Cryptosocial
How Cryptocurrencies Are Changing Social Media
Allen Taylor
Cryptosocial: How Cryptocurrencies Are Changing Social Media
10 9 8 7 6 5 4 3 2 1
I dedicate this book to my parents who worked hard all
their lives and got to see their son live his dream.
Description
The year 2020 could go down in history as the social media tipping point.
Facebook and Twitter came under fire for censoring alleged misinforma-
tion related to COVID-19 and presidential election results. Fake news,
fake social media accounts, and data breaches have compromised the
personal information of millions of users worldwide. Facebook is fighting
an antitrust lawsuit while YouTube is losing top creators over its demon-
etization policies.
To save the world from the evil empires of social media, a hero is
rising up from the digital soil. Its superpower is a new technology called
blockchain.
Until recently, cryptocurrencies were of interest primarily to a few
digital nerds, a handful of financial renegades, and libertarian idealists
with a lot of time on their hands. Cryptosocial: How Cryptocurrencies Are
Changing Social Media deconstructs the ideas and ideologies that underlie
the hype and keep bitcoin trending. It shows how the strengths and weak-
nesses of the new platforms and protocols are embedded in the features
of the technology itself. Far from being a glossy-eyed evangelist or hostile
critic, author Allen Taylor objectively offers a realistic view of the benefits
and drawbacks of cryptosocial media for the average user.
Will cryptosocial media displace current social media or remain a
niche product serving but a tiny fragment of a much larger audience?
This is the ultimate question addressed in this book.
Keywords
decentralized social media; decentralization; blockchain technology;
cryptography; cryptoeconomics; cryptosocial media; crypto; tokens;
centralization; centralized media; tokenization; tokenomics; tokenized
economies; social networking; distributed ledger
Contents
Testimonials������������������������������������������������������������������������������������������xi
Disclaimer������������������������������������������������������������������������������������������xiii
Acknowledgments���������������������������������������������������������������������������������� xv
Introduction��������������������������������������������������������������������������������������� xvii
“In times like this, it’s hard to envision that anything could become
decentralized. There is a huge opportunity for major shifts in social media,
Internet, and cyberspace. Blockchain technology is a rising star to help decen-
tralize and protect our personal information. This book explains in great
detail the past, present, and future of the Internet and social media. If you
do not know what blockchain technology is, this is a must-read book. The
book explains how cryptocurrency has made blockchain technology a valuable
security mechanism. Since security is a high priority in the finance industry,
the book caught my eye as a definite book of interest. It provides a refresher
on what is happening in social media and what is possible for everyone in a
decentralized world.”—Tina Pittman, CPA, MBA, CGMA, tax accoun-
tant and former controller
xii Testimonials
“Social media has changed the world. Cryptocurrencies are changing it.
Where the two intersect there will be chaos—and great opportunity for those
who can seize it. The ups and downs and long way rounds, Allen Taylor
explores how we got to where we are and where, from here, we might be going.
While he doesn’t have all the answers, he has a great many insights. Whether
a newbie or a veteran of the wars, Cryptosocial: How Cryptocurrencies Are
Changing Social Media, is informative, thought-provoking and well worth
the read.”—Paul Savage, former hedge fund manager
Disclaimer
The information in this book is not intended to be financial advice.
Neither the author nor publisher are financial advisors. The information
is for entertainment and educational purposes only. Before investing in
cryptocurrency, consult your own financial advisor.
Acknowledgments
I’m grateful for the assistance of several important people who have
helped to bring this book to see the light of day.
My wife Theresa has been patient and supportive of my work for almost
20 years. Were it not for this support, I could not have started this project
or completed it.
Adam the AussieNinja, Thomas Dylan Daniel, M.A., and Paul Savage
(aka @Quillfire) provided great insight and feedback on this manuscript,
helping to improve it beyond my own capabilities.
I’d also like to thank readers at Publish0x, Voice, and Trybe (before it
rebranded as Loop Markets) for their encouragement and engagement
while sharing my ideas on the concepts and projects discussed in this
book. The Cryptowriter team was immensely helpful in allowing me to
test my material on their audience. Thomas Wolf, in particular, was very
encouraging and supportive. Thanks for sending me that Voice invite and
introducing me to Cryptowriter.
