Why Blockchain Provides Cyber Resilience

Why blockchain provides cyber resilience by Clive Boulton

Following a speaker series started by Duff & Phelps on Why Cyber Resilience Trumps Cyber Security. We at CertifiedTrue continued with Why Blockchain provides cyber resilience. How it works, and why it matters.

We went back to the well and reprised Satoshi Nakamoto’s 2008 bitcoin paper. The IT audience asked many questions allowing us to give examples of how Satoshi’s work is implemented in our CertNet blockchain. We all enjoyed discussing why blockchain provides cyber resilience.

CertifiedTrue Dev Update #001

The latest pre-alpha development version implements Hyperledger Sawtooth Seth (an abstracted implementation of Hyperledger Burrow), an EVM based blockchain system. As a first step of integration, we introduce the CertNet v0.1 of it’s PoCA (Proof of Certified Access) Transaction Processor. The python version implements the Hyperledger Sawtooth SDK and uses protobufs to enable configuration.

The Transaction Processor is the communication bridge between the Client Application and the Blockchain/Smart Contract. Here the TP encodes and signs the query/payload and all the function calls that are submitted to the Blockchain/EVM in signed Batches.

The batches are nothing but a set of signed transactions that are submitted to the Smart Contract which in-turn attains consensus on finality. The transactions then become immutable upon consensus. The TP’s enable a communication channel that allows the client app to communicate with the deployed Smart Contract.

The current CertNet TP implements the initial PoCA verification steps like account declaration, and various Network Tests like Data Latency and Ping Distance to classify healthy nodes in the network. These tests are intended to orchestrate a functional system that meets the standards set forth by CertifiedTrue.

Privacy and Confidentiality in Blockchains

Connections between memory safety and privacy confidentiality by Clive Boulton

Ahead of a Hyperledger Architecture Working Group meeting on Privacy and Confidentiality at Oracle HQ. We contributed reprised research into the Connections between Memory Safety and Privacy/Confidentiality. Making well informed choices can reduce the surface attack area. Allowing for clear focus on adversarial consensus models.

  1. (Adaptive Byzantine adversary) the adversary can actively and adaptively control up to k nodes (cumulatively) on the network.
  2. (Selective Byzantine adversary) the adversary can selectively corrupt k nodes at the beginning of the protocol. All other nodes are assumed to be honest.
  3. (Adaptive crash fault tolerance) the adversary may cause up to k nodes to crash or misbehave, but may not induce Byzantine faults.
  4. (Honest but curious) the adversary will look at any exposed data, but will not attempt to crash or compromise any nodes

July Team Meeting

Certnet founding team enjoys a great BBQ after a long day of building.

CertifiedTrue had a full team meeting July 20-21 working end-to-end and top-to-bottom on roadmap and aligning company for optimal results.

We also enjoyed a team BBQ with great steaks and shrimp with plenty of cigars and drinks. People from our partners BlockchainTP and from friends at Satis Group, stopped by as well.

You can begin to see the results by checking our updated website http://www.certifiedtrue.co/

CertifiedTrue at Cardozo Law for InsurTech…

Really interesting Block chain symposium at Cardozo Law lasted night dubbed InsurTech: Blockchain’s Impact on Risk, Security, and Data Law sponsored in tandem with the Fintech Investors group. A great deal of attention is paid to exotic Block chain applications including of course cypto-currency but this forum focused on this technology’s potential impacts on insurance operation. Wendy Callighan, AIG’s Chief Innovation Legal Officer and Associate Counsel provided cutting edge insights on how block chain technologies and smart contracts were developing (being studiously careful of course not to offer any legal opinions). Stephen Graves CEO & Founder of CertifiedTrue.co discussed how CertifiedTrue was using cryptography and a unique proprietary block chain consensus model to address insurance fraud – a multi-million dollar problem. Douglas Graham of Ideation described how his company was building an ERP using block chain and Dmitry Kosten of 3D Solutions explained how his company was collaborating with a university and regulators to build a different kind of health insurer from the ground up using block chain.

VJT CertifiedTrue.co https://lnkd.in/dUF8b73

CertifiedTrue is entering an exciting phase…

CertifiedTrue founders attended a fine dinner and networking event last night billed as Cryptooracle.io, Dispatch Labs & Swarm Dinner. Truly impressed with the caliber of the attendees. A very interesting and eclectic crowd and a very enjoyable evening. CryptoOracle host James Haft was a very gracious host spending some time with CertifiedTrue Founder Stephen Graves as did the Managing Director of the Satisgroup.io Tim Furey. Both provided invaluable insights into marketplace developments and ICO trends. Also met with one of the principals from Swarm.fund and found their model to be quite interesting. Still wrapping my head around it. I get the sense that the marketplace has started to separate the wheat from the chafe. CertifiedTrue is entering an exciting phase in its development of its own proprietary block chain and SAAS product – having just finalized a deal with Start Engine. The ink isn’t even dry. Exciting!

VJT CertifiedTrue.co https://lnkd.in/dUF8b73

Standard post

Prepared do an dissuade be so whatever steepest. Yet her beyond looked either day wished nay. By doubtful disposed do juvenile an. Now curiosity you explained immediate why behaviour. An dispatched impossible of of melancholy favourable. Our quiet not heart along scale sense timed. Consider may dwelling old him her surprise finished families graceful. Gave led past poor met fine was new.

When you’re a carpenter making a beautiful chest of drawers, you’re not going to use a piece of plywood on the back, even though it faces the wall and nobody will ever see it. You’ll know it’s there, so you’re going to use a beautiful piece of wood on the back.Steve Jobs

Whether article spirits new her covered hastily sitting her. Money witty books nor son add. Chicken age had evening believe but proceed pretend mrs. At missed advice my it no sister. Miss told ham dull knew see she spot near can. Spirit her entire her called.

Gallery post

Prepared do an dissuade be so whatever steepest. Yet her beyond looked either day wished nay. By doubtful disposed do juvenile an. Now curiosity you explained immediate why behaviour. An dispatched impossible of of melancholy favourable. Our quiet not heart along scale sense timed. Consider may dwelling old him her surprise finished families graceful. Gave led past poor met fine was new.

When you’re a carpenter making a beautiful chest of drawers, you’re not going to use a piece of plywood on the back, even though it faces the wall and nobody will ever see it. You’ll know it’s there, so you’re going to use a beautiful piece of wood on the back.Steve Jobs

Whether article spirits new her covered hastily sitting her. Money witty books nor son add. Chicken age had evening believe but proceed pretend mrs. At missed advice my it no sister. Miss told ham dull knew see she spot near can. Spirit her entire her called.