<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by DFINITY on Medium]]></title>
        <description><![CDATA[Stories by DFINITY on Medium]]></description>
        <link>https://medium.com/@dfinity?source=rss-f46cd59473d8------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*_lhvJ2W55t5FtkNuRqpe_Q.png</url>
            <title>Stories by DFINITY on Medium</title>
            <link>https://medium.com/@dfinity?source=rss-f46cd59473d8------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 05 Apr 2026 11:25:22 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@dfinity/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Why ICP Is Essential]]></title>
            <link>https://medium.com/dfinity/why-icp-is-essential-5e9ffe870da1?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/5e9ffe870da1</guid>
            <category><![CDATA[bitcoin]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[cloud-computing]]></category>
            <category><![CDATA[tech-stack]]></category>
            <category><![CDATA[icp]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Fri, 22 Aug 2025 12:54:50 GMT</pubDate>
            <atom:updated>2025-08-22T14:22:11.843Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Mz3LAYFguwCn5wiD" /></figure><p>By Jan Camenisch</p><p>Compute is the lifeblood of society. There’s hardly anything that we do today that does not involve software in one form or another.</p><p>Our current IT stack is complicated, sometimes fragile, and can no longer be reliably protected from cyber attacks. That’s why almost everybody has moved their software onto the cloud, trusting the cloud provider with that task.</p><h3>The Cloud Control Problem</h3><p>Now, this is problematic for two reasons. Handing over operations also means handing over the control of one’s software and data to these third parties. Worse, it’s not even working. The cost spent on IT is ever-growing, as is the damage caused by cybercrime. Clearly, a radically different approach is needed.</p><p>In fact, we all know a computer that is built very differently from the current IT stack and that does not suffer from these problems. Bitcoin.</p><h3>Learning from Bitcoin’s Security</h3><p>Bitcoin has never been hacked, despite the large amount of money at stake. You might think I’m crazy. Bitcoin wastes a ton of energy, it’s very slow, and it’s not even a computer but only a ledger that keeps track of who owns how much bitcoin. How could one possibly run all of the world’s software like that?</p><p>The reason that Bitcoin is secure is twofold.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FF0pVSwbb1x8%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DF0pVSwbb1x8&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FF0pVSwbb1x8%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/d47df70e49855eb7daeecbd4f5b43095/href">https://medium.com/media/d47df70e49855eb7daeecbd4f5b43095/href</a></iframe><h3>How ICP Creates a Secure World Computer</h3><p>Bitcoin is a computer (well, maybe more like a pocket calculator) that is created by a mathematical protocol. So, it’s pure math. It cannot be hacked; 2+2 will always be 4. But that’s not enough. You don’t want to trust a single entity running the protocol; it could be hacked, bribed, or be outright malicious. You want to have many parties running that same protocol, assuming the majority is honest. So if all of them, or at least the majority, tell you the same result, you’re good.</p><p>At DFINITY, we have taken that principle of building a computer from protocol and all the latest research in cryptography and distributed systems, and spent over a thousand person-years to design and build the <a href="https://internetcomputer.org/what-is-the-ic">Internet Computer Protocol</a>. This protocol has been running in production since May 2021 without ever missing a beat nor ever being hacked. The protocol provides smart contracts with lots of storage, computational power, and communication bandwidth, just like any ordinary computer would.</p><h3>The User Experience</h3><p>This is how ICP delivers on the World Computer vision. Therefore, from an end user’s perspective, this feels and looks as if the software ran on AWS or Google Cloud. For instance, a user can just fire up a browser, enter the URL of an ICP smart contract, and bingo, they’re already using an application that runs on the Internet Computer. For the end user, the big difference is not visible. Because ICP is a protocol, the applications built by smart contracts on ICP are unhackable and unstoppable, just like the internet itself.</p><h3>Benefits for Developers</h3><p>This means that developers do not have to worry about the security and reliability of their applications and can focus on the application logic. That makes it far cheaper and more efficient to build and maintain applications. In fact, most applications that already run on the Internet Computer are built by very small teams.</p><h3>Getting Started with ICP</h3><p>I invite you to further explore ICP. Check out <a href="https://www.youtube.com/@DFINITY">DFINITY’s YouTube channel</a> for videos that explain how it works, fire up your favorite browser and try some of the many great dapps, or start building yourself by cloning some samples with <a href="https://icp.ninja/">ICP Ninja</a>.</p><p>Join us in our journey towards the World Computer.</p><p><strong>Learn More</strong></p><ul><li>Discover the Internet Computer at<a href="https://internetcomputer.org"> internetcomputer.org</a>.</li><li>Try applications built on ICP in your browser at <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbmJ1X3pSUGhJX0FFdlhleGd4QXpRM1NlLVpDUXxBQ3Jtc0tsbHpGZkRqNm1MYUtnRlVQaGhKUzNIU3Y1RWRNVjNXdmFKS3Jtd0s2aU9oWUtNUkJla0Fha19RTlR2M3c1R0NxSU9QbDh3Vm5yblhpMnVnTU5GYmZCZjAyWnd0WE1VTllrN290TXgtd2hFbjhDM2pPdw&amp;q=https%3A%2F%2Finternetcomputer.org%2Fecosystem&amp;v=F0pVSwbb1x8">internetcomputer.org/ecosystem</a>.</li><li>For developers, explore the documents on building on the Internet Computer Protocol at <a href="http://internetcomputer.org/docs">internetcomputer.org/docs</a>.</li></ul><p><strong>Other Articles from the World Computer Tech Talks Series</strong></p><ul><li><a href="https://medium.com/dfinity/who-controls-your-digital-life-26647a95ed2f">Who Controls Your Digital Life? by Björn Tackmann</a></li><li><a href="https://medium.com/dfinity/the-bitcoin-defi-renaissance-6e73b1c29310">The Bitcoin DeFi Renaissance by Thomas Locher</a></li></ul><p><em>This article is adapted from a World Computer Tech Talk by Jan Camenisch, CTO at the DFINITY Foundation. You can watch the original video </em><a href="https://www.youtube.com/watch?v=F0pVSwbb1x8&amp;list=PLuhDt1vhGcrdbe7QskVJAINPVDpdneR0K&amp;index=9"><em>here</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5e9ffe870da1" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/why-icp-is-essential-5e9ffe870da1">Why ICP Is Essential</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bringing LLMs to the Internet Computer]]></title>
            <link>https://medium.com/dfinity/bringing-llms-to-the-internet-computer-1f6df29da2c5?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/1f6df29da2c5</guid>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[artificial-intelligence]]></category>
            <category><![CDATA[large-language-models]]></category>
            <category><![CDATA[ai-worker]]></category>
            <category><![CDATA[icp]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Wed, 20 Aug 2025 09:01:59 GMT</pubDate>
            <atom:updated>2025-08-20T09:01:59.233Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*vu7JokMFClNXAYWrQg_HSw.png" /></figure><p>The <a href="https://internetcomputer.org/roadmap#Decentralized%20AI-Ignition"><strong>Ignition</strong></a> milestone is complete. This brings large language models (LLMs) to the Internet Computer, making it possible to use LLMs from within canister smart contracts with just a few lines of code.</p><h3>What Is the Ignition Milestone?</h3><p>The <strong>Ignition</strong> milestone, part of the <a href="https://internetcomputer.org/roadmap#Decentralized%20AI-start">Decentralized AI</a> track of the ICP Roadmap, focuses on connecting canisters to off-chain LLMs. With this update, developers can use AI in their dapps without a complex setup, thanks to AI workers.</p><h3>What’s New in Ignition</h3><h4>LLM Libraries for Easy Integration</h4><p>To simplify connecting your canisters to LLMs, we’ve added libraries in three languages used on the Internet Computer: Motoko, Rust, and TypeScript.</p><p>These libraries make it quick to use LLMs in your dapps. For example, here’s how a canister can interact with Llama 3.1 using just a few lines of Motoko code:</p><pre>import LLM &quot;mo:llm&quot;;<br><br>await LLM.chat(#Llama3_1_8B).withMessages([<br>  #system_ {<br>    content = &quot;You are a helpful assistant.&quot;;<br>  },<br>  #user_ {<br>    content = &quot;How big is the sun?&quot;;<br>  },<br>]).send();</pre><p>The above example can be found and tinkered with on <a href="https://icp.ninja/projects/llm-chatbot">ICP Ninja</a>. It shows how a canister can send a query to an LLM and get a response, with minimal setup.</p><p>Here’s another example showing how to call LLMs with tools:</p><pre>import LLM &quot;mo:llm&quot;;<br><br>actor {<br>  public func example() {<br>    let response = await LLM.chat(#Llama3_1_8B)<br>      .withMessages([<br>        #system_ {<br>          content = &quot;You are a helpful assistant.&quot;<br>        },<br>        #user {<br>          content = &quot;What&#39;s the weather in Zurich?&quot;<br>        },<br>      ])<br>      .withTools([LLM.tool(&quot;get_weather&quot;)<br>        .withDescription(&quot;Get current weather for a location&quot;)<br>        .withParameter(<br>          LLM.parameter(&quot;location&quot;, #String)<br>            .withDescription(&quot;The location to get weather for&quot;)<br>            .isRequired()<br>        )<br>        .build()<br>      ])<br>      .send();<br>  };<br>}</pre><p>You can find a live demo of using tools <a href="https://twf3b-uqaaa-aaaal-qsiva-cai.icp0.io/">here</a>, as well as the source code of the demo <a href="https://github.com/dfinity/llm/tree/main/examples">here</a>.</p><h3>AI Workers</h3><p>To connect canisters with off-chain LLMs, we’ve built a minimum viable product of AI workers, a simple system that lets canisters retrieve data from off-chain LLMs. AI workers handle the communication, so canisters can send requests and get responses from LLMs in real-time.</p><p>Currently, AI workers support Llama 3.1 8B, Llama 4 Scout, and Qwen 3 32B. These options give developers flexibility to choose the right LLM for their project.</p><p>Here’s a diagram illustrating how AI workers are used under the hood to relay prompts to off-chain LLM providers.