Editors Note: This article comes fromBabbitt, Author: Qiu Xiangyu, released with authorization.
Editors Note: This article comes from
Babbitt
The annual 315 Gala came as scheduled, exposing many shady scenes in the industry. I thought that MLM coins, virtual currency platforms and other things related to the blockchain would be named, but I was disappointed again.
This years 315, the main issues exposed are: the black industry of medical waste, dangerous hot strips, make-up local eggs, immoral smart harassment calls, how can qualification certificates be so affiliated, unhygienic sanitary products, and after-sales service routines Duo Mingxiu cant hide from cheating, are e-cigarettes really healthy, hidden dangers of bank card flash payment function deposit theft, and shady online loans.
Behind these peoples livelihood problems, it shows that the illegal activities of manufacturing and selling counterfeit and shoddy goods are still not effectively curbed, and personal privacy information can be easily leaked and other pain points. Does the blockchain have a solution?
secondary title
Blockchain + Medical Waste Treatment
In the case of the black industrial chain of medical waste that was exposed, we saw that dilapidated factory buildings in Henan, Shandong, Shanxi and other places were full of medical waste such as infusion bottles and infusion bags, as well as disposable syringes and other medical waste. The bosses of these factories process the medical waste with drug residues into crushed materials without relevant qualifications, and the crushed materials will be directly made into plastic mesh bags, vegetable nets, washbasins, plastic bags, foam floors, disposable materials by downstream companies. Sex water cups, etc., and even childrens toys contain 70% to 80% recycled materials.
The treatment of medical waste has many links (including department classification, packaging, temporary storage, in-hospital transfer, centralized storage, out-of-hospital transfer, and terminal disposal), and multi-party coordination (involved personnel include: ward nurses, nursing workers, hospital temporary storage point personnel, etc.) , transportation personnel, and destruction point personnel), it is very suitable for the application scenario of multi-role subjects such as blockchain.
According to Wang Hui, the health supervision department has designed a medical waste supervision system for multiple links and roles. The bottom layer of this system adopts the public chain of DPoS+PBFT consensus mechanism, which has strong fault tolerance and stable consensus. The key node data of the medical waste treatment process is uploaded to the blockchain for storage. The data uploading process adopts local real-time uploading, and at the same time, the data of the uploader, upload time, and uploading location (GPS or mobile base station data) are added to ensure that the chain operation itself Authentic and believable.
Wang Hui believes that regulatory information is uploaded from the source of the information, which can maximize the objectivity and authenticity of the information. On-chain supervision makes full use of the characteristics of blockchain distributed and non-tamperable ledgers to solve the problems of information asymmetry and trust among multiple participants, making supervision more based and processing more targeted.
secondary title
Blockchain + Food Safety
Its delicious, refreshing, a little sweet, a little spicy, and chewy. When an elementary school student was asked why he likes spicy noodles, he gave such an answer.
However, the secrets hidden behind the spicy taste and irritating taste are really eye-catching:
The food production workshop can be entered without any disinfection measures. The puffed noodle balls on the production line are splashed everywhere, and the floor of the production workshop is intertwined with dust and oil seeping from the machine. The mixing barrel is also full of oil stains, and there is a pool a few meters away from the mixer. There are black stains all over the walls of the pool. The white bucket in the pool, the edge of the bucket, and the water scoop are covered with thick dirt. Drops of water are constantly seeping from the rusty joint of the faucet and falling into the bucket below.As the host said: food can be divided into staple food and snacks, but there is absolutely no priority in food safety. In terms of ensuring food safety, in addition to the continuous increase in supervision by relevant departments, the introduction of new technologies is also very important.Blockchain traceability is an important technical means to solve food safety. In recent years, the application scale has also been expanding. From the early IBM, to the later JD.com, Ant Financial, Zhongan Technology, etc., there are cases in this regard .For example, Babbitt previously reportedFresh food traceability system in cooperation between Tsinghua University and Yonghui Superstores, starting from the fresh farming, processing, warehousing, distribution, and signing links, using blockchain technology to improve food safety.Zhongan Technologys Chicken Step by Step project
, the anti-counterfeit traceability solution based on blockchain + Internet of Things can ensure that all the data generated by each chicken from chick to adult chicken, from chicken farm to dining table are truly recorded, and truly realize the authenticity of each chicken. Anti-counterfeiting traceability.
Ant Financials blockchain traceability
, to help authentic honey go out of the mountains.
Fan Jingang, general manager of China Food Chain, believes that technology alone cannot solve counterfeiting. First, anti-counterfeiting technology must be used to ensure authenticity and reduce human intervention. Then put these anti-counterfeiting and fidelity information on the chain to ensure the consistency on the chain and off the chain, so that the traceability information of the blockchain can be truly and accurately transmitted to every link of the industrial chain.
Usually, the objects of blockchain traceability are high-value commodities. Is it worth using blockchain for a bag of spicy noodles worth 50 cents?
In this regard, Zhang Yuxin believes that what is worthwhile is that food is directly related to human health, and of course there is a need for traceability. What is not worth it is that Latiao is not rice after all, and there are many substitutes. The small-brand Latiao factory has no extra money to buy a blockchain BaaS system to trace the source.
secondary title
Blockchain + data privacy protection
In a sales office, sales staff can directly make harassing calls to unfamiliar mobile phone users near the store with a probe box and simple operations on their mobile phones.
Whats even more amazing is that with such a device, you can further obtain various private data of users, including gender, age, occupation, income, mobile devices used, keywords searched on the Internet, what apps are commonly used, and whether there are any children, education level, etc.
The secret is: ①When the users mobile phone turns on the WiFi function, it will send a signal to the surrounding area to search for the wireless LAN. After the probe box finds this signal, it will further obtain the users MAC address and convert it into a mobile phone number. ②The mobile phone number is matched with the big data in the background of the system to obtain the users private information. These private information mainly come from various APP software installed on the users mobile phone. When the user installs the APP, they are required to activate various permissions. Information such as the imei, MAC address, and mobile phone number of the users mobile phone will be sent to the APP background server. If the APP server sells these data to other organizations, the users information will naturally It leaked.
In the face of lawbreakers using high-tech means to collect personal privacy data, lawyer Qiu Baochang, a lawyer from the China Consumers Association, said that in the era of the digital economy, businesses can collect personal information without the users awareness, and some of this information is not Anonymized processing is used for commercial purposes. The protection of personal information is particularly important, and newer means must be used to strengthen the protection of personal information.