Tag: tech

  • Be Digitally hack-proof

    Be Digitally hack-proof

    Why do people hack systems? Hacking is a technique used to compromise any digital device. Hackers want to get into your device to use your data for varied reasons – naturally, most of these motives are financially driven.

    A data breach is usually what leads to a hack. There is a difference even though both terms are used interchangeably.

    A data breach happens when data that is left vulnerable in an unsecured environment gets viewed by someone who shouldn’t have access to it.

    While hacks are the result of malicious behavior, breaches happen as a result of negligence, human error, or other non-malicious behavior that creates a security vulnerability.

    Hackers may access your device just to say they could or for financial gain, to protest, or to gather sensitive information.

    So what makes a hacker?

    In the past, a hacker may have been a whiz kid or specialized programmer but in the modern-day, hacking has become easier and more people are becoming hackers. As more people shop online and use computers for everyday tasks, they become the prey of hackers worldwide.

    Actual hacking is technical in nature – the hacker does not communicate with the person whose PC they are hacking into.

    But they can also use psychology to trick the user into clicking on a malicious attachment or providing personal data. These tactics are referred to as social engineering.

    Your cellphone too can be hacked

    While most associate hacking with Windows computers, the Android operating system also offers an inviting target for hackers. That means millions of people who use Samsung phones can be hacked.

    Some fifty years ago, there was a name for hackers who obsessively explored low-tech methods for getting around the secure telecommunication networks and expensive long-distance calls. they were called phreaks.

    This was a portmanteau of the words phone and freaks. They were a defined subculture in the 1970s, and their activity was called phreaking.

    Phreakers have now evolved out of the ‘analog technology era’ to become hackers in the digital world. They are beyond a sub-culture and have become a genuine threat to the safety of our information and data.

    Mobile phone hackers currently use a variety of methods to access your mobile phone and can intercept phone calls, voicemails, text messages, and even the phone’s microphone and camera, all without your permission or even knowledge.

    iPhones are not safe either

    In 2020, many journalists working for Al Jazeera were victims of a sophisticated zero-click spyware attack.

    The Toronto-based internet watchdog group Citizen Lab was asked to look into the attacks, which took place in July and August, and they released their findings at the end of December.

    The report found that 36 journalists, producers, anchors, and executives had their iPhones compromised by Pegasus spyware. The spyware, developed and sold by an Israeli-based firm called NSO Group, targets security vulnerabilities in the iMessage app.

    The so-called “zero-click” exploit deploys without any user interaction. Once installed, it can record ambient sound and phone conversations, take pictures, and access user credentials. It sounds like science fiction but it’s very much real!

    Types of hacks

    Malware

    People can use hardware to sneak malware into your PC. In offices, hackers will infiltrate networks by giving staff members infected USB sticks, dodgy USB cables, and mouse chords.

    It is crucial to always think before plugging anything into your work or personal device with access to confidential data.

    Educate your staff about being careful before plugging anything into their PCs.

    Malware infections generally occur when users interact with dangerous code by clicking on a URL or downloading malicious software disguised as an authentic program. But zero-click spyware penetrates devices without any user interaction.

    Citizen recommends making sure that your mobile OS is updated to the latest version. Identified vulnerabilities in previous versions of iOS were patched in the iOS 14 update.

    Practicing good digital hygiene is always important for the security of your mobile devices.

    Use sites like haveibeenpwned.com and breachalarm.com to see if your email credentials have been compromised. Use strong passwords on any apps that contain sensitive data and delete any apps that you do not regularly use.

    Missing security patches

    Always remember to update your security tools. Too many people ignore update notifications or security patches, leaving themselves vulnerable. It’s not just antivirus software that needs patching.

    Tell your staff to ensure that all their antivirus and applications are routinely updated as security patches become available. This task is usually the job of your IT department if you have one in the first place.

    Getting your password information

    Hackers can obtain your credentials through several means, but commonly they do so through a practice called keystroke logging or keylogging.

    Can you believe that the most common password is “123456”? Hopefully, yours isn’t so, or any of the most hacked passwords in the last 10 years.

    Through a social engineering attack, you could accidentally download software that records your keystrokes, saving your usernames and passwords as you enter them.

    This and other forms of spyware are malware that tracks your activity until a hacker has what they need to break into your system.

    Attackers can deploy malware on a user’s machine if they are in your environment and capture your credentials via keylogging too.

    Hackers also use password cracking programs that can run letter and character combinations, guessing passwords in a matter of minutes, or even seconds.

    To get around this, use a password management tool that securely houses your company’s credentials. These tools can often auto-generate lengthy, diverse character passwords that are difficult for hackers to guess. They can also autofill for your employees for easy access to their tools.

    Encryption and multi-factor authentication methods also offer more layers of protection.

    Distributed Denial-of-Service (DDoS)

    Acunetix

    This technique involves taking down a website so that a user cannot access it or deliver their service. DoS attacks take place when hackers inundate a target’s server with large influxes of traffic. The amount is so frequent and high that it overloads the server by giving it more requests than it can handle. This crashes your server and your company’s website.

    Larger businesses can get hit by a Distributed Denial of Service (DDoS) attack, which is a synchronized attack on more than one server or website, potentially taking down numerous online assets. 

    A good method to fight DDoS attacks is to use cloud protection services to spot them – like Acunetix or Netsparker.

    Social Engineering & Phishing

    This is where hackers try to get your personal information, often by impersonating a legitimate and maybe trusted source.

    Many types of social engineering bait come in the form of phishing emails.

    A hacker sends you a message that looks like it’s from someone you know, asking you to do something, like wire them money, or to click or download an infected attachment to see more. 

    Here is a hilarious example of a phishing Email

    “The top malicious email attachment types are .doc and .dot which make up 37%. The next highest is .exe at 19.5%,” according to a report by Symantec. Always be cautious of opening these types of attachments.

    Warn your employees to never give out private business information over email, to think before opening any attachments, and educate them on mail scams.

