Connect with us


Everything you need to know about Blockchain



Blockchain technology, in essence, took its first steps in 1991, when two research scientists: Stuart Haber and W. Scott Stornetta, introduced a computationally practical solution for time-stamped digital documents so that they could not be modified or tampered with.

Source: Ox3production (YouTube)

All this means that in its beginnings, the blockchain functioned more as a technology for temporarily blocking information than as a permanent and auditable decentralized option. That is, it was more or less similar to how smart contracts work today.

You want to know a little more about smart contracts, so be sure to read the following article on Smart Contracts: A Milestone Innovation from Ethereum.

The system used a cryptographically secure blockchain to store the time-stamped documents, and in 1992 the Merkle trees were incorporated into the design.

Merkle trees are data structures divided into several layers whose purpose is to relate each node with a single root associated with them. In this way, it is possible to synthesize all the network data in just seconds.

To achieve this, each node must be identified with a unique identifier (hash). These initial nodes, called child nodes (leaves), are then associated with a superior node called parent node (branch). The parent node will have a unique identifier resulting from the hash of its child nodes. This structure is repeated until reaching the root node or Merkle root, whose imprint is associated with all the tree nodes.

This whole process, called Merkle trees, made the network more efficient by allowing multiple documents to be brought together in a single block. However, this technology was not used, and the patent expired in 2004, but despite this, it represented an important step in the evolution of what would be blockchain technology.

Reusable Proof of Work (RPoW)

It is important to note that even though blockchain technology is being used in different human life areas today, its evolution is intrinsically linked to decentralized finance.

Proof of this is that in 2004, computer scientist and crypto activist Hal Finney (Harold Thomas Finney II) introduced a system called RPoW, Reusable Proof Of Work.

The system worked by receiving a non-tradable or non-fungible proof-of-work token based on Hashcash (an algorithm that was the predecessor to Bitcoin’s Proof of Work and whose main function was to minimize spam mail and denial-of-service attacks).In return, the system created a token signed by RSA or “Rivest, Shamir, and Adleman” (a public key cryptographic system developed in 1979), which could then be transferred from one person to another P2P.

The RPoW system solved double-spending (a computer attack involving multiple uses of the same digital currency). It achieved this by maintaining ownership of the tokens registered on a reliable server designed to allow users around the world to verify with accuracy and integrity in real-time of your digital currencies.

RPoW can be considered as an early prototype and a crucial initial step in the history of blockchain and decentralized cryptocurrencies in general.

Bitcoin Proof of Work

In late 2008, Satoshi Nakamoto posted a white paper on a crypto mailing list that introduced a decentralized peer-to-peer electronic cash system (called Bitcoin).

If you want to know who Satoshi Nakamoto is, click on the following link:

Who is Satoshi Nakamoto? 4 Closest Satoshi Nakamoto Candidates

Based on the Hashcash Proof-of-Work algorithm, but instead of using a reliable hardware computing function like RPoW, dual spending protection in Bitcoin was provided by a decentralized peer-to-peer protocol for tracking and verification of transactions; Proof of Work.

In short, individual miners “mine” bitcoin for a reward using the Proof of Work mechanism and then verify it by decentralized nodes on the network.

How much money could I earn mining bitcoins? Find the answer to this question in the following article:

Cryptocurrency Mining vs Buying: Which Gives Better Returns?

On January 3, 2009, Bitcoin was born when the first block of bitcoin was mined by Satoshi Nakamoto, who got a bounty of 50 bitcoins. The first Bitcoin recipient was Hal Finney, he received ten bitcoins from Satoshi Nakamoto in what would be the world’s first bitcoin transaction, specifically on January 12, 2009.

Although the blockchain began its first steps in 1991, it was not with Bitcoin’s birth that it would take a definitive shape. This was its first special use case, that is, a decentralized P2P financial system.

What is the blockchain?

It is a computer operating system through which its database is stored, managed, and executed through block structures that contain information (on actions, movements, transactions, contracts, etc.), but that as an aggregate also includes meta-information of the previous blocks.

