<td>Users must create many username and password combinations for each service or application. Each combination must be managed and maintained. Also, each creation requires the user to provide, important or unique information into the care of a third-party.</td>
<td>Users must create many username and password combinations for each service or application. Each combination must be managed and maintained. Also, each creation requires the user to provide important or unique information into the care of a third-party.</td>
<td>Users create and own one or more identities. They use their identities with all applications and services. For example, a user could use the same identity for buying books online as they use for social media.</td>
<td>Users create and own one or more identities. They use their identities with all applications and services. For example, a user could use the same identity for buying books online as they use for social media.</td>
</tr>
</tr>
<tr>
<tr>
<td>Multiple third-party applications and services store personal data from individual users in backend servers.,These backend servers are under the control of the application or service. Users leaving the application leave their data behind.</td>
<td>Multiple third-party applications and services store personal data from individual users in backend servers.These backend servers are under the control of the application or service. Users leaving the application leave their data behind.</td>
<td>Personal information and data is encrypted and remains under the control of the user.,Users leaving an application leave no data behind because none was stored with the application.</td>
<td>Personal information and data is encrypted and remains under the control of the user.Users leaving an application leave no data behind because none was stored with the application.</td>
</tr>
</tr>
<tr>
<tr>
<td>Multiple accounts across many servers make personal data subject to attack, misuse, and uncontrolled collection.</td>
<td>Multiple accounts across many servers make personal data subject to attack, misuse, and uncontrolled collection.</td>
<td>Users can audit access to their data and know who accessed their data and which date were accessed.</td>
<td>Users can audit access to their data and know who accessed their data and which data were accessed.</td>
</tr>
</tr>
<tr>
<tr>
<td>Central authorities and middlemen control network access enabling them to censor applications and/or users that use them.</td>
<td>Central authorities and middlemen control network access enabling them to censor applications and/or users that use them.</td>
<td>Companies are developing blockchains that run over peer-to-peer networks.,These future networks can make shutting down or entirely blocking a decentralized application is close to impossible.</td>
<td>Companies are developing blockchains that run over peer-to-peer networks.These future networks can make shutting down or entirely blocking a decentralized application close to impossible.</td>
This quote from Gene Luen Yang a Genius Grant recipient and comic book artist
This quote from Gene Luen Yang, a Genius Grant recipient and comic book artist,
has a good point. Have you researched what other top industry thinkers have said about
has a good point. Have you researched what other top industry thinkers have said about
potential applications of blockchain technology? For example, EY developed a five-point
potential applications of blockchain technology? For example, EY developed a five-point
test to help determine if a blockchain solution would help for a problem:
test to help determine if a blockchain solution would help for a problem:
@ -127,7 +127,7 @@ test to help determine if a blockchain solution would help for a problem:
<p>From <ahref="http://go.galegroup.com/ps/i.do?p=AONE&u=plan_smcl&id=GALE|A547075763&v=2.1&it=r&sid=AONE&asid=f2f8ee00"target="\_blank">Maslova, Natalia. "BLOCKCHAIN: DISRUPTION AND OPPORTUNITY." Strategic Finance, July 2018</a></p>
<p>From <ahref="http://go.galegroup.com/ps/i.do?p=AONE&u=plan_smcl&id=GALE|A547075763&v=2.1&it=r&sid=AONE&asid=f2f8ee00"target="\_blank">Maslova, Natalia. "BLOCKCHAIN: DISRUPTION AND OPPORTUNITY." Strategic Finance, July 2018</a></p>
</div>
</div>
The EY test is a general test about the domains that blockchain application can disrupt. You can also consider more specific behaviors a DApp should mee. Blockstack defines three principles that Blockstack applications should meet:
The EY test is a general test about the domains that blockchain applications can disrupt. You can also consider more specific behaviors a DApp should meet. Blockstack defines three principles that Blockstack applications should meet:
* Users own their own data
* Users own their own data
* Users own their identities
* Users own their identities
@ -140,10 +140,10 @@ If you haven't read it, read the full article <a href="/develop/dapp_principles.
Before developing a DApp, research the blockchain space and engage with the Blockstack community.
Before developing a DApp, research the blockchain space and engage with the Blockstack community.
This is a valuable resource to learn about the questions that other developers have now or have had in the past.
This is a valuable resource to learn about the questions that other developers have now or have had in the past.
* Visit the <ahref="https://community.blockstack.org/"target="\_blank">Blockstack Community website</a> to learn about events that may be coming to your area.
* Visit the <ahref="https://community.blockstack.org/"target="\_blank">Blockstack Community website</a> to learn about events that may be coming to your area.
* Join the Blockstack <ahref="https://slofile.com/slack/blockstack"target="\_blank"> Slack channel</a> which you can join.
* Join the Blockstack <ahref="https://slofile.com/slack/blockstack"target="\_blank"> Slack channel</a> which you can join by filling in the following <ahref="https://docs.google.com/forms/d/e/1FAIpQLSed5Mnu0G5ZMJdWs6cTO_8sTJfUVfe1sYL6WFDcD51_XuQkZw/viewform">form</a>.
When coming up with ideas for an application, you can try some thought experiments.
When coming up with ideas for an application, you can try some thought experiments.