Mankind never imagined that hundreds of years ago, the protection of property rights including land, capital, and labor was achieved through bloodshed and sacrifice, but now they are hitting a wall in digital assets.
- User data sovereignty is out of control
In 2010, American data scientist Victor Meyer Schönberg predicted in the book "The Age of Big Data" that the big data market will rise. Many years later, the current situation is that the mobile Internet has developed rapidly, and everyone has become a "mobile database". Data has become a commercial capital for creating economic benefits, but the big data market has not arrived as expected. Because we do not have control over our own data assets, even we can't even figure out who the data is?
In 2018, the Facebook leak incident was a sensation, and news similar to the leak of private data was endless. In fact, everything in the era of big data is worse than we can know, and people’s information is leaked more thoroughly than you can imagine. The giant companies that have mastered the data assets of billions of users do not intend to watch your private life, but they use technology to derive benefits from it and use it for commercial purposes free of charge.
There is a saying that when you use a product for free, you also become part of the product. The Internet was originally developed with decentralization as its development concept at the beginning, but with the continuous development of network technology, people increasingly rely on the products of large companies to provide convenient and fast services. The high degree of centralization has caused users to hand over their personal data to large Internet companies in exchange for services. All information about our identity, travel, shopping, social interaction, etc. are all in a glance by giant companies with a "God's perspective". There is no way to know who and how our data is used. This is undoubtedly a major security risk in future life.
The cruelty of reality is that even if we recognize the original sin of Internet giants and are angry about it, we cannot completely cut off the connection and get rid of control. What can we do in such a passive and helpless situation?
Data assets need to be confirmed and privatized. Digital assets and data assets do not belong to users and are not controlled by users, and there is no way to protect users' rights and interests. This is a problem that must be solved in the digital economy era.
- Blockchain drives the digital privatization movement
Zuckerberg punctured this layer of window paper in his speech. He said that the digital privatization movement is a great movement for mankind. The idea of libra is to firmly believe in the digital privatization movement.
Han Feng, secretary-general of the Asian Blockchain Association, also believes that the "second-generation Internet" will be a vision that everyone worldwide yearns for. In the future of the Internet, decentralization should be applied to every link of the Internet, including communication links and storage links. It will constitute a new generation of the Internet, which is fully capable of protecting everyone's own data and privacy. "I think the next bull market is very likely to be condensed on this vision-the second generation of Internet data privatization movement, because everyone's data belongs to themselves, this is a new era of wealth."
Blockchain technology is an important way to realize the vision of the "Second Generation Internet". The decentralized architecture can solve the current problems of "privatization confirmation" and "privacy protection" of digital assets. But this requires that blockchain technology must be implemented in logical application scenarios and participate in the construction of the infrastructure of the digital economy.
The impact of blockchain technology on the confirmation and privatization of digital assets is undoubtedly revolutionary. In the world of the second-generation Internet, with the rise of the data privatization movement, a new era of wealth will begin.
This day cannot be achieved overnight, but when "user data sovereignty cannot be violated" has become a consensus among more people, and more projects that use advanced technology to effectively defend user data sovereignty are implemented, this day will not be too far away.