State of Bitcoin in Indonesia

Bitcoin is a digital asset and a payment system invented by Satoshi Nakamoto. The system is peer-to-peer and transactions take place between users directly, without an intermediary – meaning, no banks! Bitcoins aren’t printed, like dollars or euros, but can be used to buy things electronically.

I spoke with Tiyo Triyanto, Country Head BitX Indonesia regarding the latest development of Bitcoin in Indonesia. “BitX is an exciting new tech company working in the cryptocurrency/Bitcoin space, one of the fastest growing (and most exciting) sectors in Silicon Valley,” he said. “W​e’re investing more in the market through market education, dedicated Bahasa Indonesia customer support, localizing our products, and have also just opened our new office in Jakarta.”

BitX Indonesia
BitX Indonesia

Tiyo is a bitcoin enthusiast since early 2013, quickly he established the biggest mining farm in Indonesia and was featured in TechCrunch. Later he cofounded RedFury, USB bitcoin miner and sold $1,000,000 worth of hardware in 20 days.

What do people use Bitcoin for in Indonesia?

At BitX, our aim is to make it easy for people to buy/sell Bitcoin and store it securely. At this stage buying Bitcoin as an investment is one of many use cases globally and in Indonesia and by doing that, in some sense it’s really just a way for people to learn more about this new financial system.

More people are starting to explore Bitcoin as an alternative safe asset to own. This is because returns are uncorrelated and performance has been better than other currencies in the past couple of years.

In Indonesia, the use case is not very different. People want to own Bitcoin as an uncorrelated asset with potentially huge investment upside.

What we’re seeing in a number of markets is a lot of strong institutional interest for Bitcoin and we expect the same to happen in Indonesia.

A number of private wealth managers and hedge funds reach out to us wanting to buy Bitcoin for their customers and aiming to put a percentage of their asset holdings in Bitcoin. BitX has been working with such clients to help execute these investments and customers trust us due to our strong focus on security.

Source: Pantera Capital
Source: Pantera Capital

Once enough people have Bitcoin, commerce becomes easier and seamless. Already we see a number of people using Bitcoin to conduct commerce, send to their friends, etc. Bitcoin is at a very early stage in its evolution, similar to where the Internet was in ‘92­ – ’93. Hence, by investing in Bitcoin at such an early stage is almost like ‘investing’ in the early internet.

Tiyo Triyanto
Tiyo Triyanto

Where can I spend Bitcoin?

Merchants who accept bitcoin are definitely still lagging in Indonesia compared to other places, but there is adoption taking place slowly.

Globally, there are over 100.000 merchants who already accepting bitcoin and over 2.500.000 items can be bought using bitcoin. Examples of Indonesian merchants that accept Bitcoin include Rakatan.com, Kinerja Pay, mautuku.com, Toko Bitcoin, etc.

How many Bitcoin users in Indonesia?

Globally, Bitcoin is gaining increasing popularity and the US, EU, and Japan have led the way in Bitcoin regulation and adoption. We are seeing the same for Indonesia. In general, Bitcoin transactions on the network has increased 140% in the past year. This year, a number of factors have played into the significant price gain we have seen in Bitcoin. Key among them would be 1) more favourable media coverage around the benefits rather than risks around Bitcoin 2) Better understanding by consumers and increasing interest 3) More regulatory certainty (such as Japan, New York, EU) 4) More institutional interest (long term/uncorrelated investment) 5) Broad economic uncertainty around the world.

At BitX, we have seen good growth since launching. Our customer base has increased 10X in the past few months and we’re growing really fast.​ W​e’re investing more in the market through market education, dedicated Bahasa Indonesia customer support, localizing our products, and have also just opened our new office in Jakarta.

The post State of Bitcoin in Indonesia appeared first on BudiPutra.com.

DNS Hosting Provider

:: There have been many cases where crackers attack companies by targeting their DNS (Domain Name System). Makes sense, because usually DNS is the forgotten part of an IT infrastructure, making it an easier target : still uses old software with security holes, use low-end server (incapable of handling DDoS attack), lack of DNSSEC, etc.

I have been using DNS hosting provider since 2004, and enjoyed freedom from problems related to this.

However, this (DNS hosting) is indeed not a very familiar nor popular topic, and many may find problems trying to figure out, which DNS provider to use.

This is a pretty good article on the subject : https://www.keycdn.com/blog/best-free-dns-hosting-providers/

Personally, I've been using ZoneEdit & Namecheap's service for years, with no problem.

====
You might be interested in Google's Cloud DNS service too : https://cloud.google.com/dns/pricing

The performance is quite good, but be aware that as with other #Cloud services — a DDoS attack may cause a surprisingly hefty bill at the end of the month.

===
In that case, a fixed-price service (with included anti-DDoS service) may be a better option : https://asia.cloudns.net/ddos-protected-plans/

Hopefully you'll find these info useful.

10 Best Free DNS Hosting Providers
Running a business, you should never have one single point of failure. Take the initiative and implement one of these top 10 Free DNS Hosting Providers.

Post imported by Google+Blog for WordPress.

Mainan IoT

Lagi seru-serunya topik IoT (Internet of Things). Maka saya pun tak mau ketinggalan ngoprek IoT. Pada dasarnya IoT ini adalah menghubungkan “things” ke internet. “Things” yang dimaksud di sini bisa apa saja. Biasanya sih dimulai dengan menghubungkan sensor (misal sensor temperatur) ke internet.

Beginilah konfigurasi yang saya gunakan saat ini. (Corat-coret di kertas bekas.)

14080070_10153796588911526_1526882988396792016_n

Untuk sensor, kali ini saya menggunakan SensorTag dari Texas Instrument. SensorTag ini memiliki banyak sensor; temperatur, kelembaban, akselerasi, tombol yang dapat ditekan dan seterusnya. Versi yang saya gunakan ini menggunakan Bluetooth (tepatnya BLE, Bluetooth Low Energy) untuk berkomunikasi.

Saat ini ada aplikasi bawan (untuk handphone iOS dan Android) yang dapat digunakan untuk memantau sensor-sensor tersebut. Aplikasinya bagus sekali. Nah, saya ingin membuat aplikasi serupa sehingga data dari sensor dapat saya proses sesukanya. (Misal mau dikirim ke server sendiri.) Saat ini selain dapat memantau data sensor, aplikasi ini dapat juga mengirimkan data tersebut melalui protokol MQTT ke server IBM. (Nampaknya TI ini memiliki partnership dengan IBM.) Saya mencoba menghubungkan aplikasi ini ke server MQTT lainnya tetapi belum berhasil. Ini juga salah satu alasan mengapa saya harus membuat aplikasi sendiri.

Untuk membuat aplikasi di handphone, ternyata ada tools yang menarik dari Evothings. Mereka membuat semacam interface sehingga kita dapat melakukan pemrograman di komputer desktop kita, kemudian mengirimkan kodenya ke handphone (yang dipasangi aplikasi Evothings Viewer). Maka aplikasi langsung dijalankan di handphone. Ini mengurangi kesulitan upload program ke handphone. (Sebetulnya kita bisa juga setup web server sendiri sih.)

Pemrograman di handphone tersebut ternyata menggunakan bahasa Javascript. Ada beberapa library yang perlu digunakan untuk mengakses sensor melalui BLE. Saya sudah mencoba beberapa library tersebut, belum ada yang sukses. Tidak ada error, tetapi outputnya masih kosong. (Harus melakukan debugging dulu dan saya belum terbiasa melakukan debugging dalam bahasa Javascript.)

Alternatif lain yang sedang saya pikirkan adalah menghubungkan sensor tersebut langsung dengan single board computer (SBC) semacam Raspberry Pi. Ternyata ada orang-orang yang juga sukses melakukan pendekatan itu. Saat ini saya tidak punya Raspberry Pi tetapi malah punya yang dari Getchip.com. Ini keren banget, $9 chip dan sudah bisa langsung jalan Linux di atasnya. Sudah ada Bluetooth 4.0 juga. Jadi hal lain yang ingin saya lakukan adalah melakukan pairing antara SensorTag TI ini dengan SBC dari Getchip.com ini. (Ini foto kedua benda tersebut yang saya ambil dari meja saya.)