In such a way, each of these blocks is joined in a chronological line that makes it possible for the entire network’s registration and general operation to be completely dependent on the chronological compatibility and interoperability between the blocks that make up the network. Here the name blockchain.

Source: Fortune

What are the most successful blockchain projects of 2020? The following article reveals this and much more:

10 Best Applications of Blockchain Technology (2020)

Next, it is important to note that all these blocks are stored simultaneously in multiple nodes (computers) distributed in different parts of the world or a specific location (depending on the computer project). This allows the information to be backed up, protected, and audited more easily, either publicly or by the constituents of a private organization.

One of the main benefits of blockchain technology is that it is very difficult to hack, and this is basically because all the information and operability (movements, transactions, contracts, etc.) are executed simultaneously in all the nodes involved in the network. To hack the system, the attacker must do it on all computers simultaneously, a costly fact and almost impossible, according to many computer experts, but never impossible.

It should be noted that just as cryptocurrencies are not necessarily decentralized, the blockchains are not necessarily either. The decentralization of a blockchain project will depend on the protocol assigned to it. For example, in the case of Bitcoin, the protocol called Proof of Work is responsible for the decentralization of the cryptocurrency and the most influential blockchain use case in the world.

Types of blockchain

Public blockchain:

It is that network or operating system with decentralized distribution of nodes. Regardless of its purpose, any citizen of the world can access a simple computer and Internet access. But what is fascinating is that beyond this access (without censorship), each person becomes involved and responsible for the network.

Each person can audit it, specific aspects such as its database, records, movements, contracts, and transactions.

Although the network does not show the names of users that interact with it, there is a code or a public key that identifies each person or user.

In the case of decentralized finance use, the best examples of public blockchains are Bitcoin, Ethereum, and Litecoin. However, remember that blockchain can go beyond finance (medicine, agriculture, notary public, industrial production, etc).

Confidential public blockchain:

In this case, we are also talking about a network or operating system with decentralized distribution of nodes that can be accessed with a simple computer and internet access from anywhere.

In this regard, it is public, decentralized, and uncensored, but it is confidential because both the users’ identity data, their activities, and transactions are anonymous.

Which is why they are often called closed source blockchains. That is, they are for public use, but public auditing is not possible.

Examples of confidential public blockchain are Monero, Dash, Zcash, and Verge. These three offer absolute anonymity.

Private blockchain:

They are all those networks or operating systems with a centralized distribution of nodes. This means that although the nodes are distributed in different parts of the world, an organization maintains absolute control of this; it can be a private company or government.

Regardless of the purpose of this type of blockchain, users cannot access this network unless they are granted a special invitation from a private company, government, or an organizational conglomerate.

This type of blockchain clarifies that not all blockchains are decentralized and that the term decentralized cannot necessarily be associated with the blockchain.

What defines the decentralization of a blockchain network is the protocol. For Bitcoin, it is the Proof of Work protocol. In addition to the protocol, it is also important to highlight the transparency, veracity, and purpose of the organization (foundation or company) that manages each blockchain project.

Some of the most famous examples of private blockchains are Hyperledger (from the Linux Foundation), R3 (a consortium of international banks to develop private blockchain banking solutions), or Ripple (a protocol to facilitate international money transfers). Or any other centralized blockchain that political organizations created to support their government cryptocurrencies.

Hybrid blockchain:

It is a combination of the public and private blockchain types mentioned above.

Basically, the nodes that intervene in the network do not have public access. To enter, they must be invited as in the private blockchain type. Once these nodes are invited, they participate in the blockchain network’s maintenance and security, as it occurs on the public blockchain network.

On the other hand, the information stored in the hybrid blockchain network is completely in the public domain, which means that it can even be viewed and explored by users who do not intervene in it, something typical of the public blockchain type.

Some examples of hybrid blockchains are BigchainDB, a blockchain technology provider, or Evernym, a hybrid blockchain that wants to facilitate the Sovereign Digital Identity management.

