facebook linkedin twitter

Will Your Online Privacy Be Better Using Blockchain?

Will Your Online Privacy Be Better Using Blockchain?

Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the focus directed to Bitcoin, it is easy to forget that the blockchain has other uses - uses that are geared toward increased cybersecurity, transparency, and privacy.

The Sovrin Network
However, many companies haven’t forgotten, and have come together to form a nonprofit organization dedicated to creating a network that will enable far more secure online exchanges of information and credentials. This association, called the Sovrin Foundation, is working to create something called the Sovrin Network using blockchain technology.

This network would allow each user to maintain a digital wallet containing identification credentials, banking and other financial credentials, and even employment credentials or a company ID.

Their Mission
The Sovrin Foundation was founded in response to what many companies see as a fundamental flaw in the infrastructure of the Internet. After a year during which 2.9 billion records were compromised in assorted data breaches and cyberattacks, these companies have banded together to create an improved system for confirming one’s identity online that also limits the opportunity for identity-based cybercrimes.

In short, the intention is to create a standardized means of establishing digital credentials, as well as a method of verifying them as they are used. The Sovrin Foundation is leveraging blockchain technology in order to do so.

How Will It Work for the End User?
Of course, there is always the concern that people will be resistant to change, despite the benefits that this change will bring them. Furthermore, it isn’t very likely that the average layperson is suddenly going to come to the conclusion that they need to download an app that provides them with a secure online identity wallet.

That’s why organizations, like financial institutions and businesses, will be able to access these capabilities through QR codes and other, similar means of identification.

Using the blockchain, different institutions could securely contact one another in seeking out information about you, and the minimal amount of information needed to satisfy the inquiry would be shared. For example, if a user was trying to take out a bank loan and both the financial institution and their employer were a part of the blockchain network, the employer could confirm that the user meets the minimum income requirement for the loan without actually sharing the salary of the user.

In this way, the Sovrin Network would put the power to control their information back in the hands of the user.

But What If I Lose My Phone?
Let’s face it, you wouldn’t want to lose your actual wallet, never mind one that contains your entire digital identity - so what should you do if your phone is misplaced or stolen with credentials from the Sovrin Network on it?

The same thing that you should do if the same happened to your actual wallet - cancel your credentials and have new ones issued.

Is This Approach Really Better?
In so many words, yes. As a society, we are increasingly reliant on data and information to ensure our own security, and proceed with daily business as usual. Any means we have to make that security more reliable is something that we should consider.

What do you think about all this? Share your thoughts in the comments!

