Slides I used for FinTech - Financial Innovation and the Internet 2023 Fall at Graduate School of Business and Finance, Waseda University on November 17, 2023.
XL Beta FinTech — Financial Innovation and the Internet 2023 Fall Lecture 6 : The World of Apps (2) Kenji Saito, Graduate School of Business and Finance, Waseda University Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.1/32
used for research on (online) learning Transcribed for use and anonymized Will let you know when the necessity arises Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.2/32
automatic transcription for lectures will be posted at Discord Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.3/32
Lecture 2 10/13 Overview of FinTech (2) • Lecture 3 10/20 Internet Technology and Governance (1) • Lecture 4 10/27 Internet Technology and Governance (2) on-demand • Lecture 5 11/10 The World of Apps (1) • Lecture 6 11/17 The World of Apps (2) • Lecture 7 11/24 Blockchain (1) Lecture 8 12/1 Blockchain (2) Lecture 9 12/8 Smart Contracts (1) Lecture 10 12/15 Smart Contracts (2) Lecture 11 12/22 Smart Contracts (3) Lecture 12 1/12 Cyber-Physical Society and Future of Finance Lecture 13 1/19 FinTech Ideathon Lecture 14 1/26 Presentations and Conclusions Online presence is possible but not recommended for non-online lectures for interactivity reasons Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.4/32
of the Web Web 1-2-3 Begins Beginning of the True Stories Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.5/32
Web API (REST) in particular Discussion : Imagine API Basics of Cryptography May be continued to the next lecture Assignment Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.6/32
(Finance is irrelevant) Users themselves are “easily” the producers of the data A little off topic Quite off topic lift (Aufheben) 1989 Web3.0 ˠ web3 2014 1990 1995 2000 2005 2010 2015 2020 2005 2006 Web3.0 Get your data back in your hands! Don't let organizations control it Solve all problems by making everything a financial token! Berners-Lee’ s Berners-Lee’ s O’ Reilly’ s Wood’ s Bitcoin Ethereum Semantic Web (1998) “Web 2.0” first appearance (1999) Snowden Affair Bankruptcy of Lehman Brothers Internet Commercialization To Solid Project Is the data freely available for the users themselves and for the public good? How did this happen? Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.8/32
Write Publication medium for researchers → Everyone writes and reads papers, so it is two-way from the beginning “Users manage data, but publication is not easy” Web 2.0 (O’Reilly) : Read × Write ← Since Web 1.0 era “User has no control over data, but publication is easy” Web 3.0 (Berners-Lee) Aim to “make it easy for users to manage and publish their data” → Solid (Social linked data) Web 3.0 → Web3 (Wood) Make Ethereum available from the Web ← web3.js, web3.py Web3 (Dixon) : Read × Write × Own “Build financial assets, in the form of tokens, into the inner workings of almost anything you do online” (Bloomberg) You can own a token without relying on a trust to another, but you cannot own what the token points to or includes Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.9/32
Get the data back to everyone The following 4 elements were assumed to allow you to manage your data yourself 1) Publishing system that cannot be censored (realized with Ethereum) 2) Messaging with pseudonyms (realized with Ethereum) · Not anonymous, but when identities and pseudonyms are linked, people know who you are 3) Consensus engine (?) (naïve understanding that this was achieved with Ethereum) · Haven’t created any mechanism for human beings to agree (What is being done is “replication” as part of 1)) 4) Browsers and user interfaces that integrate them (Ethereum to be available on the web) The {Javascript|Python} library to achieve 4) above is called web3.{js|py} (2014∼) Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.10/32
. “What makes Web3 different — and more than a little weird — is that it would build financial assets, in the form of tokens, into the inner workings of almost anything you do online” — Olga Kharif, “What You Need to Know About Web3, Crypto’s Attempt to Reinvent the Internet”, Bloomberg (2021) Why do they want to do it? (Do you want to do it?) Perhaps because, after all, only tokens can express “ownership” in the blockchain? (original development motivation) Tokens can be freely disposed of by their holders → realization of the modern concept of ownership But does that mean you own the data? Is “owning” a “better way” in the first place? Is it a belief (or assumption) that all of society’s problems can be solved by incentives? This may be a belief that we can’t solve our problems without using humans, Because the only party to whom assets can be exercised is human (nature does not accept money) What about the fear of being wiped out in some way as a result of diversity being compromised because everyone works with the same incentives? Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.11/32
Whatever you want to do, this class will always answer it with true stories Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.12/32
application can make use of some features provided somewhere Web API : API by HTTP(S) requests In this case, features are provided by a (remote) web server Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.13/32
methods POST, GET (demoed), PUT, DELETE vs. CRUD (Create/Read/Update/Delete) CRUD represents the basic set of operations against a database Uniquely identify resources by URI Some demonstrations later Often returns results in the form of JSON (JavaScript Object Notation) Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.14/32
Then GET / Install openssl in your environment and try it out You may want to try www.google.com:443 and GET /search?q=refrigerator instead Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.15/32
and state transitions An example of state transitions (state machines) (For example, on the web, page = state, and the page presents possible operations in that state as a set of buttons) A stack is a last-in, first-out date store You can push data in, and pop data out A design would be like, POST to create a stack POST to push to the stack POST to pop from the stack GET to peek in the stack state PUT to update an item DELETE to delete the stack Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.16/32
