Digital Currency for Public Good: Difference between revisions
From Computer Laboratory Group Design Projects
Jump to navigationJump to search
(Created page with "Client: Jan Kis, IMC <Jan.Kis@imc.nl> The digital currency Bitcoin uses a block chain distributed database to guarantee that any transaction can be traced to a unique ori...") |
No edit summary |
||
Line 1: | Line 1: | ||
Client: Jan Kis, [[IMC]] <Jan.Kis@imc.nl> | Client: Jan Kis, [[IMC]] <Jan.Kis@imc.nl> | ||
The digital currency Bitcoin uses a block chain distributed database to guarantee that any transaction can be traced to a unique original coin. The same technique could be used for anonymous authentication of other kinds of data. Your task in this project is to create a secure end-to-end system for authenticated reporting and verification of criminal activity, safety violations, human rights abuses etc. You need to think about how reports can get into the system, and how those receiving a report can use the block chain to confirm it is true without endangering the whistleblower | The digital currency Bitcoin uses a block chain distributed database to guarantee that any transaction can be traced to a unique original coin. The same technique could be used for anonymous authentication of other kinds of data. Your task in this project is to create a secure end-to-end system for authenticated reporting and verification of criminal activity, safety violations, human rights abuses etc. You need to think about how reports can get into the system, and how those receiving a report can use the block chain to confirm it is true without endangering the whistleblower. |
Revision as of 10:38, 9 November 2015
Client: Jan Kis, IMC <Jan.Kis@imc.nl>
The digital currency Bitcoin uses a block chain distributed database to guarantee that any transaction can be traced to a unique original coin. The same technique could be used for anonymous authentication of other kinds of data. Your task in this project is to create a secure end-to-end system for authenticated reporting and verification of criminal activity, safety violations, human rights abuses etc. You need to think about how reports can get into the system, and how those receiving a report can use the block chain to confirm it is true without endangering the whistleblower.