<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.9.2">Jekyll</generator><link href="https://weh.wtf/feed.xml" rel="self" type="application/atom+xml" /><link href="https://weh.wtf/" rel="alternate" type="text/html" /><updated>2023-01-14T00:49:05+00:00</updated><id>https://weh.wtf/feed.xml</id><title type="html">Niko’s Blog</title><subtitle>Blogchain stuff. Personal blog, opinions are my own.</subtitle><entry><title type="html">I Looked Into 34 Top Real-World Blockchain Projects So You Don’t Have To</title><link href="https://weh.wtf/34-blockchain-projects.html" rel="alternate" type="text/html" title="I Looked Into 34 Top Real-World Blockchain Projects So You Don’t Have To" /><published>2022-07-30T04:21:46+00:00</published><updated>2022-07-30T04:21:46+00:00</updated><id>https://weh.wtf/builtin-blockchains</id><content type="html" xml:base="https://weh.wtf/34-blockchain-projects.html">&lt;p&gt;&lt;strong&gt;TL;DR&lt;/strong&gt;: The top #1 Google result for “blockchain production users” (and related
queries) lists 34 individual “real world blockchain” projects. One would expect some
actual functioning projects that have an impact on every-day consumers — outside of
cryptocurrency &amp;amp; NFTs. Looking into all 34, I found that 13 are already dead (including
one that has been killed by the SEC), 6 are only useful within the crypto &amp;amp; NFT
ecosystems and not in the “real world” and 14 use Blockchain in a way where removing the
blockchain would not impact functionality at all, or make the product better. The
remaining project is Chainalysis, which has real-world impact by helping law enforcement
de-anonymizing blockchain users.&lt;/p&gt;

&lt;ul id=&quot;markdown-toc&quot;&gt;
  &lt;li&gt;&lt;a href=&quot;#overview-and-scope&quot; id=&quot;markdown-toc-overview-and-scope&quot;&gt;Overview and Scope&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;#the-dead-the-bad--the-ugly&quot; id=&quot;markdown-toc-the-dead-the-bad--the-ugly&quot;&gt;The Dead, the Bad &amp;amp; the Ugly&lt;/a&gt;    &lt;ul&gt;
      &lt;li&gt;&lt;a href=&quot;#smart-contract-use-cases&quot; id=&quot;markdown-toc-smart-contract-use-cases&quot;&gt;Smart Contract Use Cases&lt;/a&gt;        &lt;ul&gt;
          &lt;li&gt;&lt;a href=&quot;#burstiq-not-blockchain-bad-blockchain-prototype&quot; id=&quot;markdown-toc-burstiq-not-blockchain-bad-blockchain-prototype&quot;&gt;BurstIQ: Not Blockchain, Bad Blockchain, Prototype&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#mediachain-dead&quot; id=&quot;markdown-toc-mediachain-dead&quot;&gt;Mediachain: Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#propy-inc-bad&quot; id=&quot;markdown-toc-propy-inc-bad&quot;&gt;Propy Inc: Bad&lt;/a&gt;&lt;/li&gt;
        &lt;/ul&gt;
      &lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#internet-of-things&quot; id=&quot;markdown-toc-internet-of-things&quot;&gt;Internet of Things&lt;/a&gt;        &lt;ul&gt;
          &lt;li&gt;&lt;a href=&quot;#filament-dead&quot; id=&quot;markdown-toc-filament-dead&quot;&gt;Filament: Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#hypr-not-blockchain&quot; id=&quot;markdown-toc-hypr-not-blockchain&quot;&gt;HYPR: Not Blockchain&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#xage-security-not-blockchain&quot; id=&quot;markdown-toc-xage-security-not-blockchain&quot;&gt;Xage Security: Not Blockchain&lt;/a&gt;&lt;/li&gt;
        &lt;/ul&gt;
      &lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#personal-identity&quot; id=&quot;markdown-toc-personal-identity&quot;&gt;Personal Identity&lt;/a&gt;        &lt;ul&gt;
          &lt;li&gt;&lt;a href=&quot;#ligero-dead&quot; id=&quot;markdown-toc-ligero-dead&quot;&gt;Ligero: Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#illinois-blockchain-dead&quot; id=&quot;markdown-toc-illinois-blockchain-dead&quot;&gt;Illinois Blockchain: Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#civic-bad&quot; id=&quot;markdown-toc-civic-bad&quot;&gt;Civic: Bad&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#evernym-bad&quot; id=&quot;markdown-toc-evernym-bad&quot;&gt;Evernym: Bad&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#ocular-dead&quot; id=&quot;markdown-toc-ocular-dead&quot;&gt;Ocular: Dead&lt;/a&gt;&lt;/li&gt;
        &lt;/ul&gt;
      &lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#healthcare&quot; id=&quot;markdown-toc-healthcare&quot;&gt;Healthcare&lt;/a&gt;        &lt;ul&gt;
          &lt;li&gt;&lt;a href=&quot;#wholecare-bad-likely-dead&quot; id=&quot;markdown-toc-wholecare-bad-likely-dead&quot;&gt;WholeCare: Bad, Likely Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#patientory-bad-likely-dead&quot; id=&quot;markdown-toc-patientory-bad-likely-dead&quot;&gt;Patientory: Bad, Likely Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#nebula-genomics-bad&quot; id=&quot;markdown-toc-nebula-genomics-bad&quot;&gt;Nebula Genomics: Bad&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#medicalchain-dead&quot; id=&quot;markdown-toc-medicalchain-dead&quot;&gt;Medicalchain: Dead&lt;/a&gt;&lt;/li&gt;
        &lt;/ul&gt;
      &lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#logistics&quot; id=&quot;markdown-toc-logistics&quot;&gt;Logistics&lt;/a&gt;        &lt;ul&gt;
          &lt;li&gt;&lt;a href=&quot;#dhl-dead&quot; id=&quot;markdown-toc-dhl-dead&quot;&gt;DHL: Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#block-array-dead&quot; id=&quot;markdown-toc-block-array-dead&quot;&gt;Block Array: Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#maersk-baddead&quot; id=&quot;markdown-toc-maersk-baddead&quot;&gt;Maersk: &lt;del&gt;Bad&lt;/del&gt;Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#shipchain-extra-dead&quot; id=&quot;markdown-toc-shipchain-extra-dead&quot;&gt;ShipChain: Extra Dead&lt;/a&gt;&lt;/li&gt;
        &lt;/ul&gt;
      &lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#government&quot; id=&quot;markdown-toc-government&quot;&gt;Government&lt;/a&gt;        &lt;ul&gt;
          &lt;li&gt;&lt;a href=&quot;#voatz-very-very-bad&quot; id=&quot;markdown-toc-voatz-very-very-bad&quot;&gt;Voatz: Very, Very Bad&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#state-of-delaware-dead&quot; id=&quot;markdown-toc-state-of-delaware-dead&quot;&gt;State of Delaware: Dead&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#follow-my-vote-very-bad-almost-dead&quot; id=&quot;markdown-toc-follow-my-vote-very-bad-almost-dead&quot;&gt;Follow My Vote: Very Bad, Almost Dead&lt;/a&gt;&lt;/li&gt;
        &lt;/ul&gt;
      &lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#media&quot; id=&quot;markdown-toc-media&quot;&gt;Media&lt;/a&gt;        &lt;ul&gt;
          &lt;li&gt;&lt;a href=&quot;#madhive-bad--mostly-dead&quot; id=&quot;markdown-toc-madhive-bad--mostly-dead&quot;&gt;MadHive: Bad &amp;amp; Mostly Dead.&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#steem-dead--bad&quot; id=&quot;markdown-toc-steem-dead--bad&quot;&gt;Steem: Dead &amp;amp; Bad&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#open-music-initiative-dead&quot; id=&quot;markdown-toc-open-music-initiative-dead&quot;&gt;Open Music Initiative: Dead&lt;/a&gt;&lt;/li&gt;
        &lt;/ul&gt;
      &lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;#not-the-real-world&quot; id=&quot;markdown-toc-not-the-real-world&quot;&gt;Not The Real World&lt;/a&gt;    &lt;ul&gt;
      &lt;li&gt;&lt;a href=&quot;#money-transfer-use-cases&quot; id=&quot;markdown-toc-money-transfer-use-cases&quot;&gt;Money Transfer Use Cases&lt;/a&gt;        &lt;ul&gt;
          &lt;li&gt;&lt;a href=&quot;#chainio-not-blockchain&quot; id=&quot;markdown-toc-chainio-not-blockchain&quot;&gt;Chain.io: Not Blockchain&lt;/a&gt;&lt;/li&gt;
          &lt;li&gt;&lt;a href=&quot;#algorand-gemini--circle-crypto-only&quot; id=&quot;markdown-toc-algorand-gemini--circle-crypto-only&quot;&gt;Algorand, Gemini &amp;amp; Circle: Crypto only&lt;/a&gt;&lt;/li&gt;
        &lt;/ul&gt;
      &lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#nfts&quot; id=&quot;markdown-toc-nfts&quot;&gt;NFTs&lt;/a&gt;        &lt;ul&gt;
          &lt;li&gt;&lt;a href=&quot;#candy-pixura-dapper-labs-not-real-world-bad-dlt&quot; id=&quot;markdown-toc-candy-pixura-dapper-labs-not-real-world-bad-dlt&quot;&gt;Candy, Pixura, Dapper Labs [not real world, bad dlt]&lt;/a&gt;&lt;/li&gt;
        &lt;/ul&gt;
      &lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;#and-the-winner-is&quot; id=&quot;markdown-toc-and-the-winner-is&quot;&gt;And The Winner Is…&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;#closing-words&quot; id=&quot;markdown-toc-closing-words&quot;&gt;Closing Words&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h1 id=&quot;overview-and-scope&quot;&gt;Overview and Scope&lt;/h1&gt;

&lt;p&gt;If you ask people without, or with limited background in tech about Blockchain (or
Distributed Ledger Technology, “&lt;strong&gt;DLT&lt;/strong&gt;”), the general understanding is that, even
though the Cryptocurrency and NFT ecosystem is plagued by scams, Blockchain is the
‘Future of IT’. &lt;a href=&quot;https://www2.deloitte.com/us/en/pages/consulting/articles/future-of-blockchain.html&quot;&gt;Deloitte compares&lt;/a&gt; it
to the arrival of the postal services or the internet. &lt;a href=&quot;https://www.investopedia.com/tech/forget-bitcoin-blockchain-future/&quot;&gt;“Forget Bitcoin: Blockchain is
the Future”&lt;/a&gt; blogs
Investopedia, “How Blockchain will change [everything]” writes &lt;a href=&quot;https://www.nasdaq.com/articles/how-blockchain-will-change-the-way-we-work-play-and-stay-healthy-in-the-future-2021-08-26&quot;&gt;Nasdaq&lt;/a&gt;.
Even within the IT industry, plenty of people bought the hype:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;“Blockchain will be as important to the next generation of internet
  applications as the public cloud,
microservice architectures, and devops are to the current generation”
[&lt;a href=&quot;https://www.infoworld.com/article/3657635/why-blockchain-is-the-future-of-the-internet.html#:~:text=Blockchain%20will%20be%20as%20important,for%20current%20and%20future%20applications.&quot;&gt;infoworld&lt;/a&gt;]&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;“Blockchain is ideal for delivering that information because it provides
immediate, shared and completely transparent information stored on an
immutable ledger that can be accessed only by permissioned network members.”
[&lt;a href=&quot;https://www.ibm.com/topics/what-is-blockchain&quot;&gt;IBM&lt;/a&gt;]&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;But while the &lt;strong&gt;13 years&lt;/strong&gt; of blockchain’s existence certainly had no shortage of
prototypes, promises and PR, outside of cryptocurrencies, darknet markets and money
laundering use cases, it is hard to find news articles or an overview about real-world
use cases of Blockchain technology. So I decided to dig myself.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/intro_search.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The top search result for “blockchain real-world applications” on Google is &lt;a href=&quot;https://builtin.com/blockchain/blockchain-applications&quot;&gt;this
builtin.com article&lt;/a&gt;, titled
“&lt;strong&gt;34 Blockchain Applications and Real-World Use Cases Disrupting the Status Quo&lt;/strong&gt;“
(&lt;a href=&quot;https://web.archive.org/web/20220607110520/https://builtin.com/blockchain/blockchain-applications&quot;&gt;archived version&lt;/a&gt;).
Quote:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;We’ve rounded up &lt;strong&gt;34 examples of real-world blockchain use cases for this
    pragmatic yet revolutionary technology.&lt;/strong&gt; It’s far from an exhaustive list,
    but they’re already changing how we do business.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Apart from being the top #1 result, and a reasonably recent article, Builtin.com has
300+ employees (&lt;a href=&quot;https://www.linkedin.com/company/built-in&quot;&gt;per linkedin&lt;/a&gt;), and is a
company built around the tech startup community. Part of their business seems to be
maintaining a database of startup companies, including the ones mentioned in the
&lt;em&gt;Blockchain&lt;/em&gt; article — so they have some business incentive for the data to be accurate.&lt;/p&gt;

&lt;p&gt;Additionally, the majority of the following results did not list actual projects or
products, but rather high-level ideas like “Supply chain management”, “Healthcare”,
“Food Safety” etc. — usually with a 2-3 sentence high-level description, but no concrete
examples&lt;sup id=&quot;fnref:marr&quot; role=&quot;doc-noteref&quot;&gt;&lt;a href=&quot;#fn:marr&quot; class=&quot;footnote&quot; rel=&quot;footnote&quot;&gt;1&lt;/a&gt;&lt;/sup&gt;.&lt;/p&gt;

&lt;p&gt;So I figured the &lt;em&gt;Builtin&lt;/em&gt; list would be a good starting point to find &amp;amp; check
out some real-world use cases.&lt;/p&gt;

