Self Quantification BlockChain

We believe in wisdom gained with sharing our health data.
We developed the technology to keep it secures and private.


Summary (TL;DR)

Self Health Quantification BlockChain is a distributed Personal Health Record (PHR) which private and secured with the help of blockRing™ technology.


Self Quantification blockChain

With the abundance of self quantification data, blockchain can be a very nice platform for a citizen participatory health research leading to personal health advances.

We want to make self-quantification so easy that everyone will do it.

This is what motivates us to develop SHQB.

SHQB is a permissionned blockchain, it run on top of IPFS and using the SHAKE-224 sponge function for securing the records, and the IDENT20 identity hash for the mutables.


Our objective for the blockchain is facilitating the capture and sharing of personal data, such that anyone can maintain her own personal-health-record PHR

read our abstract (abstract.txt)
and check our poster
poster2


Problems to solve


Why blockchain ?


QR

contact info:



Posts:


Article 7 (2019-09-15)

 Sep 24, 2019 |

body here … QmWHT7rY4dGjofJ6XtGHLHEPtGeuVg94v8iUL7WAuZpbkj

Article 6 (2019-09-15)

 Sep 24, 2019 |

body here … QmWHT7rY4dGjofJ6XtGHLHEPtGeuVg94v8iUL7WAuZpbkj

Article 5 (2019-09-15)

 Sep 24, 2019 |

body here … QmWHT7rY4dGjofJ6XtGHLHEPtGeuVg94v8iUL7WAuZpbkj

Article 4 (2019-09-15)

 Sep 24, 2019 |

body here … QmWHT7rY4dGjofJ6XtGHLHEPtGeuVg94v8iUL7WAuZpbkj

Zero Knowledge Proof of Anything

 Sep 24, 2019 |

Finance, Insurance, Healthcare, all rely on leaky proof in their operations, leading to the bigger horror stories, from perso info leaked, CCard number,

Self sovereign Identity requires a mean of proving one identity or [nym], without giving away critical information which can be malinianly reuse by corrupted individuals

a proof can be

Proofs property:

Zero Knowledge Proof

Example : interactive ZK Proof Riddles

Homomorphism (arithmetically conservative)

commitement (bet in future)

msg -[commit]-> H(msg) -[open]-> msg (msg revealed)

homomorphic commitment + range inner product proofs

This is where zero-knowledge proof are powerful

Cryptography give us a way to secure point-to-point communication,

Pseudo anonymous blockchain try to solve the “point-to-many” security permission blockchain are simply using the point-to-point i.e. the security problem disappear when intermediary are removed

Content addressed storage and Malware, Article 2 (2019-09-15)

 Sep 24, 2019 |

DHT & Malware distribution

CAS as a giant world wide Rainbow-Table

read more:

Abstract
Modern malware can take various forms, and has reached a very highlevel of sophistication in terms of its penetration, persistence, communi-cation and hiding capabilities. The use of cryptography, and of covertcommunication channels over public and widely used protocols and ser-vices, is becoming a norm. In this work, we start by introducing Re-source Identifier Generation Algorithms. These are an extension of awell-known mechanism called Domain Generation Algorithms, which arefrequently employed by cybercriminals for bot management and commu-nication. Our extension allows, beyond DNS, the use of other protocols.More concretely, we showcase the exploitation of the InterPlanetary filesystem (IPFS). This is a solution for the “permanent web”, which enjoysa steadily growing community interest and adoption. The IPFS is, in ad-dition, one of the most prominent solutions for blockchain storage. Wego beyond the straightforward case of using the IPFS for hosting mali-cious content, and explore ways in which a botmaster could employ it,to manage her bots, validating our findings experimentally. Finally, wediscuss the advantages of our approach for malware authors, its efficacyand highlight its extensibility for other distributed storage services

NIST SP800-185* Perl Module

 Aug 20, 2019 |

In order to secure the documents in the blockring we use the SHAKE-224 sponge function. and we wrote a few perl routines to computes the different hash values.

The perl module KMAC.pm implements the NIST SP800-185* bytepad, left_encode, right_encode function. for the message authentication code KMAC (MAC-SHA3) using cSHAKE hash function (Secure Hash Algorithm KECCAK)

note:



Read More

Arrival on earth

 Jan 26, 1969 |

This is is a test post for a message from a long time ago …

It is Sunday, January 26, 1969, the day I decided to show up, here you go I (Michel G. Combes) am coming to this reality on earth.

see also [*]



bot

This website is checked-in in a GIT repository by the *bot: Jimmie K. Duensing.
If we consider SHA1 is still a safe hash, then we can say this page is on a “git blockchain”, the consensus is that the HEAD of the chain is //michel47.github.io/shqb.ml (resolved with DNS); it is replicated on netlify the mutable is the version tagv1.4.7”; and the previous block on the chain is the immutable :
git:d5eb2b9770116223f78e08822e9e6d856eda472e, which is visible on the IPFS network at permalink:
/ipfs/zdj7WYDR6v38mfiPGMnKHQnxg1pXX69zfBt3yBkCRsi5j4uoj/shqb.ml.

