Tags


#News [2]

DarkMatter and industrial IoT security

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers.

A certificate authority (CA) plays an important role in the public key infrastructure (PKI) which ensures secure communication over the internet. CAs are trusted entities that manage, issue and sign digital security certificates that...

Breaking new ground in IoT

After months of incubation we’re excited to start talking about our new, we believe groundbreaking, initiative: DiodeSM Incubating within Exosite, we’ve been working hard to fix some of the fundamental shortcomings of PKI that are underlying 99% of all Internet communication today.

For the first time now it becomes practical, with Diode, to use blockchain technology to eradicate the issues with PKI for IoT devices. Our technologies work even on low-end embedded devices and...

#Blockchain [21]

Diode Osaka Devcon V Recap

This month, Diode CTO Dominic Letz and marketing team attended DevCon 5 and several off-devcon events in Osaka, Japan. In addition to meeting leaders of the Ethereum community, we also took the opportunity to discuss the challenges in realizing the Web3 vision on Day 3 at the Amphitheater.

We had a great experience at the conference. It was a pleasure to meet Ethereum Research core team, developers of Remix,...

Diode Frequently Asked Questions

Below is a list of the most common questions about Diode and how to get the most out of our network. It includes all frequently asked questions about our decentralized blockchain for Internet-of-Things devices.

Additionally, you have a chance to be among the first to learn about the details of our blockchain-based decentralized PKI for IoT devices. Presentation slides discussing the vision of decentralized PKI and Diode Network are now publicly available on Github....

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as development tools and tutorials. We are also collecting feedback for our newly published research paper about BlockQuick, a super light client protocol for blockchain validation. DM us...

How The Experts Are Approaching The Intersection Of Blockchain And Iot

Blockchain and Internet of Things (IoT) technologies have each received a lot of attention from industry researchers and investors alike over the past few years. However, it is only recently that the two technologies have begun to be considered together allowing participants to reimagine the potential for both, blockchain and IoT.

The major benefit that IoT offers blockchain is in its ability to act as a bridge between the physical and the digital worlds. In...

Why Dns On Blockchain Is The Next Step After Dns Over Https

Last month, the trade association for internet service providers in the U.K. has nominated Mozilla for this year’s award of Internet Villain because Mozilla plans to support DNS-over-HTTPS that would bypass U.K. filtering obligations and parental controls, undermining internet standards in the U.K.

At Diode, we think Mozilla’s DNS-over-HTTPS in general is a good move for increasing the privacy of end-users; however, it is not the best option for protecting an open internet as...

Mitm Attacks And Why It's Time To Start Thinking About Decentralized Pki

Picture this: you’re sitting in a coffee shop with your laptop, and find yourself trying to connect to the internet, like most people, using a public wifi connection provided by the coffee shop. Wouldn’t it be nice to book a hotel room over the weekend, you ask your partner?

You click on an online reservation website, search for a hotel room to book, and you’re looking forward to the vacation. You may not be aware...

Vitalik Buterin At Radicalxchange Taipei On Harberger Taxes

On Tuesday (7/16), Vitalik Buterin, the creator of Ethereum, gave a 30-minute presentation entitled, “Harberger taxes for virtual property.” In his presentation (18 slides in English and Mandarin) at the first event of RadicalxChange Taipei, Vitalik looked at what Harberger taxes are and what are the ways to apply Harberger taxes for domain names. Vitalik’s presentation starts at 1:50:47 in the YouTube video.

Hardware Requirements Of Blockchain Clients

You just decided to start your next project using blockchain. That is awesome congrats! But now you face the many choices: Which blockchain platform and clients are technically suited for your use case?

Makers and IoT specialists know that when designing embedded systems it’s important to understand the technical parameters within which each component can work. The same is true when selecting the blockchain technology. Required storage capacity on the device, RAM usage, and bandwidth...

Blockquick Reputation System

China social credit system: the method to reward or punish citizens for their behavior is unclear

First announced in 2014, the Chinese government has been implementing a controversial social credit system. The system uses secret algorithms to evaluate the behavior of Chinese citizens, monitor their banking and social media information such as communications on popular chat app WeChat, violation of traffic rules, and countless other factors and criteria that the government is reluctant to...

Blockquick Consensus Reputation Table Explained

Download full paper here (PDF).

Diode’s CTO Dominic Letz published a paper recently to give an introduction of BlockQuick, a super light client protocol for blockchain validation on constrained devices. One of the key concepts behind the newly proposed BlockQuick is that it plans to adopt a consensus-based reputation scheme to accept blocks. This article explores how blockchain synchronization of Internet-of-Things (IoT) devices can be achieved through BlockQuick consensus reputation table, as...

