The three constituent elements of the Decentralized Computing Revolution

Excerpted from Gary Sharma:

“There are three technologies that will form the foundation of the decentralized computing stack — mesh networks (decentralized networking), block chain (decentralized transactions) and autonomous agents (decentralized decision making).

* Mesh networks

The traditional network architecture of the Internet is vulnerable. There is risk of accidental damage or deliberate disruption (e.g. 70 million J.P. Morgan Chase accounts got hacked last week). We’re at the mercy and whims of telecom providers (e.g. the net neutrality debate). And there is a risk of corporations wielding too much power and governments tracking and spying on users (e.g. the NSA).

Over the last few days, hundreds of thousands of pro-democracy protesters have been thronging the streets of Hong Kong. Many of them have been turning to a new kind of app to message each other through a network that doesn’t require Wi-Fi nodes or cell towers. The app, FireChat by OpenGarden, got over 100,000 signups in 24 hours and is underpinned by something called mesh networks.

Mesh networks are peer-to-peer networks created by daisy-chaining your phone (which becomes a router) to nearby phones using Bluetooth and Wi-Fi. Everyone joining the mesh network creates an extension of the Internet. The more devices or nodes, the stronger it becomes. They cannot be controlled by any central organization. There is no single IP to block. And governments can’t shut them down. They are decentralized, self-healing and remarkably resilient.

Mesh networks started taking off with the proliferation of smartphones (no additional hardware is required) and the introduction of Multipeer Connectivity (iOS 7.0 and onwards) and Wi-Fi Peer-to-Peer (Android 4.0 onwards). They’ve since been used in protests in Taiwan, Iran and Iraq, the annual Burning Man Festival in Black Rock Desert and even in Red Hook, a remote neighborhood in Brooklyn that had no mobile phone or Internet access when Hurricane Sandy struck.

* Block chain

You’ve probably heard of Bitcoin, the global, decentralized crypto-currency, which incidentally has also become the largest supercomputing network in the world. But Bitcoin is really an app built on top of a revolutionary bit of technology called the block chain, the first practical solution to an age-old problem in computing, the Byzantine Generals Problem (establishing trust between unrelated parties over an untrusted network like the Internet).

The block chain is essentially a giant distributed cryptographic ledger shared amongst all nodes participating in the network, and keeps a record of every single successful transaction. This allows for trustless transactional activity. It facilitates ownership, storage, transfer and processing of information without the need for a middleman or identity information clearinghouse.

What this really means is that transactions, identity verification, trust, reputation and payments become quantifiable and programmable.

And it opens up a whole range of possibilities:

Decentralized voting (e.g. Agora), where voters pay using a crypto-currency into an account representing their choice, with the winning candidate being one with highest balance.

Decentralized Domain Name Registration (DNS) (e.g. Namecoin) would be based on a crypto-currency model, and operate independently of ICANN (so technically immune from Internet censorship). Namecoin uses the .bit top-level domain.

Decentralized storage (e.g. Maidsafe and Storj), where trustless nodes would work together (using crypto-currencies as means of payment) to exchange storage space and bandwidth.

Smart self-validating contracts for real-time revenue sharing (e.g. Secure Asset Exchange); helping artists secure and verify their digital artwork by logging it in the block chain (e.g. Monegraph); and even decentralized Twitter-like P2P asynchronous messaging platforms (e.g. BitMessage and Twister).

Document certification (e.g. Proof of Existence) is a clever use of the block chain as a publicly visible and authenticated timestamp.

In fact, asset registries/keys that could theoretically be implemented in a block chain model are endless — land titles, private equities, mortgages, vehicle registries, passports, birth certificates, voter ids, gun permits, wills, escrows, degrees, car keys, house keys, patents, trademarks, coupons, genome data and even nuclear launch codes!

Companies like Ethereum and BitShares are now building their own, new block chains, platform and programming language to help developers build next-gen decentralized apps.

And just last week, a couple at Disney World had the first block chain marriage, recorded forever within the block chain!

* Autonomous agents

These are entities that make their own choices regarding how to act in their environment without influence of a central authority.

With decentralization, autonomous agents will play an increasingly important role in how things get done. They will be the brains and logic residing inside everything from driverless cars to delivery drones, from your bank accounts to your thermostats. They will operate individually or in a swarm. They will buy and sell services using crypto-currencies, pay their own costs to maintain and upgrade themselves and even replicate as they become profitable. They will be self-sustaining economic units — almost like mini-corporations, but without the bureaucracy.

Of course, as the decentralized computing revolution spreads, there will be legal, technical and social challenges.

Anonymity, a key component of the system, could encourage illegal activities. With rise of autonomous agents, questions regarding liability and accountability will be raised. And we have to be careful we don’t exchange the tyranny of gatekeepers for the tyranny of code.

But the transition to a global system that is decentralized, distributed, anonymous, efficient, secure, permission-less, trustless, resilient, frictionless, almost free, with no single point of control and no single point of failure… seems inevitable.”

Leave A Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.