Where do we go from here?
Thursday, March 19, 2020
BatchQ - A social infrastructure app to encourage social distancing and maximize customer flow.
WHAT:
BatchQ is a community oriented software platform for businesses to help organize and orchestrate the entry of customers into establishments by a mobile ticketing system. This will be valuable by:
* Controlling the flow of people in order to to maintain safe distances
* Reducing or eliminating the amount of time close contact resulting by standing in a line.
* Keeping Essential item stock availability information available to the community
The funds will be used to create a business entity and facilitate the building of the application and maintain up to 3 months of hosting for the backers of this project. Customer support will be provided for the duration of the promised kick starter reward period during business hours. There will be options to continue support at a locked in rate determined by the backer level.
I plan to release this Friday as 12:00am because it isn't something that will have much value without a little urgency.
#entrepeneurship #coronavirus #socialdistancing #toiletpapercrisis #mobileapp
Thursday, February 6, 2020
Applications of Machine Learning for Any Business: Classification
Wednesday, January 22, 2020
Is Block Chain’s weakness the wallet?(Part 1)
- Authentication – If you have access to the wallet, it is assumed you are the owner and there isn’t much protection against attacks here.
- Authorization – If you have the pass phrase and the wallet address you are authorized to use it and interact with the services on the block chain. It is very hard to random/brute force your way into this.
- Non-Repudiation – Having your wallet lets you make transactions on the chain.
- Integrity – Through the use of transactions via the wallet you are a trusted entity on the system. Transactions are verified by consensus so you aren’t not going to have a invalid request (although it is more likely to be denied.)
- Individual Privacy - Chain Specific but typically anonymous or pseudo anonymous only need an email or pass phrase to signup and access.
- Communication Anonymity - Trust between entities without revealing identities of the party. Having an address is enough to establish trust with another party.
Is that really what we wanted?
Attacks
- $5 Wrench Attack
- Keyloggers
- Wallet.dat imports
- Stolen Phones
- Mad Spouse
- Shared Logins
Recovery
No Limits
Monday, June 17, 2019
Impact of the Internet on our Identity and how Block Chain can help us get it back (Part 1):
One of the generation divides between the retiring population and the population that is entering their prime is the concept of privacy and our expectations of how privacy is handled in the internet age. As a millennial I had pretty early exposure to computers and growing with technology, but when I was younger the devices were simplistic and weren’t connected to each other. I had a PC before the internet started becoming a thing and slowly started getting more access to it as the price of it lowered.
To express myself I gradually forfeited more and more of my personal self to the internet without really a second thought through sites like Facebook and Myspace. As I developed professionally in the tech field I realized how much of myself I was giving to the internet of things.
Google has a pretty good idea where I’m going, what I’m thinking and how much I have to get where I’m going, probably before I do. I’m aware of it, slightly bothered by it, but I move on. The only way I can be 100% certain of what I can keep to myself is something that isn’t passed outside of my thoughts
My parents hold their privacy to a much higher part of the self identity. I remember going through the process of getting a home loan with them while I was growing up. I wasn’t involved with the details of everything, but I remember their comments about how intruded upon they felt and how exposed they felt to secure the loan. Even now after I had went through the process of it in the last couple of years on my own, they commented about asking how I felt about the whole process and if I felt a loss of myself to the system for that.
I didn’t really feel violated, but I did lay every thing out on the table to prove my reliability in being able to make my payments. I don’t doubt that my desensitization from the peak of my childhood/young adulthood that lessened the impact of the process.
Comparing these two mentalities and thinking through what privacy means to me I have big opinions on what acceptable use of my privacy and what is abuse of my privacy. The trend of data and ourselves is a losing battle as companies want more and more of our behaviors and use patterns of their specific interests. As more companies adopt this mindset, I don’t know that we will know ourselves as well as the conglomerate of internet companies.
As a race are in the middle of an identity change. Are we a species of individuals or are we now simply a cog in a new type of mental ecosystem. To an extent there are examples of arguing either way, but as automation and intelligent computing continues we are trending towards losing that individuality.
As we move forward it will be hard to protect ourselves from this kind of divulgence of information. It is almost impossible for us to prevent companies from taking information from us because they provide the platforms that enable us to interact with the things we want or need to. To get ahead A.I.s are predicting what we need before we need them.
This rate of technology is advancing much faster than we as humans are willing to change. The ethics of what is happening is still being figured out, but in the meantime, it is a buffet of data that is getting passed to any observant eyes.
We take the control of our data back where we can.
Sunday, June 16, 2019
Block Chain and Personal Privacy:
Here is what that application could look like:
- Actors
- Requestors
- Source of Identity[JM1]
- Transaction definitions are handled via contracts.
- Authenticate actors to actors or actors to requestors while never passing PII
- Be the Authority of validation to prove identity.
- Creation of unique links between actors and actors or actors and requestors.
- Ensure that enforcement of validity is maintained in the system between actors and/or requestors at all times
- Allow explicit control of actor’s permission of their information between other actors or requestors.
- Allow for validation of information without passing identity revealing information
- Maintain channels of communication over insecure mediums
- Ensure transparency of the system and maintaining individual privacy
- State transitions of the system only act in consensus
- Ledger of interactions between entities.
- Eliminate the need of PII to be stored externally on system (either the privacy application or by Sources of Identity).
- Limit the ability of requestors to store PII.
- Recover from PII breaches.
- Delete aliases between actors and requestors.
- No single point of failure. Distributed processing and storage.
BatchQ - A social infrastructure app to encourage social distancing and maximize customer flow.
I'm pretty excited about this project and hope that you might give it a read. I've coined it BatchQ, if anything I hope it generates...
-
In the current culture of the internet and content providers, the use of Personally Identifiable Information (PII) is easily abused beca...
-
I'm pretty excited about this project and hope that you might give it a read. I've coined it BatchQ, if anything I hope it generates...
-
Machine learning (ML) is a modern innovation that has helped man improve not only many industrial and professional processes, but also ...