facebook linkedin twitter

Will Your Online Privacy Be Better Using Blockchain?

Will Your Online Privacy Be Better Using Blockchain?

Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the focus directed to Bitcoin, it is easy to forget that the blockchain has other uses - uses that are geared toward increased cybersecurity, transparency, and privacy.

The Sovrin Network
However, many companies haven’t forgotten, and have come together to form a nonprofit organization dedicated to creating a network that will enable far more secure online exchanges of information and credentials. This association, called the Sovrin Foundation, is working to create something called the Sovrin Network using blockchain technology.

This network would allow each user to maintain a digital wallet containing identification credentials, banking and other financial credentials, and even employment credentials or a company ID.

Their Mission
The Sovrin Foundation was founded in response to what many companies see as a fundamental flaw in the infrastructure of the Internet. After a year during which 2.9 billion records were compromised in assorted data breaches and cyberattacks, these companies have banded together to create an improved system for confirming one’s identity online that also limits the opportunity for identity-based cybercrimes.

In short, the intention is to create a standardized means of establishing digital credentials, as well as a method of verifying them as they are used. The Sovrin Foundation is leveraging blockchain technology in order to do so.

How Will It Work for the End User?
Of course, there is always the concern that people will be resistant to change, despite the benefits that this change will bring them. Furthermore, it isn’t very likely that the average layperson is suddenly going to come to the conclusion that they need to download an app that provides them with a secure online identity wallet.

That’s why organizations, like financial institutions and businesses, will be able to access these capabilities through QR codes and other, similar means of identification.

Using the blockchain, different institutions could securely contact one another in seeking out information about you, and the minimal amount of information needed to satisfy the inquiry would be shared. For example, if a user was trying to take out a bank loan and both the financial institution and their employer were a part of the blockchain network, the employer could confirm that the user meets the minimum income requirement for the loan without actually sharing the salary of the user.

In this way, the Sovrin Network would put the power to control their information back in the hands of the user.

But What If I Lose My Phone?
Let’s face it, you wouldn’t want to lose your actual wallet, never mind one that contains your entire digital identity - so what should you do if your phone is misplaced or stolen with credentials from the Sovrin Network on it?

The same thing that you should do if the same happened to your actual wallet - cancel your credentials and have new ones issued.

Is This Approach Really Better?
In so many words, yes. As a society, we are increasingly reliant on data and information to ensure our own security, and proceed with daily business as usual. Any means we have to make that security more reliable is something that we should consider.

What do you think about all this? Share your thoughts in the comments!