    Use email software that scans for phishing. Microsoft 365 and Google’s Business packages come equipped with such. Google’s tech uses AI to scan the content and find things such as spelling errors and dodgy URLs. This enables the system to block them before they even hit your inbox.

    Most people or companies that get hacked or suffer from a data breach do so mainly due to negligence. Many do not prioritize beefing up their security systems before it is too late. Hacks are, however, completely avoidable so don’t fall victim to them.

    Other ways to protect yourself

    • Download a reliable anti-malware product that can both detect and neutralize malware and block connections to malicious phishing websites.
    • Of course, whether you are on Windows, Android, a Mac, an iPhone, or in a business network, you must always use layered protection wherever you can.
    • Only download phone apps from the legitimate marketplaces that police themselves for malware-carrying apps, such as Google Play and the Apple/Amazon Appstore.
    • Check the ratings and reviews first. If it has a low rating and barely any downloads, it might be best to avoid that app.
    • Use long and complex passwords. Don’t use numbers in sequence. You can also use mixes of letters that can be remembered through rhymes.
    • Consider using a password manager.
    Advert
  • 2020: Year of the PC

    2020: Year of the PC

    People will always find an opportunity in a crisis. This year has been one of the strangest years we will ever experience. Because of the global pandemic, we have been ‘shut-in’ physically and mentally. Hiding in our homes in an effort to save the lives of the elderly and sickly.

    Technologies that enable people to communicate with each other from different locations and work remotely have had an excellent year because of this.

    Who needs phones & email?

    The pandemic may have stopped us from having face-to-face meetings because of self-isolation and social distancing. So just like that, we all needed to have online meetings and digital collaborative meetups.

    In 2020, we just stopped phoning people. We needed to see what other humans looked like. So, we engaged more in video calling, using whatever technology available that supports that functionality.

    The online video-conferencing tool Zoom, therefore, went from being a company you’d probably never heard of, to global ‘overnight’ success. It was founded in 2011 by Eric Yuan, a former Cisco engineer, and executive, who then launched it in 2013 as software for companies. It was valued at $1bn in 2017 because it enjoyed very strong revenue growth and was easy to use, and became profitable in 2019, and listed on the Nasdaq.

    “You’re on Mute! “

    Quote of 2020

    Come early 2020, Zoom entered a boom period as most of us used it while in quarantine. Its share price, therefore, grew more than 490% from $68.72 to around $406.

    MS Teams, Microsoft’s answer to Zoom. is believed by many to be more reliable and secure than Zoom – which suffered a major breach earlier in the year. Google’s Meet also features on the list of top video calling/conferencing apps.


    We won’t delve into comparison here. The pros and cons are highly dependant on what you use it for and your business size/budget. The usage stats below speak volumes though albeit just for the two major economies.

    Other tools

    When we weren’t working, we were using social communication applications such as House Party which, apart from allowing you to stream music and play virtual DJ, enabled you to play games with one another.

    They were mostly silly general knowledge games but hangman made a welcome comeback to society thanks to this app.

    Discord, an American Voice over Internet Protocol (VoIP) that uses instant messaging and runs a digital distribution platform also gained new users. It no longer just relies on gamers and people in creative computer development roles to drive its usage.

    The Home Office

    We started (forcibly) working from home and those who believe it made them more efficient and productive are considering carrying on with it in 2021.
    The working from home concept, therefore, changed from being something associated with putting in half the effort and lazy lie-ins.

    Companies at least in the developed world, have to offer the option of working from home. Like any viral pandemic, Coronavirus will still be around in 2021 as the vaccine could take a while to ‘take effect’. Working from home isn’t disappearing any time soon!

    To operate a home office though, you need to have an advanced enough computer system, the right anti-virus software, and other methods of securing your work. Companies became concerned that people were using their personal computers to log onto work servers and bringing problems along with that. It’s not just good enough to get a laptop to have a ‘home office’.

    We have also had to set up reliable phone systems for business. Landlines are becoming old-fashioned plus virtual phone systems that are simple to set up and use are becoming popular.

    Smart speakers are also becoming popular. You can use them to play music via Spotify or the radio but can also be used to create the right audio ambience for your meetings and remind you about important events, tasks, and meetings.

    It’s all about getting tech products and virtual assistants to make working easier. People also invested in better desks and other office accessories such as computer or mobile-phone-operated coffee machines. Yes, those do exist! Expect the internet of things (IoT) to play a bigger role in your life next year and beyond.

    Cybercrime on fleek

    Naturally, because we are all forced online, this is no better time for cyber-thugs. They have upped the ante with cleverer ways to dupe you out of your already diminishing funds. Here some of the highlights of 2020 when it comes to crime on the web according to cybersecurity provider ID Agent:

    A cyberattack is attempted every 39 seconds.
    -700 million people in 21 countries experienced some form of cybercrime.
    The damage related to cybercrime is projected to hit $6 trillion annually by 2021.
    -Ransomware attacks rose 148% in March 2020.
    -Cloud-based attacks rose 630% between January and April 2020.
    -Two in five SMBs have been the victim of a ransomware attack.
    -More than 80% of reported cyberattacks are phishing.
    -Phishing attempts have increased by more than 660% since March 1, 2020.
    -Organized crime gangs account for 55% of attacks.

    The rise of AMD

    Chipmaker AMD has had a stellar year as it has brought out some of the most advanced (yet affordable) computer chips ever built and has managed to outshine rival behemoth, Intel.

    Its share price on the Nasdaq bounced from $49.10 to about $95.92. The company has been a runaway success story, especially over the past five years. At the end of December 2015, AMD stock was a paltry $2.87, that’s 3242% growth in half a decade!

    Another contributing factor for the company’s success is that AMD’s Ryzen line of processors has been a huge hit since its release. They are used in some of the best mining CPUs money can buy.

    Mining is the process of acquiring Bitcoins and other Cryptocurrencies using special software together with your PC’s hashing power.

    Crypto makes a comeback!

    Cryptocurrencies Bitcoin and Ethereum experienced returns of more than 216% and 390% year-to-date respectively.
    The argument is that institutional investors including some of the world’s largest finance houses and banks are now backing the world’s most popular digital currency.