Why The Internet Infrastructure Is Vulnerable To Bgp Hijacking Attacks

Earlier this month, Doug Madory, Oracle’s director of internet analysis, wrote in a blog post detailing a BGP route leak incident happened on Thursday, June 6. For approximately two hours, a massive amount of European Internet traffic was rerouted through China Telecom’s own servers. The Internet traffic was rerouted following a BGP route leak at Swiss data center colocation company Safe Host. Over 70,000 routes - comprising an estimated 368 millions IP addresses coming...

Messaging Service Telegram Was Hit By a DDoS Attack, What Needs to Change?

According to a report, Telegram’s CEO Pavel Durov confirmed on Wednesday (June 12) that his popular messaging service experienced a “powerful” Distributed Denial-of-Service (DDoS) attack. The DDoS attack disrupted Telegram’s services for about an hour. He later tweeted that the IP addresses involved in the attack were coming mostly from China.

“IP addresses coming mostly from China. Historically, all state actor-sized DDoS (200-400 Gb/s of junk) we experienced coincided in time with protests...

Proof Of Stakework A Community Vision

[Note: This post is a follow-on discussion to topics discussed in Introducing Proof-Of-StakeWork and requires some background knowledge in blockchain technology.]

In the last post on Proof-Of-StakeWork we talked about some of the advantages and disadvantages of both Proof-Of-Work (POW) and Proof-Of-Stake (POS) so I won’t go into those details here. The purpose of this post is to more fully articulate the vision and motivation behind Proof-Of-StakeWork (POSW) and to provide a little...

How Blockquick Super Light Client Protocol Can Help Mitigate Eclipse Attacks

In May, Diode’s CTO Dominic Letz published a paper introducing BlockQuick, a super light client protocol for blockchain validation on constrained devices. The paper shows that unlike other existing approaches such as proofs of proof-of-work (PoPoW) and FlyClient, Diode’s BlockQuick super light client protocol is capable of protecting against eclipse attacks and man-in-the-middle attacks on a peer-to-peer network. But what is an eclipse attack? Is it possible to prevent...

How Decentralized Public Key Infrastructure Will Be The Future For The Web

If you’ve been following our blog, you will have heard us mentioning the term decentralized public key infrastructure before. But you probably don’t know what it is or how it works, let alone why it matters so much. In this post, we will examine current approaches to the traditional centralized PKI, explore the basics of decentralized public key infrastructure (DPKI), and then show how blockchain-based DPKI can make an impact as the industry transitions...

Blockquick Super Light Blockchain Client For Trustless Time

- Click here if you just want to read the Paper -

In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device.

So let’s break that circular dependency between time and trust. The difference between trusting a person/an entity and trusting data is key here. How...

From Software Defined Networking to Blockchain Defined Networking

Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of rival cloud providers - for most of them, changing network configurations, adding/removing machines to a network required human interaction and would take hours or sometimes days. Dedicated networking, networking...

The impact of decentralized infrastructure on wireless communications

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the way to fully distributed infrastructure are also interesting. One of these applications is distributed wireless network operations.

For star topology wireless networks, as exists in today’s cellular communications paradigm, there are four primary things...

Introducing Proof-Of-StakeWork

[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.]

After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which their network will arrive at consensus. There are many different types of consensus protocols, but the vast majority of them can be placed into one of two buckets, Proof-of-Work (POW) or Proof-of-Stake (POS). Many...

Breaking new ground in IoT

After months of incubation we’re excited to start talking about our new, we believe groundbreaking, initiative: DiodeSM Incubating within Exosite, we’ve been working hard to fix some of the fundamental shortcomings of PKI that are underlying 99% of all Internet communication today.

For the first time now it becomes practical, with Diode, to use blockchain technology to eradicate the issues with PKI for IoT devices. Our technologies work even on low-end embedded devices and...

#Burning Platform [6]

Kazakhstan Mitm Can Be Prevented With Decentralized Pki

OMG! So it happens again. PKI the Public Key Infrastructure is a centrally rooted security infrastructure to encrypt nearly all of todays internet traffic. And is being used to crack all traffic in Kazakhstan.

Yesterday on the 18h of July 2019, the state-owned telecommunications organization of Kazakhstan started to misuse this central infrastructure in the states initiative against free speech. The now dictatorship of Kazakhstan is forcing its users to install a custom Kazakhstan root...

Blockquick Super Light Blockchain Client For Trustless Time

- Click here if you just want to read the Paper -

In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device.

