<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-03-31T16:09:30&#43;02:00</updated>
  <generator>https://nostr.ae</generator>

  <title>Nostr notes by Kryptos Captain ™ ©®🧙🏻‍♂️⚡🐒 ∞/21M | ▓▓</title>
  <author>
    <name>Kryptos Captain ™ ©®🧙🏻‍♂️⚡🐒 ∞/21M | ▓▓</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://nostr.ae/npub132rz5vljx8lfhm4gn0hexdqylg229asrcvmhjqlm9xfaxm2utn9qesjhxs.rss" />
  <link href="https://nostr.ae/npub132rz5vljx8lfhm4gn0hexdqylg229asrcvmhjqlm9xfaxm2utn9qesjhxs" />
  <id>https://nostr.ae/npub132rz5vljx8lfhm4gn0hexdqylg229asrcvmhjqlm9xfaxm2utn9qesjhxs</id>
  <icon>https://npub132rz5vljx8lfhm4gn0hexdqylg229asrcvmhjqlm9xfaxm2utn9qesjhxs.blossom.band/63ebd52de4e43b04c78302796f276f7a09ac4c61b6dfe323f73f0e54cb3af6e2.png</icon>
  <logo>https://npub132rz5vljx8lfhm4gn0hexdqylg229asrcvmhjqlm9xfaxm2utn9qesjhxs.blossom.band/63ebd52de4e43b04c78302796f276f7a09ac4c61b6dfe323f73f0e54cb3af6e2.png</logo>




  <entry>
    <id>https://nostr.ae/nevent1qqsyzegsgr7m8pj35snj9m65qqlg38relcfvjxc3m9m3xuer583turqzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5vjaajm</id>
    
      <title type="html">First steps on #nostr Here a essay that i wrote back in 2018 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsyzegsgr7m8pj35snj9m65qqlg38relcfvjxc3m9m3xuer583turqzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5vjaajm" />
    <content type="html">
      First steps on #nostr&lt;br/&gt;&lt;br/&gt;Here a essay that i wrote back in 2018 about #bitcoin and blockchain&lt;br/&gt;&lt;br/&gt;Handwritten, no #AI no B/S&lt;br/&gt;&lt;br/&gt;Was my  FINAL THESIS for The Fullfillment of my Unlimted #merchant #navy #captain license&lt;br/&gt;&lt;br/&gt;may you enjoy, share, spread&lt;br/&gt;&lt;br/&gt;Ideal to #orangepill a #onboard newbies from different horizons&lt;br/&gt;&lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/naddr1qvzqqqr4gupzpz5x9gelyv07n0h23xl0jv6qf7s55tmq8seh0yplk2vn6dk4chx2qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgewaehxw309aex2mrp0yh8xmn0wf6zuum0vd5kzmp0qy88wumn8ghj7mn0wvhxcmmv9uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qgswaehxw309ahx7um5wghx6mmd9uq3wamnwvaz7tmfde3x77pwv9a85ctdduhxuet59uqpxmtwvcenxamk09hnv6nvwaerxetvxekqju79qk&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;naddr1qv…79qk&lt;/a&gt;&lt;/span&gt; &lt;/div&gt; &lt;p&gt;&lt;strong&gt;BLOCKCHAIN TECHNOLOGY&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Decentralization • Cryptography • Security&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Full 2018 Thesis by Cryptos Captain (@bitcoinizeme)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Original 29-page document • March 2018&lt;/strong&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h3 id=&#34;abstract-2&#34;&gt;Abstract&lt;/h3&gt;

&lt;p&gt;It is no longer possible to ignore the digital economy and its implications in the modern world. We live in a world where information technology (IT) is playing an increasingly significant role in our economic system. The volume and value of data exchanged daily are growing, as is the threat of data theft or corruption. The centralization of the internet and corporate networks is a major concern. In response to this problem, a new technology emerged in 2009: the BLOCKCHAIN. With the goal of securing the exchange of data through the decentralization of networks and the use of cryptography to protect it, blockchain technology can no longer be ignored and must be implemented in the industry to provide the security it requires.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Keywords:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;-BLOCKCHAIN&lt;/p&gt;

&lt;p&gt;-DECENTRALIZATION&lt;/p&gt;

&lt;p&gt;-CRYPTOGRAPHY&lt;/p&gt;

&lt;p&gt;-NETWORK&lt;/p&gt;

&lt;p&gt;-DATA&lt;/p&gt;

&lt;hr&gt;

&lt;h3 id=&#34;summary-2&#34;&gt;Summary&lt;/h3&gt;

&lt;p&gt;We can no longer ignore the digital economy and its implications in the modern world. We live in a world where information technology plays an increasingly important role in our economic system. The volume of DATA exchanged daily continues to grow, as do the threats of corruption or theft of that data. The centralization of the internet and corporate networks is a weakness. In response to this problem, a new technology emerged in 2009: BLOCKCHAIN. With the goal of securing and ensuring the reliability of DATA exchanges through the DECENTRALIZATION of NETWORKS and the use of CRYPTOGRAPHY to secure them, BLOCKCHAIN technology cannot be ignored and must be implemented by industries to provide the level of security they need.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Keywords:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;-BLOCKCHAIN&lt;/p&gt;

&lt;p&gt;-DECENTRALIZATION&lt;/p&gt;

&lt;p&gt;-CRYPTOGRAPHY&lt;/p&gt;

&lt;p&gt;-GLOBAL NETWORK&lt;/p&gt;

&lt;p&gt;-DATA&lt;/p&gt;

&lt;hr&gt;

&lt;h3 id=&#34;overview-2&#34;&gt;Overview&lt;/h3&gt;

&lt;p&gt;In the first part, we will first address the prerequisites for understanding blockchain technology. This involves fully understanding the challenges of CRYPTOGRAPHY in an organized society based on the exchange of information. Modern communication channels (NETWORKS), including the internet, are weak points in our system and must evolve. We will detail the various encryption methods and network systems, as well as methods for validating information.&lt;/p&gt;

&lt;p&gt;In the second part, we will explain blockchain technology in detail, clearly distinguishing between the two distinct types that exist. These are two different ways of operating a blockchain, and it is important to differentiate between them. To do this, we will explain the fundamental operations of the various blockchains that exist today by exploring the innovations that have emerged in chronological order: Bitcoin and Ethereum for so-called “Proof of Work” blockchains, and those resulting from the latest innovations in this technology, known as “Proof of Stake,” each using a different method to validate the entry of new data into the blockchain. One of the most notable innovations is the creation of SMART CONTRACTS, or autonomous “smart” contracts, which enable the integration of computer programs into the blockchain—a development with significant potential.&lt;/p&gt;

&lt;p&gt;Finally, in the last section, we will discuss the potential applications and challenges of such technology and the innovations it could bring to the world of maritime transport.&lt;/p&gt;

&lt;hr&gt;

&lt;h3 id=&#34;introduction-3&#34;&gt;INTRODUCTION&lt;/h3&gt;

&lt;p&gt;All aspects of society are supported by digital technologies (economy, finance, media, industry, communications, etc.). These functions are therefore particularly vulnerable to malfunctions and malicious acts (hacking). Cybersecurity has thus become a critical issue for global stability. The collection, processing, and trading of personal data (Big Data) fall under this same issue. In 2009, the first digital currency (Bitcoin) emerged from the creation of blockchain technology, which uses cryptography and decentralized networks to secure and ensure the reliability of digital data exchanges through the principles of consensus and network decentralization.&lt;/p&gt;

