{"id":22748,"date":"2021-04-19T06:26:00","date_gmt":"2021-04-19T06:26:00","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/how-secure-is-blockchain-tech-thoughts-from-a-digital-forensics-firm\/"},"modified":"2023-08-26T06:24:14","modified_gmt":"2023-08-26T06:24:14","slug":"how-secure-is-blockchain-tech-thoughts-from-a-digital-forensics-firm","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/fintech\/how-secure-is-blockchain-tech-thoughts-from-a-digital-forensics-firm\/","title":{"rendered":"How Secure Is Blockchain Tech? Thoughts From A Digital Forensics Firm"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22748\" class=\"elementor elementor-22748\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-9b2a44d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9b2a44d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-605b2dc\" data-id=\"605b2dc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27f4d45 elementor-widget elementor-widget-text-editor\" data-id=\"27f4d45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The technology behind Bitcoin and other cryptocurrencies, named blockchain, is only just beginning to be applied outside of currencies and DApps, or decentralized apps. The use cases for this tech are wide-reaching and revolutionary. Now that more institutions are taking the crypto space seriously, the value of crypto assets will soon leave the speculative markets and be judged on their tech merits.<\/p>\n<p>Improved security is one of the many use cases for blockchain technology. It isn\u2019t an exaggeration to say that the world of digital security is about to be flipped on its head &#8211; and that&#8217;s probably a good thing.<\/p>\n<p>Before we dig into how blockchain will revolutionize the digital security industry, it would help us understand what the technology does. The following may be confusing, and if it is, that means that the cryptography involved is working as intended!<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87672c8 elementor-widget elementor-widget-heading\" data-id=\"87672c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Block + Chain = Blockchain<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f75b810 elementor-widget elementor-widget-text-editor\" data-id=\"f75b810\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A brief and functional definition for our purposes is that blockchain tech stores blocks of information in connected chains. The access to this ledger of information is decentralized, meaning that there isn\u2019t one place or one computer system that keeps these records secure.<\/p>\n<p>Anyone has access to the entire history of the block sequence, and every time a new block is verified, the previous blocks become practically unalterable. To change the information on previously verified blocks would require every participating node in the network to comply with and verify the changes.<\/p>\n<p>For our purposes, nodes are active participants in the network. They are computer systems located worldwide that anyone with the means and know-how can operate. These nodes are what engage in the advanced cryptographic calculations used to create and store the data within each block and control its verification.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1415ea6 elementor-widget elementor-widget-heading\" data-id=\"1415ea6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What does this mean for digital security?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e0a831 elementor-widget elementor-widget-text-editor\" data-id=\"5e0a831\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Now we have to define digital security to see how these two tech fields are merging.<\/p>\n<p>Essentially, digital security describes all the various defenses developed to protect a user\u2019s personal data and files. Digital security, as a loose umbrella term, covers the protection of government data, communications data, transactional and financial data, medical data, and internet browsing data.<\/p>\n<p>The giant breaches of digital security that often plague governments and financial institutions not only threaten national security but affect everyday peoples\u2019 physical and financial wellbeing by risking their social security or banking information. One of the biggest criticisms of these massive institutional security systems is that they are too centralized. All the data is stored in one place or one small network of systems. Often the control of that system is in the hands of one centralized authority.<\/p>\n<p>This means that not only is your data susceptible to hackers from the outside, but your data is also vulnerable to exploitation, monetization, and manipulation by the centralized administrators that control it.<\/p>\n<p>Let\u2019s examine firsthand the shortcomings of traditional, centralized digital security.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ceeae51 elementor-widget elementor-widget-heading\" data-id=\"ceeae51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Centralized Social Media, Data-Breaches and the Unauthorized Monetization of User Data<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6745f5 elementor-widget elementor-widget-text-editor\" data-id=\"f6745f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Social media functions through the centralized collection and <a href=\"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/its-all-in-the-preparation-four-strategies-to-monetize-your-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">monetization of user\u2019s data<\/a>. Some of the <a href=\"https:\/\/www.csoonline.com\/article\/2130877\/the-biggest-data-breaches-of-the-21st-century.html\" target=\"_blank\" rel=\"noreferrer noopener\">biggest hacks<\/a> in internet history have occurred on social media platforms like LinkedIn (2012, 2016) and Dubsmash (2018). These hacks exposed millions of passwords, social security numbers, home addresses, and contact information.