3. 9.30 Welcome on behalf of all challenge-owners (KVK)
9.45 The Odyssey Hackathon – What can you achieve by
participating? (Rutger van Zuidam – CEO of DutchChain &
Odyssey)
10.00 Developments in Blockchain, exchanging privacy-
sensitive information and the future of a national digital
infrastructure (Zeki Erkin, Assistant Professor in Cyber
Security and Privacy at Delft University of Technology)
10.30 Challenge 1 by the Dutch Ministry of Justice and
Security – Presentation and Q&A: a Government Backed
Protocol for Digital Permissions (Flores Bakker – Enterprise
Architect for the Ministry of Finance)
Program Overview
4. 11.15 Extra support of IOTA for Challenge 1 (Dave de Fijter,
IOTA Foundation)
11.30 Coffee Break and Early Lunch
12.00 Challenge 2 by Dutch Chamber of Commerce –
Becoming an oracle in the Digital Infrastructure of a Nation
(Geerten Verweij, developer of the Dutch Chamber of
Commerce’s Innovation Lab)
12.40 Challenge 3 by Kadaster – Building a Distributed Data
Ecosystem (Nick Apeldoorn, ICT Architect at Kadaster)
13.30 End of plenary program – Ample time to Connect
7. Rutger Van Zuidam
CEO of DutchChain & Odyssey
THE ODYSSEY HACKATHON
What can you achieve by
participating?
8.
9.
10.
11.
12. We believe….
technology like blockchain, crypto currencies, AI, IOT,
open digital public infrastructure and the digital commons can
unlock completely new ways of interconnected mass
collaboration
to establish the breakthrough progress we need in all fields of
our society and all sectors of our economy.
22. Zeki Erkin
Delft University of Technology
Developments in Blockchain
Exchanging privacy-sensitive information and the
future of a national digital infrastructure
23.
24. Flores Bakker
Enterprise Architect for the
Ministry of Finance
Challenge 1 by the Dutch Ministry of
Justice and Security
Presentation and Q&A: A Government
Backed Protocol for Digital Permissions
25. Challenge:
Protocol for
approval
management
How to register and
communicate digital
permissions on a global scale
Flores Bakker
Enterprise Architect Ministry of Finance in cooperation
with the Ministry of Justice and Security
27. Approval and consent
› We approve and consent every
day in some form or way;
› We approve an action to be taken
or we consent with the status of
an entity (thing, process);
› We approve as business co-
worker, civil servant, civilian or
other;
› We approve and consent
increasingly through digital
means;
27
29. Cookie requests
29
› More and more companies are
tracking individual persons
› More and more information is
being sold to third parties
› Approval is asked...
› ...but where is my ‘red button’
in case I want to retract my
given approval?
› Do I really know and control
which parties are using my
personal information and in what
way?
? ?
30. More examples
› Consent requests for the use of your
personal or your company’s
information by other parties
› Approval requests for copyright
licenses
› Approval requests for budgetting and
purchasing within an organisation
› Consent requests for the accurate
representation of a witness account
› Consent requests with the status of an
item of property or work (inspection)
› ...and many more
30
31. Why do we approve?
› We approve and consent because we
have the legal power to do so;
› We approve and consent because
there are legal consequences in
some form or way for us or the
organisations on behalf of whom we
are approving or consenting;
31
32. The power to consent
› The power to consent is actually
the power to change a legal
relationship
› Based upon the framework of
fundamental legal concepts by
Hohfeld (1918)
› Approving or consenting leads to
a change in the legal position
of a stakeholder, resulting in
more or less rights and duties
for the stakeholder in question.
32
33. Theory: rational decision making
› Approving is a form of decision making;
› Decision Making Theory identifies seven
phases in the rational decision making
model;
› Now we can define what is true informed
consent:
– Clear context
– Clear consequences
– Clear risks
› Approving needs trust in the accuracy,
completeness and up-to-date presentation
of this information position. 33
34. Reality: intuitive decision making
› In reality we are not always that
rational;
› Intuitive decision making is often
the way decisions are made in real
life, based on cues, patterns and
action scripts;
› Intuitive decision making needs
trust in the strength of those cues,
patterns and action scripts;
› Intuitive decision making should not
be denied as it is human to do so.
The solution lies in combining it with
rational decision making. 34
35. Trust is an important aspect of consent
› Trust is built upon:
– Fully Informed Consent
– Non-repudiation (authenticity, integrity)
– Uniformity
– Compliancy
– Agility
– Adequate infrastructure
– Resiliency
– Strong cues, patterns, action scripts
– User friendliness
35
36. The challenge
› Develop an open source, decentralized
and government backed protocol for
registering and communicating digital
permissions;
› Re-usable for any type of stakeholder,
approval process and application;
› High trust;
› For civilian, governmental and
commercial use.
36
37. Properties of the solution
› Supports non-repudiation (authenticity and
integrity) and other trust aspects;
› Supports fully informed consent (context,
consequences and risks) but also strong cues and
patterns;
› Registers exact information position upon which
a stakeholder will give his response;
› Uniform protocol across the globe;
› Evolvability – future changes to the protocol
(new laws, new processses, etcetera) should be
implemented easy and without the possibility of
corrupting older approval transactions;
› Open Source.
37
38. Innovation – think outside the box
› Standardised contract terms across the globe?
› Contract terms satisfaction/reputation score?
› Anonymous statistics in how other users have
responded in similar cases?
