Shift

What is Shift?

Shift is a blockchain project aimed at bringing a solution to the challenge of censorship by defining how the technologies that are used in combating censorship are being used.

For the longest time, censorship has always been one of the biggest threats to democracy. Through the development of blockchain technology and systems, the internet populace has experienced a revolution that is bound to change the way things are done, especially when it comes to accessing information online. On the blockchain, one of the most difficult things to do will be censorship. This is because of the concept of decentralization.

There are several procedures that have been put in place to make sure that end users are empowered and they can operate without having to worry about censorship whenever they are online. This is what the Shift project is all about. Shift brings forth a solution to the challenge of censorship by defining how the technologies that are used in combating censorship are put to use, and provide a solution to the problem that lies ahead.

What is the problem that Shift Solves?

The biggest threat to information freedom is not just censorship, but the very institutions that are tasked with making sure that people can interact and connect with one another.

The ISPs are at the heart of the censorship debacle. Other than the ISPs, we also have the government and server hosts.

These are three parties who make sure that information freedom will forever become a mirage, even if they pretend to insist on the contrary.

Through their overbearing actions, either of these parties can get rid of content from the internet, content that they feel is not according to their community guidelines.

While in some cases this is usually for the good of the internet community as a whole, there comes a time when the suppression of access to information becomes a challenge and interferes with certain freedoms that people are supposed to enjoy by virtue of their citizenry in a certain jurisdiction.

There have been cases where end users are targeted, prevented from accessing certain types of information, even if the information in question is actually free to access and available in the public domain.

There are hosts who have even gone ahead and done this to paying customers, barring them from accessing the very content that they pay to access. This is a pure violation of the concept of Net Neutrality.

In Net Neutrality, people should be free to access content and applications on the internet no matter the source of the content. This is an unwritten code of conduct that has been around since the beginning of the internet but has been flouted by entities for a very long time.

Freedom of information is supposed to be the key to advancing not just technology, but humanity.

One of the biggest risks to Net Neutrality is the action of ISPs who have the ability to block, slow down the connection speeds or impose certain limits to an individual’s ability to access content on whichever platform they are using.

There are also ISPs who chose the option of charging a premium rate for the services that they are offering. It is almost impossible to bypass some of the restrictions that are put in place by these vendors, and in cases where it is even possible, the process is tedious and tiresome, and most people simply chose not to bother.

How does Shift Solve the problem?

In order to make things better, it is important that a solution is made available, to deal with the concern of centralization and censorship. What we need is a software layer or a system in place that will be able to identify, mitigate and remove the failure points from a network. In a normal website, there are so many possible points of failure. These include the DNS, server hosts, and internet connectivity.

Shift has introduced a project, Phantom, which should address most, if not all of these concerns. Phantom is the solution to most of the web censorship concerns that we have at the moment.

Even by virtue of the name, any service that is hosted on Phantom is safe in the sense that even if they are removed from a given host, anything that is on the blockchain will always remain there.

Information that is written on the blockchain cannot be removed. What Phantom implements is an IPFS backbone that creates an additional layer of storage on the Shift blockchain.

As an end user, you are free to submit files to the storage service through a blockchain-based space leasing system. For webmasters and operators, you can now manage all functionalities of your website from the Shift blockchain in the storage cluster.

All web services can be rendered through Hydra. This helps in managing resources and making sure that all the content is left running live. To keep content live, Shift uses Jenga.

Jenga periodically monitors data and updates the resources automatically for discovery whenever they are censored. Therefore, Shift has been able to create an end-user experience that virtually, cannot be censored.

The Phantom sidechain is one of the key reasons why Shift is a success in the fight against internet censorship.  A sidechain is a blockchain, but instead of existing in isolation, it has to run alongside a parent blockchain.

Phantom is, therefore, pegged on the Shift mainchain, which provides the backbone for all the services that Phantom has to run.

Since Phantom is basically a blockchain on its own, it has a unique ledger of its own that keeps a record of all the tasks and transactions that users conduct and their token balances.

Through the tokens, the users are able to either unpin or pin content in the IPFS cluster. They are also able to have files stored on the platform for a long time, in exchange for some tokens.

What makes Shift better than the competitors?   

There are currently so many projects that are fighting censorship online. Shift is just but one of the ones that have managed to do this successfully.

With blockchain services, there is always the risk that some of the projects that are proposed as decentralized projects are not really decentralized. The following are some of the reasons why Shift has managed to stay ahead of the pack:

Data Privacy

Security of the content shared on the Shift project is just as important as securing the blockchain. Each user has the option of encrypting their data before they submit it on the blockchain.

