Holographic storage for distributed applications -- a validating monotonic DHT "backed" by authoritative hashchains for data provenance (a Ceptr sub-project) - holochain/holochain-proto
Lots of tech projects these days, especially crypto-networks, aspire to decentralization. Or their evangelists say they do, because they feel they need to. Decentralization is the new disruption—the…
This [talk] acknowledges the success of mobile social platforms, but shows the need to reinvent them with an open and peer-to-peer protocol. I talk about Scuttlebutt, and how to build apps using its tech stack, and I also highlight the importance of its ‘humane’ stack.
Inrupt’s dedicated team of developers, designers and business people have been working with a core of Solid experts and members of the open-source community to ensure it’s becoming robust, feature-rich and increasingly ready for wide-scale adoption.
Solid (derived from "social linked data") is a proposed set of conventions and tools for building decentralized social applications based on Linked Data principles. Solid is modular and extensible and it relies as much as possible on existing W3C standards and protocols.
What is the centralization that decentralized Web advocates are reacting against? Clearly, it is the domination of the Web by the FANG (Facebook, Amazon, Netflix, Google) and a few other large companies such as the cable oligopoly. These companies came to dominate the Web for economic not technological reasons.
Like XML, blockchains are kinda fundamentally misguided; they don't solve a problem that is actually important. XML solved syntax, which turned out not to be the problem. Blockchains [purport to] solve centralization, which will turn out not to be the problem.
The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work and when will it be here?
I've been skeptical at considerable length about the prospect of a decentralized Web [so] I was asked to summarize what would be needed for success apart from working technology.
Promether marks the end of surveillance and brings about a new era of online privacy,security, and anonymity. By merging blockchain technology, decentralized networks, and state-of-the-art encryption, Promether gives power and control back to the users.
Archive.org is testing a decentralized version, or DWeb version, of their web site that allows their content to be delivered over peer-to-peer connections with different hosts sharing portions of or the same content.
Finally after months of work we’re ready to “officially” present the DAppNode project to the community. Today is a special day that we hope signals the beginning of a new understanding of…
There’s plenty of buzz around the web 3.0 and the sweeping changes it will bring to the industry, but few people actually know why it spawned and what it will bring. To understand this, it’s…
Diaspora lässt dich deine Kontakte in Gruppen einordnen. Deine Fotos, Geschichten und Witze werden durch diese Aspekte nur mit den Menschen geteilt, für die sie gedacht sind – einzigartig bei Diaspora.
The past decade has seen a convergence of social and technological networks, with systems such as the World Wide Web characterized by the interplay between rich information content, the millions of individuals and organizations who create it, and the technology that supports it. This course covers recent research on the structure and analysis of such networks, and on models that abstract their basic properties. Topics include combinatorial and probabilistic techniques for link analysis, centralized and decentralized search algorithms, network models based on random graphs, and connections with work in the social sciences.
[Web] surfing mimics a postmodern, deconstructionist perspective by undermining the authority of texts...no longer awed by received authority...in the form of text, graphics, music or code...[web surfers will use them] for their own purposes.
The World Wide Database is a globally distributed network of data records that reside on millions of nodes around the network which collectively behaves as a giant virtual, decentralized database system...we need a new kind of server for hosting WWDB node
Building a centralized database to process billions of open-ended queries per day is a mammoth undertaking. It appears that Google, who perhaps is the only company on the planet with enough imagination, incentive, and expertise to effectively build such a
What information will be deemed Proprietary? What information is part of the Information Commons? Who decides? How is it decided? Centralized? Decentralized? Opaque? Transparent?
