Presenting crypto 2.0 at university

Hey guys. I’m giving a presentation on bitcoin and crypto 2.0 projects BitShares, ethereum, and maidsafe. What should I highlight for maidsafe that you think would get people interested?


Things easy to relate to:

  • A single login for all your services. Personally I think that’s all you need to get anyone’s attention :slight_smile:

If not:

  • Earn coins by providing disk space to other users.
  • Spend coins to buy online storage and access your data from anywhere at anytime (no downtime, ever).
  • Everything is self-encrypted.
  • It can’t be censored.

And open up on exciting possibilities, ex:

  • A social network where you physically own your data.
  • etc.

That’s great, good luck!

This post of mine went down well, so feel free to take what you like from it.

When are you presenting?

1 Like

This Thursday.

In response to first comment I won’t go with anything you want because that’s too open ended. But I like the other suggestions. Looking at your post now.

This collation of explanations from @dirvine @happybeing @dallyshalla may be of use…

says I don’t have access to the topic…

Oh you might not have earned enough points or whatever to access the ‘Lounge’ area…I’ll paste the content here:

The SAFE Network from First Principles (Video Playlist by SAFE Pod Montreal)

Some of the videos might help also: A compilation of Maidsafe Videos

A David Irvine explanation for bloggers:

SAFE is not a blockchain technology. It is a fully decentralised autonomous platform that is written in system level code from layer 3 all the way to the user. This is one reason it pre-dates bitcoin by a few years, as the proposition is huge, which obviously has its strengths and the usual warnings about large propositions. This means that it implements a version of secured and reliable UDP and each layer all the way to user based application API’s for developers to create planetary scale applications with zero infrastructure costs. (one such application could be Storej, but it may be seen as a very different approach to storing data only at this time).

Apps on SAFE will include cross platform virtual drives, web sites, communication systems, media sharing etc. It provides a network that will allow developers to create global voting systems, integrate with other platforms (like Ethereum and Monitas) to create secured contracts and arbitration and much more.

This is the worlds first secured p2p network that allows people to create accounts and log in to retrieve private and shared data with no intermediaries. The vision is Privacy Security and Freedom for all of the people of the world, that they may consume (be educated) and produce (educate) information and enhance the world’s knowledge.

The network is backed by ‘farmers’ similar to bitcoin miners, but whose job is to provide storage, bandwidth and cpu power to the network. These farmers are rewarded in a currency called safecoin, that is a cryptographically secured anonymous currency, with similar attributed to cash. This safecoin mechanism allows providers of resources to be paid to protect our information and this will extend to other resources (such as compute) as the network grows.

Technical Presentation for Conversations
by @dallyshalla

MAID Massive Array of Internet Disks

MAID is an acronym for Massive Array of Internet Disks. The planet Earth is abundant in computational resources in the form of mobile devices, massive servers, and home computers. This is a massive infrastructure which operates independently. When connected through a networking device to a routing device this independent piece of computational power can communicate to others’ of its kind, other computers! Understanding this, imagine that these computers were connected at the most fundamental level.

Computational power is built on silicon chips, on copper circuit boards packaged and distributed for individual and enterprise use. Combine them and you have the sum of all of their parts. This is what MAID is for. The protocol that MaidSafe has organized and assembled into code does exactly this.

Assembling this MAID is a task that allows for a user to optionally choose to allocate to this network. The allocation which we mention is in the form of hard disk space, the processing capacities required to process and transmit data from the CPU and the RAM, and the bandwidth present in users’ local network. Setting up a Vault accomplishes this. These Vaults are the computing systems that are active on the network. Based on the protocol the Vaults are ranked and the network has knowledge of the state of Vaults.

Active Vaults act as nodes on SAFE Network. They are chosen to store data, to process interactions of data, and also to validate other Vaults using a method which randomizes and secures random selection of a Vault. In the process of data processing these Vaults are actually Data Managers. And as Data Managers each Vault maintains the integrity of the Network. Now one might assume that this could be disastrous; however, the level of data that is possessed by each Vault in the SAFE Network is not very high, in fact no one Vault will possess the whole of all of the data, and therefore the level of trust required to allow a Vault the privilege to handle your data lies only in the facts which are: the Data Managing Vault is Active, and has enough processing power and space in the hard disk to process an interaction.