Is the Internet of Things Growing Too Fast for Eve...
Have You Implemented These Security Best Practices...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 13, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Workplace Tips Managed Service Provider Backup Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services Efficiency IT Support Hosted Solutions Google Small Business Computer Smartphones User Tips Quick Tips Mobile Devices Gadgets Business Continuity Disaster Recovery Innovation Android Microsoft Office Mobile Office Virtualization Network Social Media Mobile Device Management Server VoIP Data Backup Collaboration Smartphone Communication Miscellaneous Ransomware Windows 10 Upgrade Tech Term Unified Threat Management IT Support Windows Data Recovery Operating System Remote Monitoring Passwords Productivity Holiday BYOD Remote Computing Vendor Management Mobile Computing Managed IT services WiFi Cybersecurity BDR Apps communications Facebook The Internet of Things Marketing Analytics Users Apple Firewall Mobile Device Phishing Automation History Internet of Things Alert Managed IT Services Data Management Outsourced IT Artificial Intelligence Browser Save Money App IT Consultant Big data Office Bandwidth Health Content Filtering Encryption Spam Going Green Bring Your Own Device Maintenance Antivirus Gmail Cybercrime Managed IT Best Practice Information Technology Cost Management Lithium-ion Battery Hiring/Firing Office 365 Windows 8 Outlook Hard Drives Budget Help Desk Two-factor Authentication Wireless Technology Printer Tech Support Search Virus Training Recovery Update Employer-Employee Relationship Phone System Hacking IBM Money Cloud Computing Document Management Business Technology Saving Time Computers VPN Travel Education Website Government Windows 10 Law Enforcement Risk Management Compliance Data storage Hard Drive Access Control Save Time Legal It Management Networking Regulations Proactive IT Running Cable Customer Service Humor Administration SaaS Intranet Robot Securty Project Management Avoiding Downtime Websites Applications Solid State Drive File Sharing Word iPhone Managed Service Flexibility Password Cortana Current Events Black Market Business Intelligence Google Maps Digital Payment Mobility Social Engineering Excel Laptop Downtime Hacker Business Growth Data Security Comparison Tablet Customer Relationship Management Augmented Reality Fax Server Company Culture PowerPoint Computer Repair Patch Management Blockchain User Information Data Loss Paperless Office Social Networking Sports Computing Wireless Disaster Machine Learning End of Support Data Breach Telephone Systems DDoS Hosted Solution Twitter Storage IT service Digital Streaming Media Public Cloud Inbound Marketing Tech Terms Identity Theft Retail Start Menu Bluetooth Net Neutrality Mobile Technology eWaste Pain Points Chrome Conferencing Software as a Service Value Uninterrupted Power Supply Virtual Reality Co-managed IT Cryptocurrency Politics User Error Emails Google Docs Router Automobile Computer Accessories Chromebook Processors Monitoring Experience Bitcoin Data Protection Computing Infrastructure Hack Cleaning USB Monitors How To Trending Lifestyle Office Tips Presentation Gaming Console Mouse Download Management Private Cloud YouTube Specifications Safety Virtual Desktop Unified Communications Text Messaging Settings Statistics Telephony Social Vulnerabilities Webcam Scam Programming Microchip Documents Taxes Healthcare Redundancy Network Congestion Entertainment Distributed Denial of Service Vendor Heating/Cooling G Suite Startup Asset Tracking 3D Permissions Ebay Language Consultation Evernote Employer Employee Relationship Business Cards Service Level Agreement Get More Done Processor Thin CLient Knowledge Printer Server Recycling Technology Tips Hacks PDF Physical Security Unified Threat Management Backup and Disaster Recovery Turn Key Browsers Smart Phones Analytic Virtual Assistant Licensing Username switches Writing Audit Banking Botnet Screen Reader Customer Resource management User Tip Music Product Reviews Fake News Best Available Relocation Keyboard Tablets Gamification Trojan Read Sync Domains Smart Tech Distribution Organize Adminstration Pirating Information Data Warehousing Piracy Upload Leadership Upgrades LiFi Access Notifications CCTV Fiber-Optic Database Data Analysis Emergency Hard Drive Disposal Public Speaking HTML Device Management Computer Care Business Metrics Computer Malfunction Telephone System Microsoft Excel Reliable Computing Shortcut Mobile Security Content Management Troubleshooting In Internet of Things Multi-Factor Security Cost Work/Life Balance Google Drive Business Managemenet Windows Server 2008 Entrepreneur Software License Trends Deep Learning Devices Webinar Visible Light Communication Memory Spyware Mobile Payment Environment Fraud Tactics Fileless Malware Vulnerability HIPAA Upselling IT consulting Electricity online Currency Printing Electronic Payment Motion Sickness Proxy Server Scalability Competition UTM Content Business Owner Legislation Error Electronic Medical Records Video Surveillance Windows 7 Messenger Tracking IT Plan Enterprise Resource Planning IP Address Accountants A.I. Advertising Flash cache LinkedIn Television Rental Service Meetings email scam Addiction Directions CIO Saving ZTime Windows XP WannaCry Downloads Web Server Human Resources Dark Web Staffing Google Wallet Application Cabling Multi-factor Authentication Displays Corporate Profile Archive Wi-Fi Administrator Wireless Headphones Telephone Health IT Society Debate Time Management Skype Freedom of Information Books Workers Migration Connected Devices Best Practives Harddrive Equifax Fleet Tracking GPS Assessment SharePoint Supercomputer Network Management Micrsooft Google Calendar Microserver Bookmark External Harddrive Drones Point of Contact Tip of the week Digital Signature Worker Device security MSP VoIP Nanotechnology Social Network Touchscreen News Teamwork Reading Samsung Desktop Finance Capital Navigation Productuvuty Printers Managing Stress Regulation 3D Printing Managed IT Service CrashOverride