&lt;p&gt;Digital networks and data are ubiquitous in our daily lives, both professionally and privately. This revolution began with the invention of the personal computer and gained momentum with the advent of the internet, connecting them worldwide. The acceleration of data exchange and the increasing volume of data generated by our activities continue to grow alongside the rise in computing power and the bandwidth of wired (fiber) and wireless networks (4G, Wi-Fi, etc.). We emphasize here that these technical advances are certainly welcome, as they enable the emergence of a new Information Economy, but they are not without their drawbacks. In the private sphere, our personal information is now traded like any other commodity, and we never benefit from the sale of our own data. In the professional sphere, these technologies enable the optimization of production, monitoring, and distribution through technical innovations specific to each field. We are able to produce more, faster, and with fewer human and material resources, and to adapt production flows to demand. Our society operates on a just-in-time basis, with minimal inventory.&lt;/p&gt;

&lt;p&gt;Distances are shrinking, and we’ve even reached a point where surgeons can perform operations remotely thanks to a global ultra-fast communication network and advances in robotics. We are thus entering an era where digital technology dominates every field: social media and online platforms are revolutionizing the way we think, act, and stay informed, significantly altering our habits. We are increasingly relying on technology for all our daily tasks as well as our professional activities, and every day we witness the shift toward digital interactions at the expense of physical ones. It is therefore necessary to examine the flaws and weaknesses of such technologies, as their impact on the physical, economic, and social worlds could be catastrophic. Indeed, we can easily envision the dangers that digital piracy—or “hacking”—can pose in a world entirely governed by digital technology. It is therefore legitimate and necessary to find adequate solutions to secure our digital communications and data systems.&lt;/p&gt;

&lt;p&gt;A few early examples serve as warnings about the dangers we face by placing blind trust in computer systems and communication networks. No computer is ever immune to a &amp;#34;bug&amp;#34; (internal threat), and data exchange networks can easily be compromised unintentionally (network malfunctions, electromagnetic interference) or intentionally (malicious acts). Furthermore, these networks are a major concern in the event of conflict between nations due to their vulnerabilities.&lt;/p&gt;

&lt;p&gt;The current model of the internet and corporate networks is known as “centralized,” meaning that users do not communicate directly with one another but rather through a central server; which is also the model of the Cloud, highly popular in recent years. This model is particularly vulnerable to attacks because by attacking the central computer, one gains control of the entire network. We have witnessed a resurgence of large-scale, organized hacking operations (digital warfare), such as the hacking of the Pentagon and Sony, the “CryptoLocker” virus that affected many large companies, and the “Stuxnet” virus that targets the computer systems managing factories uranium enrichment, etc. We are also seeing an increase in the theft of personal data for financial gain, which clearly illustrates the emergence of “digital wealth.” In this study, we will therefore examine a technological innovation that could represent a revolution as significant as the advent of the internet to help us combat piracy and protect data, communications, and computer networks: BLOCKCHAIN technology, derived from cryptography and the use of a decentralized network. This technology, brought to light in 2009 by the arrival of Bitcoin—which could simply be summarized as a digital commodity. In this study, we are not focusing on Bitcoin itself but on the innovative underlying technology it utilizes. We will demonstrate that this technology can be an effective tool for addressing the issues outlined above, as well as the negative aspects that may result from it. To do so, it is necessary to explain its fundamental operating principles in order to highlight both its strengths and its weaknesses. We cannot ignore this technological innovation today, as it is still in its infancy.&lt;/p&gt;

&lt;p&gt;The fundamental problem solved by blockchain technology concerns the validation of new data entries in a decentralized network. In this study, we will focus on explaining the various validation methods and outlining their advantages and disadvantages. This technology is a combination of two pre-existing technologies: cryptography and decentralized networks.&lt;/p&gt;

&lt;hr&gt;

&lt;h3 id=&#34;part-1-basic-concepts-for-understanding-blockchain-technology-2&#34;&gt;PART 1 - BASIC CONCEPTS FOR UNDERSTANDING BLOCKCHAIN TECHNOLOGY&lt;/h3&gt;

&lt;h4 id=&#34;1-introduction-to-cryptography-2&#34;&gt;1. Introduction to Cryptography&lt;/h4&gt;

&lt;p&gt;The principle of cryptography—a word derived from the Greek kyptos (secret) and graphein (to write)—and cryptology, which additionally encompasses the study and decoding of encrypted messages, has been in use since ancient times, long before the advent of the computer age. The principle involves transforming a plaintext message into an encrypted message and then being able to perform the reverse operation so that only the intended recipient can receive the relevant information. We can therefore immediately see the value of this in military and commercial fields to ensure the authentication of the parties involved and the confidentiality of operations. Indeed, as far back as ancient times, there was the issue of the messenger who physically transported important documents between two parties—by land or sea—and who was not authorized to know the information but only to transmit it; the question of the physical and moral integrity of the person entrusted with such a mission was already being raised.&lt;/p&gt;

&lt;p&gt;Today, we can draw a parallel between the role of the messenger and that of the Internet. Cryptography ensures that only the recipient, who knows the decryption key, can view the document. The first question we might ask is this: if the encrypted message is transmitted by a messenger, the recipient must also have the information necessary to decrypt the message, which implies that they must also receive the encryption key and the process used—but through which medium? For if we use the same medium as the communication for the encrypted message and the means to decrypt it are compromised, we are exposed to a major risk. It follows that this science is essential to the proper functioning of an organized and secure society, whether for military, financial, diplomatic, commercial, or private communications, as it enables us to counter potential disruptive elements and threats—both internal and external (such as a messenger who is corrupt or intercepted by the enemy). It has influenced the course of history for many civilizations: whoever possessed the highest level of confidentiality had the advantage. Each era saw different tricks for transmitting coded messages. Nebuchadnezzar would shave his soldiers’ heads, write a message on them, and wait for the hair to grow back before sending them to deliver the message. The oldest evidence of the use of an encryption system dates back to 2000 BC among the Egyptians; all major civilizations practiced the art of cryptography without considering it a science, yet its evolution and sophistication have been constant throughout the ages. The discovery of mathematics and its evolution have made it possible to develop increasingly complex and sophisticated encryption techniques. On the other hand, our analytical capabilities have also improved over time, rendering earlier encryption systems obsolete. This is therefore a veritable information war that has been ongoing throughout history.&lt;/p&gt;

&lt;p&gt;When a code is cracked, we must invent a new one—one that is increasingly complex as our analytical and mathematical capabilities and knowledge advance. It is therefore not a passive art but a true, living, and evolving science. In our modern world, and since the advent of computing, we have developed more sophisticated encryption systems, but the analytical capabilities of our ever-more-powerful computers also make them more vulnerable. It is therefore necessary to focus on more innovative techniques capable of withstanding the new analytical tools at our disposal. Claude Elwood SHANNON can be considered the father of modern cryptography. His remarkable work has enabled major advances in the fields of computer science and cryptanalysis during the 21st century.&lt;/p&gt;