The handling of data transmitted over the SAFE Network takes place through some quite important methods. These methods carry out a task of separating data into pieces, encrypting that data, and mapping that data before distributing each piece called a Chunk independently across the SAFE Network. This ensures that any data stored, processed, and received has not been tampered with, seen by those without permission, or deleted unintentionally.

Each Vault is interacting with other Vaults using the existing infrastructure of the internet today. The internet had been originally designed to work in a manner that is decentralized, though the protocols and the hardware had not been up to par in order to host MAID. The hardware technology existing today and the existing infrastructures allow for any computation machine with a networking device that is running the MaidSafe client to be able to establish a direct connection to other Vaults in the network. The chain of connections to Vaults in the network is what creates the internet. So all Vaults eventually will only communicate with each other, managing each others’ connections and communication transmissions.

This is accomplished through the client listening and calling out to other clients on a continuous basis. When a call and listen occurs the two Vaults establish a direct connection between each other. This is all it takes to establish the network, two computation devices to desire decentralized interconnection and they will be paired. This evolutionary facet of SAFE Network utilization illuminates to us an interaction which allows us to have a network with Secure Access For Everyone.

by @happybeing

FYI while it is designed to provide secure anonymous services, is not a “commercial Tor” but rather a secure decentralised internet, running entirely independently (and very very much more securely) from the “old internet”.

For example, it provides all its own domain and routing services, does not propagate IP addresses, has no servers, and is entirely encrypted. The lack of exposed routing information, packet content, user ids or credentials, and particularly servers, makes it far harder to attack, but also, makes most attacks far less impactful and far less attractive - all those high value centralized lists of user data no longer exist, and no centralized caches of files, means no more Sony Hacks, no more cloud service hacks, or surveillance, or service suppression, no DoS attacks etc.

This makes it ideal for business and governments, who are already very exposed, and suffering increasingly from ever more embarrassing and damaging criminal and state sponsored hacking. And it is ideal for everyday users too of course!

Initial SAFE Network services will include pay once stored forever, secure anonymous storage (with Dropbox style sharing), secure anonymous communications, numerous third party apps (similar to Skype, YouTube, facebook etc).

It is how the internet should have been built (according to Marc Andreessen), and is fuelled by its own decentralised network of farmers, earning the built-in crypto currency (Safecoin) which is, unlike bitcoin and altcoins, not based on a blockchain, but uses its own decentralised ANT consensus technology, which promises to be both more secure (e.g from >75% network attacks), and highly scalable.

It has an extremely low cost of entry for developers, service providers and users, and many novel characteristics that make it an outstanding and highly innovative development - due to launch in the next few months.

For example, websites or services hosted on the network automatically scale with demand, at no cost to developers, so a tiny group or even individual can deploy services based purely on development costs, zero infrastructure costs, and so without the need to seek VC or other investment making it possible even for mass market services to be self funding. SAFE Network also has very low cost of entry because services such as data upload are paid for in Safecoin which can be earned by anyone, even using old hardware (unlike bitcoin where only specialist centralised miners are economic).

Clearly security services are going to find it harder to perform mass surveillance, and may complain about this, but it is essential we deliver a secure, robust internet for users, businesses, and governments (think health data for example).

Spies will simply be returned to the old targeted model of surveillance, which is actually far better for all: for users’ privacy, liberty and free expression, for oversight and accountability, for everyone’s security. Security is good. Security against criminal and state sponsored cyber attack creates stability that allows individuals, business and government to operate more effectively.

Oversight and accountability - which has rapidly been deteriorating - strengthens democracy and national security rather than undermining it! I sometimes wonder who the spies are really working for, they’ve made such a mess, rather than helping enhance online security.

