32 Characters: Worth 1000 Pictures
$5000 bills illustration

32 Characters: Worth 1000 Pictures

It is actually an understatement. Trillions of pictures, contents and videos. I hope you'll learn something new and share with folks you care about. It is not intended for computer scientists only, in fact for everyone who wants to learn about the new internet. . While most people in computer science know that you can take any set of data (a picture, a video, a text message, an email, a web page.. ) and run it into a cryptographic hash function and get the hash out, could be 32 characters. The super vast majority don't know "all" the following.

Videos are made out of sequence of frames and sound. Let's take every frame/picture and generate a hash and put on the network (network: TODA/IP), batches of them are signed cryptographically in a 30 seconds intervals (so about 900 frames/pictures). In parallel to that the sound gets split accordingly and put on the network as well. This adds on average about 0.0004% additional computation and network load, negligible/ barely noticeable.

Now let's imagine every video in the world and every News outlet is doing the same thing. Now you may start thinking, this 0.0004% will eventually be so big that is going to need its own datacenter etc. True, if it's centralized. It would also require tremendous amount of security, administration, network engineers, system engineers, audit, audit on audits, managements, HR, compliance departments, infosec, risk management, then the regulators come into the equation etc.

The more we move into the future the more you are going to see more and more friction added into this layer. That's pretty much what every centralized ledger based system suffers from and their alternative (so-called ledger based blockchains) suffers from as well. . While many claim to get-rid of that layer described by introducing ledger based blockchains, you then realize they simply substituted that third party by another, their ledger or the one they are recommending. Then you go back to the original requirements you had and all the promises many blockchainers made to then realize they are NOT being met. It is not reducing friction, it is not increasing speed. And if it is narrowly in their own ledger, it is tiny enhancement that couldn't be revolutionary no matter how you hard you argue.

What's the problem? In this so called p2p revolutionary tech, they are substituting the third party and not eliminating the third party or the dependency on it. Numbers don't lie, less than 0.1% global penetration. If you look at the results of where they all are after all these years vis-a-vis the promises that have been presented you quickly realize it's not even close to being revolutionary in its own format. However, if you are still reading this, then you must believe there's something there, there must be a technology that can bring those promises to life and get to global adoption somehow. Otherwise, if these words frustrate you because you are amongst those that built ledger based blockchains and feeling the failure and disappointments repeatedly, this isn't intending to rub salt into your wound, but instead heal your wound.

Here's the thing that folks need to understand. If there's a solution X to the remaining problems your solution A supposedly provides, that will get you to make all the money and success you wanted to make. However, if you do take it, someone else would also be making money and success in a market that you wouldn't have addressed before, would you go for solution X?

If the answer is "no" I can't help you, if the answer is yes, maybe this/I can help

TODA/IP as a protocol is completed. Additionally several organizations and individuals have already different implementations of it. What could that mean to you or anyone you know who wants to build the future: A proper implementation on TODA/IP is solution X. TODA/IP does not have a coin, token or any of that jazz. It is purely a set of instructions and deterministic algorithms for machines to talk to each other. It's purely a network protocol enabling folks to manage and exchange value at the network level. Any information that is digested on the internet becomes a value and you are going to need to exchange it somehow. This elevated security by design doesn't not need to depend on any third party, no cloud, no miners, no ledger, no database non of that. Effectively enabling organizations to be compliant without having the overhead. Enabling individuals and organizations to be secure, confidential and scale as the users grow without to ever have to worry about interoperability as it is on the network and everyone got a network to begin with. In fact the more users the more it scales and the more its security grows.

Furthermore the 1000 pictures I eluted to above, the news and trillions of videos, they can all be placed on the network and secured every minute without any overhead. Zero. The one and only truth that is replicated and shared amongst all devices is something that is composed out of 32 characters it continues the deterministic proofs of the trillions of videos and it looks like the following

Block of one minute: Feb 29, 2020 9:33

TODA1KITA8L1145HABqUIEJDNA91XHAJs

---Chained to--->

Block of one minute: Feb 29, 2020 9:34

TODAFHEYWIS1982hBdHoUJDA1901WC3X

--Chained to--->

Block of one minute: Feb 29, 2020 9:35

TODAFHSUQONDB129ANCJAPZ107ak67UO

And so on and so forth.. The protocol that I authored with the help of my co-author Dann contains algorithms capable to enabling limitless amount of hashes to be represented in every [block of time] in a deterministic setting not dependent on any third party and resulting in assurance of ownership of each object by a single signing device in every [block of time] due to a data-structure that never fails can't practically double spend. the beauty of all this is that it enables Autonomous Decentralized Governance for all objects on the internet and can scale as the number of users scale without any single added piece of hardware, DBs or anything in the middle whatsoever. This added level of security by design increases the efficiency and decreases the friction by over 99.9% from the average of previous global attempts. This is where the opportunity resides. NOT in obstructing governments nor destroying old businesses. When we say revolutionary we mean revolutionary technology and stand behind it.

No alt text provided for this image

This image above, illustrates how effectively it is being used today in the development of the most sophisticated anti deepfake technology and anti-fake news.

In addition to that, a curious cryptographer or mathematician can verify every single frame which your computer can do that for you without fail. This technology is resilient to attacks in a way that attackers must spend exponentially more than the object that it could delay, while not practically possible to corrupt. This can also assures, if folks are looking at any video they are able to verify with 100% certainty at any time, the provenance authenticity, the same applies to news and any information in general. We refer to this part "The authentic internet infrastructure"

No alt text provided for this image


What else can you use this for? What can you build on top of this protocol? Well, if it's 1991 and I were to tell you the world wide web is coming and every business will have a website including the flowershop, your bookstore, the record store and everyone will have emails and everyone will have identity on the web more prominent than that in real life, would you have believed me??

Well, it's 2020 and this is likely to have a bigger global shift that is hard to digest and assimilate.

Every organization, every business could build on it and benefit tremendously. While beliefs can accelerate any action, this technology above doesn't rely on beliefs but proof structure, resiliency, security by design, efficiency, confidentiality, scalability and interoperability without having any single party in the middle of it. . We call that S.E.C.S.I // Easy to remember, important to apply. You need to be SECSI all the time. Here's an article below I posted on Forbes last year, it will give you an idea of what I am talking about here.

Having 100% Autonomous Decentralized Governance does NOT mean no services can be provided to folks, those will always be optional, but will not and shall not become the dependency and therefore the entire friction mentioned above is eliminated in its entirety.

Many other visionaries have believed that the de facto standard for the new internet will not be ledger based but it will be network.

We have built it

Aleksandar Katanic

Well Connected | Your…10K followers

5mo

Toufi, thanks for sharing!

Like
Reply
Vitaly Makarenko

I build and scale FinTech…25K followers

5mo

Toufi, thanks for sharing!

Like
Reply
Bob Hutchins, Phd(c)

ROME Insights38K followers

11mo

Toufi, thanks for sharing! Love this.

Like
Reply

To view or add a comment, sign in

Others also viewed

Explore content categories