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Tdr0bKEjynZey7_n" /></figure><p>How it works:</p><ol><li>Canisters send prompts to an “LLM canister” via the LLM libraries we mentioned. This is a special canister setup to receive LLM prompts.</li><li>The LLM canister stores these prompts in a queue.</li><li>AI workers continuously poll the LLM canister for prompts.</li><li>AI workers execute the prompts and return the response to the LLM canister, which returns it to the calling canister.</li></ol><h3>Real-World Use Cases</h3><p>Developers are already using the LLM libraries to build creative dapps, such as:</p><ul><li><strong>Wallets with chat features</strong>: Adding conversational AI to crypto wallets for better user interaction (soon to be launched in <a href="https://oisy.com/">OISY</a>)</li><li><strong>DAOs with sentiment analysis</strong>: Using LLMs to analyze community sentiment and guide portfolio decisions like in the <a href="https://alice.fun/">Alice DAO</a>.</li></ul><p>These examples show how AI workers can support a range of applications on the Internet Computer.</p><h3>Why This Matters and How to Get Started</h3><p>The <strong>Ignition</strong> milestone makes it simple for developers to integrate LLMs into their Internet Computer projects, enabling new kinds of dapps, like chatbots, analytics tools, and AI-driven DeFi apps. By combining LLMs with Internet Computer features like Chain Fusion, HTTPS outcalls, and onchain randomness, developers can build creative and powerful solutions.</p><p>Ready to try it? Explore the <a href="https://icp.ninja/">LLM Chatbot project</a> on ICP Ninja, check out the <a href="https://vgjrt-uyaaa-aaaal-qsiaq-cai.icp0.io/">live demo</a>, or dive into the code and examples in our <a href="https://github.com/dfinity/llm">repository</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1f6df29da2c5" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/bringing-llms-to-the-internet-computer-1f6df29da2c5">Bringing LLMs to the Internet Computer</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Internet Identity 2.0: The New User Experience]]></title>
            <link>https://medium.com/dfinity/internet-identity-2-0-the-new-user-experience-cf04243e8c32?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/cf04243e8c32</guid>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[digital-identity]]></category>
            <category><![CDATA[authentication]]></category>
            <category><![CDATA[the-internet-computer]]></category>
            <category><![CDATA[passkey]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Mon, 18 Aug 2025 14:37:14 GMT</pubDate>
            <atom:updated>2025-08-22T11:18:51.405Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*fUFgxKiCz_xR0fbV" /></figure><p>Have you tried signing into <a href="https://caffeine.ai/">Caffeine</a>? You may have noticed something.</p><p>To login to Caffeine, you use Internet Identity 2.0. This is a new version of the authentication service for the Internet Computer, and it provides an upgraded experience.</p><p>This article explains what Internet Identity 2.0 is, its benefits, and how you can use the option to upgrade from Internet Identity 1.0.</p><h4>What Is Internet Identity 2.0?</h4><p>Internet Identity 2.0 is a complete redesign of the Internet Computer’s authentication service. It has been built to make the secure login process simpler and more user-friendly for everyone.</p><h4>Key Improvements</h4><p>The new authentication service brings several improvements.</p><ul><li><strong>Passkeys: </strong>Internet Identity uses the latest passkey standards for enhanced security. Users can store their private keys on their devices, such as their smartphones, to use Internet Identity.</li><li><strong>No More Identity Numbers:</strong> With Internet Identity 1.0, users had to remember or store their identity numbers. This is no longer the case with 2.0. This is possible thanks to a technology called Discoverable Passkeys. The main benefit for users is a simpler login without needing to track a number.</li><li><strong>Sign-in with Google:</strong> The upgraded Internet Identity includes the option for users to use their <a href="https://www.google.com/account/about/">Google Account</a> as an authentication option. This makes it easy for the <a href="https://blog.google/technology/safety-security/more-transparency-and-control-your-google-account/">billions of Google Account users</a> around the world to sign up to Internet Identity with a familiar method.</li><li><strong>A Redesigned Interface:</strong> The entire login process has a fresh design that is more intuitive to navigate.</li><li><strong>Multiple Accounts from One Identity:</strong> You can create various accounts for a single application from one identity. This removes the need to manage separate identities for different roles, like a test account.</li></ul><h4>How to Upgrade Your Internet Identity</h4><p>The upgrade process is straightforward and does not affect your data or login information. After the upgrade, your identity works with the new system while remaining fully usable with existing applications.</p><p>There are two options.</p><ul><li>Visit <a href="http://id.ai">id.ai</a> directly and follow the upgrade steps.</li><li>If you already have an Internet identity, upgrade the next time you log in to Caffeine or any app using <a href="http://id.ai">id.ai</a> by following these three upgrade steps.</li></ul><p>Steps to upgrade:</p><ol><li>Click on “Upgrade.”</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*GHkbEjqYJyghJMntHBBM8A.png" /></figure><p>2. Enter your Internet Identity number. You will then be prompted to authenticate with your current passkeys.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ejw8fMtWVsvKDIvbKK4Gyg.png" /></figure><p>3. Enter a name for your identity. Internet Identity 2.0 introduces names for the identities. These are not unique names, but names that help you identify your Internet Identity. You will be prompted to create a new passkey after this step.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*6qSAys64yolYjbcfJLGgRA.png" /></figure><p>That’s it! Simple and quick.</p><h4>Key Questions About the Upgrade</h4><p><strong>What happens now if I do not upgrade from Internet Identity 1.0?</strong> You cannot use your existing identity to sign into id.ai or use applications that require the new login system, including Caffeine.</p><p><strong>Will I lose my login information or data if I upgrade?</strong> You won’t lose anything. Your login information remains unchanged, and there is no data loss.</p><p><strong>Will apps using Internet Identity 1.0 stop working?</strong> No. Apps using Internet Identity 1.0 will continue to work as usual. Your upgraded identity is compatible with both the existing and new systems.</p><p><strong>What is the “primary account” I see after upgrading?</strong> This is the same account you used with Internet Identity 1.0. To continue using your existing account with your applications, you only need to select this default option in Internet Identity 2.0.</p><p><strong>Should I upgrade?</strong> For now, you only need to upgrade for certain apps like Caffeine. As the Internet Identity 2.0 is rolled out, in the future, other apps will also be updated to use 2.0.</p><p>You can find more information on the the <a href="https://identitysupport.dfinity.org/hc/en-us/articles/40276570234132-Internet-Identity-Upgrade-FAQ">Internet Identity upgrade FAQ page</a>.</p><h4>For Developers</h4><p>To find out more about integrating Internet Identity 2.0. in your apps, read these posts on the Internet Computer Developer Forum:</p><p><a href="https://forum.dfinity.org/t/internet-identity-2-0/52377">Internet Identity 2.0</a></p><p><a href="https://forum.dfinity.org/t/internet-identity-2-0-existing-users-upgrade/55641">Existing Users Upgrade</a></p><p>Ready to upgrade or create an identity for the first time? Visit <a href="http://id.ai">id.ai</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=cf04243e8c32" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/internet-identity-2-0-the-new-user-experience-cf04243e8c32">Internet Identity 2.0: The New User Experience</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Bitcoin DeFi Renaissance]]></title>
            <link>https://medium.com/dfinity/the-bitcoin-defi-renaissance-6e73b1c29310?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/6e73b1c29310</guid>
            <category><![CDATA[the-internet-computer]]></category>
            <category><![CDATA[bitcoin]]></category>
            <category><![CDATA[defi]]></category>
            <category><![CDATA[decentralized-finance]]></category>
            <category><![CDATA[web3]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Fri, 15 Aug 2025 14:12:09 GMT</pubDate>
            <atom:updated>2025-08-22T14:24:30.483Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*fV9kwHAMWxcWVhXlmh5R6w.png" /></figure><p>By Thomas Locher</p><p>Bitcoin DeFi is an important development in the crypto space, so let’s start with a quick introduction.</p><p>Bitcoin is the first and most well-known cryptocurrency. Even though there are many other crypto projects, Bitcoin still commands a large share of the market cap of the entire blockchain space, and its popularity continues to grow.</p><p>Another area that has seen remarkable growth in the last few years is decentralized finance, or DeFi for short. DeFi is a term used for financial services and products that operate without any centralized entities, like banks, and that enable peer-to-peer transactions and decentralized applications.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FVjLbm41vIGg%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DVjLbm41vIGg&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FVjLbm41vIGg%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/f1706c53f8cabd435ee6936e4637c2da/href">https://medium.com/media/f1706c53f8cabd435ee6936e4637c2da/href</a></iframe><h3>The Challenge of Bitcoin DeFi</h3><p>Bitcoin DeFi is simply DeFi that makes use of bitcoin, or BTC for short. However, it is actually not that simple to use bitcoin in DeFi because Bitcoin, the network infrastructure, was intentionally designed to be simple and limited in functionality.</p><p>This limitation restricts the use of bitcoin in decentralized applications, including DeFi. The significant growth in DeFi has happened to a large extent without the involvement of bitcoin. Obviously, it would be great if bitcoin’s large market cap could be unlocked and used in DeFi applications. So far, most attempts at Bitcoin DeFi use some sort of centralized intermediary to make it work, which goes against the decentralized nature of Bitcoin.