价值互联网需要传递数据正本(原件)

唐·塔斯考特, 被称为数字经济之父,全球著名的新经济学家、和商业策略大师。他曾在TED做的关于区块链将如何改变未来金融的演讲,让人感受到区块链即将带来的颠覆和社会变革。他明确表示,第二代互联网,将有可能改变我们的金钱、贸易、和社会。何为第二代互联网?怎么去实现呢?我们来试分析其中的关键。

https://www.ted.com/talks/don_tapscott_how_the_blockchain_is_changing_money_and_business/transcript?language=zh-cn#t-88650)

第一、新一代价值互联网需要发送数据资产的正本(原件)

在唐·塔斯考特的演讲中,提及有关价值互联网的一段话,摘录如下:

过去的几十年里,我们迎来了互联网的信息时代。当我向你发送一封电子邮件,或一份PPT文件或者其他的时候,实际上我发送的并不是原始文件,我发送的是拷贝的副本。那可真棒。这是民主化的信息时代。但是如果牵涉到资产的话,比如说金钱,股票及债权等金融资产,股份,知识产权,音乐,艺术,一张选票,碳信用额等其他资产,发送一份副本真是个糟糕主意。如果我给了你100美元,我不再拥有这笔钱是很重要的。

中本聪通过创建比特币解决了数字通证的双花问题,更进一步,价值互联网需要解决互联网上所有数字资产的双花问题。

所谓价值互联网应该是一手交钱一手交货,它不是单纯Token的流转,更多价值来源于数字资产的转移,Token只是记账。今天众多区块链实现的只是传递Token,没有涉及背后数字资产的执行端。我们需要深入思考如下问题:1、web 2.0时代如何解决盗版? 2、数字内容在web 2.0时代是可以无限复制的,复制后的内容是一模一样的。请问在这样的互联网环境下如何创造稀缺?这两个问题不解决,如何真正实现“你拥有你的数据”(You Own Your Own Data)?例如:交换一个电影、游戏等数字资产,一般的区块链技术能实现这些数字资产安全且稀缺地流转吗?这可是个大问题!

因此,新一代价值互联网需要发送数据资产的正本(原件)。

第二、实现价值互联网的要求

首先, 数据的确权和保护。 数据可以通过自运行的区块链确权是一件非常伟大的事,然而在确权只是第一步,在此基础上还需要对数据进行保护,对违规行为进行监管和惩罚。

其次, 数据稀缺地流转。 要保证价值的唯一性,也就是数据从A转移到B时,需要从A那里消失然后转移到B这里。所以说,光有区块链的确权是无法保证价值流转的,同时也需要一个开源、公平、公正的数据物流系统。

智能经济时代的刚需是什么呢?需要一个安全、可信的互联网环境,需要数字资产在确权的基础上安全且稀缺地流转。如何利用区块链的优点结合互联网给消费者更多的诚信,带来真正的商业价值,这才是区块链+互联网的意义所在。

第三、亦来云项目的解决方案

区块链之所以可以传递价值就是因为基于一段双方可信的代码,是一个程序。基于这种思维, 在互联网上要做到防盗版,就需要将生产出来的数字内容打包成一个可执行代码,也就是一个小的程序,只有拥有相应的密钥才可以运行该程序。

这个程序并不通过第三方应用来运行(因这第三方应用就有可能作恶),可以直接在操作系统上运行。亦来云的操作系统是虚拟机操作系统,通过虚拟机技术(一个进程,就是一个地址空间的隔离)保证不上网,没有后台守护进程,不能装驱动,软件作恶的难度大大提高。亦来云系统可以把所有的数据变成程序,去掉了软件中介,就是去掉了二次盗版。

原有网络上传播的都是数据,而利用亦来云系统能在去中心化网络上传安全、可信的程序,这将是一个革命性的变革。

亦来云项目是一个庞大的项目,是从互联网架构重构的高度打造新一代互联网,要理解这个项目,实属不易。其实,我们可以将Elastos Smartweb看作一台计算机。在亦来云的架构中,Elastos Hive是硬盘驱动器;IPFS是程序和公共数据的公共存储;OneDrive、Google Drive和Home NAS是用于支持数百万用户个人存储的主目录;Elastos Carrier是Smartweb计算机主板上的“内部”总线,就像PC的PCI一样;手机是前台应用程序或者DApp的“dockers”(CPU)。有了这样的系统架构,新一代互联网才可能真正建设起来,才可能真正实现价值互联网的需求。

打造新一代互联网不能只依靠区块链,还需要有一个网络格局来看待通证经济的流转。亦来云通过构建一个去中心运营商(decentralized carrier)利用区块链构建起可信的互联网,实现信息和价值的安全流转,从而实现对用户数据和隐私的保驾护航,为智能经济搭建安全的基础设施。

4 Likes

Thank you for this write up :v:

Internet value : transfer the original data - (Dingyining)

Don Tascott, known as the father of the digital economy, is a world-renowned new economist and master of business strategy. He has lectured at TED about how the blockchain will change the future of finance, and it will make people feel the subversive and social changes that the blockchain is about to bring. He made it clear that the second generation of the Internet will have the potential to change our money, trade, and society. What is the second generation of the Internet? How to achieve it? Let’s try to analyze the key.