What are the benefits of the blockchain in managing digital identity? If you want to know it, click here:

Blockchain Application Series: Identity Management


Although the blockchain was born alongside our time’s decentralized finance, Bitcoin, it must be remembered that the blockchain is a technology that goes beyond finance.

It is a structure and a particular technical arrangement of a cumulus of nodes, which in most cases work in a distributed and simultaneous manner with different purposes such as: operating an operating system, recording information, supporting and shielding a database, decentralized governance, and even centralized governance.

All of these with different and multiple purposes related to different areas of human life, such as medicine, industrial production, public notaries, agriculture, public service records, etc.

Blockchain is a technological phenomenon, a technical computer tool that is expanding every day to all areas to solve human problems of governance and administration.


Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Researchers hacked a robotic vacuum cleaner to record speech and music remotely




A team of researchers demonstrated that popular robotic household vacuum cleaners can be remotely hacked to act as microphones.

The researchers—including Nirupam Roy, an assistant professor in the University of Maryland’s Department of Computer Science—collected information from the laser-based  in a popular vacuum robot and applied  and deep learning techniques to recover speech and identify  playing in the same room as the device.

The research demonstrates the potential for any device that uses light detection and ranging (Lidar) technology to be manipulated for collecting , despite not having a microphone. This work, which is a collaboration with assistant professor Jun Han at the University of Singapore was presented at the Association for Computing Machinery’s Conference on Embedded Networked Sensor Systems (SenSys 2020) on November 18, 2020.

“We welcome these devices into our homes, and we don’t think anything about it,” said Roy, who holds a joint appointment in the University of Maryland Institute for Advanced Computer Studies (UMIACS). “But we have shown that even though these devices don’t have microphones, we can repurpose the systems they use for navigation to spy on conversations and potentially reveal .”

The Lidar navigation systems in household vacuum bots shine a laser beam around a room and sense the reflection of the laser as it bounces off nearby objects. The robot uses the reflected signals to map the room and avoid collisions as it moves through the house.

Privacy experts have suggested that the maps made by vacuum bots, which are often stored in the cloud, pose potential privacy breaches that could give advertisers access to information about such things as home size, which suggests income level, and other lifestyle-related information. Roy and his team wondered if the Lidar in these robots could also pose potential security risks as sound recording devices in users’ homes or businesses.

Sound waves cause objects to vibrate, and these vibrations cause slight variations in the light bouncing off an object. Laser microphones, used in espionage since the 1940s, are capable of converting those variations back into sound waves. But laser microphones rely on a targeted laser beam reflecting off very smooth surfaces, such as glass windows.

Could your vacuum be listening to you?
Deep learning algorithms were able to interpret scattered sound waves, such those above that were captured by a robot vacuum, to identify numbers and musical sequences. Credit: Sriram Sami

A vacuum Lidar, on the other hand, scans the environment with a laser and senses the light scattered back by objects that are irregular in shape and density. The scattered signal received by the vacuum’s sensor provides only a fraction of the information needed to recover sound waves. The researchers were unsure if a vacuum bot’s Lidar system could be manipulated to function as a microphone and if the signal could be interpreted into meaningful sound signals.

First, the researchers hacked a robot vacuum to show they could control the position of the  and send the sensed data to their laptops through Wi-Fi without interfering with the device’s navigation.

Next, they conducted experiments with two sound sources. One source was a human voice reciting numbers played over computer speakers and the other was audio from a variety of television shows played through a TV sound bar. Roy and his colleagues then captured the laser signal sensed by the vacuum’s navigation system as it bounced off a variety of objects placed near the sound source. Objects included a trash can, cardboard box, takeout container and polypropylene bag—items that might normally be found on a typical floor.

The researchers passed the signals they received through deep learning algorithms that were trained to either match human voices or to identify musical sequences from television shows. Their computer system, which they call LidarPhone, identified and matched spoken numbers with 90% accuracy. It also identified television shows from a minute’s worth of recording with more than 90% accuracy.