&lt;p&gt;For the purposes of this article, I am making the assumptions that the projects should
be&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Not just crypto&lt;/strong&gt;: As the point of this article is to find applications outside of
cryptocurrency, I’m categorically excluding anything where the only effect of the
application is in the user’s cryptocurrency wallet.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Not Dead&lt;/strong&gt;: Projects should have had a sign of life in the last ~12 months or so.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Not Bad&lt;/strong&gt;: Uses Blockchain, and in a way that makes sense
    &lt;ul&gt;
      &lt;li&gt;They do use a Blockchain/DLT, and&lt;/li&gt;
      &lt;li&gt;The DLT adds some form of value to the users, and&lt;/li&gt;
      &lt;li&gt;The value add comes at reasonable tradeoffs: the product is still somewhat usable and
does not cause (obvious) legal problems.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It turns out, these are sufficient to cross out 33 of the 34 projects from the list. I
have listed those in the next section, in the order in which they appear in the original
article.&lt;/p&gt;

&lt;h1 id=&quot;the-dead-the-bad--the-ugly&quot;&gt;The Dead, the Bad &amp;amp; the Ugly&lt;/h1&gt;

&lt;h2 id=&quot;smart-contract-use-cases&quot;&gt;Smart Contract Use Cases&lt;/h2&gt;
&lt;p&gt;Smart Contracts as a concept have their own set of problems, but luckily that doesn’t
affect any of the projects Builtin listed in this category — because none seem to use
them.&lt;/p&gt;

&lt;h3 id=&quot;burstiq-not-blockchain-bad-blockchain-prototype&quot;&gt;BurstIQ: Not Blockchain, Bad Blockchain, Prototype&lt;/h3&gt;
&lt;p&gt;Bad use of Blockchain, unfinished Prototype, and likely does not use DLT at all. The
website is full of marketing buzzwords, and apparently they seem to have pivoted back
and forth to IoT at some stage, and now to web3. Completely lacking is any technical
description on how the system works, beyond a few high-level buzzword-filled boxes.&lt;/p&gt;

&lt;p&gt;Their careers page mentions blockchain only in passing, nothing blockchain-related in
the skills/qualifications sections for any engineering role — AWS &amp;amp; SQL &lt;a href=&quot;https://burstiq.com/senior-software-developer/&quot;&gt;everywhere&lt;/a&gt;, though.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/burstiq.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The word “blockchain” appears only twice in their whitepaper, both times in the last
sentence:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;“The BurstIQ platform connects any data from any source in a global network
of businesses, researchers and people, through a full end-to-end blockchain
enablement system with blockchain-based big data management, consent and data
sharing, cognitive computing, monetization and global data exchange.”.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;This is also the only sentence describing the platform’s functionality in the
whole whitepaper.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;There is a “Tell me more” link to sign up for a 60-day free trial for BurstIQ. The link
doesn’t work.&lt;/p&gt;

&lt;h3 id=&quot;mediachain-dead&quot;&gt;Mediachain: Dead&lt;/h3&gt;
&lt;p&gt;Dead: Acquired by Spotify in 2017. Website and Twitter last updated then. There has been
no mention of any progress on Mediachain’s core proposition within Spotify ever since.
In 2022 though, Spotify &lt;a href=&quot;https://www.pymnts.com/nfts/2022/spotify-may-add-blockchain-nfts-to-streaming-service/&quot;&gt;is recruiting people to work on early-stage Web3 projects&lt;/a&gt;
— they are starting another prototype.&lt;/p&gt;

&lt;h3 id=&quot;propy-inc-bad&quot;&gt;Propy Inc: Bad&lt;/h3&gt;
&lt;p&gt;In 5 years, they seem to have sold only 2 properties: One in &lt;a href=&quot;https://propy.com/browse/propy-nft/&quot;&gt;Kyiv (2017)&lt;/a&gt; and one in &lt;a href=&quot;https://propy.com/browse/first-us-real-estate-nft/&quot;&gt;Tampa, FL (2022)&lt;/a&gt;. The article is somewhat ambiguous
what rights you own with the NFT — it’s either “access to the paperwork” or some
“ownership rights”. I reached out to Propy and asked what happens when you lose your
keys. The answer was, in effect, &lt;em&gt;“we’ll give you new login information&lt;/em&gt;”(!). In other
words, you don’t actually own or manage the NFT, Propy does. All the advantages you are
supposed to get with NFTs, access to the DeFi ecosystem for example, or easier
transfers, obviously can’t happen in this case. What happens if Propy runs out of
funding and shuts down? Do you still own your house? All Blockchain does here is muddy
the waters w.r.t. legal responsibilities &amp;amp; adding more complexity to the purchase
process.&lt;/p&gt;

&lt;p&gt;Whereas earlier this year, &lt;a href=&quot;https://web.archive.org/web/20220330000138/https://propy.com/browse/&quot;&gt;“NFT” was all over their homepage&lt;/a&gt;, as of mid 2022,
they seem to be pivoting away from NFTs — they seem to be focusing on being a real
estate sales management platform, maybe a title and escrow company, neither of which has
anything to do with blockchain; they also seem to be taking zillow (or similar) listings
and offering to pay for the listings with cryptocurrency — which, in essence, makes them
an exchange.&lt;/p&gt;

&lt;h2 id=&quot;internet-of-things&quot;&gt;Internet of Things&lt;/h2&gt;
&lt;p&gt;The Blockchain is supposed to secure “everything from an Amazon Alexa to a smart
thermostat.” by it’s “transparency and virtual incorruptibility”. This did not make
sense to me in the first place, and apparently it did not make sense to Builtin’s
featured projects either.&lt;/p&gt;

&lt;h3 id=&quot;filament-dead&quot;&gt;Filament: Dead&lt;/h3&gt;
&lt;p&gt;According to their &lt;a href=&quot;https://filament.com/&quot;&gt;website&lt;/a&gt;, they have pivoted to automotive.
Their &lt;a href=&quot;https://www.linkedin.com/company/filament-networks?challengeId=AQHWmZyYtLGFEQAAAYBh6YQCpbksfZUZIeEehCjO1_gfuft3Cltbcf2oBJYPH8kRFUZKVYzaWMabT3tukuI5QKAqo4vDadNboA&amp;amp;submissionId=e5022653-0536-e916-0ceb-396c3d197c3c&quot;&gt;LinkedIn&lt;/a&gt;
and &lt;a href=&quot;https://twitter.com/FilamentHQ&quot;&gt;Twitter&lt;/a&gt; have both been dead for 2+ years, and the
only change their website has seen &lt;a href=&quot;https://web.archive.org/web/20191224210251/https://filament.com/&quot;&gt;since 2019 is that the series A investors (Verizon
Ventures, Bullpen Capital) have pulled out.&lt;/a&gt;.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/filament.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3 id=&quot;hypr-not-blockchain&quot;&gt;HYPR: Not Blockchain&lt;/h3&gt;
&lt;p&gt;The Builtin article claims that HYPR makes “IoT devices virtually unhackable” by “By
taking passwords off a centralized server”. It is hard to find any references to IoT on
their website, their Blog barely mentions IoT anymore — in fact, &lt;a href=&quot;https://www.google.com/search?q=site%3Ablog.hypr.com+IoT&amp;amp;biw=1463&amp;amp;bih=780&amp;amp;sxsrf=ALiCzsbWmp4VKcWG_B-FpVuV2OUlrwvKfQ%3A1659128128033&amp;amp;source=lnt&amp;amp;tbs=cdr%3A1%2Ccd_min%3A1%2F1%2F2020%2Ccd_max%3A&amp;amp;tbm=&quot;&gt;since Jan 2020&lt;/a&gt;,
only &lt;a href=&quot;https://blog.hypr.com/best-practices-to-secure-authentication-for-energy-and-utilities&quot;&gt;one article&lt;/a&gt;mentions
it — in passing.&lt;/p&gt;

&lt;p&gt;Searching their website for “blockchain” yields only &lt;a href=&quot;https://www.google.com/search?q=site%3Ahypr.com+%22blockchain%22&quot;&gt;8 results&lt;/a&gt;(&lt;a href=&quot;https://www.google.com/search?q=site%3Ahypr.com&quot;&gt;of over a thousand
pages&lt;/a&gt;). All of these are either only
tangentially related “encyclopedia” articles, and/or updated 2017 or earlier. There is
no indication that HYPR has used anything blockchain related for at least 4 years.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/hypr.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3 id=&quot;xage-security-not-blockchain&quot;&gt;Xage Security: Not Blockchain&lt;/h3&gt;
&lt;p&gt;Not DLT: Last mention of “blockchain” on their site in September 2020. A partnership
with the US Space Force, no less.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/xage_spaceforce.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Similarly, their Twitter
account — which tweets daily –- has &lt;a href=&quot;https://twitter.com/search?q=from%3Axageinc%20blockchain&amp;amp;src=typed_query&amp;amp;f=live&quot;&gt;last mentioned “blockchain” in July 2020&lt;/a&gt;.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/xage_most_recent_blockchain_twitter.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;They seem to be pivoting to “zero-trust”, away from
blockchain. In fact that’s in the title of the main &lt;a href=&quot;https://info.xage.com/resources&quot;&gt;whitepapers&lt;/a&gt; at the time of writing, whereas any mention of
Blockchain is completely absent.&lt;/p&gt;

&lt;p&gt;Trying to access the actual whitepapers requires you to provide an abnormal amount of
personal data — not a good look for a security-focused company to harvest PII. Most of
the documents can be found with a &lt;a href=&quot;https://www.google.com/search?q=site%3Axage.com+filetype%3Apdf+blockchain&quot;&gt;filetype google search&lt;/a&gt; — also not a
good look if it’s that easy to bypass their “security”.&lt;/p&gt;

&lt;p&gt;Still, after downloading and going through the whitepapers, it remains fundamentally
unclear what they were actually trying to do with their blockchain system — even high
level information like “what kind of data is stored on the blockchain” is completely
absent. . They keep talking about Xage being tamper-proof due to blockchain in virtually
every document they reference blockchain in. This is plainly false, Blockchains are
tamper-&lt;strong&gt;evident&lt;/strong&gt; and maybe tamper-&lt;strong&gt;resistant&lt;/strong&gt;, but not tamper-&lt;strong&gt;proof&lt;/strong&gt;&lt;sup id=&quot;fnref:tamper-proof&quot; role=&quot;doc-noteref&quot;&gt;&lt;a href=&quot;#fn:tamper-proof&quot; class=&quot;footnote&quot; rel=&quot;footnote&quot;&gt;2&lt;/a&gt;&lt;/sup&gt;. Bad start.&lt;/p&gt;

&lt;p&gt;The little information that is available raises way more questions than it answers. In
their &lt;a href=&quot;http://xage.com/wp-content/uploads/2020/06/Xage-Enables-NIST800-Compliance-1.1.pdf&quot;&gt;NIST Cybersecurity compliance analysis doc&lt;/a&gt;,
they claim that their encryption scheme somewhat benefits from blockchain. There’s two,
and both are messy:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;
    &lt;blockquote&gt;
      &lt;p&gt;&lt;em&gt;Data stored in Xage Fabric is encrypted on a per publisher and subscriber basis
end-to-end.&lt;/em&gt;&lt;/p&gt;
    &lt;/blockquote&gt;

    &lt;p&gt;If all data between all participants on the network is end-to-end
encrypted with per-channel keys, how exactly do you get a readable presentation in the
audit log? Are the keys centrally managed? Clearly this encryption scheme is
orthogonal to any blockchain use, but since we &lt;em&gt;are&lt;/em&gt; using blockchain: What happens if
the key material of one node gets compromised and you need to rotate the keys, how are
you going to re-encrypt past entries without breaking the blockchain/merkle-tree?&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;blockquote&gt;
      &lt;p&gt;Data stored in the Xage Fabric is encrypted using a threshold based
encryption technique called Shamir Secret Sharing.&lt;/p&gt;
    &lt;/blockquote&gt;

    &lt;blockquote&gt;
      &lt;p&gt;Compromises on Fabric will require simultaneous access to multiple
(threshold) Xage Fabric nodes to provide their shares
making data leaks substantially more difficult compared to central databases
and not exploitable.&lt;/p&gt;
    &lt;/blockquote&gt;

    &lt;p&gt;This makes no sense to me, whatsoever. The only interpretation that I can get
out of this is that the data at rest (on disk) is encrypted with a secret-sharing
scheme, and that each blockchain node holds a chunk of the key. You’d need M-out-of-N
chunks to decrypt the data.&lt;/p&gt;

    &lt;p&gt;That sounds nice for 5 seconds, until you realize that there must be
mechanisms for participants to read the data — for which the participant has
a valid reason to contact those M nodes. At that point the participants
obtain the “*simultaneous access” *to the key material. The encryption scheme
offers protection only when some (less than M) &lt;strong&gt;database&lt;/strong&gt; nodes are compromised, but
not against compromise of any of the &lt;strong&gt;other&lt;/strong&gt; (e.g. desktops, IoT) devices in
the network.&lt;/p&gt;

    &lt;p&gt;Assuming this system makes sense, it can just as well be implemented without
a blockchain, but with a central database and separated keyservers. It can be
reasonably assumed that this would actually be more secure:
Separating Database and Keyservers would mean that there is fewer software
running on each node, which would mean fewer security concerns; and the key
server code could be much smaller (compared to a node also containing the
blockchain and database logic) and can be audited better.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;personal-identity&quot;&gt;Personal Identity&lt;/h2&gt;

&lt;p&gt;It should go without saying that putting anything ID-related on a public ledger is a
privacy and GDPR nightmare&lt;sup id=&quot;fnref:right-to-erasure&quot; role=&quot;doc-noteref&quot;&gt;&lt;a href=&quot;#fn:right-to-erasure&quot; class=&quot;footnote&quot; rel=&quot;footnote&quot;&gt;3&lt;/a&gt;&lt;/sup&gt;. I have talked extensively
about the combination of DID and Blockchain in &lt;a href=&quot;https://weh.wtf/ssi.html&quot;&gt;my previous article&lt;/a&gt;, which contains even more dead projects.&lt;/p&gt;

