
In coming future, zero-trust interactive system would be the need of the hour. Pre-Snowden, it has been found that in entrusting information to arbitrary entities on internet was full of risk. But post-Snowden the argument actually runs down in the hands of the ones who are having a belief that big organisations and government keep a regular attempt of stretching and overstepping their authority. Therefore, it is felt that entrusting one’s information to organisation by the way, is a model which is fundamentally broken. It is very clear that if an organisation doesn’t misuses the data of the company of future founder of Polkadot and Kusuma, is actually the effort required minus expected gains. The companies have income models which demand to acknowledge about maximum people and so the capability of covert misuse is a bit tough for overestimating.
Table of Contents
The Web Technologies
The web technologies and the protocols and on large scale the internet had played a significant role as technology preview. The workhorses of FTP, HTTP(S), SMTP, PHP, HTML and Javascript, all have posed an important role by contributing to rich cloud-based applications that we go through now as Facebook, Google’s Drive and Twitter and also various other applications ranging by way of games, banking, dating and shopping. But in near future, many of these technologies and protocols would have to be re-engineered as per the latest understandings of interaction amongst the technology and society.
To this, when we talk about Web 3.0 or “post-Snowden” web, is actually the re-imagination of the things for which the web is being used but with the aid of fundamentally different model so as to make interactions amongst the parties. Gavin Wood (co-founder of Ethereum) mentioned that the information which they find to be public, they publish it and the information which is agreed then consensus ledger is been kept for that. Also the information which is considered to be private, is kept secretive and never told. Encrypted channels are the medium of communication and communication takes place only with the pseudonymous identities as the endpoints and it’s not attached with anything which is traceable IP addresses.
Gavin Wood also explains his point by mentioning that they engineer the system for mathematically enforcing earlier mentioned assumptions as no government could be trusted so easily. Following are the four components which contribute to post-Snowden web:
1. Dynamic Messages.
2. Publication of static content.
3. Transactions which can’t be trusted.
4. Integrated User Interface.
Publication System
The company is having decentralised encrypted information publication system. This system runs basically with the aid of short intrinsic address of some information and return after sometime of the information only. Newer information could also be submitted to the same and once it is downloaded then one could be assured that they are being provided with correct information as the address is intrinsic to the same. Therefore, the publication system is liable to HTTP(S)’s job and alongwith it FTP one too. There are various technology implementation of the same but the most convenient one to refer or inform is the BitTorrent one. Each time the link of the BitTorrent is clicked, it informs its client for downloading the data which is having the intrinsic address (hash) being equal to the same.
Any sort of static part of information is being downloaded and published in Web 3.0, with the aid of such a technology. For maintaining and sharing the information about providing incentives to others, is only possible with BitTorrent. The information could be brought down to a precise and efficient one with the aid of Web 3.0. This is so cause incentive framework is intrinsic towards the rule, so the company becomes DDoS proof by design.
Dynamic Messages
Web 3.0 second part is identity based pseudonymous low level messaging system. Communication between people is done with the aid of the same on the network. The lot of guarantees with regards to messages is done with the help of strong cryptography. These could then be encrypted with the help of some identity’s public key so as to guarantee that it is coming from the sender and the receiver is then given a secure receipt of communication. Where in case a shared secret is used then it could help in giving appropriate opportunity for communicating safely, without involving receipt of proof.
Use of transmission-protocol level addresses is not required as ultimate messaging logistics is being provided and on the other hand, an IP address which comprised of user or port has now just been converted to a hash.
In addition to this, messages are going to have long live time which would thereby help in allowing disambiguation between publication messages and would thereby allow most of the guarantee of many of the identities and instant signalling messages could also be done which are required to be transmitted as quick as possible over the network. Also in case when the peer whose information is not valuable would not be entertained and their slot considered with connection to other which is not known. In Web 3.0 such messages aid peers for communicating, self organising in real time and updating information whose precedence is not required to be trusted internally, whereas in traditional web such an information travels over HTTP in AJAX style.
Untrusted Transactions
Bitcoin had initiated this consensus based application and this attributed to be the first step, where a consensus engine is agreement with few of the rules of interaction, in awareness with future interactions which would automatically result in enforcement. A reputation system on the other hand is combined with Facebook or Twitter as functionality is going to work more effectively than the ones without as users are going to put internal value on the thinking of their partners, friends or colleagues about them.
Each trusted publication would be conducted with consensus engines and as well alteration of information would be made effectively. The generalised global transaction processing system will help in making such publications trustful and information edited. The biggest example is the Ethereum projecth. Here the traditional web is not able to consider the consensus and stay on the centralised trust of authorities as ICANN, Facebook.
Integrated User Interface
The final component of Web 3.0 experience is the technology which helps in connecting with everything, as the browser and the user interface. The URI bar, back button and the lion’s share would be provided for displaying of the dapp( web page). With the help of the consensus based name resolution system, URI could be considered as unique address of front-end for application which is a hash. To this, the information publication system could be expanded to collection of files which are required for front- end (e.g. an archive having .html, .css and .jpg files).
Basic differences from the traditional web to new Web 3.0 is, that a shift from traditional client-server URL model of address would be there as https://address/path to new form of address as “goldcoin” and uk.gov. Where name resolution would move by way of consensus engine based contract being redirected by the user. But there would be various name resolution as “uk.gov” for instance could give away the “gov” sub name into name resolver being provided by “UK”. So with the user of Web 3.0 all interactions could be taken care securely, trustlessly and for various services. Also the tools would let the users and the App-developers with the ability of spreading trust among various competing, entities.
Conclusion
Change would take place slowly and only Web 2 would see the results where back end would use Web 3.0 components as Bitcoin, Namecoin and BitTorrent and this trend would run with Web 3.0 base Ethereum being used by sites which are inclined towards giving the transactional evidence of their content as exchanges and voting sites. Web 3.0 would therefore tend to provide end to end security and trust less interaction as well.
Therefore, here comes a totally different and secure technology, “Web 3.0” secure social operating system.
Leave a Reply