1
L. Cohen. January 07, 2021. “Twitter and Facebook Lock Trump’s Accounts,
Take Down Video of his Message to Supporters,” CBS News, www.cbsnews.com/
news/trump-twitter-facebook-accounts-locked/ (accessed March 30, 2021).
xviii Introduction
Practical Applications of
Blockchain Technology
When primitive man wanted to travel from Argos to the banks of the
Yellow River, he invented a circular object and called it a wheel. In those
days, traveling farther and faster meant more cash in the war treasure and
greater leverage for trade. The invention proved to be a huge advancement
for civilization.
Throughout history, enterprising individuals have identified problems
and addressed them with creative solutions. This has often led to future
innovations and improvements.
In the 1440s, an enterprising German named Johann G utenberg
ushered in the age of mass communications with advancements in
printing.1 That led to the publication of daily newspapers, monthly
magazines, and countless books. Many of the font types that have been
developed since then are now used in Web publishing.
New technologies often do more than solve old problems. Sometimes
they address challenges people weren’t aware they had. That might be the
case with decentralized social media.
Blockchain developers make bold promises. One of those is that
blockchains and distributed ledgers can and will return the Internet to its
decentralized roots. Another is that the technology will provide a greater
sense of security for anyone sharing personal data on the Web. Just as
important, the persons to whom that data belongs can have more control
over how it is shared and profit from it, as opposed to third parties selling
it for a profit and not sharing that profit with anyone else. These benefits
are wrapped up in the nature of the technology itself, but are they what
1
History.com editors. May 07, 2018. “Printing Press,” History.com. www.history
.com/topics/inventions/printing-press (accessed March 30, 2021).
2 Cryptosocial
Web citizens want? If so, does the average Internet user know they want
these benefits?
Crypto enthusiasts don’t need to be sold. The rest of the world might.
If you’ve wondered what the fuss over bitcoin and cryptocurrencies is
all about, or you’re at least a little bit concerned about the power that
rests in the hands of a few at the top of the social media pyramid, then
keep reading to learn how a new emerging technology could solve some
of the biggest problems facing the planet at the beginning of the third
millennium.
Today’s young people are put off by the centralized institutions of the
past. That’s why many of them find decentralization attractive. When
you examine the modern world, it’s not hard to see why there is a strong
distrust of authority.
The first Millennials were born in 1981.2 In their lifetimes, they’ve
witnessed an S&L crisis, the Y2K scare, the World Trade Center attacks,
the 2008–2009 financial crisis, and more than one global pandemic. In
each case, centralized authority was either the heart of the problem, a part
of the problem, or failed to see the problem and ineffective in addressing it.
2
“Millennials,” Pew Research Center. www.pewresearch.org/topics/millennials/
(accessed March 30, 2021).
Practical Applications of Blockchain Technology 3
3
K. Kline. October 25, 2019. “3 Important Advantages of Decentralization,”
Inc, www.inc.com/kenny-kline/3-important-advantages-of-decentralization.html
(accessed March 30, 2021).
4 Cryptosocial
E-mail is like last century’s postal mailbox. Full of junk. One day,
you land on a website, fill out a form providing your e-mail address, and
receive a download. Before dinner, you’ve received a confirmation e-mail,
an introduction e-mail, and a follow-up promising untold benefits
delivered conveniently to your digital mailbox. You now have a lifelong
relationship you have to actively request to be removed from—if you have
the energy to pursue it. We’ve been trained to join lists.
Think about the websites you visit. Do you conduct business with
your doctor, your dentist, your state government, the federal govern-
ment, your bank, your credit card company, your church, and c haritable
nonprofits through the Web? All of that data you share about yourself
is sitting on somebody’s server. Actually, multiple servers all around
the world.
Blockchain technology makes it possible to wrap all of your import-
ant data into a single file or data source that only you control, keep it
secure with end-to-end encryption, and prevent it from being shared
with anyone you do not explicitly assign consent to. It’s possible you can
make money from that data instead of Facebook and Google cashing in
on it.