&lt;h3 id=&quot;ligero-dead&quot;&gt;Ligero: Dead&lt;/h3&gt;
&lt;p&gt;The company was founded in 2018. Their &lt;a href=&quot;https://ligero-inc.com/&quot;&gt;website&lt;/a&gt; has no
information on the platform, or on any activity. There doesn’t seem to be a twitter or a
company Linkedin profile. I was unable to find the CEO on LinkedIn, the CTO has no
mention of Ligero &lt;a href=&quot;https://www.linkedin.com/in/muthuramakrishnan-venkitasubramaniam-79a9029b&quot;&gt;in their LinkedIn profile&lt;/a&gt;, and neither
does &lt;a href=&quot;https://www.linkedin.com/in/sjcatlin&quot;&gt;the company president&lt;/a&gt;.&lt;/p&gt;

&lt;h3 id=&quot;illinois-blockchain-dead&quot;&gt;Illinois Blockchain: Dead&lt;/h3&gt;
&lt;p&gt;The “Final Report” was published &lt;a href=&quot;https://www2.illinois.gov/sites/doit/Pages/BlockChainInitiative.aspx&quot;&gt;to their website&lt;/a&gt; in 2018, and the
“Illinois Department of Innovation &amp;amp; Technology” twitter account has &lt;a href=&quot;https://twitter.com/search?q=from%3Aillinoisdoit%20blockchain&amp;amp;src=typed_query&amp;amp;f=live&quot;&gt;not mentioned
Blockchain since 2019&lt;/a&gt;&lt;/p&gt;

&lt;h3 id=&quot;civic-bad&quot;&gt;Civic: Bad&lt;/h3&gt;
&lt;p&gt;Doesn’t use DLT at all: This company &lt;a href=&quot;https://www.civic.com/solutions/&quot;&gt;provides ID verification&lt;/a&gt; and MFA login services, specifically targeted at
blockchain and NFT companies — they don’t sell a product that utilizes blockchain
itself.&lt;/p&gt;

&lt;h3 id=&quot;evernym-bad&quot;&gt;Evernym: Bad&lt;/h3&gt;
&lt;p&gt;While the &lt;a href=&quot;https://www.evernym.com/wp-content/uploads/2017/07/The-Technical-Foundations-of-Sovrin.pdf&quot;&gt;whitepaper from 2016&lt;/a&gt;
talk about a distributed ledger, none of the two &lt;a href=&quot;https://www.evernym.com/case-studies-travelpass/&quot;&gt;case&lt;/a&gt;&lt;a href=&quot;https://www.evernym.com/case-studies-memberpass/&quot;&gt;studies&lt;/a&gt; talk about their use of blockchain —
in fact, the infographic in the former makes it pretty explicit that no blockchain is
involved. The second one seems to use the same on-phone storage for credentials, without
blockchain. I have discussed Sovrin, which is the creator of Evernym, in my &lt;a href=&quot;https://weh.wtf/ssi.html&quot;&gt;previous
article&lt;/a&gt; — I reached out to them, and apparently, for a single
project, they write to a private Hyperledger instance — but their client doesn’t read
from it. They did not clarify why that hyperledger is even there. They did mention that
they are exploring non-blockchain solutions.&lt;/p&gt;

&lt;h3 id=&quot;ocular-dead&quot;&gt;Ocular: Dead&lt;/h3&gt;
&lt;p&gt;The website ends with the registration form for the affiliate partnership program, which
has the note “Please note this is in early beta stages and estimated to &lt;strong&gt;start high
volume testing early September 2019&lt;/strong&gt;.” The copyright is from 2020. There are no
technical specs whatsoever. The &lt;a href=&quot;https://twitter.com/ocularkyc&quot;&gt;Twitter account @ocularkyc&lt;/a&gt; has a Manowar profile picture, and limits its post to
central-bank conspiracy theories.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/manowar.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2 id=&quot;healthcare&quot;&gt;Healthcare&lt;/h2&gt;

&lt;p&gt;As with identity, what was really missing from the healthcare system is that all that
privacy sensitive data is on a publicly accessible ledger.&lt;/p&gt;

&lt;h3 id=&quot;wholecare-bad-likely-dead&quot;&gt;WholeCare: Bad, Likely Dead&lt;/h3&gt;
&lt;p&gt;There is virtually no information at all on their website. The most detailed technical
facts are&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/wholecare.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;“Resources to orient new caregivers”, “HIPAA-compliant record keeping”, “Integrated
  scheduling tools &amp;amp; alerts”, “Cross-device compatibility”.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;That’s it.&lt;/p&gt;

&lt;p&gt;There is no mention of blockchain or DLT on their website. Their &lt;a href=&quot;https://twitter.com/WholeCareHub&quot;&gt;twitter account&lt;/a&gt; retweets a WaPo article every few months.&lt;/p&gt;

&lt;h3 id=&quot;patientory-bad-likely-dead&quot;&gt;Patientory: Bad, Likely Dead&lt;/h3&gt;

&lt;p&gt;The app seems to mainly be focused on tracking exercise, water, body photos — nothing
that fitbit &amp;amp; co can’t do today. Hardly “requires blockchain”. There is some talk about
storing patient data in the PTOY Blockchain (which seems to be the token associated with
the chain). &lt;a href=&quot;https://ptoy.org/&quot;&gt;https://ptoy.org/&lt;/a&gt; There’s a &lt;a href=&quot;https://patientoryassociation.org/wp-content/uploads/2018/11/patientory_whitepaper.pdf&quot;&gt;Whitepaper&lt;/a&gt;
from 2017, which shows a wonderfully centralized architecture:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/patientory1.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This graph could be stripped down to 3 nodes, with the same exact functionality, but
less complex, cheaper, and more performant. It even explicitly says that all the storage
work is done by a “HIPAA Compliant Database”, so blockchain doesn’t add anything here.&lt;/p&gt;

&lt;p&gt;This is a classic 2017 ICO boom project that somehow manages to still occasionally write
tweets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bonus:&lt;/strong&gt; The “App Store” and “Play Store” links actually lead to a “subscribe” page,
not an app store page. I doubt that is in compliance with Apple’s and Google’s
respective policies. For example, the &lt;a href=&quot;https://play.google.com/intl/en_us/badges/#:~:text=Any%20online%20use%20of%20the,is%20space%20in%20the%20creative.&quot;&gt;play store guidelines&lt;/a&gt;
state: &lt;em&gt;“Any online use of the badge must link to the Google Play store.“&lt;/em&gt; The badge
images are also clearly altered, prohibited by both Apple and Google’s TOS.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/patientory2.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Pretty obvious trademark infringement on your homepage, for a company in a
compliance-heavy industry – that bodes well.&lt;/p&gt;

&lt;h3 id=&quot;nebula-genomics-bad&quot;&gt;Nebula Genomics: Bad&lt;/h3&gt;

&lt;p&gt;This company claims to allow people to buy their DNA sequencing kit anonymously via
bitcoin. Which makes these pop-ups particularly fun:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/nebula_notification.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Of course, the checkout process does not accept crypto at all.
&lt;img src=&quot;assets/34_blockchain/nebula_checkout.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;There is some whitepaper that claims they can store and share genomics data in a
privacy-preserving way. &lt;a href=&quot;https://www.biorxiv.org/content/10.1101/799999v1&quot;&gt;https://www.biorxiv.org/content/10.1101/799999v1&lt;/a&gt;. As dumb as the idea is in general,
the whitepaper at least seems somewhat technically interesting. But that doesn’t really
matter, because the data is sequenced in Hong Kong, or “in Europe”, so who knows who has
copies of your data. And even if nobody stored the data: “However, under certain
circumstances your genetic information may be subject to processing pursuant to laws,
regulations or judicial or governmental orders, warrants or subpoenas. “ — in other
words, whatever technical locks they have in place, Nebula has a master key.
(&lt;a href=&quot;https://en.wikipedia.org/wiki/Nebula_Genomics&quot;&gt;Wikipedia&lt;/a&gt;)&lt;/p&gt;

&lt;h3 id=&quot;medicalchain-dead&quot;&gt;Medicalchain: Dead&lt;/h3&gt;
&lt;p&gt;The Whitepaper is from 2018, the &lt;a href=&quot;https://medicalchain.com/en/roadmap/&quot;&gt;roadmap ends in 2021Q1&lt;/a&gt;. Their &lt;a href=&quot;https://twitter.com/medical_chain&quot;&gt;Twitter&lt;/a&gt; has been dead since March ‘21.&lt;/p&gt;

&lt;h2 id=&quot;logistics&quot;&gt;Logistics&lt;/h2&gt;
&lt;p&gt;Are logistics companies, and the businesses they work with, interested in broadcasting
their business activity to their competitors — by putting reports, receipts &amp;amp; manifests
on a public ledger?&lt;/p&gt;

&lt;p&gt;… Let’s find out.&lt;/p&gt;

&lt;h3 id=&quot;dhl-dead&quot;&gt;DHL: Dead&lt;/h3&gt;
&lt;p&gt;Dead and/or never left prototype phase: The last &lt;a href=&quot;https://www.dhl.com/us-en/home/press/press-archive/2019/dhl-and-hewlett-packard-enterprise-take-aim-at-invoice-process-improvement.html&quot;&gt;press release&lt;/a&gt;
is from 2019, about a MvP they tested with Hewlett-Packard Enterprise. There is no
technical description, no details, no further updates. They did provide an &lt;a href=&quot;https://www.dhl.com/content/dam/dhl/global/core/documents/pdf/glo-core-blockchain-trend-report.pdf&quot;&gt;overview PR
document&lt;/a&gt;,
and it’s an entertaining read, especially section 2 ”Blockchain Examples across the
Industry”: Every single example is “experimenting with”, has “built a prototype” or is
“testing”. None deployed a prod product.&lt;/p&gt;

&lt;p&gt;The exception is Powerledger where they &lt;em&gt;claim&lt;/em&gt; to have deployed the product —
but spot-checking a few of their 30 clients, all of those are either
small-scale deployments (e.g. prototypes w/ 30 kWh) or in planning/prototyping
stage.&lt;/p&gt;

&lt;p&gt;Powerledger is an interesting one though, as it mixes both a fake blockchain approach
(&lt;a href=&quot;https://www.powerledger.io/company/power-ledger-whitepaper&quot;&gt;Per the whitepaper&lt;/a&gt;: private blockchain
in section 5.3, off-chain channels in section 5.4, and an off-chain trading engine in section 5.5.) with what looks like a 2017 “ICO scam”
($&lt;a href=&quot;https://coinmarketcap.com/currencies/power-ledger/&quot;&gt;POWR&lt;/a&gt;) — to build an energy
market, which already has working real-world non-blockchain implementations.&lt;/p&gt;

&lt;p&gt;Hewlett-Packard Enterprise’s
Blockchain Solutions page has issued &lt;a href=&quot;https://www.hpe.com/us/en/solutions/blockchain.html&quot;&gt;their last “News” in 2018&lt;/a&gt;.&lt;/p&gt;

&lt;h3 id=&quot;block-array-dead&quot;&gt;Block Array: Dead&lt;/h3&gt;

&lt;p&gt;The link on the Builtin.com article links directly to &lt;a href=&quot;https://www.facebook.com/blockarray&quot;&gt;their Facebook page&lt;/a&gt;, which hasn’t
been updated since March 2018. Their actual website (blockarray.com) is gone.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/blockarray.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3 id=&quot;maersk-baddead&quot;&gt;Maersk: &lt;del&gt;Bad&lt;/del&gt;Dead&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Updated 2023-01-13: Maersk announced that they will be &lt;a href=&quot;https://www.maersk.com/news/articles/2022/11/29/maersk-and-ibm-to-discontinue-tradelens&quot;&gt;shutting down
Tradelens in early
2023&lt;/a&gt;,
as “need for full global industry collaboration has not been achieved”.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Bad DLT: I actually spent a serious amount of time looking at Maersk — this is a
platform that actually seems to work, is used by customers, and they seem to be using a
Hyperledger internally.&lt;/p&gt;

&lt;p&gt;The problem arises when you look at what that blockchain actually does. Virtually every
component in the system is gated by an IBM.com login, there are multiple disconnected
blockchains with nodes operated by only a few participants, nodes can only be accessed
through APIs hosted by IBM (ACL’d off, of course), data is (by necessity — GDPR)
mutable, and not all data is shared by all participants.&lt;/p&gt;

&lt;p&gt;The blockchain only seems to be used to store hashes, which you (if you have access) can
then compare against a separately stored document (if you have it). This does, of
course, not preclude existence of other, conflicting documents in the blockchain, nor
does anything really stop the few node operators to collude and re-write history — for
which there might be legal reasons, like GDPR, which one node might not even be at
liberty to disclose to other parties.&lt;/p&gt;

&lt;p&gt;In essence, this is a working system, with a blockchain slapped on the side for PR
reasons. Blockchain integration probably does not make the system (much) worse –
especially given that it seems to affect only a tiny part of a (presumably) massively
complex shipping management system.&lt;/p&gt;

&lt;p&gt;But it doesn’t add value either: At the end of the day, “trust in the data” is
established through the IBM logo on the login screen&lt;sup id=&quot;fnref:https&quot; role=&quot;doc-noteref&quot;&gt;&lt;a href=&quot;#fn:https&quot; class=&quot;footnote&quot; rel=&quot;footnote&quot;&gt;4&lt;/a&gt;&lt;/sup&gt;, not through the blockchain.&lt;/p&gt;

&lt;h3 id=&quot;shipchain-extra-dead&quot;&gt;ShipChain: Extra Dead&lt;/h3&gt;