sample API that provides stacks (requires Python3 and Flask) The stacks can be used as calculators Run the simple web API server $ python stack.py See README to discover how to try In this demo, we will try (5 − 2) × (3 + 4) Expressed as 5 2 − 3 4 + × (Reverse Polish Notation) Also two programs to add up 1 through 10 using the API Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.17/32
the trouble of using APIs to do something this simple We did it as a demonstration in which we can easily confirm that the API worked correctly If I were to point at the moon, you should be looking at the moon, not at my index finger ↑ If you are wondering why I suddenly started talking about the moon, you are surely looking at my index finger At the same time, the stack calculator is an important concept You can make a (virtual) computer out of this concept It is called a stack machine Bitcoin’s virtual computer for scripting is a stack machine Ethereum Virtual Machine (EVM) is also a stack machine Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.18/32
banking? Roughly design With CRUD (Create/Read/Update/Delete) in mind Have you considered an API to retrieve passbook data? How can you be sure that the data is genuine? Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.19/32
digital signature Zero-knowledge proof Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.20/32
*OQVUUIBUHJWFTUIFTBNFEJHFTU $BO` UEFEVDF 'JYFEMFOHUIEFpOFECZ UIFGVODUJPO FYCJU *OQVU )BTIWBMVF EJHFTU *GJOQVUTBSFKVTU CJUEJ⒎FSFOU 5PUBMMZEJ⒎FSFOU PVUQVU $SZQUPHSBQIJDIBTIGVODUJPO 4)" 3*1&.% FUD $BO` UEFEVDF $BO`UEFEVDF *U` TJOGFBTJCMFUPDBMDVMBUFBO JOQVUUIBUQSPEVDFTBTQFDJpD EJHFTU When a file (e.g., an open-source app) needs to be authenticated, the provider may publish a fingerprint value (called a hash value or digest) of the file (typically in hexadecimal) The downloader can calculate the digest in the same way, and if it is the same value as the publicly available one, they have a real file It is considered extremely difficult to disguise a fake file so that it gives the same digest The digest is calculated using a cryptographic hash function There are various functions, such as the SHA (Secure Hash Algorithm) series A cryptographic hash function is a function that outputs a completely different value if the original data (preimage) is different by even 1 bit Unidirectional, and cannot get preimage from the digest So it is sometimes used to hide the original data Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.21/32
by NSA) Deprecated SHA-2 (designed by NSA) SHA-256 produces 256-bit digests “FinTech - Financial Innovation and the Internet 2022 Fall” → 051a807b12513f8b402b23e337806a06ea221696611724be4d510329aa0076d6 SHA-3 (selected through a public call for proposals) SHA3-256 produces 256-bit digests “FinTech - Financial Innovation and the Internet 2022 Fall” → 794cbcb155f2b152c72c2cb4a37909129319cf9dd6576d0b7005f6491a5d8d8e Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.22/32
by Google and the National Research Institute for Mathematics and Computer Science (CWI), Netherlands As an alert Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.23/32
3FDFJWFS QMBJOUFYU QVCMJDLFZ QSJWBUFLFZ &ODSZQUX QVCMJDLFZ %FDSZQUX QSJWBUFLFZ 4FOEFODSZQUFEUFYU It is extremely difficult to deduce the private key from a public key Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.24/32
NBUDIUIFEJHFTU DPNQVUFEGSPNUIFQMBJOUFYU %FDSZQUXQSJWBUFLFZ BTJGJU`TBOFODSZQUFEEBUB 3FDFJWFS 4FOEFS QMBJOUFYU QMBJOUFYU TJHOBUVSF TJHOBUVSF %JTUSJCVUFQVCMJDLFZTJOBEWBODF LFZQBJS EJHFTU QVCMJDLFZ QSJWBUFLFZ EJHFTU Can prove that it was sent by the very person and has not been altered This illustration shows how it works with RSA (RSA : Rivest, Shamir, Adleman) ECDSA is used in Bitcoin, etc., instead (Elliptic Curve Digital Signature Algorithm), in which we don’t encrypt/decrypt Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.25/32
Output : signature Verifying Input : <plain text, signature, public key> Output : OK (no change in plain text, and private key was used) or NG (otherwise) Whether the signature meets certain mathematical properties that can be tested using plain text and public key Private key cannot be inferred in the verification process Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.26/32
no knowledge other than what prover wants to prove Example: “I know a secret spell to open the door” ↑ Prove this without revealing the spell itself For example, repeat “coming out from the way she is told” for 20 times Completeness Verifier accepts with high probability if the proposition is true Soundness Verifier has little chance of accepting if the proposition is false Zero-knowledge Can imitate dialogue without having to be a prover (without knowledge) Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.28/32
zero-knowledge proof Example: proving “my test score is the same as yours” Only one person can enter the room at a time Room has numbered and locked voting boxes for every possible score (for example, 101 boxes for 0∼100 points) You have a key bundle, but leave only the key of your score box, and throw away the rest I enter the room and vote for my score box and × for the rest You go into the room and unlock your score box to see if it’s voted Digital signature (can prove that the private key is there without revealing it) is an example of non-interactive zero-knowledge proof Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.29/32
financial services (2) If a user is an “end (edge)”, what is the “center” operated by people or an organization in the example? (3) How will the service change if that center is automated, without an organization? Deadline and how to submit November 21, 2022 at 17:59 JST From Moodle (mandatory) Optionally, you can also post to #assignments channel at Discord So that your classmates can read your report, refer to it, and comment on it Just plain text, and be concise, please (and please remember Kent Beck on How to Get a Paper Accepted) Lecture 6 : The World of Apps (2) — FinTech — Financial Innovation and the Internet 2023 Fall — 2023-11-17 – p.31/32