( https://www.ted.com/talks/don_tapscott_how_the_blockchain_is_changing_money_and_business/transcript?language=zh-cn#t-88650)

First, the new generation of value Internet needs to transfer the original of the data assets (original)

In Don Tascott’s speech, a passage about the value of the Internet is mentioned below:

In the past few decades, we have embraced the information age of the Internet. When I send you an email, or a PPT file or something else, I am actually not sending the original file, I am sending a copy of the copy. That’s awesome. This is a democratized information age. But if you are involved in assets, such as financial assets such as money, stocks and claims, shares, intellectual property, music, art, a ballot, carbon credits and other assets, it is a bad idea to send a copy. If I give you $100, it is important that I no longer own the money.

Nakamoto has solved the double-spending problem of digital pass-through by creating bitcoin. Further, the value of the Internet needs to solve the double-spending problem of all digital assets on the Internet.

The so-called value Internet should be hand-delivered with one hand. It is not simply the circulation of Token. More value comes from the transfer of digital assets. Token is just a bookkeeping. Today, many blockchains implement only tokens, and do not involve the execution side of the digital assets behind them. We need to think deeply about the following questions: 1. How to solve piracy in the web 2.0 era? 2. Digital content can be copied indefinitely in the web 2.0 era, and the copied content is exactly the same. How to create scarcity in such an Internet environment? These two questions are not resolved. How do you really achieve “You Own Your Own Data”? For example, to exchange digital assets such as movies and games, can the general blockchain technology realize the safe and scarce circulation of these digital assets? This is a big problem!

Therefore, the new generation of value Internet needs to send the original (original) of the data assets.

Second, the realization of the value of the Internet requirements

First, the data is confirmed and protected. It is a great thing that data can be determined through a self-running blockchain. However, the determination of rights is only the first step. On this basis, data needs to be protected to regulate and punish violations.

Second, the digital data scarcity. To ensure the uniqueness of the value, that is, when the data is transferred from A to B, it needs to disappear from A and then transfer to B. Therefore, the right to blockchain is not guaranteed to transfer value, but also requires an open source, fair and just data logistics system.

What is the just-in-time need for an intelligent economy? A secure, trusted Internet environment is needed that requires digital assets to flow safely and scarcely on the basis of security. How to take advantage of the blockchain combined with the Internet to give consumers more integrity and bring real business value, this is the significance of the blockchain + Internet.

Third, the solution to the cloud project

The reason the blockchain can pass value is because it is a program based on a piece of code that is trusted by both parties. Based on this thinking, to make an anti-piracy version on the Internet, it is necessary to package the produced digital content into an executable code, that is, a small program, and only have the corresponding key to run the program.

This program does not run through third-party applications (because this third-party application can do evil) and can run directly on the operating system. The operating system of the cloud is also a virtual machine operating system. Through the virtual machine technology (a process, that is, the isolation of an address space), it is guaranteed that there is no Internet access, there is no background daemon process, no driver can be installed, and the difficulty of software making evil is greatly improved. Also, the cloud system can turn all the data into programs, remove the software intermediary, and remove the second piracy.

Data is transmitted on the original network, and the use of the cloud system to upload secure and trusted programs on the decentralized network will be a revolutionary change.

The Elastos project is a huge project. It is to build a new generation of Internet from the height of Internet architecture reconstruction. It is not easy to understand this project. In fact, we can think of Elastos Smartweb as a computer. In the cloud architecture, Elastos Hive is a hard drive; IPFS is a public storage of programs and public data; OneDrive, Google Drive and Home NAS are home directories for supporting millions of users’ personal storage; Elastos Carrier is a Smartweb computer The “internal” bus on the motherboard is like the PCI of a PC; the phone is the “dockers” (CPU) of the foreground application or DApp. With such a system architecture, a new generation of Internet can be truly built, and it is possible to truly realize the demand for value Internet.

To build a new generation of Internet can not only rely on the blockchain, but also need a network structure to see the circulation of the pass-through economy. It also builds a trusted Internet by building a decentralized carrier to realize the secure flow of information and value, thereby ensuring the protection of user data and privacy, and building a secure economy. infrastructure.

1 Like