&lt;p&gt;Extra dead:
&lt;a href=&quot;https://web.archive.org/web/20210619020901/https://shipchain.io/settle.html&quot;&gt;https://web.archive.org/web/20210619020901/https://shipchain.io/settle.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the offer of settlement, ShipChain, Inc. offered, among other things, its payment to
the SEC of $2,050,000 […] Unfortunately, ShipChain, Inc. is now without sufficient
resources to continue its business. Consequently, ShipChain, Inc. has made the difficult
decision to cease operations and is now in the process of closing its affairs.&lt;/p&gt;

&lt;p&gt;It should be noted that this was in 2020, and it’s still listed when google searching
for “blockchain production users”&lt;/p&gt;

&lt;h2 id=&quot;government&quot;&gt;Government&lt;/h2&gt;
&lt;p&gt;This is a category where, at least in theory, you’d expect the ‘everything is public’
aspect of the blockchain might add some transparency use cases. Unfortunately, in the
projects listed, it doesn’t.&lt;/p&gt;

&lt;h3 id=&quot;voatz-very-very-bad&quot;&gt;Voatz: Very, Very Bad&lt;/h3&gt;
&lt;p&gt;Bad DLT: Now, e-voting is obviously a really bad idea (&lt;a href=&quot;https://www.eff.org/issues/e-voting&quot;&gt;EFF has tons of material&lt;/a&gt;,&lt;a href=&quot;https://openprivacy.ca/work/swisspost-scytl-evoting/&quot;&gt;OpenPrivacy on Swiss elections&lt;/a&gt; ‘19, &lt;a href=&quot;https://media.ccc.de/v/rc3-11440-hacking_german_elections#t=893&quot;&gt;CCC on Germany 2020&lt;/a&gt;). There’s a principle
in democracies that every person needs to be able to understand how the result was
calculated, and why it is anonymous and secure. With that, I invite you to read the
“Technology” &lt;a href=&quot;https://en.wikipedia.org/wiki/Voatz&quot;&gt;on Wikipedia&lt;/a&gt;, in particular:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;“The blockchain infrastructure of Voatz includes 32 identically arranged
verifying servers that are distributed across Amazon’s AWS and Microsoft’s
Azure.[16] Each server runs an identical copy of Hyperledger, an open source
blockchain software.[17]&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;Once a user downloads the Voatz app, they verify their phone number, provide
a photo ID, as well as a “selfie”. Facial recognition and voter rolls are
used to verify identity and confirm a match between the picture and ID
submitted. After the user is offered a secure token (activated through the
use of a fingerprint) applicable to eligible elections, the user’s biometric
information is removed from the Voatz system.[18] After all votes are
submitted to Voatz, votes are printed on a paper ballot and fed into a
machine.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Also, the intro and “Security Assessment” and “FBI Investigation” sections are
entertaining.&lt;/p&gt;

&lt;p&gt;Now with that out of the way,&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Voatz uses paper ballots as the source of truth. The votes are apparently printed out,
fed into a machine, where they are then counted. Why is there a blockchain system in
the middle, at all?&lt;/li&gt;
  &lt;li&gt;Voatz uses a replicated, permissioned hyperledger which (apparently) can only be
accessed through their APIs. How does blockchain provide auditability here? So what
exactly does the blockchain do here again?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A 2020 &lt;a href=&quot;https://internetpolicy.mit.edu/wp-content/uploads/2020/02/SecurityAnalysisOfVoatz_Public.pdf&quot;&gt;security review by researchers at MIT&lt;/a&gt;
came to a similar conclusion:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;We further find […] that the system’s use of the blockchain is unlikely to
protect against server-side attacks (§5.2).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The whole article, but in particular Section 1, is downright scary.
Particularly worth pointing out is that Voatz &lt;strong&gt;refuses to give a detailed
description of how their election system works&lt;/strong&gt;, citing IP
concerns&lt;sup id=&quot;fnref:voatz-reply&quot; role=&quot;doc-noteref&quot;&gt;&lt;a href=&quot;#fn:voatz-reply&quot; class=&quot;footnote&quot; rel=&quot;footnote&quot;&gt;5&lt;/a&gt;&lt;/sup&gt;. So much for the whole idea of “transparency”.&lt;/p&gt;

&lt;p&gt;David Gerard has &lt;a href=&quot;https://davidgerard.co.uk/blockchain/tag/voatz/&quot;&gt;covered Voatz extensively&lt;/a&gt;.&lt;/p&gt;

&lt;h3 id=&quot;state-of-delaware-dead&quot;&gt;State of Delaware: Dead&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/delaware_governor.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Dead: Via &lt;a href=&quot;https://technical.ly/civic-news/delaware-blockchain-initiative/&quot;&gt;technically&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;It’s been four years since that episode, and while corporations have the
state’s authorization to use blockchain for record keeping, it’s unknown how
many Delaware corporations are using it for stock ledgers.[…]&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;Technical.ly has reached out to the governor’s office and several individuals
directly involved with the evolution of the initiative and has not yet
received a response. It’s also unclear what came of the Symbiont
proof-of-concept.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3 id=&quot;follow-my-vote-very-bad-almost-dead&quot;&gt;Follow My Vote: Very Bad, Almost Dead&lt;/h3&gt;
&lt;p&gt;Dead (-ish): Founded 2012. Virtually every article covering this project (from their
‘press’ section) was written in 2017 or earlier. Their &lt;a href=&quot;https://twitter.com/FollowMyVote/with_replies&quot;&gt;Twitter&lt;/a&gt; account has not posted this year.&lt;/p&gt;

&lt;p&gt;This seems to be mostly equivalent to Voatz, with the same privacy &amp;amp; security problems
of the “one blockchain transaction per vote” approach. Sure, you may need to hop on a
VPN, that you paid for anonymously, &lt;strong&gt;and&lt;/strong&gt; you need to make sure that there’s no CCTV
cameras watching you vote – otherwise people, corporations or governments could
de-anonymize your vote. Small price to pay for a blockchain based system.&lt;/p&gt;

&lt;p&gt;As with Voatz, there is basically no technical documentation. They have an infographic
on how&lt;a href=&quot;https://followmyvote.com/cryptographically-secure-voting-2/&quot;&gt; their cryptographic process works&lt;/a&gt;. Can an average person
understand how this is secure &amp;amp; privacy-preserving? &lt;img src=&quot;assets/34_blockchain/follow_my_vote_crypto.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;In early 2021, they apparently &lt;a href=&quot;https://followmyvote.com/introducing-pollaris/&quot;&gt;scrapped&lt;/a&gt; the approach they have been working on,
to build a new fundamental platform called “Pollaris”. A year later, they uploaded &lt;a href=&quot;https://github.com/FollowMyVote/Pollaris-Contract&quot;&gt;one
commit to Github&lt;/a&gt;. There has been no
activity since, nor was I able to find any documentation on this system. It is unclear
whether the posts above refer to the pre-Pollaris, or the post-Pollaris system (but then
again, it wouldn’t really matter either way).&lt;/p&gt;

&lt;h2 id=&quot;media&quot;&gt;Media&lt;/h2&gt;

&lt;p&gt;Per builtin:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;“Blockchain’s strength in the media industry is its ability to prevent a
digital asset, such as an mp3 file, from existing in multiple places”.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Wait what&lt;/p&gt;

&lt;h3 id=&quot;madhive-bad--mostly-dead&quot;&gt;MadHive: Bad &amp;amp; Mostly Dead.&lt;/h3&gt;
&lt;p&gt;The company’s core business (Adtech) actually looks alive — but not the Blockchain part.
With the sparse information available, it looks like they had two previous attempts to
do &lt;em&gt;‘something with blockchain’&lt;/em&gt;, AdLedger and MadNetwork.&lt;/p&gt;

&lt;p&gt;The last post on &lt;a href=&quot;https://www.adledger.org/standards#&quot;&gt;AdLedgers&lt;/a&gt;’s&lt;a href=&quot;https://medium.com/adledger&quot;&gt;Medium&lt;/a&gt; page is from 2019, so that’s almost certainly dead. The
whitepaper assumes a permissioned Ethereum blockchain:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/adledger_paper1.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;They do explain why this is &lt;em&gt;required&lt;/em&gt;:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;img src=&quot;assets/34_blockchain/adledger_paper2.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;But they do not explain why using an immutable ledger, when you need to be able to
delete, makes &lt;em&gt;sense&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;They then talk about the need for “real time updates”, without the need of a
“blacklist”, and somehow the “distributed state machine” of a blockchain is a way to
achieve that. They don’t actually explain why.&lt;/p&gt;

&lt;p&gt;The other DLT attempt seems to have been a thing called “MadNetwork”.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;“&lt;strong&gt;MadProduction’s&lt;/strong&gt; MadNetwork will allow for the mining of MadBytes and
minting of
MadTokens which need to be managed through an accessible user interface.”.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The above quote is from a job posting that exited when I started researching
for this article, but has since been pulled (&lt;a href=&quot;https://startup.jobs/lead-solidity-engineer-madproductions-3500236&quot;&gt;cached version&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Assuming that this is the same as &lt;a href=&quot;https://www.madnetwork.com/#team&quot;&gt;https://www.madnetwork.com/&lt;/a&gt;, their last big update — still featured
prominently at the top of the page — is from 2020, announcing that they are
&lt;a href=&quot;https://www.verizon.com/about/news/verizons-full-transparency-launches-blockchain-verification&quot;&gt;working on a prototype with Verizon&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;There is no indication that “MadNetwork” is anywhere close to even being in a
prototype
stage. It is unclear even whether this is supposed to be a distributed PKI, or a
fraud-detection network for adtech. MadHive’s own &lt;a href=&quot;https://www.madhive.com/resources/&quot;&gt;“resources” section&lt;/a&gt; only lists documents from 2019.&lt;/p&gt;

&lt;h3 id=&quot;steem-dead--bad&quot;&gt;Steem: Dead &amp;amp; Bad&lt;/h3&gt;

&lt;p&gt;Steem.it is a reddit-ish social media platform. It is very close to dead these days: Per
&lt;a href=&quot;https://dappradar.com/steem/social/steemit&quot;&gt;dapp radar&lt;/a&gt;, its usage has dropped from 33k
users / day to about 35, making this project 99.9% dead. Justin Sun took over the chain,
and the community left for a project called Hive.io.&lt;/p&gt;

&lt;p&gt;However, if you do consider the few remaining users as a “real world use case” (or
include Hive), there’s plenty of bad DLT to go through here, too.&lt;/p&gt;

&lt;p&gt;The big and obvious problem is how an “uncensorable” platform would deal with illegal
content (CSAM is the obvious example). The answer is apparently: &lt;a href=&quot;https://steemit.com/steemit/@sethlinson/how-can-steem-deal-with-child-pornography&quot;&gt;they don’t, they
can’t, they just hope nobody will ever upload anything illegal&lt;/a&gt;.&lt;a href=&quot;https://medium.com/@davethepitt/ive-literally-just-found-out-that-you-can-only-edit-and-delete-content-in-steemit-and-dtube-in-the-8c1fc8a33d3e&quot;&gt;GDPR
is of course a problem&lt;/a&gt;
too. Steemit responds to legal requests by &lt;a href=&quot;https://en.cryptonomist.ch/2019/01/09/steemit-blockchain-based-social-media/&quot;&gt;censoring the content in the app&lt;/a&gt;,
apparently hoping that nobody will look into the Steem block-explorer — where the
content remains. &lt;strong&gt;Social Media on Blockchain creates a worst of both worlds&lt;/strong&gt;
situation: You need a content moderation team, just like existing social media platforms
— but they can’t actually delete the content form the database, so node operators are
still broadcasting it.&lt;/p&gt;

&lt;p&gt;SteemIt also has all the classic cryptocurrency traits: a history of &lt;a href=&quot;https://www.lexology.com/library/detail.aspx?g=78eebc6d-3b24-47af-8a81-d9c7c8ff37ad&quot;&gt;stealing funds
through soft &amp;amp; hard forks, threats of class-action lawsuits&lt;/a&gt;,
&lt;a href=&quot;https://news.softpedia.com/news/steem-social-network-hacked-user-funds-stolen-ddos-attack-followed-after-506417.shtml&quot;&gt;hacks&lt;/a&gt;,
and the &lt;a href=&quot;https://roselandj.medium.com/is-steemit-a-scam-93d302a44632&quot;&gt;earning model being a pyramid scheme&lt;/a&gt; (with the twist that early
investors make money not only from later investors, but also from creators).&lt;/p&gt;

&lt;p&gt;A similar project DTube, which is a youtube-esque social media platform, requires you to
refresh &lt;a href=&quot;https://hive.blog/witness-update/@quochuy/your-previous-d-tube-videos-don-t-play-anymore-how-to-prevent-this-from-happening-again-without-technical-skills&quot;&gt;the IPFS cache every few days&lt;/a&gt;
to keep your videos alive:
&lt;a href=&quot;https://hive.blog/witness-update/@quochuy/your-previous-d-tube-videos-don-t-play-anymore-how-to-prevent-this-from-happening-again-without-technical-skills&quot;&gt;https://hive.blog/witness-update/@quochuy/your-previous-d-tube-videos-don-t-play-anymore-how-to-prevent-this-from-happening-again-without-technical-skills&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Reddit exists, micropayments in social media have been tried over and over again before
DLTs came around (&lt;a href=&quot;https://en.wikipedia.org/wiki/Flattr&quot;&gt;Flattr&lt;/a&gt;,&lt;a href=&quot;https://en.wikipedia.org/wiki/Google_Contributor&quot;&gt;Google Contributor&lt;/a&gt;). Steemit does censorship internally,
thus the key argument for “uncensorable posts and transactions” is not valid. Blockchain
has no reason to be integrated here, and makes things worse.&lt;/p&gt;

&lt;h3 id=&quot;open-music-initiative-dead&quot;&gt;Open Music Initiative: Dead&lt;/h3&gt;
&lt;p&gt;Dead: &lt;a href=&quot;https://medium.com/the-open-music-initiative/tagged/open-music-initiative&quot;&gt;Last blog posts in 2018&lt;/a&gt;, most about
hackathons, conference attendance, no actual products. Seemed to have &lt;a href=&quot;https://twitter.com/openmusic&quot;&gt;tweeted&lt;/a&gt; about industry-related things until October 2020, and
only tweeted twice since.&lt;/p&gt;