    This is despite the fact that most ‘9-5 people’ are not using Bitcoin to buy much on a daily basis – but this trend is changing.
    It is still purported to be a means for criminals and drug dealers to help avoid banking authorities from checking their transactions. Or maybe that is just an underground rumour (or FUD) created by the fearful banking system.

    But seriously, a few things are speculated to be behind the Crypto surge.
    The US Federal Reserve cut interest rates, loaned more than $1.5 trillion to banks and financial institutions. It also increased its purchases of US treasury securities to stabilize the economy when the pandemic struck.
    This response was very strong and helped to weaken the effects of a national lockdown on the largest economy in the world.

    These actions created a favourable ‘macro environment’ in which to invest in an asset that is perceived as very risky given its lack of use and lack of clarity around what it can be used for. The high returns compared to Gold, interest-bearing and other traditional assets have certainly got the major asset managers excited.


    The second trend that propelled cryptocurrencies was the above-mentioned expansion of digital life. This may have lead to more investors feeling comfortable using a digital wallet. From payment systems, storage, finance, to gaming, gambling and sports: There is now literally a crypto-based coin for anything under the sun! This digital transformation has even prompted global Central Banks to seriously consider a move away from paper money.

    The Future

    Our lives are progressively going digital. Many older people who had never used a computer to shop online before, did so for the first time in 2020. They also using messaging apps for the first time as well as streaming entertainment services such as Netflix, Hulu, Amazon Prime, and Disney Plus.

    To sum up, the year 2020 has been an abomination of a year. Who knows what 2021 will bring? Maybe (tech-driven) Tesla stock will keep on rallying after successfully listing on the S&P500. But maybe also because owner, Elon Musk kind of took an interest to Bitcoin. This year has indefinitely made us aware of two things: proper sanitization and the practical use of computers.

  • Technology contained

    Technology contained

    Over the past decade container technology has become a popular method for packaging applications in an effective way. Some developers believe is better than that offered by virtual machines and other technologies.

    Container technology has been embraced by the big cloud computing providers including Microsoft Azure, Amazon Web Services, and Google’s Cloud platform.


    Examples of the actual container software include the Apache Mesos, Docker, rkt (pronounced rocket), and Kubernetes.

    But what is container technology?

    Logically, it gets its name from shipping. Shipping containers standardize how goods are moved around. Goods get placed in steel shipping containers which can be picked up by cranes and fit into ships. They tend to have standard sizes.

    By standardizing the process and keeping the items together, your container can be moved as a unit and it costs less to do it this way.


    In computer terms, container technology is referred to as just a container: a method to package your applications so they can be run, with their dependencies, isolated from other processes.

    Container technology decreases the potential for problems when developers move programs from server to server before the program is in a state where it is saleable.

    When you use container technology to create an application, you can code everything using just one operating system and database. This makes the application quite easy to replicate as resources including memory and the central processing unit (CPU) are shared. This also makes your technology great for scaling and for working within the cloud.

    Out with the old…

    If you don’t use container technology, you can have a situation where a program runs well on one machine but has problems on your server. This common problem occurs when you move a program from a data server to a cloud server.

    Many issues can happen because of variations in machine environments. These include differences between your operating system, secure sockets layer libraries, storage, and network topology.

    So, computer container technology picks up all of your software and related parts which include dependencies, being libraries, binaries, and configuration files. They all get migrated as a unit, avoiding the differences between machines including operating system differences. This will also include underlying hardware that leads to incompatibilities and crashes.

    web scanner

    And, importantly, containers also facilitate the deployment of your software to your server. Advocates of using container technology say it is a much better tech to use than that which preceded it – virtual machines.

    In this case, one physical server would be used for multiple applications through visualization technology. Each virtual machine contains the entire operating system, as well as the application to run.

    The physical server then runs several virtual machines, each with its own operating system, with a single hypervisor emulation layer on top. By running several operating systems simultaneously, you incur a lot of overheads on your server as resources get used.

    …and in with the new

    Container technology allows your server to run a single operating system because each container can share that system.

    The parts of your operating system that are shared are read-only to not interfere with the other containers. Therefore, compared with virtual machines, containers require fewer resources of the server, and are much more efficient.

    You can pack many more containers onto a single server. Each virtual machine may require you to have gigabytes of storage. But each container running a similar program may only need megabytes.

    How do the containers operate?

    Containers are set up in an architecture known as a container cluster. Then, in a container cluster, there is a single cluster master, with the other related containers set as nodes, that are your multiple worker machines. The cluster master schedules the workloads for your nodes, and also to manage their lifecycle, and their upgrades.

    Containers allow programs to be broken down into smaller pieces, which are known as microservices.

    A major advantage of having a program as component microservices is that different teams can work on each of the containers separately as long as the interactions between the different containers are maintained. This facilitates faster software development.

    Containers are also flexible and can be orchestrated. Since the operating system would be already running your server, a container can be started and stopped in just a few seconds.

    Some containers within architecture can be turned on during peak demand, and turned down when not needed.
    The software can control this type of orchestration, and distribute the tasks among the container cluster.

    The way forward with the tech

    But is container technology overrated? Some people are concerned about the security around it.

    Because multiple containers share the same operating system, there are growing concerns that container technology is less secure than virtual machines. If there is a security flaw in your host kernel it will affect your multiple containers.

    Other software is being used to have more secure container technology. The use of isolated containers is, therefore, being constantly improved.

  • Startup with flair

    Startup with flair

    §§§

    Every great product begins with an idea—even while the world waits in lockdown. In fact, some of history’s best masterpieces stemmed from periods of isolation, like Sir Isaac Newton’s Theory of Gravity or Victor Hugo’s Les Misérables.

    Whether you’re fulfilling a lifelong dream or simply seeking a new income stream, there are ways to get your groundbreaking tech idea to the market today.

    Do your planning & research

    The first step of software or web development is to appraise the idea itself. Most successful start-ups begin as answers to urgent consumer concerns. They also usually change the way things are done and are therefore called disruptive technologies. To be considered, your tech idea should, therefore, help resolve a relevant problem.

