Imagine that one day an application that you are actively using has been banned. It can be the decision of the developer who decided that such app is no longer profitable for him. Possibly, this can be the decision of the government, which decided to ban it, simply because they can do so, providing nonsensical arguments.
Increasingly, the programs, that you use, directly dependents on the Internet and can be monitored. This applies to programs that are installed on the computer, as well as web applications that you use through browsers. In addition, your personal data is not as secure as you would like. Your personal information, passwords, financial data can be stolen from your device in case of hacking, or it can happen on the server side where they are stored. And here is the most obvious problem — centralization. Data can physically stored on a server that can be disabled or stolen. They can be accessed by unscrupulous employees and sell them on the side. In addition, the company, recently offering safe storage of your personal data, anytime can announce the shutdown of the services and users will have to say farewell to the data while the technical works are on.
Surely you’ve heard of such stories. This is the reality of the world around us, in which both development methods and methods of hacking are developing rapidly. Not to mention that the programs and user data are less and less owned by users. Thanks to decentralization and cryptography, it is possible to avoid such situations. We are speaking about decentralized applications.
The first rule of the club of decentralized applications: do not tell anyone about the club! This is a joke. On the contrary, there should be full visibility and accessibility of the source code. Anyone should be able to make sure that this code is safe and that it is currently working. The second rule is that each participant must have a way of exchange — a digital token or coin. In fact, it is a symbol of access to the application. In addition, a coin or a token can serve as a payment for the works of the developers. The third rule says that there should be complete independence of the application, implemented in the blockchain. This will ensure security, reliability and transparency. Besides, the block network has fault tolerance, that ensures the operation without failures or physical disconnection. And the last one is the application must work according to a known protocol. This should be a known cryptographic algorithm, so that you can verify the reliability of the data. In the case of BitWhite, this is DPOS.
What is a decentralized application? These are usual programs, which you use for entertainment and work, games, utilities, various soft. Technically, this is the interface through which the user interacts with the data and the database. Blockchain is the server where the database and the cache are stored. To create applications on the BitWhite platform, a development set (SDK), based on the Java Script, will be available. The created applications will be stored in a decentralized repository, from where users can download and use them. In addition, applications will use their own chain of blocks — sidechains, so that the block will be protected from overload.
Physically, applications will not be stored on any particular computer, they will not be owned by any person, and at the same time they will available for everyone. Due to the blockchain, it will be impossible to make a fake or substitution, and also to integrate inconspicuously dangerous software. In addition, a database with sensitive and personal information will not be placed in a centralized repository, with which anything can happen. Since our rapidly changing world is moving towards very fast to use of blockchain technologies in many spheres of life, the moment when decentralized applications will occupy a leading position is not far off.