The presentation examines current inefficiencies in educational systems, and how new technologies, in particular blockchain might be used to address some of these issues.
9. A CENTRALISED LEDGER OPERATOR COULD
•the rules for recognition of credentialsChange
•access to the database to institutions or individualsRestrict
•parts of the databaseDelete
•the database in an unauthorised mannerMisuse
•credentials by changing database entriesRevalue
10. BLOCKCHAIN SOLVES THESE PROBLEMS
BY REMOVING THE INTERMEDIARY
Each user (node) stores a
complete
copy of the database
Each user (node) has to
approve each entry
The version with the most
copies is the ‘true’ version
23. AUTOMATICALLY
VERIFIABLE SECURE
CREDENTIALS
Any institution can issue a
digital credential (in any
format) to a learner and
register the hash of that
credential on a blockchain
The learner can hold the
credential themselves on their
own device or in an online
wallet
Any person wishing to check
the authenticity can simply
compare the hash of the
document against the entry
on the chain.
31. IN A SMART-CONTRACT
Contracts may require votes to take effect –
voting is technologically incorruptible
Voting is linked to an action – not a
proposal for an action
Once a contract gets the required votes it
automatically executes
Contracts can be changed, but only in
relation to the votes received
Everyone has full visibility into each step
36. IN THE LONG-TERM, BLOCKCHAIN
HAS THE POTENTIAL TO DISRUPT THE
GOVERNANCE AND EXECUTION OF
EVERY SINGLE PROCESS CONTROLLED
BY A DATABASE
37. OPEN VS CLOSED BLOCKCHAINS
Open Chains
• decentralized governance
• data portability
• independent verification
• direct access to wallets
• open standards
Closed Chains
• centralised governance
• data silos
• Verification through intermediaries
• Mediated access to wallets
• Proprietary closed standards