&lt;h1 id=&quot;not-the-real-world&quot;&gt;Not The Real World&lt;/h1&gt;

&lt;h2 id=&quot;money-transfer-use-cases&quot;&gt;Money Transfer Use Cases&lt;/h2&gt;

&lt;p&gt;Money transfer use-cases would fall directly in the category of “crypto-only”. For as
long as Bitcoin has existed, this has been touted as a great use-case — but it never
really materialized.&lt;/p&gt;

&lt;h3 id=&quot;chainio-not-blockchain&quot;&gt;Chain.io: Not Blockchain&lt;/h3&gt;

&lt;p&gt;According to the Builtin article, Chain.io’s “cryptographic ledgers help financial
institutions safely and efficiently handle the transfer of cryptocurrencies.” There is
no mention of this on their homepage. It looks like they have now completely pivoted
from being a blockchain-financials company to being a logistics-on-cloud platform.
Their careers page summarizes their company as&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Chain.io is a cloud based integrations platform that connects partners across
the global supply chain.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The &lt;a href=&quot;https://blog.chain.io/tag/blockchain&quot;&gt;last mention of DLT in their blog&lt;/a&gt;
is from 2018.&lt;/p&gt;

&lt;h3 id=&quot;algorand-gemini--circle-crypto-only&quot;&gt;Algorand, Gemini &amp;amp; Circle: Crypto only&lt;/h3&gt;
&lt;p&gt;Not real-world projects. As discussed in the introduction, I am only discussing projects
that have real-world effects outside of cryptocurrency balances. Gemini, Circle as
exchanges, and Algorand as a Blockchain implementation, don’t qualify here – they don’t
actually add real-world utility other than moving tokens around.&lt;/p&gt;

&lt;h2 id=&quot;nfts&quot;&gt;NFTs&lt;/h2&gt;

&lt;h3 id=&quot;candy-pixura-dapper-labs-not-real-world-bad-dlt&quot;&gt;Candy, Pixura, Dapper Labs [not real world, bad dlt]&lt;/h3&gt;

&lt;p&gt;As a whole, NFTs violate both the “real world” requirement, but they are also a really
bad engineering solution for the “non fungibility”&lt;/p&gt;

&lt;p&gt;In particular — see the &lt;em&gt;Propy&lt;/em&gt; use-case above — when real-world ownership law meets
stolen or lost keys, real-world wins. This also seems to be the case with the &lt;a href=&quot;https://twitter.com/NeerajKA/status/1529176080879329285&quot;&gt;copyright
law &amp;amp; Seth Green’s stolen ape&lt;/a&gt;
— a stolen NFT is unlikely to give you rights. Ownership does, but that is not the same
as possession. So the “NFTness” of the Ape doesn’t add any better management or
transferability of ownership, the exact opposite is the case: it &lt;a href=&quot;https://news.bloomberglaw.com/ip-law/seth-greens-stolen-bored-ape-muddles-nft-legal-ownership&quot;&gt;muddies the waters&lt;/a&gt;,
adds another layer of complexity.&lt;/p&gt;

&lt;p&gt;But not only are there complications unifying “ownership” with the real world and the
crypto world; even within crypto “uniqueness” (and thus the “ownership over the thing”)
is far from guaranteed.&lt;/p&gt;
&lt;ol&gt;
  &lt;li&gt;If Ethereum forks (again), each NFT would be duplicated, and can be sold individually
on each chain. Of course, OpenSea might just declare one of the two forks the
canonical one, but other platforms might disagree. From a purely technical (“code is
law”) perspective, both forks are equally valid.&lt;/li&gt;
  &lt;li&gt;It is of course possible to just clone the whole contract and plug the same images
(or URIs) in. This exists as a service, e.g. with &lt;a href=&quot;https://www.prnewswire.com/news-releases/worlds-first-nft-cloning-system-launches-on-clonemynftcom-301483563.html&quot;&gt;CloneMyNFT.com&lt;/a&gt;
(“which allows you to keep a copy of your NFT in your wallet even after selling the
original”),&lt;/li&gt;
  &lt;li&gt;It is of course also possible to just clone the NFT on a completely separate
blockchain, like Candy does — they &lt;a href=&quot;https://explorer.palm.io/token/0xCAFFA4b5F72a44C75F796E94F22dEBd6369F04FC/token-transfers&quot;&gt;run on a DLT called Palm&lt;/a&gt;,
which uses “proof of authority (PoA) consensus, with network validators being run by
key stakeholders” — in other words, it’s completely centralized, and if the key
stakeholders decide to take your ape, or a majority loses interest and shut down the
chain, your stuff is gone and you can’t get it back — except with a hard fork, see
problem (1.).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As &lt;a href=&quot;https://cointelegraph.com/magazine/2022/05/31/you-can-now-clone-nfts-as-mimics-heres-what-that-means&quot;&gt;Cointelegraph writes&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;“&lt;strong&gt;Just as in the traditional art market&lt;/strong&gt;, NFTs can be faked through Mimics.
And just like in traditional art markets, this fact challenges users to take
responsibility for tracing the provenance of what they’re buying. Identifying
vulnerabilities is how infrastructure is strengthened.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;So, how does this improve on things then?&lt;/p&gt;

&lt;p&gt;More generally, through labeling which NFT collection’s hash is the “true” BAYC, which
fork of the blockchain is the “true” ETH fork, which collections can even be displayed
and traded — OpenSea &amp;amp; co are the true gatekeepers and de-facto owners. If they want
your ape to be gone, they can pull the plug. So again, you’re left with a central
instance virtually controlling your apes, so the NFTs add practically nothing to the
real world, other than a (very expensive) layer of indirection.&lt;/p&gt;

&lt;p&gt;So I will be excluding this category as a whole, Candy &amp;amp; Dapper Labs are just generic
NFT companies. Pixura deserves honorable mention for the phrase “&lt;em&gt;[Pixura] helps
non-technical users to create, track and exchange NFTs&lt;/em&gt;” — because what we really needed
was to make it easier to create useless tokens.&lt;/p&gt;

&lt;h1 id=&quot;and-the-winner-is&quot;&gt;And The Winner Is…&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;Chainalysis&lt;/strong&gt; helps the government track down &lt;a href=&quot;https://www.chainalysis.com/customer-story-irs-ci/&quot;&gt;tax evasion&lt;/a&gt;,&lt;a href=&quot;https://www.google.com/search?q=chainalysis+darknet+markets&quot;&gt;darknet markets&lt;/a&gt; and &lt;a href=&quot;https://www.wired.com/story/tracers-in-the-dark-welcome-to-video-crypto-anonymity-myth/&quot;&gt;CSAM providers &amp;amp;
consumers&lt;/a&gt;.
You can make an argument that they fundamentally require cryptocurrencies to work, but
the impact they are having extends far outside the crypto ecosystem into branches of law
and tax enforcement.&lt;/p&gt;

&lt;p&gt;They also provide mechanisms to automatically block transactions:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Use KYT to detect patterns of high risk activity and prevent transactions
with
addresses identified on OFAC’s sanction list, freeze deposits from hacks or
ransomware, screen ETH accounts, and more&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;It is certainly ironic: The only live real-world Blockchain use case in this
list, is an application that de-anonymizes and censors transactions in the
context of ‘uncensorable’ &amp;amp; ‘anonymous’ cryptocurrencies.&lt;/p&gt;

&lt;h1 id=&quot;closing-words&quot;&gt;Closing Words&lt;/h1&gt;

&lt;p&gt;There have been overly hyped tech products before — Cloud, Machine Learning, Internet —
where people promised more than what the product actually delivered. But these products
clearly delivered &lt;em&gt;something&lt;/em&gt;. This is not the case with Blockchain technology.&lt;/p&gt;

&lt;p&gt;The statements “Blockchain is the Future” and the more moderate “there are use-cases for
Blockchain outside of cryptocurrency” seem to always fall apart when you look at any
proposed use-case from an engineering, privacy and legal perspective.&lt;/p&gt;

&lt;p&gt;Blockchain advocates have been spending 13 years convincing people of those statements,
could they not have spent an hour or two to find facts to back them up?&lt;/p&gt;

&lt;p&gt;Given how many investors and members of the general public lose time and money
on this, I believe it is somewhat irresponsible that the software engineering
community is not pushing back harder. As a member of this community, I also find it
somewhat embarrassing.&lt;/p&gt;

&lt;div class=&quot;footnotes&quot; role=&quot;doc-endnotes&quot;&gt;
  &lt;ol&gt;
    &lt;li id=&quot;fn:marr&quot; role=&quot;doc-endnote&quot;&gt;
      &lt;p&gt;In fact, the only other comparable list I could find was
&lt;a href=&quot;https://bernardmarr.com/35-amazing-real-world-examples-of-how-blockchain-is-changing-our-world/&quot;&gt;this one&lt;/a&gt;.
Spot-checking some of the entries, it seems to suffer from exactly the same
problems as the Builtin list. &lt;a href=&quot;#fnref:marr&quot; class=&quot;reversefootnote&quot; role=&quot;doc-backlink&quot;&gt;&amp;#8617;&lt;/a&gt;&lt;/p&gt;
    &lt;/li&gt;
    &lt;li id=&quot;fn:tamper-proof&quot; role=&quot;doc-endnote&quot;&gt;
      &lt;p&gt;A tamper-proof system would be one where you could not, in any
way, change the bytes. But that’s clearly false here, you can simply go into
the underlying storage engine — &lt;a href=&quot;https://iroha.readthedocs.io/en/develop/maintenance/migration-rocksdb.html?highlight=rocks#migration-to-rocksdb&quot;&gt;for example, PostgreSQL or RocksDB for
Hyperledger Iroha&lt;/a&gt;
— and change the values there. Arguably, given that this is a private blockchain that
has no external parties verifying the blocks, it would be hard to even call a private
blockchain tamper-resistant. &lt;a href=&quot;#fnref:tamper-proof&quot; class=&quot;reversefootnote&quot; role=&quot;doc-backlink&quot;&gt;&amp;#8617;&lt;/a&gt;&lt;/p&gt;
    &lt;/li&gt;
    &lt;li id=&quot;fn:right-to-erasure&quot; role=&quot;doc-endnote&quot;&gt;
      &lt;p&gt;GDPRs right to erasure applies to pseudonymous
data, too. Pseudonymous data is anything that can be linked to a single individual by
someone who has additional data. &lt;a href=&quot;https://www.europarl.europa.eu/RegData/etudes/STUD/2019/634445/EPRS_STU(2019)634445_EN.pdf&quot;&gt;There is good reason to believe that this includes
even (hashed) public keys&lt;/a&gt;,
i.e. bitcoin addresses, as well as transactions between them. As far as i know, this
hasn’t been tested in court, because nobody has sued — yet. &lt;a href=&quot;#fnref:right-to-erasure&quot; class=&quot;reversefootnote&quot; role=&quot;doc-backlink&quot;&gt;&amp;#8617;&lt;/a&gt;&lt;/p&gt;
    &lt;/li&gt;
    &lt;li id=&quot;fn:https&quot; role=&quot;doc-endnote&quot;&gt;
      &lt;p&gt;and a good old-fashioned centrally managed HTTPS connection &lt;a href=&quot;#fnref:https&quot; class=&quot;reversefootnote&quot; role=&quot;doc-backlink&quot;&gt;&amp;#8617;&lt;/a&gt;&lt;/p&gt;
    &lt;/li&gt;
    &lt;li id=&quot;fn:voatz-reply&quot; role=&quot;doc-endnote&quot;&gt;
      &lt;p&gt;In fact, large chunks of Voatz &lt;a href=&quot;https://voatz.com/wp-content/uploads/2020/07/V-Analysis-of-MITresearchers-claims.pdf&quot;&gt;attempt to address the
researchers’ criticism&lt;/a&gt;is
based on the argument “We’re not telling anyone how our voting
infrastructure works, so how could they possibly know. The remaining
arguments are a mix of “oh we have fixed this a looong time ago, no we’re
not going to tell you when that was” and inadvertently admitting that the
situation is even worse — in Section 2.4, trying to address the fact that
biometric information is sent to a third party, they admit that that data
is additionally transmitted to Voatz for manual inspection. &lt;a href=&quot;#fnref:voatz-reply&quot; class=&quot;reversefootnote&quot; role=&quot;doc-backlink&quot;&gt;&amp;#8617;&lt;/a&gt;&lt;/p&gt;
    &lt;/li&gt;
  &lt;/ol&gt;
&lt;/div&gt;</content><author><name></name></author><category term="blockchain" /><summary type="html">TL;DR: The top #1 Google result for “blockchain production users” (and related queries) lists 34 individual “real world blockchain” projects. One would expect some actual functioning projects that have an impact on every-day consumers — outside of cryptocurrency &amp;amp; NFTs. Looking into all 34, I found that 13 are already dead (including one that has been killed by the SEC), 6 are only useful within the crypto &amp;amp; NFT ecosystems and not in the “real world” and 14 use Blockchain in a way where removing the blockchain would not impact functionality at all, or make the product better. The remaining project is Chainalysis, which has real-world impact by helping law enforcement de-anonymizing blockchain users.</summary></entry><entry><title type="html">SSI-on-Blockchain is Objectively a Bad Thing</title><link href="https://weh.wtf/ssi.html" rel="alternate" type="text/html" title="SSI-on-Blockchain is Objectively a Bad Thing" /><published>2022-07-08T02:21:46+00:00</published><updated>2022-07-08T02:21:46+00:00</updated><id>https://weh.wtf/ssi</id><content type="html" xml:base="https://weh.wtf/ssi.html">&lt;p&gt;&lt;strong&gt;Summary / TLDR:&lt;/strong&gt; Blockchain (or “DLT”) adds no functionality to a SSI/Identity system
that is not equally well, if not better, provided by a QR code on paper. None of the
benefits Blockchain is supposed to bring hold up under mild scrutiny. Blockchain adds
significant complexity and cost, as well as usability issues and serious privacy
concerns. “Blockchain” in SSI exists for PR only, not for engineering reasons.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: I am only going to talk about the “blockchain” part of Self-sovereign
Identity. Many things, good and bad, can be said about self-sovereign identity, but in
order to keep the scope of this document manageable, I’ll leave the broader
SSI-discussion to others.&lt;/p&gt;