Emergent structure vs. intelligent design: This all reflects a fundamental if still incoherent debate. There's one school of thought that says that if you just collect enough data and throw enough algorithms at it, the inherent structure - and the underst
Hillis has bigger fish to fry than self-programming gadgets. In the past, he's expressed a desire to create machines that transcend what he sees as the limitations of human beings. "I guess I'm not overly perturbed by the prospect that there might be some
You maintain a blog at, say, livejournal.com (but this can be anything) and you stay logged in there usually. You go to leave a comment at someblog.com (perhaps it's Movable Type, or Wordpress, or DeadJournal, ...) and you don't have an account there, s
You maintain a blog at, say, livejournal.com (but this can be anything) and you stay logged in there usually. You go to leave a comment at someblog.com (perhaps it's Movable Type, or Wordpress, or DeadJournal, ...) and you don't have an account there, s
OpenID is a lightweight, decentralized identity system that has been gaining prominence. I expect this upcoming year to be a big year for OpenID -- and not just because of the Google trend chart with the recent uptake in search query share.
OpenID is a lightweight, decentralized identity system that has been gaining prominence. I expect this upcoming year to be a big year for OpenID -- and not just because of the Google trend chart with the recent uptake in search query share.
Here we explore social action. By social action we mean organized activity that seeks to improve human welfare, deepen civic culture and develop group life and commitment to others. Such a definition entails looking at the cultivation of a just and caring
Here we explore social action. By social action we mean organized activity that seeks to improve human welfare, deepen civic culture and develop group life and commitment to others. Such a definition entails looking at the cultivation of a just and caring
'Just doing it' - not waiting upon national governments and international organizations to take action - has led to a remarkable outpouring of initiatives around the global environmental crisis. We explore James Gustave Speth's vision of unscripted, volu
'Just doing it' - not waiting upon national governments and international organizations to take action - has led to a remarkable outpouring of initiatives around the global environmental crisis. We explore James Gustave Speth's vision of unscripted, volu
The Decentralized Information Group explores technical, institutional, and public policy questions necessary to advance the development of global, decentralized information environments. The Tabulator project is a generic Semantic Web data browser. Using
The Decentralized Information Group explores technical, institutional, and public policy questions necessary to advance the development of global, decentralized information environments. The Tabulator project is a generic Semantic Web data browser. Using
information theory and trillions of interconnected binary logic gates give the Internet far greater potential for enhancing social interactivity. They create a new high-bandwidth mode among or between communities in real, biological space, binding and ext
information theory and trillions of interconnected binary logic gates give the Internet far greater potential for enhancing social interactivity. They create a new high-bandwidth mode among or between communities in real, biological space, binding and ext
MoveOn.org and the Howard Dean campaign have pioneered new models for democratic, flexible, "network-centric" approaches, but many organizations stick resolutely to traditional "ego-centric" methods. There's a simmering tension between ego-centric thinkin
MoveOn.org and the Howard Dean campaign have pioneered new models for democratic, flexible, "network-centric" approaches, but many organizations stick resolutely to traditional "ego-centric" methods. There's a simmering tension between ego-centric thinkin
We need solutions that can help the many people whose terms and vocabulary are left out of the taxonomy... The simple idea that people’s actions model meaning better than a directory (even a flexible directory) is a critical step forward in thinking ab
We need solutions that can help the many people whose terms and vocabulary are left out of the taxonomy... The simple idea that people’s actions model meaning better than a directory (even a flexible directory) is a critical step forward in thinking ab
Hyperlinking is the foundation of the web. As users add new content, and new sites, it is bound in to the structure of the web by other users discovering the content and linking to it. Much as synapses form in the brain, with associations becoming stronge