So let’s break that circular dependency between time and trust. The difference between trusting a person/an entity and trusting data is key here. How...

Why We Can't Trust Network Time

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.”
“ I don’t know what you mean,” said Alice.
“ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland

In order to trust a time source, we need to validate its...

Why there are 3652 organizations that can read everyone's encrypted traffic

You may not be aware of this but if you are browsing the web or running IoT devices in your business or at your home, you are being protected by a 30-year-old security infrastructure. In this post, we will uncover the history of the internet PKI that holds most of the internet together today and highlight some of the most obvious threats and known flaws. This article is the first in a series investigating the...

Decentralized PKI in a nutshell

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.

A single miss like a domain name server pointing to a different server...

DarkMatter and industrial IoT security

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers.

A certificate authority (CA) plays an important role in the public key infrastructure (PKI) which ensures secure communication over the internet. CAs are trusted entities that manage, issue and sign digital security certificates that...

#PKI [9]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as development tools and tutorials. We are also collecting feedback for our newly published research paper about BlockQuick, a super light client protocol for blockchain validation. DM us...

Mitm Attacks And Why It's Time To Start Thinking About Decentralized Pki

Picture this: you’re sitting in a coffee shop with your laptop, and find yourself trying to connect to the internet, like most people, using a public wifi connection provided by the coffee shop. Wouldn’t it be nice to book a hotel room over the weekend, you ask your partner?

You click on an online reservation website, search for a hotel room to book, and you’re looking forward to the vacation. You may not be aware...

Kazakhstan Mitm Can Be Prevented With Decentralized Pki

OMG! So it happens again. PKI the Public Key Infrastructure is a centrally rooted security infrastructure to encrypt nearly all of todays internet traffic. And is being used to crack all traffic in Kazakhstan.

Yesterday on the 18h of July 2019, the state-owned telecommunications organization of Kazakhstan started to misuse this central infrastructure in the states initiative against free speech. The now dictatorship of Kazakhstan is forcing its users to install a custom Kazakhstan root...

How Decentralized Public Key Infrastructure Will Be The Future For The Web

If you’ve been following our blog, you will have heard us mentioning the term decentralized public key infrastructure before. But you probably don’t know what it is or how it works, let alone why it matters so much. In this post, we will examine current approaches to the traditional centralized PKI, explore the basics of decentralized public key infrastructure (DPKI), and then show how blockchain-based DPKI can make an impact as the industry transitions...

The impact of decentralized infrastructure on wireless communications

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the way to fully distributed infrastructure are also interesting. One of these applications is distributed wireless network operations.

For star topology wireless networks, as exists in today’s cellular communications paradigm, there are four primary things...

Why there are 3652 organizations that can read everyone's encrypted traffic

You may not be aware of this but if you are browsing the web or running IoT devices in your business or at your home, you are being protected by a 30-year-old security infrastructure. In this post, we will uncover the history of the internet PKI that holds most of the internet together today and highlight some of the most obvious threats and known flaws. This article is the first in a series investigating the...

Decentralized PKI in a nutshell

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.

A single miss like a domain name server pointing to a different server...

How the End of Mining Could Lead to the ‘Uberization’ of Infrastructure

The public was aghast back in early 2018 when PwC Bitcoin specialist Alex de Vries estimated that Bitcoin servers consume more than 22 terawatt-hours of electricity per year which is comparable to entire countries such as Austria and Ireland.

To many, this was a brewing crisis that if left unchecked would render blockchains unscalable and unsustainable Even Bitcoin’s strongest supporters recognized that the energy consumption issue presented a barrier to growth and mainstream...

DarkMatter and industrial IoT security

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers.

A certificate authority (CA) plays an important role in the public key infrastructure (PKI) which ensures secure communication over the internet. CAs are trusted entities that manage, issue and sign digital security certificates that...

#Industrial IoT [2]

How the End of Mining Could Lead to the ‘Uberization’ of Infrastructure

The public was aghast back in early 2018 when PwC Bitcoin specialist Alex de Vries estimated that Bitcoin servers consume more than 22 terawatt-hours of electricity per year which is comparable to entire countries such as Austria and Ireland.

To many, this was a brewing crisis that if left unchecked would render blockchains unscalable and unsustainable Even Bitcoin’s strongest supporters recognized that the energy consumption issue presented a barrier to growth and mainstream...

DarkMatter and industrial IoT security

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers.

A certificate authority (CA) plays an important role in the public key infrastructure (PKI) which ensures secure communication over the internet. CAs are trusted entities that manage, issue and sign digital security certificates that...