› What is the role of incentives and tokenization? I.e.
artificial intelligence or third party experts explaining me
the contract terms, risks and consequences of approval in
layman’s terms?
› What is the role of gamification?
› Self-sovereign: my wallet of consent?
› Taxonomy for approval contracts? The use of Linked
data?
› Paving the way for automated decision making?
› Dare to experiment!
38
39. DigiAkkoord – approval application
39
Innovation project
“DigiAkkoord” at department
of Justice and Security,
release somewhere in 2019;
Focuses on a re-usable
application for all approval
processes within the
government;
DigiAkkoord is not really a
protocol but a business
building block;
Challenge has more global
perspective and more
emphasis on protocol
development compared to
DigiAkkoord;
49. Donations of
$100M+ to date
Hubs in Berlin, Tel Aviv,
Oslo, Taipei
More than 80 employees
around the globe
Ecosystem of more
than 100 entities
> 70k active
community members
> 120k content followers
Ecosystem Development Fund
$13M+ in funding
nearly $100k awarded to date
A global Foundation, based in Berlin
51. Why IOTA?
- Scalable
- No fees, no hassle
- Data transactions supported
- Lightweight
- Open source and permissionless
- Quantum immune, ready for the future
52. IOTA Networks
Due to the nature of IOTA, you are able to send
transactions on the Mainnet without fees. This lets
you publish transactions with data directly on the
Mainnet for no cost.
However, it is best to use the Devnet to build Proof
of Concept applications. This network is run by the
IOTA Foundation for developer to use and test on as
they please. We also have a Faucet which dispenses
tokens for use on the Devnet.
We also have a Spamnet for testing the protocols
resilience to high TPS.
The configuration of the `Devnet`
54. Masked Authenticated
Messaging (MAM)
● Secure message streams over the tangle
● Feeless messages
● Currently Javascript/Typescript only
● New C-based implementation in the works
● Both public and private messages possible
#mam
55. ??? ???????? ????
????
????????????
2nd Layer libraries like MAM do not require protocol
changes or hardforks, they can be built and
supported by anyone to ensure that IOTA fits their
needs.
????????
? ???
57. Relevant projects done with IOTA
● TangleID project (https://tangleid.github.io)
● Digital identity Proof of concept by VX Company
#development
58. What will the IOTA Foundation provide
We will be there with 2 coaches (Jedi’s) to support
teams working with IOTA
Content packages and support for teams will be
available before and during the hackathon
We will publicly communicate about the event and
the participating projects before, during and after
the hackathon
#odyssey-hackathon on Discord
#odyssey-hackathon
65. Geerten Verweij
Dutch Chamber of Commerce’s Innovation
Lab
Challenge 2 by Dutch Chamber of
Commerce
Becoming an oracle in the Digital
Infrastructure of a Nation
67. What is the Dutch Chamber
of Commerce all about?
68. Our Mission
• Making live easier for
entrepreneurs
• Provide useful information
• Provide useful data
69. Our Actions
• Registering businesses in the
trade register
• Providing information from the
trade register
• Being a guide and advisor for
entrepreneurs
70. Trade Register
• Registering your business
Become legit
• Look up other businesses
See if they are legit
• Create trust and certainty
We are both legit, let’s do business!
71. Our crown jewel
• A piece of paper, possibly in PDF
• Used a lot by all entrepreneurs
and businesses in the Netherlands
• Might not be high-tech
by today’s standards
79. Digital Identity
• Protect your personal identity by using
your business identity through the KVK
• The KVK is the Oracle for business
entities
• Next step: integrating these concepts
into the Digital Nations Infrastructure..
Trusted Digital
Business Identity
80. Digital Identity
How do we challenge you?
Build innovative solutions that help
entrepreneurs be in control of their identity.
Or even better: help entrepreneurs succeed
in conducting business using their online
identity using these experimental new
features.
81. For example: Flash Company
• Smart contract
• One-off collaboration
• Backed by KVK verified
business identity
83. Datamining and AI
• KVK has plenty of data
• What can we learn from this data?
84. Datamining and AI
Existing experiments at the KVK:
• Success Prediction
• Fraud Detection
What else is possible?
• Anomaly detection?
• Clustering?
• Surprise us!
93. Kadaster
Providing legal certainty about ownership and transactions of real estate.
Managing nationwide geographic datasets and acting as consultant.
99. Building wallet
Digitization of the built environment.
Making all information on real objects readily available for authorized persons and
machines.
Distributed data ecosystem: distributed ledger as backbone.
Validating information and the parties adding and accessing the data.
Ensuring privacy.
Solution at the protocol level.
100. Research questions
How to include existing standards, e.g. BIM?
How to tie existing solutions / applications and data sources into the ecosystem?
How to manage access to (private or commercially sensitive) data in this distributed
environment?
How to engage data owners to contribute data to the building wallet?
How to govern this public-private infrastructure in an effective and responsible way?
101. Toolkit
Open geographic datasets.
A transaction and ownership database for real estate.
The Proof of Concept built last year.
A relevant network: Kadaster, Dutch Ministery of the Interior, building companies.
102. Contact
Nick van Apeldoorn – ICT Architect
Kadaster – Emerging Technology Center
Nick.vanApeldoorn@kadaster.nl
+316 52 48 19 06
103. End of Plenary Program - Time to Connect
REGISTER TODAY AT THE ODYSSEY STAND!