Long-lasting data storage on IOTA’s Tangle

Image for post
Image for post

At first glance it may seem absurd that someone would need a service in order to have an IOTA node.
That’s because the activation of a known IOTA node is in fact a very simple operation, and in the coming releases the configuration of peering with other nodes will be fully automated.

However, node activation may be required for several reasons and some of these introduce additional complexities.

For example, if an application based on the IOTA network publishes data, being able to ensure node response times is a key factor. …

Human vs machine economy

Recently, Deutsche Bank released an interesting study comparing the development of the Internet with the spread of crypto-currency. You can download it here.

I really enjoy the “money flower” on page 4, which immediately makes visually understandable the great variety of contexts in which we use currency.

And of course it is impressive to note the overlapping of the Internet adoption curve with the number of crypto-currency wallets.

Where’s the mistake?

The basic error that I identified in this study is the tendency to consider the adoption of Internet, measured in millions of users, comparable with the adoption of cryptos, measured in number of wallets. …

Image for post
Image for post

A new academic paper describing the functional principles of the new version of the IOTA network has been released in recent days. You can find it here

Those who read my writing knows that I’m a fan of technology, crypto currency in general and especially IOTA.

Now I could go on describing the innovative ideas that the new WP of IOTA contains, enumerating the various components that ensure the distribution of consensus even in the absence of economic incentive.

I could, but I don’t, because the document would deserve an in-depth examination for practically every page, but I don’t think this would help to understand once and for all what the value of the IOTA is and why it is fundamental for technological development in the coming years. …

Development goes forward

Image for post
Image for post

Six months after the initial launch of ProductID, we have obtained many confirmations of the importance and usefulness of such a tool in many industrial contexts.

We have therefore decided to invest and expand the functions of the system.

ProductID’s Basics

The main feature of ProductID is to provide an identification property of a generic object.

To grant a strong security level, the ID property provided by the system is dynamically generated each time the ID verification is needed, and it’s valid only for that specific verification request.

This procedure is very similar to an OTP (one time passcode or password), used as second authentication factor to log in to critical web pages. …

Exploring the idea behind our upcoming new innovative solution

Note: this is a translation of a post that was published on LinkedIn in italian a few months ago. A prototype has been realized since then, we will soon release additional information about this solution.

Image for post
Image for post

Opening a lock is a very common action, and nowadays we perform it many times everyday without realizing how complex it is on many layers.

In time, locks and keys have become more and more sophisticated, especially in the digital era with electronic locks and digital keys.

The “hidden” function of keys

We are so used to using keys that we sometimes forget that they have two different functions:

  • mechanically or electronically activate the…

Advanced MAM explorer for Industry 4.0 applications

Image for post
Image for post
Graphic UI of the current DDL beta release

Distributed Data Logger (DDL) was created with the purpose of extending and boosting the well-known Masked Authenticated Messaging (MAM) second IOTA layer, allowing a MAM channel reader to access additional features.

More specifically a MAM channel has these properties:

- it can be read only starting from a known root id (the unique message identification number) up to the last message in the channel;

- it can be read only sequentially, because the fetch function, given a root id, returns one message, a requested number of messages, or all messages in the channel starting from that root;

- there is no way to know in advance how many messages are stored in a MAM channel from a given root id, without reading all the channel up to the last messages. …

Image for post
Image for post

DLTs (Distributed Ledger Technologies) are the latest evolution of the public register to designate the ownership of properties and assets since the Middle Ages.

While most of public registers record only the variation of the asset’s ownership, DLTs incorporate additional features:

- they can record the change of ownership of an asset;

- they can record the value of the asset;

- they manage the fund movement from the buyer to the seller.

These features are clearly visible in the Ethereum platform, where an ERC#721 token can change ownership recording the applied price and moving the funds.

Hence, I wondered: is it possible to create a marketplace of valuable physical products that provides the same features that Ethereum provides to a digital product? …

Image for post
Image for post

First of all, I would like to point out that the word “blockchain” refers to the data structure that can store the information that in a monetary exchange system are called “ transactions”. This is why the blockchain has become synonymous with ledger.

Second, it must be explained that the reason a blockchain is a preferred choice over a database is because linking transactions in blocks and linking blocks between them creates a computational difficulty to an attempt to modify the data.

In a traditional database, the impediment to modify a data is dependent on the performance of the host machine’s operating system which is, of course, prone to attacks in many ways. …

A solution for the identification and anti-counterfeiting of products

Edit: why IOTA?

I have been asked to explain why we use IOTA for this solution. The answer is simple: IOTA is currently the only distributed ledger that lets us create professional applications with direct control over cost, performance and reliability. The resulting efficiency does not depend on the network usage level, nor is it affected by variable costs deriving from the transactions fees, and at the same time the data is replicated, made immutable in the process, on all the other nodes of the network. A perfect combination of control over a private node and resilience of a public network.

Image for post
Image for post
Our hardware prototype of ProductID, an IOTA-based crypto Smart Card


The evaluation of the origin of a product, i.e. the identity of its manufacturer, is an important matter for many industrial and commercial sectors. …

The counterfeiting of goods and qualitative data in the supply chain is the subject of my previous article (https://medium.com/@sdellavalle/identity-of-things-based-on-iota-tangle-62c9dd0d81ab)

The use of hw cryptography and IOTA Tangle are perfect to protect and certify quality and value products.

However, I think that there is another widespread object that can benefit from IOTA technology: banknotes.

It seems a bit absurd to use a crypto currency to protect paper currency, but it is simpler than you might think.

It is well known that the banknotes are produced using special techniques that make the production of “good fake notes”, very expensive.

The cost of producing false copies combined with the difficulty of selling large volumes, discourages counterfeiters. …


Stefano Della Valle

IOTA Evangelist and crypto enthusiast

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store