Announcing a Return to our Roots: The All-New Bitcoin Magazine
Verified on Po.et Created with Sketch. Verified on Po.et

Blockchain Verification and Decentralized Subversion in Cambodia

by

        Distributed Dialogues: Blockchain Verification and Decentralized Subversion in Cambodia
Distributed Dialogues: Blockchain Verification and Decentralized Subversion in Cambodia

Season 2 of Distributed Dialogues has begun, and a general theme will be the connection of major, real-world problems to possible solutions using blockchain technology. This is displayed in full on the first episode, which combines a historical context on Cambodian state repression with ways in which promising new technologies may bring new freedom of the press.

Like many aspects of the transition from French Indochina to independent states, alongside all the wars and U.S. interventions, it becomes difficult to fully understand the historical context. To help the audience understand how Cambodia got where it is today, Distributed Dialogues interviewed veteran journalist David Andelman. Andelman covered the Cambodian Civil War in the ’70s, and came close enough to the front lines to find himself encircled by the Khmer Rouge. Using his wide breadth of knowledge and personal investment in this conflict, Andelman gives listeners a vivid and straightforward background on the state of affairs.

As for the current political repression in Cambodia, exiled Member of Parliament Mu Sochua came onto the show to discuss the ban of the nation’s opposition party, her exile from Cambodia and the state of affairs today. Sochua escaped a purge of this opposition party that found many leaders imprisoned. She is now a permanent resident of France and advocate for Cambodian freedom. Despite witnessing some of the horrors of life under the Khmer Rouge and its successors, Sochua remains resolute, stating, “As we try to rebuild a nation that’s been totally destroyed by violence, death, and mass murder, we have to also look to what is rich in our society, our culture.”

Tying the episode together, Mounir Ibrahim discusses the ways that blockchain technology can intervene in the oppressive state’s stranglehold over the flow of information. Inspired by his work in the sState dDepartment in Syria and by the Arab Spring, Ibrahim was drawn to the power of a trustless, decentralized system for its ability to let citizens verify news themselves. His company, Truepic, verifies the authenticity of pictures taken on an in-app camera, encrypts all associated metadata, makes sure that the phone’s operating system has not been tampered with and stores pictures on a blockchain. By doing this, he believes that any concerned citizen with a smartphone can document public atrocities committed by authoritarian regimes and provide an alternative to state-run media.

These three guests provide a nuanced picture of autocracy, from its fledgling steps to its actions after decades in power. Using blockchain verification can be a possible way for people to push back against these actions in the present day; this will be a recurring theme throughout the episodes of Distributed Dialogues Season 2. Look for future exploration in the world of blockchain and authoritarianism on the Let’s Talk Bitcoin Network.

Recommended

Bitcoin Wallet Forced to Drop Key Privacy Features From Google Play App

The privacy restrictions on Samourai's wallet will only affect the new version available on Google Play.

Colin Harper

Neutrino: A Privacy-Preserving Light Wallet Protocol

Jimmy Song explains Neutrino, a new protocol for light clients to get the data that they need while preserving privacy, without trusting a central server.

Jimmy Song

Blockchain Analysis Is About to Get Harder as P2EP Enters Testing Phase

“Privacy is essential for Bitcoin. Ideally we want to screw up [blockchain] analysis so badly, that they can't even make it.”

Aaron van Wirdum

Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3

The companies behind the hardware wallets claim not to have been given an opportunity to fix the vulnerabilities via responsible disclosure practices prior to the announcement.

Jimmy Aki