• Login
  • Register
The Daily Sceptic
No Result
View All Result
  • Articles
  • About
  • Archive
    • ARCHIVE
    • NEWS ROUND-UPS
  • Podcasts
  • Newsletter
  • Premium
  • Donate
  • Log In
The Daily Sceptic
No Result
View All Result

Web 3.0: A Decentralised Revolution for Freedom

by Dr Rowena Slope
24 June 2025 1:20 PM

A technological revolution is underway as the current version of the internet known as Web 2.0, based on centralised control by large technology companies, gives way for Web 3.0. This latest iteration is decentralised and features evolving technologies, such as Distributed Ledger Technology (DLT) using blockchain, cryptography, peer-to-peer networks and user ownership. This shift was foreseen by Timothy C. May’s in his 1988 paper ‘The Crypto Anarchist Manifesto’ where he predicted a technological revolution featuring a truly decentralised internet free from authoritarian oversight. These features can be harnessed to protect human rights and democracy and increase trust, transparency and immutability.

DLT has immense utility because it addresses the problem of trust, providing a tamper proof and immutable ledger for data entry. Such systems protect data from third-party interference by ensuring the safe transfer and storage of data. Moreover, Web 3.0 and associated technologies can solve problems of trust and verifiability in logistics networks and supply chains, smart contracts and archive storage. Organisations implicated in human rights violations often seek deniability, in the first instance, and will usually commence a campaign of disinformation and misinformation. It can be difficult to gather and store evidence of atrocities or protect vulnerable witnesses and journalists, especially when governments are implicated and have the entire apparatus of the state at their disposal to censor information. According to Hellstern et al. (2022) databases stored on centralised systems and supported by Web 2.0 are vulnerable to attack and data leakages which can put victims at further risk of harm. However, DLTs using blockchains and other cryptographic technologies can create secure and immutable systems out of reach of third parties that would seek to tamper with the data. Metadata can be generated each time data are added and a unique hash created to provide further proof of time and location. Even if a central authority were to order a takedown of such testimony, the multi nodal nature of the architecture would make that impossible.

An example of how this technology is being used to create immutable historical archives comes from Starling Lab for Data Integrity, which represents a partnership between the Department of Electrical Engineering at Stanford University and the Shoah Foundation. This project uses cryptographic tools and decentralised web controls to protect sensitive data and promote trust. The project seeks to understand how authentication technology can promote trust in journalism, how authenticated metadata can secure chains of evidence, and how cryptography can be used to preserve and protect digital records. Case examples include raising awareness of the destruction of wetlands in Brazil, verifying the authenticity of photographs taken during the US Presidential elections, and collecting the testimonies of 55,000 victims of the holocaust.

In the UK, concerns about networks of predominantly Pakistani heritage men carrying out organised child sexual exploitation (CSE) reached national attention after Andrew Norfolk published an article in the Times newspaper in 2011. This eventually led to the commission and publication of the Jay Report in 2014, which estimated that 1,400 victims had been exploited in Rotherham, and was followed by other local inquiries and reports including a serious case review into CSE in Oxfordshire, an assurance review of multi-agency responses into CSE in Greater Manchester and an independent inquiry into child exploitation in Telford. These reports suggest that widespread networks of abusers targeting children and young people in major towns and cities have been allowed to flourish due to failures in the criminal justice system, social services and local councils.

Consistent failures to disrupt these perpetrators and their networks has led to suggestions of organised cover-ups to shield political power bases and protect organisational reputation. Finally, Prime Minister Keir Starmer has announced that a public inquiry into gang-based organised CSE will be established with the power to compel witnesses under the Inquiries Act 2005. The recent publication of Louise Casey’s national audit into the nature, scale and characteristics of “group-based child sexual exploitation” on behalf of the Home Office may have informed this change of mind as well as Rupert Lowe’s Rape Gang Inquiry, which seeks to uncover “what happened, how did it happen, why was it allowed to happen?”