</p><h3>A Solution on the Internet Computer</h3><p>How can the <a href="https://internetcomputer.org/">Internet Computer</a> help here?</p><p>The Internet Computer is directly integrated with Bitcoin at the networking level, which means there is no need for any centralized intermediaries, making the interactions reliable and secure. This integration makes it possible for smart contracts on the Internet Computer, called <a href="https://internetcomputer.org/docs/building-apps/essentials/canisters">canisters</a>, to get information about the Bitcoin blockchain, such as the balances of bitcoin addresses. It is also possible for canisters to have bitcoin addresses themselves and make bitcoin transactions.</p><p>In short, canisters can hold and transfer bitcoin, just like a wallet. However, because they’re programmable, they can implement any program logic. In other words, any decentralized application, and in particular any DeFi application, can be built around bitcoin on the Internet Computer.</p><p>To give you a few examples, bitcoin can be used to build tokens that are backed by real bitcoin in a decentralized manner.</p><p>For instance, <a href="https://internetcomputer.org/ckbtc">ckBTC</a> is such a token on the Internet Computer. The ckBTC minter canister guarantees that one ckBTC is always backed by one bitcoin. But unlike bitcoin, ckBTC can be transferred in a few seconds and at low cost, which makes it suitable for micropayments.</p><p>Another example is decentralized exchanges that can offer trading pairs involving bitcoin or fungible tokens on Bitcoin. You can build lending and borrowing services where you can earn interest on your bitcoin or use it as collateral. You can also build bitcoin-based escrow services with automated payments.</p><p>To summarize, Bitcoin DeFi is possible on the Internet Computer and without any centralized intermediaries, offering exciting opportunities for developers and users.</p><p>Join us on our journey toward the World Computer.</p><p><strong>Learn More</strong></p><ul><li>Discover the Internet Computer at<a href="https://internetcomputer.org"> internetcomputer.org</a>.</li><li>Watch Liquidium discuss how they addressed bridging problems with native asset lending on the <a href="https://www.youtube.com/watch?v=kUuf3qPuAPk">DFINITY YouTube channel</a>.</li><li>For developers, explore the documents on building on Bitcoin at <a href="https://docs.bitcoindefi.dev/">docs.bitcoindefi.dev</a>.</li></ul><p>Other Articles from the World Computer Tech Talks Series</p><ul><li><a href="https://medium.com/dfinity/who-controls-your-digital-life-26647a95ed2f">Who Controls Your Digital Life? by Björn Tackmann</a></li><li><a href="https://medium.com/dfinity/why-icp-is-essential-5e9ffe870da1">Why ICP Is Essential by Jan Camenisch</a></li></ul><p><em>This article is adapted from a World Computer Tech Talk by Thomas Locher, Staff Researcher at the DFINITY Foundation. You can watch the original video </em><a href="https://www.youtube.com/watch?v=VjLbm41vIGg"><em>here</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6e73b1c29310" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/the-bitcoin-defi-renaissance-6e73b1c29310">The Bitcoin DeFi Renaissance</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Who Controls Your Digital Life?]]></title>
            <link>https://medium.com/dfinity/who-controls-your-digital-life-26647a95ed2f?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/26647a95ed2f</guid>
            <category><![CDATA[computer-world]]></category>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[the-internet-computer]]></category>
            <category><![CDATA[data-sovereignty]]></category>
            <category><![CDATA[data-privacy]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Fri, 08 Aug 2025 12:44:32 GMT</pubDate>
            <atom:updated>2025-08-22T14:23:12.351Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*fSatmQJzvbOCsqRApejfLg.png" /></figure><p>By Björn Tackmann</p><p>As more elements of our lives move online, the amount and value of the data we amass also grows rapidly. Our communication in emails, messengers, and social media apps, our identity information, and just so much more — all this data is now online, moving seamlessly between our devices.</p><p>To achieve this, however, all that data must be stored somewhere, on some computer. If that’s not your computer, it is someone else’s. That means this “someone else” who controls that computer is ultimately in control of your data. Someone else also decides what you get to do with your data. You might even lose access.</p><p>But there’s more: that someone else who is in control also decides who else gets access. Your data has long been used to target you with advertisements to make you buy more stuff you don’t need. If you’ve read any of the end-user license agreement updates you’ve probably signed off on over the last year, you will have seen that many companies now also claim the right to train their AI on your data.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FsQbzgQJyLAU%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DsQbzgQJyLAU&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FsQbzgQJyLAU%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/bcfe2b7278985338ca4014cdc976e305/href">https://medium.com/media/bcfe2b7278985338ca4014cdc976e305/href</a></iframe><h3>What’s the Alternative?</h3><p>Running your own services is actually hard. Operating your own infrastructure involves hours and hours of work.</p><p>The <a href="https://internetcomputer.org/">Internet Computer Protocol (ICP)</a> enables services to be built in a different way. It allows you to store your code and data without giving up control, so you are still in charge. It also accomplishes this without requiring you to operate your own infrastructure.</p><p>Fundamentally, you can think of ICP as a computing platform built around the concept of ownership for code and data: a sovereign cloud, a true World Computer.</p><p>This is achieved by building on a decentralized network. ICP is based on the same underlying principle as Bitcoin. However, more than a thousand person-years of research and development efforts have enabled the Internet Computer Protocol to expand how decentralized technology is used. This technology is no longer a simple token ledger for monetary transactions. Its use now includes a full-fledged computing platform that can host all your code and data and keep you in control.</p><p>Data sovereignty is in your hands with ICP.</p><p>Join us on our journey toward the World Computer.</p><p><strong>Learn More:</strong></p><ul><li>Discover the Internet Computer at<a href="https://internetcomputer.org"> internetcomputer.org</a>.</li><li>Watch tutorials on the<a href="https://www.youtube.com/dfinity"> DFINITY YouTube channel</a>.</li><li>For developers, start building today at<a href="https://icp.ninja"> icp.ninja</a>.</li></ul><p><strong>Other Articles from the World Computer Tech Talks Series</strong></p><ul><li><a href="https://medium.com/dfinity/the-bitcoin-defi-renaissance-6e73b1c29310">The Bitcoin DeFi Renaissance by Thomas Locher</a></li><li><a href="https://medium.com/dfinity/why-icp-is-essential-5e9ffe870da1">Why ICP Is Essential by Jan Camenisch</a></li></ul><p><em>This article is adapted from a World Computer Tech Talk by Björn Tackmann, Head of Research at the DFINITY Foundation. You can watch the original video </em><a href="https://www.youtube.com/watch?v=sQbzgQJyLAU&amp;list=PLuhDt1vhGcrdbe7QskVJAINPVDpdneR0K&amp;index=11"><em>here</em></a><em>.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=26647a95ed2f" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/who-controls-your-digital-life-26647a95ed2f">Who Controls Your Digital Life?</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[From Decentralization to AI: World Computer Tech Talks Recap]]></title>
            <link>https://medium.com/dfinity/from-decentralization-to-ai-world-computer-tech-talks-recap-26ff4afe03d6?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/26ff4afe03d6</guid>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[the-internet-computer]]></category>
            <category><![CDATA[decentralized-finance]]></category>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[dfinity]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Thu, 07 Aug 2025 13:14:41 GMT</pubDate>
            <atom:updated>2025-08-07T13:31:55.128Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ycDM3UxqCM7EXes_D6rYpg.jpeg" /></figure><p>This year, we launched the World Computer Tech Talks series with a clear mission: shine a light on the groundbreaking technology of the Internet Computer Protocol. Across eleven episodes, experts from the DFINITY Foundation broke down core concepts that power the World Computer vision.</p><p><a href="https://www.youtube.com/watch?v=iZiKSRwJPlI&amp;list=PLuhDt1vhGcrdbe7QskVJAINPVDpdneR0K&amp;index=1">With the first season now complete</a>, we want to take a look back at key themes our speakers explored. After the incredible feedback we received from the community for the Tech Talks, we also want to announce that we will replay the entire first season as we prepare for the next.</p><h4>The Big Picture: Why ICP is Essential</h4><p>To understand the Internet Computer, it is important to first grasp the problems it solves. In his episodes, the DFINITY Foundation’s CTO Jan Camenisch <a href="https://www.youtube.com/watch?v=F0pVSwbb1x8&amp;list=PLuhDt1vhGcrdbe7QskVJAINPVDpdneR0K&amp;index=9">explained</a> that our current IT stack is fragile, complex, and cannot be reliably protected from cyberattacks. He positioned ICP as a revolutionary solution, taking the security principles of Bitcoin and applying them to general-purpose computing to create a true “world computer.”</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FF0pVSwbb1x8%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DF0pVSwbb1x8&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FF0pVSwbb1x8%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/d47df70e49855eb7daeecbd4f5b43095/href">https://medium.com/media/d47df70e49855eb7daeecbd4f5b43095/href</a></iframe><p>He described ICP as fundamentally different from other blockchains, a platform that provides developers with immense storage and computational power while remaining unhackable. As Jan put it, the protocol “has been running in production since May 2021 without ever missing a beat nor ever being hacked.” This foundation of security and reliability is what makes everything else possible.</p><h4>Digital Sovereignty and Security</h4><p>Building on that foundation, a central topic throughout the series was digital sovereignty.