<\/p>\n<p>Also, the centralized control of users\u2019 data storage has led to social media companies exploiting users\u2019 data for profit. In 2014, Facebook sold the private data of 87 million Facebook users to the British consulting firm Cambridge Analytica without their knowledge or consent.<\/p>\n<p>The inevitable move toward decentralized social media platforms will keep user data in the hands of the user. All data will be completely encrypted and stored in the blockchain, making the transaction of that data completely traceable and transparent. Due to blockchain\u2019s unique data encryption method and its decentralized verification of the blocks, user data will also be more resilient to the ill-intentions of nefarious actors who hold too much power in the platform\u2019s administration.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24efb27 elementor-widget elementor-widget-heading\" data-id=\"24efb27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Beyond Social Media<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c04ac49 elementor-widget elementor-widget-text-editor\" data-id=\"c04ac49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The security advances blockchain offers can protect against data breaches and administrative exploitation in nearly every industry that has a digital presence. Think of the recent Wells Fargo scandal where Wells Fargo <a href=\"https:\/\/corpgov.law.harvard.edu\/2019\/02\/06\/the-wells-fargo-cross-selling-scandal-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">fraudulently created checking and savings accounts<\/a> in their clients\u2019 names without their knowledge or permission.<\/p>\n<p>What about the <a href=\"https:\/\/www.csoonline.com\/article\/3444488\/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html\" target=\"_blank\" rel=\"noreferrer noopener\">data breach<\/a> at Equifax in 2017? Hackers were able to exploit weaknesses in the security system and obtain the personal information of 147 million clients and the credit card information of 209,000 users. The scope of the attacks was determined to be the result of negligence from Equifax\u2019s security team.<\/p>\n<p>Both of these incidents may have been prevented entirely if each financial system was fully decentralized and operating on blockchain technology. Though the technology existed during all of the mentioned scandals and breaches, comprehensive implementation of the technology was less realized even a few years ago.<\/p>\n<p>So, let\u2019s revisit our opening question.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bacd80a elementor-widget elementor-widget-heading\" data-id=\"bacd80a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Secure is Blockchain Technology?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2aff948 elementor-widget elementor-widget-text-editor\" data-id=\"2aff948\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether or not people are aware of it, blockchain tech is already here and changing how we protect our data, keep records, conduct transactions and communicate. As it applies to digital security, Blockchain is as revolutionary as penicillin was to the medical industry.<\/p>\n<p>Not only can blockchain tech protect our data from external threats, but its decentralized nature also protects it from the exploitation and corruption of a centralized administrative authority.&nbsp;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Improved security is one of the many use cases for blockchain technology. Before we dig into how blockchain will revolutionize the digital security industry, it would help us understand what the technology does.<\/p>\n","protected":false},"author":1110,"featured_media":19177,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[192],"tags":[208,1504,350],"ppma_author":[3833],"class_list":["post-22748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fintech","tag-blockchain-technology","tag-digital-forensics","tag-security"],"authors":[{"term_id":3833,"user_id":1110,"is_guest":0,"slug":"dan-simpson","display_name":"Dan Simpson","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Dan-Simpson-1-150x150.png","user_url":"https:\/\/www.itacceleration.com\/orlando-computer-digital-forensics\/","last_name":"Simpson","first_name":"Dan","job_title":"","description":"Dan Simpson is a Freelance Writer and a computer nerd through and through. . He writes on behalf of IT Acceleration, an IT support firm and <a href=\"https:\/\/www.itacceleration.com\/orlando-computer-digital-forensics\/\" target=\"_blank\" rel=\"noopener\">digital forensics investigator<\/a>"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/1110"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=22748"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22748\/revisions"}],"predecessor-version":[{"id":31549,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22748\/revisions\/31549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/19177"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=22748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=22748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=22748"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=22748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}