SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Which is appropriate for your business need, and
why?
10XTS Website: https://10xts.com
XDEX Website: https://xdex.io
General Inquiries: info@10xts.com
PERMISSIONLESS VS. PERMISSIONED
Network Participation - Defined
Permissionless Blockchain
• Everyone with an account
(wallet) has read access
• Everyone has the same rights
for asset creation and
conducting transactions
• Assets are solely controlled
by the owning account
Permissioned Blockchain
• Read access is granted, in
part or in whole
• Asset creation and
transaction rights can be
restricted wholly or by classes
of assets and transactions
• Asset control can be
delegated to other accounts
Network Participation - Observations
Permissionless
• Benefits
• Easy to administer as everyone has same
capabilities
• Members feel as equal parts of the
community
• Issues
• Many Use Cases require different
permissions
• Sometimes actions must be imposed (I.e.
freezing an account by court order, etc.)
• Recommendation
• Use where you are trying to build community
and equal access and public reading is
essential, e.g. product reviews but...
• Have a governance mechanism in place to
manage violations of community policy and
law through voting (or use permissioned)
• Personally, I would avoid it
Permissioned
• Benefits
• Different permissions/roles applicable to
larger number of Use Cases
• Better able to manage data visibility and
security to meet laws, regulations, and
privacy concerns
• Issues
• Members may not feel wide-spread
ownership of network
• More complex system as permissions must
be considered an all aspects of solution
• Requires additional governance for pubic
blockchains to identify who can administer
• Recommendation
• Unless adopting a permission / role-based
solution is a major barrier to entry, use it
Permissionless Use Case: Product
Reviews
• Everyone can read the reviews of a product
• Everyone can register for an account to post a product review
• Everyone control’s their own reviews, including the right to edit
the review and delete it.
Permissioned Use Case: Rx Feedback
• Patients can read their own feedback on a prescribe
medication.
• The prescribing physician can read the feedback from their
patients.
• The pharmaceutical staff can read the feedback for their
medications.
• No one can edit or delete the feedback. Patients cannot change
their feedback but can amend.
• Physicians can add related medical notes. These notes are
visible to the patient and physician but only accessible by
pharmaceutical staff if both authorize it.
• Only prescribing physicians, patients on the prescription, and
Permissionless or Permissioned?
Blockchain Production - Defined
Permissionless Blockchain
• Anyone can add a node to
participate
• Nodes (generally) run on the
open Internet
• All code and configuration
required to run are available
publicly
Permissioned Blockchain
• Participating nodes must be
explicitly added to block
production
• Public networks such as Ethereum
and Bitshares may allow people to
add nodes but they act as read
only copies
• Nodes can be on publicly facing
servers or private networks
• Code and configuration
availability may be public or
private
Blockchain Production - Observations
Permissionless
• Benefits
• Trust engendered through decentralization
• Control of block production is diversified over
many providers
• Issues
• Slow performance due to need for
incentivized consensus such as proof of
work
• Decentralization is based on happenstance
and can be violated by anyone willing to spin
up enough nodes
• Recommendation
• Avoid using - lower transaction volumes,
environmental concerns, and vulnerable to
51% attack
• Also, harder to ensure layered security
architecture
Permissioned
• Benefits
• Trust through governance plus stake in
network success
• Can ensure diversification by how block
providers are selected and avoid
concentration
• Issues
• Greater network complexity as nodes
generally must be connected point to point
• Requires recruiting many providers willing to
incur upfront costs for decentralization
• Recommendation
• For consortiums, require each member to
run a node to share the load
• Establish templates for creating appropriate
security models and interconnection
Permissionless or Permissioned?
Public & Private Blockchain - Defined
Public Blockchain
• All data is readable with or
without an account (wallet)
• Anyone can run a distributed
ledger processing node on
the blockchain network
• Anyone can create an
account for access
Private Blockchain
• Data visibility is based on
access to the network, with or
without an account (wallet)
• Only authorized parties can
run a distributed ledger
processing node on the
blockchain network
• Account creation is based on
access to the network
Public & Private Blockchain -
Observations
Public
• Benefits
• Easy to administer as everyone has
same access
• Network has greater transparency
• Issues
• Easier to compromise as all serves are
Internet accessible
• Many laws regulations do not allow
certain types of data (PII, Health,
Financial) to be stored on Internet
accessible machines
• Recommendation
• Use when data security is not a primary
issue and members want a truly open
blockchain
• Personally, I would avoid it
Private
• Benefits
• Harder to attack because all nodes and
activity combine standard network
security with blockchain capabilities
• Easier to stop other types of fraudulent
activity
• Issues
• Greater expenses due to additional
computing resources required for
security
• More complex to operate
• Recommendation
• Use unless a a public network is a deal-
breaker or data security is not an issue
Public or Private?
Choosing Your Path
Public or Private?
Block Production:
Permissioned or
Permissionless?
Network Participants:
Permissioned or
Permissionless?
John Bentley, II
Founder & Chief Technology Officer
john@10xts.com
https://linkedin.com/in/johnbentleyii
Twitter: @johnbentleyii
• 10XTS Website: https://10xts.com
• General Inquiries: info@10xts.com
About