    If you are not solving a pressing need, the fanciest invention or service (even with a solid marketing and financial plan) will fail to appeal to your target market. It will also not catch the eye of potential funders.

    Many startups fail because visionaries fail to elucidate their idea to the people that can make it a reality.

    Next, you should analyze the possible competition. With millions of Apps, DApps, and software developments out there, someone might have already created the same thing. If that’s the case, you could see how your product improves upon its predecessors. It might be a good idea to get your work patented or copyrighted. Likewise, you might want to check to see if the idea has not already been patented.

    Binance
    Advertisement: Binance

    Of course, transforming this amazing tech idea into reality involves a LOT of planning, too. That’s why you should research and map out an approximate timeline, possible tech builders (if you can’t DIY the work), related APIs, and most importantly, a budget.

    Some software developers may offer to partner with you – as your startup’s CTO. This could be for an equity/share in the venture or to provide a discount on the work done. This is a good option if you are still early in the fundraising phase.

    Finding the funds

    If you don’t have the money to get your idea off the ground, not to worry! There are plenty of other ways to find the funds, such as angel investors, banks, or crowdfunding sites.

    While some people rely on traditional loans from banks, others prefer to apply for grants from the government. There are also pages like GoFundMe and Kickstarter, where you can post your idea and crowdfund from private individuals around the world.

    Advert: A debit card for the Blockchain era

    For example, Palmer Luckey, founder of Oculus (a virtual reality headset), raised over $2 million using Kickstarter to begin his business. If you instead opt for an angel investor, an individual willing to invest a large sum into budding businesses, studies show that your business is more likely to succeed.

    Another form of assistance is to go through a startup incubator. You might want to look up the best ones in your country – but as ideas are not limited geographically – you can join any of the top incubators in the world.

    Test & distribute

    Finally, after proper planning and fundraising, you can execute and test out your brilliant tech idea. As AOL Founder, Steve Case, once said, “You shouldn’t focus on why you can’t do something, which is what most people do. You should focus on why perhaps you can and be one of the exceptions.” 

    This stage will also include a working prototype and a few open sessions or what is referred to in tech terms as ‘Beta-testings’. You can collect more insights from potential users to make your product stand out from others – preferably before you launch it.

    There are many online tools to help you in this phase. Most of them offer free trials, so you can get away with using them just for the test period.

    Covid-19 is no excuse not to launch a good venture provided it serves a pressing need as mentioned. In fact, projects that address the pandemic directly will indefinitely get preferential treatment when it comes to funding and support.

  • 2019 in Tech

    2019 in Tech

    This year may have felt like it was dominated by political shenanigans, but technology also had its wild ride.

    The USA vs Huawei

    A story that has persisted throughout the year is the heat around Huawei in the US. The Americans have stopped Huawei phones from being sold in their country because they say the Chinese mobile phone maker has stolen technology from American companies and has spied on them.

    The tussle began in 2018 but kicked into gear in 2019. Nevertheless, some American companies and organisations are still doing business with Huawei despite the ban by US President Trump’s government.

    The President of Microsoft, Brad Smith, also wants to the US government to offer more evidence to back up its Huawei ban. 

    The core issue with Huawei has been around concerns with Huawei’s close relationship with the Chinese government and fears that its equipment could be used to spy on other countries and companies.

    Huawei has also hit back at US ‘bandwagon followers’ and recently threatened to boycott Germany’s Auto industry if the European powerhouse banned them from offering 5G (broadband) in the country.

    Not a great year for big tech

    Big technological companies like Facebook, Alphabet, Google and Uber have faced a barrage of probes in 2019 be it around anti-competitive behaviour, spying on customers or their staff abusing customers. We also haven’t seen many new companies graduate to super-size status.

    After a long drought of big-name tech IPO (initial public offerings), 2019 promised to be a banner year. A crop of highly anticipated, highly valued tech companies — with hot marquee names such as Lyft, Uber, Pinterest, and Slack listed on the public markets. The idea was to allow you to take a stake in their business.

    Their reception, however, was truly tough. These companies’ stocks have not gained momentum and being listed has attracted greater public scrutiny.

    The biggest disappointment, however, must be WeWork’s failed proposed listing and its subsequent business fallout.

    The hottest things in tech

    Artificial Intelligence (AI) – We’ve been talking about this for decades since Terminator came out but scientists are managing to harness the technology especially in manufacturing and medical fields.

    Most of the top tech companies (Microsoft, IBM, Amazon, and Google) have already embraced AI. Many tout it as one of the main distinguishing features to set them apart competitively.

    A little of this tech has gone into robotics with much fanfare and fear over their capabilities and propensity to ‘initiate a judgement day’. Check out Boston Dynamics

    Bitcoin
    Bitcoin

    Blockchain – Bitcoin may be highly volatile and not the get rich quick scheme people thought it could be, but it is still out there. Clever people are finding ways of making commerce more efficient.

    There are however several practical and use-cases for Blockchain-based tokens and tech other than for payments and investments.

    Robotic Process Automation (RPA) – this is a technology that could explode in 2020. Right now, only large enterprises are using RPA but it could become more affordable and workable for smaller businesses in 2020. RPA is the process of automating mundane tasks such as taking data from one file and entering it into a business application like CRM software.

    It’s about computerizing repetitive tasks that are an inefficient use of time, so it makes our lives more efficient. 

    RPA is not a physical robot. It is also an approach to working across multiple business applications and entering, maintaining, migrating, integrating, mining and testing data on spreadsheets.

    These tasks are prone to human error which is why computerizing them makes so much sense.

    amazon web servies edge computing ad

     Virtual Reality and Augmented Reality – VR made strong progress in 2019. This was most useful in gaming, real estate companies, pornographic entertainment and for people with disabilities.

    For you gamers – it is best to buy an Oculus Quest for your PC. Sony’s VR headset is still the best and only gaming set.

    Look after my data – or not!