&lt;ul id=&quot;markdown-toc&quot;&gt;
  &lt;li&gt;&lt;a href=&quot;#terminology&quot; id=&quot;markdown-toc-terminology&quot;&gt;Terminology&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;#ssi-and-blockchain&quot; id=&quot;markdown-toc-ssi-and-blockchain&quot;&gt;SSI and Blockchain&lt;/a&gt;&lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;#put-your-engineering-hat-on-and-nothing-adds-up&quot; id=&quot;markdown-toc-put-your-engineering-hat-on-and-nothing-adds-up&quot;&gt;Put Your Engineering Hat On and Nothing Adds Up&lt;/a&gt;    &lt;ul&gt;
      &lt;li&gt;&lt;a href=&quot;#the-bad&quot; id=&quot;markdown-toc-the-bad&quot;&gt;The Bad&lt;/a&gt;&lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#the-ugly&quot; id=&quot;markdown-toc-the-ugly&quot;&gt;The Ugly&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;#a-tour-through-literature--projects&quot; id=&quot;markdown-toc-a-tour-through-literature--projects&quot;&gt;A Tour Through Literature &amp;amp; Projects&lt;/a&gt;    &lt;ul&gt;
      &lt;li&gt;&lt;a href=&quot;#blogs--articles&quot; id=&quot;markdown-toc-blogs--articles&quot;&gt;Blogs &amp;amp; Articles&lt;/a&gt;&lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#in-academia&quot; id=&quot;markdown-toc-in-academia&quot;&gt;In Academia&lt;/a&gt;&lt;/li&gt;
      &lt;li&gt;&lt;a href=&quot;#real-world-implementations&quot; id=&quot;markdown-toc-real-world-implementations&quot;&gt;Real-World implementations?&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;#parting-words&quot; id=&quot;markdown-toc-parting-words&quot;&gt;Parting Words&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;terminology&quot;&gt;Terminology&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Blockchain&lt;/strong&gt;, or &lt;strong&gt;DLT&lt;/strong&gt; (“Distributed Ledger Technology”), typically describes a
database system (“ledger”) similar to the one cryptocurrencies, like Bitcoin, are
built on. In theory, they are supposed to be permissionless (anyone can write and read
the ledger), decentralized (no single authority controls the ledger). They are
typically constructed as immutable, append-only structures - meaning you can never
modify, even delete, data from it. (Certain optimizations exist that allow
participants to phase out old data in some DLTs, but deletion cannot be enforced -
i.e., it is insufficient, or at least a gray area, for GDPR purposes)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Self-Sovereign Identity (SSI)&lt;/strong&gt; is the idea that, instead of having a central party
(e.g. government, Google/Apple, …) issue you an ID, you issue your ID yourself and
have the third parties notarize it. This is frequently sold as a “take the power back”
approach from Big Tech (or Governments). The most well-known standards for digital
identity are W3C’s Decentralized Identifiers (DID) and Verifiable Credentials (VC). These
are heavily sponsored &amp;amp; driven by blockchain-based startups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;ssi-and-blockchain&quot;&gt;SSI and Blockchain&lt;/h2&gt;

&lt;p&gt;The intersection of Self-Sovereign Identity and Blockchain is a great example for how
Blockchain technology does not live up to it’s hype. Government institutions, such as
the EU, pump millions into research &lt;a href=&quot;https://cordis.europa.eu/project/id/871932/reporting&quot;&gt;directly&lt;/a&gt;, as well as indirectly - the top 2
blockchain use-cases on the &lt;a href=&quot;https://ec.europa.eu/digital-building-blocks/wikis/display/EBSI/Use+cases&quot;&gt;European Blockchain Services Infrastructure (EBSI)
website&lt;/a&gt; are
“Identity” and the SSI-based “Diploma”. The &lt;a href=&quot;https://builtin.com/blockchain/blockchain-applications&quot;&gt;top Google result&lt;/a&gt; for “real world blockchain uses”
prominently features Identity-startups.&lt;/p&gt;

&lt;p&gt;But it’s certainly possible to use Digital Identity / VCs without any blockchain: The
EU’s digital vaccination certificates use W3C’s VCs. The EU has managed to scale it up
to &lt;a href=&quot;https://ec.europa.eu/info/sites/default/files/second_report_of_the_commission_on_the_eu_digital_covid_certificate_regulation_annex.pdf&quot;&gt;1.7 Billion certificates&lt;/a&gt; - but that’s &lt;em&gt;after&lt;/em&gt; they &lt;a href=&quot;https://www.securid.com/blog/the-new-technology-powering-european-covid-certificates/&quot;&gt;got rid of all the blockchain stuff&lt;/a&gt;, 
which they unsuccessfully experimented with before. So if SSI works just fine without
blockchain, the obvious question is, what value does Blockchain add to SSI?&lt;/p&gt;

&lt;p&gt;It turns out, even proponents of the SSI-on-Blockchain idea don’t seem to have
a clear narrative - everyone seems to claim something else. There are, however,
6 commonly touted benefits:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Blockchain increases trust in the digital identity credentials, e.g. &lt;strong&gt;your&lt;/strong&gt; digital
passport [e.g. &lt;a href=&quot;https://www.ibm.com/blogs/blockchain/2018/06/self-sovereign-identity-why-blockchain/&quot;&gt;IBM SSI Blog: “Why Blockchain”&lt;/a&gt;],&lt;/li&gt;
  &lt;li&gt;Blockchain increases trust in the &lt;strong&gt;issuers&lt;/strong&gt; of the credentials [&lt;a href=&quot;https://www.ibm.com/blogs/blockchain/2019/11/blockchain-for-trusted-security-labels/&quot;&gt;IBM SSI Blog:
‘Trusted Labels’&lt;/a&gt;, 
&lt;a href=&quot;https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/?sh=1d3e3bda683f&quot;&gt;Forbes&lt;/a&gt;]&lt;/li&gt;
  &lt;li&gt;Blockchain makes &lt;strong&gt;fraud&lt;/strong&gt; harder [e.g. &lt;a href=&quot;https://www.techtarget.com/searchsecurity/feature/Explore-self-sovereign-identity-use-cases-and-benefits&quot;&gt;Techtarget&lt;/a&gt;, 
&lt;a href=&quot;https://www.fintechnews.org/how-to-fight-the-fraud-crisis-through-blockchain-and-self-sovereign-identity/&quot;&gt;Fintech News&lt;/a&gt;, 
&lt;a href=&quot;https://arxiv.org/pdf/1806.01926.pdf&quot;&gt;TU Delft&lt;/a&gt;],&lt;/li&gt;
  &lt;li&gt;Blockchain allows &lt;strong&gt;trusted time-stamping&lt;/strong&gt;, i.e. proofs that credentials were issued
before some specific point in time [&lt;a href=&quot;https://www.eublockchainforum.eu/sites/default/files/report_identity_v0.9.4.pdf&quot;&gt;EU Blockchain Forum&lt;/a&gt;],&lt;/li&gt;
  &lt;li&gt;Blockchain avoids &lt;strong&gt;third parties&lt;/strong&gt; for storage/access [&lt;a href=&quot;https://www.ibm.com/blogs/blockchain/2019/11/blockchain-for-trusted-security-labels/&quot;&gt;IBM&lt;/a&gt;
again]&lt;/li&gt;
  &lt;li&gt;Users have &lt;strong&gt;control over their data&lt;/strong&gt; (found in virtually every blog on the subject, and
even in academic papers, e.g. &lt;a href=&quot;https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=7163223&quot;&gt;this&lt;/a&gt; or &lt;a href=&quot;https://arxiv.org/pdf/1806.01926.pdf&quot;&gt;this&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All of these claims fall apart when even mild scrutiny is applied.&lt;/p&gt;

&lt;p&gt;It is almost comical how every article or paper on this subject
avoids describing, on a high level, the tradeoffs in terms of risk, or trust,
or engineering.&lt;/p&gt;

&lt;p&gt;In a problem space that deals exclusively with (chains, webs, direct, indirect) &lt;em&gt;trust&lt;/em&gt;, 
you’d think &lt;em&gt;someone&lt;/em&gt; would write a comparison of DLT and non-DLT, on “which third
parties do I need to trust, and what happens when they fail, or they are malicious”. It
seems like engineering 101 - yet such comparisons are completely absent from anything
I encountered while researching this article.&lt;/p&gt;

&lt;p&gt;It is somewhat mind-boggling how the “blockchain is the future”-assumption just keeps
getting cargo-culted through the pitch decks - and even through scientific papers -, and
nobody seems to fact-check that assumption, ever.&lt;/p&gt;

&lt;h2 id=&quot;put-your-engineering-hat-on-and-nothing-adds-up&quot;&gt;Put Your Engineering Hat On and Nothing Adds Up&lt;/h2&gt;

&lt;h3 id=&quot;the-bad&quot;&gt;The Bad&lt;/h3&gt;

&lt;p&gt;The following discusses the claimed common benefits mentioned before, and how blockchain
adds - in the best case - no value, but frequently makes the problem area worse.&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Your digital identity does not become more trusted.&lt;/strong&gt; If everyone can write to the
blockchain, the fact that “your identity is on the blockchain” doesn’t mean anything
by itself. Therefore there is no difference in authenticity (or trustworthiness) of
some “piece of data” whether it’s on a QR code on your smartphone, or in a public
blockchain.&lt;/p&gt;

    &lt;p&gt;Authenticity is typically established through digital signatures, e.g. a
federal agency would digitally sign a document stating “Taylor Swift is 21+ years
old”. But that signature can be easily be embedded in a QR code too (and so can a
“chain” of signatures and certificates, allowing for trust hierarchies). These systems
exist, and work (see the vaccination passport example).&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;The identity issuers do not become more trusted.&lt;/strong&gt; The previous point holds for the
other side of the equation, the identity of the signature issuer (Certificate
Authority), too. There are (by necessity) only going to be few trusted entities that
can act as CAs - after all, for the verification to work, both issuer and subject need
to trust the same CA. Coordinating this will by necessity only leave a few government
agencies, or maybe (very large) trusted corporations (such as nationwide utilities, or
some Big Tech companies).
    &lt;ol&gt;
      &lt;li&gt;
        &lt;p&gt;If there are only few, and they are well-known - for example, a few government
entities per country - then you can hard-code them in your app - which is exactly
what’s being done today through your OS’ or browsers CA store.&lt;/p&gt;
      &lt;/li&gt;
      &lt;li&gt;
        &lt;p&gt;If there are multiple smaller entities - for example, each landlord issuing digital
keys, in every city, worldwide - you will need to delegate trust, typically through a
hierarchy (the landlords are trusted by the city, which in turn are trusted by the
federal government, or a national utility company - who’s certificates are hard-coded
in your app). This is the exact structure (virtually) all internet encryption is
based on. Additionally, the existing system - X509 - supports cross-signing, having
credentials signed by multiple parties - despite claims to the opposite, this is not
a unique feature of W3C VCs.&lt;/p&gt;
      &lt;/li&gt;
    &lt;/ol&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Detection of forgery or conflicting credentials is not made easier&lt;/strong&gt;. A very common
argument is that storing claims on a DLT would make it impossible for someone to show
one certificate to person A and another to person B: The verifier could just look at
the public ledger, and see the conflict! Variations of this claim include Sovrin’s
“The blockchain can tell you which [certificate] is the most recent one”.&lt;/p&gt;

    &lt;p&gt;But this system requires the verifier to look up other credentials that match some
identifying information - for example, they need to find all IDs named Angela Merkel.
Being able to perform such lookups requires that the data on the blockchain is PII, and
storing PII on an immutable ledger is a straight-forward GDPR (and generally, privacy)
violation.&lt;/p&gt;

    &lt;p&gt;There are approaches that try to address this - e.g. using hashes, encryption, or
zero-knowledge proofs, to obscure the data and make the problem a bit harder, but the
fundamental problem remains the same - you need to be able to look things up for the
forgery/conflict detection to work, and that lookup necessarily exposes PII.&lt;/p&gt;

    &lt;p&gt;Additionally, there might be valid reasons for a person to have conflicting versions of
their IDs over time. People change names, change genders, typos happen etc. -
applications need to be able to handle these. Consider someone in a witness protection
program, where the existence of a conflicting ID would be outright life-threatening.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Verified timestamping adds no practical value, and can be dangerous.&lt;/strong&gt; The
publication timestamp is the only bit of verifiable data that a blockchain &lt;em&gt;actually&lt;/em&gt;
adds. In theory, this proves that a piece of data was created no later than a specific
time T - i.e. that a document has not been “backdated”.&lt;/p&gt;

    &lt;p&gt;Now, this &lt;em&gt;sounds&lt;/em&gt; like a useful feature to have, but, as before, it falls apart under
closer inspection - mainly because there is no real-world situation where this is truly
relevant: You’d need to construct a situation where you already trust the issuer to make
true statements about everything that’s in the document (e.g. in a passport, Name, 
biometric data, issuance and expiry date), but you somehow don’t trust them that they
issued (printed) the document in a timely manner.&lt;/p&gt;

    &lt;p&gt;This is simply not a problem anyone is having, but it gets worse:&lt;/p&gt;