</p><p>In his episodes, Head of Research Björn Tackmann <a href="https://www.youtube.com/watch?v=sQbzgQJyLAU">tackled</a> this from two angles: the personal control of our data and the organizational need to defend against insider threats. He argued that the current internet model forces a trade-off. “If that’s not your computer, well, then it’s someone else’s,” he stated in his talk on digital life. “But that means that this ‘someone else’ who controls that computer is ultimately in control of your data.”</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FsQbzgQJyLAU%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DsQbzgQJyLAU&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FsQbzgQJyLAU%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/bcfe2b7278985338ca4014cdc976e305/href">https://medium.com/media/bcfe2b7278985338ca4014cdc976e305/href</a></iframe><p>His <a href="https://www.youtube.com/watch?v=iZiKSRwJPlI">other talk</a> focused on how ICP’s architecture solves this at an enterprise level. By removing centralized points of control, the protocol provides security guarantees that traditional IT cannot. This is because, as Björn explained, the integrity of code and data on ICP is cryptographically secured by the network itself, making it resilient to both external attacks and malicious insiders.</p><h4>A Deep Dive into True Decentralization</h4><p>What does decentralization really mean?</p><p>In his talk, VP of Engineering Samuel Burri went beyond the buzzword to explain <a href="https://www.youtube.com/watch?v=60X78bqt5aE&amp;list=PLuhDt1vhGcrdbe7QskVJAINPVDpdneR0K&amp;index=3">ICP’s unique approach</a>. He emphasized that building a resilient platform requires eliminating every single point of trust. “To achieve that, we require a compute and storage platform that is extra secure and resilient,” he said. “There must be no single point of failure.”</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F60X78bqt5aE%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D60X78bqt5aE&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F60X78bqt5aE%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/8717e119c65f772349c7780bd321c637/href">https://medium.com/media/8717e119c65f772349c7780bd321c637/href</a></iframe><p>His session detailed how ICP’s deterministic decentralization, which uses a network of vetted, independent node providers, provides robust security without the immense energy costs of other systems.</p><p>Viewers also learned about the Network Nervous System (NNS), the onchain DAO that governs the protocol, executing upgrades autonomously and transparently.</p><h4>Uniting a Fragmented Web3 with Chain Fusion</h4><p>Several episodes were dedicated to Chain Fusion, ICP’s technology for seamless cross-chain interoperability.</p><p>Senior Director of Engineering Manu Drijvers <a href="https://www.youtube.com/watch?v=yMjmWQNpybQ">explained</a> how this feature allows ICP smart contracts to natively control assets on other blockchains, including Bitcoin, Ethereum, and Solana. “With Chain Fusion on ICP, we can build native multichain DeFi, bringing DeFi across chains together in a secure and seamless way,” he highlighted in his talk.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FyMjmWQNpybQ%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DyMjmWQNpybQ&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FyMjmWQNpybQ%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/bd3a32c4d27fd1b8d16a3dac9a7f2896/href">https://medium.com/media/bd3a32c4d27fd1b8d16a3dac9a7f2896/href</a></iframe><p>The series showed how this technology directly addresses the fragmentation of the current Web3 space, eliminating the need for risky centralized bridges.</p><p>In his episode on the Bitcoin DeFi renaissance, Staff Researcher Thomas Locher <a href="https://www.youtube.com/watch?v=VjLbm41vIGg">demonstrated</a> the practical applications. “Canisters can hold and transfer Bitcoin just like a wallet,” he noted, “but because they’re programmable, they can implement any program logic.” This unlocks Bitcoin’s vast liquidity for a new wave of decentralized finance.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FVjLbm41vIGg%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DVjLbm41vIGg&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FVjLbm41vIGg%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/f1706c53f8cabd435ee6936e4637c2da/href">https://medium.com/media/f1706c53f8cabd435ee6936e4637c2da/href</a></iframe><h4>Reimagining the User and Developer Experience</h4><p>A recurring message in the series was the importance of accessibility.</p><p>Several speakers, including Director of Engineering Georgi Harizanov, <a href="https://www.youtube.com/watch?v=GvVnb8xJDyI">explained</a> how ICP was designed for a low-friction experience. He pointed out that a true World Computer “should be appealing to all different types of users, including those that are not technically savvy.”</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FGvVnb8xJDyI%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DGvVnb8xJDyI&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FGvVnb8xJDyI%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/e48da0101bd85f05153cecd6148997f9/href">https://medium.com/media/e48da0101bd85f05153cecd6148997f9/href</a></iframe><p>The talks highlighted key features that make this possible:</p><ul><li><strong>Browser-Based Access:</strong> Users can interact with dapps on ICP using a standard web browser, with no special software needed.</li><li><strong>Reverse Gas Model:</strong> Developers prepay for application resources, so users can engage with services for free.</li><li><strong>Full-Stack Onchain Development:</strong> Samuel Burri’s <a href="https://www.youtube.com/watch?v=aHZ8fy2_6Lw">episode on building dapps</a> showed developers how they can host both an application’s frontend and backend entirely onchain, a unique capability of ICP.</li></ul><h4>Exploring the Frontiers of Onchain Technology</h4><p>Finally, the series offered a glimpse into the future.</p><p>Islam El-Ashi, Head of the AI team, dedicated <a href="https://www.youtube.com/watch?v=i5X7JynPj2s">his talk</a> to sovereign AI, explaining how users will soon be able to run personal AI agents on ICP. “Your assistant and agents will work for you and only you,” he assured viewers, emphasizing the data privacy benefits.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fi5X7JynPj2s%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Di5X7JynPj2s&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fi5X7JynPj2s%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/5bc30e277d5772e2b4946a91840a9d4e/href">https://medium.com/media/5bc30e277d5772e2b4946a91840a9d4e/href</a></iframe><h4>What’s Next? Get Ready for Season Two</h4><p>The <a href="https://www.youtube.com/watch?v=iZiKSRwJPlI&amp;list=PLuhDt1vhGcrdbe7QskVJAINPVDpdneR0K&amp;index=1">first eleven episodes of the World Computer Tech Talks</a> laid the foundation for understanding the power and potential of the Internet Computer. We are grateful to everyone who tuned in and engaged with the series.</p><p>The conversation is far from over. Work on a second season is already underway. We plan to dive deeper into the Internet Computer and beyond. For example, the topics will include how storage works on ICP, an introduction to the <a href="https://internetcomputer.org/docs/motoko/home">Motoko</a> programming language, the <a href="https://internetcomputer.org/nns">Network Nervous System (NNS)</a>, decentralized autonomous organizations (DAOs) more broadly, and more.</p><p>In the meantime, you can watch the entire first season on the DFINITY <a href="https://www.youtube.com/@DFINITY">YouTube channel</a>. You can also catch the episodes as they are rereleased each Friday on <a href="https://x.com/dfinity">X</a> and <a href="https://www.linkedin.com/company/dfinity">LinkedIn</a>.</p><p>Join us on our journey toward the World Computer.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=26ff4afe03d6" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/from-decentralization-to-ai-world-computer-tech-talks-recap-26ff4afe03d6">From Decentralization to AI: World Computer Tech Talks Recap</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How Juno Aims to Put Developers Back in Control]]></title>
            <link>https://medium.com/dfinity/how-juno-aims-to-put-developers-back-in-control-e1ffc208c680?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/e1ffc208c680</guid>
            <category><![CDATA[cloud-computing]]></category>
            <category><![CDATA[the-internet-computer]]></category>
            <category><![CDATA[developer-tools]]></category>
            <category><![CDATA[data-ownership]]></category>
            <category><![CDATA[serverless]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Mon, 28 Jul 2025 08:02:42 GMT</pubDate>
            <atom:updated>2025-07-28T08:02:42.432Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HSd_J-Ccil9Ua8vz78eJpg.png" /></figure><p>For many developers, the modern cloud is a double-edged sword. It offers unprecedented power and scale, but often at the cost of control. Data is opaque, policies are complex, and the platform can change the rules at any moment. It’s a frustration that seasoned developer David Dal Busco knows all too well. Instead of accepting the status quo, he embraced the classic engineering mindset: “I’m going to do it myself.”</p><p>The result is <a href="https://juno.build/">Juno</a>, a platform-as-a-service built on the Internet Computer that offers a powerful alternative to traditional cloud providers. The project was born from a desire to give developers the tools they need without forcing them to give up ownership. We sat down with David to learn more about the origins of the project, the idea behind Juno, and how it empowers developers on the Internet Computer.</p><h3>The Birth of Juno</h3><p>David is a freelance developer with nearly a decade of experience, much of it spent building mobile applications for clients. For years, he has balanced his client work with a passion for building his own projects on the side. His dual perspective as both a service provider and an independent creator gave him a unique insight into the needs and pain points of the modern developer.</p><p>“When I build mobile applications, I use serverless providers. I used Firebase, mainly,” David explains. “And there wasn’t that construct on the IC at the time… If I want to build an app over the weekend, I don’t want to reinvent the wheel. I want to start with some tools.”</p><p>This need for a streamlined, ready-to-use toolset, combined with a growing frustration with the existing developer experience on Web3, sparked the idea for Juno. His motivation went beyond simply filling a market gap; he was building the solution he wished he had.