    The first fines around the General Data Protection Regulation (GDPR) were lodged in parts of the EU. The GDPR was promulgated in 2016. It is a regulation in EU law on data protection and privacy for all individual citizens of the EU and the European Economic Area.

    It also addresses the transfer of personal data outside the EU and EEA areas. GDPR was enforced because of concerns about data breaches and attacks on privacy by the likes of Facebook and Google.

    Then there were concerns our banks, insurance, and other data keepers were selling or losing our data to dangerous entities.

    The types of personal data exposed included your names, addresses, phone numbers, email addresses, and even passport numbers.

    Lessons learned

    The Marriott hotel group’s data breach of 2018 resulted in the exposure of 339-million customer records. Around 30-million of the records belonged to European Union citizens, and therefore they were subjected to a GDPR fine.

    Facebook seems to love controversy and had been found to have allowed a massive 247 million user (mostly Americans) data leak.

    Back home in Berlin, on October 30th the Berlin Commissioner for Data Protection and Freedom of Information issued a €14.5m fine on a German real estate group, die Deutsche Wohnen SE. This was the highest German GDPR fine yet. The infraction related to the over retention of personal data.

    Despite the turbulent year for tech companies and consumers, we look to 2020 with breathless anticipation. We also ponder on which of the mentioned technologies will stick out and make a positive impact on our lives.

    Pictures courtesy of Pixabay

  • A decentralised solution

    A decentralised solution

    Did you know that there are still more than 700 million people in the world who live in extreme poverty? These people must scrimp, starve, and struggle to survive off less than $1.90 per day.

    By 2030, the World Bank estimates that more than 90 percent of those people will be concentrated in Sub-Saharan Africa.

    This is perhaps one of the greatest developmental failures of the modern world. Despite the continent’s expansive natural resources and increasing connectivity, foreign actors still feel it’s too risky to heavily invest in their markets.

    Blockchain could be the key! 

    Bitcoin and “Blockchain” were created in the mass wave of distrust in banks after the 2008 financial crisis. Therefore, the technology enables individual, distributed data storage that could become the perfect evidence (trust) base and financial infrastructure for a developing country.

    With the right implementation, Blockchain holds the potential to completely revolutionize and revitalize such economies, especially in Sub-Saharan Africa.

    So, what is this Blockchain?

    Blockchain is essentially a kind of decentralized database that allows you to have a safe, secure way to handle their data without the need for third parties.

    How Blockchain works

    For example, you could with Bitcoin, make or accept payments in real-time without needing a centralized bank.

    “[It is] a way for one Internet user to transfer a unique piece of digital property to another Internet user, such that the transfer is guaranteed to be safe and secure, everyone knows that the transfer has taken place, and nobody can challenge the legitimacy of the transfer,” said software entrepreneur Marc Andreessen.

    “The consequences of this breakthrough are hard to overstate.”

    Historic background

    Until the mid-twentieth century, most of Africa was ruled under a colonial system meant to exploit the people and their natural resources for European benefit. Africans, in addition, were rushed into development according to European standards rather than homegrown ones.

    The legacy of rapid development, distrust and corruption left behind an economic system failing to recover in the 21st century.

    While the World Bank celebrates a decrease in global poverty levels, the number is expected to remain stagnant in Africa. Today’s poorest people are living in places with the least economic growth.

    Sadly enough, poverty and lack of investment in many developing countries stem from how they were integrated into the world system.

    The land was cut into countries according to European treaties and agreements, rather than by traditional and tribal land divisions. This situation worsened upon the handover of colonial power to so-called “democracies.” Power often shifted to the ethnic groups that former colonizers favoured.

    Corruption multiplied in the form of bribes, political persecution, rigged elections, and a massive wealth gap. All of this still affects the wealth distribution and investment potentials of many developing countries.

    Of course, this created a lack of trust in banks and government throughout much of Sub-Saharan Africa.

    The perfect fit for Africa

    During a 2012 study conducted in rural Western Kenya, Stanford University researchers waived the costs of opening basic savings accounts for a number of unbanked individuals.

    While 63 percent of the subjects opened an account, only 18 percent of them used the accounts. This was likely due to three factors: a lack of trust in banks, unreliable service and prohibitive withdrawal fees.

    Unfortunately, the prevalence of unbanked individuals in the informal sectors scares off foreign investors, who heavily rely on transactional evidence to make investments. Otherwise, pouring money into markets is too risky. That’s where Blockchain comes in.

    How would it work?

    Blockchain can host an entire evidence base of transactions, loan repayments, and asset titles. The technology is also decentralized and requires individual confirmation, creating an element of trust and transparency beyond traditional banking systems.

    SmartContracts

    According to Victor Olorunfemi, Director of Products for Pan-African tech and crypto-exchange, KuBitX, Blockchain’s major benefits lie in “frictionless P2P and cross-border payments, transparent elections, land registry management [and] transparent crowdfunding.”

    Let’s look at some of the different ways Blockchain could benefit developing economies, especially in Sub-Saharan Africa.

    1. Creating financial infrastructure and accountability

    According to a study by the Milken Institute, viable financial markets require consistent, accurate data on assets and credit histories. Luckily, Blockchain may fulfil these needs.

    The use of Smart Contracts technology is ideal in areas lacking accountability, such as the real estate or land/agricultural sectors. In Africa, a lack of record-keeping practices often leads to “missing” or non-existent title deeds. In some cases, this is intentional.

    Title deeds “go missing,” only to end up in the hands of benefactors other than the rightful owners. Smart Contracts could eradicate these issues through the use of special tokens that cannot be duplicated, changed or removed. See the article on tokenization.

    Likewise, Bitland, a company in Ghana, currently helps individuals record deeds and land surveys. By resolving land disputes, Bitland creates more stability while accurately recording land asset data.

    “There’s a massive number of people in the informal sector, but there’s not much data being collected on them right now.”

    Merit Webster, co-president of the MIT Sloan Africa Business Club.

