What I'm Reading - 5/21/2018
Three to five links every weekday - even when I was out way too late drinking whiskey in the Arts District.
On Thursday, speaking at Token Summit in New York, Sacks explained why he is bullish on “security tokens,” which are the blockchain’s version of traditional securities like shares or derivatives (my colleague Polina Marinova has a nice explainer here).
According to Sacks, the advantage of tokens is they reduce or eliminate the “illiquidity discount” for assets that can’t be publicly traded. This discount means people pay less because they’re worried an asset will be hard to resell.
Sacks cited the professionally managed real estate market, which is worth $7 trillion but is not very liquid. He thinks it’s possible to unlock a huge amount of value by letting people buy and sell chunks of real estate with tokens—each token would correspond to ownership in a piece of property, and could be easily swapped on a blockchain.
As Facebook shapes our access to information, Twitter dictates public opinion, and Tinder influences our dating decisions, the algorithms we’ve developed to help us navigate choice are now actively driving every aspect of our lives.
But as we increasingly rely on them for everything from how we seek out news to how we relate to the people around us, have we automated the way we behave? Is human thinking beginning to mimic algorithmic processes? And is the Cambridge Analytica debacle a warning sign of what’s to come–and of happens when algorithms hack into our collective thoughts?
Agreements between some of our clients and the New York State Department of Financial Services (“NYSDFS”), proved popular enough that FBI Director Wray recently pointed to them as a model of “responsible encryption” that solves the problem of “going dark” without compromising robust encryption critical to our nation’s business infrastructure.
The solution requires storage of encryption keys — the codes needed to decrypt data — with third party custodians. Those custodians would not keep these client’s encryption keys. Rather, they give the access tool to clients, and then clients can choose how to use it and to whom they wish to give access. A core component of strong digital security is that a service provider should not have access to client’s unencrypted data nor control over a client’s encryption keys.
The distinction is crucial. This solution is not technological, like backdoor access built by manufacturers or service providers, but a human solution built around customer control. Such arrangements provide robust protection from criminals hacking the service, but they also prevent customer data harvesting by service providers.
With the launch of ARCore earlier this year, mobile AR already has meaning scale across both platforms. This scale (500 million+ AR enabled smartphones) is attracting nearly all companies to experiment with spatial computing and proprietary data. Companies are combining data with API’s to create new consumer AR experiences.
Perhaps most importantly, the tools and frameworks for building robust AR experiences are rapidly evolving. We have seen both Apple and Google quickly add key spatial features to their respective SDK’s. (And expect Apple to jump into the AR Cloud game after Google’s recent launch of multi-player AR experiences.)
Every week a startup launches a new tools that make part of the AR pipeline from asset creation to real world interaction better. As we saw with the mobile app ecosystem, now that these pieces are in place, expect mobile AR to evolve in 2018 to the next level with new use cases and experiences.