</p><h3>What is Juno?</h3><p>At first glance, Juno might seem familiar to developers. In the past, David has described it as the Google Firebase alternative for Web3, and the analogy holds to a point. Like Firebase, Juno provides a comprehensive suite of backend services out of the box, including authentication, data and file storage, hosting, and serverless functions, all designed to let developers build and launch applications quickly.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*XrIrzEDjx5JYCK5X" /><figcaption>David Dal Busco presenting at ETHCluj 2025.</figcaption></figure><p>But as David is quick to point out, the comparison only goes so far.</p><p>“I would say it’s a serverless cloud provider as they know, but there is a twist,” he says, “and the twist is that they are in charge.”</p><p>This is the core of Juno’s philosophy: empower the developer. With Juno, there is no central intermediary. Developers maintain full control over their applications, their data, and their funds. The platform’s architecture, built entirely on the Internet Computer, ensures that Juno itself has no access to or control over a developer’s creations.</p><h3>Why the Internet Computer?</h3><p>The choice to build on the Internet Computer was fundamental to achieving this vision. The Internet Computer provides the decentralized foundation necessary to deliver on Juno’s promise of true ownership.</p><p>“When you use the IC, it’s transparent that you have the security and that you have the control,” David notes. While one can trust the security of major cloud providers, the Internet Computer’s architecture makes that security inherent and verifiable, moving it from a policy promise to a technical guarantee.</p><p>Juno leverages the Internet Computer’s unique capabilities, like its smart contracts, which are called canisters. As described by David in his white paper for Juno, this allows Juno to give each developer their own “Mission Control” smart contract. This acts as a central hub for all their projects and even functions as a wallet, ensuring that control remains firmly in their hands. The Internet Computer’s ability to serve web content directly from the blockchain at “lightning speed,” as David says, enables Juno to offer a seamless, 100% onchain experience.</p><p>David’s ultimate vision is to abstract the complexity of the blockchain away entirely. “My dream goal is having a web developer that uses it that doesn’t even know that there is a blockchain behind it.”</p><h3>From a Blank Page to a Full Dapp</h3><p>Juno is designed to address the countless small but time-consuming tasks that every developer faces.</p><p>“You don’t start with a blank page,” David explains. “You, or your AI coding assistant, shouldn’t have to build authentication and think about the permission system. If you want your user to upload a file, you shouldn’t have to build that part. With Juno, all the small tools that you would have to build are already there.”</p><p>This frees developers to focus on what makes their application unique instead of on boilerplate infrastructure. The potential is already being demonstrated by the community, showcasing the diverse applications that can be built on the platform.</p><h4>Community Showcase: What’s Being Built on Juno</h4><p>The community is already building a diverse range of applications. <a href="https://ic-toolkit.app/">Toolkit</a>, for example, is a versatile suite for managing Service Nervous Systems (SNS) and other projects on the Internet Computer, acting as a key driver for governance and collaboration. Another project, <a href="https://home.solutio.one/">Solutio</a>, was born from the vision that a genius idea can come from anywhere. It provides a platform for crowdfunding and developing solutions, enabling communities to propose ideas and fund the features they need most.</p><p>For David, the most exciting prospect is seeing the unexpected emerge. A prime example is <a href="https://3ztkm-wiaaa-aaaal-asd6a-cai.icp0.io/">Gods Are Dead</a>, a play-to-earn role-playing game where players fight enemies and craft powerful items. “A few months ago, there was a person who built a game, an RPG,” he recalls. “I never expected someone to build that… you’re like, ‘Oh yeah, that’s a really cool demo.’ This kind of thing… I want to be surprised.”</p><h3>The Road Ahead</h3><p>Juno is continuously evolving. David has just launched a <a href="https://juno.build/blog/serverless-functions-github-actions">deeper GitHub integration</a> for automated deployments; he is working on improved TypeScript support for serverless functions; and he is exploring tools to support team collaboration. He is also focused on artificial intelligence. “I’m currently working on providing support for developers who want to work with AI,” David says, “whether it’s with vibe coding tools or getting better answers through AI assistants.” For example, he is working on providing llms.txt files, which help AI models understand documentation more effectively.</p><p>The mission remains the same: to grow the ecosystem by providing developers with the best possible tools while staying true to the principles of decentralization and ownership.</p><p>Juno represents a significant step forward, demonstrating the power of the Internet Computer to reshape the landscape of web development. It’s a testament to what a single developer can achieve when they identify a problem, envision a better way, and build a solution that puts control back where it belongs: in the hands of the creators.</p><p>Ready to take control of your development stack? Visit<a href="https://juno.build"> juno.build</a> to get started and see what you can build.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e1ffc208c680" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/how-juno-aims-to-put-developers-back-in-control-e1ffc208c680">How Juno Aims to Put Developers Back in Control</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Real-time Transparency with Public API Boundary Node Access Logs]]></title>
            <link>https://medium.com/dfinity/real-time-transparency-with-public-api-boundary-node-access-logs-5ecf0a5017fe?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/5ecf0a5017fe</guid>
            <category><![CDATA[data-analytics]]></category>
            <category><![CDATA[blockchain-technology]]></category>
            <category><![CDATA[web3-development]]></category>
            <category><![CDATA[the-internet-computer]]></category>
            <category><![CDATA[decentralization]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Thu, 24 Jul 2025 09:02:42 GMT</pubDate>
            <atom:updated>2025-07-24T09:02:42.941Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*a9ZOjeGeVTB8_Xzw" /></figure><p>We are excited to announce the successful completion of the <a href="https://internetcomputer.org/roadmap#Platform%20Decentralization-Levitron">Levitron milestone</a>, a major step forward in transparency and insights for the Internet Computer Protocol (ICP). With this milestone, API boundary node (API BN) access logs become publicly available in real-time, offering unprecedented insight into how the Internet Computer and its hosted canisters are being used.</p><h3>The edge of the Internet Computer: the API Boundary Nodes</h3><p>API BNs act as the public edge of the Internet Computer. They are the first point of contact for every incoming request, forwarding each one to the appropriate subnet, replica node, and, ultimately, the target canister. This means they capture and log every single external request for the Internet Computer.</p><h3>Unlocking new insights with public access logs</h3><p>Public access logs are an invaluable resource for both canister developers and the broader ICP community, and their availability provides a wealth of information that was previously inaccessible. For example, they allow the following.</p><ul><li><em>Tracking canister usage:</em> For the first time, developers can observe the full spectrum of canister interactions, including query calls, which were previously not visible.</li><li><em>Gauging network activity:</em> The broader community can track activity across popular dapps and the overall network.</li><li><em>Providing data for analytics platforms:</em> Ranking and analytics platforms can directly integrate these logs to provide accurate metrics directly from ICP.</li></ul><p>Until now, these logs were not publicly accessible. However, in true Web3 spirit, the Levitron milestone changes this: each API BN now exposes an endpoint, allowing clients to subscribe to and stream these logs directly.</p><h3>Decentralized, direct, and detailed</h3><p>This new access is entirely decentralized, meaning there is no intermediary. Interested parties can stream information directly from the API boundary nodes of the Internet Computer itself.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*m0H-0ZCCJTz9QZ6c" /></figure><p>Log streaming happens on a per-canister basis, providing detailed information such as:</p><ul><li>The method being called.</li><li>The status code of the response.</li><li>The client making the call.</li><li>The cache status of the response (hit, miss, or bypass).</li><li>The error information (if available).</li><li>The request and response sizes.</li><li>And more!</li></ul><h3>Prioritizing privacy</h3><p>It is important to understand that these logs are designed with privacy in mind. They do not contain any information about the actual payload of the call, IP addresses, or the sender principal. The only user-related information provided is the client ID, which is a salted hash of the IP and the sender. This salt stems from the salt-sharing canister, is rotated every month, and is only accessible by the API BNs, meaning no other entity knows this salt. This ensures valuable usage data is accessible without compromising user privacy.</p><h3>Real-time streaming and future enhancements</h3><p>You can now stream logs in real-time, starting today! It is important to note that this direct streaming mechanism does not provide historical data. If you want to analyze past activity, you will need to build your own database to store the streamed logs.</p><p>To help you get up and running, we have provided instructions in our <a href="https://internetcomputer.org/docs/building-apps/advanced/canister-access-logs">documentation</a>, along with a <a href="https://github.com/dfinity/ic-bn-logs">sample client</a> that is ready for use.</p><p>Looking ahead, once <a href="https://internetcomputer.org/roadmap#Compute%20Platform-Magnetosphere">SEV-SNP</a> is rolled out to the API boundary nodes, clients will be able to attest to these nodes. This will significantly enhance the authenticity and integrity of these logs, giving you even greater confidence in the data.</p><p>For more in-depth information and technical details, be sure to check out the <a href="https://internetcomputer.org/docs/building-apps/advanced/canister-access-logs">official documentation</a> and the <a href="https://github.com/dfinity/ic-bn-logs">sample client</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5ecf0a5017fe" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/real-time-transparency-with-public-api-boundary-node-access-logs-5ecf0a5017fe">Real-time Transparency with Public API Boundary Node Access Logs</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Hello, Self-Writing Internet: Creations and Conversations]]></title>