    “That means you don’t have that credit history or payment history for them. If you have a decentralized approach to collecting data, you end up with more malleable data. [This] is very valuable for creating credit histories.”
    The agricultural industry also has the potential to thrive using Blockchain.

    “Blockchain could be used to track goods around the world. This allows farmers to earn a fair wage for their goods.”

    Also, farmers could use record-keeping technology to streamline the supply chain and document resources. This would lead to better efficiency, lower transactional costs, and improved logistics.

    2. Security in banking

    According to the World Bank, there were 1.7 billion people with no bank account in 2017. This situation is worst in developing countries, especially African ones. For example, over 62 million of these people lived in Nigeria.

    Besides, data from Google Trends reveal that Lagos, one of Nigeria’s biggest cities, ranks globally as the number one city based on the volume of online searches for Bitcoin (BTC). Clearly, for the city’s 21 million-odd people, there an immense interest in some form of an accessible payment system.

    Of course, it’s unrealistic to expect bank branches to magically appear in every remote corner of the world. However, a digital database using Blockchain technologies has the potential to reach far beyond physical banks.

    Ad: N26 Bank

    Many Africans value trust and transparency. In developing countries, this lack of trust goes beyond the Internet. Developing countries with less industrialization tend to have higher levels of corruption.

    This reduces national investment opportunities in the public sector and instills a lack of trust in centralized oligarchs handling an international investment.

    Because its power lies within the community of users, Blockchain can combat these trust issues. All data logs and amendments must pass through this community and identification confirmation tests.

    Blockchain technology also secures your data incredibly. Hacking and data breaches are all too common nowadays. In 2017, for example, around 3 billion Yahoo user accounts were stolen.

    When information is stored in the same place, hackers have one, easy target. In contrast, Blockchain is a distributed entity. This dissemination of data leaves it far less vulnerable to cyberattacks.

    3. Fostering Entrepreneurship

    Coupled with the Internet, Blockchain technology could be the perfect platform for aspiring African developers. Because the ‘source code’ is free of charge, skilled coders can adapt, create, and configure special applications, called DApps.

    These are available on Crypto platforms and provided by companies like Ethereum, and a South African firm specializing in what they called the Keto-Coin.

    Rather than waiting for governments to drag their feet trying to create jobs—individuals on the continent can form small firms that build and sell Crypto-based Apps locally or abroad.

    “Despite the frictions and impediments mentioned,” said Olorunfemi. “Blockchain can still provide an avenue for promising African tech projects to access capital (FDI) via token offerings on digital assets exchanges.”

    Many courses are even readily available online to quickly learn about new technology. Microsoft, for instance, offers a platform via Azure for you to build and learn about the Blockchain.

    One-man shops in countries with unfavourable economic systems, like Zimbabwe, can also adopt smaller, stable, Cryptocurrencies to facilitate or payments. In cases of rampant inflation, they can temporarily act as a store of value or help you pay for things until your currency stabilizes.

    As with the Venezuelan hyperinflation case study, Cryptocurrency intervention could help many developing countries troubled with economic instability.

    There is also the option of Crypto-mining. But before you pull out the ‘high-consumption energy’ argument – think outside the box for a moment. What about energy sources that are free and available nearly 24/7? Like water and the sun!

    The African continent is full of capable scientists and mechanical engineers. One could build special solar-powered energy centers to power Bitcoin-mining.

    And without the expertise, governments or private companies could alternatively just invite Crypto companies with abundant financial resources to mine (cleanly) for a special tax/fee while creating jobs for the locals.

    4. Elections

    In addition to the financial side of things, Blockchain technology could help eliminate some forms of corruption. For example, many African countries’ elections are incredibly vulnerable to the social scourge. In some extreme cases, some officials change or forge written ballot votes to rig elections.

    Corruption


    To combat this, Blockchain databases could record votes. This makes it nearly impossible to tamper with using Smart Contract technology. Having fair elections improves infrastructure, which then increases development and economic dependability.

    Blockchain non-profit company Cardano, this year, has partnered with the Ethiopian government to battle these issues specifically.

    5. Leapfrogging

    While some might see Africa’s economy as underdeveloped, others might see it as a blank canvas well-suited for a large-scale implementation of Blockchain. Economic and governmental systems are shifting and slightly shaky in many Sub-Saharan African nations.

    MPesa

    The challenge is to foster a rigid economic system to implement Blockchain.

    Don’t just take our word for it—African nations have often implemented new, practical technologies before the Western world. Let’s look at the example of M-Pesa. Back in 2014, Americans and Europeans were amazed by Apple Pay’s launch.

    However, this mobile payment system wasn’t exactly “new.” By that time, Kenyans had used M-Pesa, a very similar technology, for years.

    “There’s a lot of opportunity to leapfrog the way the West developed and have these more unique African solutions, but it needs to come from within,” said Webster.

    “It needs to come from entrepreneurs in the continent who want to implement these solutions. It’s important to engage people very early on. Systems incubated in the West don’t stand as great of a chance to work as African ones do.”

    Concluding remarks

    With the possibility of an experimental, large-scale takeover of Blockchain technology to improve African infrastructure, the nations there could leapfrog in development and growth.

    This must begin internally. According to Olorunfemi, “Education—of policymakers and other stakeholders—which is often ignored has to be a critical factor in paving the way for the acceptance and adoption of new technologies and the accompanying investment.”

    The results in Sub-Saharan African countries could help eliminate much of the world’s poverty. It would also remove remnants of mistrust and corruption left behind by the days of colonial exploitation.

    While there are some obstacles to large-scale Blockchain implementation, we can’t think of a better benefactor than there. The possibilities for business using the Blockchain are endless!

    To learn more about how to get started with Cryptocurrency mining or purchasing, visit our resources page for useful links and guides.


    Additional input by Bobby Quarshie (BQ). 
    Citations: Christopher Lee and Jackson Mueller. 
    Swan, Melanie. “Anticipating the Economic Benefits of Blockchain.” Technology Innovation Management Review 7.10. Oct. 2017.
    Bitcoin Lessons from Venezuela, Where Hyperinflation Reigns. Online Source: https://www.lathropgage.com/newsletter-237.html
  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the nature of work they engage in is considered ground-breaking and has a positive impact on our lives – it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’. Nor that it is simply because it is fascinating and therefore must be an excellent product. This project actually has a value proposition for you!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers, and its fragility when used and abused by unscrupulous third-parties for their financial gain.