    &lt;ul&gt;
      &lt;li&gt;Even if this was an actual problem: Nothing stops the document issuer from simply
issuing multiple entries at different timestamps. As in the previous point
(“forgery”), this is impossible to detect for third parties.&lt;/li&gt;
      &lt;li&gt;As above, there might be very valid use cases for having a document being backdated.
Having an anomaly in the issuance timestamp can be anything from uncomfortable to
outright dangerous.&lt;/li&gt;
      &lt;li&gt;This only works when you trust your Blockchain API gateway - the “anchoring timestamp”
is part of the block, not the statement, so an untrustworthy API gateway can simply
change it.&lt;sup id=&quot;fnref:spv&quot; role=&quot;doc-noteref&quot;&gt;&lt;a href=&quot;#fn:spv&quot; class=&quot;footnote&quot; rel=&quot;footnote&quot;&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
    &lt;/ul&gt;

    &lt;p&gt;Of course, timestamping services don’t actually
require blockchain. RFC3161, the most popular timestamping standard, has existed since
2001 and can be &lt;a href=&quot;https://gist.github.com/Manouchehri/fd754e402d98430243455713efada710&quot;&gt;reasonably decentralized&lt;/a&gt;. But even that
standard is rarely used: a quick &lt;a href=&quot;https://github.com/search?q=rfc3161&quot;&gt;github search for RFC3161&lt;/a&gt; finds only 28 repositories and 1k commits at the
time of writing - compared to 29k repositories and tens of millions of commits for the
search term “identity”. DKIM covers this usecase too, and is standard for most emails
today.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;You are relying on the same amount of third parties, but likely less trustworthy
ones.&lt;/strong&gt; There are two “third parties” to consider here: The cryptographic trustee, and
the data provider. The trust model in the former is unchanged, as discussed in the
first two points.&lt;/p&gt;

    &lt;p&gt;The latter third party stores the blockchain for you, and provides you with
the data through some API. This is required if the DID-system is to scale to a large
population, like a country or the EU: The blockchain would typically contain
some entry for every DID or VC; whether that’s the document itself, a
hashed/encrypted version, or an audit log entry. You would then end up with
billions of entries, not something that will fit on an average phone, or that
you’d want to keep updated day and night.&lt;/p&gt;

    &lt;p&gt;(A few projects, like Sovrin, store only a handful - maybe a few 100 - “root” DIDs
in a private ledger. As only sovrin can add or revoke from the ledger, the “added
third party” trust problem remains the same.)&lt;/p&gt;

    &lt;p&gt;Adding the dependency on a
“blockchain API” is equivalent to adding a dependency on a Government or Big Tech, 
though in most of the existing examples the gateway is operated by a far smaller
(and/or less reputable) company. What if they are offline? What if they get hacked?
What if that company has financial incentives to not be honest at all times?&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;You actually give up control over your data, not gaining more.&lt;/strong&gt; The “you own your
data” claim is simply not true, the exact opposite is true. When you upload data to a
blockchain, it stays there forever. Any Big Tech company that you tried to avoid by
using DID can happily read along.&lt;/p&gt;

    &lt;p&gt;Some systems claim they provide the ability to
delete data, but even if that were true - by necessity, you pushed the data onto a
public system, you don’t know if all systems actually act on your deletion request.
The NSA probably won’t.&lt;/p&gt;

    &lt;p&gt;The “control” argument also often seems rooted in some kind of
encryption scheme, where only the user holds the private key. But this is orthogonal
to blockchain - if the data is encrypted, you might as well store it at some Big Tech
provider, even if you don’t trust them. At least then you have one entity to sue if
your data gets mis-handled. From a privacy perspective, you’re almost certainly better
off with that approach, too: Metadata analysis companies like Chainalysis make a
&lt;a href=&quot;https://techcrunch.com/2022/05/10/crypto-forensics-startup-chainalysis-raises-170m-at-8-6b-valuation/&quot;&gt;living&lt;/a&gt;, 
&lt;a href=&quot;https://fortune.com/2017/08/22/irs-tax-cheats-bitcoin-chainalysis/&quot;&gt;and&lt;/a&gt; &lt;a href=&quot;https://www.wired.com/story/tracers-in-the-dark-welcome-to-video-crypto-anonymity-myth/&quot;&gt;headlines&lt;/a&gt;, 
by correlating data that’s properly encrypted, but on a blockchain.&lt;/p&gt;

    &lt;p&gt;The idea that you
gain control over your data by publicly posting it on the internet is so obviously
stupid, it’s hard to understand why people insist on repeating it.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;the-ugly&quot;&gt;The Ugly&lt;/h3&gt;

&lt;p&gt;The “Engineering” section would not be complete without pointing out a few obvious
additional drawbacks when using DLTs:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Additional complexity&lt;/strong&gt;. Adding more moving parts in any IT system should always
be done with caution, even more so when the system is exposed to the internet, and
even more so when it is deployed on end-user devices you can’t control and thus can’t
centrally coordinate. Complexity adds cost, slows development, and adds
failure modes.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;A dependency on an internet connection&lt;/strong&gt;. You cannot get the most up-to-date
state of the blockchain when you’re in a tunnel, in the mountains, or the connection
is slow and unreliable at a festival where the 5G network is overloaded. This dependency of
course also means higher latency independent of how good your connection is - if you need
to pull additional data, things go slower.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Transaction cost.&lt;/strong&gt; Distributed ledgers - virtually by design - can’t utilize
economies of scale, making transactions computationally more expensive. In
addition, all commonly used public ledgers charge fees (and private ledgers
require you to trust an additional party).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;None of these above would be deal breakers, of course, if they were offset by some
additionally gained functionality. But there simply is nothing.&lt;/p&gt;

&lt;h2 id=&quot;a-tour-through-literature--projects&quot;&gt;A Tour Through Literature &amp;amp; Projects&lt;/h2&gt;

&lt;p&gt;Obviously, thousands of blog posts, articles and papers have been written on the
subject. I’ve tried to collect a representative sample from the most popular (per google
ranking or citations) below:&lt;/p&gt;

&lt;h3 id=&quot;blogs--articles&quot;&gt;Blogs &amp;amp; Articles&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;EBSI&lt;/strong&gt;, the European Blockchain initiative, is advertising digital identity as one of
their 4 usecases. Technically, 2 others - “Diploma verification” and “Health Insurance
verification” are close enough to DID that it might count, too. They have documentation, 
but it too is devoid of any *actual *information what the blockchain actually does.
Their documentation actually implies the opposite: All the usecases that they have
envisioned so far &lt;a href=&quot;https://twitter.com/00xou/status/1544063574712139778/photo/1&quot;&gt;seem to only write to the ledger&lt;/a&gt;. None of them actually
read from it. Seriously, even the “verify credentials” use-case only &lt;a href=&quot;https://twitter.com/00xou/status/1544063814139871235/photo/1&quot;&gt;writes an audit
log to the ledger&lt;/a&gt;, which
is apparently never read.&lt;/p&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.ibm.com/blogs/blockchain/category/trusted-identity/self-sovereign-identity/&quot;&gt;&lt;strong&gt;IBM Blog&lt;/strong&gt; mentioned earlier&lt;/a&gt;
talks a lot about how they avoid trusted third parties, and establish trust through the
blockchain. They conveniently ignore that all of IBMs blockchain products are based on
their Hyperledger product, a private blockchain developed and typically hosted by IBM -
a third party to the application. In the case of Maersk Tradelens, a product that had
some success through being forced onto Maersk’s customers, all interaction with the
blockchain requires an IBM.com account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wikipedia&lt;/strong&gt;’s &lt;a href=&quot;https://en.wikipedia.org/wiki/Self-sovereign_identity#cite_ref-eublockchainforum_7-0&quot;&gt;Self-Sovereign Identity article&lt;/a&gt;
states that SSI is “verified using public-key cryptography anchored on a distributed
ledger.”, but the term “anchored” is never defined.&lt;/p&gt;

&lt;p&gt;The source for that statement is a &lt;a href=&quot;https://www.eublockchainforum.eu/sites/default/files/report_identity_v0.9.4.pdf&quot;&gt;document&lt;/a&gt; titled
“&lt;strong&gt;Blockchain and Identity” from the EU Blockchain Observatory&lt;/strong&gt;. The word “anchored”
does not appear in it. Despite the title, this 27-page document discusses the
“Blockchain” aspect on less than 1 ½ pages, in which they merely hint at possible
options - with plenty “can”, “could”, “might”. Eventually, they identify ‘timestamped
data for eIDAS [the EUs digital identity system]‘ as the only viable use case. As
discussed above, this is infeasible in practice. They also mention plenty of problems
around GDPR, and that they really don’t know whether digital signatures on a DLT hold
any legal weight in the EU.&lt;/p&gt;

&lt;p&gt;The &lt;a href=&quot;https://www.forbes.com/sites/alastairjohnson/2021/11/15/beyond-the-device-with-self-sovereign-identities/?sh=202f6f22683f&quot;&gt;&lt;strong&gt;Forbes article&lt;/strong&gt; mentioned earlier&lt;/a&gt;
claims that with DID, “In the future [online shopping] deliveries could be made to the
person, wherever they may be at that time, rather than just relying on a home or office
address.”. I was not aware that this was a problem of presenting an ID. According to
that article, DIDs are “biometrically secure” (the author does not provide a reference
for that claim).&lt;/p&gt;

&lt;h3 id=&quot;in-academia&quot;&gt;In Academia&lt;/h3&gt;

&lt;p&gt;I went through the first 5 results on Google Scholar for the search query
&lt;a href=&quot;https://scholar.google.com/scholar?hl=en&amp;amp;as_sdt=0%2C33&amp;amp;q=self+sovereign+identity+blockchain&amp;amp;btnG=&quot;&gt;“self-sorvereign identity blockchain”&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The Title &lt;strong&gt;&lt;a href=&quot;https://arxiv.org/pdf/1904.12816.pdf&quot;&gt;Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology&lt;/a&gt;&lt;/strong&gt; certainly sounds promising, but unfortunately, 
the abstract already lowers ones expectations:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;We conclude that blockchain technology is not explicitly required for a Self-Sovereign
Identity solution but it is a good foundation to build up on, due to various technical
advantages that the blockchain has to offer.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The paper does not substantiate that claim - all they do is compare 9 Blockchain-based
solutions with 2 non-Blockchain-based solutions.&lt;/p&gt;

&lt;p&gt;The paper states that they only focus on self-sovereign identity, and have thus
excluded some identity solutions, and then find that almost all the remaining
ones use blockchain technology! How very convenient, even more convenient that
they left out OpenID or PGP/GPG, arguably two large
non-blockchain players in (or close) to the DID space.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Still&lt;/em&gt; they can’t seem to manage to create a convincing argument, resorting to
statements like “Still it is more difficult to prove that there are no hidden
algorithms when not using blockchain. So blockchain is definitely a better base
for this property.“ In another spot they casually
mention&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;“However, if a private key is lost it will be difficult to change or remove the
data.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;- likely illegal under GDPR (because the existence of data that a private-key can
change or delete implies that there is identifiable data on the blockchain - &lt;a href=&quot;&amp;lt;https://www.europarl.europa.eu/RegData/etudes/STUD/2019/634445/EPRS_STU(2019)634445_EN.pdf&amp;gt;&quot;&gt;even
public keys could be PII under GDPR&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;In the parts of their comparison where the assumed blockchain solution is not in direct
violation of privacy laws, they helpfully point out that either DLT or non-DLT would get
the job done.&lt;/p&gt;

&lt;p&gt;The big reference in the Wikipedia article is “&lt;strong&gt;&lt;a href=&quot;https://ieeexplore.ieee.org/document/8776589&quot;&gt;In Search of Self-Sovereign Identity
Leveraging Blockchain Technology&lt;/a&gt;&lt;/strong&gt;”. Of
its 21 pages, only 3 are actually dedicated to Blockchain, half of which defines
terminology, the other half briefly presents 4 projects that they identify serious
shortcomings with - but they claim *might *work in the future. They briefly sketch a
few use-cases, noting that all of them would work without blockchain too, and conclude
with “[…] In fact, there have been a few attempts in the form of different
blockchain-based self-sovereign identity systems. However, as per our analysis, none of
them satisfies all the properties of a self-sovereign identity system. […]”.&lt;/p&gt;

&lt;p&gt;In the paper &lt;strong&gt;&lt;a href=&quot;https://arxiv.org/pdf/1807.06346.pdf&quot;&gt;A Survey on Essential Components of a Self-Sovereign Identity&lt;/a&gt;&lt;/strong&gt;, Section II, they claim that the Blockchain
takes the place of “the registrar in a classic DID system”, without explaining what
their job actually is. The key points though are&lt;/p&gt;

&lt;p&gt;&lt;em&gt;In order to accept the identity, the relying party needs to have a trustful
relationship with the claim issuer.&lt;/em&gt; and &lt;em&gt;The actual identity claim is stored in the
user controlled storage, typically off-chain for privacy considerations. The relying
party, also called claim-verifier, can then compare the publicely [sic] available
identifier with the identifier in the claim that has been handed to him by the user.&lt;/em&gt;
This makes zero sense at all. The user hands the &lt;em&gt;claim-verifer&lt;/em&gt; the claim, the claim is
signed by the issuer, the claim-verifier has a trusting relationship with the issuer.
We’re done! There is no added benefit to comparing the ID to &lt;em&gt;a database that anyone can
write to&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://arxiv.org/pdf/1806.01926.pdf&quot;&gt;Deployment of a Blockchain-Based Self-Sovereign Identity&lt;/a&gt;&lt;/strong&gt; is actually reasonably well readable. They
sketch some parts of how an on-blockchain system would work, a bit more in-depth than
other papers, but at the expense of completely ignoring any privacy concerns - while
they do come up with a sketch for (but not an actual description) of a zero-knowledge
system to ~encrypt the claims, they fail to describe how the other claimed benefit, the
audit log, would work with this: You can either publicly audit claims, or you can have
privacy. Not both. The paper ignores this.&lt;/p&gt;

