Introducing TruStream: A Protocol for Verifiable, Real-Time IoT Data

This article was first published on @iotex - Medium
-----

Technology is transforming the way society operates, including the concept of “trust”. In today’s world, trust is subjective — we generally trust people/companies based on their reputation, status, ratings, media coverage, and more. While this model has worked well historically, the rapid emergence of misinformation — from deepfakes to counterfeit products to fake news— compels us to reconsider what we trust and why we trust it. In the future, trust will not be simply assumed but rather proven with verifiable, objective facts. The “don’t trust, verify” mantra will become the new global standard that underpins our decentralized future.

Trust must be objective, not subjective.

IoTeX has a vision for the Internet of Trusted Things, an open ecosystem where humans and machines can interact with verifiable trust, privacy, and free will. Establishing a long-lasting foundation for this vision requires tools that allow us to verify and therefore trust the information from our smart devices. This is why we are excited to introduce TruStream, an open-source protocol that places the power of verifiable data in the hands of builders.

What is TruStream?

TruStream is a first-of-its-kind protocol developed by the IoTeX Foundation that makes verifiable, real-time data from IoT devices available to developers. Combining tamper-proof hardware and software, TruStream provides a blockchain-agnostic framework to create cryptographically signed data streams that can be trusted, utilized, and monetized on the IoTeX Network and beyond. TruStream specifically addresses real-time IoT data streams, which along with 5G connectivity and edge computing has the potential to enable decentralized automation, zero-latency decision-making, and human-to-machine and machine-to-machine interactions.

TruStream brings data from the physical world to the digital world.

TruStream synchronizes with secure hardware devices (e.g., Pebble) to collect and sign data using a tamper-proof secure element called a Trusted Execution Environment (TEE). This cryptographically signed data ...

-----
To keep reading, please go to the original article at:
@iotex - Medium

Comments (No)

Leave a Reply