#Distributed Infrastructure [6]

Why Dns On Blockchain Is The Next Step After Dns Over Https

Last month, the trade association for internet service providers in the U.K. has nominated Mozilla for this year’s award of Internet Villain because Mozilla plans to support DNS-over-HTTPS that would bypass U.K. filtering obligations and parental controls, undermining internet standards in the U.K.

At Diode, we think Mozilla’s DNS-over-HTTPS in general is a good move for increasing the privacy of end-users; however, it is not the best option for protecting an open internet as...

How Decentralized Public Key Infrastructure Will Be The Future For The Web

If you’ve been following our blog, you will have heard us mentioning the term decentralized public key infrastructure before. But you probably don’t know what it is or how it works, let alone why it matters so much. In this post, we will examine current approaches to the traditional centralized PKI, explore the basics of decentralized public key infrastructure (DPKI), and then show how blockchain-based DPKI can make an impact as the industry transitions...

From Software Defined Networking to Blockchain Defined Networking

Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of rival cloud providers - for most of them, changing network configurations, adding/removing machines to a network required human interaction and would take hours or sometimes days. Dedicated networking, networking...

The impact of decentralized infrastructure on wireless communications

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the way to fully distributed infrastructure are also interesting. One of these applications is distributed wireless network operations.

For star topology wireless networks, as exists in today’s cellular communications paradigm, there are four primary things...

Decentralized PKI in a nutshell

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.

A single miss like a domain name server pointing to a different server...

How the End of Mining Could Lead to the ‘Uberization’ of Infrastructure

The public was aghast back in early 2018 when PwC Bitcoin specialist Alex de Vries estimated that Bitcoin servers consume more than 22 terawatt-hours of electricity per year which is comparable to entire countries such as Austria and Ireland.

To many, this was a brewing crisis that if left unchecked would render blockchains unscalable and unsustainable Even Bitcoin’s strongest supporters recognized that the energy consumption issue presented a barrier to growth and mainstream...

#Development [3]

Hardware Requirements Of Blockchain Clients

You just decided to start your next project using blockchain. That is awesome congrats! But now you face the many choices: Which blockchain platform and clients are technically suited for your use case?

Makers and IoT specialists know that when designing embedded systems it’s important to understand the technical parameters within which each component can work. The same is true when selecting the blockchain technology. Required storage capacity on the device, RAM usage, and bandwidth...

Decentralized PKI in a nutshell

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.

A single miss like a domain name server pointing to a different server...

#Security [12]

Why Dns On Blockchain Is The Next Step After Dns Over Https

Last month, the trade association for internet service providers in the U.K. has nominated Mozilla for this year’s award of Internet Villain because Mozilla plans to support DNS-over-HTTPS that would bypass U.K. filtering obligations and parental controls, undermining internet standards in the U.K.

At Diode, we think Mozilla’s DNS-over-HTTPS in general is a good move for increasing the privacy of end-users; however, it is not the best option for protecting an open internet as...

Mitm Attacks And Why It's Time To Start Thinking About Decentralized Pki

Picture this: you’re sitting in a coffee shop with your laptop, and find yourself trying to connect to the internet, like most people, using a public wifi connection provided by the coffee shop. Wouldn’t it be nice to book a hotel room over the weekend, you ask your partner?

You click on an online reservation website, search for a hotel room to book, and you’re looking forward to the vacation. You may not be aware...

Why The Internet Infrastructure Is Vulnerable To Bgp Hijacking Attacks

Earlier this month, Doug Madory, Oracle’s director of internet analysis, wrote in a blog post detailing a BGP route leak incident happened on Thursday, June 6. For approximately two hours, a massive amount of European Internet traffic was rerouted through China Telecom’s own servers. The Internet traffic was rerouted following a BGP route leak at Swiss data center colocation company Safe Host. Over 70,000 routes - comprising an estimated 368 millions IP addresses coming...

Messaging Service Telegram Was Hit By a DDoS Attack, What Needs to Change?

According to a report, Telegram’s CEO Pavel Durov confirmed on Wednesday (June 12) that his popular messaging service experienced a “powerful” Distributed Denial-of-Service (DDoS) attack. The DDoS attack disrupted Telegram’s services for about an hour. He later tweeted that the IP addresses involved in the attack were coming mostly from China.

“IP addresses coming mostly from China. Historically, all state actor-sized DDoS (200-400 Gb/s of junk) we experienced coincided in time with protests...

