--- layout: learn permalink: /:collection/:path.html --- # 1 - Why Blockchain and Blockstack? {:.no_toc} **Zero to DApp, 1 of 4** Welcome to the Blockstack Zero to DApp tutorial. The Blockstack Ecosystem has a mission to bring a new internet where users control the access to, and use of, their own identity and data. This tutorial is written for developers who want to learn about how to use the Blockstack Ecosystem to develop and fund decentralized applications (DApps). The tutorial has four pages and this is first. The top of each page lists the contents. This page contains the following: * TOC {:toc} Of course, you can skip pages if you want. Each page contains a section describing who can or should skip the page. The section contains a link to the next page. You can also use the navigation on the left to skip pages.
In this section, you learn what is a DApp, why you might want to create one, and why you would choose the Blockstack ecosystem to do it. If you are already familiar with how decentralized applications are different from standard applications and you understand Blockstack’s unique value proposition, skip this section and move onto 2 of 4 immediately.
Traditional application | Decentralized application |
---|---|
Users must create many username and password combinations for each service or application. Each combination must be managed and maintained. Also, each creation requires the user to provide, important or unique information into the care of a third-party. | Users create and own one or more identities. They use their identities with all applications and services. For example, a user could use the same identity for buying books online as they use for social media. |
Multiple third-party applications and services store personal data from individual users in backend servers.,These backend servers are under the control of the application or service. Users leaving the application leave their data behind. | Personal information and data is encrypted and remains under the control of the user.,Users leaving an application leave no data behind because none was stored with the application. |
Multiple accounts across many servers make personal data subject to attack, misuse, and uncontrolled collection. | Users can audit access to their data and know who accessed their data and which date were accessed. |
Central authorities and middlemen control network access enabling them to censor applications and/or users that use them. | Companies are developing blockchains that run over peer-to-peer networks.,These future networks can make shutting down or entirely blocking a decentralized application is close to impossible. |