{"id":910,"date":"2022-08-08T10:54:00","date_gmt":"2022-08-08T10:54:00","guid":{"rendered":"https:\/\/dev.cryptoloc.au\/?p=910"},"modified":"2023-10-03T06:13:28","modified_gmt":"2023-10-03T06:13:28","slug":"as-easy-as-1-0-2-0-3-0-what-web-3-0-means-for-the-future-of-data-security","status":"publish","type":"post","link":"https:\/\/127.0.0.1\/as-easy-as-1-0-2-0-3-0-what-web-3-0-means-for-the-future-of-data-security\/","title":{"rendered":"As easy as 1.0, 2.0, 3.0: What Web 3.0 means for the future of data security"},"content":{"rendered":"\n

By Melissa Crossman, Chief Executive Officer of Cryptoloc <\/strong><\/em><\/p>\n\n\n\n

The next phase in the evolution of the web is upon us, but how much stock should we really be putting in Web 3.0, and what will it actually look like when it\u2019s here? <\/p>\n\n\n\n

It turns out Web 3.0 could be closer than you think \u2013 and when it comes to data security, the third time\u2019s the charm. <\/p>\n\n\n\n

What is Web 3.0? <\/h3>\n\n\n\n

Simply put, Web 3.0 is the next iteration of the internet \u2013 although what form that will actually take has been a matter of much debate. <\/p>\n\n\n\n

Web 1.0 and Web 2.0 are relatively straightforward concepts. Web 1.0 was the first period of the World Wide Web, as pioneered by Tim Berners-Lee when he was working as a computer scientist at CERN in 1989. This first generation of the web lasted until about 2004, and was defined by static websites that the majority of users consumed without producing their own content. <\/p>\n\n\n\n

Web 2.0, which continues to this day, is defined by the shift towards the web as a platform for users to connect and generate their own content. Facebook, YouTube, Twitter and TikTok, for instance, all exemplify the interactive nature of Web 2.0 \u2013 the era in which virtually every user became a creator. <\/p>\n\n\n\n

What comes next isn\u2019t as well defined. In 2001, Tim Berners-Lee said he expected Web 3.0 to be the Semantic Web, in which data can be easily processed by intelligent machines, without any need for human input. But in practice, this hasn\u2019t really panned out, because it\u2019s still virtually impossible for even the most sophisticated machine to understand human concepts and contexts. <\/p>\n\n\n\n

More recently, Web 3.0 has come to be understood to mean a shift towards decentralisation and a greater degree of data security and privacy; a web where you own and control your data and you determine who profits from it. <\/p>\n\n\n\n

Currently, the infrastructure of the web is built around centralised servers, and a small number of large technology companies wield an outsized influence. But there\u2019s been much speculation that a blockchain-based Web 3.0 will distribute services and applications, with data residing on the devices \u2013 or \u2018nodes\u2019 \u2013 on a blockchain network rather than a centralised location. Proponents of a blockchain-based Web 3.0 argue this would put control of data back in the hands of users, in much the same way that blockchain-based cryptocurrencies operate without the need for a central authority. <\/p>\n\n\n\n

Breakthrough or buzzword? <\/h3>\n\n\n\n

Web 3.0 has been the cause of plenty of excitement amongst technologists, venture capitalists and crypto enthusiasts, but it\u2019s also generated its fair share of skepticism. <\/p>\n\n\n\n

Tesla and SpaceX CEO Elon Musk and former Twitter CEO Jack Dorsey have been amongst the most prominent critics, with Musk tweeting that the concept \u201cseems more a marketing buzzword than reality right now\u201d. <\/p>\n\n\n\n

On this occasion, at least, Musk might be correct. Web 3.0 is more vapourware than viable model right now, at least in the sense that it\u2019s come to be popularly understood. <\/p>\n\n\n\n

The problem is with blockchain\u2019s viability as a basis for the next evolution of the web. <\/p>\n\n\n\n

For starters, blockchain has issues with scalability. For a blockchain to store and verify data without a central authority, each node on the network has to have a full record of the data stored on the chain. The more nodes you add to a chain, and the more blocks of data you add, the more inefficient the chain becomes. In the case of large public blockchains like Bitcoin and Ethereum, this has led to higher transaction fees on those blockchains to pay for the computing resources required to power them. <\/p>\n\n\n\n

Similarly, blockchains can become extremely energy-intensive. Many blockchains are built on a proof-of-work system, in which a certain amount of computational effort has to be expended to confirm each block in the chain. <\/p>\n\n\n\n

As the blockchain network grows, so does the amount of energy expended \u2013 and while proof-of-stake systems have been created as a less energy-intensive alternative, the trade-off is that they\u2019re more complex and less secure. <\/p>\n\n\n\n

And if Web 3.0 is driven by a desire to give users greater privacy and control of their data, then blockchain is, well, a stumbling block. All transactions are visible on a public blockchain, and everybody on the network is required to be able to see the data that\u2019s added to it. That might be ideal for verifying financial transactions, but not for data you want to keep private, like medical records and confidential business agreements. <\/p>\n\n\n\n

Perhaps most importantly, moving to a blockchain-based model would require an intentionality that wasn\u2019t present in the shift from Web 1.0 to Web 2.0. There, the movement was seamless and gradual \u2013 we didn\u2019t know we were leaving Web 1.0 and entering Web 2.0 as it was happening. <\/p>\n\n\n\n