Hyperlinking is the foundation of the web. As users add new content, and new sites, it is bound in to the structure of the web by other users discovering the content and linking to it. Much as synapses form in the brain, with associations becoming stronge
The emergence of P2P Inference Engines and domain-specific ontologies in Web 3.0 (aka Semantic Web) will present a major threat to the central “search” engine model. In Web 3.0 (aka Semantic Web) P2P Inference Engines running on millions of users’ P
The emergence of P2P Inference Engines and domain-specific ontologies in Web 3.0 (aka Semantic Web) will present a major threat to the central “search” engine model. In Web 3.0 (aka Semantic Web) P2P Inference Engines running on millions of users’ P
Web architecture from 50,000 feet up... decentralization and tolerance are the life and breath of Internet...If an engine of the future combines a reasoning engine with a search engine...able to construct proofs in a certain number of cases of very real i
Web architecture from 50,000 feet up... decentralization and tolerance are the life and breath of Internet...If an engine of the future combines a reasoning engine with a search engine...able to construct proofs in a certain number of cases of very real i
H. Nguyen, D. Bozhkov, Z. Ahmadi, N. Nguyen, and T. Doan. Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, ACM, (July 2022)
Narita. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue VI):
117-128(November 2019)1. Symantec, 2019 Internet Security Threat Report, Vol. 24, 2019. 2. Akamai, 2019 State of the Internet / Security: Media Under Assault, 2019. https://www.akamai.com 3. J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, “Effective Worm Detection for Various Scan Technique,” Journal of Computer Security, vol.14, no.4, pp.359–387, 2006. 4. W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An Invisible Localization Attack to Internet Threat Monitors,” IEEE Trans. Parallel and Distributed Systems, vol.20, no.11, pp.1611–1625, 2009. 5. M. Narita, K. Ogura, B.B. Bista, and T. Takata, “Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack,” Proc. 17th International Conference on Network-Based Information Systems (NBiS 2014), 2014. 6. M. Narita, B.B. Bista, and T. Takata, “A Practical Study on Noise-Tolerant PN Code-Based Localisation Attacks to Internet Threat Monitors,” Int. J. Space-Based and Situated Computing, vol.3, no.4, pp.215–226, December 2013. 7. W. Yu, S. Wei, G. Ma, X. Fu, and N. Zhang, “On Effective Localization Attacks Against Internet Threat Monitors,” Proc. 2013 IEEE International Conference on Communications (ICC), pp.2011–2015, 2013. 8. UCSD Network Telescope. https://www.caida.org/projects/network telescope/ 9. Guillot, R. Fontugne, P. Winter, P. Me´rindol, A. King, A. Dainotti, and C. Pelsser, “Chocolatine: Outage Detection for Internet Background Radiation,” 10. Proc. Network Traffic Measurement and Analysis Conference (TMA), June 2019. DShield. http://www.dshield.org/ 11. M. Eto, D. Inoue, J. Song, J. Nakazato, K. Ohtaka, and K. Nakao, “nicter: A Large-Scale Network Incident Analysis System: Case Studies for Understanding Threat Landscape,” Proc. 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.37–45, 2011. 12. D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, “DAEDALUS-VIZ: Novel Real-Time 3D Visualization for Darknet Monitoring-Based Alert System,” Proc. 9th International Symposium on Visualization for Cyber Security, pp.72–79, October 2012. 13. H. Kanehara, Y. Murakami, J. Shimamura, T. Takahashi, D. Inoue and N. Murata, “Real-time botnet detection using nonnegative tucker decomposition,” 14. Proc. the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1337–1344, April 2019. 15. X. Fan, C. Li, and X. Dong, “ A Real-Time Network Security Visualization System Based on Incremental Learning (ChinaVis 2018),” J. Visualization, pp.1–15, October 2018. 16. Y. Shinoda, K. Ikai, and M. Itoh, “Vulnerabilities of Passive Internet Threat Monitors,” Proc. 14th USENIX Security Symposium, pp.209–224, 2005. 17. J. Bethencourt, J. Franklin, and M. Vernon, “Mapping Internet Sensors with Probe Response Attacks,” Proc. 14th USENIX Security Symposium, pp.193– 208, 2005. 18. S. Wei, D. Shen, L. Ge, W. Yu, E.P. Blasch, K.D. Pham, and G. Chen, “Secured Network Sensor-Based Defense System,” Proc. SPIE 9469, Sensors and Systems for Space Applications VIII, 2015. 19. W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures,” IEEE Trans. Computers, vol.59, no.12, pp.1655–1668, 2010. 20. ENISA, “Proactive Detection of Network Security Incidents, Report,” https://www.enisa.europa.eu/2011. 21. M. Kamizono et al., “anti Malware engineering WorkShop ~MWS Datasets 2015~,” MWS2015, 2015..
C. Trattner, D. Helic, P. Singer, and M. Strohmaier. Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, page 14. ACM, (2012)