Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will Your Online Privacy Be Better Using Blockchain?

Will Your Online Privacy Be Better Using Blockchain?

Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the focus directed to Bitcoin, it is easy to forget that the blockchain has other uses - uses that are geared toward increased cybersecurity, transparency, and privacy.

The Sovrin Network
However, many companies haven’t forgotten, and have come together to form a nonprofit organization dedicated to creating a network that will enable far more secure online exchanges of information and credentials. This association, called the Sovrin Foundation, is working to create something called the Sovrin Network using blockchain technology.

This network would allow each user to maintain a digital wallet containing identification credentials, banking and other financial credentials, and even employment credentials or a company ID.

Their Mission
The Sovrin Foundation was founded in response to what many companies see as a fundamental flaw in the infrastructure of the Internet. After a year during which 2.9 billion records were compromised in assorted data breaches and cyberattacks, these companies have banded together to create an improved system for confirming one’s identity online that also limits the opportunity for identity-based cybercrimes.

In short, the intention is to create a standardized means of establishing digital credentials, as well as a method of verifying them as they are used. The Sovrin Foundation is leveraging blockchain technology in order to do so.

How Will It Work for the End User?
Of course, there is always the concern that people will be resistant to change, despite the benefits that this change will bring them. Furthermore, it isn’t very likely that the average layperson is suddenly going to come to the conclusion that they need to download an app that provides them with a secure online identity wallet.

That’s why organizations, like financial institutions and businesses, will be able to access these capabilities through QR codes and other, similar means of identification.

Using the blockchain, different institutions could securely contact one another in seeking out information about you, and the minimal amount of information needed to satisfy the inquiry would be shared. For example, if a user was trying to take out a bank loan and both the financial institution and their employer were a part of the blockchain network, the employer could confirm that the user meets the minimum income requirement for the loan without actually sharing the salary of the user.

In this way, the Sovrin Network would put the power to control their information back in the hands of the user.

But What If I Lose My Phone?
Let’s face it, you wouldn’t want to lose your actual wallet, never mind one that contains your entire digital identity - so what should you do if your phone is misplaced or stolen with credentials from the Sovrin Network on it?

The same thing that you should do if the same happened to your actual wallet - cancel your credentials and have new ones issued.

Is This Approach Really Better?
In so many words, yes. As a society, we are increasingly reliant on data and information to ensure our own security, and proceed with daily business as usual. Any means we have to make that security more reliable is something that we should consider.

What do you think about all this? Share your thoughts in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Android Disaster Recovery Data Recovery Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Information Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Bandwidth Blockchain Virtualization Business Technology Wi-Fi Windows 10 Vendor Apps Two-factor Authentication Mobile Office Data Security Gmail Budget WiFi BYOD Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome HIPAA Applications Access Control Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Office 365 How To BDR Storage Password Bring Your Own Device Router Big Data Virtual Private Network Health 2FA Help Desk Operating System Computers Risk Management Retail Healthcare Website Managed IT Services Analytics Office Tips Augmented Reality Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability The Internet of Things Vendor Management Solutions Physical Security Social Display Printer Going Green Paperless Office Windows 11 Infrastructure Monitoring Customer Service Cybercrime Excel Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Firewall Windows 7 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Safety Sports Mouse IT Management Meetings Employees VPN Administration Integration User Tip Modem Processor Computer Repair Mobile Security Holidays Customer Relationship Management Settings Data Storage Printing Wireless Supply Chain Smart Technology Video Conferencing Content Filtering Managed Services Provider Machine Learning Hacking Presentation Saving Time YouTube Virtual Machines Professional Services Cryptocurrency Wireless Technology Managed IT Service Maintenance Downloads Antivirus Virtual Desktop iPhone Data storage LiFi Licensing Entertainment Word Vulnerabilities Outlook Data Privacy Money Images 101 Humor Entrepreneur Scary Stories Travel Social Networking Shortcuts Legislation Hacks Organization Digital Security Cameras Techology Fileless Malware Smart Devices Google Maps Fun Ransmoware Deep Learning Remote Working Content Vendors Wearable Technology Memory Data Breach Unified Threat Management Motherboard Be Proactive Comparison Google Play Undo Health IT Videos Unified Threat Management Directions Education Electronic Health Records Assessment Workforce Permissions Threats Wasting Time Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Mobile Computing User Error Microchip Software as a Service Internet Exlporer Search Meta Fraud Application Best Practice Username Amazon Managing Costs Buisness eCommerce Point of Sale Black Friday SSID IBM Legal IT solutions Surveillance Database Outsource IT Virtual Assistant Virtual Machine Environment Tech Support IT Technicians Media Business Growth Network Management Reviews Proxy Server Cookies Monitors Cyber Monday Medical IT Development Tactics Cortana Small Businesses Hotspot Transportation Hypervisor Displays Websites Mirgation Alt Codes Competition Shopping Downtime Optimization Nanotechnology PowerPoint SharePoint Hosted Solution Addiction Outsourcing Electronic Medical Records Language Employer/Employee Relationships Chatbots Navigation Typing PCI DSS Management Gig Economy Lenovo Screen Reader Workplace Writing Distributed Denial of Service Google Drive User Internet Service Provider Service Level Agreement Knowledge Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Paperless Evernote Regulations Compliance Server Management Superfish Bookmark Memes Identity Theft Smart Tech 5G Co-managed IT IP Address Google Docs Unified Communications Net Neutrality Download Experience Technology Care Twitter Alerts SQL Server Running Cable History Error Business Communications Bitcoin Financial Data Google Wallet Smartwatch Browsers IT Connectivity Scams Social Engineering Break Fix Recovery Procurement Upload Hybrid Work Remote Computing Azure Laptop Cyber security Human Resources Multi-Factor Security Tech Hard Drives Windows 8 Telework Social Network Domains Drones CES Communitications Tablet IoT Cables Dark Web Supply Chain Management Trends Alert Halloween File Sharing Regulations Google Apps Dark Data Google Calendar Term Refrigeration FinTech Managed IT Customer Resource management Public Speaking Data Analysis IT Assessment Star Wars IT Maintenance How To Microsoft Excel Lithium-ion battery Flexibility Gamification Business Intelligence Notifications Staff Value

Blog Archive