            <link>https://medium.com/dfinity/hello-self-writing-internet-creations-and-conversations-3027cefb28be?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/3027cefb28be</guid>
            <category><![CDATA[caffeine-ai]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[san-francisco]]></category>
            <category><![CDATA[technology]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Fri, 18 Jul 2025 22:15:12 GMT</pubDate>
            <atom:updated>2025-07-18T22:15:12.658Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*QrCrZ9tL0M2Q-3tB" /></figure><p>The pace of development of AI has been unyielding. There’s been plenty of discussion around “vibe coding,” but this is clearly just the beginning of something. So what’s next?</p><p>The internet and our digital lives are about to change fundamentally with the Self-Writing Internet.</p><p>In the form of <a href="https://caffeine.ai/">Caffeine</a>, the DFINITY Foundation has created a fully end-to-end, decentralized AI development platform. This goes beyond the promise of vibe coding, which is limited more to developers. Caffeine will enable everyone, technical and non-technical, to define their digital world on their terms.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FKIQQEQBv3LY%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DKIQQEQBv3LY&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FKIQQEQBv3LY%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/5018bc7bae281720d549963a08bbde81/href">https://medium.com/media/5018bc7bae281720d549963a08bbde81/href</a></iframe><p>At Dogpatch Studios in San Francisco, the <a href="https://www.youtube.com/live/LCggjSKTX-M?si=-Qvhkxby92jAhBod"><em>Hello, Self-Writing Internet</em> </a>event brought together 1,000 people in person and 50,000 on the livestream to feature the first-ever Caffeine hackathon and discussions on the future it promises. This article captures some of the highlights of the day, demonstrating the possibilities of Caffeine and the key questions raised by the new paradigm.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*mwgIQv-YrWPXQH9P" /></figure><h3>The Wait is Over</h3><p>For those in attendance and watching online eager to get their hands on the new technology, a key announcement came when Dominic Williams, Founder and Chief Scientist of the DFINITY Foundation, took to the stage.</p><blockquote>“Tomorrow, we’re starting to give people access to those who’ve signed up for the alpha,” he revealed. “It’s going to roll out slowly and carefully, but please make sure you’re in the line if you want to try it.”</blockquote><p>This marked the official opening of Caffeine to the public. Invite codes are being released on a rolling basis, giving the first users the opportunity to start building apps just by talking.</p><p>While the announcement highlighted how Caffeine is being opened up to the world, a select group at the event was already putting this promise to the test.</p><h3>The First Caffeine Hackathon</h3><blockquote>“If you can describe it, Caffeine can build it.”</blockquote><p>— Bruno Calabretta, Head of Ecosystem Hubs, The DFINITY Foundation</p><p>At the Caffeine hackathon, the atmosphere was electric as a packed room of 80 creators, split evenly between technical and non-technical backgrounds, prepared to make history. The goal was clear: bring an idea to life.</p><p>The creators took this to heart, diving into their projects with such focus that some did not want to take breaks. The energy was infectious; soon, participants were answering each other’s questions with the suggestion to “Just ask Caffeine!”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*me8VzwdX6BGx-DIw" /></figure><p>“The feedback and the response were amazing,” said Bruno Calabretta, who coordinated the hackathon. “People were so ecstatic about Caffeine, how it works, what they can do with it.”</p><p>A dynamic emerged between the two tracks. Participants with technical backgrounds initially approached Caffeine as a traditional coding tool. They realized they did not have to write code from scratch, but could instead leverage their expertise to refine what Caffeine built.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*EZnyTlU8joD7VJGW" /></figure><p>The non-technical participants, however, came with a different mindset. “Non-technical people, they really came with the goal of exploring, of seeing what could come out of it,” Bruno observed. “They knew that they had an idea…and they tried for six hours to make it a reality. And the reality is that it happened pretty fast.” This allowed them to spend most of their time collecting feedback and improving the user experience, a crucial part of product development. The results were staggering, proving that a background in programming is no longer a prerequisite for application creation.</p><h3>Hackathon Winners</h3><p>After hours of intense creation, the numbers spoke for themselves. While participants could only make one final submission, over 240 apps were created from scratch throughout the day, resulting in over 75 final submissions for the judges. Some projects also went through 10 to 25 iterations.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*2PDX3Gv0ZepGrZnb" /></figure><p>As the deadline approached, the collective focus was so intense that when asked if they needed more time, the room answered “Yes” as one, earning them another fifteen minutes of creation.</p><p>From this incredible pool of creativity, the judges selected the winners from each track, with a prize pool of $25,000 for first place, $12,000 for second, and $7,500 for third in both categories.</p><p>The winning projects were announced on the main stage to close the event.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*LKVcw3M61nWsMtmh" /></figure><h4><strong>Technical Track Winners</strong></h4><ul><li><strong>First Place:</strong> Road Patrol, which enables citizens to improve their cities through map-based reporting, including things such as potholes, broken street lights and more.</li><li><strong>Second Place:</strong> K, which scans your AI generated apps and projects for security gaps and other vulnerabilities.</li><li><strong>Third Place:</strong> SkillSprout, which makes learning new skills more engaging by enabling you to collect points and achievements.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*vL3102EpyuggrsBG" /></figure><h4><strong>Non-Technical Track Winners</strong></h4><ul><li><strong>First Place:</strong> BlueLens, which enables you to monitor the safety of your drinking water with real-time data and analytics, including an integrated AI chat tool.</li><li><strong>Second Place:</strong> Will Maker, which allows you to generate legal documentation such as a will, power of attorney, and healthcare directives for California.</li><li><strong>Third Place:</strong> DentalTracks, which enables you to accumulate all your dental records in one place and keep them private and secure.</li></ul><p>The diversity of the winning applications highlights Caffeine’s broad appeal. Projects like BlueLens, DentalTracks, and Will Maker demonstrate how the general public and entrepreneurs can build sophisticated, real-world solutions for specific needs without writing a single line of code. Road Patrol showcases the platform’s potential for enterprise and civic tech, enabling the creation of robust management tools. Meanwhile, K, the security scanner, is a prime example of how developers can leverage Caffeine to build specialized tools for their own workflows, moving beyond vibe coding to create complete, self-writing solutions.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*r4MSmNVkQKyyK2HH" /></figure><p>The success of the non-technical participants was a powerful validation of Caffeine’s mission. But this event was more than just a showcase of technology. As Bruno Calabretta emphasized on the day, “We are making history today. The people who were part of the hackathon were the first people in the world who were able to use Caffeine and to leverage its potential.”</p><h3><strong>Caffeine Experience Pods</strong></h3><p>The excitement was not confined to the hackathon. At the back of the main stage, a dedicated space allowed attendees to test Caffeine for themselves.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*g_0yJ5G-6tSbIWLj" /></figure><p>These Experience Pods were an instant draw. As Pierre Samaties, Chief Business Officer, noted, “People were piling up at the experience pods to try out Caffeine.” Attendees rushed to the screens the moment they opened, building real tools on the spot, from managing invoicing workflows to tracking job applications, turning their ideas into reality in minutes.</p><h4><strong>The Next Hackathons</strong></h4><p>Those gathered at the event were the first to experience Caffeine, but this is just the beginning.</p><p>The DFINITY Foundation plans to take this experience on the road with a series of in-person hackathons in multiple cities. For those inspired to participate in the future, Bruno offers this advice:</p><blockquote>“Start thinking about something that you want to build, that you’ve been thinking about for a long time but you’ve never been able to implement. Go and look for that idea, that you know is going to be massive because now you can really build it.”</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Yq7ASBz-l2OqF1DG" /></figure><p>The message is clear: the Self-Writing Internet is here, and the next wave of creation is open to everyone.</p><h3>Keynotes and Demos</h3><p>Dominic Williams, Founder and Chief Scientist of the <a href="https://dfinity.org/">DFINITY Foundation</a>, took the stage for a series of keynotes and live demos that moved from the theoretical to the tangible, describing the vision for the <a href="https://youtu.be/9q13cFGxEb0?si=N7B8pfkpzUwExpsx">Self-Writing Internet</a> and the groundbreaking technology that powers it.