How Blockquick Super Light Client Protocol Can Help Mitigate Eclipse Attacks

In May, Diode’s CTO Dominic Letz published a paper introducing BlockQuick, a super light client protocol for blockchain validation on constrained devices. The paper shows that unlike other existing approaches such as proofs of proof-of-work (PoPoW) and FlyClient, Diode’s BlockQuick super light client protocol is capable of protecting against eclipse attacks and man-in-the-middle attacks on a peer-to-peer network. But what is an eclipse attack? Is it possible to prevent...

How Decentralized Public Key Infrastructure Will Be The Future For The Web

If you’ve been following our blog, you will have heard us mentioning the term decentralized public key infrastructure before. But you probably don’t know what it is or how it works, let alone why it matters so much. In this post, we will examine current approaches to the traditional centralized PKI, explore the basics of decentralized public key infrastructure (DPKI), and then show how blockchain-based DPKI can make an impact as the industry transitions...

Blockquick Super Light Blockchain Client For Trustless Time

- Click here if you just want to read the Paper -

In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device.

So let’s break that circular dependency between time and trust. The difference between trusting a person/an entity and trusting data is key here. How...

From Software Defined Networking to Blockchain Defined Networking

Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of rival cloud providers - for most of them, changing network configurations, adding/removing machines to a network required human interaction and would take hours or sometimes days. Dedicated networking, networking...

The impact of decentralized infrastructure on wireless communications

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the way to fully distributed infrastructure are also interesting. One of these applications is distributed wireless network operations.

For star topology wireless networks, as exists in today’s cellular communications paradigm, there are four primary things...

Why We Can't Trust Network Time

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.”
“ I don’t know what you mean,” said Alice.
“ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland

In order to trust a time source, we need to validate its...

Why there are 3652 organizations that can read everyone's encrypted traffic

You may not be aware of this but if you are browsing the web or running IoT devices in your business or at your home, you are being protected by a 30-year-old security infrastructure. In this post, we will uncover the history of the internet PKI that holds most of the internet together today and highlight some of the most obvious threats and known flaws. This article is the first in a series investigating the...

Decentralized PKI in a nutshell

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.

A single miss like a domain name server pointing to a different server...

#Time [2]

Blockquick Super Light Blockchain Client For Trustless Time

- Click here if you just want to read the Paper -

In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device.

So let’s break that circular dependency between time and trust. The difference between trusting a person/an entity and trusting data is key here. How...

Why We Can't Trust Network Time

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.”
“ I don’t know what you mean,” said Alice.
“ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland

In order to trust a time source, we need to validate its...

#Mining [2]

Proof Of Stakework A Community Vision

[Note: This post is a follow-on discussion to topics discussed in Introducing Proof-Of-StakeWork and requires some background knowledge in blockchain technology.]

In the last post on Proof-Of-StakeWork we talked about some of the advantages and disadvantages of both Proof-Of-Work (POW) and Proof-Of-Stake (POS) so I won’t go into those details here. The purpose of this post is to more fully articulate the vision and motivation behind Proof-Of-StakeWork (POSW) and to provide a little...

Introducing Proof-Of-StakeWork

[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.]

After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which their network will arrive at consensus. There are many different types of consensus protocols, but the vast majority of them can be placed into one of two buckets, Proof-of-Work (POW) or Proof-of-Stake (POS). Many...

#Proof-Of-StakeWork [2]

Proof Of Stakework A Community Vision

[Note: This post is a follow-on discussion to topics discussed in Introducing Proof-Of-StakeWork and requires some background knowledge in blockchain technology.]

In the last post on Proof-Of-StakeWork we talked about some of the advantages and disadvantages of both Proof-Of-Work (POW) and Proof-Of-Stake (POS) so I won’t go into those details here. The purpose of this post is to more fully articulate the vision and motivation behind Proof-Of-StakeWork (POSW) and to provide a little...

Introducing Proof-Of-StakeWork

[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.]

After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which their network will arrive at consensus. There are many different types of consensus protocols, but the vast majority of them can be placed into one of two buckets, Proof-of-Work (POW) or Proof-of-Stake (POS). Many...

#Wireless Communications [1]

The impact of decentralized infrastructure on wireless communications

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the way to fully distributed infrastructure are also interesting. One of these applications is distributed wireless network operations.

For star topology wireless networks, as exists in today’s cellular communications paradigm, there are four primary things...

#IoT [4]

How The Experts Are Approaching The Intersection Of Blockchain And Iot

Blockchain and Internet of Things (IoT) technologies have each received a lot of attention from industry researchers and investors alike over the past few years. However, it is only recently that the two technologies have begun to be considered together allowing participants to reimagine the potential for both, blockchain and IoT.

