The blockchain offers a digital currency and transaction system based on cryptographic proof and a fully distributed and transparent ledger. It provides a means for individuals and organizations to create value and execute/validate transactions on a peer to peer basis without the need for centralized institutions or intermediaries.
While the blockchain was first referenced in “Bitcoin: A Peer-to-Peer Electronic Cash System”, and focused on an alternative currency, the underlying framework has the potential to become the most disruptive innovation we’ve encountered since the advent of the internet.
The technology supply chain has been compromised. Whether components, firmware, device drivers, algorithms, protocols, operating systems, systems integrators, service providers, content providers, you name it, all have designed vulnerabilities into their products and services under the guise of customer convenience, customer experience, third party data sharing, government demand, or profit.
This market is enormous and ripe for disruption. Our investments focus on blockchain-oriented solutions that follow one of three distinct tracks: offense, defense or deception.
In the 1940s, Isaac Asimov gave us his Three Laws of Robotics: (1) a robot may not injure a human being or, through inaction, allow a human being to come to harm, (2) a robot must obey the orders given to it by human beings except where such orders would conflict with the First Law, and (3) a robot must protect its own existence as long as such protection does not conflict with the First or Second Laws.
Unfortunately, many developers have largely ignored these laws and created bots, whether hardware or software based, with malicious intent. It is time for a course correction and we will invest accordingly.
In 1950, Alan Turing published “Computing Machinery and Intelligence”, asking us to consider the question: “Can machines think?”. The Turing Test was created and is still used, in similar forms, today to answer that very question.
Here, we are focused on advances in machine perception (input from sensors), multi-lingual natural language processing (input from reading/conversation), machine learning (algorithmic learning via access to data sets), and affective computing (systems that can simulate human feelings or emotion). We expect to see significant advances in the coming decade.
This business model describes the shared use of an underutilized asset which provides the owner with a means to offset their expenses while the consumer benefits by paying a significantly lower price than is currently available in the traditional marketplace. Examples include Uber, Lyft and Airbnb. We use this in a broader context than just the “sharing economy”.
The blockchain, and advances in cybersecurity, will facilitate the creation of new products and services that leverage all of the underutilized bandwidth, compute power and storage whether stranded in homes, small businesses or the largest datacenters.
Bitcoin (BTC) was created in 2008 as the first cryptocurrency and leverages blockchain technology to facilitate transactions. Today, bitcoin is primarily used as a store of value (less so as a medium of exchange).
While there are dozens of other cryptocurrencies, we find Ethereum to be most interesting. It is not only a cryptocurrency (ETH), but offers a platform to create new blockchain applications that use tokens as a funding mechanism and medium of exchange.
We view Bitcoin as a disruptor of currencies and Ethereum as a disruptor of app development and equity financing.
Decentralized, cost-free communications network driven by peer-to-peer message exchange.
Zero knowledge platform coupling blockchain based key management and encrypted storage.
Associate your blockchain addresses with aliases to make it simpler and more secure to transact with others.
Cyber Warrior Network
Algorithmic matching of cybersecurity talent with market opportunities based on assessments, experience and culture.
Decentralized cloud services platform offering compute and storage for web services.
Decentralized solution to mitigate distributed denial of service attacks and offer content delivery.
Distributed compute platform used to
create and sell synthetic, labeled datasets
for training of deep neural networks.
Protocol enabling artificial intelligence as a service on a permissionless platform to drive AI discovery, communication and usage.
Decoupling data created by users from apps owned by corporations. Users control and monetize the data they choose to share.