3r369. Waves Platform
because of the speed of work and the fixed cost of the transaction. The transaction structure of this blockchain implies the presence of a 3r375 field. attachment [/i] which allows you to attach additional information to the transaction in text form (encoded in base58). More information about the device transactions can be read here 3r33230. . In turn, the Timestamp field shows when the transaction was committed. Thus, by writing a hash of an IPFS file to the transaction body (3r3753. Attachment [/i] ), We can prove the presence of a file on a certain date and its immutability since then.
Offtop [/b] 3r3384.
The first transaction network Bitcoin contains the headline of the newspaper The Times of January ? 2009 Chancellor on brink of second bailout for banks. This proves that the transaction was made not earlier than the specified date.
The Chainify architecture involves sending a transaction to yourself, saving it in the blockchain and signing the transaction on the client side. It should be noted that in the blockchain, it is possible to commit transactions 3r3-395. only [/b] in the presence of a private key. Read more about this here is or here is . Thus, the key holder can cryptographically prove that this transaction was sent to them.
It follows that the fact of a transaction (with an attached file hash) cryptographically proves the presence of the file at the time of the transaction by the holder of the private key. Of course, this does not give ownership of the IPFS file downloaded to the network. It also does not guarantee that the file on the IPFS network was not loaded before the application of the hash to the transaction.
The combination of blockchain and IPFS allows you to prove: 3r33232.
3r3119. availability of a file on a specific date;
3r3119. file persistence since;
3r3119. the file belongs to the holder of the private key.
In the near future, the source code of Chainify will be laid out in open access.
3r3202. Practical application 3r3203.
3r3194. Media openness 3r3195.
I do not presume to calculate how many posts are placed on social networks by the mass media, but I assume that they create a fair share of traffic in user feeds. It is known that a posted post can be edited or deleted. This problem is especially acute in the era of information wars: the parties accuse each other of falsifying data and using dubious sources. It is also relevant for election campaigns - candidates' statements can also be edited.
Creating a clone of a post in the blockchain is a robust proof of the time of publication and unchanged material. The link to the cryptoclone of the post can be attached to the publication or sent as an attachment to the letter.
3r3194. Fighting Corruption in the Judicial System 3r3195.
Unfortunately, the fact that there is a corruption component in judicial systems is not denied in any world jurisdiction. This problem manifests itself in the possibility of manipulating the materials of the case. Sometimes, in favor of one of the parties, the materials of the case are not accepted for consideration, are being edited or are completely lost. This also applies to cases in which an indictment has already been issued. If, after a sentence — for example, a year later — an appeal is filed, the destruction of case materials leads to a lack of evidence, and prisoners are released due to the unprovability of the charge.
Writing case files to the blockchain database by lawyers, as well as structuring materials in a manner that is understandable to all, allows you to safely store and study case materials. Also, anyone (for example, a law student or a representative of a human rights organization) can independently study the case materials and evaluate the legality of judicial decisions.
3r3194. Fighting cyberbullying
Some time ago I took part in a charity hackathon organized by Mail.Ru. His subject was to solve the problem of violence in the adolescent environment, whether it be domestic violence, manifestation of aggression in the network (cyber-bullying, trolling, etc.) or in an educational institution. I came up with my own vision of solving the problem, and after the hackathon, representatives of the charity foundation “3r316167.” Your territory
". They told about their 3r3r169. problem
3r33175. “Until recently, among other things, the foundation provided psychological support to children through ask.fm. The channel was successful and collected a significant proportion of hits. However, later it turned out that through appeals and links to the profiles of children in social networks, they could be tracked down. Turning to the service of psychological assistance, they are at least in a precarious psychological state, and they can be manipulated. ” 3r3176.
Having found out, the fund refused to support the channel on ask.fm. And having seen the possibility of anonymization of appeals, they became interested in technology. Indeed, in the blockchain, you can store the text in a pure form - this means that it can be used as a means of communication. So the safety of adolescents can be ensured by the blockchain architecture.
Each message is actually a file saved to the IPFS network. It also has a passport, a link to which can be attached to an official letter.
At the same time, with the help of the blockchain, the fund can solve another problem - proof of the fact and the number of appeals to the fund, which is very important for investors and patrons of arts who support charitable organizations.
3r3194. Fixing arrangements
Communication service can also be used for fixing agreements when concluding contracts or for public appeals to state structures. In this case, the publicity of communication allows you to track the fact and the essence of the appeal to government agencies, the speed of processing the request, the nature of the response.
Some time ago in 3r3r6206. Article 3r33232. Simon Wardley I saw this schedule.
The graph shows the stages of technology development in the context of its adaptation in society. For example, consider electricity. Electricity as a technology is accepted as a certain standard to which the industry must conform. We do not have personal power stations in the apartments - we just plug the plug into the outlet. Imagine that selling electricity as a technology would tell you about the speed of transmission of electrons over a network. Would you buy it?
The success of the blockchain is not in transaction speed and not in turing completeness. Humanity has finally got a source of truth on which one can rely - and do what was previously impossible.
Blockchain is an outstanding technology capable of fundamentally changing the principle of communication and interaction. A simple example: when deciding whether to invest or cooperate, you will not have to rely on business statements about revenue growth and the number of investors. It is enough to read this in the transaction history.
In January, the new course flow will begin Blockchain Developer from which I started my way in blockchain development. If you are already an experienced developer and just want to test your strength, come to Hackathon Waves which will be held in Moscow on December 14–16.
It may be interesting
Situs QQ Online
Situs QQ Online