Blockchain circle

One stop hot information platform

About us:

Blockchain circle provides the latest information about blockchain, digital currency, digital wallet, exchange, metauniverse, bitcoin, Ethereum, contract, financial management and so on, and always pays attention to the latest market...

Blockchain, big data and the memory of the other side

Time : 13/02/2022 Author : 7uv9zp Click : + -
        There is a new word that everyone is talking about but no one really knows what they are talking about, such as big data and blockchain. Although they often appear at the same time, in essence, blockchain governance mode and big data governance mode are based on two completely different control concepts. Blockchain protects anonymity, privacy and personal freedom. It doesn't matter whether you are male or female, always young, poor or rich, good or bad. People's trust is based on the system realized by a set of technologies such as cryptography and game theory, rather than based on the judgment of personal identity. Big data is different. It excavates your identity, behavior and thoughts through pervasive monitoring and analysis, and analyzes and predicts your preferences and behaviors based on "stereotypes" caused by experience and probability, so as to deepen personal control.
        Its essence comes down in one continuous line with the surveillancesociety. Bike sharing is a sharing economy mode realized by using mobile network and intelligent hardware to solve the problem of short distance travel. Ofo (small yellow car) and mobike are the two largest brands. As long as you download the mobile app and scan the QR code on the bike, you can unlock the bike and ride it. The cost of a trip is generally no more than one yuan. A big challenge for bike sharing is security, that is, how to prevent damage and theft. Both ofo and Mobai have adopted a combination of technology and traditional governance. However, the small yellow car is only a reformist who adds some technical elements, while Mobai is a revolutionary in technical Governance:.
        Small yellow cars rely on social identity to establish credit, while mobike bicycles are equally available to all users. For example, in the early version of the small yellow car, only teachers and students in school can register their vouchers for use, and now it still has differential pricing for people inside and outside the school. 2 small yellow cars rely on moral constraints to prevent evil, while mobike bikes use electronic locks to prevent evil. The mechanical lock of the little yellow car is easy to be pried off, and the cost of doing evil is very low. In contrast, mobike bicycles must be unlocked intelligently by scanning the code, and they cannot be pried open manually at all. 3 small yellow cars use license plate control and manual management to restrict the movement of vehicles, while mobike bicycles do not have such restrictions. For example, the small yellow car stipulates that only the tail number is an even number can ride out of the campus, and arranges the car watcher to screen and intercept at the school gate, while the mobike bike can flow freely in the city.
        I believe that the manual management of Xiaohuang car will be difficult to adapt to the magnitude of the blowout growth of intelligent devices in the era of the Internet of things. The right development direction is to develop real intelligent hardware like mobike and strengthen technical management. Blockchain does a lot in this sense, because it relies on consensus mechanism based on cryptography, automatically executed smart contracts and other technical terms (techcode) to strengthen internal governance, rather than relying too much on external rule of man and legalcode. However, small yellow car governance and big data governance have destroyed this point. They classify people by analyzing information such as occupation, circle and contacts, so as to decide whether someone is trustworthy.
        This will virtually deepen the inherent prejudice and cause further discrimination and differentiation. I thought there were no men or women riding bicycles, but a sister told me that there are actually two kinds of yellow bicycles. The one with a cross bar on the front fork and a high handle and a low handle is a man's car, because sitting high handle and a low handle can make people ride faster, and when getting on the car, their legs step past the back of the car, just like a knight on a horse; The other kind of car without horizontal bars and with a concave curve of the front fork is for women, because girls like to wear skirts. If they step over from the back of the car, they may show their spring glory. This delicate setting reminds me of Judith Butler's view: "gender is a role play".
        Advanced control is not an obvious compulsion, but a discipline on your body and behavior, allowing people to internalize their gender, race and class identity. This discipline, accompanied by the use of big data, is becoming increasingly pervasive. As early as the period of primitive accumulation of capitalism, Bentham put forward ‘ Circular prison ’ Theory, people's every move is monitored; In the 1970s, Foucault developed this theory and put forward "panoramic openness", pointing out that the circular prison is also a laboratory for transforming people. In addition to monitoring and collecting information, it also needs to process information, such as analyzing people's action rules and abnormal behaviors, so as to improve the form of surveillance.
        If in the Internet era, technology monitoring can be compared to the tireless "third eye" described by Orwell in 1984, then in the era of Internet of things and big data, "third eye" may enter a higher level. The sensory layer of the Internet of things can use GPS, QR code, magnetic stripe and various sensors to track and identify objects, and the computing layer can predict personal portraits and behaviors through big data mining. The most critical thing is that the ubiquitous nature of the Internet of things is far greater than the Internet. Theoretically, every object can become a node on the seamlessly connected Internet of things.
        This ubiquity not only violates personal privacy and freedom, but also causes serious security problems. Cyberspace is evolving into a field of power struggle. Enterprises, governments, hackers and netizens are all playing a game of power. In the "digital prison", not only the privacy of "Prisoners" is transparent, but also the "prison guards" themselves are difficult to escape the ubiquitous technical surveillance. For example, politicians from all over the world have recently staged a better drama than cyber security drama. South Korean President Park Geun hye's best friend Choi soon Seok's computer actually has 200 "presidential secret files" and 44 presidential speeches, and Hillary Clinton has also been exposed as a "mail door". The email about her ambiguous relationship with Isis released by Wikileaks may ruin her political future.
        Some people joked that the writers of American TV series "house of cards" and jtbc's Korean TV series "secret meeting" should all take the blame and resign, because their artistic works only come from life, but are not higher than life at all. The collapse of the Internet and the digital economy is no longer a scene in science fiction films, but a very real threat. For example, last week, the United States suffered a DDoS attack that paralyzed half of the Internet. DDoS attack is an overload attack launched by a large-scale distributed cluster on a central server, which leads to the collapse of the website. In the era of PC, the cost of operating tens of millions of computers to launch attacks at the same time is very high, just like it is difficult to hire a fully equipped regular army.
        In the era of the Internet of things, it is simply not easy to operate tens of millions of zombies. Mobile phones, cameras and any smart devices on your body may be attacked by malicious code and become zombies, which is the same as women and children in wartime. With the geometric growth of the number of intelligent devices and the reduction of the cost of large-scale manipulation of devices, it can be predicted that DDoS will become the mainstream attack means in the future. What Kevin Kelly said about losing control has been reflected in today's, online hackers and offline terrorist organizations have shown the characteristics of distributed, large-scale and self-organization. However, the current anti-terrorism still adopts a centralized structure and a top-down control system, which makes security governance inefficient.
        In the face of massive decentralized attacks in the future, the distributed governance that blockchain attempts to establish may be more conducive to protecting system security than centralized institutions. Although blockchain is still in its infancy, it is impossible to solve all stubborn diseases. However, under the attack characteristics of decentralization, we should explore the Countermeasures of decentralization; In the world of man-machine integration, we should try to combine techcode with legalcode. In this context, blockchain is in the right direction. Big data governance has brought us all pervasive censorship and control, which runs counter to the spirit of freedom, equality and inclusiveness of the Internet, while the anonymity mechanism of blockchain can reserve an inviolable spiritual corner for everyone.
        As Stigler reminded us in "technology and time", the real memory is not the memory of this world (based on events and facts), but the memory of the other side, that is, the recognition of "what is human".
Previous:An overview of the investment territory of Unicorn animoca, brands of metauniverse Technology
Next:No more

Related articles:

© 2005-2032 | Blockchain Circle & & All Rights Reserved    Sitemap1 Sitemap2 If there is infringement, please contact us at: