Summary (TL;DR)
Self Health Quantification BlockChain is a distributed Personal Health Record (PHR) which private and secured with the help of blockRing™ technology.
Self Health Quantification BlockChain is a distributed Personal Health Record (PHR) which private and secured with the help of blockRing™ technology.
With the abundance of self quantification data, blockchain can be a very nice platform for a citizen participatory health research leading to personal health advances.
This is what motivates us to develop SHQB.
SHQB is a permissionned blockchain, it run on top of IPFS and using the SHAKE-224 sponge function for securing the records, and the IDENT20 identity hash for the mutables.
Our objective for the blockchain is facilitating the capture and sharing of personal data, such that anyone can maintain her own personal-health-record PHR
read our abstract (abstract.txt)
and check our poster
blockchain: discoverable (no wall guarded garden)
blockchain: resistance to manipulation
management of consent forms (direct integration).
there are also several side benefits to a blockchain architecture (permanent, log trail, visioning, privacy, concensus, discoverable)
Sep 24, 2019 |
body here … QmWHT7rY4dGjofJ6XtGHLHEPtGeuVg94v8iUL7WAuZpbkj
Sep 24, 2019 |
body here … QmWHT7rY4dGjofJ6XtGHLHEPtGeuVg94v8iUL7WAuZpbkj
Sep 24, 2019 |
body here … QmWHT7rY4dGjofJ6XtGHLHEPtGeuVg94v8iUL7WAuZpbkj
Sep 24, 2019 |
body here … QmWHT7rY4dGjofJ6XtGHLHEPtGeuVg94v8iUL7WAuZpbkj
Sep 24, 2019 |
Finance, Insurance, Healthcare, all rely on leaky proof in their operations, leading to the bigger horror stories, from perso info leaked, CCard number,
Self sovereign Identity requires a mean of proving one identity or [nym], without giving away critical information which can be malinianly reuse by corrupted individuals
a proof can be
Proofs property:
Example : interactive ZK Proof Riddles
Sudoku Solution
range proof of salary
msg -[commit]-> H(msg) -[open]-> msg (msg revealed)
homomorphic commitment + range inner product proofs
Cryptography give us a way to secure point-to-point communication,
Pseudo anonymous blockchain try to solve the “point-to-many” security permission blockchain are simply using the point-to-point i.e. the security problem disappear when intermediary are removed
Sep 24, 2019 |
DHT & Malware distribution
CAS as a giant world wide Rainbow-Table
Abstract
Modern malware can take various forms, and has reached a very highlevel of sophistication in terms of its penetration, persistence, communi-cation and hiding capabilities. The use of cryptography, and of covertcommunication channels over public and widely used protocols and ser-vices, is becoming a norm. In this work, we start by introducing Re-source Identifier Generation Algorithms. These are an extension of awell-known mechanism called Domain Generation Algorithms, which arefrequently employed by cybercriminals for bot management and commu-nication. Our extension allows, beyond DNS, the use of other protocols.More concretely, we showcase the exploitation of the InterPlanetary filesystem (IPFS). This is a solution for the “permanent web”, which enjoysa steadily growing community interest and adoption. The IPFS is, in ad-dition, one of the most prominent solutions for blockchain storage. Wego beyond the straightforward case of using the IPFS for hosting mali-cious content, and explore ways in which a botmaster could employ it,to manage her bots, validating our findings experimentally. Finally, wediscuss the advantages of our approach for malware authors, its efficacyand highlight its extensibility for other distributed storage services
Aug 20, 2019 |
In order to secure the documents in the blockring we use the SHAKE-224 sponge function. and we wrote a few perl routines to computes the different hash values.
The perl module KMAC.pm implements the NIST SP800-185* bytepad, left_encode, right_encode function. for the message authentication code KMAC (MAC-SHA3) using cSHAKE hash function (Secure Hash Algorithm KECCAK)
note:
cSHAKE is slightly different than NIST because of the 2 bits: 00 in message for the sponge function.
# KMAC128(K, X, L, S): Validity Conditions: len(K) < 2^2040 and 0 ≤ L < 2^2040 and len(S) < 2^2040
# newX = bytepad(encode_string(K), 168) || X || right_encode(L).
# return cSHAKE128(newX, L, “KMAC”, S).
# KMAC256(K, X, L, S): Validity Conditions: len(K) < 2^2040 and 0 ≤ L < 2^2040 and len(S) < 2^2040
# newX = bytepad(encode_string(K), 136) || X || right_encode(L).
# return cSHAKE256(newX, L, “KMAC”, S).
# example for using S (Customization String)
# * cSHAKE128(public_key, 256, "", "key fingerprint")
# * cSHAKE128(email_contents, 256, "", "email signature")
Jan 26, 1969 |
This is is a test post for a message from a long time ago …
It is Sunday, January 26, 1969, the day I decided to show up, here you go I (Michel G. Combes) am coming to this reality on earth.
see also [*]
This website is checked-in in a GIT repository by the *bot: Jimmie K. Duensing.
