Chapter 06: Blockchain, Rebuilding The Internet & Web 3.0

This chapter is a technical walkthrough of just how the cryptographic network provided by a blockchain will revolutionize today's internet.

Vint Cerf is one of the original founders of the internet, and was half of the team that helped create the TCP/IP protocol, which the internet runs on today:

  1. IoT devices should be reliable, just as a light switch is reliable.  They should turn on when you tell them to turn on, and off when you tell them to turn off.
  2. IoT devices should be safe to use, and their integration should not make the device they are part of less safe.  This goes for locks on homes, self-driving cars, medical devices, and every other technology that cradles human life, safety, and well-being as we use it.
  3. IoT devices should be secure.  They should not be themselves vulnerable to attacks, and they should not be so insecure as to provide a backdoor or trojan horse into the ecosystem that you and I use to integrate them into our lives and networks  as consumers.
  4. IoT devices should preserve privacy.  They should not facilitate unwanted surveillance into our lives, and our trust should not be violated by devices.  
  5. IoT devices need to be interoperable.  An internet of things isn’t an internet of things if devices cannot interact with one another and with the broader network.  Needing a different app, controler, or interface for every device is a net negative for a network.
  6. IoT needs to be autonomous, not reliant on constant access to electricity and data connections.  

Blockchain will become a cornerstone for resolving the many paradoxes in these ideals, from security to interoperability to privacy, and it will provide a new backbone for the next era of IoT.

  • The insecurity baked into the core systems of today's internet.
    • TCP-IP
    • DNS Servers
    • SSL Certificates
    • MAC addresses
    • IP Addresses
    • Cookies
  • Blockchain's impacts and just how Web 3.0 will be different
    • Replacing two factor authentication (2fa) and passwords
    • Replacing centralized DNS servers and other attack vectors