<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Bhalisa Sodo on Medium]]></title>
        <description><![CDATA[Stories by Bhalisa Sodo on Medium]]></description>
        <link>https://medium.com/@bhalisa?source=rss-5bc7c3c50ea6------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*jVndEF0jOAcYx9_2RjWbMA.jpeg</url>
            <title>Stories by Bhalisa Sodo on Medium</title>
            <link>https://medium.com/@bhalisa?source=rss-5bc7c3c50ea6------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 23 May 2026 06:29:25 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@bhalisa/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[NFTs for Data]]></title>
            <link>https://bhalisa.medium.com/nfts-for-data-bdf735c8d1b?source=rss-5bc7c3c50ea6------2</link>
            <guid isPermaLink="false">https://medium.com/p/bdf735c8d1b</guid>
            <category><![CDATA[data]]></category>
            <category><![CDATA[machine-learning]]></category>
            <category><![CDATA[copyright]]></category>
            <category><![CDATA[nft]]></category>
            <category><![CDATA[cryptocurrency]]></category>
            <dc:creator><![CDATA[Bhalisa Sodo]]></dc:creator>
            <pubDate>Tue, 01 Mar 2022 12:56:57 GMT</pubDate>
            <atom:updated>2022-07-09T12:27:41.661Z</atom:updated>
            <content:encoded><![CDATA[<h4>Data NFTs allow for more power &amp; flexibility in managing &amp; selling data</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*uN5u7wPmr-lXg63Hkbrlfw.jpeg" /><figcaption><a href="https://www.jotform.com/blog/40-beautiful-and-amazing-aquatic-life-photos/">https://www.jotform.com/blog/40-beautiful-and-amazing-aquatic-life-photos/</a></figcaption></figure><p>I asked one of the brightest minds at the intersection of artificial intelligence and blockchain <a href="http://trent.st/">Trent McConaghy</a>, from Ocean Protocol; what really is the purpose of Data NFTs? After having mischaracterised them for tools to enable data owners to unlock multiple revenue streams. It turns out; <em>“The main idea of Data NFTs is more to explicitly represent base IP (e.g. copyright) which allows for more power &amp; flexibility in managing &amp; selling data”</em>. This addresses the fundamental issue of ambiguous legal documents, that back copyright, that are not generally interpretable<strong>[4]</strong>. With the help of NFTs and blockchain technology, copyright can be represented transparently on an irrefutable public ledger, unambiguously. Thus, the process of transferring ownership and rights is highly lubricated; cutting immense legal and transfer costs and the middleman altogether. This post will focus solely on <a href="https://www.wipo.int/about-ip/en/"><em>intellectual property</em></a> in the context of <a href="https://copyrightalliance.org/faqs/what-is-copyright/"><em>copyright</em></a><em>, </em>and particularly in data ownership and the transfer thereof.</p><p>I thought this would be important as data becomes more democratised and ubiquitous, as a result of the proliferation of public data marketplaces like <a href="https://market.oceanprotocol.com">Ocean Market</a>.</p><h3>Fungible and Non-Fungible Tokens (NFTs)</h3><p><strong>Fungible tokens</strong>, like cryptocurrencies that we are accustomed to on the Ethereum blockchain, follow the ERC-20 token standard. Meaning tokens of the same <a href="https://www.ibm.com/za-en/topics/smart-contracts">smart contract</a> are interchangeable. Let us use the dollar as an example. Any 1 dollar note is exactly the same as the next 1 dollar note. It does not matter where you got that dollar from, it is homogeneous. You can think of apples of the same tree, you could probably trade one for another of a the same tree — granted they don’t vary fundamentally.</p><p><strong>Non-fungible tokens</strong>, on the other hand, follow the ERC-721 token standard. This token is different to another from the same smart contract. NFTs are used to identify something or someone in a unique way. According to <a href="https://ethereum.org/en/developers/docs/standards/tokens/erc-721/">ethereum.org</a>, this type of token is perfect to be used on platforms that offer collectible items, access keys, lottery tickets, numbered seats for concerts and sports matches, etc. Tokens of this standard are basically great candidates to represent a one-of-a-kind item. It cannot be identified by any other than itself.</p><p>The blockchain game, <a href="https://www.cryptokitties.co/">Cryptokitties</a>, ushered in NFTs into the mainstream in 2017. This decentralised application (dapp) allows players to purchase, collect, breed and sell virtual cats. A cryptokitty can have unique attributes; from colour, family history, to even genetic makeup. Because of their non-fungible characteristic, security, immutability and transparent nature, as enforced by the ethereum blockchain, NFTs make for great candidates to represent ownership of a specific ‘bundle of rights’.