Is the Internet of Things Growing Too Fast for Eve...
Have You Implemented These Security Best Practices...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Google Small Business Efficiency User Tips Smartphones Quick Tips Gadgets Computer Mobile Devices Business Continuity Disaster Recovery Microsoft Office Mobile Office Virtualization Network Android Social Media Innovation Mobile Device Management Server VoIP Smartphone Miscellaneous Windows 10 Communication Upgrade Ransomware Unified Threat Management Collaboration Windows Remote Monitoring Data Backup Passwords Tech Term Data Recovery Operating System Remote Computing Mobile Computing IT Support Managed IT services BYOD Holiday WiFi Vendor Management communications Cybersecurity Apps Facebook The Internet of Things Marketing Apple BDR Firewall Analytics Automation History Users Data Management Outsourced IT Phishing Internet of Things Managed IT Services Productivity Alert Artificial Intelligence App IT Consultant Mobile Device Save Money Health Content Filtering Big data Going Green Spam Bandwidth Bring Your Own Device Gmail Antivirus Maintenance Browser Office Cost Management Best Practice Information Technology Lithium-ion Battery Budget Hiring/Firing Outlook Hard Drives Managed IT Windows 8 Two-factor Authentication Wireless Technology Encryption Search Cybercrime Printer Virus Tech Support Update Hacking Training Phone System Office 365 IBM Money Document Management Help Desk Cloud Computing Computers Recovery Travel Employer-Employee Relationship Regulations Windows 10 Risk Management SaaS Save Time Hard Drive Law Enforcement Access Control Customer Service Compliance Running Cable Proactive IT Data storage It Management Administration Business Technology Government Saving Time Website Humor VPN Intranet Networking Education Legal Machine Learning Avoiding Downtime Password Cortana Telephone Systems Data Breach Paperless Office iPhone Project Management Hacker Sports Business Intelligence Computing Disaster End of Support Hosted Solution Excel File Sharing Current Events Digital Payment Downtime Robot User Securty Customer Relationship Management Tablet Augmented Reality Mobility Comparison Company Culture Solid State Drive PowerPoint Social Engineering Applications Fax Server Computer Repair Wireless Social Networking DDoS Flexibility Data Security Black Market Patch Management Blockchain Laptop Twitter Data Loss Business Growth Word Redundancy Streaming Media eWaste Inbound Marketing Taxes Office Tips Distributed Denial of Service Value Information YouTube Management Pain Points Public Cloud Unified Communications Settings Digital Net Neutrality Websites Processors Chrome Vulnerabilities Identity Theft Start Menu Tech Terms USB Healthcare User Error Router Vendor Mobile Technology Co-managed IT Presentation Software as a Service IT service Computer Accessories Google Maps Specifications Safety Virtual Reality Uninterrupted Power Supply Virtual Desktop Politics Gaming Console Automobile Social Emails Trending Bitcoin Lifestyle Documents Bluetooth Chromebook Mouse Managed Service Text Messaging Computing Infrastructure Hack Data Protection Heating/Cooling Webcam How To Programming Conferencing Cryptocurrency Statistics Storage Network Congestion Download Google Docs Private Cloud Experience Monitors Scam Monitoring Cleaning Telephony Retail Worker Tip of the week Get More Done Analytic Legislation Error Advertising Flash Microchip Electronic Medical Records Google Calendar Recycling Public Speaking IT Plan Enterprise Resource Planning CIO Turn Key Product Reviews Accountants A.I. Windows XP Adminstration Pirating Information VoIP Printer Server Shortcut email scam Addiction Staffing Google Wallet Leadership Reading Samsung Touchscreen News Troubleshooting Multi-factor Authentication Displays G Suite Knowledge Trojan Read Entrepreneur Society Employer Employee Relationship Consultation Evernote Licensing Virtual Assistant Environment Wireless Headphones Telephone Hacks Physical Security Health IT Technology Tips Organize HIPAA Migration Connected Devices Micrsooft Fake News Electronic Payment Equifax Fleet Tracking Banking Botnet Audit Device Management Competition Network Management Drones Relocation Tablets Business Owner Device security MSP Sync Content Management Data Warehousing Business Managemenet Upselling Emergency Hard Drive Disposal Nanotechnology Social Network Permissions Language Notifications CCTV Access IP Address Desktop Finance Microsoft Excel Human Resources Startup Asset Tracking Video Surveillance Business Metrics Computer Malfunction Computer Care Webinar online Currency Application Business Cards Service Level Agreement Reliable Computing Username switches Writing In Internet of Things Unified Threat Management Backup and Disaster Recovery Music Saving ZTime Google Drive Windows Server 2008 Upgrades Vulnerability Screen Reader Customer Resource management User Tip Spyware Mobile Payment LinkedIn Gamification Smart Tech Distribution LiFi Debate Motion Sickness Electricity Printing Digital Signature Piracy Upload Harddrive Scalability Skype Entertainment HTML GPS Archive Teamwork Fiber-Optic Database Messenger Tracking Windows 7 Deep Learning Best Practives Telephone System Work/Life Balance External Harddrive Rental Service Meetings cache Television Mobile Security Cabling Point of Contact PDF Multi-Factor Security Cost Visible Light Communication Memory Web Server WannaCry Downloads Software License Trends Devices IT consulting 3D Ebay Wi-Fi Administrator Corporate Profile Best Available Keyboard Fraud Tactics Thin CLient Books Workers Time Management Freedom of Information Microserver UTM Content Smart Phones Supercomputer Assessment SharePoint Domains CrashOverride Capital Productuvuty Printers Managing Stress Regulation 3D Printing