facebook linkedin twitter

Will Your Online Privacy Be Better Using Blockchain?

Will Your Online Privacy Be Better Using Blockchain?

Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the focus directed to Bitcoin, it is easy to forget that the blockchain has other uses - uses that are geared toward increased cybersecurity, transparency, and privacy.

The Sovrin Network
However, many companies haven’t forgotten, and have come together to form a nonprofit organization dedicated to creating a network that will enable far more secure online exchanges of information and credentials. This association, called the Sovrin Foundation, is working to create something called the Sovrin Network using blockchain technology.

This network would allow each user to maintain a digital wallet containing identification credentials, banking and other financial credentials, and even employment credentials or a company ID.

Their Mission
The Sovrin Foundation was founded in response to what many companies see as a fundamental flaw in the infrastructure of the Internet. After a year during which 2.9 billion records were compromised in assorted data breaches and cyberattacks, these companies have banded together to create an improved system for confirming one’s identity online that also limits the opportunity for identity-based cybercrimes.

In short, the intention is to create a standardized means of establishing digital credentials, as well as a method of verifying them as they are used. The Sovrin Foundation is leveraging blockchain technology in order to do so.

How Will It Work for the End User?
Of course, there is always the concern that people will be resistant to change, despite the benefits that this change will bring them. Furthermore, it isn’t very likely that the average layperson is suddenly going to come to the conclusion that they need to download an app that provides them with a secure online identity wallet.

That’s why organizations, like financial institutions and businesses, will be able to access these capabilities through QR codes and other, similar means of identification.

Using the blockchain, different institutions could securely contact one another in seeking out information about you, and the minimal amount of information needed to satisfy the inquiry would be shared. For example, if a user was trying to take out a bank loan and both the financial institution and their employer were a part of the blockchain network, the employer could confirm that the user meets the minimum income requirement for the loan without actually sharing the salary of the user.

In this way, the Sovrin Network would put the power to control their information back in the hands of the user.

But What If I Lose My Phone?
Let’s face it, you wouldn’t want to lose your actual wallet, never mind one that contains your entire digital identity - so what should you do if your phone is misplaced or stolen with credentials from the Sovrin Network on it?

The same thing that you should do if the same happened to your actual wallet - cancel your credentials and have new ones issued.

Is This Approach Really Better?
In so many words, yes. As a society, we are increasingly reliant on data and information to ensure our own security, and proceed with daily business as usual. Any means we have to make that security more reliable is something that we should consider.

What do you think about all this? Share your thoughts in the comments!