However, it is important to note that any content that is encrypted can only be accessed through the key that was used to lock it. When encrypting data, therefore, it is important that users take extra precaution to keep their private keys safe.

Illegal Content

One thing that is obvious in any system is that for some reason, illegal content will always find a way of carving out a niche of its own.

The same applies to Shift. However, through Phantom, hosting illegal content is prohibited. Anyone who introduces illegal content into the blockchain does not just run the risk of having their content removed, but he or she can also lose his or her stake.

Since it is also important to protect the rights of operators, any content that is unpinned can be wiped out so fast. The only content that remains on the Shift project is content that is pinned.

How can Shift be categorized?

Shift is one of the first ever decentralized blockchain projects. By running Phantom, it offers a pioneer in decentralized storage applications, backed by blockchain technology.

Phantom is operated both as a decentralized application and as a sidechain. It is through Hydra, Jenga and IPFS clustering that this project manages to resist censorship for content delivery and web hosting.

What’s Shift’s vision on Security?

Content security is one of the biggest and most important concerns of any decentralized system.

Whenever data is shared on a platform, it should reach the intended users without any compromise whatsoever. At the same time, users need to access the data without worrying about the authenticity of the same.

By implementing Phantom, the Shift blockchain project is designed to ensure that it stays immutable, maintains an element of truth.

Since the ledger cannot be tampered with, trust concerns should not arise when using Shift.

The following are some of the security protocols that Shift has implemented, making it one of the best options in the fight against censorship on the internet:

Deployment for External Interactions

Phantom is run on Shift through the mainchain interface. For an operator to deploy Phantom and use it for their own reasons, they must have a copy of Shift.

Other than that, operators must also use the Phantom interface if they want to work with any suite of the APIs and create new content, or even if they need to upload some files online. Therefore, users do not need to worry about self-deployment of Phantom for any end user to interact with the Shift ecosystem.

Delegated Proof of Stake

Shift is a decentralized blockchain project that is secured by the Delegated Proof of Stake algorithm. In this protocol, there are delegates who act as custodians of the Shift project.

There are more than 100 delegates. It is the role of the delegates to ensure that everything is running accordingly.

Delegates generate blocks in their respective slots after every 27 seconds. This is the block time. It is also the role of the delegates to provide finality in all the transactions that go on in the web hosting platform on Shift. Other than tracking the account balances and the state of registration, they also provide a cryptographic link between public and private keys.

Any user on the Shift blockchain can have as many private keys as they need. It is these keys that are used as proof of ownership of tokens that are used in the Shift project.

This is particularly an important aspect as it allows the users to send tokens to the Phantom sidechain from the Shift blockchain.

Multiple Authentication Layers

In any system, security is one of the key factors that must be taken into consideration.

In a decentralized system, security is of utmost importance as it is needed not just for the sake of building trust in the operation, but also to establish and maintain an element of stability.

Shift has shift cluster security. This cluster is vital in the operation of Phantom. Inside this cluster, there are several methods of authentication for hosts. These methods are put in place to make sure that the cluster is always protected from attacks or any other threats that might arise.

The first level of authentication happens at the blockchain level. Users must register their details on the blockchain. To do this, they must send the Type 12 transaction that registers the storage amount that they are committing to the blockchain. As soon as this is done, they can then proceed to register as a cluster participant in Phantom.

The second layer of authentication requires users to launch the application through the private keys that they used to register on the blockchain and the encryption key that they have in their storage cluster.

After doing that, the application searches the blockchain for any committed storage based on the details provided, then confirms whether it is valid or not.

Once the validity has been ascertained, the application can then decrypt the keys that were issued and registered with Phantom, and from there, the user can then join the cluster.

Examples of Shift use cases/applications

Phantom

Phantom was the first decentralized app that was introduced to Shift. It is a user interface that allows file management over an IPFS network. Shift users can then pin data on Phantom, which makes them available permanently on the cluster.

Sidechains

Shift also created sidechains which support Phantom. The sidechain is built with unique transaction types and rules, which allow users a whole world of opportunities.

File Transfers

Shift users will also be able to send files for free across clusters. They can share files with any peer that is connected to the cluster that they belong to but are not members of the said cluster.

Resources

https://coincheckup.com/coins/Shift

https://www.shiftnrg.org/

https://www.shiftnrg.org/news

https://www.shiftnrg.org/faq

https://www.shiftnrg.org/download/shift-introductory-paper.pdf

 

Radium

What is Radium?

Radium is a verification protocol and software that helps investors, businesses and developers confirm the authenticity of the transactions, files, data and anything else that they come across online that is sharable.