“This type of threat may be more important now than ever, when you consider that we are all ordering food over the phone and having meetings over the computer, and we are often speaking our credit card or bank information,” Roy said. “But what is even more concerning for me is that it can reveal much more personal information. This kind of information can tell you about my living style, how many hours I’m working, other things that I am doing. And what we watch on TV can reveal our political orientations. That is crucial for someone who might want to manipulate the political elections or target very specific messages to me.”

The researchers emphasize that vacuum cleaners are just one example of potential vulnerability to Lidar-based spying. Many other devices could be open to similar attacks such as smartphone infrared sensors used for face recognition or passive infrared sensors used for motion detection.

“I believe this is significant work that will make the manufacturers aware of these possibilities and trigger the security and privacy community to come up with solutions to prevent these kinds of attacks,” Roy said.


Continue Reading


iPhone 12 Pro Max receives ‘highest ever’ rating from DisplayMate, sets 11 records




DisplayMate has put the iPhone 12 Pro Max Super Retina XDR display through its highly detailed testing and the outcome isn’t surprising: Apple has once again earned “DisplayMate’s highest ever Display Performance Grade of A+” and “Best Smartphone Display Award.” However, going beyond the iPhone 11 Pro’s accolades last year, the 12 Pro Max has matched or set 11 smartphone display performance records.

DisplayMate just published its deep dive review of the iPhone 12 Pro Max display. As has become a tradition, this year’s iPhone has garnered another highest ever A+ rating from the firm but more notably it has hit a milestone for how many new records it’s broken or matched: 11. For comparison, the iPhone 11 Pro matched or set 9 display performance records last year and did the same for 8 with the iPhone XS Max in 2018.

Here are the smartphone display records that DisplayMate says the iPhone 12 Pro Max has set/matched:

Note that Numerical Performance Differences that are Visually Indistinguishable are considered Matched and Tied Performance Records.

· Highest   Absolute Color Accuracy  (0.9 JNCD)  –  Visually Indistinguishable From Perfect.

· Highest   Image Contrast Accuracy and Intensity Scale Accuracy  (2.19 Gamma)  –  Visually Indistinguishable From Perfect.

· Smallest  Shift in Color Accuracy and Intensity Scale with the Image Content APL  (0.2 JNCD)  –  Visually Indistinguishable From Perfect.

· Smallest  Shift in Image Contrast and Intensity Scale with the Image Content APL  (0.00 Gamma)  –  Visually Indistinguishable From Perfect.

· Smallest  Change in Peak Luminance with the Image Content Average Picture Level APL  (1 percent)  –  Visually Indistinguishable From Perfect.

· Highest   Full Screen Brightness for OLED Smartphones  (825 nits for 100% APL).

· Highest   Full Screen Contrast Rating in Ambient Light  (172 at 100% APL).

· Highest   Contrast Ratio  (Infinite).

· Lowest    Screen Reflectance  (4.8 percent).

· Smallest  Brightness Variation with Viewing Angle  (27% at 30 degrees).

· Highest   Visible Screen Resolution 2.8K (2778×1284)  –  4K Does Not appear visually sharper on a Smartphone.

DisplayMate also touches on the iPhone 12 lineup featuring a 60Hz display instead of an upgraded 120Hz one like on the iPad Pro. It concludes that it “should be fine for most applications.”

The iPhone 12 Pro Max display has the standard 60 Hz Refresh Rate, rather than the higher 90 Hz and 120 Hz Refresh Rates now being introduced. With the very fast Response Time of the OLED display, and the very fast CPU and GPU processors on the iPhone 12 Pro Max, the lower 60 Hz Refresh Rate should be fine for most applications.

For a detailed look at all the ways DisplayMate tested Apple’s latest state-of-the-art iPhone display, check out the full report here.


Continue Reading


SSD or HDD For Laptop, Which Is Better?








samsung solid state drives


Seagate Barracuda Hard Disk Drive





fast ssds




slow hdds




























Continue Reading


Copyright © 2020 Inventrium Magazine

%d bloggers like this: