A short introduction to the history of the Internet: 1.0 and 2.0
Web 1.0 spanned the early days of the internet roughly from 2005. It was classified by its static information (instead of dynamic HTML) that contained data as well as information served by static documents (rather than on the databases). In web 1.0, the internet did not provide any interaction. You could read articles other websites had published, but that was all there was. Social media was not a massive part of the landscape, and there was not much opportunity for users to make or share themselves with their content aside from the very first blogs.
Web 1.0 is often referred to as the “read-only web” because that was the only thing you could do is read the content that someone has published.
Web 2.0 is, in contrast, the internet that we all have now. The world of media, social networks, quick website creation, and platforms permit you to upload content anyone can browse and access. It’s also the place to find apps you can log into for everything from grocery purchases to banking to ridesharing. Think of YouTube, Facebook, electronic health review websites, Wikipedia, online banking such as Yelp!, and retail websites that permit customer reviews… Virtually any site you can post to publish on or sign in to is considered web 2.0. This website uses dynamic HTML; the content is rarely static and typically taken from databases.
Web 2.0 is commonly described as “the “social web.”
The readers should be aware that both the web 1.0 and 2.0 are written in decimals, while web3 does not. There’s absolutely no reason not to do this, aside from the practicality. Although some people mention “web 3.0,” the “web3” designation indicates that things are not the same in the decentralized web.
The dark aspect of web 2.0–Privacy
Although web 2.0 is the internet we’ve all known and loved, there are some serious negatives. First of all, it’s a complete privacy nightmare.
Internet 2.0 applications are generally “free” in that there is no charge for users to access the application. However, they must earn money in some way. They “monetize” their users: They gather a wealth of data on users’ details and make money by selling highly targeted ads to online marketers.
Take the example of shopping online. In web 2.0, when you shop for shoes on the internet, you’ll be presented with a surprisingly accurate ad for the exact shoes on other sites, in your newsfeed, or even in your inbox. The accumulation of data used to drive the process (or “retargeting”) has led to enormous data leaks. Big Tech fetches hacked millions of credit card information and Social Security digits.
The problem with web 2.0 is that users typically don’t control how their data is collected, how it’s kept, and what tech companies make of it. You trade your information to access the application. Since tech companies don’t make profits directly from their products and services, the user (notably, the personal data) will become the product they sell.
The dark aspect of web 2.0–Centralized authority
The second major issue with web 2.0 is that it depends on a central authority. These central authorities verify your identity, authorize online transactions, choose who is permitted to make content available (and what kind of content), and much more. In essence, web 2.0 companies function as a benevolent government and decide who can enter or exit, how long they’re allowed to remain, and what they can accomplish.
Take the example of banking online. The bank you choose to use for checking and savings holds your money. They determine how you get access to it (think ATMs, debit cards, or mobile apps for banking). They define who you can make transactions with. In addition, they confirm your identity and allow access to the internet on the basis of the information provided by other authorities, such as the government of the United States (think about ID numbers or social security numbers, or even cards).
This is just one example. As a background process, Big Tech is used to confirm your identity and give you users with access to thousands of apps. Most people don’t know how frequently Facebook and Google are used to authenticate services for other applications.
In the age of the web 2.0, the individual has restricted rights to their own rights. The GDPR in Europe and California’s CCPA provide users with more requests to share information about what’s being taken, how it’s collected, the data stored, and how it’s destroyed. The problem is the issue of central authority.
What exactly is web3…and What is it not?
Web3 is often described as”the “Decentralized web” and generally encompasses both decentralized applications (or DApps) as well as financial services that are decentralized (or DeFi) like cryptocurrency, assets, or tokens.
These depend on two emerging technologies: decentralized networks and blockchain.
Decentralized networks are those where the code that runs an application is shared over many servers. The term “server” in this case can refer to a black box within a server farm or perhaps the computer that you’re currently working on; in decentralized networks, individuals can provide their machines to join the web and, in certain instances, get rewarded for their work.
Blockchain is often associated with DApps and is based on the same principles. Blockchains are like the database, often known as distributed ledgers. This is because each new row will be added to the preceding row, creating an endless chain.
As with traditional databases, blockchains are able to store documents for various items (like banking transactions). In contrast to conventional databases, in blockchain, the ledger is decentralized. No central control or even a host. It’s possible to run simultaneously on thousands of computers and servers and can be accessed and shared with everyone within this vast, distributed, decentralized community. It’s an open, public, distributed ledger that can be used to record the transactions of two people.
Blockchain requires that the information of the ledger be synced with the other computers in the chain. This is essential for confirming transactions, such as the purchase of a crypto asset. In the blockchain world, if an entity wants to sell Bitcoin to another party, the buyer’s ownership must match the information stored in the same ledger on many computers. This is the reason it is far more secure from attacks.
Blockchain technology lies at the core of Bitcoin, Ethereum, and other cryptocurrencies. DApp infrastructure is typically used for online gaming, DeFi lending protocols, and cryptocurrency tools. However, any application can be run using an app.
Web3 is self-governing and trustworthy; that is, it doesn’t require faith blindly in the goodness of a central authority to handle your information securely (or that you read — or more likely to not understand privacy statements that are obscure and filled with legal terminology) It is, by default, significantly more secure.
Contrary to what you’ve been told, web3 is not the “dark web,” a haven for hackers, leakers of data, or anything of a criminal nature. It’s a new type of infrastructure, a new method of building things you’re used to.
How do I access Web3?
Web3 can be accessed via nearly any smartphone, computer, tablet, or phone. If you’re trading the cryptocurrency or have an online crypto wallet, you’re likely using web3. If you play online games or use online streaming services, you’ll likely use web3. It’s likely that you’ve already tried web3 DApp and weren’t aware that it existed. Download them from the app store, and then start them up on your internet browser by typing in a URL or clicking on the results from a search.
Many of the web3 apps are developed to be browser extensions. These could be risky since they’re easy to spoof (application replicas can make users share their information, financial details, and much more).To ensure that you have access to secure web3 applications, it’s advised to use a browser that is privacy-focused like Brave. By default, Brave blocks intrusive ads and trackers that monitor your movements on the internet and take your information. Brave comes with a built-in cryptocurrency wallet that doesn’t require dangerous extensions. It also has a VPN that will protect all your devices.