</p><h4>A New Paradigm</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*fcVO6F6VBe5BPw2u" /></figure><p>In his first keynote, Dominic framed the current moment as one marked by a fundamental paradigm shift. He noted that “in the future, and really now with this technology, app development is a conversation.” He outlined the evolution of the internet, describing its development from craft coding to vibe coding, and now to self-writing. He described how in this new era, the ability to build applications through natural language democratizes creation for potentially 5 billion smartphone users worldwide. This shift, he explained, is enabled by a new, specialized tech stack built for AI, one which results in <a href="https://caffeine.ai/manifesto">sovereign and tamperproof apps that are fully owned by their creators</a>.</p><h4>Data Persistence and Live Demos</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*ylIRO8mrY-GjhoKD" /></figure><p>In his next session, Dominic delved into one of the key technologies that makes this new era possible: enhanced orthogonal persistence. He explained that this tech, which allows data to live directly in the code without a traditional database, is the key to ensuring data is never lost during the rapid, conversational upgrade cycles of self-writing. To prove it, he built and deployed three applications live on stage: a blog, a user photo gallery, and a task manager. He then upgraded the task manager with new features, demonstrating how the app’s existing data was migrated safely and seamlessly.</p><h4>From Conversation to Commerce</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*3scbCFmgLoudxYkJ" /></figure><p>Before his final demos of the day, Dominic unveiled the upcoming Caffeine App Market, a new, open model for app distribution where users can “clone, not install” applications, allowing them to customize and build upon the work of others in the Caffeine ecosystem. This will enable Caffeine users to monetize their creations. To showcase the App Market, he cloned two existing applications, a task management app and a jewelry e-commerce store.</p><p>But there was more to Caffeine’s e-commerce potential. To demonstrate the platform’s power to build from the ground up, Dominic also created a golf store from scratch with a single prompt, which included a Stripe integration for payments.</p><p>As he concluded, “This system is designed to enable individuals and organizations to create production apps that are secure, resilient, and sovereign entirely through conversation.”</p><h3>The Conversations</h3><p>Beyond the live demos and hackathon creations, the day was also filled with insightful discussions with industry leaders, exploring the future of AI, investment, and the internet itself.</p><h4>Interview: UTOPIA for Enterprise and Government</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*DpNOaVZ0s8Ll0vIh" /></figure><p>In an exclusive interview for the Hello, Self-Writing Internet livestream, Pierre Samaties, Chief Business Officer at the DFINITY Foundation, discussed the significance of UTOPIA for enterprise and government clients. He described UTOPIA as a private version of the Internet Computer, designed for organizations that require full control over their hardware for digital sovereignty.</p><p>This directly addresses a major trend of governments and enterprises seeking to build their own sovereign software, free from the data privacy concerns associated with traditional Big Tech.</p><p>“Caffeine will probably play an even bigger role on the enterprise and government market,” Pierre noted, explaining that the combination of Caffeine and UTOPIA provides a powerful tool for building and customizing fit-for-purpose software, bypassing lengthy and restrictive procurement processes.</p><h4>Panel: From Seed to Singularity: Charting the Next Frontier in AI Investment</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*tK-gnYFZXaVjVSkq" /></figure><p><strong>Speakers:</strong></p><ul><li>Dr. Sue Xu, Managing Partner, Amino Capital</li><li>Kumar Dandapani, Managing Partner, Cadenza</li><li>Jing Xiong, AI Investment Director, YZi Labs</li><li><strong>Moderator:</strong> Jason Gao, DFINITY Foundation, Ecosystem &amp; Strategic Partnerships</li></ul><p><strong>Three Key Takeaways:</strong></p><ul><li><strong>Investment is shifting from data-dependent AI to self-evolving AI:</strong> The panel noted a clear pivot in investment strategy away from AI that relies on human-labeled data and towards self-learning, agentic AI that can automate complex, domain-specific tasks.</li><li><strong>The evolution from “co-pilot” to “co-creator”:</strong> The consensus was that AI development tools are moving beyond simply assisting developers to becoming autonomous “co-creators.” This shift empowers a new wave of “solo unicorns” and will fundamentally change the startup landscape.</li><li><strong>Compute is the new capital:</strong> A recurring theme was that access to compute power is a critical bottleneck and a key investment thesis. Platforms like Caffeine that democratize or lower the cost of compute are seen as highly valuable and currently underrated.</li></ul><h4>Fireside Chat: AI Scaling as an Engine of Innovation and Growth</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*G2W_T_fvoN_98Vye" /></figure><p><strong>Panelists:</strong></p><ul><li>William Stranzl, GTM, Anthropic</li><li>Pierre Samaties, Chief Business Officer, DFINITY Foundation</li><li><strong>Moderator:</strong> Colm Woods, Managing Director, CW8 Communications</li></ul><p><strong>Three Key Takeaways:</strong></p><ul><li><strong>Enterprise AI is shifting from experimentation to implementation:</strong> Businesses are now actively using AI to unlock new revenue streams, driven by a desire to innovate and not get left behind. This is moving the conversation from simple chatbots to sophisticated agentic AI that can act as virtual collaborators.</li><li><strong>Sovereignty and customization are critical for adoption:</strong> For enterprise and government clients, the ability to build sovereign software on a controlled infrastructure like UTOPIA is a major driver. This allows for hyper-customized applications that fit specific business processes, rather than forcing processes to fit the software.</li><li><strong>A new, open app economy is emerging:</strong> The combination of powerful AI models and platforms like Caffeine is fundamentally changing how software is created and distributed, leading to a new trend of hyper-local, decentralized applications.</li></ul><h4>Fireside Chat: From Protocols to Possibilities: The Internet Yesterday, Today, and Tomorrow</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*SHQkrYVwuwMiPGIZ" /></figure><ul><li><strong>Speaker:</strong> Dominic Williams, Founder &amp; Chief Scientist, DFINITY Foundation</li><li><strong>Moderator:</strong> Michael Casey, Chairman, Advanced AI Society</li></ul><p><strong>Three Key Takeaways:</strong></p><ul><li><strong>Self-writing is a new paradigm, not just better vibe coding:</strong> The discussion distinguished between vibe coding (an engineer using AI as a tool) and self-writing (where the entire app lifecycle is a conversation). This shift moves development from a technical task to a creative one, accessible to anyone.</li><li><strong>The future of the internet is fluid and democratized:</strong> The chat explored a future where creating an app is as common as a web search. This leads to a “fluid web,” where AI can generate user experiences on the fly by combining functionality from various apps, which act like microservices.</li><li><strong>A new paradigm requires a new, sovereign tech stack:</strong> The speakers emphasized that, like mobile before it, the self-writing era requires a purpose-built tech stack. The Internet Computer provides this, offering tamperproof, resilient, and sovereign apps that run without traditional cybersecurity overhead, a crucial safety guardrail for a world of AI-driven development.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*vctLUdgCgLXFkIBM" /></figure><h4>Panel: Guardrails for Intelligence: Governance and Security in the Age of AI</h4><p><strong>Speakers:</strong></p><ul><li>Jan Camenisch, CTO, DFINITY Foundation</li><li>Alex Fowler, Chief Strategy Officer, Nexus</li><li>Adnan Dakhwe, CISO, DelphinusCyber</li><li><strong>Moderator:</strong> Colm Woods, Managing Director, CW8 Communications</li></ul><p><strong>Three Key Takeaways:</strong></p><ul><li><strong>Security and privacy are often afterthoughts in the current AI boom:</strong> The panel highlighted a “crisis in leadership” where commercial pressures for speed and monetization frequently overshadow fundamental security and privacy concerns, leaving users to fend for themselves.</li><li><strong>Decentralized infrastructure offers a more secure foundation:</strong> The panel contrasted the “broken” traditional IT stack with secure-by-design protocols like the Internet Computer. Platforms like Caffeine can help users migrate to this more secure, sovereign environment where they have greater control over their data and applications.</li><li><strong>True AI governance requires end-to-end decentralization:</strong> To effectively govern powerful AI, control must be decentralized across the entire stack, from the training data and models to the execution environment. This removes single points of failure and is the only way to ensure long-term safety and alignment.</li></ul><h3>In the Future…</h3><p>The <em>Hello, Self-Writing Internet</em> event was a landmark occasion. It brought together the tangible creativity of the hackathon winners, visionary keynotes, and insightful panel discussions to mark the arrival of a new paradigm.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*uNyeP6OvZ3ZObW9_" /></figure><p>The day showcased a future where the ability to create and deploy complete applications is no longer limited by technical skill, because as Dominic Williams explained, “in the future, natural language alone will unlock tech team superpowers.”</p><p>However, the results that emerged from the energy and creativity on display in San Francisco proved that the Self-Writing Internet is not really a distant concept. It is a reality today.</p><p>We would like to extend our thanks to all who attended in San Francisco and watched around the world, including the incredible hackathon participants and the insightful speakers who shared their expertise.</p><h4>Keep Up to Date with Caffeine</h4><p>You can find out about the latest developments related to Caffeine on X: <a href="https://x.com/caffeineai">https://x.com/caffeineai</a></p><h4>Relive the Day</h4><p>You can watch the full livestream of the event here:</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FUDgaWOym9Hk%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DUDgaWOym9Hk&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FUDgaWOym9Hk%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/e2a6bb78edacaf99b8c77d3ad7e30775/href">https://medium.com/media/e2a6bb78edacaf99b8c77d3ad7e30775/href</a></iframe><h4>Experience Caffeine for Yourself</h4><p>Be among the first to build apps just by talking. Apply for early access to Caffeine. Invite codes are now being released on a rolling basis.</p><p>Apply here:<a href="https://caffeine.ai"> https://caffeine.ai</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3027cefb28be" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/hello-self-writing-internet-creations-and-conversations-3027cefb28be">Hello, Self-Writing Internet: Creations and Conversations</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Internet Computer’s Privacy Era: vetKeys Unlocked]]></title>