&lt;h4 id=&#34;2-the-different-types-of-encryption-2&#34;&gt;2. The Different Types of Encryption&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;2.2 Symmetric encryption&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is the most basic and widely used encryption method. It consists of several distinct methods that can be combined:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Substitutions: characters are replaced one by one with others (a single character can be replaced by multiple characters; this is known as a polyalphabetic substitution)&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Transpositions: Characters are swapped without changing them.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These encryption methods can be applied character by character (or bit by bit) or in blocks of data. The encryption and decryption method is implemented by an algorithm that the sender and receiver must agree upon. It is then necessary to share the encryption/decryption key, which contains the information detailing how this algorithm is applied, specific to each encryption. Three pieces of information are therefore required to share an encrypted message: the encrypted message itself, the encryption algorithm, and the decryption key. However, if the same network is used to share them, there is a risk of corruption of the information, or even the complete interception of the message by an unauthorized third party, which renders this method ineffective.&lt;/p&gt;

&lt;p&gt;If, in addition to the encrypted message, one possesses the encryption algorithm used, it is sufficient to try all possible key permutations one by one, which is now possible thanks to the vast computing power at our disposal.&lt;/p&gt;

&lt;p&gt;The flaws in this method stem from the fact that the same key is used to encrypt and decrypt the message, and that if one wishes to guard against any possibility of the message being hacked, it is preferable to use a key of a length equivalent to the message. This implies that both the encrypted message and its encryption/decryption key must be transmitted, which poses a technical problem: the key must be delivered in person or via another secure method; it would be impractical to use the same transmission network for both the message and its key. The second problem is the size of the key, which must increase with the size of the message: it therefore becomes difficult to encrypt long and complex messages. To address this problem, one can combine a symmetric cryptographic function with a hash function, which we will discuss later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2.3 Asymmetric encryption&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Asymmetric encryption does not use the same key for encryption and decryption. To exchange encrypted messages or information back and forth between two people, four keys are required; they work in pairs, with each participant in the exchange possessing one. Each pair consists of two keys: a public key, which is shared with the recipient, and a private key, which must remain solely in the possession of its owner.&lt;/p&gt;

&lt;p&gt;The private key is paired with a public key. The public key is used to encrypt the message, which only the associated private key can decrypt. The public key can therefore be safely shared over the same network, while the private key must remain strictly isolated.&lt;/p&gt;

&lt;p&gt;Let’s take a simple example of an exchange between Bob and Alice.&lt;/p&gt;

&lt;p&gt;Bob must have:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;His own private key and Alice’s public key.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Alice must have, in turn:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Her private key and Bob’s public key.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Bob, who wants to send a message to Alice, will therefore use Alice’s public key to encrypt the message, which only Alice can decrypt using her private key.&lt;/p&gt;

&lt;p&gt;We can therefore conclude that the asymmetric encryption system is more secure because the private key of each person participating in the exchange is not shared over the network and remains strictly personal. Furthermore, even if the message is intercepted by a third party who knows the algorithm used, it is much more complex to decrypt the message by trying all possible keys, as the possibilities are infinite. This method is now the standard security protocol in use. An interesting feature is the ability to sign a message. The sender signs the message using their private key. The recipient, who holds the sender’s public key, can then verify the message’s authenticity.&lt;/p&gt;

&lt;h4 id=&#34;3-digital-networks-and-different-methods-of-information-transmission-2&#34;&gt;3. Digital Networks and Different Methods of Information Transmission&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;3.1 The so-called conventional centralized network (Client-Server)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is a network in which the user connects to a single central server via a device called a client or terminal. The server transmits information to the terminal (website, Minitel) via a communication channel (cable or wireless). The server may also function to connect one client with another (Internet, telephone, telegram). For this to work, there must be two-way communication between the server and the client. The client sends a request to the server, and the server responds by sending the requested information to the client. The server and client must speak the same language; this is referred to as a protocol. This is a so-called centralized system because there is a single server or database, and the multiple clients do not communicate directly with each other but only via the server.&lt;/p&gt;

&lt;p&gt;This is the classic structure of corporate intranets and the internet. This system is highly vulnerable to DDoS attacks, as all it takes is to overwhelm the single server with excessive requests by simulating a multitude of clients to take it offline; all clients find themselves isolated, unable to communicate with one another independently of the server. Centralized networks are also highly vulnerable to man-in-the-middle attacks; a hacker need only mimic a bank’s webpage and insert it between the client and the server—the victim then believes they are on the legitimate site and enters their password, by which point it is too late. It is easy to see that “cloud” technology, based on this principle and which was all the rage until recently, is already completely outdated due to the flaws in this system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3.2 The decentralized network (P2P)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is a network in which all machines are interconnected; it is referred to as a P2P (Peer-to-Peer) network. Information is no longer stored on a central server but on every machine in the network. Each machine is connected to N other machines. Thus, any new information entered on one of the network&amp;#39;s machines is transmitted to a considerable number of machines within a few microseconds. For example, if each machine is connected to 20 other machines, the information is distributed across 3,200,000 machines after 5 levels of propagation.&lt;/p&gt;

&lt;p&gt;A machine that is part of a P2P network is called a node and serves as both a client and a server.&lt;/p&gt;

&lt;p&gt;One of the first public P2P networks, Napster, was launched in 2001. It was used to illegally share music. Shortly thereafter, the University of Cambridge developed the TOR (The Onion Router) system, based on the P2P principle, which was notably used and funded by U.S. intelligence agencies to enable opponents of dictatorships to communicate with the free world. Today, TOR is the foundation of the Dark Web, used both for criminal activities and, as before, by opponents of totalitarian regimes or institutions to communicate with the free world.&lt;/p&gt;

&lt;p&gt;The information propagation tree is so complex that it is difficult to trace the source.&lt;/p&gt;

&lt;h4 id=&#34;4-validation-and-integrity-checking-of-information-in-a-decentralized-network-2&#34;&gt;4. Validation and integrity checking of information in a decentralized network&lt;/h4&gt;

&lt;p&gt;The consensus principle refers to the way in which members of a network validate the entry of new data into a database shared by a decentralized network.&lt;/p&gt;

&lt;p&gt;We can imagine a democratic voting system in which at least 50% of the machines in the decentralized network must agree to integrate new data into all other machines in the network. Unlike a centralized network, where only the central server has the power to validate new data entries (which makes it highly vulnerable, since if a single server is hacked, thousands of connected “client” machines are infected simultaneously).&lt;/p&gt;

&lt;p&gt;The consensus problem is a hot topic in the blockchain world, and we distinguish between two major schools of thought defining two types of blockchain, each with a different way of reaching consensus. These are PoW (Proof of Work) and PoS (Proof of Stake) systems. The former relies on nodes with high computing power to achieve consensus, while the latter relies on so-called validator nodes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4.1 The Byzantine Generals’ Problem&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There is a fundamental technical problem in achieving consensus in a decentralized network, where each node stores a shared ledger: how can we ensure that a node has not been compromised and is not holding or disseminating a corrupted or compromised ledger? In a centralized network, on the other hand, it is sufficient to monitor a single machine—the central server. This problem was expertly illustrated in a 1982 paper written by LESLIE LAMPORT, ROBERT SHOSTAK, and MARSHALL PEASE, and it is known as the “Byzantine Generals’ Problem,” which originally addressed the same issue but concerning the internal operation of a machine (communication between computer components), a concept that can be extended to an entire network.&lt;/p&gt;