Weitere ähnliche Inhalte

Was ist angesagt?

Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain
101 Blockchains
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Kishor Datta Gupta
 
How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional? How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional?
101 Blockchains
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences
101 Blockchains
 

Was ist angesagt? (20)

Blockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A ReviewBlockchain Technology in Banking Services - A Review
Blockchain Technology in Banking Services - A Review
 
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
 
Blockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in LibrariesBlockchain Technology and Its Application in Libraries
Blockchain Technology and Its Application in Libraries
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
 
The Blockchain as a Software Connector
The Blockchain as a Software ConnectorThe Blockchain as a Software Connector
The Blockchain as a Software Connector
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...
BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...
 
Block chain A Paradigm Shift
Block chain A Paradigm ShiftBlock chain A Paradigm Shift
Block chain A Paradigm Shift
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work
 
Modex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in BankingModex Talks - Innovative Technologies in Banking
Modex Talks - Innovative Technologies in Banking
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
 
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeBlockchain for IoT Security and Privacy: The Case Study of a Smart Home
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
 
India Blockchain Strategy
India Blockchain StrategyIndia Blockchain Strategy
India Blockchain Strategy
 
How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional? How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional?
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
 
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam CecchettiDeja vu Security - Blockchain Security Summit - Adam Cecchetti
Deja vu Security - Blockchain Security Summit - Adam Cecchetti
 
Blockchain Challenge - Enrico Ferro - 14/11/18
Blockchain Challenge - Enrico Ferro - 14/11/18Blockchain Challenge - Enrico Ferro - 14/11/18
Blockchain Challenge - Enrico Ferro - 14/11/18
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A Review
 

Ähnlich wie Permissioned v. Permissionless Blockchain 10XTS

Ähnlich wie Permissioned v. Permissionless Blockchain 10XTS (20)

Types of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdfTypes of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdf
 
module-2.pptx
module-2.pptxmodule-2.pptx
module-2.pptx
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Blockchain types architecture
Blockchain types architectureBlockchain types architecture
Blockchain types architecture
 
Blockchain for Enterprises
Blockchain for EnterprisesBlockchain for Enterprises
Blockchain for Enterprises
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and Applications
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and ApplicationsBlockchain Technology: Adoption Challenges, Platform and Applications
Blockchain Technology: Adoption Challenges, Platform and Applications
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
 
Types of Blockchains
Types of BlockchainsTypes of Blockchains
Types of Blockchains
 
Advantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainAdvantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchain
 
blockchain technology -unit-3-notes.pdf for engineering students
blockchain technology -unit-3-notes.pdf for engineering studentsblockchain technology -unit-3-notes.pdf for engineering students
blockchain technology -unit-3-notes.pdf for engineering students
 
How to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfHow to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdf
 
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONSTOWARDS BLOCKCHAIN ENABLED APPLICATIONS
TOWARDS BLOCKCHAIN ENABLED APPLICATIONS
 
Blockchain in FinTech
Blockchain in FinTechBlockchain in FinTech
Blockchain in FinTech
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance Models
 
Agile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash AravindAgile Network India | Block Chain - New usecases | Abhilash Aravind
Agile Network India | Block Chain - New usecases | Abhilash Aravind
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Permissioned v. Permissionless Blockchain 10XTS