{“date”=>”09/14/19”, “time”=>”23:28:30”, “version”=>”1.47 - xufi”, “gitid”=>”d5eb2b9770116223f78e08822e9e6d856eda472e”, “rel”=>”v1.4.7”}

previous revisions : revs.log


version


m.combes Netlify Status
{"spot"=>"f113bf13b230fea92d330c5cdd805c642d1d256c", "zb58"=>"zdj7WbwSL2k4jDdXqdcGzW8qDVSfUYsJn3jWP1BSSHJH2Trrk (49c, 36B) : f0170122060b...", "cid"=>"\\xb7", "sha16"=>"60b74ca2726637c2737f1337d5e04593861238151bad92b42ed661f5d8023b89", "mh16"=>"f01b7002060b74ca2726637c2737f1337d5e04593861238151bad92b42ed661f5d8023b89", "mh32"=>"bAG3QAIDAW5GKE4TGG7BHG7YTG7K6ARMTQYJDQFI3VWJLILWWMH25QAR3RE", "mh58"=>"zkobk6PN76WE1wKNjbQNsYXgPunm3wCkUdXY362cN1KktmbBE", "split"=>"3R", "id7"=>"60b74ca", "CID7"=>"bk6PN76", "shortfp"=>"3QA-tmbBE", "n1"=>33950580, "n2"=>3391563363, "n3"=>2082945009, "n4"=>863854084, "color"=>"violet", "flower"=>"tulip", "dice"=>"baron dj tact gross 52nd drury tva og earn tick chosen snick from rico paine blithe abject pluto excess zw", "bin"=>"60b74ca2726637c2737f1337d5e04593861238151bad92b42ed661f5d8023b89", "funiq"=>"b74ca2726637", "luniq"=>"c2737f13", "b5494"=>1215182148643835, "b88799"=>3673851413, "fullname"=>"Jimmie K. Duensing", "robot"=>"https://cdn.statically.io/img/robohash.org/set_set1/bgset_bg0/size_196x196/ignoreext_false/jimmie.kimberlee.halley.emelda...duensing.mcnay.png", "user"=>"jduensing", "colors"=>"60b74c a27266 37c273 7f1337 d5e045 938612 38151b ad92b4 2ed661 f5d802 3b8900", "DBUG"=>"60b74ca2726637c2737f1337d5e04593861238151bad92b42ed661f5d8023b89000000", "foaf"=>"60b74ca2726637 c2737f1337d5e0 4593861238151b ad92b42ed661f5 d8023b89000000", "base150"=>"3-0-96-111-33-88-105-3-47-94-120-107-83-18-92-49-44-6-97-115-32-112-74-118-29-27-89-15-32-144-58-39-22-42-56-17", "base142"=>"20-64-130-13-35-35-80-100-22-8-96-51-77-66-62-65-17-37-135-88-78-66-32-67-77-44-79-19-51-54-68-18-19-121-139-131", "firstname"=>"Jimmie", "lastname"=>"Duensing", "maiden"=>"Mcnay", "middle"=>"Kimberlee", "qm"=>"zdj7WbwSL2k4jDdXqdcGzW8qDVSfUYsJn3jWP1BSSHJH2Trrk"},{"release"=>"v1.4.8", "date"=>"09/15/19", "user"=>"amilite", "parent"=>"44eedaa", "qm"=>"zdj7WkEEjQJvJZd4oiXYyFZ8Ny27obG89Y278479U7yqnYJhn", "bafy"=>"bafybeig34kheft2q2yuuny4hcas6p4tqglfeq7kom57kcumnebuet3ivje", "webroot"=>"bafybeibjmb2uzqmdwjvhd3a4nsg6aelgoh74ugfp3hxkkvvdequnmlj6xy", "wr58"=>"zdj7WYDR6v38mfiPGMnKHQnxg1pXX69zfBt3yBkCRsi5j4uoj", "www"=>"bafybeiawzj6zdjlnr673khgybqraxk5k2zktoyhkjpqh2nr2ibtpznefga", "pgw"=>"https://gateway.ipfs.io"}