Chapter 06: Blockchain, Rebuilding The Internet & Web 3.0
This chapter is a technical walkthrough of just how the cryptographic network provided by a blockchain will revolutionize today's internet.
Vint Cerf is one of the original founders of the internet, and was half of the team that helped create the TCP/IP protocol, which the internet runs on today:
- IoT devices should be reliable, just as a light switch is reliable. They should turn on when you tell them to turn on, and off when you tell them to turn off.
- IoT devices should be safe to use, and their integration should not make the device they are part of less safe. This goes for locks on homes, self-driving cars, medical devices, and every other technology that cradles human life, safety, and well-being as we use it.
- IoT devices should be secure. They should not be themselves vulnerable to attacks, and they should not be so insecure as to provide a backdoor or trojan horse into the ecosystem that you and I use to integrate them into our lives and networks as consumers.
- IoT devices should preserve privacy. They should not facilitate unwanted surveillance into our lives, and our trust should not be violated by devices.
- IoT devices need to be interoperable. An internet of things isn’t an internet of things if devices cannot interact with one another and with the broader network. Needing a different app, controler, or interface for every device is a net negative for a network.
- IoT needs to be autonomous, not reliant on constant access to electricity and data connections.
Blockchain will become a cornerstone for resolving the many paradoxes in these ideals, from security to interoperability to privacy, and it will provide a new backbone for the next era of IoT.
- The insecurity baked into the core systems of today's internet.
- DNS Servers
- SSL Certificates
- MAC addresses
- IP Addresses
- Blockchain's impacts and just how Web 3.0 will be different
- Replacing two factor authentication (2fa) and passwords
- Replacing centralized DNS servers and other attack vectors