Possible
Key Size Combinations Key Size Time to crack
1-bit 2 56-bit 399 seconds
4
H. Agrawal. August 12, 2020. “Bitcoin Private Keys: Everything You Need
to Know,” CoinSutra, https://coinsutra.com/bitcoin-private-key/ (accessed
March 30, 2021).
6 Cryptosocial
authority tilting the scales in favor of a few—and many times “the few”
have self-serving interests.
Google has long kept its search engine algorithms secret. They tell the
world to feed their robots with valuable content but don’t give explicit
instructions on what that means. Search engine optimizers and web-
site copywriters must guess at how content is indexed and ranked at the
world’s largest and most successful search engine. While this opaqueness
is effective in combating spam and discouraging people from gaming the
search results, there is a hard truth that must be explored: If search algo-
rithms are so great, then why do they need to be tweaked hundreds of
times a day in order to manipulate the end result?
Facebook’s algorithms determine what content users see on their
news feeds. Why? Doesn’t Mark Zuckerberg trust that his platform’s users
know what they want to see?
Most of us can appreciate that it would be against Facebook’s interests
to publicly declare how their algorithms work. Nevertheless, centraliza-
tion has a built-in opaqueness that often leads to abuse or unfair advantage
for a few. Virtually every country in the world has a central authority that
“manages” the economy. This is often defended by arguing that it keeps
economies stable and benefits everyone, but the economy still moves in
waves, with recessions and depressions, with unemployment and instabil-
ity, and there is still inflation and deflation despite all the tinkering. Who
do central banks really protect?
Blockchain technology is capable of delivering greater transparency.
Each transaction is recorded on a public ledger that anyone can audit at
any time.
It takes three to five days to transfer money from PayPal to your bank
account. International money transfers can take a week or longer. By con-
trast, Bitcoin transactions take ten minutes. Other blockchain transac-
tions are even faster. Some of them can move money in seconds.
If you run a business in Nebraska and have a customer in Spain,
instead of sending U.S. dollars (USD) or euro through the painfully
5
E. Harrell. January 2019. “Victims of Identity Theft, 2016,” Bureau of Justice
Statistics, Office of Justice Programs, U.S. Department of Justice. www.bjs.gov/
content/pub/pdf/vit16.pdf (accessed March 30, 2021).
6
B. Stack. December 06, 2017. “Here’s How Much Your Personal Information Is
Selling for on the Dark Web,” Experian, www.experian.com/blogs/ask-experian/
heres-how-much-your-personal-information-is-selling-for-on-the-dark-web/
(accessed March 30, 2021).
8 Cryptosocial
slow process of the 20th century, you can invoice your client and receive
payment in bitcoin or one of the thousands of other cryptocurrencies in
a few minutes.
With regard to social media, if you and your client use the same plat-
form, you could request payment through the cryptosocial platform and
receive it within seconds. I’ve done it.
If you shop at a retail store and want to pay by credit card, you have a
variety of options: Visa, Mastercard, or Discover, to name a few. The pay-
ment does not go directly from your bank to the retail merchant. Instead,
it goes through the credit card company, who extracts a fee for mediating
that transaction.
Suppose that you wanted to pay the retail merchant with cryptocur-
rency. Bitcoin was designed as a peer-to-peer cashless payment system. In
other words, the merchant can simply share her public wallet key with
you and you can send bitcoin directly to that merchant from your smart-
phone while standing at the cash register. If the merchant accepts other
cryptocurrencies, you can do the same with those—wallet to wallet, yours
to the merchant’s.
This type of scenario could take place in banking, insurance, real
estate, or any industry where money exchanges hands. Not only that,
but if you had a medical card secured by blockchain technology, when
you visit your doctor, you could transfer only the relevant records to your
doctor in a few seconds.
Blockchain technology is peer-to-peer by nature, cutting out
unnecessary intermediaries.
What Is a Blockchain?