&lt;p&gt;They do repeat frequently that the user has to be in “control” over what’s on the
blockchain, but this can never be fully true - a blockchain is a one-way street, once
published, you can’t “control” the data back out of it. They seem to be implying that a
“personalized Blockchain” is required, a parallel blockchain akin to a branch in IOTAs
Tangle (but neither would the desired level of control be available in the IOTA system, 
nor has IOTA ever created even a working (decentralized) prototype, also apparently IOTA
is still a thing in 2022 lol).&lt;/p&gt;

&lt;p&gt;They did, however, solve how to identify terrorists at the airport: You just need to write
“Not a terrorist” on the Blockchain!&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Lastly, in the worst case, some claims may require
  real-time proof of correctness (not being a terrorist when checking in to the airport).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The paper actually points out that a lot of this stuff would work without blockchain, 
too:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;The claims do not require any blockchain to be evaluated and may be shared with other platforms.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;They never actually specify why it is worth going through all that trouble with
Blockchain. Instead, they refer to another paper:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;The concept of using blockchains as vessels for identity has been explained by Zyskind et al. [5]&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;That paper, &lt;strong&gt;&lt;a href=&quot;https://ieeexplore.ieee.org/document/7163223&quot;&gt;Decentralizing Privacy: Using Blockchain to Protect Personal Data&lt;/a&gt;&lt;/strong&gt;, unsurprisingly, also fails to make an
argument how blockchain is any better - as with all the papers above, it merely
describes complexity that would need to be added to make something work at all:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;One of the
  major contributions of this paper is demonstrating how to overcome the public nature of
  the blockchain.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The only explanation of benefits is a vague “&lt;em&gt;Given this model, only the user has
control over her data&lt;/em&gt;.” - based on ownership of the encryption key, orthogonal to the
blockchain; and that an adversary cannot “corrupt the network”. Unfortunately, in the
very next paragraph point out that adversaries &lt;em&gt;can&lt;/em&gt; actually corrupt data, unless it is
sufficiently replicated:&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Note that while data integrity is not ensured in each node, 
  since a single node can tamper with its local copy or act in a byzantine way, we can
  still in practice minimize the risk with sufficient distribution and replication of the
  data.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This is unfortunately as far as that section goes.&lt;/p&gt;

&lt;p&gt;Finally, &lt;strong&gt;Towards Self-Sovereign Identity using Blockchain Technology&lt;/strong&gt; looks like a
Bachelor or Master thesis, and I’m not in the mood of trash-talking someone’s thesis.
TL; DR is that It falls into the same traps as discussed above, although it looks a bit
nicer.&lt;/p&gt;

&lt;h3 id=&quot;real-world-implementations&quot;&gt;Real-World implementations?&lt;/h3&gt;

&lt;p&gt;The article &lt;strong&gt;&lt;a href=&quot;https://ieeexplore.ieee.org/document/8776589&quot;&gt;In Search of Self-Sovereign Identity Leveraging Blockchain Technology&lt;/a&gt;&lt;/strong&gt; was from June 2019, so what happened to
the 4 projects they mentioned?&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://www.uport.me/&quot;&gt;Uport&lt;/a&gt;&lt;/strong&gt; has shut down. It split into &lt;strong&gt;&lt;a href=&quot;https://www.serto.id/&quot;&gt;serto.id&lt;/a&gt;&lt;/strong&gt;, which seems dead, as their twitter feed and blog stop in Oct
‘21 - and &lt;strong&gt;&lt;a href=&quot;https://veramo.io/&quot;&gt;veramo.io&lt;/a&gt;&lt;/strong&gt;, which pivoted to “A JavaScript
framework for verifiable data”, and seems to have completely dropped anything
“blockchain/DLT” - &lt;a href=&quot;https://www.google.com/search?q=site%3Averamo.io+dlt+OR+blockchain&amp;amp;oq=site%3A&amp;amp;aqs=chrome.0.69i59l3j69i57j69i59j69i58j69i65.2539j0j7&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8&quot;&gt;a google search&lt;/a&gt;
only shows 3 pages on their site that mention those terms, all in passing.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;&lt;a href=&quot;https://jolocom.io/&quot;&gt;Jolo&lt;/a&gt;&lt;/strong&gt;, who’s homepage now prominently features a &lt;a href=&quot;https://jolocom.io/blog/dezentrale-identitaten-not-blockchain-2/&quot;&gt;blog
post&lt;/a&gt; titled “Self
Sovereign Identity ≠ Blockchain”, containing “In the past two years, the SSI community
has emancipated itself from Blockchain technology” and “Why you do not need a
Blockchain for Self Sovereign Identities.”.&lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Blockcert&lt;/strong&gt; seemed to have stopped their core work in 2017 - which is the date of
the most recent blog post and most of the documentation - and their main product seems
to not have left prototype phase: it hardcodes the wallet password to &lt;a href=&quot;https://github.com/blockchain-certificates/wallet-android/blob/b225260adb18ce204c75b35e61651cb7ba5b9abe/LearningMachine/app/src/main/java/com/learningmachine/android/app/LMConstants.java#L9&quot;&gt;&amp;lt;empty&amp;gt;&lt;/a&gt;
and seems to skip quite a few certificate verification steps &lt;a href=&quot;https://github.com/blockchain-certificates/wallet-android/blob/b225260adb18ce204c75b35e61651cb7ba5b9abe/LearningMachine/app/src/main/java/com/learningmachine/android/app/LMConstants.java#L20&quot;&gt;[1]&lt;/a&gt;, 
&lt;a href=&quot;https://github.com/blockchain-certificates/wallet-android/blob/b225260adb18ce204c75b35e61651cb7ba5b9abe/LearningMachine/app/src/main/java/com/learningmachine/android/app/data/CertificateManager.java#L110-L120&quot;&gt;[2]&lt;/a&gt;
(!!).&lt;/p&gt;

    &lt;p&gt;The &lt;a href=&quot;https://www.blockcerts.org/guide/faq.html&quot;&gt;FAQ&lt;/a&gt;, under the section ”Why use
a blockchain instead of a PKI infrastructure?” claims that the blockchain provides
tamper-proofs (in the presence of a trusted issuer key/identity, a problem &lt;a href=&quot;https://en.wikipedia.org/wiki/RSA_(cryptosystem)&quot;&gt;solved
since 1977&lt;/a&gt;). They do use the
trusted timestamp argument, with a PoW chain, claiming that this avoids a trusted
third party. According to their code they depend on the third parties
&lt;a href=&quot;https://github.com/blockchain-certificates/wallet-android/blob/b225260adb18ce204c75b35e61651cb7ba5b9abe/LearningMachine/app/src/main/java/com/learningmachine/android/app/LMConstants.java#L12-L16&quot;&gt;blockchain.info, learningmachines.com and their own blockcerts.org website&lt;/a&gt;, 
the trust model for those is not discussed. Neither is discussed how trust with the
certificate issuer is established. The FAQ refers to the wiki for further information, 
&lt;a href=&quot;https://github.com/blockchain-certificates/cert-schema/wiki/&quot;&gt;which is empty&lt;/a&gt;.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Sovrin&lt;/strong&gt;, which is likely the biggest player in the space. Their paper “&lt;a href=&quot;https://sovrin.org/wp-content/uploads/2018/10/What-Goes-On-The-Ledger.pdf&quot;&gt;What goes
on the ledger&lt;/a&gt;” explicitly
states that ordinary users would never store identifiers on the DLT - in fact, only
larger entities, such as governments or corporations, would write their “public DIDs”
to the Blockchain. Ordinary people would keep their “private DIDs” to themselves, 
those work just fine without blockchain. But Sovrin doesn’t explain what the public
DIDs gain from being on the blockchain. Also, the security of the current internet
already has a very similar model of ~150 public government &amp;amp; corporate “Root CAs” -
Sovrin doesn’t explain how their approach is fundamentally better (or even different, 
apart from “blockchain!”).&lt;/p&gt;

    &lt;p&gt;The &lt;a href=&quot;https://www.evernym.com/case-studies-travelpass/&quot;&gt;architecture diagram and website&lt;/a&gt;for their (only?) real-world
implementation, IATA Travel Pass, does not mention anything blockchain related. I
reached out to them and asked whether they used blockchain at all; they confirmed that
they &lt;em&gt;do&lt;/em&gt; use hyperledger (a permissioned blockchain only &lt;em&gt;they&lt;/em&gt; can write to), but
that IATA, the main stakeholder, also keeps their own, separate list of trusted
certificates - making it fundamentally unclear why Sovrin even bothers running their
blockchain instance.&lt;/p&gt;

    &lt;p&gt;They also confirmed that Sovrin is moving away from a pure
blockchain focus for their products.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Additionally, the “Necessity of Blockchain Technology” article mentioned&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://www.chainzy.com/products/idchainz/&quot;&gt;&lt;strong&gt;IDChainZ&lt;/strong&gt;&lt;/a&gt; - at the time of writing, the
images on the website don’t load, making it hard to evaluate the architecture. The
“Download or Brochure” link 404s.&lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;https://everidapp.com/&quot;&gt;&lt;strong&gt;EverID&lt;/strong&gt;&lt;/a&gt; - all their social media went dead in April ‘21.&lt;/li&gt;
  &lt;li&gt;LifeID, which is &lt;a href=&quot;https://mirror.xyz/boscolo.eth/IihrrsuG92dqoKlL6uCaAcepGORxOjtT8TK5SH8Zmkw&quot;&gt;dead, because the author pivoted&lt;/a&gt; to a
&lt;a href=&quot;https://www.enum.wtf/&quot;&gt;phone number-as-NFT&lt;/a&gt; project.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;ShoCard&lt;/strong&gt;, &lt;a href=&quot;https://www.techtarget.com/searchsecurity/news/252490177/Ping-acquires-blockchain-identity-startup-ShoCard&quot;&gt;acquired&lt;/a&gt;
by a company called Ping Identity in 2020. There is no indication that Ping’s PingOne
Cloud Platform has anything to do with Blockchain.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;SelfKey&lt;/strong&gt;, whose &lt;a href=&quot;https://selfkey.org/&quot;&gt;website&lt;/a&gt; and &lt;a href=&quot;https://twitter.com/selfkey&quot;&gt;Twitter&lt;/a&gt; just screams “2017 ICO scam”. That being said though, in
their &lt;a href=&quot;https://selfkey.org/wp-content/uploads/2019/03/selfkey-whitepaper-en.pdf&quot;&gt;whitepaper&lt;/a&gt;, they seem
almost excited about how they don’t use any DLT for SSI either, and somewhat argue
that they shouldn’t. Their blockchain is only used to pay for attestations (i.e., pay
a utility company to sign your credentials using their blockchain-based token).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It cannot be stressed enough that the only known wide-scale deployments of
anything related to W3C’s DID concept are the QR-code-on-paper based EU
vaccination certificate, and India’s equivalent “DIVOC” passport.
The fact that EBSI &amp;amp; co. are waving around DID as a means to get grants, in 2022 (most
of the projects above died years ago, the papers were mostly writen in ‘18/’19) is
saddening.&lt;/p&gt;

&lt;h2 id=&quot;parting-words&quot;&gt;Parting Words&lt;/h2&gt;

&lt;p&gt;A lot of Blockchain + SSI projects start with the goal “take the power back”. This is,
at it’s core, a noble goal. But instead of solving the hard problems, like&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;how to do ID recovery,&lt;/li&gt;
  &lt;li&gt;how to ensure privacy and metadata resistance,&lt;/li&gt;
  &lt;li&gt;how to deal with identity theft,&lt;/li&gt;
  &lt;li&gt;how to ensure decentralization &lt;em&gt;and&lt;/em&gt; interoperability,&lt;/li&gt;
  &lt;li&gt;how to make SSI work for tech-illiterate people&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;they instead burned all the funding on trying - unsuccessfully - to make
Blockchain as useful as a piece of paper.
Imagine how much further we would be in Digital Identity today, if a huge chunk of the
funding would not have been burned on a fundamentally incompatible technology.&lt;/p&gt;

&lt;p&gt;Blockchain adds a serious amount of complexity, drawbacks &amp;amp; costs to something that can
&lt;em&gt;demonstrably be done&lt;/em&gt; without. This is an “the emperor has no clothes” situation - many
people have heavily invested in this. Nobody wants to admit they’re wrong. But the
reality is: A QR code is the superior tech.&lt;/p&gt;
&lt;div class=&quot;footnotes&quot; role=&quot;doc-endnotes&quot;&gt;
  &lt;ol&gt;
    &lt;li id=&quot;fn:spv&quot; role=&quot;doc-endnote&quot;&gt;
      &lt;p&gt;This could partially be mitigated using SPV-style verification, but this requires&lt;/p&gt;
      &lt;ul&gt;
        &lt;li&gt;a PoW chain with reasonably high difficulty - unlikely for any practical application, &lt;strong&gt;and&lt;/strong&gt;&lt;/li&gt;
        &lt;li&gt;that the end-device is capable of tracking at least the block headers. Technically feasible for chains with long block intervals (e.g. Bitcoin) but still somewhat resource intensive).&lt;/li&gt;
      &lt;/ul&gt;

      &lt;p&gt;Hardly a good selling point. &lt;a href=&quot;#fnref:spv&quot; class=&quot;reversefootnote&quot; role=&quot;doc-backlink&quot;&gt;&amp;#8617;&lt;/a&gt;&lt;/p&gt;
    &lt;/li&gt;
  &lt;/ol&gt;
&lt;/div&gt;</content><author><name></name></author><category term="blockchain" /><summary type="html">Summary / TLDR: Blockchain (or “DLT”) adds no functionality to a SSI/Identity system that is not equally well, if not better, provided by a QR code on paper. None of the benefits Blockchain is supposed to bring hold up under mild scrutiny. Blockchain adds significant complexity and cost, as well as usability issues and serious privacy concerns. “Blockchain” in SSI exists for PR only, not for engineering reasons.</summary></entry></feed>