  • 1. Which is appropriate for your business need, and why? 10XTS Website: https://10xts.com XDEX Website: https://xdex.io General Inquiries: info@10xts.com PERMISSIONLESS VS. PERMISSIONED
  • 2.
  • 3.
  • 4. Network Participation - Defined Permissionless Blockchain • Everyone with an account (wallet) has read access • Everyone has the same rights for asset creation and conducting transactions • Assets are solely controlled by the owning account Permissioned Blockchain • Read access is granted, in part or in whole • Asset creation and transaction rights can be restricted wholly or by classes of assets and transactions • Asset control can be delegated to other accounts
  • 5. Network Participation - Observations Permissionless • Benefits • Easy to administer as everyone has same capabilities • Members feel as equal parts of the community • Issues • Many Use Cases require different permissions • Sometimes actions must be imposed (I.e. freezing an account by court order, etc.) • Recommendation • Use where you are trying to build community and equal access and public reading is essential, e.g. product reviews but... • Have a governance mechanism in place to manage violations of community policy and law through voting (or use permissioned) • Personally, I would avoid it Permissioned • Benefits • Different permissions/roles applicable to larger number of Use Cases • Better able to manage data visibility and security to meet laws, regulations, and privacy concerns • Issues • Members may not feel wide-spread ownership of network • More complex system as permissions must be considered an all aspects of solution • Requires additional governance for pubic blockchains to identify who can administer • Recommendation • Unless adopting a permission / role-based solution is a major barrier to entry, use it
  • 6. Permissionless Use Case: Product Reviews • Everyone can read the reviews of a product • Everyone can register for an account to post a product review • Everyone control’s their own reviews, including the right to edit the review and delete it.
  • 7. Permissioned Use Case: Rx Feedback • Patients can read their own feedback on a prescribe medication. • The prescribing physician can read the feedback from their patients. • The pharmaceutical staff can read the feedback for their medications. • No one can edit or delete the feedback. Patients cannot change their feedback but can amend. • Physicians can add related medical notes. These notes are visible to the patient and physician but only accessible by pharmaceutical staff if both authorize it. • Only prescribing physicians, patients on the prescription, and
  • 9.
  • 10. Blockchain Production - Defined Permissionless Blockchain • Anyone can add a node to participate • Nodes (generally) run on the open Internet • All code and configuration required to run are available publicly Permissioned Blockchain • Participating nodes must be explicitly added to block production • Public networks such as Ethereum and Bitshares may allow people to add nodes but they act as read only copies • Nodes can be on publicly facing servers or private networks • Code and configuration availability may be public or private
  • 11. Blockchain Production - Observations Permissionless • Benefits • Trust engendered through decentralization • Control of block production is diversified over many providers • Issues • Slow performance due to need for incentivized consensus such as proof of work • Decentralization is based on happenstance and can be violated by anyone willing to spin up enough nodes • Recommendation • Avoid using - lower transaction volumes, environmental concerns, and vulnerable to 51% attack • Also, harder to ensure layered security architecture Permissioned • Benefits • Trust through governance plus stake in network success • Can ensure diversification by how block providers are selected and avoid concentration • Issues • Greater network complexity as nodes generally must be connected point to point • Requires recruiting many providers willing to incur upfront costs for decentralization • Recommendation • For consortiums, require each member to run a node to share the load • Establish templates for creating appropriate security models and interconnection
  • 13.
  • 14. Public & Private Blockchain - Defined Public Blockchain • All data is readable with or without an account (wallet) • Anyone can run a distributed ledger processing node on the blockchain network • Anyone can create an account for access Private Blockchain • Data visibility is based on access to the network, with or without an account (wallet) • Only authorized parties can run a distributed ledger processing node on the blockchain network • Account creation is based on access to the network
  • 15. Public & Private Blockchain - Observations Public • Benefits • Easy to administer as everyone has same access • Network has greater transparency • Issues • Easier to compromise as all serves are Internet accessible • Many laws regulations do not allow certain types of data (PII, Health, Financial) to be stored on Internet accessible machines • Recommendation • Use when data security is not a primary issue and members want a truly open blockchain • Personally, I would avoid it Private • Benefits • Harder to attack because all nodes and activity combine standard network security with blockchain capabilities • Easier to stop other types of fraudulent activity • Issues • Greater expenses due to additional computing resources required for security • More complex to operate • Recommendation • Use unless a a public network is a deal- breaker or data security is not an issue
  • 17. Choosing Your Path Public or Private? Block Production: Permissioned or Permissionless? Network Participants: Permissioned or Permissionless?
  • 18. John Bentley, II Founder & Chief Technology Officer john@10xts.com https://linkedin.com/in/johnbentleyii Twitter: @johnbentleyii • 10XTS Website: https://10xts.com • General Inquiries: info@10xts.com About

