Skip to main content

Home/ Sensorica Knowledge/ Group items tagged code

Rss Feed Group items tagged

Kurt Laitner

gource - software version control visualization - Google Project Hosting - 0 views

  •  
    VERY interesting visualization of work on a forking source from a note by Ampie in october I just tripped over.. sorry if a repeat - watch the vid
Tiberius Brastaviceanu

How To Export STL Files From Google Sketchup - 0 views

  •  
    This page will show you two different plugins that can be used to export STL files from Google Sketchup. Once exported, you may then open them in a CAM program for generating 3D G-code for your CNC machine. Two cheap examples of 3D capable CAM programs would be CamBam Plus and MeshCam.
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • control over Google products
  • can access and control Google Spreadsheets and other products
  • scripts
  • ...44 more annotations...
  • run directly on Google servers in order to provide direct access to the products they control.
  • can also use Google Apps Script from Google Sites
  • Google Apps Script Template Gallery
  • Google Apps Script Blog
  • guide contains the information you need to use Google Apps Script, a server-side scripting language, based on JavaScript, that runs on Google's servers alongside Google Apps
  • enable varying degrees of interactivity among the applications
  • easy enough to use that you don't have to be a programmer to create scripts.
  • use it to automate complex tasks within Google Apps
  • You don't have to be a programmer to use Google Apps Script
  • A script is a series of instructions you write in a computer language to accomplish a particular task. You type in the instructions and save them as a script. The script runs only under circumstances you define.
  • The Google Apps Script API provides a set of objects. You can use these objects and their associates methods to access Google Docs and Spreadsheets, Gmail, Google Finance, and other Google applications.
  • To run a script, you must first add the script to a Google Spreadsheet or Google Site using the Script Editor.
  • You can retrieve information from a wide selection of Google Apps and Services and from external sources, including web pages and XML sources. You can use Google Apps Script to create email, spreadsheets, pages on Google Sites, and files in the Google Docs Document List.
  • The instructions in a script are grouped into functions.
  • objects
  • methods
  • for such tasks
  • Create pages on a Google Site
  • Customize a Spreadsheet
  • Send email based on information in a Spreadsheet
  • You can manipulate
  • numeric
  • financial
  • string
  • an XML document
  • controlling data in the following applications
  • Spreadsheets
  • Google Document List
  • Contacts
  • Calendar
  • Sites
  • Google Maps
  • create and display interactive user interface elements
  • interact with relational database management systems
  • create folders, subfolders, and files in the Google Docs document list
  • access to user, session, and browser information
  • access to web services
  • extract data from XML documents and then manipulate that data
  • obtain translations of text from one language to another
  • send email
  • UrlFetch services
  • encode and decode strings and format dates
  • store properties on a per-script and per-user basis
  • create, delete and update contact information for individuals and for groups in Google Contacts
Tiberius Brastaviceanu

Open Food Network | Eaterprises - 1 views

Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Kurt Laitner

The basic orientation of p2p theory towards societal reform: transforming civil society... - 1 views

  • under the ‘leadership’ of corporations and those members of our society who have access to capital.
  • Despite all democratic advances, the state forms have clearly been captured by private interests.
  • in a capitalist system, ‘civil society’ is not directly productive of the goods and services that we need to survive, live and thrive
  • ...22 more annotations...
  • everything that needs to be made, has to be designed through collaborative innovation in the first place
  • continuous interchange and dialogue of citizens as they determine their collective life
  • Both civil society and the notion of citizenship can be criticized for being insufficiently inclusionary, and therefore as ‘mechanisms of exclusion’.
  • consisting of shared depositories of knowledge, code and design; the communities of contributors and users of such commons
  • infrastructures of collaboration, which are managed by a new type of ‘for-benefit associations’
  • democratically governed by all participants and stakeholders in such commons
    • Kurt Laitner
       
      hmm
  • which are not derived or secondary from either the private or state forms.
  • civil society is the locus of the shared abundance of value creation, and the place for the continual dialogue regarding the necessities of common life.
  • democratically decide
    • Kurt Laitner
       
      ? our values need be expressed in every action within the matrix, not just when a 'vote' is held, in fact general democratic 'voting' should probably disappear
  • the ‘common good’ of society as a whole
    • Kurt Laitner
       
      there is no such thing
  • The difference is that the commons where the immaterial value is created are positioned in a field of abundance characteristic for non-rival or anti-rival goods; while the for-benefit associations are responsible for the sometimes contentious allocation of rival infrastructures.
    • Kurt Laitner
       
      !!!
  • Whereas the commons themselves are plurarchies based on permissionless contribution, forking and other rights guaranteeing the diversity of contributions and contributors; the for-benefit associations are democratically governed.
  • true reform of the private sector and the corporate form.
    • Kurt Laitner
       