If we consider SHA1 is still a safe hash,
then we can say this page is on a “git blockchain”,
the consensus is that the HEAD of the chain
is //michel47.github.io/shqb.ml (resolved with DNS);
it is replicated on netlify
the mutable is the version tag “v1.4.7”;
and the previous block on the chain is the immutable :
git:d5eb2b9770116223f78e08822e9e6d856eda472e,
which is visible on the IPFS network at permalink:
/ipfs/zdj7WYDR6v38mfiPGMnKHQnxg1pXX69zfBt3yBkCRsi5j4uoj/shqb.ml.
{“date”=>”09/14/19”, “time”=>”23:28:30”, “version”=>”1.47 - xufi”, “gitid”=>”d5eb2b9770116223f78e08822e9e6d856eda472e”, “rel”=>”v1.4.7”}
previous revisions : revs.log
{"spot"=>"f113bf13b230fea92d330c5cdd805c642d1d256c", "zb58"=>"zdj7WbwSL2k4jDdXqdcGzW8qDVSfUYsJn3jWP1BSSHJH2Trrk (49c, 36B) : f0170122060b...", "cid"=>"\\xb7", "sha16"=>"60b74ca2726637c2737f1337d5e04593861238151bad92b42ed661f5d8023b89", "mh16"=>"f01b7002060b74ca2726637c2737f1337d5e04593861238151bad92b42ed661f5d8023b89", "mh32"=>"bAG3QAIDAW5GKE4TGG7BHG7YTG7K6ARMTQYJDQFI3VWJLILWWMH25QAR3RE", "mh58"=>"zkobk6PN76WE1wKNjbQNsYXgPunm3wCkUdXY362cN1KktmbBE", "split"=>"3R", "id7"=>"60b74ca", "CID7"=>"bk6PN76", "shortfp"=>"3QA-tmbBE", "n1"=>33950580, "n2"=>3391563363, "n3"=>2082945009, "n4"=>863854084, "color"=>"violet", "flower"=>"tulip", "dice"=>"baron dj tact gross 52nd drury tva og earn tick chosen snick from rico paine blithe abject pluto excess zw", "bin"=>"60b74ca2726637c2737f1337d5e04593861238151bad92b42ed661f5d8023b89", "funiq"=>"b74ca2726637", "luniq"=>"c2737f13", "b5494"=>1215182148643835, "b88799"=>3673851413, "fullname"=>"Jimmie K. Duensing", "robot"=>"https://cdn.statically.io/img/robohash.org/set_set1/bgset_bg0/size_196x196/ignoreext_false/jimmie.kimberlee.halley.emelda...duensing.mcnay.png", "user"=>"jduensing", "colors"=>"60b74c a27266 37c273 7f1337 d5e045 938612 38151b ad92b4 2ed661 f5d802 3b8900", "DBUG"=>"60b74ca2726637c2737f1337d5e04593861238151bad92b42ed661f5d8023b89000000", "foaf"=>"60b74ca2726637 c2737f1337d5e0 4593861238151b ad92b42ed661f5 d8023b89000000", "base150"=>"3-0-96-111-33-88-105-3-47-94-120-107-83-18-92-49-44-6-97-115-32-112-74-118-29-27-89-15-32-144-58-39-22-42-56-17", "base142"=>"20-64-130-13-35-35-80-100-22-8-96-51-77-66-62-65-17-37-135-88-78-66-32-67-77-44-79-19-51-54-68-18-19-121-139-131", "firstname"=>"Jimmie", "lastname"=>"Duensing", "maiden"=>"Mcnay", "middle"=>"Kimberlee", "qm"=>"zdj7WbwSL2k4jDdXqdcGzW8qDVSfUYsJn3jWP1BSSHJH2Trrk"},{"release"=>"v1.4.8", "date"=>"09/15/19", "user"=>"amilite", "parent"=>"44eedaa", "qm"=>"zdj7WkEEjQJvJZd4oiXYyFZ8Ny27obG89Y278479U7yqnYJhn", "bafy"=>"bafybeig34kheft2q2yuuny4hcas6p4tqglfeq7kom57kcumnebuet3ivje", "webroot"=>"bafybeibjmb2uzqmdwjvhd3a4nsg6aelgoh74ugfp3hxkkvvdequnmlj6xy", "wr58"=>"zdj7WYDR6v38mfiPGMnKHQnxg1pXX69zfBt3yBkCRsi5j4uoj", "www"=>"bafybeiawzj6zdjlnr673khgybqraxk5k2zktoyhkjpqh2nr2ibtpznefga", "pgw"=>"https://gateway.ipfs.io"}