The major benefit that IoT offers blockchain is in its ability to act as a bridge between the physical and the digital worlds. In...

Hardware Requirements Of Blockchain Clients

You just decided to start your next project using blockchain. That is awesome congrats! But now you face the many choices: Which blockchain platform and clients are technically suited for your use case?

Makers and IoT specialists know that when designing embedded systems it’s important to understand the technical parameters within which each component can work. The same is true when selecting the blockchain technology. Required storage capacity on the device, RAM usage, and bandwidth...

The impact of decentralized infrastructure on wireless communications

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the way to fully distributed infrastructure are also interesting. One of these applications is distributed wireless network operations.

For star topology wireless networks, as exists in today’s cellular communications paradigm, there are four primary things...

#BDN [1]

From Software Defined Networking to Blockchain Defined Networking

Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of rival cloud providers - for most of them, changing network configurations, adding/removing machines to a network required human interaction and would take hours or sometimes days. Dedicated networking, networking...

#DPKI [4]

Diode Frequently Asked Questions

Below is a list of the most common questions about Diode and how to get the most out of our network. It includes all frequently asked questions about our decentralized blockchain for Internet-of-Things devices.

Additionally, you have a chance to be among the first to learn about the details of our blockchain-based decentralized PKI for IoT devices. Presentation slides discussing the vision of decentralized PKI and Diode Network are now publicly available on Github....

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as development tools and tutorials. We are also collecting feedback for our newly published research paper about BlockQuick, a super light client protocol for blockchain validation. DM us...

Mitm Attacks And Why It's Time To Start Thinking About Decentralized Pki

Picture this: you’re sitting in a coffee shop with your laptop, and find yourself trying to connect to the internet, like most people, using a public wifi connection provided by the coffee shop. Wouldn’t it be nice to book a hotel room over the weekend, you ask your partner?

You click on an online reservation website, search for a hotel room to book, and you’re looking forward to the vacation. You may not be aware...

How Decentralized Public Key Infrastructure Will Be The Future For The Web

If you’ve been following our blog, you will have heard us mentioning the term decentralized public key infrastructure before. But you probably don’t know what it is or how it works, let alone why it matters so much. In this post, we will examine current approaches to the traditional centralized PKI, explore the basics of decentralized public key infrastructure (DPKI), and then show how blockchain-based DPKI can make an impact as the industry transitions...

#Eclipse Attack [1]

How Blockquick Super Light Client Protocol Can Help Mitigate Eclipse Attacks

In May, Diode’s CTO Dominic Letz published a paper introducing BlockQuick, a super light client protocol for blockchain validation on constrained devices. The paper shows that unlike other existing approaches such as proofs of proof-of-work (PoPoW) and FlyClient, Diode’s BlockQuick super light client protocol is capable of protecting against eclipse attacks and man-in-the-middle attacks on a peer-to-peer network. But what is an eclipse attack? Is it possible to prevent...

#DDoS [1]

Messaging Service Telegram Was Hit By a DDoS Attack, What Needs to Change?

According to a report, Telegram’s CEO Pavel Durov confirmed on Wednesday (June 12) that his popular messaging service experienced a “powerful” Distributed Denial-of-Service (DDoS) attack. The DDoS attack disrupted Telegram’s services for about an hour. He later tweeted that the IP addresses involved in the attack were coming mostly from China.

“IP addresses coming mostly from China. Historically, all state actor-sized DDoS (200-400 Gb/s of junk) we experienced coincided in time with protests...

#Decentralized Web [1]

Messaging Service Telegram Was Hit By a DDoS Attack, What Needs to Change?

According to a report, Telegram’s CEO Pavel Durov confirmed on Wednesday (June 12) that his popular messaging service experienced a “powerful” Distributed Denial-of-Service (DDoS) attack. The DDoS attack disrupted Telegram’s services for about an hour. He later tweeted that the IP addresses involved in the attack were coming mostly from China.

“IP addresses coming mostly from China. Historically, all state actor-sized DDoS (200-400 Gb/s of junk) we experienced coincided in time with protests...

#BGP Hijacking [1]

Why The Internet Infrastructure Is Vulnerable To Bgp Hijacking Attacks

Earlier this month, Doug Madory, Oracle’s director of internet analysis, wrote in a blog post detailing a BGP route leak incident happened on Thursday, June 6. For approximately two hours, a massive amount of European Internet traffic was rerouted through China Telecom’s own servers. The Internet traffic was rerouted following a BGP route leak at Swiss data center colocation company Safe Host. Over 70,000 routes - comprising an estimated 368 millions IP addresses coming...