When suspected corruption or cover-ups are a possibility it is important to consider the technology being used to house potentially incriminating data to ensure the data are accurately logged and tamper proof. Centralised systems designed on Web 2.0 do not provide this guarantee and distributed ledger technology is the best way to achieve this. Given the questions a public inquiry might raise about the interplay of culture, religion, corruption, politics, criminality and public sector failure, it is possible that it may not take place, or will be delayed, or its remit will be so narrowly defined that it will neither reveal the true nature of the problem or identify the tools to disrupt and prevent further abuse from occurring.

For example, the report of the Independent Inquiry into Child Sexual Abuse by Professor Alexis Jay in 2022 which covered abuse in care homes, public schools and the Catholic church, failed to seriously address this type of gang-based abuse. Moreover, intimidation of witnesses, both victims and professionals, remains a significant cause for concern. A large scale human rights atrocity of this nature requires the establishment of a National Archive for the Survivors of Grooming Gangs as that proposed by Donna Rachel Edmunds. This could have a prosecutorial role as well as serving a national memorial to all those affected. Moreover, an archive of this nature supported and protected using Web 3.0 and DLT using the latest cryptographic technology would provide an immutable record that would be protected from censorship, sabotage and cyber-attacks.

However, the transition to Web 3.0 does not come without its concerns. Criminal networks and other bad actors can take advantage of its decentralised nature to act remotely and hide their activities under a cloak of anonymity. Decentralisation has enabled the development of the Dark Web Marketplace (DWM), where online platforms enable financial crime and other illegal trades including human trafficking and child pornography, facilitated by new payment methods and financial assets, including Anonymity Enhanced Cryptocurrencies (AEC), posing significant challenges to international law enforcement. In another example of Web 3.0 misuse, criminal networks employ ransomware and attack vectors such as Denial of Service (DoS) to extort organisations and individuals by encrypting their data and demanding cryptocurrency payments in return for decryption – with no guarantee that this will be forthcoming. The UK National Cyber Security Centre (NCSC) identifies this as the greatest cybercrime threat, while the Home Office considers it a national security risk, particularly when critical infrastructure is targeted.

Although Web 3.0 comes with associated risks, its advantages in protecting human rights and immutability in public records have the potential to mitigate some of these concerns. Technological developments associated with Web 3.0 have applications that extend beyond the creation of cryptocurrencies with which most people associate it. DLT, blockchains and cryptography have the capacity to solve problems in relation to trust, authoritarian control and potential sabotage from bad actors. Moreover, they can be used to preserve data for evidential, research and historical reasons including creating a secure repository of organised child sexual exploitation in the UK.

With thanks to Richard Stuart for his technical advice in writing this article.

Dr Rowena Slope is a Senior Lecturer in Adult Nursing at Bournemouth University and author of Corporate Totalitarianism: Freedom, Power and Technology in the Modern Era and Care in the Iron Cage: A Weberian Analysis of Failings in Care. Subscribe to her Substack.

Tags: BitcoinBlockchainCryptocurrencyDecentralisationDemocracyFreedomGrooming gangs scandalHuman rightsRape GangsWeb 3.0

Donate

We depend on your donations to keep this site going. Please give what you can.

Donate Today

Comment on this Article

You’ll need to set up an account to comment if you don’t already have one. We ask for a minimum donation of £5 if you'd like to make a comment or post in our Forums.

Sign Up
Previous Post

Trump Announces Ceasefire – But it’s Immediately Broken

Next Post

The Kabuki Theatre of Trump’s Ceasefire

Subscribe
Login
Notify of
Please log in to comment

To join in with the discussion please make a donation to The Daily Sceptic.

Profanity and abuse will be removed and may lead to a permanent ban.

