blockchain for good lapointe un · the field of blockchain technology is still rapidly evolving it...
TRANSCRIPT
November9,2017
BLOCKCHAINFORSOCIALGOODDr.CaraLaPointe
WhatistheBlockchainforSocialGoodproject?
3
BuildingaFrameworkAroundPrivacy&Ethics
4
ApproachBuildCommunity
UnderstandtheChallenges
DevelopanActionableFramework
5
BringyouintothiscommunityAskyouforinput+feedback
GoalsofBeingHereToday
Layoutwherewehavebeenandwherewearegoingwithourproject
6
Wherehavewebeen?Sixmonthsofbuildingcommunity&understandingthepotentialandthechallenges
7
MajorProjectConvenings3 OrganizationsEngaged
50+
Across Continents3
6KeyAcademicCollaborations
DiscussionswithExperts 60+
8
BuildingCommunity
9
AcrossSocialGoodApplications
AcrossKnowledge
Areas
AcrossOrganization
Types
AcrossKnowledgeAreas
10
BlockchainTechnology
Identity&DigitalIdentityInternationalDevelopment
Regulation&Standards
Finance
Privacy
Data
Policy
Ethics
andOthers
AcrossOrganizationTypes
11
StandardsOrganizations
BlockchainEntrepreneursBlockchainInvestors
BlockchainDevelopers
Government
InternationalMultilateralOrganizationsAcademia
Policymakers
andOthers
AcrossSocialGoodApplications
12
E-Voting
IdentityCreation+Recovery
RemittanceTransfers
TrackingFoodorMedicines
LinkingFinancialServicestotheUnderserved
LandRegistry
ConnectingSmallBusinessestoLargerMarkets
Post-DisasterAidDistribution
andOthers
Whyisblockchainsoexciting?
13
WhataretheKeyCharacteristicsofBlockchain?
14
DIGITAL DISTRIBUTED LEDGER
TRUST IMMUTABLETRANSPARENT
ThePotentialofBlockchain
15
CREATINGIDENTITY
SMARTCONTRACTS
FINANCIALTECHNOLOGY
ASSETTRACKING
Whatmakesblockchainsochallenging?
16
UnderstandingtheEcosystem
17
KeyCharacteristicsofBlockchain
18
DIGITAL DISTRIBUTED LEDGER
TRUST IMMUTABLETRANSPARENT
HundredsofQuestions,Concerns,Issues,&Challenges
19Challenge Map
Thesechallengeswithblockchaintechnologyclusteraroundcertain
centersofgravity.
20
21
GOVERNANCE IDENTITY ACCESS
AUTHENTICATION DATAOWNERSHIP&PROVENANCE
SECURITY
22
AUTHENTICATION
IDENTITY
ACCESS
DATAOWNERSHIP&PROVENANCE
SECURITY
GOVERNANCE
23
AUTHENTICATION
IDENTITYACCESS
DATAOWNERSHIP&PROVENANCE
SECURITY
GOVERNANCE
24
AUTHENTICATION
IDENTITY
ACCESS
SECURITY
GOVERNANCE
DATAOWNERSHIP&PROVENANCE
25
AUTHENTICATION
IDENTITY
ACCESS
SECURITY
GOVERNANCE
DATAOWNERSHIP&PROVENANCE
26
AUTHENTICATION
IDENTITY
ACCESS
DATAOWNERSHIP&PROVENANCE
SECURITY
GOVERNANCE
27
AUTHENTICATION
IDENTITY
ACCESS
DATAOWNERSHIP&PROVENANCE
SECURITY
GOVERNANCE
Whathavewelearned?
28
KeyTakeawaysSoFar
➢ Buildinganactionableframeworkaroundprivacyandethicsiscritical➢ Itisfundamentallyimportanttoengageadiverserangeofstakeholdersin
thiseffortinordertobuildarobustandactionableframework➢ Thefieldofblockchaintechnologyisstillrapidlyevolving
○ Itistooearlytocommittoanyonetypeofblockchainsolution➢ Developers,programmanagersandpolicymakersneedtothoroughly
understandtheecosystemaroundthedesiredoutcome○ Seeminglysmalldesignchoicesinblockchaintechnologyhave
significanteffectsontheultimateoutcome
29
Wherearewegoing?
30
Wearecontinuingtobuildthiscommunitybecauseprivacyand
ethicsareuniversalconcerns.
31
Wearestillgatheringfeedbackonourresearchtodate.
32
Wearetranslatingthecollecteddataandfeedbackintoan
actionableframework.
33
Questions?Thoughts?
Email:[email protected]:tinyurl.com/beeckfeedback
[BACKUP]
35
UnderstandingtheEcosystem
36
WhatisBlockchain?
37
DIGITAL DISTRIBUTED LEDGER
TRUST IMMUTABLETRANSPARENT
Examplesofkeyquestionsandconcerns
38
GOVERNANCE● TECHNICAL:
○ Whataretherulesthatgovernthesystem?○ Dodifferentnodeshavedifferentlevelsofauthorityinthesystem?
● HUMAN:○ Whoarethenodes?○ Whodecidesthenodes?○ Howdoyouensurerepresentationofthecommunity?■ Howdoyouensurethatcommunityrepresentationdoesn’texacerbate
existinginequalities?
KEYISSUES
39
IDENTITY● Whatlevelofidentityisneeded?
○ FoundationalORTransactional?
● Whichidentifiersaremostusefulinestablishingthat1)theidentityclaimedisrealanduniqueand2)theuserclaimingtheidentityistherightfulownerofthatidentity?○ Doweneedtobecertainthatsomeoneiswhotheysaytheyare,oronly
increasetheprobabilitythattheyare?
● Whichidentifiersmakepeopleinthecommunityparticularlyvulnerableiftheyweretobeexposed?
40
KEYISSUES
ACCESS● Howdowemaketechnologyaccessibletoeverypersonwho
willbeapartofthesystem?○ PHYSICALACCESS: Doendusershavethetechnologyrequiredtoaccessthe
system?○ EDUCATIONALACCESS: Howmuchinformationdopeopleneedtoknowabout
asystemthattheirinformationisbeingputon?
● Howtransparentistheinformationonthesystem?○ Andifitistransparent,isittransparentinawaythatiseasilyaccessible?
41
KEYISSUES
AUTHENTICATION● Whoauthenticatesthedataenteredontheblockchain
network?● Howisauthenticationdone?
○ Forthezerostate?○ Forfollowontransactions?
● Howdoyouensurethatallrelevantstakeholderstrusttheauthenticatorsandthemethodbywhichit’sdone?
42
KEYISSUES
DATAOWNERSHIP&PROVENANCE● Whoownsthedataontheblockchain?
○ Ifendusersowntheirowndata,howaretheyempoweredtouseit?
● Whatdataactuallygoesontheblockchain?Whichpiecesarejustreferenced?○ Isthedatathat’sreferencedcentrallystored?○ Howcanthedatabestoredinadisaggregatedway?
● Howdoyoucorrectincorrectlyentereddataortransactions?
43
KEYISSUES
SECURITY● INDIVIDUAL-LEVEL
○ Howdoyoucreateprivatekeysthataren’tvulnerabletoattacks,butalsoaren’teasilylostorforgotten?■ Howareprivatekeyandkeyrecoverymanaged?Bywhom?
● SYSTEM-LEVEL○ Howdoyouensurethatvulnerabledataisprotectedashackingtechnologies
evolve?
44
KEYISSUES