&lt;p&gt;If generals, communicating solely via a network or messengers, wish to attack the same city, how can they ensure they receive and transmit to all their colleagues and that these orders are consistent and accurate? How can they be sure that one of them is not a traitor or that one of the messengers is corrupt and transmits false orders?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4.2 The hash function&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A hash function is a function that takes a string of any length as an argument and returns a string of fixed length (the hash); the probability that two different strings will produce the same &amp;#34;hash&amp;#34; is infinitesimally small, but not zero; this is referred to as a collision.&lt;/p&gt;

&lt;p&gt;The goal here is to transform the raw data to be processed into a fixed-length sequence of alphanumeric characters. Thanks to hash functions, any message of variable length can be reduced to a sequence of alphanumeric characters whose length is determined by the hash algorithm used. The result obtained is called a HASH. Whether it is the message “hello world” or an entire book, the resulting HASH will be the same length.&lt;/p&gt;

&lt;p&gt;Thus, it is sufficient to verify the hash of received information to ensure that the text is exactly identical to the text sent (a single comma or space in a 1,000-page text will produce a completely different hash). The difference lies in the time required to compress a short piece of information compared to an entire book.&lt;/p&gt;

&lt;p&gt;Take, for example, the SHA256 algorithm used by Bitcoin:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The string &amp;#34;Hello world&amp;#34; is represented in hexadecimal as F0DA559EA59CED68B4D657496BEE9753C0447D70702AF1A351C7577226D97723&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The text of this entire thesis would be represented as 6c75d2c729776f53b846d021ef01f5ff195fbe970811a867bd395f3270b9fc19&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It follows that using a hash algorithm also allows us to verify the integrity of the information contained in a transmission. For example, if we want to ensure the integrity of this thesis after receiving it via the internet, we simply need to convert the received file to SHA256 and compare the result with the expression given above. This principle replaces the CHECKSUM, which simply sums all the 0s and 1s comprising a digitized text but has a very high “collision rate”: two completely different texts can produce the same checksum. Using a hash provides considerable time savings and increased reliability in the process of verifying information integrity. There is no need to compare this document with an original word for word when it is sufficient to generate a hash; with the average computing power available to us—such as that of a smartphone—this is enough to arrive at the same result. Note that the HASH function is a cryptographic function; it is impossible to reverse the operation and go from an SHA256 hash to the original message. The ability of a processor to perform multiple iterations of a hash function is called the hashrate and is measured in hashes per second.&lt;/p&gt;

&lt;hr&gt;

&lt;h3 id=&#34;part-2-description-of-blockchains-2&#34;&gt;PART 2 - DESCRIPTION OF BLOCKCHAINS&lt;/h3&gt;

&lt;h4 id=&#34;1-general-explanation-2&#34;&gt;1. General explanation&lt;/h4&gt;

&lt;p&gt;Consensus is a fundamental issue in a decentralized computer system that can be likened to an autonomous ecosystem. How can we ensure that all nodes in a network accept and integrate data in a coordinated and symmetrical manner? The system, in its entirety, must be capable of detecting a malicious attempt to introduce corrupted or altered data into the network (and thus hijack the system). Unlike a centralized database, where a single central server simply verifies new information to be integrated, in a blockchain, consensus must be reached autonomously: the decentralized network must be capable of governing itself and determining on its own whether any new data to be integrated is correct and valid before propagating it to all nodes. To achieve this, the technology known as BLOCKCHAIN was developed: The data shared by the network&amp;#39;s nodes is divided over time into BLOCKS. The BLOCKCHAIN can be likened to a living database that is built BLOCK by BLOCK. Starting from an initial BLOCK called the &amp;#34;GENESIS BLOCK,&amp;#34; which must be shared between at least two machines (otherwise, there would be no point in calling it a network), a blockchain is built through a succession of blocks assembled one after another as the database assimilates new information.&lt;/p&gt;

&lt;p&gt;A blockchain is chronological, and past blocks are immutable. It is impossible to modify a block once it has been validated and integrated into a blockchain.&lt;/p&gt;

&lt;p&gt;Blockchain is the fusion of two technologies: cryptography (which enables consensus) and a decentralized network (which serves as a platform for exchanging information). A blockchain is an interactive and scalable database defined by initial, immutable parameters contained within its genesis block.&lt;/p&gt;

&lt;p&gt;A blockchain can therefore be used for numerous applications where data integrity and preservation are paramount. For example, a global and independent monetary system (BITCOIN), but it is also highly relevant for managing any global computing system involving a large number of machines, such as the IoT (Internet of Things), the management of complex industrial systems forming a network, or a fleet of drones or robots that must cooperate with one another. We understand that the security of such systems is paramount.&lt;/p&gt;

&lt;p&gt;There are two main families of blockchain, each with a different method of reaching consensus:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Proof-of-Work blockchains, which use mining as their consensus mechanism. The more computing power dedicated to mining, the more secure the network.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Proof of Stake blockchains: there is no mining; consensus relies on master nodes that the network trusts. In the case of a cryptocurrency, these are nodes holding a large amount of the currency, making an attack very costly.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4 id=&#34;2-proof-of-work-pow-blockchains-2&#34;&gt;2. Proof of Work (PoW) Blockchains&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;2.1 General Functioning of the Bitcoin (PoW) Blockchain&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Why a decentralized blockchain instead of a centralized local database? Let’s take a closer look at Bitcoin and the motivations of its mysterious inventor, setting aside its financial and economic aspects for the moment. Although its inventor, Satoshi Nakamoto, has never come forward, there are traces of the thinking that led to the creation of the first blockchain and the rationale behind the technical solutions implemented to meet the specifications for creating an international, autonomous virtual currency without a regulatory body. This consists of an exchange of 15 emails between the inventor and a group of cryptography enthusiasts in response to an initial document called a whitepaper (a term now commonly used to define the basic principles of a blockchain).&lt;/p&gt;

&lt;p&gt;The principle was to create a decentralized network enabling transactions to be carried out in an irreversible, reliable, and secure manner. This decentralized network consists of nodes sharing a common transaction ledger, a copy of which is stored in the memory of each node. The principles outlined are simple: double-spending must be impossible; usage must be anonymous; no central authority or third party controls the circulating supply or the issuance of new BITCOINS; but there are defined basic rules that cannot be changed (total number of bitcoins, number of bitcoins generated per block, etc.).&lt;/p&gt;

&lt;p&gt;Satoshi Nakamoto addresses this problem with an innovation: blockchain technology.&lt;/p&gt;

&lt;p&gt;A blockchain is a combination of two existing technologies: cryptography and peer-to-peer networks. Cryptography allows both for verifying transactions and authenticating each node (member) of the network, which has its own public key (address or account number) and a private key (password) that grants permission to send data over the network from that address—or, in the case of Bitcoin, to make a transaction. The Bitcoin blockchain is simply a ledger of verified and validated transactions between one or more addresses, recorded in blocks linked together chronologically to form a chain of blocks. Each node therefore knows the state of the ledger at any given moment ‘T’ and knows the credit balance of each address. In the Bitcoin system, debt does not exist.&lt;/p&gt;

&lt;p&gt;The blockchain is the result of two distinct mechanisms characterized by two types of nodes that it is important to differentiate:&lt;/p&gt;

