dapperfu / BlockchainCYA

It wasn't my fault.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Blockchain CYA - 0.2

See also:

  • Boeing MAX8

Regulated Industries

In some industries, if people screw up, people die It is just the nature of any industry that deals with functional safety.

It's why some industries are also heavily regulated. Regulations that include, but are not limited to:

CYA

Engineers in those industries they must be cognizant of CYA:

Cover your ass (British: arse), abbreviated CYA, is activity done by an individual to protect himself or herself from possible subsequent criticism, legal penalties, or other repercussions, usually in a work-related or bureaucratic context. In one sense, it may be rightful steps to protect oneself properly while in a difficult situation, such as what steps to take to protect oneself after being fired.

Almost everything is done by word of mouth. It's why corporate lawyers ask you to talk on the phone not in e-mail. It's why e-mail retention policies exist. (And why you should always print off anything you really want to keep.)

It's so that when the NTSB, lawyers, or anyone else comes to the door, you (on a personal level) can show that you did nothing wrong:

A very public and recent example is the the case of VW and Dieselgate.

In the July 2015 discussion, Weiß was asked to cheat, the testimony said. Weiß refused. After more discussion, the engineer demanded an order in writing. According to the testimony, his boss Heiduk went in conference with the board, and came back with a written order to break the law.

That engineer then went to keep that order locked in a safe until he presented it in court.

Provability

Cryptographic Hash

A cryptographic hash function is a hash function which takes an input (or 'message') and returns a fixed-size alphanumeric string. The string is called the 'hash value', 'message digest', 'digital fingerprint', 'digest' or 'checksum').

The ideal hash function has three main properties: - It is extremely easy to calculate a hash for any given data. - It is extremely computationally difficult to calculate an alphanumeric text that has a given hash. - It is extremely unlikely that two slightly different messages will have the same hash.

Blockchain

A blockchain, originally block chain,is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a hash pointer as a link to a previous block, a timestamp and transaction data. By design, blockchains are inherently resistant to modification of the data. The Harvard Business Review describes it as "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way." - Wiki

Example.

If you have graduated engineering in the last few decades you were probably discussed the Space Shuttle Challenger. It is a case study in group think and engineering ethics.

For this example I will show what Allan McDonald could have done in 2018 to CYA.

  1. Write your message.

    I am concerned that below-freezing temperatures might impact the integrity of the solid rockets' O-rings.

    I refuse to sign the launch recommendation over safety concerns.

    Allan McDonald

    https://www.nasa.gov/centers/langley/news/researchernews/rn_Colloquium1012.html

https://github.com/dapperfu/BlockchainCYA/blob/master/ChallengerLaunch.txt

Post it somewhere:

Future Topics:

This was a very short and not at all complete tutorial of all the tools available.

If you want to see any of the above topics prioritized, open an issue.

About

It wasn't my fault.

License:BSD 3-Clause "New" or "Revised" License


Languages

Language:Makefile 86.1%Language:Standard ML 13.9%