LYNX
  • Our Manifesto
  • About
    • Team
    • Contribute
  • Further Information
    • FAQs
      • Technical FAQs
    • Glossary
    • User Research
    • Further Reading
    • Historic Links
Powered by GitBook
On this page
  • Q. How is this solution using blockchain / distributed ledger technologies (DLT)?
  • Q. Where will the analysis happen?
  • Q. How do users maintain data ownership?
  • Q. Are blockchain technologies bad for the environment?
  1. Further Information
  2. FAQs

Technical FAQs

PreviousFAQsNextGlossary

Last updated 3 years ago

Q. How is this solution using blockchain / distributed ledger technologies (DLT)?

Blockchain and distributed ledger technology enables the construction of a secure and privacy-preserving data infrastructure. Our solution provides personal data security and privacy using the basics of blockchain - - whilst enabling the data to be analysed - using - and therefore useful to the user.

Q. Where will the analysis happen?

Q. How do users maintain data ownership?

Q. Are blockchain technologies bad for the environment?

Furthermore, other technologies such as the IOTA’s Tangle, a directed acyclic graph, ensure every participant is contributing to the validation process of the transactions, so that consensus is reached without the need for dedicated miners. Since this validation does not require any heavy computations, the network can be maintained by relatively small devices, with limited power and calculation capacity.

A compute-to-data model provides a means to exchange data while preserving data privacy by allowing data consumers to run compute jobs on the data (which can be stored on local servers, on existing cloud providers, or on a decentralised file system such as ) to train AI models. Rather than having the data sent to where the algorithm runs, the algorithm runs where the data is.

In traditional IT environments, personal data is stored and managed by organisations in such a way that individuals have no ability to control it. However, using distributed ledger technologies (such as blockchain), users own their data and this is referenced by a , which can only be accessed by the owner's .

The used in blockchain is more energy-intensive than current centralised data storage solutions. The proof-of-work mechanism (used to verify each Bitcoin transaction) is the most energy-intensive consensus mechanism as miners compete against each other with computing power to mine a block.

Other consensus mechanisms exist, for example, proof-of-stake or proof-of-authority, which use a fraction of this energy (~99.95% less). Instead of all nodes competing to mine each block, a miner (or group of miners) are chosen at random to resolve each block. Ethereum is moving towards a proof-of-stake mechanism, whilst Layer 2 solutions such as are already using proof-of-stake.

IPFS
Polygon
data token
private keys
consensus mechanism
public key cryptography
compute-to-data