SAFE Secure Access for Everyone

Since the design for SAFE Network includes several innovative and rigorously reviewed and tested methods in cryptography and obfuscation the MAID permits all people to connect with total security, privacy, and freedom. When a person accesses the SAFE Network they receive a packet of information. This packet must be decrypted using this person’s personal private key. Then that packet is encrypted again and sent to the MAID where the Vaults acting as Data Managers will validate this person and all of the access that this person has enabled since their start. This is remarkable because all people access the network using a key which will never be transmitted on the open network.

Once a person is authenticated in this thoroughly secured manner, they can do many things such as put a file onto the network to be stored. This file could be shared privately, shared publicly, and also kept private for just the user to keep on the network. Any file this person uploads could be accessed in the previously mentioned ways from anywhere in the world. The file can also be in any format, therefore sharing pictures, videos, html files, documents of any kind, software, and messages could each be stored securely.

Each file goes through the identical process as we described and understood in MAID; therefore, people assuredly have access to their files in any location around the globe. This opens up the doors to so many possibilities. Since the stored files could be of any nature developers can use the network to build applications for so many things such as web browsing, remote file storage, messaging, VoIP, video conferencing, social networking - basically anything that exists on the Internet today but with privacy, security and freedom built in from the start. Because of the MAID, users of the applications will be able to gain access from any device and if that device breaks or is corrupted, the data will still be safe and sound, accessible from any other device.

Anyone’s private data remains their own. We know that the protocols in MAID allow the SAFE Network to keep each person’s privacy first. Therefore files stored on SAFE Network by anyone are their own. It is the person who owns the files who decides how they are used, and who can see them.

Proof of Resource - Personal and Enterprise Utilization

To stabilize the network, MaidSafe provides its own ecosystem. Each person receives in return exactly what they provide to the network. As a person allocates their computational resources to the network through a Vault, they will be capable of using that space within the network. To facilitate this balance, the network uses a token to compensate for the resources being provided by each vault called Safecoin. People maintaining those vaults will then be able to upload their data correlated to the Safecoins they are earning. The more tokens a person has, the more resources are available for that person to use. If a person or business wants to upload more data then they are providing resources for, they can easily obtain more resources by increasing the resources they are providing to the network or obtaining more tokens from another person via trade or exchanging with cash.

The way in which the network compensates Vaults and the people running them is extremely granular. If someone only has access to a small device with minimal power, they will still be awarded safecoin for their participation. If a chunk of someone else’s data is able to be retrieved from this device, they are providing the resource. The more reliable a device storing data chunks is to the network, the higher the network will rank the Vault on the device and the more safecoin the person will earn.

In addition to issuing tokens to Vaults providing resource, the network’s ecosystem issues safecoin tokens to resourceful applications. This token mechanism for developers is the first in its kind and has a lot of potential for driving open source development. Rather than keeping application code behind closed doors, builders on the safe network can opt to keep their code open and earn safecoin for their efforts. There will be no need for open source developers to place advertisements or other distracting methods of sponsoring their work within applications anymore. There’s a lot of opportunity to set a precedent for prioritizing open source and clutter free software. If an application proves to be resourceful for the network and the people using it the network will compensate the builders in a similar programmatic fashion as vaults providing resources. Developers earn a living by default on the safe network.

This Massive Array of Internet Disks which allows for Secure Access for Everyone compensates the people directly for the resources which are provided to that network. This network inherently fosters wealth aggregation in a passive format, since anyone on the planet with a computational device and a networking device could provide useful resources to the SAFE network, and this network recognizes that and directly reciprocates.

It is important to note, that MaidSafe is all GPL, General Public License, it is a truly open source project. This means that the entire project is available to anyone on the planet to use. The team has been working thoroughly and rigorously to take on this monolithic task of implementing total Privacy, Security, and Freedom each step of the way. The goal of accomplishing this has been paramount and has priority number one on this team’s to do list. Concluding the release of the software the MaidSafe team will take on the role as everyone else on the network, and make their own applications, and participate in the network completely detached from their previous engagement of making this technology happen. The MaidSafe team will open the network possessing no SafeCoins, and will be earning them alongside everyone else just like everyone else. Project SAFE and the SafeCoins are for the people and this is the people’s network and it is built for the people to be owned and managed by the people.