Blockchain Social Media & Relationship Sharing
Blockchain Social Media and Relationships
Tuesday 2C
Convener: Matt Vogel
Notes-taker(s): Selina Herrera
Tags for the session - technology discussed/ideas considered:
Needing to define what social media is. Why Yadacoin is the answer to social media monopolies. Giving demo and requesting feedback on the current state of the product.
Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:
A quick demo was given and discussion about blockchain social media started:
- YadaCoin aims to remove unique identifiers.
- Yadacoin blockchain is written in python 3.
- The blockchain is trying to give a backbone for relationships on the internet.
- Friends need to easily be found on the blockchain and YadaCoin is a central store of
relationships, not users.
- Users generate transactions that represent relationships. Only relationships are visible on the blockchain.
- One person added the possibility of data analytics from facebook being given in exchange for some kind of incentive on the Yadacoin blockchain.
- Marketing advice included Tweets on Twitter in exchange for coins. Another marketing
concept was that an invite could point to an already created wallet with coins.
- Social media is a “space” where thoughts can be collaborated and people can feel safe. - A person asked why would the younger generation be interested in using the yada blockchain? Response was that yadacoin could capture young crypto enthusiasts who will use the wallet and its features, but also noted that service providers could abstract the experience to be virtually identical to a classic client/server application.
- Another person inquired about a use case pertaining to government use where a user’s identity can be consistent across different systems without the need for a central server for authentication. The response was that this is certainly possible and could be done because the blockchain retains relationship data that can be used to authenticate at later times.