Computerware

Will Your Online Privacy Be Better Using Blockchain?

Will Your Online Privacy Be Better Using Blockchain?

Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the focus directed to Bitcoin, it is easy to forget that the blockchain has other uses - uses that are geared toward increased cybersecurity, transparency, and privacy.

The Sovrin Network
However, many companies haven’t forgotten, and have come together to form a nonprofit organization dedicated to creating a network that will enable far more secure online exchanges of information and credentials. This association, called the Sovrin Foundation, is working to create something called the Sovrin Network using blockchain technology.

This network would allow each user to maintain a digital wallet containing identification credentials, banking and other financial credentials, and even employment credentials or a company ID.

Their Mission
The Sovrin Foundation was founded in response to what many companies see as a fundamental flaw in the infrastructure of the Internet. After a year during which 2.9 billion records were compromised in assorted data breaches and cyberattacks, these companies have banded together to create an improved system for confirming one’s identity online that also limits the opportunity for identity-based cybercrimes.

In short, the intention is to create a standardized means of establishing digital credentials, as well as a method of verifying them as they are used. The Sovrin Foundation is leveraging blockchain technology in order to do so.

How Will It Work for the End User?
Of course, there is always the concern that people will be resistant to change, despite the benefits that this change will bring them. Furthermore, it isn’t very likely that the average layperson is suddenly going to come to the conclusion that they need to download an app that provides them with a secure online identity wallet.

That’s why organizations, like financial institutions and businesses, will be able to access these capabilities through QR codes and other, similar means of identification.

Using the blockchain, different institutions could securely contact one another in seeking out information about you, and the minimal amount of information needed to satisfy the inquiry would be shared. For example, if a user was trying to take out a bank loan and both the financial institution and their employer were a part of the blockchain network, the employer could confirm that the user meets the minimum income requirement for the loan without actually sharing the salary of the user.

In this way, the Sovrin Network would put the power to control their information back in the hands of the user.

But What If I Lose My Phone?
Let’s face it, you wouldn’t want to lose your actual wallet, never mind one that contains your entire digital identity - so what should you do if your phone is misplaced or stolen with credentials from the Sovrin Network on it?

The same thing that you should do if the same happened to your actual wallet - cancel your credentials and have new ones issued.

Is This Approach Really Better?
In so many words, yes. As a society, we are increasingly reliant on data and information to ensure our own security, and proceed with daily business as usual. Any means we have to make that security more reliable is something that we should consider.

What do you think about all this? Share your thoughts in the comments!