</p><h4>Base Intellectual Property (IP) and Sub-licenses</h4><p>Let us consider an artist who has made a painting. Initially, the artist has full ownership or copyright to the painting<strong>[3]</strong>. Until said painting is sold to a collector, who in turn claims all ownership of the copyright. The copyright to the painting is its <strong>base IP</strong>. I would relate this to data sold to a public market: when a data owner publishes a dataset, say on Ocean Market, they immediately assume copyright over their intellectual property, granted it is rightfully theirs.</p><p>Now let us consider an author of a book<strong>[3]</strong>. The author owns all claims to the copyright of the book, he then exclusively licenses the base IP to a particular publisher. The <em>exclusive license</em> earns the publisher the right to sell and profit from the books. The publisher then distributes virtual copies (eBooks) of the hard copy, all copies of which have a different <strong>fungible sub-license to the base IP[3]. </strong>Meaning all sub-licenses are the same and entail the same set of rules on how the books can and cannot be used by the consumer of the eBook.</p><h3>Data NFTs</h3><p>The underlying idea is to <strong>tokenise base IP and its sub-licenses </strong>thereby representing them more explicitly in <a href="https://unenumerated.blogspot.com/2006/11/wet-code-and-dry.html?m=1">‘dry code’</a>. Rather than conventional human-readable <a href="https://unenumerated.blogspot.com/2006/11/wet-code-and-dry.html?m=1">‘wet code’</a>, such as lengthy legal documents that can be interpreted differently depending on who you are in the legal process<strong>[4]</strong>. Bitcoin introduced a ‘dry-code’ machine-readable approach to electronic money, enabled by blockchain. In the real-world, ownership of assets is defined through access control (if you hold it, you own it), it is no different to digital assets, as made possible by Bitcoin<strong>[1]</strong>. Data NFTs combine base IP which is best implemented by some incarnation of the ERC-721 standard, and sub-licenses to base IP which are best implemented by way of the ERC-20 standard.</p><p>Let’s take this into perspective. <a href="http://market.oceanprotocol.com/">Ocean Market</a> is a data marketplace that allows data owners to publish &amp; monetise their data, and scientists to consume the data by training their models on the data at a fee.</p><p>In the beginning, the publisher has sole ownership of their copyright or base IP (ERC-721). And can choose to mint an<em> x amount </em>of sub-licenses (ERC-20) which are all in his/her control at first. The publisher can now have the ability to either:</p><ul><li>Transfer the fungible sub-licenses to third-parties,</li><li>Or transfer non-fungible base IP, in turn ceding all copyright of the data and its sub-licenses.</li></ul><p>This process of protecting and transferring copyright has been a tedious, long, error-prone and expensive process. This is because of numerous legal nuances, technicalities, legal costs and human-readable language semantics. NFTs propose a new way in which ownership can be seamlessly proven, protected, and transferred at the fraction of the cost, without any ambiguity.</p><p>This post has been purposely simplistic to get the main idea of how NFTs can be used in intellectual property — particularly copyright of data shared in public data marketplaces. Therefore, making it more readable and easier to understand by a larger non-technical audience. To get a more in-depth and technical explanation on the relationship between NFTs and intellectual property, I highly recommend reading Trent McConaghy’s <strong>‘NFTs and IP</strong>’ series.</p><h3>Check out Trent McConaghy’s ‘NFTs and IP’ series:</h3><p><a href="https://blog.oceanprotocol.com/nfts-ip-1-practical-connections-of-erc721-with-intellectual-property-dc216aaf005d"><strong>[1]NFTs &amp; IP 1: Practical Connections of ERC721 with Intellectual Property</strong></a></p><p><strong>[2]</strong><a href="https://blog.oceanprotocol.com/nfts-ip-2-leveraging-erc20-fungibility-bcee162290e3"><strong>NFTs &amp; IP 2: Leveraging ERC20 Fungibility</strong></a></p><p><strong>[3]</strong><a href="https://blog.oceanprotocol.com/nfts-ip-3-combining-erc721-erc20-b69ea659115e"><strong>NFTs &amp; IP 3: Combining ERC721 &amp; ERC20</strong></a></p><p><a href="https://unenumerated.blogspot.com/2006/11/wet-code-and-dry.html?m=1"><strong>[4] Wet and dry code, by Nick Szabo</strong></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bdf735c8d1b" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Privacy Preservation in Web 3.0]]></title>
            <link>https://bhalisa.medium.com/differential-privacy-and-compute-2-data-how-do-they-compare-1ffce67c636d?source=rss-5bc7c3c50ea6------2</link>
            <guid isPermaLink="false">https://medium.com/p/1ffce67c636d</guid>
            <category><![CDATA[algorithms]]></category>
            <category><![CDATA[artificial-intelligence]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[differential-privacy]]></category>
            <category><![CDATA[privacy]]></category>
            <dc:creator><![CDATA[Bhalisa Sodo]]></dc:creator>
            <pubDate>Fri, 28 Jan 2022 11:08:51 GMT</pubDate>
            <atom:updated>2022-02-16T14:03:53.017Z</atom:updated>
            <content:encoded><![CDATA[<h4>How Compute-to-Data Relates to Differential Privacy and Federated Learning</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ahSq08H5WuqDTX0Ml6rBHQ.png" /></figure><h3>Introduction</h3><p>We outline the key similarities and differences between <em>Compute-2-Data, Differential Privacy, and Federated Learning</em>. All as means to facilitate the sharing of sensitive data while preserving privacy or withholding the sensitive contents of the data while compute jobs are done on it. The comparisons will be largely informed by all three technologies being used in the contexts of <em>Ocean Protocol, OpenMined, and Google AI</em> respectively, in layman terms.</p><p>As things stand, sensitive data is largely transferred between parties through sharing a copy of the dataset. Parties ensure that the data falls in the right (intended) hands and is not intercepted by malicious actors who might misuse it. However, this requires a copy of the data to leave the premises of the owner. This invokes a fundamental trade-off between the benefits of sharing the data with someone, and the risks of them misusing the data. According to <a href="http://openmined.org">OpenMined</a>, Remote Data Science alleviates this problem by making it possible for one person to answer a question using data owned by another, without ever seeing or acquiring a copy of that data. Let us investigate Compute-2-Data, Differential Privacy and Federated Learning<strong> </strong>as privacy preserving layers in transactions involving running compute jobs and analytics models on data not owned by the analysts.</p><h3>OpenMined and Differential Privacy</h3><p>OpenMined uses data owner-deployed servers to store data from where it can be later queried remotely by analysts who need answers to questions. In this implementation, the basic flow of how data is sent to and queried from the server looks something like this[1];</p><ul><li><em>Uses HAGrid Command Line Interface to deploy and communicate with data owner server</em></li><li><em>Host your data for study on PyGrid Server</em></li><li><em>Study data remotely using PySyft Library</em></li><li><em>Privacy is preserved by Differential Privacy (DP)</em></li></ul><h4><strong>Differential Privacy (DP)</strong></h4><p>Differential Privacy ensures privacy by adding random noise to the query. This strikes a balance between data consumers getting some utility from the data, and the data provider not having to forego a data subject’s privacy in the process. Though DP does a good job in obfuscating the sensitive contents of the data through the introduction of noise, if enough queries are run on a dataset, the output can be a correct estimate of the ground truth, thereby breaching privacy. Because, in theory, with every additional query, twice the privacy is lost [2]. This can be circumvented by allocating a <strong>‘privacy budget’ </strong>to limit the scope of the job(s) a data consumer can perform on the data. And enforcing mandatory noise (epsilon) in every function attempting to query the data from the server.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*FXoHtEL4l9QMgJSCDhvhqg.png" /></figure><p>This is done by an algorithmic coin flip to introduce <strong>‘plausible deniability’. </strong>For example, if we have a study that has binary outcomes, Yes/No, there is at least a 1 in 4 chance that an answer could be wrong, therefore you cannot trust information by handpicking the outcome that pertains to a single individual.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3gWZeMvFIZBoMzUhkqkCKg.png" /><figcaption>Simply Explained</figcaption></figure><p>To avoid exposing non-disclosed private information about a data subject, it is a rule of thumb, that <strong>an insight about a dataset must be consistent with or without the removal of a particular person’s information. </strong>Therefore, not exposing any new truth about a particular person other than what is already in the data. In other words, an analysis should tell us more about the population and nothing about a single person [3].</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/866/1*2-g2l1mR7wPfKFjYS2ma1w.png" /><figcaption>Kobbi Nissim, et al.</figcaption></figure><h3>Ocean Protocol and Compute-2-Data</h3><p>Decentralised data markets <strong>allow anyone </strong>to monetise their data as long as other market participants can agree on the value / price of that data. And as a result, opening up data sets that were previously unavailable for research and artificial intelligence. But, this has not been in the most secure and privacy-preserving manner, until the introduction of <a href="https://blog.oceanprotocol.com/compute-to-data-is-now-available-in-ocean-market-58868be52ef7"><strong>Compute-to-Data in Ocean Market</strong></a>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/861/1*dIh7eV86foR5Awp3NHYNog.png" /></figure><p><a href="https://market.oceanprotocol.com/"><strong>Ocean Market</strong></a> is a Web3 data marketplace where data publishers allow data consumers (data scientists, researchers, etc.) to <strong>train algorithms </strong>on their data, while <strong>preserving privacy</strong> and the data never having to be copied or leave the <strong>publisher’s premises</strong>. Users can publish both data sets and algorithms — collectively referred to as <strong>data assets.</strong></p><h4>Compute-2-Data (C2D)</h4><p>Compute-2-data allows for the sharing of data without the data having to leave the premises or compromise the data subjects’ privacy. Consumers purchase compute jobs on the data to improve the accuracy of their A.I models, or to derive relevant insights. Publishers can put up their own algorithms or third-party algorithms can be used to analyse the data. The image below illustrates the general user flow.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*6-ggeF67ctN0CtoySy3yMg.png" /></figure><p>There are 2 consumption access permissions the publisher can choose from; <strong>download and compute:</strong></p><ul><li><strong>Download </strong>— this access type would probably be best for non-personal data (e.g climate change related data, etc.)</li><li><strong>Compute </strong>— compute access is best for personal data (e.g health records, etc.) whose exposure would likely pose a risk.</li></ul><p>In compute, only the algorithm has viewing rights of the data. Therefore, no other person, except for the data owner can know who is implicated in the data set, and in what way. The analysts are only privy to the algorithms outputs and not the contents of the dataset.</p><h3>Google AI &amp; Federated Learning</h3><p>According to Google AI, Federated Learning enables mobile phones to collaboratively learn a shared prediction model while keeping all the training data on device [4]. This means that the data no longer has to be copied from the device to the cloud. For the first time, the model can be trained on the device while analysts are only privy to the model updates.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/640/1*DpVaIIeabm09Zk0Pv9L1dw.png" /><figcaption><a href="https://ai.googleblog.com/2017/04/federated-learning-collaborative.html">Google AI</a></figcaption></figure><p>The image above demonstrates how this is achieved in the following steps:</p><ul><li><em>Device downloads current model</em></li><li><em>The model learns on the device and is improved</em></li><li><em>A summary of changes as a small focused update is derived</em></li></ul><p>The punchline is that only the update is sent to the cloud. The update is averaged with other devices’ updates in the network to apply improvements to the shared model. The improved model is immediately available to augment the personalisation of the user experience. The model is trained while the phone is idle, in the charger, and on a free wireless connection, so mobile phone performance is not negatively affected[4]. To ensure privacy and security, Google AI developed a <strong>Secure Aggregation protocol</strong>, enabling a coordinating server to only decrypt the average update. Meaning that no update about a single individual can be captured. Currently, this development is mostly around Gboard functionalities in Android-powered mobile phones.</p><p><a href="https://blog.oceanprotocol.com/how-ocean-compute-to-data-relates-to-other-privacy-preserving-technology-b4e1c330483">According to Trent McConaghy</a> of Ocean Protocol, Federated Learning as implemented by OpenMined could be further improved by Compute-2-Data to manage computation at each silo in a more secure fashion. In fact, we may see some incarnation of a collaboration between Federated Learning &amp; Compute-2-Data in the upcoming Ocean V4 release. Differential Privacy holds potential for Compute-to-Data contexts too.</p><h4>Useful resources</h4><p><strong>[1] </strong><a href="https://courses.openmined.org/courses/introduction-to-remote-data-science/8af00eca-0c90-4d21-9736-539ce74f88c5/2dce3b47-15c1-4a06-840f-567034e54790"><strong>Remote Data Science in 15 Minutes</strong></a></p><p><strong>[2] </strong><a href="https://medium.com/georgian-impact-blog/a-brief-introduction-to-differential-privacy-eacf8722283b"><strong>A Brief Introduction to Differential Privacy</strong></a></p><p><a href="https://privacytools.seas.harvard.edu/files/privacytools/files/pedagogical-document-dp_new.pdf"><strong>[3] Differential Privacy: A Primer for a Non-technical Audience</strong></a></p><p><strong>[4]</strong><a href="https://ai.googleblog.com/2017/04/federated-learning-collaborative.html"><strong>Federated Learning: Collaborative Machine Learning without Centralized Training Data</strong></a></p><p><a href="https://blog.oceanprotocol.com/how-ocean-compute-to-data-relates-to-other-privacy-preserving-technology-b4e1c330483"><strong>[5]How Ocean Compute-to-Data Relate to Other Privacy-Preserving Approaches?</strong></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1ffce67c636d" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>