Blockchain Use Cases

Our partners over at XWEBHOSTING have been developing a Radium Smartchain application for WHM/cPanel to provide direct access to the SmartChain verification and validation protocols. By first encrypting the email via PGP, a user can not only transmit data securely, but they and the receiving party can verify and validate the content seamlessly via the SmartChain.

On February 20, 2016 the Linux Mint website was hacked. The hackers were not only able to access the Mint mirrors to replace the iso files, but also got into the website and replaced the check-sums on the downloaded isos. What this means is if you downloaded their iso on the day it was hacked, even verifying the download would have returned that it was the appropriate file since the incorrect check-sum was being used for verification.

How could this issue have been avoided?

With Radium Smart-Chain technology! With the ability to record a file’s check-sum directly into the blockchain, the sha256 hash would have been forever recorded and impervious to external manipulation. This technology seeks to allow users the ability to quickly verify the integrity of open-source and shared files within a single user-friendly application as demonstrated below:

1) The first step would be done by the creator of the original file being shared. This user would record the files check-sum on the Smart-Chain during the process of making it publicly available for download.

2) The second step is done by any user wanting to download the shared file in question. Much like the first step, the user simply identifies the file through the Smart-Chain and receives a confirmation that the file is intact and unchanged if the check-sums check out.

Additional Radium Smart-Chain Functionality and Cyber-Security Implications

Along with recording file check-sums, the SmartChain also has the ability to record text notes. What this means is the sha256 check-sum text file located at http://mirrors.kernel.org/linuxmint/stable/17.3/sha256sum.txt could have been permanently recorded with no chance of a man-in-the-middle attack being able to replace the text file from the mirror website!

With the ability to verify hashes in the SmartChain instead of relying solely on potentially compromised websites, users will not only be able to avoid infecting their machines, but they will also be able to pro-actively combat compromised files leading to a much safer inter-netting experience.

On March 7th, the first MAC ransom-ware was discovered on a recent update to the Transmission BitTorrent Client. The malicious software was downloaded 6,500 times before it was uncovered that it was not the real file version. Apple as well as Transmission have since released the correct file update and are now assisting all of the affected community members with removing the malware.

Transmission Ransom-ware File Alert

One-Click Verify Can Help

The Radium Smart-Chain is focusing on assisting open-source groups with securing the distribution of their software. If the Transmission software check-sums were registered on the Smart-Chain, all community members downloading the software could have utilized the One-Click Verify application to get an instant confirmation that the file was malicious.

One-Click Verify does direct comparisons of target file check-sums against the unalterable stored check-sums, which the developing organization publishes on the Radium Smart-Chain.

In this case, 6,500 users could have been spared the terror and frustration of having to remove this malware. The release article does not suggest how many users paid the ransom, but at $400 each One-Click would have been worth the small time investment for Transmission.

Get Your Files Published!

To the Transition team or any other group reading this, contact Project Radium for details on getting your Check-sums published to the Smart-Chain.

You can read the whole article here: http://www.macrumors.com/2016/03/07/transmission-malware-downloaded-6500-times/

Proof of Author has uses beyond Bitcointalk but this usage scenario is intended as a Smartchain based Proof-of-Developer and uses the Project Radium Smartchain client to secure file downloads from infamous “repost trolls.” Terrible Problem: OP Dev Alice posts wallet update on thread Scammer Billy quotes Alice but changes the html in her link Noob Bob downloads Billys link thinking it is Alice’s release and Bobs computer becomes infected.

Low Cost Avoidance: OP Dev Alice secures the hash of her github source (likely zipped) and file download links (zipped or unzipped however theyre linked) in the Smartchain using her known registered Smartchain username. OP Dev Alice requests users wishing to run her coin wallet or program to also download the Project Radium One-Click-Verify tool and use it on any downloads posted. OP Dev Alice posts updated files whose hashes have been stored in the Smartchain. Scammer Billy quotes new links and changes the URL to an imposter. Noob Bob downloads nefarious links but runs the Project Radium Smartchain One-Click-Verify tool and notes the files do not belong to Dev Alice. Bob does not run the executables Bob also reports Scammer Billy. Crisis averted, Bobs computer remains safe.

This scenario helps people double check a file they downloaded is from who they intended it to be from. It requires no Radium client or Smartchain client to verify a file so it is easy for the end user. A prospective developer would need to run the clients and accumulate a small amount of Radium tokens to secure hashes in the Radium chain as well as the initial verification of their name.

This scenario will allow you to make sure you get Alice’s file but if Alice’s file is malicious the Smartchain is not responsible for the content of anything stored within.

Radium and Radium SmartChain tech empowers creative minds to digitally bind their identity to their creation in an immutable, traceable form. For example, as per Ben Horowitz, "you can build art that only one person owns, and you don't have to trust a broker or somebody who might be faking it."

Applicable to any and all business classifications, SmartChain Identities allow for businesses to ensure that employees and vendors are accountable for their decisions. By binding these identities to the individual, all data accessed, modified, and/or created by the individual/entity will be stored in an easily traceable and immutable form for future reference.

While the SmartChain Elections protocol is clearly applicable to any sort of voting and election process, coupled with SmartChain Identities, it can be used for local and even national election processes; and due to the immutable and indisputable accuracy of blockchain tech, results can be trusted with the utmost confidence.

SmartChain protocols currently in development will allow for direct integration into Microsoft Office. For example, the plugin for Microsoft Outlook will enable the use of the Radium Blockchain and SmartChain Identities to sign, verify, validate, and IPFS encrypt not only files, but also the contents of an email, tying them to the individual, allowing for both accountability and verification of legitimacy.

Via SmartChain Identities, user control is enabled and managed via the SmartChain desktop application (web and mobile coming soon). On this, users can add personal data to their digital identity, have it certified, and consent to share it with chosen service providers.

Only ‘attestations’ issued by trusted parties are stored on the blockchain, keeping personal data under the sole control of users.

This distributed approach to digital ID management enables service providers to leverage ubiquitous identities certified by trusted parties, while putting users firmly in control of their data.

By creating and managing their own self-sovereign digital IDs, users can enroll with a host of different digital banking, ecommerce, and government services, without having to go through due diligence processes for each of them.

Under banking and data privacy regulations, all financial institutions have to implement robust KYC (know your customer), data privacy and protection procedures, and strong customer authentication. They are therefore ideally positioned to lead the self-sovereign digital ID revolution.

Other service providers that rely on verified customer identities, such as public services, mobile operators, and airlines, could also reap significant benefits from the system, including the opportunity to share ID management costs.

[Source: InternetOfBusiness,Gemalto,R3]

This is a promising development, because one thing missing from the digital economy has been a means for citizens to manage their own digital identities and personal data from a single point – such as a personal API.

If consent could be built into such an interface – with personal data owned and managed by the data subject – an ID management system could have wide-reaching benefits.

For example, a form of citizen-backed CSR could arise, in which citizens agree to their data being used for some purposes, but not others, while maintaining ownership and control over it – and, hopefully, being rewarded for that consent.

[Source: InternetOfBusiness]

The tracking of assets is a major issue for some financial services companies as there is currently no digital system to track goods such as fine artworks or aeroplane parts. Given a blockchain's ability to provide an immutable history of all transactions relating to an asset, the potential to track assets on a blockchain is apparent. A simple ledger could be utilized by key stakeholders such as insurance companies, asset managers and buyers. Coupled with SmartChain identities, tying an asset to an individual has the power to create a truly secure and dependable environment.