{"id":309,"date":"2018-12-30T14:35:15","date_gmt":"2018-12-30T14:35:15","guid":{"rendered":"http:\/\/nitk.acm.org\/blog\/?p=309"},"modified":"2018-12-30T14:36:00","modified_gmt":"2018-12-30T14:36:00","slug":"genome-banking","status":"publish","type":"post","link":"https:\/\/nitk.acm.org\/blog\/2018\/12\/30\/genome-banking\/","title":{"rendered":"Genome Banking"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cryptocurrencies have inculcated themselves into the daily affairs of the common man. The pioneer of cryptocurrencies is the Bitcoin, its fluctuations in price make for an investor\u2019s rollercoaster.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As with all currency in the economy, cryptocurrencies have to be stored somewhere for safekeeping. There are two types of wallets which are used for this:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Hot Storage Wallets<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cold Storage Wallets<\/span><\/li>\n<\/ol>\n<p><b>Hot Storage Wallets<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The term \u2018hot\u2019 refers to the connection of this wallet to the internet eternally. These wallets are accessible using the internet and support a large variety of cryptocurrencies and are consistently updated. Even transactions occur at a moderate speed vis-a-vis its counterpart wallet type.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, being in a persistent connection with the internet leaves the wallet bearer susceptible to attacks from hackers online. There have been countless reported instances of the wallet information being compromised and is a risk of using hot storage wallets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A few popular hot wallets are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Coinbase<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Exodus.io<\/span><\/li>\n<\/ul>\n<p><b>Cold Storage Wallets<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In this wallet type, the information is stored offline on a physical device which can be kept in a security box or in a sock drawer if one is feeling adventurous. These devices are protected by a secret key\/passcode chosen by the user and used often in the professional sphere.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cold wallet transactions are quite slow and they do not support a large number of cryptocurrencies. They are priced fairly high ($100 USD is the standard).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A few popular cold wallets are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ledger Nano S<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Trezor.io <\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">An analogy to depict the usage of the two types of wallets is:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A hot wallet is a wallet we carry around with us, it contains enough money to get us through the day, but there are chances of that wallet being stolen. Which is why we\u2019re always told to carry extra money in our right shoe (or is that just me). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">A cold wallet represents a bank account containing all of one\u2019s wealth, this means that one\u2019s majority of crypto cash should be on a cold wallet for security. In other words, if you have more than a $100 dollars in crypto cash use a cold wallet as that is its base cost.<\/span><\/p>\n<p><b>The Secret Key <\/b><span style=\"font-weight: 400;\">(Or the Seed)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The secret key is a necessity for the wallets(particularly cold wallets) to function. Not to divulge very much into the cryptographic algorithms, the secret key is used to create the public and private key pairs. The secret key is usually a string of characters. However, storage of this key is very vexing.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If it is on paper it can always be lost, damaged or read by others<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If it is on a computer it can always crash and there would be no way to recover the key. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If it is on hardware such as a USB or a flash drive there are chances of misplacing it or damaging due to atmospheric conditions after a prolonged duration.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To mitigate this, the idea of using DNA as a secret key has been implemented by a company named Carverr, spearheaded by their C.E.O, Vishaal B. Bhuyan.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-311\" src=\"https:\/\/nitk.acm.org\/blog\/wp-content\/uploads\/2018\/12\/FBD0F29C-20B7-4272-A6D9-D5C33F6E9A54.jpeg\" alt=\"\" width=\"346\" height=\"340\" srcset=\"https:\/\/nitk.acm.org\/blog\/wp-content\/uploads\/2018\/12\/FBD0F29C-20B7-4272-A6D9-D5C33F6E9A54.jpeg 346w, https:\/\/nitk.acm.org\/blog\/wp-content\/uploads\/2018\/12\/FBD0F29C-20B7-4272-A6D9-D5C33F6E9A54-300x295.jpeg 300w\" sizes=\"auto, (max-width: 346px) 100vw, 346px\" \/><\/p>\n<p><b>The Idea<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Carverr prides itself over the fact that DNA will never become obsolete. Reading and writing DNA will always be relevant; therefore, there is no need for software patches, updates or new hardware. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The service requires the customer to send a passcode to them via their secure communication channel and then convert this key into DNA. DNA consists of four nucleic acids adenine(A), cytosine(C), guanine(G), thymine(T). A special algorithm converts the binary codes (0s and 1s) into a string of bases containing As, Cs, Gs, Ts, or in other words DNA. Carverr then manufactures a strand of synthetic DNA, using the string of bases. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This DNA is sent or stored as per the client\u2019s request, the retrieval process for getting the passcode from the DNA takes nearly 3 days. Finally, the decoded passcode is sent back to the client via the same secure channel which was used for sending.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Say one were to forget the decoded secret key, the owner can send the DNA strand back to Carverr and they will decode it for him. These DNA obtaining methods have been around since the 60s. Reading and writing DNA will always be relevant therefore, there is no need for software patches, updates or new hardware<\/span><\/p>\n<p><b>Conclusion<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Considering the fact that DNA was identified 6 decades ago, it was quite unforeseen to have such an integration between Biology and Computation. Davos DNA-storage Bitcoin Challenge was conducted in 2015 to see if one could retrieve a passcode from DNA, showing that this idea was in the air for quite a while.<\/span><\/p>\n<p style=\"text-align: right;\"><em>&#8211; Hrishikesh Thakkar<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrencies have inculcated themselves into the daily affairs of the common man. The pioneer of cryptocurrencies is the Bitcoin, its fluctuations in price make for an investor\u2019s rollercoaster. As with all currency in the economy, cryptocurrencies have to be stored somewhere for safekeeping. There are two types of wallets which are used for this: Hot&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[25,10],"tags":[94,92,95,93],"class_list":["post-309","post","type-post","status-publish","format-standard","hentry","category-sanganitra","category-tech","tag-bitcoin","tag-cryptocurrency","tag-dna-codes","tag-storage-wallets"],"_links":{"self":[{"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/posts\/309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":4,"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/posts\/309\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/posts\/309\/revisions\/314"}],"wp:attachment":[{"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/media?parent=309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/categories?post=309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nitk.acm.org\/blog\/wp-json\/wp\/v2\/tags?post=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}