&lt;p&gt;Each node can be:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;As a simple &amp;#34;Peer&amp;#34; whose sole role is to relay data within the information chain and store the block history, it uses only its network resources—namely, its internet bandwidth and memory. A simple Peer receives no compensation for its contribution. A Peer-type node participates solely in the decentralized network aspect of the blockchain.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Alternatively, it can also contribute its computing power to participate in the validation process of new transactions by solving a (SHA256); such a node is called a ‘miner’ and is rewarded “reward” in the form of transaction fees and also newly generated bitcoins for making its computing power available. These nodes are called MINERS. It is the miners who perform the cryptographic and hashing functions of blockchain technology.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is known as mining: high-performance processors are dedicated to this task and apply a specific encryption algorithm (SHA256), and the “winning” computing unit—the first to verify and validate the correct block—is awarded the new Bitcoins generated as a reward for participating in the transaction validation process. The new, validated, and verified block is then integrated by all network members through exponential propagation. The use of a hash algorithm during this process also allows for data compression, so the blocks are lighter compared to a raw database. We refer to it as a blockchain because it is, in fact, a chain of several blocks linked together. Two major advantages of this technology emerge from this explanation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The first is that the database, the blockchain, is DECENTRALIZED, because each node in the network has a copy of it in its memory, which implies that there are as many up-to-date backups as there are nodes in the network, and that 100% of the nodes would have to be destroyed to alter the transaction history. This is in contrast to a database at a bank or a company, which has only a few backups on centralized servers and is therefore vulnerable.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The second reason is that, thanks to mining, it is difficult to interact with the blockchain in a malicious way, as the computational power used to run the encryption and verification algorithms acts as a guarantor of the network’s and information’s integrity. To insert a fraudulent transaction into the next block, a hacker must therefore control more than 50% of the mining power. Since this power is itself decentralized, it is highly unlikely that a hacker could mobilize thousands of computing units distributed globally and simultaneously. This is what we call a 51% attack.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In a PoW-type blockchain, miners are responsible for validating and confirming the entry of new data into the network. To do this, they use a specific cryptographic algorithm applied by high-performance computing processors. Miners therefore apply a cascading hash function. A data packet is first hashed, and the resulting hash is then hashed again. This operation is repeated as many times as necessary until the desired result (target) is obtained. That is, until a hash is reached that meets the required specifications (target). Since a hash has a fixed length, the more characters defined in the sequence, the more difficult it will be to find a hash that matches the target data block. This is the concept of mining difficulty: a certain number of zeros is required at the beginning of a block’s hash, so miners compete to transform the data packet of the future block—which includes transactions—into a hash whose beginning contains a certain number of zeros. The more zeros required at the beginning of the hash, the fewer solutions corresponding to the same message there are, and the more miners must increase the number of iterations of the hash function to “win” and find the block that will be selected as valid. The higher a miner’s hashrate (hashes per second), the greater their chance of obtaining the correct result within the allotted time. This defines the concept of “mining difficulty.” Difficulty is a key parameter in the operation of a PoW blockchain. It is adaptive and varies over time. The shorter the interval between two blocks, the more power (hashrate) is required to win the block. On the other hand, the more miners there are, the higher the difficulty becomes. We can draw an analogy with mining for minerals: Since the amount of ore in a mine is fixed, the more excavators in operation and the faster they are, the less ore each individual machine extracts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2.2 The Ethereum blockchain (Proof of Work with smart contracts)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ETHEREUM represents the second major evolution of PoW blockchain technology. Developed in 2015 by Vitalik Buterin, then 21 years old, through a new type of crowdfunding called an ICO (Initial Coin Offering). The principle is simple: a portion of the currency is created in advance and distributed to investors in exchange for their financial contribution. The currency in question has no value until a market is established and a price is set based on the principle of supply and demand. The subsequent issuance of the currency is created through mining, and there is no limit on the maximum number of Ethereum that can be created. It should be noted that this blockchain is the one undergoing the most intensive ongoing development, and long-term plans include phasing out mining and transitioning to a hybrid PoS system. Like Bitcoin, whose potential future developments are restricted by the initial rules, which are difficult to modify, and the absence of a central authority to oversee changes.&lt;/p&gt;

&lt;p&gt;The two main innovations revealed by Vitalik Buterin are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The ability to create so-called &amp;#34;smart contracts.&amp;#34; This means that computer code can be integrated into the blockchain, opening up a multitude of new possibilities that we will explore throughout this paper; this is the most interesting aspect of this new technology. The main benefit of integrating programs into a blockchain is to take advantage of its high level of security, but above all its irreversibility. Once a Smart Contract is launched, it is impossible (unless initially designed to allow it) to modify it. This is the most promising innovation of this technology, which has a very wide range of applications. We can already think of them as digital contracts binding two parties in a digital and unalterable manner (unless the option is selected). One example is an insurance contract where the coverage amount is locked in advance as long as the premium is paid. The contract can be programmed to cancel the coverage in the event of non-payment of the premium or to automatically pay out the coverage if predefined conditions are met. This system eliminates the need for a supervisory authority or potential legal recourse. The role of a SMART CONTRACTS programmer can be likened to that of a notary.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The creation of smart contracts opens up a second opportunity: the creation of tokens. Tokens are alternative currencies that can be created on the Ethereum network: transaction security and support are provided by the Ethereum platform itself, but tokens cannot be mined; the total number of tokens to be generated is defined in the initial smart contract. Transaction fees are paid in Ethereum to compensate miners. A company can thus create and generate tokens that will then be used as a medium of exchange within its own ecosystem (such as a loyalty points system for retail, for example) and distribute them as it sees fit to its customers, or even become directly tradable as a commodity on the cryptocurrency market.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The invention of the token, in turn, sparked a new revolution, inspired by Ethereum’s funding method: ICOs. An entrepreneur with a business project outlined in a “whitepaper”—a reference to the document that gave birth to Bitcoin—can then, instead of seeking a bank loan or direct investors, create their own token, which represents the company’s capital as divisible and tradable units. Given the lack of traditional regulation and the fact that institutions have not yet enacted legislation on this matter, the tokens sold are neither securities nor shares, but in some cases may serve the same purpose. This lack of regulation has led, over the past two years, to a record number of fraudulent ICOs that never gave rise to actual companies but nevertheless raised hundreds of millions of dollars in some cases. This new method can be called decentralized crowdfunding. This is what has driven the blockchain economy over the past three years, with the emergence of hundreds of directly tradable tokens.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;2.3 The Drawbacks of PoW Technology&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Although PoW-type blockchains are currently the most secure thanks to mining, their future remains uncertain due to the high energy consumption of the computing units that validate transactions. For Bitcoin alone, current consumption is approximately 50 TWh/year. Given that an average power plant produces about 7 TWh/year, this means that 7 nuclear power plants currently supply energy to the Bitcoin network. And 10 TWh/year for the Ethereum blockchain. This is not sustainable in the long term, given the urgent need to reduce our energy consumption for the sake of our well-being and that of the planet.&lt;/p&gt;

&lt;p&gt;Furthermore, this system was supposed to be decentralized, meaning that no single entity should be able to control more than 50% of the mining capacity. However, China remains to this day the leading country that produces, sells, and uses specialized mining hardware known as “ASICs” or “Application Specific Integrated Circuits,” which are processors designed solely for a specific algorithm and can perform only that task. They are more energy-efficient than CPUs (originally used for mining) or GPUs. There is therefore a risk of deregulation and centralization of blockchains by the very firms that produce this type of hardware.&lt;/p&gt;