Hinweis der Redaktion

  1. According to Gartner, Blockchain is moving from “Peak of Inflated Expectations” into the “Trough of Disillusionment” in their Garter Hype Cycle for 2018 - https://www.ledgerinsights.com/gartner-blockchain-hype-cycle/. This has emboldened critics, yielding posts such as this…
  2. We live in a world of open spaces and secured locations, where we wait with everyone in a lobby but got to an exam room by ourselves, with an open store front but back office for managing inventory and operations. In other words, we live in a world where things require no explicit permission to access while others have different levels of restrictions. Blockchain was largely introduced as a very open technology and network for interaction. The software for running the blockchain network was open source, and free to download. Anyone who wanted to make the investment in computing time and network access was welcome to join the blockchain network and participate in producing and validating blocks, earning micropayments in the process. Also, anyone who wanted to download a wallet and generate a login was welcome to join begin transacting with other blockchain holders, no permission or even identification was required. And all transactions where open for the world to see, obfuscated by the use of complicated identities. And just as in our current world, there is room for completely open blockchain networks. However, some situations require more restriction on who is allowed to do what. For example, some transactions are restricted by laws and regulations while other information, such as medical data, goes even further with an innate need for privacy. To support this, a new generation of blockchain technology was introduced, introducing the age-old concept of permissions. These new blockchains were dubbed “permissioned” with the original, open networks such as Bitcoin being labeled “permissionless” in contrast.
  3. While blockchains are often wholly identified as permissionless (Bitcoin) or permissioned (Hyperledger), there are actually two facets to Blockchain permissions. One facet of Blockchain permissions are based on what people can do on the Blockchain. For example, in a public park you don’t have to have a ticket to get into the park. Access to the park is permissionless as is all of the play equipment. In contrast, an amusement park may have a variety of permissions required based on tickets, size and health restrictions. Moreover, people have permissions based on roles. In a playground, anyone can ride or operate the playground equipment. In an amusement park, only employees can operate amusements and even within the employees there may be different permissions.
  4. How can blockchain improve product reviews? (1) Verified identity for “wallets”. (2) Products transferred as purchased to wallet via n oracle function.
  5. Note that US medical regulations require any comments about adverse reactions with drugs be reported to the manufacturer. Therefore, being able to provide information to pharmaceutical companies is required for compliance.
  6. Group Participation Key Questions - Are there multiple roles to be played as part of the solution? Do different people have different access rights? Is there a need for audit level access that provides a view of all data for security or compliance reasons? Are there one way transactions? e.g Transactions that one party can initiate and a second party cannot refuse?
  7. The other facet of Blockchain permissions is block production. Think of a swap meet versus a shopping mall. At a swap meet, anyone can join the marketplace as a seller and the people involved can change day to day, week to week. In a shopping mall, a store must be leased and malls and shopping centers can be very particular about which businesses occupy their shopping centers.
  8. Group Participation Key Questions - Are there data security concerns about who has copies of data? Can you maintain a large enough network?
  9. The other aspect of Blockchain is Public vs Private Blockchain. This is another tool for managing the blockchain a network and can change the nature of things quickly. For example, if you take a permissionless blockchain but run it on a closed network, a new node for block production can be added if someone has access to the network. So, accessibility can be used to change the nature of a blockchain.
  10. Discuss laws and regulations around data and attack vectors
  11. Group Participation Key Questions - Are there data security concerns about who has copies of data for block production? Can anyone join as a participant?
  12. Can the data be stored on Internet facing machines? Do you care where the data is stored – legal jurisdiction and confidence in block production node operator? What roles / permission sets are required to enable the network? What are the different valid scopes of data visibility?