13987404_10153796571416526_4784112517654812880_o

Saya masih belum berhasil mainan dengan getchip.com secara stabil. Entah kenapa koneksi ke benda ini via WiFi kok tidak stabil. Tersendat-sendat. Jadi malas juga koding langsung di sini. Ide lain adalah via komputer desktop saya dulu saja. Toh sama-sama Linux.

Tadi saya pasang Bluetooth dongle yang 4.0 di komputer desktop saya (running Linux Mint). Kemudian menggunakan berbagai tools (bluez, dll.) untuk mencoba pairing dengan SensorTag ini. Belum berhasil. (Saya menggunakan panduan dari sini dan membaca data di sini. Saya lihat ada juga yang mencoba menggunakan python untuk ini.)

Jika data sudah sampai di server MQTT – ini di cloud – maka saya akan dapat membuat berbagai aplikasi sendiri. Jadi tujuan akhirnya adalah saya dapat memantau sensor dari internet.

Nah, sekarang belum ada yang jalan … ha ha ha. Jadi masih ada banyak yang harus dikerjakan. Saya akan pilah-pilah dulu. (Divide and conquer.)

Selain itu dalam 2 atau 3 minggu ke dapan saya akan dapat IoT board lain dengan sensor yang langsung dihubungkan dengan boardnya. Ini akan jadi thread yang berbeda. Asyik. Banyak oprekan.


Filed under: programming, teknologi Tagged: postaday2016, programming, teknologi, Teknologi Informasi

Kewarganegaraan 1.0

Setiap bercerita di depan kelas, atau memulai presentasi, sering saya bercerita tentang perjalanan hidup saya. Saat ini saya sedang dalam versi “3.3”. Ha ha ha. Kayak software saja. Tapi begitulah. Penomoran ini sebetulnya terinsipirasi dari buku karangan Thomas Friedman. (Dia mengarang banyak buku, seperti “The World is Flat” and “The Lexus and Olive Tree”. Tentang globalisasi.)

Friedman bercerita bahwa globalisasi memiliki versi. Pada versi 1.0, globalisasi ditandai dengan keinginan orang untuk menjadi warga negara lain, yaitu warga negera besar seperti Amerika Serikat, Inggris, dan seterusnya. Ini jaman dahulu kala. Kalau kita baca sejarah Indonesia, ada banyak orang Indonesia yang ingin bergabung menjadi bangsa penjajah (“Londo”) karena sangat menyedihkan kalau kita menjadi warga negara terjajah. Ini kewarganegaraan 1.0.

Globalisasi 2.0 terjadi dan kewarganegaraan tidak penting lagi. Yang penting adalah tempat kita bekerja, yaitu multinational companies. Maka banyak mahasiswa yang ditanya kalau lulus mau kerja dimana, jawabannya adalah perusahaan besar seperti Schlumberger, IBM, Citibank, Microsoft, General Electric, dan seterusnya. Dalam perusahaan besar tersebut kewarganegaraan tidak penting lagi. Menjadi “warga negara” perusahaan besar menjadi lebih penting.

Globalisasi 3.0 terjadi karena adanya internet dan pemanfaatan teknologi informasi. Batas fisik dunia tidak ada lagi. Maka tidak penting lagi kewarganegaraan dan perusahaan tempat bekerja, tetapi yang penting adalah diri kita sendiri. You! Maknanya adalah yang lebih penting lagi adalah apa kontribusi Anda ke dunia. What’s your contribution to society.

Maka kalau sekarang kita masih meributkan tentang kewarganegaraan maka sebetulnya kita masih berada pada globalisasi 1.0. Sudah ketinggalan jaman.


Filed under: teknologi, Teknologi Informasi Tagged: opini, postaday2016, teknologi, Teknologi Informasi

CodeMeetUp()

Di Bandung, setiap Senin siang kami mengadakan CodeMeetUp(). Isi diskusinya macem-macem. Tadi siang di Telkomsel Digilife Dago Bandung (depan hotel Holiday Inn) yang mengisi adalah Didit dari Labtek Indie. Topiknya adalah “Developing VR in Unity”. Didit ini salah satu certified Unity Developers. Keren.