&lt;h4 id=&#34;3-proof-of-stake-pos-blockchains-2&#34;&gt;3. Proof of Stake (PoS) blockchains&lt;/h4&gt;

&lt;p&gt;This is the latest form of blockchain, which, given the enormous energy consumption of PoW blockchain mining, holds great promise for the future, especially if the use of this technology becomes more widespread. It is difficult to fully grasp this technology, which is even newer and still in the midst of development. Depending on the various blockchains, consensus is achieved not by mining nodes but by “masternodes,” which must hold a large amount of the cryptocurrency in question. The principle for guarding against a 51% attack is the same as for mining: a hacker must take control of more than half of the masternodes to corrupt the network, which is not beneficial, as the price of the currency would plummet and the attack would cost more than it yields. Some blockchains, such as NEO, are community-driven: to become a masternode, one must also be elected through a democratic voting process in addition to holding a significant amount of NEO. The NEO and CARDANO blockchains are among the most advanced in PoS and incorporate innovations from Ethereum: the ability to create smart contracts and tokens; however, many new projects are emerging. Other Proof of Stake systems exist that are more or less centralized by a regulatory body and focus on data exchange in the broadest sense of the term.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ripple (an independent company) manages its own network using several central servers over which it maintains control. Technologies derived from the Ripple system have recently taken center stage, with contracts signed with major credit card companies as well as certain large banks with international interests. The Ripple network aims to compete with the SWIFT interbank payment system.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Banks tend to favor centralized systems over self-regulated ones, as they guarantee greater anonymity and potential oversight over the system as a whole.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Hyperledger Fabric, whose development was initiated by IBM, aims to create a network of private blockchains tailored to the diverse needs of businesses worldwide. Its development follows the principles of Linux, with which it shares the programming language and the concept of open source, allowing anyone to participate and enhance the system with new features and improvements. The main advantages of this system ensures the confidentiality of data exchanges, with access that can be controlled as needed.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The R3 or Corda consortium, created by banking institutions with significant investment in response to the emergence of blockchain technology. Its development and technology are deliberately kept opaque. For banks, this is an effort to catch up with blockchain technology.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4 id=&#34;4-conclusion-on-the-different-types-of-blockchain-2&#34;&gt;4. Conclusion on the different types of blockchain&lt;/h4&gt;

&lt;p&gt;We can therefore see that since the creation of the first blockchain, Bitcoin, a true ecosystem has taken shape. This is true both financially—with a marketplace and significant liquidity at stake that can now be easily converted into fiat currencies and vice versa—and in terms of the development of this technology by major firms, non-profit organizations, banking consortia, and large corporations. It is becoming clear that the advent of a new information age cannot be overlooked and that society’s key players cannot ignore it. The challenge lies in developing and adapting this technology to the real world and its needs. The maritime sector, which plays a central role in the exchange of resources and, more broadly, the world of transportation, cannot remain on the sidelines and must also embrace and utilize this new technology. We have seen previously that PoW blockchains, which involve massive computational power and result in excessive energy consumption, are not eco-friendly; however, they currently represent the most secure form of blockchain compared to PoS blockchains, which have yet to prove themselves. We can imagine that the “challenge” of mining could be replaced by computational tasks involving the solution of concrete scientific problems. In this case, the computational power used would be justified by the scientific problems thus solved.&lt;/p&gt;

&lt;hr&gt;

&lt;h3 id=&#34;part-3-the-challenges-and-applications-of-blockchain-technology-2&#34;&gt;PART 3 - THE CHALLENGES AND APPLICATIONS OF BLOCKCHAIN TECHNOLOGY&lt;/h3&gt;

&lt;h4 id=&#34;3-1-general-overview-2&#34;&gt;3.1 General Overview&lt;/h4&gt;

&lt;p&gt;Although Bitcoin is the face of this new industry, its only value lies in its price, which is determined by the difficulty of mining it and its high level of security. Some predict Bitcoin will reach unprecedented heights, while others foresee the opposite. What is truly interesting is the underlying technology with which we are now familiar, particularly SMART CONTRACTS. It is clear that these innovations will begin to emerge in numerous fields, and the dominance of major blockchains is likely to decline in favor of new, more targeted and specialized blockchains (commerce, finance, security and surveillance, private enterprise blockchains, databases). IBM is the first major, well-established company to have believed in the rise of this technology and positioned itself early in this segment, particularly in blockchains dedicated and specialized for business activities—a sort of custom-built blockchain.&lt;/p&gt;

&lt;p&gt;The concept of a “timestamp” is highly valuable in many fields: it allows for the indelible and irreversible dating of a document, a program, or any other digital data. Digital signatures using the enables data authentication.&lt;/p&gt;

&lt;p&gt;The ability to always link this data to its creator or owner via their public key offers a new way to authenticate data or documents, with the advantages of a blockchain: all these details are publicly accessible (or accessible only to authorized users with a private key) while ensuring their permanent immutability over time.&lt;/p&gt;

&lt;p&gt;Information, which is now a major concern, thus becomes easily accessible and protected from any malicious tampering. Sharing is simplified and can be done with complete confidence. The decentralized nature of the system ensures data preservation in the event of any kind of incident (natural disaster, terrorist attack, war, etc.); a single machine is sufficient to recreate the network. We are therefore beginning to envision new applications for this technology: official and administrative documents, which are currently easily forged on paper and even more so in their digital form. The PDF format, for example—which remains the standard for corporate documents and is supposed to make modification impossible or require a password—is now easily hackable.&lt;/p&gt;

&lt;p&gt;The emergence of the IoT¹ (Internet of Things) makes this issue of data and system preservation a major concern.&lt;/p&gt;

&lt;h4 id=&#34;3-2-administrative-aspects-2&#34;&gt;3.2 Administrative aspects&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Monitoring of port state controls: creation of an international registry in the form of a blockchain, publicly accessible for greater transparency (including details of inspections, with data entered instantly and securely by the inspector using their own private key while still on board the vessel).&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Transport documents and contracts: These could then be digitally signed or even directly integrated into an international blockchain in the form of smart contracts. The level of confidentiality can then be set so that each user who logs in using their private key will only see the information relevant to them.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Customs: An international blockchain automatically fed with data from the above, as well as from ship and port reports, would enable more precise, coordinated, and efficient work by government agencies while reducing the number of physical inspections through targeted screening. Fraud would be reduced.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Tracking and authentication of navigation certificates: The Maltese government, Sony, and Fujitsu are already developing a blockchain for certificates. The blockchain’s security level provides guarantees never before achieved by government agencies ‘paper,’ making it possible to instantly verify the validity of a license.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Just as with patents, the numerous official documents on board can also benefit from these advantages, which would greatly simplify the work of administrative bodies and drastically reduce fraud. It is inconceivable to simply “scan” documents and store them in basic databases whose vulnerabilities have been described above.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4 id=&#34;3-3-operational-aspects-2&#34;&gt;3.3 Operational aspects&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The creation of an international registry for tracking ships and sharing data on each vessel—including its position, course, speed, origin, destination, cargo holds, etc.—would provide shipowners, charterers, and other market participants with an instant snapshot of the situation. This would clarify market conditions and offer a reliable database for analyzing medium- and long-term trends. It would also enable terminals to simplify their planning with automatically updated data.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The establishment of a monitoring network for ship maintenance collaboration between ships, shipyards, and shipowners to streamline the process, ensure accurate tracking, and optimize maintenance operations.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The creation of a blockchain dedicated to real-time container tracking, shared by customers and companies across all modes of transport, to optimize routing in a more environmentally friendly and cost-effective manner, provide customers with greater transparency regarding the transport process, and enable them to anticipate delays. For reefer containers, this would allow us to directly assure the customer that temperature guidelines are strictly adhered to throughout the entire transport process. This represents a benefit both for the customer, who can verify the quality of the transport, and for the carrier, who, by providing accurate and impartial data, will be able to justify its rates based on the quality of its services, which customers can assess in real time. Maersk has already developed its own blockchain with the help of IBM; this is the TradeLens system.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4 id=&#34;3-4-economic-and-environmental-aspects-2&#34;&gt;3.4 Economic and environmental aspects&lt;/h4&gt;

