I am interested in adoption models for technology and business practices—especially for Bitcoin, the first decentralized debit platform to constitute a two-sided network. [Blockchain Credentials]

To understand Bitcoin is to be passionate about the blockchain and its potential for mitigating trust in a manner that is fair, transparent, auditable and maintained. The blockchain demonstrates that in large communities, trust is—and always has been—an exercise in distributed bookkeeping.

Bitcoin is more than a low friction transaction mechanism (even in this respect, it is a winner). It has no less intrinsic value than the dollar. It is already a store of wealth and it is durable. Bitcoin has the potential to supplant many commerce and transaction roles of national and bank currencies as well as all credit and debit transactions.

I am CEO and Co-chair of CRYPSA, the Cryptocurrency Standards Association. I was MC and featured speaker at The Bitcoin Event in New York. In each venue, I discuss adoption models and the use of Bitcoin as a platform for safe, transparent, international commerce, while adding strong privacy protections—even anonymity—for all parties to a transaction.

I research, edit, write and lecture about adoption, like this article and this New York symposium. I write about blockchain, security and privacy for Sophos, Quora, LinkedIN and A Wild Duck (my own Blog). I have been a keynote speaker at major conferences, including in Montreal, Florida and South Africa.

Contact Ellery Bitcoin Expert

02.a Digital Privacy & Antiforensics

I write and lecture on privacy and I instruct business seminars on corporate privacy, encryptionand antiforensics. #2b, below, is an example of an exciting development in this field.

02.b Blind Signaling and Response

I am the chief architect behind a privacy methodology that has been presented at Google headquarters and at university conferences [video].

How do “free” Internet services protect user privacy in an age of marketing, hacking and NSA vacuuming? How can they demonstrate to users that data is immune from snooping—even internally? Last summer, my work on establishing user trust was featured at the Université de Montréal Privacy Colloquium.

03.a Distributed, P2P Cloud Storage

Conventional wisdom dictates that cloud data should be stored at a trusted data center with standards for privacy & security—and in a clearly identified jurisdiction. But convention is outdated. Distributed, peer-to-peer storage is more robust, less susceptible to hacking and—with private key user credentials—impossible to subpoena. With proper architecture (what I call “torrent reacquisition”), it can be fast and transparent.

A few cloud storage providers have baked-in my suggested architecture, but the fulll vision has yet to be adopted. I envision a combination of three novel twists on the existing model: a) A hubless, fully-distributed, P2P storage architecture (no data center); b) Reverse the model: Live cloud with Local/Physical backup); c) Torrent reacquisition to restore data.

03.b Digital Privacy & Antiforensics

The market and methods for specifying a network storage architecture is highly fragmented. Decisions made regarding network layout, and capital equipment will have repercussions into the future. Which architecture is best for a given set of criteria. Which technologies are durable for the long haul: RAID, fiber-bus, load balancing, real-time encryption, hashing, peer matrices, etc. Should the whole project be hosted by a virtual service? I am working toward a standards-based approach for optimizing tradeoffs when specifying a storage architecture: Access speed, fault tolerance, initial cost, ongoing maintenance cost, changing demands, etc.

04.a Information Economics

The study and practical application of Economics as applied to Commerce Technology. #4b, below, is a perfect example.

04.b Sender Bond aka “Attention Bond”


I hold the patent. The technology was commercialized to various degrees at Vanquish Labs, Microsoft and IronPort.

Unlike traditional phone service, VOIP is an unmetered pipe. Just as with email, a flat billing structure invites SPIT (Spam over IT). Sender risk offers an elegant solution. Use economics to mitigate irrelevant messaging between strangers. It’s new and very bold. Yet, implemented correctly, it is transparent to both recipients and legitimate senders.

What if everyone had their own “Personal Interrupt Value”—calculated in real time based on the number of unrecognized parties who seek to reach you, and how certain each caller is that you really want to hear from them. Now, it gets interesting...