      really?
  • Under conditions of the rule of capital, for-profit corporations are beholden to work for the interests of the shareholders. This format allows for the accumulation of capital, but also indirectly of political power, through the power of money to influence politics and politicians. For-profit corporations are part of a system of infinite growth and compound interest, must continuously compete with other corporations, and therefore, also minimize costs. For-profit corporations are designed to ignore negative environmental externalities by avoiding to pay the costs associated with them; and to ignore positive social externalities, also by avoiding to pay for them. In terms of sustainability, corporations practice planned obsolescence as a rule, because while the market is a scarcity allocation mechanism, capitalism itself is a scarcity maintenance and creation mechanism. Anti-sustainable practices are systemic and part of the DNA of the for-profit corporation.
  • Under conditions of peer production, design and innovation moves to commons-based communitiies, which lack the incentive for unsustainable design; products are inherently design for sustainability, and the production process itself is designed for openness and distribution.
  • designed to make the commoners and the commons themselves sustainable, by not ‘leaking’ surplus value to external shareholders
  • mission-oriented, community supportive, sustainability-oriented corporate forms, that operate in the marketplace but do not themselves reproduce capitalism.
  • surplus value stays within the commons, allows its autonomous social reproduction, and sustains the commoners
  • ethical mechanism that subsumes profit making under the social goal of strengthening the commons.
  • because commons and their communities are themselves specific, and do not automatically take into account the common good of society as a whole .
  • A Partner State functions center around enabling and empowering social production and abandons some of the paternalistic aspects of the welfare state by focusing on strengthening the possibilities of autonomy.
  • mobilization of social forces to obtain a new social contract
  •  
    Good synopsis of the big picture by Michel
Tiberius Brastaviceanu

How The Blockchain Will Transform Everything From Banking To Government To Our Identities - 1 views

  • The first generation of the Internet was a great tool for communicating, collaborating and connecting online, but it was not ideal for business. When you send and share information on the Internet, you’re not sending an original but a copy. That’s good for information — it means people have a printing press for information and that information becomes democratized — but if you want to send an asset, it’s a problem. If I send you $100 online, you need to be sure you have it and I don’t, and that I can’t spend the same $100 somewhere else. As a result, we need intermediaries to perform critical roles — to establish identity between two parties in a transaction, and to do all the settlement transaction logic, which includes record-keeping.
  • With blockchain, for the first time, we have a new digital medium for value where anyone can access anything of value — stocks, bonds, money, digital property, titles, deeds — and even things like identity and votes can be moved, stored and managed securely and privately. Trust is not established though a third party but with clever code and mass consensus using a network. That’s got huge implications for intermediaries and businesses and society at large
  • And also with government, as a central repository of information an entity that delivers services.
  • ...35 more annotations...
  • There’s an opportunity to disrupt how those organizations work. Intermediaries, though they do a good job, have a few problems — they’re centralized, which makes them vulnerable to attack or failure
  • They tax the system
  • They capture data
  • They exclude billions of people from the global economy
  • internet of value
  • With blockchain, we can go from redistributing wealth to distributing value and opportunity value fairly a priori, from cradle to grave.
  • creating a true sharing economy by replacing service aggregators like Uber with distributed applications on the blockchain
  • unleashing a new age of entrepreneurship
  • build accountable governments through transparency, smart contracts and revitalized models of democracy.
  • The virtual you is owned by large intermediaries
  • This virtual you knows more about you than you do sometimes
  • So there’s a strange phenomenon from the first generation of the Internet where the most important asset class that’s been created is data —and we don’t control it or own it.
  • individuals taking back their identity through your own personal avatar
  • The financial services industry
  • antiquated
  • a complicated machine that does a simple thing
  • settlement
  • an opportunity to profoundly change the nature of the entire industry. The Starbucks transaction should be instant.
  • At the heart of it, the financial services industry moves value.
  • so this is both an existential threat to the financial services industry and an historic opportunity.
  • Banks trade on trust
  • Within the decade, every single financial asset, which is really just a contract
  • will all move to a blockchain-based format
  • In the accounting world, a lot of firms rely on costly audits to drive their profits
  • With blockchain, you could have a third entry time-stamped in a distributed ledger that could be acceptable to any relevant stakeholders from regulators to shareholders, giving you a perfect record of the truth and thus the financial health of an organization.
  • Nobel-winning economist Ronald Coase argued that firms exist because transaction costs in an open market are greater than the cost of doing things inside the boundaries of the corporation.
  • four costs — of search, coordination, contracting and establishing trust
  • Blockchains will profoundly affect all of these.
  • you can now synthesize trust on an open platform and people who’ve never met can trust each other to do certain things. So this results in a whole number of new business models
  • It turns out the Internet of Everything needs a Ledger of Everything, because a lightbulb buying power from your neighbor’s solar panel definitely won’t use banks or the Visa network
  • Right now, governments take tax revenue from corporations, individuals, licenses and so on. All of that can change. We can first of all have transparency in a radical sense because sunlight is the best disinfectant. Secondly, we can open up governments in a different sense of sharing data.
  • governments can enable self-organization to occur in society where companies, civil society organizations, NGOs, academics, foundations, and government agencies and individual citizens ought to use this data to self-organize and create what we used to call services or forms of public value. The third one has to do with the relationship between citizens and their governments.
  • There are more opportunities to create government by the people for the people
  • Electronic voting won’t be delivered by traditional server technology because it won’t be trusted by citizens
mayssamd

Applications of distributed ledger technology (DLT) and Blockchain-enabled smart contra... - 2 views

  •  
    Traceability concerns "the ability to record all required information relating to that which is under consideration, throughout its entire lifecycle, by means of recorded identifications" A consortium blockchain structure is adopted and supported by smart contracts for compliance code checking to improve construction quality management and better facilitate information sharing and enhanced mutual trust
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
‹ Previous 21 - 32 of 32
Showing 20 items per page