The primary aim of building Radium was to allow users the benefit of integrating most, if not all of their financial transactions on the blockchain. This helps to overcome so many of the challenges that currently face the financial market.

There are several features that are offered on Radium, alongside the SmartChain services, to help the users interact with their peers, and carry out their transactions on the blockchain very easily.

These Radium features include:

  • SmartChain Verify-Web: This helps to verify any function that is performed by a Windows or Linux platform, but running on a web-based app. This is ideal for anyone who likes to confirm the link before they proceed to download any file.
  • SmartChain Verify Linux: This allows users to check local files against file hashes that are recorded on the Radium blockchain, but by making use of the Linux efficiencies.
  • SmartChain Verify Windows: This allows users to check any local files against file hashes that have been recorded on the Radium blockchain.

For any user to implement any of these services on Radium, they would first have an unlocked Radium wallet.

What is the problem that Radium Solves?

The blockchain has given rise to a new protocol for validation and verification of data that eliminates the need for a trust system.

This is a process that was popularized by Bitcoin, creating a decentralized system that would authenticate and verify the history of financial transactions conducted on it.

Since Bitcoin, a lot of the development in blockchain technology and development has shifted focus to different forms of data validation. There is also the notion that blockchain technology and cryptocurrency is all about currency.

Most of the projects that have been designed simply address specific currency flaws in the traditional financial management and handling economy. However, cryptocurrency and blockchain technology is not all about cryptocurrency. There is so much more to it.

There are a lot of projects that are focusing on non-currency usage. This is a step in the right direction. The only difference is that most of these projects demand specific technical skill for users to be able to appreciate their functions and value. As a result, these projects, however, beneficial they might be, end up locking so many people out of their ranks because of the technical nature.

Many people are interested in investing in cryptocurrency, but the lack of knowledge keeps them out of the loop. They feel the technical nature of these projects would leave them as sitting ducks in the event of any eventuality that would need them to act in due diligence.

The Radium project was designed to address this specific challenge. It is a project aimed at exploring and coming up with a form of data validation that is not financial, and with that solution, provide an interface that would allow non-technical users to enjoy the use of these functions too.

Through this interface, Radium project users should be in a good position to enjoy access to a low of blockchain functions through a suite of information management, voting, and identity validation tools.

How does Radium Solve the problem?      

Radium is a proof of stake blockchain. This is a better and energy efficient option compared to proof of work that is employed in Bitcoin. How are these two different?

In Bitcoin, blocks are generated by expending computational resources. In Radium, on the other hand, coins are generated by splitting different groups of coins into individual wallets. The more the balance in the wallets increases, the higher the chance of generating the next block in the chain, and at the same time, earning block rewards.

What makes Radium better than the competitors?         

One of the main reasons why Radium is different from other projects that are offering the same or almost similar services is because of Radium SmartChain.

Radium SmartChain serves both as a software program and a protocol which is implemented by Radium users to make use of the distributed irreversibility feature on the blockchain.

This is a component of the Radium blockchain, an additional data layer that has all the functions and information for validation that are needed by any Radium application that is not financial in nature.

This information can be stored without necessarily having to worry about volatile memory use. Radium SmartChain has a number of components that help to achieve the ideal:

Identities

There are so many scammers, imposters, hackers and the like that are available online. What these individuals have in common is that they use fake profiles online, creating different identities all for different reasons.

This makes it very hard for anyone to trace them, but as time goes by and their scams advance, it becomes difficult to identify the authentic retailers or websites from the fake ones.

Through Radium Identities, users on the protocol are in a good position to manage their online presence, create a historical record of all the activities on the blockchain, and establish a level of trust with the people they interact with. With an identity created, users can now go ahead and use it with any functions they require online, including voting and signing.

File Signatures

The global environment today has a challenge when it comes to safe distribution of digital media, software, and files. Organizations have grappled with this for a very long time.

An unintentional or even intentional distribution of a malicious file can damage the reputation of an organization or an individual. This has in the past led to the loss or lack of trust.

Data validation methods in use are cumbersome and will often require a user to compare results and data manually. However, to remedy this situation, Radium uses blockchain signatures to validate any information.

By signing files with a known Radium identity, it becomes very easy to prove whether files shared are genuine.

Text Notes

Through Radium, users are able to insert text notes into the blockchain. This makes it easier for the users to share notes that can be used as endearments, making predictions, or any other type of public statement that would need security and the immutable function of the blockchain.

How can Radium be categorized?