#Blockquick [3]

Hardware Requirements Of Blockchain Clients

You just decided to start your next project using blockchain. That is awesome congrats! But now you face the many choices: Which blockchain platform and clients are technically suited for your use case?

Makers and IoT specialists know that when designing embedded systems it’s important to understand the technical parameters within which each component can work. The same is true when selecting the blockchain technology. Required storage capacity on the device, RAM usage, and bandwidth...

Blockquick Reputation System

China social credit system: the method to reward or punish citizens for their behavior is unclear

First announced in 2014, the Chinese government has been implementing a controversial social credit system. The system uses secret algorithms to evaluate the behavior of Chinese citizens, monitor their banking and social media information such as communications on popular chat app WeChat, violation of traffic rules, and countless other factors and criteria that the government is reluctant to...

Blockquick Consensus Reputation Table Explained

Download full paper here (PDF).

Diode’s CTO Dominic Letz published a paper recently to give an introduction of BlockQuick, a super light client protocol for blockchain validation on constrained devices. One of the key concepts behind the newly proposed BlockQuick is that it plans to adopt a consensus-based reputation scheme to accept blocks. This article explores how blockchain synchronization of Internet-of-Things (IoT) devices can be achieved through BlockQuick consensus reputation table, as...

#Consensus Reputation Table [1]

Blockquick Consensus Reputation Table Explained

Download full paper here (PDF).

Diode’s CTO Dominic Letz published a paper recently to give an introduction of BlockQuick, a super light client protocol for blockchain validation on constrained devices. One of the key concepts behind the newly proposed BlockQuick is that it plans to adopt a consensus-based reputation scheme to accept blocks. This article explores how blockchain synchronization of Internet-of-Things (IoT) devices can be achieved through BlockQuick consensus reputation table, as...

#Reputation [1]

Blockquick Reputation System

China social credit system: the method to reward or punish citizens for their behavior is unclear

First announced in 2014, the Chinese government has been implementing a controversial social credit system. The system uses secret algorithms to evaluate the behavior of Chinese citizens, monitor their banking and social media information such as communications on popular chat app WeChat, violation of traffic rules, and countless other factors and criteria that the government is reluctant to...

#Harberger taxes [1]

Vitalik Buterin At Radicalxchange Taipei On Harberger Taxes

On Tuesday (7/16), Vitalik Buterin, the creator of Ethereum, gave a 30-minute presentation entitled, “Harberger taxes for virtual property.” In his presentation (18 slides in English and Mandarin) at the first event of RadicalxChange Taipei, Vitalik looked at what Harberger taxes are and what are the ways to apply Harberger taxes for domain names. Vitalik’s presentation starts at 1:50:47 in the YouTube video.

#Decentralization [4]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as development tools and tutorials. We are also collecting feedback for our newly published research paper about BlockQuick, a super light client protocol for blockchain validation. DM us...

Mitm Attacks And Why It's Time To Start Thinking About Decentralized Pki

Picture this: you’re sitting in a coffee shop with your laptop, and find yourself trying to connect to the internet, like most people, using a public wifi connection provided by the coffee shop. Wouldn’t it be nice to book a hotel room over the weekend, you ask your partner?

You click on an online reservation website, search for a hotel room to book, and you’re looking forward to the vacation. You may not be aware...

Kazakhstan Mitm Can Be Prevented With Decentralized Pki

OMG! So it happens again. PKI the Public Key Infrastructure is a centrally rooted security infrastructure to encrypt nearly all of todays internet traffic. And is being used to crack all traffic in Kazakhstan.

Yesterday on the 18h of July 2019, the state-owned telecommunications organization of Kazakhstan started to misuse this central infrastructure in the states initiative against free speech. The now dictatorship of Kazakhstan is forcing its users to install a custom Kazakhstan root...

Vitalik Buterin At Radicalxchange Taipei On Harberger Taxes

On Tuesday (7/16), Vitalik Buterin, the creator of Ethereum, gave a 30-minute presentation entitled, “Harberger taxes for virtual property.” In his presentation (18 slides in English and Mandarin) at the first event of RadicalxChange Taipei, Vitalik looked at what Harberger taxes are and what are the ways to apply Harberger taxes for domain names. Vitalik’s presentation starts at 1:50:47 in the YouTube video.

#Resources [1]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as development tools and tutorials. We are also collecting feedback for our newly published research paper about BlockQuick, a super light client protocol for blockchain validation. DM us...