Web 2.0 changed how we used the internet, but it didn\u2019t change the underlying structure of the web in the way that shifting data from centralised servers to decentralised blockchains would. In this case, you\u2019d essentially be asking people to stop using one \u2018web\u2019 and start using another, like switching from Google Chrome to the dark web. <\/p>\n\n\n\n

Decentralised data ownership <\/h3>\n\n\n\n

Blockchain may be impractical as a basis for the next generation of the internet, but that doesn\u2019t mean the ideals of Web 3.0 can\u2019t still come to fruition. In fact, they already are. <\/p>\n\n\n\n

In practice, most data is unlikely to be decentralised. It will still be stored on central servers, not distributed across infinite nodes. But what will be distributed \u2013 and can already be distributed, with the right technology \u2013 is the control of that data. <\/p>\n\n\n\n

Data privacy is a growing concern for users, even as companies become increasingly comfortable with violating that privacy. <\/p>\n\n\n\n

Surveys conducted by KPMG last year<\/a> found that 86 per cent of users feel a growing concern about data privacy, and 78 per cent have fears about the amount of data being collected. Just over half \u2013 51 per cent \u2013 of users said they\u2019re worried about their data being sold, and 40 per cent said they don\u2019t trust companies to use their data ethically. <\/p>\n\n\n\n

On the other hand, 70 per cent of the companies analysed by KPMG actually expanded their data collection practices over the past year, and 75 per cent of business leaders said they\u2019re comfortable with the level of data they collect. <\/p>\n\n\n\n

This trust gap, between users who want to control who can access their data and businesses who don\u2019t want them to be able to, is what will actually drive the implementation of Web 3.0. <\/p>\n\n\n\n

Last year, Tim Berners-Lee told The New York Times<\/em><\/a> that too much power and too much personal data resides with the Googles and Facebooks of the world; and that a web that gives individuals more control over their data would be \u201cthe web that I originally wanted\u201d. <\/p>\n\n\n\n

His vision is a move towards personal online data stores, or \u2018pods\u2019, in which individuals could control their own data \u2013 the websites they visit, the music they listen to, the exercises in their workout routine \u2013 in an individual data safe. Companies could only access that data with the user\u2019s permission, and only for specific purposes, and they could never store it. <\/p>\n\n\n\n

This is no flight of fantasy. The technology that would enable this distribution of data ownership has already been developed. In fact, it\u2019s already available \u2013 and it\u2019s ours. <\/p>\n\n\n\n

Taking back control of your data<\/h3>\n\n\n\n

Cryptoloc\u2019s patented three-key encryption technology guarantees privacy, authenticity and control of all data transactions. Even though the data is stored on a centralised server, ownership and control is decentralised, in that access to the data is truly restricted to the user and the people they authorise. Even Cryptoloc as the cloud provider can\u2019t access the data, because we can never see the complete decryption key for any piece of data. <\/p>\n\n\n\n

Instead, decryption keys for every piece of data stored with Cryptoloc are split and stored by three different parties \u2013 the owner, the cloud host and an independent escrow agent (a neutral third-party entity). The decryption key can only be assembled with access to the user\u2019s private key, which is only stored locally on their device, and password-authenticated access to a cloud-hosted, Cryptoloc-based solution. <\/p>\n\n\n\n

If a user loses their private key or their password, their access can be restored through our escrow recovery process \u2013 but even during this process, neither Cryptoloc or the escrow agent have any interactive access to the user\u2019s unencrypted data. <\/p>\n\n\n\n

This is in stark contrast to the major cloud storage providers<\/a>, who hold onto the encryption keys for their users\u2019 files, and have the ability to access that data or hand it over to government agencies whenever they want. <\/p>\n\n\n\n

Each piece of data stored with Cryptoloc also has its own immutable audit trail<\/a>, complete with time and date stamps, to record every time it\u2019s accessed, modified or shared. This enables users to know exactly what the people and companies they authorise to access their data choose to do with it, providing added accountability. Crucially, users can also revoke access to their data at any time. <\/p>\n\n\n\n

Cryptoloc\u2019s patented encryption  technology can be deployed to virtually any application, and has already been incorporated into file storage<\/a>, document management<\/a>, and counterfeit prevention and detection solutions<\/a>. <\/p>\n\n\n\n

The possibilities are essentially endless \u2013 and with the Cryptoloc Platform<\/a>, developers can already build their own products on our platform, baking the world\u2019s strongest data security into their products from the beginning. <\/p>\n\n\n\n

Because this technology is available now, users can start following best data control practices immediately, without having to wait for the entire internet to move to a blockchain-based model. Better yet, it\u2019s been smoothly integrated into existing systems and procedures, such as Salesforce, as an API (Application Programming Interface), so users can continue using the software they\u2019re used to while enjoying the benefits of Cryptoloc\u2019s data protection. <\/p>\n\n\n\n

It\u2019s the ideal of Web 3.0, built to work with a Web 2.0 world \u2013 so your data remains firmly under the control of numero 1.0. <\/p>\n","protected":false},"excerpt":{"rendered":"

By Melissa Crossman, Chief Executive Officer of Cryptoloc  The next phase in the evolution of the web is upon us, but how much stock should we really be putting in Web 3.0, and what will it actually look like when it\u2019s here?  It turns out Web 3.0 could be closer than you think \u2013 and […]<\/p>\n","protected":false},"author":3,"featured_media":1107,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/910"}],"collection":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=910"}],"version-history":[{"count":2,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/910\/revisions"}],"predecessor-version":[{"id":1129,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/910\/revisions\/1129"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media\/1107"}],"wp:attachment":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}