Is the Internet of Things Growing Too Fast for Eve...
Have You Implemented These Security Best Practices...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Hackers Business Computing Backup Productivity Managed Service Provider Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Network Security Google Efficiency Small Business Smartphones Gadgets Quick Tips User Tips Mobile Devices Business Continuity Computer Disaster Recovery Virtualization Network Mobile Office Microsoft Office Innovation Android Server Mobile Device Management VoIP Social Media Smartphone Upgrade Ransomware Miscellaneous Windows 10 Unified Threat Management Windows Remote Monitoring Operating System Collaboration Mobile Computing Communication Managed IT services Holiday Passwords BYOD Remote Computing Cybersecurity WiFi Vendor Management Apps Data Recovery Marketing IT Support Facebook The Internet of Things Data Backup Apple Users Analytics History communications Firewall BDR Tech Term Productivity Data Management Alert Automation Internet of Things Managed IT Services Save Money IT Consultant Phishing Outsourced IT Artificial Intelligence App Gmail Bandwidth Content Filtering Big data Going Green Spam Mobile Device Health Bring Your Own Device Office Information Technology Managed IT Lithium-ion Battery Best Practice Browser Maintenance Cybercrime Printer Tech Support Virus Encryption Hiring/Firing Hard Drives Cost Management Wireless Technology Antivirus Search Budget Outlook Windows 8 Recovery Employer-Employee Relationship IBM Money Document Management Hacking Help Desk Phone System Computers Office 365 Travel Update Risk Management Law Enforcement It Management Hard Drive Website Business Technology Government Compliance Save Time Humor Data storage Cloud Computing Proactive IT Windows 10 Legal Running Cable Networking Regulations Saving Time Administration VPN Intranet SaaS Training Education Customer Service Two-factor Authentication Fax Server iPhone Wireless Securty File Sharing DDoS Data Security Solid State Drive Business Intelligence Mobility Patch Management Blockchain Excel Digital Payment Flexibility Data Loss Black Market Social Engineering Downtime Customer Relationship Management Applications Word Comparison Tablet Laptop Augmented Reality PowerPoint Password Cortana Data Breach Business Growth Company Culture Computer Repair Hacker Project Management Social Networking Current Events Paperless Office Telephone Systems Twitter Disaster User End of Support Access Control Hosted Solution Avoiding Downtime Robot Bitcoin IT service Lifestyle Vulnerabilities Identity Theft Documents Healthcare Net Neutrality Data Protection Pain Points Heating/Cooling Google Maps Storage Chrome Bluetooth Virtual Reality Politics Automobile Emails Router Retail Computer Accessories Scam Cryptocurrency Chromebook Redundancy Computing Infrastructure Hack eWaste Google Docs How To Trending Experience Gaming Console Value Private Cloud Mouse Cleaning Download Monitors Webcam Digital Office Tips Text Messaging Websites Statistics Processors Telephony Programming Machine Learning Start Menu Tech Terms Taxes USB Network Congestion YouTube Presentation Unified Communications Settings User Error Distributed Denial of Service Mobile Technology Sports Co-managed IT Software as a Service Computing Inbound Marketing Public Cloud Specifications Safety Uninterrupted Power Supply Virtual Desktop Streaming Media Social Read Network Management Sync Electricity Printing Equifax Digital Signature Windows 7 switches Writing Entertainment Music Device security Notifications MSP CCTV Teamwork Nanotechnology Reliable Computing Device Management Best Practives Desktop Business Metrics Finance Computer Malfunction cache Television Upgrades Content Management LiFi Business Cards Service Level Agreement In Internet of Things PDF Business Managemenet WannaCry Downloads Startup Time Management Freedom of Information Microserver Unified Threat Management Backup and Disaster Recovery Corporate Profile Upselling Best Available Keyboard Video Surveillance Screen Reader Scalability Domains online Currency Work/Life Balance Gamification Motion Sickness Assessment SharePoint Deep Learning Smart Tech Messenger Tracking Public Speaking Tip of the week Visible Light Communication Memory Get More Done Saving ZTime Piracy Upload Google Calendar Touchscreen News IT consulting Turn Key Fiber-Optic Database LinkedIn VoIP Printer Server HTML Rental Service Meetings Shortcut Debate Conferencing Cabling Troubleshooting Knowledge Trojan Harddrive Mobile Security Web Server Entrepreneur Consultation Evernote Multi-Factor Security Books Workers HIPAA Archive Virtual Assistant Advertising Flash Software License Wi-Fi Trends Administrator Environment Skype Technology Tips CIO Organize GPS Fake News Windows XP External Harddrive Fraud Tactics Electronic Payment Audit Staffing Google Wallet Devices Supercomputer Competition Displays Monitoring Worker Business Owner Society UTM Microchip Content Point of Contact Data Warehousing Legislation Reading Samsung IP Address Emergency Hard Drive Disposal Thin CLient IT Plan Enterprise Resource Planning Access Micrsooft 3D Ebay Microsoft Excel Smart Phones email scam Addiction G Suite Human Resources Computer Care Drones Webinar Accountants Employer Employee Relationship Application Windows Server 2008 Management Licensing Recycling Multi-factor Authentication Hacks Information Physical Security Analytic Google Drive Wireless Headphones Relocation Tablets Vulnerability Permissions Language Leadership Migration Banking Connected Devices Botnet Product Reviews Spyware Mobile Payment Adminstration Pirating Information Username CrashOverride 3D Printing Managing Stress Capital Productuvuty

toner1.7