3. 9.30 Welcome on behalf of all challenge-owners (KVK)
9.45 The Odyssey Hackathon â What can you achieve by
participating? (Rutger van Zuidam â CEO of DutchChain &
Odyssey)
10.00 Developments in Blockchain, exchanging privacy-
sensitive information and the future of a national digital
infrastructure (Zeki Erkin, Assistant Professor in Cyber
Security and Privacy at Delft University of Technology)
10.30 Challenge 1 by the Dutch Ministry of Justice and
Security â Presentation and Q&A: a Government Backed
Protocol for Digital Permissions (Flores Bakker â Enterprise
Architect for the Ministry of Finance)
Program Overview
4. 11.15 Extra support of IOTA for Challenge 1 (Dave de Fijter,
IOTA Foundation)
11.30 Coffee Break and Early Lunch
12.00 Challenge 2 by Dutch Chamber of Commerce â
Becoming an oracle in the Digital Infrastructure of a Nation
(Geerten Verweij, developer of the Dutch Chamber of
Commerceâs Innovation Lab)
12.40 Challenge 3 by Kadaster â Building a Distributed Data
Ecosystem (Nick Apeldoorn, ICT Architect at Kadaster)
13.30 End of plenary program â Ample time to Connect
7. Rutger Van Zuidam
CEO of DutchChain & Odyssey
THE ODYSSEY HACKATHON
What can you achieve by
participating?
8.
9.
10.
11.
12. We believeâŠ.
technology like blockchain, crypto currencies, AI, IOT,
open digital public infrastructure and the digital commons can
unlock completely new ways of interconnected mass
collaboration
to establish the breakthrough progress we need in all fields of
our society and all sectors of our economy.
22. Zeki Erkin
Delft University of Technology
Developments in Blockchain
Exchanging privacy-sensitive information and the
future of a national digital infrastructure
23.
24. Flores Bakker
Enterprise Architect for the
Ministry of Finance
Challenge 1 by the Dutch Ministry of
Justice and Security
Presentation and Q&A: A Government
Backed Protocol for Digital Permissions
25. Challenge:
Protocol for
approval
management
How to register and
communicate digital
permissions on a global scale
Flores Bakker
Enterprise Architect Ministry of Finance in cooperation
with the Ministry of Justice and Security
27. Approval and consent
âș We approve and consent every
day in some form or way;
âș We approve an action to be taken
or we consent with the status of
an entity (thing, process);
âș We approve as business co-
worker, civil servant, civilian or
other;
âș We approve and consent
increasingly through digital
means;
27
29. Cookie requests
29
âș More and more companies are
tracking individual persons
âș More and more information is
being sold to third parties
âș Approval is asked...
âș ...but where is my âred buttonâ
in case I want to retract my
given approval?
âș Do I really know and control
which parties are using my
personal information and in what
way?
? ?
30. More examples
âș Consent requests for the use of your
personal or your companyâs
information by other parties
âș Approval requests for copyright
licenses
âș Approval requests for budgetting and
purchasing within an organisation
âș Consent requests for the accurate
representation of a witness account
âș Consent requests with the status of an
item of property or work (inspection)
âș ...and many more
30
31. Why do we approve?
âș We approve and consent because we
have the legal power to do so;
âș We approve and consent because
there are legal consequences in
some form or way for us or the
organisations on behalf of whom we
are approving or consenting;
31
32. The power to consent
âș The power to consent is actually
the power to change a legal
relationship
âș Based upon the framework of
fundamental legal concepts by
Hohfeld (1918)
âș Approving or consenting leads to
a change in the legal position
of a stakeholder, resulting in
more or less rights and duties
for the stakeholder in question.
32
33. Theory: rational decision making
âș Approving is a form of decision making;
âș Decision Making Theory identifies seven
phases in the rational decision making
model;
âș Now we can define what is true informed
consent:
â Clear context
â Clear consequences
â Clear risks
âș Approving needs trust in the accuracy,
completeness and up-to-date presentation
of this information position. 33
34. Reality: intuitive decision making
âș In reality we are not always that
rational;
âș Intuitive decision making is often
the way decisions are made in real
life, based on cues, patterns and
action scripts;
âș Intuitive decision making needs
trust in the strength of those cues,
patterns and action scripts;
âș Intuitive decision making should not
be denied as it is human to do so.
The solution lies in combining it with
rational decision making. 34
35. Trust is an important aspect of consent
âș Trust is built upon:
â Fully Informed Consent
â Non-repudiation (authenticity, integrity)
â Uniformity
â Compliancy
â Agility
â Adequate infrastructure
â Resiliency
â Strong cues, patterns, action scripts
â User friendliness
35
36. The challenge
âș Develop an open source, decentralized
and government backed protocol for
registering and communicating digital
permissions;
âș Re-usable for any type of stakeholder,
approval process and application;
âș High trust;
âș For civilian, governmental and
commercial use.
36
37. Properties of the solution
âș Supports non-repudiation (authenticity and
integrity) and other trust aspects;
âș Supports fully informed consent (context,
consequences and risks) but also strong cues and
patterns;
âș Registers exact information position upon which
a stakeholder will give his response;
âș Uniform protocol across the globe;
âș Evolvability â future changes to the protocol
(new laws, new processses, etcetera) should be
implemented easy and without the possibility of
corrupting older approval transactions;
âș Open Source.
37
38. Innovation â think outside the box
âș Standardised contract terms across the globe?
âș Contract terms satisfaction/reputation score?
âș Anonymous statistics in how other users have
responded in similar cases?