&lt;p&gt;Pooling all these potential blockchain capabilities, in turn, offers market players access to a set of reliable, accurate, and immutable data on the state of the global transport industry. The volume of goods in transit can be quantified in real time. If all these systems are implemented and used in synergy, this would optimize the transportation industry on a global scale—a development of great importance, given that transportation is the largest consumer of fossil fuels.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;From an economic standpoint, all stakeholders would benefit from such a decentralized system. Since the flow of goods can be tracked and visualized instantly and accurately, traders will be able to refine their strategies using this data and maximize profits while reducing costs for the end consumer.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;From an environmental perspective, we all stand to gain from optimizing the flow of goods, and even from analyzing this data to define new long-term strategies, identify consumption trends, and protect the environment.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3 id=&#34;conclusion-4&#34;&gt;CONCLUSION&lt;/h3&gt;

&lt;p&gt;It is now essential to adapt to the digitization of transactions, documents, and communications. Today’s computer systems have numerous vulnerabilities that pose a real threat to our interactions, and the repercussions can be significant—whether economic, moral, or political. The survival and evolution of our society today depend on our ability to meet this challenge—that is, to preserve the integrity of the data we generate and exchange every day. The arrival of blockchain comes at just the right time in this race toward progress, but it is still in its infancy. To date, only the financial aspect is beginning to be recognized by the general public, and despite the recent rise of Bitcoin, many major international firms are still unaware of this new field. Only IBM has taken this innovation seriously for several years now, creating a dedicated blockchain laboratory. We will now begin to see major players enter this segment. This still gives innovative researchers and developers the advantage to break through and bring real innovations to this field, enabling the creation of new wealth without necessarily requiring a large budget to achieve it. Thus, small businesses will be able to emerge and take center stage.&lt;/p&gt;

&lt;p&gt;Just as with the advent of the internet, the key players of tomorrow will undoubtedly be those who have successfully embraced this new technology and adapted it to the current needs of our society. The shipping and merchant marine industries are no exception and will inevitably have to adapt, as the rise of BIG DATA affects us as well. Not to mention innovations currently under development, such as automated navigation; even in the industry’s current state, optimizing data flows can bring greater reliability, more transparency for customers and observers, and provide more effective tools to all industry players. However, as with any progress and innovation, it is also important to fully grasp the power of such tools and establish an appropriate regulatory framework to prevent abuse. On the cusp of the arrival of Artificial Intelligence, blockchain technology can be likened to a universal memory. A supercomputer, even one capable of remarkable feats and self-learning, cannot demonstrate intelligence if it lacks memory. A blockchain’s memory is irreversible; once information is recorded and validated, it is impossible to undo. This is why we must be careful about the information we produce and ensure its accuracy, but also ensure that an international legal framework integrates and regulates this technology to prevent any totalitarian abuses and guarantee individual freedoms and free trade.&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;Bibliography&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Cointelegraph. [Online] &lt;a href=&#34;https://cointelegraph.com/&#34;&gt;https://cointelegraph.com/&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Bitcoin Wiki. [Online] &lt;a href=&#34;https://fr.bitcoin.it/wiki/Accueil&#34;&gt;https://fr.bitcoin.it/wiki/Accueil&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Wei Dai. b-money. [Online] 1998. &lt;a href=&#34;http://www.weidai.com&#34;&gt;http://www.weidai.com&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;LESLIE LAMPORT, ROBERT SHOSTAK, and MARSHALL PEASE. The Byzantine Generals&amp;#39; Problem. November 1981.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. 2009. &lt;a href=&#34;https://bitcoin.org/bitcoin.pdf&#34;&gt;https://bitcoin.org/bitcoin.pdf&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Ethereum Foundation. [Online] &lt;a href=&#34;https://ethereum.org/&#34;&gt;https://ethereum.org/&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;#Blockchain #Bitcoin #Nostr #Crypto #SmartContracts #Maritime #Shipping #Decentralization #ProofOfWork #ProofOfStake&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;**npub of the author:&lt;em&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub132rz5vljx8lfhm4gn0hexdqylg229asrcvmhjqlm9xfaxm2utn9qesjhxs&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Kryptos Captain ™ ©®🧙🏻‍♂️⚡🐒 ∞/21M | ▓▓&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub132r…jhxs&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;&lt;/em&gt; @bitcoinizeme&lt;/p&gt;

&lt;p&gt;(original 2018 thesis)&lt;/p&gt;

&lt;p&gt;🚀&lt;/p&gt;

&lt;p&gt;#bitcoin #btc #blockchain #zap #nostr #decentralisation&lt;/p&gt;
 &lt;/blockquote&gt;
    </content>
    <updated>2026-03-31T23:42:58&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqr9zn80r2l6lf202r8pyc5cvtxmkxrt7sr8rwasln87uuragp9kczyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5wgtgjj</id>
    
      <title type="html">🚨🚨🚨JUST IN!🚨🚨🚨 I JUST FOUND #BITCOIN&amp;#39;s ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqr9zn80r2l6lf202r8pyc5cvtxmkxrt7sr8rwasln87uuragp9kczyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5wgtgjj" />
    <content type="html">
      🚨🚨🚨JUST IN!🚨🚨🚨&lt;br/&gt;&lt;br/&gt;I JUST FOUND #BITCOIN&amp;#39;s Creator aka SATOSHI NAKAMOTO&amp;#39;s phone number and it&amp;#39;s located in Island! &lt;a href=&#34;http://bitcoin.org/&#34;&gt;http://bitcoin.org/&lt;/a&gt; was created on 18/08/2008 probably by himself with an anonymous registrar Finally we have a hotline for #bitcoin, so many asked for it.&lt;br/&gt;&lt;br/&gt;#bitcoin #nostr #satoshi #zap #nostr&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://media.openresist.com/23407968c59593cfa4b8b39bbaa94a16a3aa7adbe169dd414564f74d8d7e9251.jpeg&#34;&gt; &lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://media.openresist.com/03e1e84b839d99156462002b12eac5d3924f515171196583243fb6a2c01d83c7.webp&#34;&gt; 
    </content>
    <updated>2026-03-31T19:50:04&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxzldv889lvscm5shpmsfhjyu3ady3p7e099nd4fg4pmga7ega3vczyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5k0he7u</id>
    