    The issue of data security is, however, quite a serious one. You just need to pay attention to the news to become even more aware.

    Data breach incidents

    In Europe, where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked. Several hundreds of thousands of customers’ personal data compromised.

    These were followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked. This left vulnerable passengers terrified and stuck high up in the air. And all this happened probably to the amusement of the pranksters (hackers).  

    Can you imagine the chaos and commotion that would be caused if their control systems of driverless cars were to be hacked? 

    The digital intrusion gets even more sophisticated...

    This time affecting the very wealthy:  private yachts are now being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    Data security 

    On the issue of data security, you often hear about extra protection but not just anti-virus and anti-phishing software. The more secure and heavily encrypted Blockchain technology is, however, making waves in the digital sphere.

    It is mainly for the escalation of its once shining star by-product designed for discreet transacting – Bitcoin.

    Blockchain technology has also triggered several other technologies based on its digital cryptology technology. The aim is to ensure that your information is kept safe from prying eyes while stored, used, or transferred online.

    Blockchain products such as cryptocurrencies, however, are not completely safe from hackers.

    A solution

    Zortrex400x400

    The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization. It will be using it to ensure that your highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details. Instead the hackers ran off with the date of birth; passport numbers; financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.

    Brown’s background in data privacy systems as well as her devoted passion for the protection of PII, financial and healthcare data led her to start up and chair Zortrex. 

    The law on data

    Thanks to new laws like the European GDPR law, which enforces the protection of data, breaches are now met with hefty financial penalties.

    “Companies have disrespected your data for over 25 years, and if left unattended, there will be nothing left to protect,” Browns says.

    Companies now have to think twice about getting your consent and how to use and share your data digitally. But is it enough? The simple answer is no.  

    The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches.

    We have ingeniously invented systems that automatically align with financial messaging, payments and securing information. All of which require data. 

    “However, we need to go a step further to secure all the PII details with tokenization. This is so that in the event of a hack, the cookies and trackers will only be following a ‘useless’ token will be no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenize all healthcare data. This way, vulnerable those of you living outside of major cities can also feel assured that your privacy is protected.

    Using Blockchain

    The application of the all-powerful blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with your data – especially the most sensitive ones.

    A business angel or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope.

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector.

    A tokenized supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would allow the police to “talk” to the prison service. They,  in turn, will communicate with the legal sector or public health institutions (NHS).

    Forensic evidence would in such instances be tokenized and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which could replace some lawyers) can spark off legal aid assistance to you.

    Your court cases will be heard quicker and be more efficient.  Protection registers can also be guarded using tokenization – rendering them more secure.

    Blockchain technology offers quality assurance making sure that no shortcuts are taken.

    This will enable the monitoring and tracking if any of your data is shared with third parties once tokenized. The third-party apps would only gain access to your data once the trigger has been activated.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenized, might seem far-fetched.

    Zortrex wants to use its technology to put the hackers out of business! 

    Tokenisation cannot be mathematically reversed and thus it will least it will keep the hackers busy for a while.

    Scalability

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability. This is the ability of a network or software to grow and manage increased usage.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, however, have massive scalability issues.

    The growth in demand for DApps is also crippling (slowing down) those systems. They need to investigate the incorporation of alternative technologies, upgrade or split their platforms to cope with such high demand.

    Someone must take the first step in securing this data forever. You should be able to purchase what you want without being harassed by trackers and cookies.

    The need for tokenization is endless and further, down the line, celebrities and government official’s PII can be secured by it to protect them from damaging schemes, ‘bad press’, and scandals.

    In a previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the type of work they engage in is considered groundbreaking – and one with the potential to have a massively, positive impact on our livelihoods, it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’ nor that it is cutting-edge/fascinating and therefore must be an excellent product – it actually has a value proposition for everyday people!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers and its fragility when used and abused by unscrupulous third-parties for their financial gain, the issue of data security is quite a serious issue – we must just pay attention to the news to become even more aware.

    In Europe, the where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked – with several hundreds of thousands of customers’ personal data compromised. This was followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked, leaving vulnerable passengers terrified and stuck high up in the air – probably to the amusement of the pranksters (hackers).  We all know about driverless buses and cars coming to the market soon.

    Can you imagine the chaos and commotion that would be caused if their control systems were to be hacked?  The hacks get even more sophisticated: this time, affecting the very wealthy –  private yachts are being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    On the issue of data security (with almost full anonymity); we have also heard about extra protection (and not just anti-virus and anti-phishing software) but the more secure and heavily encrypted Blockchain technology that is making waves in the digital sphere. Mainly for the escalation of its once shining star by-product designed for discreet transacting – the Bitcoin.

    It has also triggered several other technologies based on its digital cryptology technology to ensure that information is kept safe from prying eyes while stored, used or transferred online.

    Zortrex400x400The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization – and will be using it to initially ensure that highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details, instead the hackers ran off with the date of birth, passport numbers, financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    “Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.”

    The establishment of this start-up company was due to Brown’s background in data privacy systems as well as her devoted passion for the protection of PII and financial/healthcare data.  In her view, companies have disrespected their customer data for over 25 years, and if left unattended, there will be nothing left to protect.

    Thanks to new laws like the European GDPR law which is now imposing the data protection; data breaches and abuse of customer data is now met with hefty financial penalties. Companies now think twice about consent and how to use and share customer’s data digitally – but is it enough? The simple answer is a no.  The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches – yet.

    “We have ingeniously invented systems that automatically align with financial messaging, payments and securing information, all of which require data. However, we should and need to go a step further to secure all the PII details with tokenisation so that in the event of a hack, the cookies and trackers will only be following a useless token as there is no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenise all healthcare data so that vulnerable people living outside of major cities can also feel assured that their privacy is protected. In a previous blog, we wrote about the new Internet of things (IoT). For all those devices being built for it, their IP addresses and the serial numbers can be tokenised to avoid the terrifying thought of the whole Internet being compromised.

