 Good morning, everyone welcome to the lightning talks I think that you all already know from yesterday how this one works We have 15 minutes of talk five minutes of change to the next speaker and This morning we are going to start with Martin bear and let's fix the internet Hello. Good morning I'm gonna jump right into it. So we don't lose too much time Um quickly you all know how the internet was developed and Basically, it was built on on trust. It was assumed that Every computer on the network is safe and is trusted and we know who the administrators are and there are no bad people on the internet and so the Protocols that were developed were basically developed With that trust in mind and it was assumed that if you send an email you can trust that email if you Send any kind of message or can any packet? They're all safe and don't do bad things and As a result now we have to deal with spam The Nile of service attacks. We have problems with cookies. They're being abused They're so bad that the European Union made laws to protect the General public or warn the general public about how bad cookies are To try to protect them we should have done much better than that IoT made things even worse Most IoT devices are hopelessly insecure Can be easily hacked and can be abused for whatever and really if we want to have Secure IoT devices. We need to block them from being able to access the internet That's really the only way to to make them secure Is anyone here not familiar with the OC model of Networking just briefly the bottom two layers are hardware Network layer and transport layer are mostly in the kernel and then the other layers Transport layer session layer presentation layer application layer are all somewhere in the application. So basically any application that you're running on your computer that wants to do things on the network is Working on these three to four layers at the top and So they any application can do their own network connections and most importantly Every application is responsible for their own end user identification Emails again is a good example Mail servers don't identify Who is sending or receiving emails only your male client is Trying to identify that and email addresses are not Trustable because they can be faked and If you sign emails if you have signed emails then your male client can verify that this email is actually genuine But the mail server and any intermediary cannot do anything And so basically they have to allow every message through Because they don't know whether it's genuine or fake and only the recipient can Really 100% sure Decide whether this email is genuine or not. I mean there are Guesses about how to detect spam, but these are guesses and sometimes those guesses are wrong. The only person is really sure is the recipient So how do we get out of this mess The idea is we put user identification first We create an operating system that allows apps to To be built on a user's first Part of the given as far as communication is concerned so that the applications Don't open their own internet connections, but let the OS deal with that So this is where elastos comes in so elastos is an operating system that Attempts to address this problem It's a complete set of cc++ APIs and frameworks They even rewrote the complete Android framework and runtime in c++ so that you can run build applications in c++ in Java or in any scripting language and Then take advantage of the features that the operating system provides. It's a distributed OS runtime with end-to-end security across a peer-to-peer network and It's built for containers and virtual machines and it's using blockchain For authentication So let me explain how that is supposed to work. So basically the idea is That the operating system is taking over the transport session and presentation layers and It's taking over user identification so instead of a Program like a mail client opening up an SMTP connection To another mail server the client will ask the operating system and say I want to send a message to a person which is identified by some Key and then the operating system will go out and try to find this person using the peer-to-peer network and then once it found it it will On the recipient side will ask for permission that there is this identity here who wants to send a message To that other identity and then the recipient needs to first acknowledge that they want to have a connection with this sender and Only after this Authorization happened the mail client is actually allowed to send their message They will be given a socket of some kind and I say okay here now we've established a connection and here You can send your message through So basically user identification is handled at the operating system level and then all applications can take advantage of it and The applications themselves can no longer Connect to the network on their own basically they have to ask the operating system for permission and that way we essentially Solve the the problems that we've been seeing because we're preventing apps from making their own network connections and so we prevent spam does attacks worms viruses and What have you A little bit about the the history Of this project this project started in the year 2000 in China To build a smartphone operating system and then it was eventually Outpaced and overrun by Android and iOS. So they didn't get finished in time or it didn't get weren't able to attract any any Clients of customers for to use it and they restarted in 2012 with focus on IOT At that time they received 30 million dollars of funding by Foxconn and Foxconn wanted to build an operating system for themselves for mobile phones for IOT devices and They managed to get something done. We got my last is running on on a phone On some of these devices I mean basically in beta state It's technically working, but of course Still more testing needs to be done to to make it workable for for the end user Then last year We started to Add the blockchain to the platform. So the idea here is that a blockchain is a potential solution for the Identify and if identification of of users in the system So we put IDs for people on also for applications And for data onto the blockchain so that we can verify that when you're running an application That is the same application that you've been running before or that somebody else is running That when you are getting a message from an ID then you can verify that It is the same ID every time Technically it doesn't have to be blockchain to solve this problem, but this is the chosen solution at this point and so It enabled Bitcoin investors to fund the project and received a few million dollars out of that and So that's what we're working on now. The runtime is are essentially finished and Now where we've implemented a blockchain layer in this coming two months, we're working on the peer-to-peer networking layer and We will work on the on the runtime to Sometime in summer. I hope that we will be ready for developers to start Developing applications on the platform and of course, we're also always ready For contributors to work on the operating system itself Yes, and okay, I'm pretty much done I have a few references that You can look up when you when you download the PDF later Are there any questions Yes, how to be anonymous in the system. It's a very interesting question. So this question has been come up in previous talks How does an identity get onto the onto the blockchain? That basically hasn't been worked out yet. So we're still figuring out how to actually Get this thing system started My personal idea is that there's post probably different ways how you get an ID and in the end effect Even an ID on the blockchain is just some cryptographic key and so as long as no Person itself is attached to that key. You are anonymous You see similar things with I think in free net in other systems where your computer will just generate a key But nobody knows who the person is that is actually connected to that key. So you are Essentially anonymous. So the the question of how to be anonymous is really how You get that identity and if nobody verifies your passport With that identity, then you're essentially anonymous and if you don't put any personally identifying information Into that identity then you're staying anonymous, but Once you have established connection Communication with somebody you can always Verify that the next message is coming from that same anonymous identity. Yes Okay, I said I can block out a spam and attacks and you're asking about other things to block out what Well, the side effect is that you can essentially No longer broadcast Stuff easily They're supposed to be a way to build Websites or something like personal pages into the system. I don't know how that's going to work I think what's gonna what's gonna happen is that the recipients The readers of that site Will have to make a request to read the site and other and then allow the the site to Send messages to your computer But This isn't hasn't been worked out yet So I don't know if there are any other side effects that we haven't considered yet Yes, okay Yes, the system is closed and the way you Integrate is by installing it onto our computer where you still have other stuff running So I mean it can run as a standalone operating system But we are also building it as an as an application that you can install into your mobile phone And then you run it so you have like a sandbox You have a container and where this thing is running and then you have other containers Or you have the other the rest of the operating system where you still have your old stuff And my hope is or the hope is that eventually you are gonna be used the other stuff less and less and less And then everybody has this thing installed and then it's it's quasi-native and then eventually It is Really native Okay, we're time is ending. I just want to point out if anybody is interested in blockchain projects we have a blockchain a buff at two o'clock and I'm hosting or we are hosting a blockchain deaf room at the Hong Kong open-source conference And we're interested in getting projects to present there and Lastly this is about me You can hire me for development community consulting CTO services and web development. Thank you