DSC_6314 0001

Yang diceritakan adalah tentang apa saja yang tersedia saat ini untuk membuat (aplikasi) VR (Virtual Reality) dengan Unity. Pro dan kontra teknologi yang tersedia dan beberapa hal yang perlu dicermati. Termasuk masalah-masalah yang dihadapi ketika membuat aplikasi VR.

Senangnya mengikuti acara-acara CodeMeetUp() ini adalah kita bisa belajar terus. Dari yang memang jagoan pula di bidang itu. Asyiiik.


Filed under: teknologi, Teknologi Informasi Tagged: postaday2016, teknologi, Teknologi Informasi

Candi Borobudur Bukan Peninggalan Nabi Sulaiman

:: Sore ini saya dibuat bahagia oleh anak saya yang kedua 🙂 dia bercerita, bahwa gurunya menyetel film, tentang seorang #kiyai yang menyatakan bahwa Candi Borobudur itu adalah buatan Nabi Sulaiman.

Ketika anak-anak yang lainnya menjadi antusias; dia #berpikir sejenak – dan lalu asyik saja menggambar tanpa peduli 😀 setelah memberitahu soal ini kepada saya melalui Whatsapp.

Terharu sekali saya jadinya. Sejak kecil, saya memang berusaha mendidik mereka, agar selalu #kritis 🙂 tidak mudah percaya begitu saja. Menjadikan akal mereka sebagai salah satu pemandunya.

Alhamdulillah, kini hasilnya sudah nampak – ketika bahkan #guru nya percaya terhadap khayalan ini, dia tetap bisa menggunakan akalnya. 🙂

Semoga hatinya & akalnya akan selalu turut membimbing dia di jalan yang benar, aamiin ya Rabbal 'aalamiin.

===
Sudah banyak bantahan tentang khayalan ini, salah satunya adalah buku ini, link terlampir. Juga ada link-link ke berbagai diskusi yang membahas lebih detail berbagai poin-poinnya.

Semoga bermanfaat.

http://www.kaskus.co.id/thread/54297546582b2eee338b4568/buku-bantahan-untuk-quotborobudur-peninggalan-nabi-sulaimanquot/


Buku Bantahan untuk “Borobudur Peninggalan Nabi Sulaiman” | KASKUS

Post imported by Google+Blog for WordPress.

Query Smart Contracts: Bringing the Algorithm to the Data

One paradigm shift being championed by the MIT OPAL/Enigma community is that of using “pre-fabricated” queries (e.g. SQL queries) that have been analyzed by experts and have been vetted to be “safe” from the perspective of privacy-preservation. The term “Open Algorithm” (OPAL) here implies that the vetted queries (“algorithms”) are made open by publishing them, allowing other experts to review them and allowing other researchers to make use of them in their own context of study.

The next step in the Open Algorithms paradigm is the use of smart contracts to capture these safe algorithms in the form of executable queries residing in a legally binding digital contract.

What I’m proposing is the following: instead of a centralized data processing architecture, the P2P nodes (e.g. in a blockchain) offers the opportunity for data (user data and organizational data) to be stored by these nodes and be processed in a privacy-preserving manner, accessible via well-known APIs and authorization tokens and the use of smart contracts to let the “query meet the data”.

In this new paradigm of privacy-preserving data sharing, we “move the algorithm to the data” where queries and subqueries are computed by the data repositories (nodes on the P2P network). This means that repositories never release raw data and that they perform the algorithm/query computation locally which produce aggregate answers only. This approach of moving the algorithm to the data provides data-owners and other joint rights-holders the opportunity to exercise control over data release, and thus offers a way forward to provide the highest degree of privacy-preservation while allowing data to still be effectively shared.

This paradigm requires that queries be decomposed into one or more subqueries, where each subquery is sent to the appropriate data repository (nodes on the P2P network) and be executed at that repository. This allows each data repository to evaluate received subqueries in terms of “safety” from a privacy and data leakage perspective.

