• LughOPMA
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    1 year ago

    I think its real potential (as yet unexplored) is in disintermediation.

    Two parties, who do not know each other, and want to conduct business rely on so many intermediaries who provide services, and crucially, trust - who all take their cut. Lawyers, bankers, etc

    Blockchain could not only automate the processes, but also be designed to replicate trust.

    Also, that potential isn’t just about efficiency - its about power, and taking it away from industries and institutions - banking, etc

    • TheOneCurly@lemmy.theonecurly.page
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 year ago

      But blockchain can only enforce on-chain behavior. There’s no way for it to actually confirm you sent anything or followed the letter of an agreement.

      • Bldck@beehaw.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        Something something smart contracts hand wave.

        Anyway, we are raising $250 million for our Seed Fund. You in for 18% at a $10 billion valuation?

    • xep@kbin.social
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      1 year ago

      efficiency

      7 TPS and the amount of energy used so far has been mind boggling. Is the use case boiling our oceans?

    • thesmokingman@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      1 year ago

      This what most cryptocurrencies shill. It’s the basis for Ethereum’s smart contracts. In reality what this is really useful for is permanently distributing malware preserved in databases stored on every machine that wants to participate. It’s such an amazing attack vector. Since you genuinely can’t change history without disenfranchising large portions of your user base and killing trust, you can just throw all sorts of crazy attacks everywhere. If someone doesn’t put code directly into the insert-and-read-only database everyone has to replicate, you can hijack what the database refers to pretty easily using attacks that have been around since the beginning of trying to break the web.

      If that’s not what you were going for, can you give an example where it can actually be used?