#Reading list [1]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as development tools and tutorials. We are also collecting feedback for our newly published research paper about BlockQuick, a super light client protocol for blockchain validation. DM us...

#Web3 [2]

Diode Osaka Devcon V Recap

This month, Diode CTO Dominic Letz and marketing team attended DevCon 5 and several off-devcon events in Osaka, Japan. In addition to meeting leaders of the Ethereum community, we also took the opportunity to discuss the challenges in realizing the Web3 vision on Day 3 at the Amphitheater.

We had a great experience at the conference. It was a pleasure to meet Ethereum Research core team, developers of Remix,...

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as development tools and tutorials. We are also collecting feedback for our newly published research paper about BlockQuick, a super light client protocol for blockchain validation. DM us...

#Ethereum [4]

Diode Osaka Devcon V Recap

This month, Diode CTO Dominic Letz and marketing team attended DevCon 5 and several off-devcon events in Osaka, Japan. In addition to meeting leaders of the Ethereum community, we also took the opportunity to discuss the challenges in realizing the Web3 vision on Day 3 at the Amphitheater.

We had a great experience at the conference. It was a pleasure to meet Ethereum Research core team, developers of Remix,...

Diode Frequently Asked Questions

Below is a list of the most common questions about Diode and how to get the most out of our network. It includes all frequently asked questions about our decentralized blockchain for Internet-of-Things devices.

Additionally, you have a chance to be among the first to learn about the details of our blockchain-based decentralized PKI for IoT devices. Presentation slides discussing the vision of decentralized PKI and Diode Network are now publicly available on Github....

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as development tools and tutorials. We are also collecting feedback for our newly published research paper about BlockQuick, a super light client protocol for blockchain validation. DM us...

#Diode [3]

Diode Osaka Devcon V Recap

This month, Diode CTO Dominic Letz and marketing team attended DevCon 5 and several off-devcon events in Osaka, Japan. In addition to meeting leaders of the Ethereum community, we also took the opportunity to discuss the challenges in realizing the Web3 vision on Day 3 at the Amphitheater.

We had a great experience at the conference. It was a pleasure to meet Ethereum Research core team, developers of Remix,...

Diode Frequently Asked Questions

Below is a list of the most common questions about Diode and how to get the most out of our network. It includes all frequently asked questions about our decentralized blockchain for Internet-of-Things devices.

Additionally, you have a chance to be among the first to learn about the details of our blockchain-based decentralized PKI for IoT devices. Presentation slides discussing the vision of decentralized PKI and Diode Network are now publicly available on Github....

#FAQ [1]

Diode Frequently Asked Questions

Below is a list of the most common questions about Diode and how to get the most out of our network. It includes all frequently asked questions about our decentralized blockchain for Internet-of-Things devices.

Additionally, you have a chance to be among the first to learn about the details of our blockchain-based decentralized PKI for IoT devices. Presentation slides discussing the vision of decentralized PKI and Diode Network are now publicly available on Github....

#Diode Network [1]

Diode Frequently Asked Questions

Below is a list of the most common questions about Diode and how to get the most out of our network. It includes all frequently asked questions about our decentralized blockchain for Internet-of-Things devices.

Additionally, you have a chance to be among the first to learn about the details of our blockchain-based decentralized PKI for IoT devices. Presentation slides discussing the vision of decentralized PKI and Diode Network are now publicly available on Github....

#Diode Chain [1]

Diode Frequently Asked Questions

Below is a list of the most common questions about Diode and how to get the most out of our network. It includes all frequently asked questions about our decentralized blockchain for Internet-of-Things devices.

Additionally, you have a chance to be among the first to learn about the details of our blockchain-based decentralized PKI for IoT devices. Presentation slides discussing the vision of decentralized PKI and Diode Network are now publicly available on Github....

#BlockQuick [1]

Diode Frequently Asked Questions

Below is a list of the most common questions about Diode and how to get the most out of our network. It includes all frequently asked questions about our decentralized blockchain for Internet-of-Things devices.

Additionally, you have a chance to be among the first to learn about the details of our blockchain-based decentralized PKI for IoT devices. Presentation slides discussing the vision of decentralized PKI and Diode Network are now publicly available on Github....

#Devcon [1]

Diode Osaka Devcon V Recap

This month, Diode CTO Dominic Letz and marketing team attended DevCon 5 and several off-devcon events in Osaka, Japan. In addition to meeting leaders of the Ethereum community, we also took the opportunity to discuss the challenges in realizing the Web3 vision on Day 3 at the Amphitheater.

We had a great experience at the conference. It was a pleasure to meet Ethereum Research core team, developers of Remix,...