            <link>https://medium.com/dfinity/the-internet-computers-privacy-era-vetkeys-unlocked-4ded7c206c38?source=rss-f46cd59473d8------2</link>
            <guid isPermaLink="false">https://medium.com/p/4ded7c206c38</guid>
            <category><![CDATA[encryption]]></category>
            <category><![CDATA[dfinity]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[blockchain-technology]]></category>
            <category><![CDATA[privacy]]></category>
            <dc:creator><![CDATA[DFINITY]]></dc:creator>
            <pubDate>Mon, 07 Jul 2025 08:02:54 GMT</pubDate>
            <atom:updated>2025-07-07T08:02:54.882Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*TCV1wKJYzj8fM5gLPieJuw.png" /></figure><p>By <a href="https://medium.com/u/f63f1070cecd">Andrea Cerulli</a></p><p>With the <a href="https://internetcomputer.org/roadmap#Privacy-Niobium">Niobium milestone</a>, the Internet Computer Protocol takes a major leap forward in its mission to bring new levels of privacy to the blockchain. This milestone sees the implementation of the vetKeys feature, which is now live and available for all developers building on ICP. This upgrade opens the door to decentralized key management and onchain data privacy, marking the beginning of the Internet Computer’s privacy era.</p><p>Blockchains are transparent by default, which is ideal for integrity and availability. However, this is a limitation for many real-world applications that rely on confidentiality, like messaging, identity, healthcare, finance, governance, and gaming.</p><p>With vetKeys, developers can seamlessly integrate end-to-end encryption into their applications, ensuring sensitive data stays protected even on a public blockchain. By leveraging a protocol called <strong>verifiably encrypted threshold key derivation</strong>, vetKeys brings strong confidentiality and security even in a decentralized environment.</p><h3>What Does the Niobium Milestone Introduce?</h3><p>At the core of vetKeys is a newly integrated <a href="https://internetcomputer.org/docs/building-apps/network-features/vetkeys/introduction"><strong>verifiably encrypted threshold key derivation protocol (vetKD)</strong></a>. This enables smart contracts running on ICP, which are called <a href="https://internetcomputer.org/docs/building-apps/essentials/canisters">canisters</a>, to request strong cryptographic keys that are securely derived and managed by subnet nodes.</p><p>The derived keys are <strong>encrypted</strong> under a user-provided public key, ensuring that neither the subnet nodes nor the canister can access the derived keys. Furthermore, users can <strong>verify</strong> that the key was correctly generated according to the protocol, that it was correctly encrypted using their public key, and that the key was not tampered with.</p><p>Canisters can now access this new functionality through a newly <a href="https://internetcomputer.org/docs/building-apps/network-features/vetkeys/api">introduced system API</a>, giving developers direct access to decentralized key management from within their smart contracts, without relying on off-chain components. To make integration seamless, the Niobium milestone introduces <a href="https://github.com/dfinity/vetkeys">user-facing and developer libraries</a> that simplify incorporating vetKeys into both frontend workflows and backend canister logic, making it easier to build privacy-preserving dapps on the Internet Computer.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Lv-7EllxhG5EXFl5L7gyhQ.png" /></figure><p>Additionally, the vetKD protocol enables canisters to access <strong>threshold decryption</strong>, where decryption operations are securely distributed across the nodes of a subnet. This distributed approach enhances security by eliminating single points of failure: no single party holds enough information to decrypt data on their own. Instead, decryption requires participation from a threshold of nodes, and the result is cryptographically verifiable.</p><p><strong>Important Note:</strong> vetKeys guarantees strong confidentiality <em>up to the point of decryption</em>. Once the plaintext is handed off, for example, to a canister, it should no longer be assumed private. At that stage, it’s the developer’s responsibility to handle the data securely within the application logic. Furthermore, there are several applications that can benefit from canister-side decryption, where the decrypted content is intentionally revealed to all users at a specific time or event.</p><h3>What Can You Build with vetKeys?</h3><p>By introducing threshold key derivation to canisters, vetKeys opens the door to a broad set of privacy-preserving applications that need confidentiality, flexible access control, and stronger trust guarantees. Beyond privacy, vetKeys extends the <a href="https://learn.internetcomputer.org/hc/en-us/articles/34209486239252-Chain-Key-Cryptography">chain-key capabilities</a> of canisters with new advanced cryptographic functionalities, enabling more powerful and secure dapps.</p><h4>Decentralized Key Management Services (DKMS)</h4><p>Managing user keys, especially in multi-device and multi-user settings, is notoriously complex and error-prone. vetKeys enables the development of decentralized key management services that let users easily generate, retrieve, and share cryptographic keys across devices and with other users. By offloading key derivation to subnet nodes, without ever exposing the keys, vetKeys simplifies key distribution. Moreover, because threshold key derivation is deterministic, users can reliably retrieve their keys on demand, without having to explicitly store them anywhere.</p><h4>Onchain Encrypted Storage</h4><p>A core application of DKMS is the generation of encryption keys for securing data, whether stored in a canister, on another blockchain, or off-chain entirely. With vetKeys, these keys can be securely shared across devices and between users, enabling powerful privacy-preserving use cases. This includes private storage solutions, end-to-end encrypted messaging, password managers, and collaborative applications operating on confidential data.</p><h4>Identity-Based Encryption (IBE)</h4><p>vetKeys enable identity-based encryption, allowing data to be encrypted directly to an identity, such as a <a href="https://internetcomputer.org/docs/references/glossary#p">principal</a>, an <a href="https://internetcomputer.org/internet-identity">Internet Identity</a>, an email address, or even an Ethereum address. This makes it possible to encrypt data for a specific user or account, even if that user has never previously interacted with the dapp. By authenticating with the dapp using their identity, the user can securely retrieve their decryption key and access the data.</p><h4>Timelock Encryption</h4><p>Another variant of advanced encryption enabled by vetKeys is timelock encryption, which allows a sender to encrypt to a specific timestamp, ensuring that the recipient can only decrypt after the specific time has passed. Canisters can enforce this time-based access control by requesting threshold decryption of a ciphertext only after a predetermined expiry time, keeping sensitive information sealed until the appropriate moment. This makes it possible to implement time-sensitive applications, like sealed-bid auctions, time-locked documents, dead-man switches, and delayed reveal NFTs.</p><p>Timelock encryption also serves as a key building block for protecting against Maximal Extractable Value (MEV): by keeping transaction details confidential until after block inclusion, it prevents adversaries from doing front-running and reordering of transactions.</p><h4>Threshold BLS Signatures</h4><p><a href="https://internetcomputer.org/chainfusion">Chain Fusion technology</a> allows canisters to natively interact with other blockchains, such as Bitcoin or Ethereum, without relying on external bridges or trusted intermediaries. This is made possible through threshold signature schemes, which enable canisters to instruct subnet nodes to collectively compute ECDSA, Schnorr, and EdDSA signatures. vetKeys extends this capability by introducing a new threshold signature scheme to canisters: threshold BLS signatures. BLS signatures are particularly well-suited for multichain applications due to their compact size and efficient aggregation properties. By supporting threshold BLS, vetKeys further enhances ICP’s interoperability, empowering canisters to participate in more advanced multichain dapps and protocols.</p><h4>Verifiable Randomness</h4><p>vetKeys can also function as a Verifiable Random Function (VRF). This means that canisters can generate randomness that is not only unpredictable and tamper-proof but also publicly verifiable. Trusted randomness is a critical building block for a wide range of decentralized applications, including trustless online lotteries, fair casino games, and GameFi experiences where outcomes must be demonstrably fair. It also plays a key role in NFT ecosystems — for example, in assigning randomized traits or rarities during minting, or enabling dynamic, chance-based in-game interactions.</p><h3><strong>Start Building with vetKeys</strong></h3><p>Developers can start using vetKeys today using the official documentation:</p><ul><li><a href="https://internetcomputer.org/docs/building-apps/network-features/vetkeys/introduction">vetKeys developer docs</a></li><li><a href="https://github.com/dfinity/vetkeys">Libraries and examples</a></li><li>Reach out and interact with the <a href="https://forum.dfinity.org/t/threshold-key-derivation-privacy-on-the-ic/16560">community</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4ded7c206c38" width="1" height="1" alt=""><hr><p><a href="https://medium.com/dfinity/the-internet-computers-privacy-era-vetkeys-unlocked-4ded7c206c38">The Internet Computer’s Privacy Era: vetKeys Unlocked</a> was originally published in <a href="https://medium.com/dfinity">The Internet Computer Review</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>