Demystifying Blockchain Phones

Image for post
Image for post

“People don’t own their digital identities…

…whether it’s behavioral data, commercial data, health data, browsing data, or something else — all of that is owned by a handful of companies.”

- Phil Chen, Decentralized Chief Officer, HTC.

Introduction

It’s called a blockchain phone. HTC’s Exodus 1 will launch in March and will be purchasable with US currency. Samsung has confirmed that its Galaxy S10 model will enable customers to use a cryptocurrency wallet. Switzerland-based Sirin Labs launched a $999 Finney phone this past December. And India-based Pundi X made Mobile World Congress headlines by announcing additional decentralized features to its $599 XPhone set to launch later this year.

Let’s dive into what a blockchain phone is — and why it could emerge as an important product.

Image for post
Image for post

The problem

From a privacy standpoint, this is obviously troubling. WIth the advent of Big Data computing power, data mining companies can amass detailed profiles on individual consumers from random bits of information, often times piecing together extremely private and sensitive preferences or aspects of people’s lives, all of which is available for purchase by an interested third party.

Additionally, there has been an acceleration of data and digital security breaches over the last few years — take a look at this interesting visualization. When all of your personal data generated on your mobile phone is being stored in multiple centralized databases, these repositories or even your mobile device itself pose a risk for hacking, phishing, identity theft through scams like phone porting, and other malicious use.

This is where blockchain phones come in. They purport to protect your digital identity by leveraging a decentralized peer-to-peer network to secure your transactions — from phone calls to messaging to financial transactions.

A blockchain refresher

Think of DLT as analogous to Google Docs’ version control. Every action/transaction is recorded and timestamped — and it becomes a permanent addition to the ledger. However, unlike Google Docs, you cannot make edits to the items that have been already added before.

Sets of transactions are recorded in what is called a block, and these blocks are transferred and appended to over a peer-to-peer network, keeping all transactional data decentralized and autonomous. Each block is connected serially to consecutive blocks (as defined in the block’s ‘header’ information, based on the block’s identifier), forming a chain of transactions — or a blockchain.

Blockchain phones

With blockchain-based Decentralized Identifiers (DiDs), users can regain control of their data. DiDs are encrypted strings stored on a blockchain ledger, with each being assigned to a specific part of the user’s identity (such as name, email, social security number). Using a digital wallet app, a user can give specific applications temporary access to relevant parts of their identity.

Since the data is only accessed and isn’t stored on the application’s database, it prevents any authorized usage or hacks of the data. Another beneficial byproduct of storing this data on the blockchain is that in case users can modify their data (such as frequently changed identifiers like address, credit card info, etc.) and have that modification be immediately propagated across the DiDs as opposed to needing to be updated across the platforms individually.

Blockchain phones also enable the use of decentralized apps (D-apps), which are apps that use public, peer-to-peer networks instead of private corporate servers. By storing data on a single public ledger instead of on the private databases of various corporations, you’re ensuring battle-tested encryptions while giving you complete control over access. Furthermore, every transaction is recorded and time-stamped, protecting users and applications against issues such as:

  • Denial of service attacks — Since each user is verified through their key, a DOS attack (which relies on sending bulk requests to a site/app from multiple fake accounts) will be unsuccessful
  • Government censorship — With blockchain, privacy is paramount. Since data such as the user’s location is unavailable or encrypted, governments cannot censor content in their respective geographies
  • Insecure monetary transactions — passwords are replaced with highly secure two-key encryption
Image for post
Image for post

A few present challenges

Nascent technology

There is a perception that blockchain phones and D-apps will be tough for a layperson to grasp. Most of these concepts are difficult to visualize or demonstrate, the ideas work in theory but are practically unproven, and many of the specific features are untried and untested. At best, the technology is a work-in-progress and popular among crypto enthusiasts instead of the mainstream. This leaves the tech and the commercialization of it open to issues that will only be known once extensive real-world testing is done.

Single point of failure

Since the technology is new and prides itself on being decentralized, there are simply not enough regulations to ensure that blockchain based products don’t, deliberately or accidentally, cause the user data or monetary loss. If users lose their encryption key, they have no way to recover their data or their hard-earned cryptocurrency. Gerald William Cotten, the owner of now-defunct cryptocurrency QuadrigaCX, died suddenly this past December. Unfortunately, he alone knew the passwords to his company’s cold wallets which held his customer’s cryptocurrencies, wiping out almost $200 million of value.

Until companies develop an easier key management system without compromising the technology, it is unlikely that these phones will see widespread usage. Companies are experimenting with data recovery solutions, such as HTC’s “Social Key Recovery” on the Exodus, which allows a user to split and share their key with 5 different people. An Exodus phone can be recovered through a combination of password, biometrics, and three of the five split keys.

Conclusion

However, the technology is still at a preliminary stage with limited real-world exposure. The users willing to try these phones will most likely be early adopters or users who frequently transact in cryptocurrency — which is a very small percentage of the overall mobile market. The question here is whether (and when) the general public will be willing to make the move.

Written by

Hands-on company builder; Founder & Entrepreneur with 3 exits, who enjoys scaling companies 24x7x365; Blockchain Pioneer. Founder and CEO at FanVestor /#Fvestor

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store