    N26_banner-160x600-EN

    The application of the all-powerful Blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with customer data – especially the most sensitive ones.

    An angel investor or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope!

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector and a tokenised supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would enable the police to “talk” to the prison service,  who in turn, will communicate with the legal sector and public health institutions such as the UK’s NHS.

    Forensic evidence would in such instances be tokenised and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which are touted to replace lawyers) can spark off legal aid assistance, so that court cases can be heard quicker, more efficient than currently pertains.  Protection registers can also be protected with tokenisation rendering it more secure.

    Blockchain technology offers quality assurance with every process being undertaken making sure that no shortcuts happen; as the smart contracts trigger any possible malfeasance. This will enable the monitoring/tracking of any data sharing to third parties once it is tokenised. The third party apps would only gain access to the data once the trigger has been activated.

    The company will be providing numerous business blockchain platforms; Asset Chain, Supply Chain, Accountancy Chain, Debt Chain, Life Cycle Management Chain, Outsourced Worker Chain; the list is endless, and all will be adequately secured.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenised, might seem farfetched – but may we remind you of the need for data protection taking into consideration the growth rate of massive data breaches.

    Zortrex is aiming high and wants to use their technology to put the hackers out of business!  Tokenisation cannot be mathematically reversed and thus it will least it will stop the hackers for a while.

    Brown explains further that as they move with their education; other information can be added on to the token, as with all their healthcare; any allergies tokenised; what injections they have had right through their life cycle until the day no more data can be tokenised.

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability – which in tech terms, is the ability of a network or software to grow and manage increased demand.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, has massive scalability issues. The growth in demand for DApps is crippling those systems and they are having to investigate the incorporation of alternative technologies, upgrade or split their platforms and accompanying cryptocurrencies to cope with such high demand.

    Someone must take the first step in securing this data forever. Citizens should be able to purchase what they want without being harassed by trackers and cookies. The need for tokenisation is endless and further, down the line, celebrities and government official’s PII can also be secured to protect them from damaging schemes, ‘bad press’ and scandals.

    In another previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Digital Dribs & DApps!

    Digital Dribs & DApps!

    We have barely scratched the surface with the Internet (from the early eighties) and it is already seemingly being threatened with the competition. A possible replacement by a new phenomenon.

    Well, for lack of a better word, “replaced” has connotations of a dying Internet. This is far from accurate. This new phenomenon – fostered by blockchain technology, will change the way we use and consume the Internet as a service.

    So, what is this new Internet-like system creating waves online? And why is it making online marketers quiver at the prospect of them losing out on the exponential revenues they have previously enjoyed?


    Well, without hyping it up any further, it is called Distributed Applications or ‘DApps’ for short.

    A brief history of Apps

    Before we delve further into its meaning and use in the cyber world, perhaps some background context is required.


    The way we use online or mobile applications software or “Apps” has changed how we consume products and services online. Companies jumped onto the bandwagon when they discovered that we mostly use Smartphones for the Internet.

    App developers were then subsequently sought after to create mobile Apps for practically anything.  What started as something mainly for gamers moved quickly onto applications for practically any commercial activity.


    We now use Apps for our shopping; fitness; traveling; online bookings and banking. Developers now create customized software to help us with practically, anything.


    In addition, we now have App stores for every significant tech provider – Microsoft, Google, and Apple to mention a few. This has naturally fattened the pockets of software companies and created an additional stream of income for them.

    The ‘catch’ for using mobile apps is that even though it costs you nothing to download, using them still requires you to register with your personal details. You can also do this by linkingyour existing social media accounts.

    The benefit to App providers

    These Apps, which are integrated with social media services, create a data goldmine for marketers to study and track browsing habits. Through them, marketers can gain valuable insights into your interests and then customize their products/services to sell to you.

    The impetus behind a distributed application system is that it serves to distribute plow some of the wealth garnered from your data via application providers back to you.

    Data mining has become more lucrative and accessible because of Artificial Intelligence (AI) and Machine Learning. Do you ever notice how after browsing online or having a conversation or a chat application like WhatsApp or Facebook Messenger? You go online later, and you see Ads displaying the items you discussed? Creepy isn’t it? Well, that is the future of Web 4.0 for you!

    Staying ‘woke’

    Luckily for us, there is a school of knowledgeable and security-conscious programmers who are not ‘giving in’. They help us understand how the Internet has become a cesspool for marketers to harvest our data. Social media platforms, search engine providers, and mobile application providers facilitate them immensely with this.

    Image Courtesy of blockgeeks

    Imagine getting paid to surf the web for hours. The way you get paid for taking on a survey, partaking in a social experiment, donating an organ or sperm?


    This is the way distributed apps are touted to work. They reward you for the use of specific applications (in a peer-to-peer review setting) with cashable tokens. Seems only fair right?


    Now you can imagine how companies like Cambridge Analytica would react to having to pay you for their use of your data. They would surely be reluctant and that’s why they preferred to work clandestinely. But if they could pay companies like Facebook for the use of data, why not pay us directly?

    Early adoption

    Joining the ‘DApps revolution’ is a no-brainer. Those at the forefront of building and supporting DApps will end up with a more substantial chunk of the market.

    DApps primarily provide you with the use of payment systems. These are specifically known as Smart Contracts and Proof of Work systems.


    There are currently also web-browsers (built as DApps on blockchain platforms such as Ethereum or EOS) that will reward you for merely using their DApps.


    For instance, you are rewarded in cashable tokens to surf the net over applications like Google Chrome, or Mozilla Firefox.


    It is only a matter of time that this form of Internet-browsing and use of applications becomes the norm.


    The Internet revolutionized the way we communicate, socialize, learn, shop, and do business online. DApps however, will determine the way you get compensated for doing the things you love to do online.

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.