Furthermore, safe queries and subqueries can be expressed in the form of a Query Smart Contract  (QSC) that legally bind the querier (person or organization), the data repository and other related entities.

A query smart contract that has been vetted to be safe can be stored on nodes of the P2P network (e.g. blockchain). This allows Queriers to not only search for useful data (as advertised by the metadata in the repositories) but also search for prefabricated safe QSCs that are available throughout the P2P network that match the intended application. Such a query smart contract will require that identities and authorizations requirements be encoded within the contract.

A node on the P2P network may act as a Delegate Node in the completion of a subquery smart contract.  A delegate node works on a subquery by locating the relevant data repositories, sending the appropriate subquery to each data repository, and receiving individual answers and collating the results received from these data repositories for reporting to the (paying) Querier.

A Delegate Node that seeks to fulfill a query smart contract should only do so when all the conditions of the contract has been fulfilled (e.g. QSC has valid signature; identity of Querier is established; authorization to access APIs at data repositories has been obtained; payment terms has been agreed, etc.). A hierarchy of delegate nodes may be involved in the completion of a given query originating from the Querier entity. The remuneration scheme for all Delegate Nodes and the data repositories involved in a query is outside the scope of the current use-case.

What and why: MIT Enigma

I often get asked to provide a brief explanation about MIT Enigma — notably what it is, and why it is important particularly in the current age of P2P networking and blockchain technology.  So here’s a brief summary.

The MIT Enigma system is part of a broader initiative at MIT Connections Science called the Open Algorithms for Equity, Accountability, Security, and Transparency (OPAL-EAST).

The MIT Enigma system employs two core cryptographic constructs simultaneously atop a Peer-to-Peer (P2P network of nodes). These are secrets-sharing (ala Shamir’s Linear Secret Sharing Scheme (LSSS)) and multiparty computation (MPC). Although secret sharing and MPC are topics of research for the past two decades, the innovation that MIT Enigma brings is the notion of employing these constructions on a P2P network of nodes (such as the blockchain) while providing “Proof-of-MPC” (like proof of work) that a node has correctly performed some computation.

In secret-sharing schemes, a given data item is “split” into a number of ciphertext pieces (called “shares”) that are then stored separately. When the data item needs to be reconstituted or reconstructed, a minimum or “threshold” number of shares need to be obtained and merged together again in a reverse cryptographic computation. For example, in Naval parlance this is akin to needing 2 out of 3 keys in order to perform some crucial task (e.g. activate the missile). Some secret sharing schemes possess the feature that some primitive arithmetic operations can be performed on shares (shares “added” to shares) yielding a result without the need to fully reconstitute the data items first. In effect, this feature allows operations to be performed on encrypted data (similar to homomorphic encryption schemes).

The MIT Enigma system proposes to use a P2P network of nodes to randomly store the relevant shares belonging to data items.  In effect, the data owner no longer needs to keep a centralized database of data-items (e.g. health data) and instead would transform each data item into shares and disperse these on the P2P network of node.  Only the data owner would know the locations of the shares, and can fetch these from the nodes as needed.  Since each of these shares appear as garbled ciphertext to the nodes, the nodes are oblivious to their meaning or significance.  A node in the P2P network would be remunerated for storage costs and the store/fetch operations.

The second cryptographic construct employed in MIT Enigma multiparty computation (MPC). The study of MPC schemes seeks to address the problem of a group of entities needing to share some common output (e.g. result of computation) whilst maintaining as secret their individual data items.  For example, a group of patients may wish to collaboratively compute their average blood pressure information among them, but without each patient sharing actual raw data about their blood pressure information.

The MIT Enigma system combines the use of MPC schemes with secret-sharing schemes, effectively allowing some computations to be performed using the shares that are distributed on the P2P. The combination of these 3 computing paradigms (secret-sharing, MPC and P2P nodes) opens new possibilities in addressing the current urgent issues around data privacy and the growing liabilities on the part of organizations who store or work on large amounts of data.