7
I. Goddijn, and J. Kouns. n.d. “2020 Q1 Report, Data Breach Quick-
View,” page 2. RiskBased Security, https://pages.riskbasedsecurity.com/hubfs/
Reports/2020/2020%20Q1%20Data%20Breach%20QuickView%20Report
.pdf (accessed March 30, 2021).
8
“Hash,” TechTerms. https://techterms.com/definition/hash (accessed March 30,
2021).
10 Cryptosocial
Hash Hash
Block Block
9
O. Kharif. January 31, 2020. “Bitcoin’s Network Operations are Controlled by
Five Companies,” Bloomberg, www.bloomberg.com/news/articles/2020-01-31/
bitcoin-s-network-operations-are-controlled-by-five-companies (accessed March
30, 2021).
Practical Applications of Blockchain Technology 11
10
E. Cheng. December 06, 2017. “Meet CryptoKitties, The $100,000 Digital
Beanie Babies Epitomizing the Cryptocurrency Mania,” CNBC, www.cnbc
.com/2017/12/06/meet-cryptokitties-the-new-digital-beanie-babies-selling-for-
100k.html (accessed March 30, 2021).
11
C.R.W. De Meijer. December 18, 2020. “Blockchain Trends in 2021: Expect
the Unexpected,” Finextra, www.finextra.com/blogposting/19679/blockchain-
trends-in-2021-expect-the-unexpected (accessed March 31, 2021).
12 Cryptosocial
Immutability
Decentralization
12
G. Iredale. November 24, 2020. “6 Key Blockchain Features You Need to
Know,” 101 Blockchains, https://101blockchains.com/introduction-to-block-
chain-features/ (accessed December 11, 2020).
13
Ibid.
Practical Applications of Blockchain Technology 13
Enhanced Security
Review, www.technologyreview.com/2018/04/25/143246/how-secure-is-block-
chain-really/ (accessed March 31, 2021).
14 Cryptosocial
use to break the security. No matter how strong your password is, that
central attack point makes it easier for hackers to break in.
Even 2FA is relatively unsecure compared to blockchain technology.
With 2FA, users can authorize a centralized platform to send a text of a 5-
or 6-digit code to their mobile phone when they try to log into the plat-
form. Anyone who does not have access to your mobile phone is shut out.
While 2FA is more secure than a single password, it is still fairly easy
to break for smart hackers.
Think about your home. You have a front door, a back door, and four
windows. That’s six entry points. But your home likely has one secu-
rity system for all entry points. Simplifying for the sake of clarity, even
with a security system involving a complex security code, a burglar can
easily hack the system and get in. But what if the burglar had to match a
long, complex multiple-character private code with an equally long and
complex multiple-character public code while also satisfying the secu-
rity requirements for at least one of those doors and at least half of the
windows in the house? That would certainly complicate things for the
burglar, wouldn’t it?
To reiterate, the burglar would have to satisfy ALL of the following
criteria in order to break into your home:
windows, the number of hurdles the burglar must get over to get into the
home increases the home’s security and makes it less likely the burglar will
be successful.
Distributed Ledger
Faster Settlements
Consensus
the mathematical calculation, a block on the chain is created and all trans-
actions within that block are approved by the network.
Peer-to-Peer Interaction
Minting
easily understood. For many people, the willingness to try isn’t even
on the radar.
That brings me to the drawbacks of blockchain technology.
B. Michaels. 1988. “Every Rose Has Its Thorn,” Track 8 on Open Up and Say
15
Summary
Blockchain technology promises to return the Internet to its decentralized
roots and in the process solve the problems of the 20th century (central-
ization, data ownership and security, transparency, accessibility, control
over one’s identity, faster payments and money transfers, and interme-
diaries). Utilizing a new way of ordering data, this nascent technology
enhances computer security while decentralizing command and control
through consensus mechanisms on computing networks.
16
R. Neate. 2021. “Programmer has Two Guesses Left to Access £175m Bitcoin
Wallet,” The Guardian, www.theguardian.com/technology/2021/jan/12/in-bits-
the-programmer-locked-out-of-his-130m-bitcoin-account (accessed April 13,
2021).
22 Cryptosocial