      <title type="html">Bitcoiner&amp;#39;s duty ✅📙Orange pilling since 2011📙✅ ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxzldv889lvscm5shpmsfhjyu3ady3p7e099nd4fg4pmga7ega3vczyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5k0he7u" />
    <content type="html">
      Bitcoiner&amp;#39;s duty&lt;br/&gt;&lt;br/&gt;✅📙Orange pilling since 2011📙✅&lt;br/&gt;✅📙Running a node &amp;amp; mining 📙✅&lt;br/&gt;✅📙NOSTR account 📙✅&lt;br/&gt;✅📙Stacking Sats 📙✅&lt;br/&gt;✅📙No Mortage 📙✅&lt;br/&gt;&lt;br/&gt;What else? i Still need to &lt;br/&gt;&lt;br/&gt;🌽Grow my own stufff 🌽&lt;br/&gt;🔱Buy a  sailing yacht 🔱&lt;br/&gt;⚡Stack more sats ⚡&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;#Inbitcoinwetrust #nofiat #bitcoin
    </content>
    <updated>2026-03-31T17:12:37&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsptnplmul0htx6k5nkp0s9necy8gz5nj4e3m2tz5lys9yghtyvlgqzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5ma9uuq</id>
    
      <title type="html">STILL USING #ANDROID? ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsptnplmul0htx6k5nkp0s9necy8gz5nj4e3m2tz5lys9yghtyvlgqzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5ma9uuq" />
    <content type="html">
      STILL USING #ANDROID?&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://media.openresist.com/aafa4205b540eeccc24b52c3e10595b7854c6062cccb9686cef22f20c90e1b59.jpeg&#34;&gt;  &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;GET RID OF GOOGLE !&lt;br/&gt;&lt;br/&gt;More battery life&lt;br/&gt;Smoother, faster&lt;br/&gt;&lt;br/&gt;Use &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1235tem4hfn34edqh8hxfja9amty73998f0eagnuu4zm423s9e8ksdg0ht5&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;GrapheneOS&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1235…0ht5&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;Or if you dont have a compatible phone yet&lt;br/&gt;&lt;br/&gt;switch to &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1xnqqc039vw2w073gjlvmc7hy4g9x9zvlflwqjjmjvg3zcysvmyls44pesw&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;LineageOS&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1xnq…pesw&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;  &lt;img src=&#34;https://media.openresist.com/929f0f5cc1ea9be784e1422044e02e818e31ae94b40936d1873271da8ec6c8d0.jpeg&#34;&gt; &lt;br/&gt;&lt;br/&gt;It&amp;#39;s a good training to free your phone from data slavery&lt;br/&gt;&lt;br/&gt;#DontTrustVerify
    </content>
    <updated>2026-03-31T15:52:53&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswge5el2gxk5m6utc5upalltaphlm6ysdn0yapgwedp5jdcr3u8nczyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5e08nqe</id>
    
      <title type="html">Hello. i used to be active on X. I just left this biased ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswge5el2gxk5m6utc5upalltaphlm6ysdn0yapgwedp5jdcr3u8nczyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5e08nqe" />
    <content type="html">
      Hello.&lt;br/&gt;&lt;br/&gt;i used to be active on X.&lt;br/&gt;&lt;br/&gt;I just left this biased platform.&lt;br/&gt;&lt;br/&gt;I&amp;#39;m in there for crypto related content, but obviously X platform has becomed a scam, fake big accounts dominatig with their scams and extraction schemes.&lt;br/&gt;&lt;br/&gt;Small quality accounts are shadow banned for good&lt;br/&gt;&lt;br/&gt;Only here from now on. &lt;br/&gt;&lt;br/&gt;Let the fun begin&lt;br/&gt;&lt;br/&gt;#bitcoin &lt;br/&gt; &lt;img src=&#34;https://npub132rz5vljx8lfhm4gn0hexdqylg229asrcvmhjqlm9xfaxm2utn9qesjhxs.blossom.band/a1a80fdb8cfcd22c9edf39a7c52b0b95ec4fa2cd69932ed75c68eba0de633330.png&#34;&gt; 
    </content>
    <updated>2025-11-02T20:19:57&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgtsy89uk4fwt7ue3agzse5muen2m6xv9flj72685ga3pxuvatn4gzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5qt5phz</id>
    
      <title type="html">We may have an #Ordinal collection Only way to get onboard will ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgtsy89uk4fwt7ue3agzse5muen2m6xv9flj72685ga3pxuvatn4gzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5qt5phz" />
    <content type="html">
      We may have an #Ordinal collection&lt;br/&gt;&lt;br/&gt;Only way to get onboard will be by #Hodling them&lt;br/&gt;&lt;br/&gt;RT, Retwit for a W/L spot&lt;br/&gt;&lt;br/&gt;#Bitcoin📷📷 #BTC📷📷 #mooncruise #Blockchain #ETFApproval #BULLRUN2024 #Ordinal #OrdinalsNFT #NFT #NFTCommunity #NFT先锋笔 #BRC20 #Giveaway #NFTCommunity #BLOCKLIFE #Ethereum #Solana #Ordinals市场上 #BRC20递归 #NFT全員プレゼント #NFTGiveaway #NFTsale #NFT先锋笔
    </content>
    <updated>2024-01-16T16:34:05&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8m5524lc8rz492fdzatlx6amjw6xadqq6s5ep5vxkgu6xe8phzvgzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv57d64ys</id>
    
      <title type="html">getting so exited about #BRC20 tokens #pepe #ordi #meme HUobi to ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8m5524lc8rz492fdzatlx6amjw6xadqq6s5ep5vxkgu6xe8phzvgzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv57d64ys" />
    <content type="html">
      getting so exited about #BRC20 tokens&lt;br/&gt;&lt;br/&gt;#pepe #ordi #meme&lt;br/&gt;&lt;br/&gt;HUobi to launch first CEX markeplace for #brc20 tokens.&lt;br/&gt;&lt;br/&gt;Looks like $ordi will be listed soon&lt;br/&gt;&lt;br/&gt;already 60m&#43; maketcap&lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2023-04-30T20:45:54&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsw8zd9h9lhezrlytf6mj9enut87j5hygkcwmamxrssf946u9auzhqzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv55zyrl0</id>
    
      <title type="html">Yes we need to onboard as much people as de can</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsw8zd9h9lhezrlytf6mj9enut87j5hygkcwmamxrssf946u9auzhqzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv55zyrl0" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsg8zm5cqmcv248ul3zyt4ac3jrjjvt06sxxjdpnhkn3nkwqcamwksga49zf&#39;&gt;nevent1q…49zf&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Yes we need to onboard as much people as de can
    </content>
    <updated>2023-03-27T10:38:34&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsysjj23dfy8ca95aunkjdj4j5d4kp6p66d4huxy8mtjyenmcsw95gzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5xzxra5</id>
    
      <title>Nostr event nevent1qqsysjj23dfy8ca95aunkjdj4j5d4kp6p66d4huxy8mtjyenmcsw95gzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5xzxra5</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsysjj23dfy8ca95aunkjdj4j5d4kp6p66d4huxy8mtjyenmcsw95gzyz9gv23n7gclaxlw4zd7lye5qnapfghkq0pnw7grlv5e85mdt3wv5xzxra5" />
    <content type="html">
      hello nostr
    </content>
    <updated>2023-03-25T07:20:05&#43;01:00</updated>
  </entry>

</feed>