27 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

NEWSLETTER

View today’s newsletter

To receive our latest news in the form of a daily email, enter your details here:

DONATE

PODCAST

The Sceptic | Episode 41: David Shipley on the Rape Gangs Inquiry, Tom Jones on the Ballymena Riots and Ben Pile On Dimming the Sun

by Richard Eldred
20 June 2025
6

LISTED ARTICLES

  • Most Read
  • Most Commented
  • Editor’s Picks

Exposed: Palestine Action’s Plans for Wave of Attacks on RAF Bases Across UK

26 June 2025
by Will Jones

The Cancellation of Professor Norman Fenton: Climate and Covid Dissident

26 June 2025
by Tilak Doshi

Watch: Electric Mercedes Worth £50,000 Explodes After ‘Battery Fault’ – Destroying Two Cars Nearby

26 June 2025
by Will Jones

News Round-Up

26 June 2025
by Richard Eldred

An Empirical Study Shows That AI Will Destroy Human Critical Capacity

26 June 2025
by James Alexander

Exposed: Palestine Action’s Plans for Wave of Attacks on RAF Bases Across UK

24

An Empirical Study Shows That AI Will Destroy Human Critical Capacity

25

Forget Labour’s Industrial Strategy Waffle. This is What Young People Need Right Now

36

The Cancellation of Professor Norman Fenton: Climate and Covid Dissident

19

News Round-Up

17

Kneecap Should Play Glastonbury

26 June 2025
by Laura Perrins

The Cancellation of Professor Norman Fenton: Climate and Covid Dissident

26 June 2025
by Tilak Doshi

An Empirical Study Shows That AI Will Destroy Human Critical Capacity

26 June 2025
by James Alexander

Forget Labour’s Industrial Strategy Waffle. This is What Young People Need Right Now

25 June 2025
by Joanna Gray

An Australian Sceptical Note on COVID-19 Vaccine Effectiveness

25 June 2025
by Ramesh Thakur

POSTS BY DATE

June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« May    

SOCIAL LINKS

Free Speech Union

NEWSLETTER

View today’s newsletter

To receive our latest news in the form of a daily email, enter your details here:

POSTS BY DATE

June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« May    

DONATE

LISTED ARTICLES

  • Most Read
  • Most Commented
  • Editor’s Picks

Exposed: Palestine Action’s Plans for Wave of Attacks on RAF Bases Across UK

26 June 2025
by Will Jones

The Cancellation of Professor Norman Fenton: Climate and Covid Dissident

26 June 2025
by Tilak Doshi

Watch: Electric Mercedes Worth £50,000 Explodes After ‘Battery Fault’ – Destroying Two Cars Nearby

26 June 2025
by Will Jones

News Round-Up

26 June 2025
by Richard Eldred

An Empirical Study Shows That AI Will Destroy Human Critical Capacity

26 June 2025
by James Alexander

Exposed: Palestine Action’s Plans for Wave of Attacks on RAF Bases Across UK

24

An Empirical Study Shows That AI Will Destroy Human Critical Capacity

25

Forget Labour’s Industrial Strategy Waffle. This is What Young People Need Right Now

36

The Cancellation of Professor Norman Fenton: Climate and Covid Dissident

19

News Round-Up

17

Kneecap Should Play Glastonbury

26 June 2025
by Laura Perrins

The Cancellation of Professor Norman Fenton: Climate and Covid Dissident

26 June 2025
by Tilak Doshi

An Empirical Study Shows That AI Will Destroy Human Critical Capacity

26 June 2025
by James Alexander

Forget Labour’s Industrial Strategy Waffle. This is What Young People Need Right Now

25 June 2025
by Joanna Gray

An Australian Sceptical Note on COVID-19 Vaccine Effectiveness

25 June 2025
by Ramesh Thakur

SOCIAL LINKS

Free Speech Union
  • Home
  • About us
  • Donate
  • Privacy Policy

Facebook

  • X

Instagram

RSS

Subscribe to our newsletter

© Skeptics Ltd.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Articles
  • About
  • Archive
    • ARCHIVE
    • NEWS ROUND-UPS
  • Podcasts
  • Newsletter
  • Premium
  • Donate
  • Log In

© Skeptics Ltd.

wpDiscuz
You are going to send email to

Move Comment
OSZAR »