Is the Internet of Things Growing Too Fast for Eve...
Have You Implemented These Security Best Practices...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Saving Money Network Security Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices Smartphones Quick Tips User Tips Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Network Social Media Android Mobile Office Virtualization Data Backup Collaboration Server Productivity Communication Smartphone Mobile Device Management Miscellaneous Data Recovery Windows 10 Upgrade Tech Term communications Ransomware Windows IT Support Unified Threat Management Facebook Holiday Operating System Remote Monitoring Passwords Apps Cybersecurity Mobile Computing BYOD Remote Computing Vendor Management Managed IT services Users Phishing WiFi Automation BDR Marketing Mobile Device Analytics The Internet of Things Firewall Data Management Outsourced IT History Apple Save Money Alert Artificial Intelligence Managed IT Services Internet of Things App Browser Encryption Big data IT Consultant Going Green Maintenance Bring Your Own Device Printer Office 365 Office Antivirus Cloud Computing Health Bandwidth Gmail Spam Content Filtering Cybercrime Hiring/Firing Best Practice Information Technology Lithium-ion Battery Hard Drives Windows 8 Windows 10 Outlook Cost Management Saving Time Help Desk Tech Support Virus Wireless Technology Budget Search Two-factor Authentication Business Technology Managed IT Employer-Employee Relationship Document Management Training Healthcare IBM Hacking Computers VPN Travel Access Control Update Blockchain Phone System Money Recovery Running Cable Proactive IT Networking Legal Augmented Reality Applications Regulations Humor PowerPoint Hard Drive Intranet Twitter Education Managed Service Mobility Administration SaaS It Management Risk Management Customer Service Law Enforcement Compliance Save Time Website Data storage Information Government Telephone Systems Data Breach Cryptocurrency Comparison Tablet Laptop Company Culture Word Excel Computer Repair Project Management Fax Server Digital Business Growth Websites Password Cortana Value Social Networking Customer Relationship Management File Sharing Hacker Google Maps Paperless Office Sports Social Engineering Computing Disaster End of Support User Hosted Solution Robot Data Security Securty Social Avoiding Downtime Patch Management Wireless Business Intelligence DDoS Current Events Data Loss Solid State Drive Digital Payment Router Downtime Scam iPhone Flexibility Machine Learning Black Market Vulnerabilities Distributed Denial of Service Retail Evernote Google Docs Trending eWaste Mouse Lifestyle Public Cloud Experience Monitors Cleaning Office Tips Programming Start Menu Tech Terms Statistics Identity Theft Network Congestion Gaming Console Mobile Technology Software as a Service YouTube Processors Text Messaging Politics Uninterrupted Power Supply USB Unified Communications Settings Webcam Virtual Reality Streaming Media Emails Conferencing Automobile Presentation Chromebook Bitcoin Computing Infrastructure Hack Specifications Safety Data Protection Virtual Desktop IT service Net Neutrality Monitoring How To Download Documents Chrome Inbound Marketing Private Cloud Entertainment Heating/Cooling Storage Co-managed IT Telephony Bluetooth User Error Management Cooperation Pain Points Microchip Taxes Vendor Redundancy Computer Accessories Network Management Touchscreen News Deep Learning Equifax Fleet Tracking Reading Samsung Processor VoIP Best Available Keyboard Work/Life Balance Medical IT Consultation Domains Device security MSP Employer Employee Relationship Browsers Knowledge Visible Light Communication Memory LinkedIn G Suite Upselling Desktop Finance Hacks Physical Security User Tip Virtual Assistant IT consulting Nanotechnology Social Network Licensing Security Cameras Technology Tips Public Speaking Business Cards Service Level Agreement Banking Botnet Fake News Archive Video Surveillance Startup Asset Tracking Relocation Tablets Navigation Audit Shortcut Skype Professional Services Troubleshooting Data Warehousing CIO Username Data Analysis Entrepreneur Advertising Flash Best Practives Saving ZTime Unified Threat Management Backup and Disaster Recovery Sync Point of Contact Gamification Notifications CCTV Emergency Environment Hard Drive Disposal Windows XP Screen Reader Customer Resource management GDPR Access HIPAA Staffing Google Wallet Piracy Upload Business Metrics Computer Malfunction Electronic Payment Microsoft Excel Displays Microserver Debate Smart Tech Distribution Reliable Computing Tech Computer Care Competition Society Harddrive In Internet of Things Voice over Internet Protocol Google Drive Business Owner Windows Server 2008 Micrsooft GPS HTML Fileless Malware Fiber-Optic Database Drones Analytic Mobile Security Proxy Server Vulnerability Recycling Get More Done External Harddrive Telephone System Modem Spyware Mobile Payment IP Address Software License Trends Motion Sickness Electronic Medical Records Human Resources Turn Key Multi-Factor Security Cost Scalability Term Electricity Printing Application Printer Server Product Reviews Recording Windows 7 Read 3D Ebay Devices Messenger Tracking Directions Permissions Language Trojan Thin CLient Fraud Tactics Television Organize UTM Content Rental Service Meetings Dark Web Smart Phones SSID cache IT Plan Enterprise Resource Planning Web Server Health IT switches Writing Device Management Legislation Error Cabling Processing WannaCry Digital Signature Downloads Music Wi-Fi Administrator Time Management Freedom of Information Upgrades Content Management Adminstration Pirating Information Accountants A.I. Books Workers Managed IT Service Corporate Profile Teamwork Business Managemenet Leadership email scam Addiction Assessment SharePoint Multi-factor Authentication Supercomputer Bookmark LiFi Webinar Migration Connected Devices PDF Tip of the week online Currency Wireless Headphones Telephone Worker Google Play Google Calendar 3D Printing Capital Printers Productuvuty Managing Stress Regulation CrashOverride