Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will Your Online Privacy Be Better Using Blockchain?

Will Your Online Privacy Be Better Using Blockchain?

Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the focus directed to Bitcoin, it is easy to forget that the blockchain has other uses - uses that are geared toward increased cybersecurity, transparency, and privacy.

The Sovrin Network
However, many companies haven’t forgotten, and have come together to form a nonprofit organization dedicated to creating a network that will enable far more secure online exchanges of information and credentials. This association, called the Sovrin Foundation, is working to create something called the Sovrin Network using blockchain technology.

This network would allow each user to maintain a digital wallet containing identification credentials, banking and other financial credentials, and even employment credentials or a company ID.

Their Mission
The Sovrin Foundation was founded in response to what many companies see as a fundamental flaw in the infrastructure of the Internet. After a year during which 2.9 billion records were compromised in assorted data breaches and cyberattacks, these companies have banded together to create an improved system for confirming one’s identity online that also limits the opportunity for identity-based cybercrimes.

In short, the intention is to create a standardized means of establishing digital credentials, as well as a method of verifying them as they are used. The Sovrin Foundation is leveraging blockchain technology in order to do so.

How Will It Work for the End User?
Of course, there is always the concern that people will be resistant to change, despite the benefits that this change will bring them. Furthermore, it isn’t very likely that the average layperson is suddenly going to come to the conclusion that they need to download an app that provides them with a secure online identity wallet.

That’s why organizations, like financial institutions and businesses, will be able to access these capabilities through QR codes and other, similar means of identification.

Using the blockchain, different institutions could securely contact one another in seeking out information about you, and the minimal amount of information needed to satisfy the inquiry would be shared. For example, if a user was trying to take out a bank loan and both the financial institution and their employer were a part of the blockchain network, the employer could confirm that the user meets the minimum income requirement for the loan without actually sharing the salary of the user.

In this way, the Sovrin Network would put the power to control their information back in the hands of the user.

But What If I Lose My Phone?
Let’s face it, you wouldn’t want to lose your actual wallet, never mind one that contains your entire digital identity - so what should you do if your phone is misplaced or stolen with credentials from the Sovrin Network on it?

The same thing that you should do if the same happened to your actual wallet - cancel your credentials and have new ones issued.

Is This Approach Really Better?
In so many words, yes. As a society, we are increasingly reliant on data and information to ensure our own security, and proceed with daily business as usual. Any means we have to make that security more reliable is something that we should consider.

What do you think about all this? Share your thoughts in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 05 May 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Phishing Email Efficiency Workplace Tips Computer Privacy Google Collaboration Hosted Solutions Users IT Services Cybersecurity Quick Tips Ransomware Data Backup Microsoft Communication Small Business Workplace Strategy Smartphones Mobile Device Mobile Devices communications Android Saving Money Smartphone Business Management VoIP Managed IT Services Managed Service Microsoft Office Data Recovery Browser Social Media Passwords Upgrade Network Backup Disaster Recovery Tech Term Internet of Things Automation Artificial Intelligence Remote Cloud Computing Covid-19 Remote Work Server Managed Service Provider Miscellaneous Windows Facebook Encryption Gadgets Spam Outsourced IT Employee/Employer Relationship Holiday Windows 10 Information Government Business Continuity Data Management Wi-Fi Productivity Business Technology Windows 10 Blockchain Current Events Apps Two-factor Authentication Compliance Bandwidth Virtualization Data Security Employer-Employee Relationship Office Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail Apple Networking Vendor App Applications Computing Information Technology Hacker Conferencing Access Control Avoiding Downtime Office 365 Mobile Office How To BDR Operating System BYOD Help Desk Virtual Private Network Risk Management Training Computers Health Healthcare Analytics Website Office Tips Marketing Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services AI HIPAA WiFi Router Big Data Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Cybercrime Monitoring Customer Service Display Excel Printer Paperless Office Infrastructure Remote Workers Telephone IT Support Tip of the week Document Management Cooperation Free Resource Project Management Windows 7 Firewall Scam Microsoft 365 Data loss Solutions The Internet of Things Robot User Tip Modem Mobile Security Settings Processor Wireless Printing Content Filtering Holidays IT Management Customer Relationship Management Data Storage VPN 2FA YouTube Meetings Smart Technology Supply Chain Video Conferencing Cryptocurrency Hacking Managed Services Provider Professional Services Presentation Computer Repair Saving Time Virtual Machines Virtual Desktop Data storage Managed IT Service LiFi Wireless Technology Downloads Outlook iPhone Licensing Machine Learning Money Humor Vulnerabilities Word Entertainment Data Privacy Maintenance Images 101 Antivirus Sports Telephone System Multi-Factor Authentication Mouse Mobility Cost Management Safety Administration Employees Integration Username Managing Costs Amazon Travel Application Google Maps Cortana eCommerce Techology Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Alt Codes IBM IT Technicians Virtual Machine Environment Media Downtime Unified Threat Management Cyber Monday Medical IT Hosted Solution Proxy Server Reviews Cookies Unified Threat Management Tactics Development Hotspot Transportation Small Businesses Typing Network Congestion Mirgation Hypervisor Displays PowerPoint Competition Knowledge Physical Security Shopping Nanotechnology Optimization Google Drive User Error Addiction Language Employer/Employee Relationships Outsourcing 5G Management PCI DSS Chatbots Navigation Point of Sale Google Docs Distributed Denial of Service Workplace Unified Communications Experience Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Bitcoin Network Management Running Cable Tech Support User Monitors Regulations Compliance Identity Google Wallet Evernote Paperless Co-managed IT Bookmark Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Windows 8 IP Address Laptop Websites Financial Data History Drones Business Communications SharePoint Break Fix Scams Electronic Medical Records Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Halloween Recovery Hard Drives Writing Social Network Telework Cyber security Lenovo Multi-Factor Security Tech Human Resources Dark Web Cables Domains Virtual Reality CES IoT Communitications Trends Supply Chain Management Hacks Server Management Scary Stories Private Cloud Identity Theft Refrigeration Fun Customer Resource management FinTech Regulations Superfish Google Calendar Term Google Apps Microsoft Excel IT Maintenance Deep Learning Public Speaking Twitter Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Lithium-ion battery Error Education Social Engineering Entrepreneur Organization Social Networking Legislation Shortcuts Ransmoware Remote Computing Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Mobile Computing Tablet Undo Search Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Best Practice Alert Directions Videos Assessment Electronic Health Records Dark Data Wasting Time Threats Managed IT Buisness File Sharing IT solutions How To Trend Micro Legal Specifications Security Cameras Workplace Strategies Fraud Meta Business Growth Notifications Microchip Internet Exlporer Software as a Service

Blog Archive