Radium is a distributed blockchain with nodes all over the world. It is readily available and accessible to investors on different platforms, from Linux, Windows and Mac OSX. It is a project that was designed specifically to run without resource constraints, and can thus be operated even on a low-end ARM device.

What’s Radium’s vision on Security?

Radium keeps all the hash functions of user files. This is done to make sure that the file is not tampered with at any given point in time, thereby making sure that the pathways for accessing files are always secure.

Building on this, Radium has placed a lot of emphasis on the non-conventional use of cryptocurrency, making it a platform where people can interact and engage even in non-financial transactions.

Through the unlocked Radium wallet, users can actually link addresses, verify identity and transactions, and generate proof of existence or ownership of the same.

Examples of Radium use cases/applications

Over the course of the development and beyond, Radium has attracted a number of partnerships, projects that are currently running and benefitting from implementing Radium. Here are some of the key partners:

XWEBHosting, LLC

This is a top-tier multi-platform web hosting provider. They offer a lot of options for anyone who would love to use either shared hosting services or reseller services.

XWEB understands the fact that each user has unique needs whenever they are on their computers. Whether they are individuals, medium-size entities, small startups or web developers, everyone has something specific that he or she needs to make their internet experience enjoyable.

XWEB works hard to make sure that all users are able to enjoy the services they need and at an affordable price too. To make this happen, they must provide a reliable hosting platform for all the users. Whether you are running JSP, Tomcat, MySQL, PHP, Cold Fusion, ASP.NET or even IIS, XWEB has got you covered.

By partnering with Radium, XWEB has managed to integrate traditional web hosting services on a blockchain platform, ushering in a new age of web-based management experiences and interfaces. As an end-user, this is good news because you can look forward to the best services, at a fraction of the going market rate.

Kenshin Holding Company

This is a company that was built to support and contribute to growth in different global economies. Kenshin addresses businesses in a focused approach, in order to grow the shareholding value.

Smartchain Software Solutions, LLC

By bringing Radium on board, Smartchain is looking to spark a revolution in the integrity of data that they handle. This is, particularly in verification and validation. Smartchain is building the future, today.

Through a decentralized platform like Radium, Smartchain is able to encourage trust and transparency, which are integral to a community that is constantly driving technology especially with the use of blockchain technology.

McIntyre, Donohue, Accardi, Salmonson & Riordan, MDASR, LLP

This is a legal firm that has served residents of Long Island and New York for more than 60 years. In light of the recent advancements in the world of technology, MDASR is making an effort to advance the practice to a new frontier, giving their clients nothing but the best experience. By partnering with Radium, the law firm is in a good position to enhance the client experience, through an apt technical and legal prowess.

Mitigating Website Hacks

The Linux Mint website was hacked in 2016. During the hack, the hackers managed to gain access to the iso files and replaced the checksums on the downloaded iso files.

This means that anyone who would have downloaded the file on that day would not have had the best experience with the file, and risked infecting their machines. With Radium, this could have been avoided.

This is because Radium can record a checksum onto the blockchain. Anything that is recorded on the blockchain is impossible to manipulate. This also makes it easier for the users to verify the integrity of the file before they download it.

Vendor or Employee Accountability

This is important, and applicable to many business situations. The Smartchain identities make it possible for these entities to make sure that all the vendors and employees are held accountable for the decisions that they make.

Since these identities are binding to an individual, any data that is modified, accessed or created will be stored in a safe way, that cannot be tampered with, for future reference.

Proof of Ownership

There are a lot of people who infringe on the rights of ownership to intellectual property, technology art and other forms of invention. The Radium Smartchain makes it easier for creatives to go about their business without worrying about people infringing on their rights to property ownership. What this means, therefore, is that creatives can now go about building their art, and do not have to worry about anyone faking ownership of the same.

Elections

The Smartchain Election protocol that is employed by Radium can also be used in a voting or an election process.

This, combined with the Smartchain Identities makes it an ideal option for a national election process, especially because of the indisputable and immutable accuracy of blockchain technology.

Therefore, since the results are trustworthy and can be verified, this would bring back an element of confidence in elections that have been lacking for the longest time.

Microsoft Office Suite

There are several items in the Microsoft Office Suite that can benefit from the Radium protocol.

One of these is Microsoft Outlook. Outlook can use the Smartchain identities to sign, validate, and verify IPFS encryption.

This is applicable not only for files but also for email contents, which is a good way of promoting accountability and legitimacy in the workplace.

Resources

https://coincheckup.com/coins/Radium

https://radiumcore.org/

https://projectradium.org/

https://blog.radiumcore.org/

https://radiumcore.org/docs#faq