âș What is the role of incentives and tokenization? I.e.
artificial intelligence or third party experts explaining me
the contract terms, risks and consequences of approval in
laymanâs terms?
âș What is the role of gamification?
âș Self-sovereign: my wallet of consent?
âș Taxonomy for approval contracts? The use of Linked
data?
âș Paving the way for automated decision making?
âș Dare to experiment!
38
39. DigiAkkoord â approval application
39
Innovation project
âDigiAkkoordâ at department
of Justice and Security,
release somewhere in 2019;
Focuses on a re-usable
application for all approval
processes within the
government;
DigiAkkoord is not really a
protocol but a business
building block;
Challenge has more global
perspective and more
emphasis on protocol
development compared to
DigiAkkoord;
49. Donations of
$100M+ to date
Hubs in Berlin, Tel Aviv,
Oslo, Taipei
More than 80 employees
around the globe
Ecosystem of more
than 100 entities
> 70k active
community members
> 120k content followers
Ecosystem Development Fund
$13M+ in funding
nearly $100k awarded to date
A global Foundation, based in Berlin
51. Why IOTA?
- Scalable
- No fees, no hassle
- Data transactions supported
- Lightweight
- Open source and permissionless
- Quantum immune, ready for the future
52. IOTA Networks
Due to the nature of IOTA, you are able to send
transactions on the Mainnet without fees. This lets
you publish transactions with data directly on the
Mainnet for no cost.
However, it is best to use the Devnet to build Proof
of Concept applications. This network is run by the
IOTA Foundation for developer to use and test on as
they please. We also have a Faucet which dispenses
tokens for use on the Devnet.
We also have a Spamnet for testing the protocols
resilience to high TPS.
The configuration of the `Devnet`
54. Masked Authenticated
Messaging (MAM)
â Secure message streams over the tangle
â Feeless messages
â Currently Javascript/Typescript only
â New C-based implementation in the works
â Both public and private messages possible
#mam
55. ??? ???????? ????
????
????????????
2nd Layer libraries like MAM do not require protocol
changes or hardforks, they can be built and
supported by anyone to ensure that IOTA fits their
needs.
????????
? ???
57. Relevant projects done with IOTA
â TangleID project (https://tangleid.github.io)
â Digital identity Proof of concept by VX Company
#development
58. What will the IOTA Foundation provide
We will be there with 2 coaches (Jediâs) to support
teams working with IOTA
Content packages and support for teams will be
available before and during the hackathon
We will publicly communicate about the event and
the participating projects before, during and after
the hackathon
#odyssey-hackathon on Discord
#odyssey-hackathon
65. Geerten Verweij
Dutch Chamber of Commerceâs Innovation
Lab
Challenge 2 by Dutch Chamber of
Commerce
Becoming an oracle in the Digital
Infrastructure of a Nation
67. What is the Dutch Chamber
of Commerce all about?
68. Our Mission
âą Making live easier for
entrepreneurs
âą Provide useful information
âą Provide useful data
69. Our Actions
âą Registering businesses in the
trade register
âą Providing information from the
trade register
âą Being a guide and advisor for
entrepreneurs
70. Trade Register
âą Registering your business
Become legit
âą Look up other businesses
See if they are legit
âą Create trust and certainty
We are both legit, letâs do business!
71. Our crown jewel
âą A piece of paper, possibly in PDF
âą Used a lot by all entrepreneurs
and businesses in the Netherlands
âą Might not be high-tech
by todayâs standards
79. Digital Identity
âą Protect your personal identity by using
your business identity through the KVK
âą The KVK is the Oracle for business
entities
âą Next step: integrating these concepts
into the Digital Nations Infrastructure..
Trusted Digital
Business Identity
80. Digital Identity
How do we challenge you?
Build innovative solutions that help
entrepreneurs be in control of their identity.
Or even better: help entrepreneurs succeed
in conducting business using their online
identity using these experimental new
features.
81. For example: Flash Company
âą Smart contract
âą One-off collaboration
âą Backed by KVK verified
business identity
84. Datamining and AI
Existing experiments at the KVK:
âą Success Prediction
âą Fraud Detection
What else is possible?
âą Anomaly detection?
âą Clustering?
âą Surprise us!
93. Kadaster
ï§ Providing legal certainty about ownership and transactions of real estate.
ï§ Managing nationwide geographic datasets and acting as consultant.
99. Building wallet
ï§ Digitization of the built environment.
ï§ Making all information on real objects readily available for authorized persons and
machines.
ï§ Distributed data ecosystem: distributed ledger as backbone.
ï§ Validating information and the parties adding and accessing the data.
ï§ Ensuring privacy.
ï§ Solution at the protocol level.
100. Research questions
ï§ How to include existing standards, e.g. BIM?
ï§ How to tie existing solutions / applications and data sources into the ecosystem?
ï§ How to manage access to (private or commercially sensitive) data in this distributed
environment?
ï§ How to engage data owners to contribute data to the building wallet?
ï§ How to govern this public-private infrastructure in an effective and responsible way?
101. Toolkit
ï§ Open geographic datasets.
ï§ A transaction and ownership database for real estate.
ï§ The Proof of Concept built last year.
ï§ A relevant network: Kadaster, Dutch Ministery of the Interior, building companies.
102. Contact
Nick van Apeldoorn â ICT Architect
Kadaster â Emerging Technology Center
Nick.vanApeldoorn@kadaster.nl
+316 52 48 19 06
103. End of Plenary Program - Time to Connect
REGISTER TODAY AT THE ODYSSEY STAND!