Blockchain v World Cup – It Could Go To Penalties…

If you have been watching the World Cup on UK commercial TV, your jaw might have dropped. Not because of that Ronaldo free kick or Hannes Halldorson saving a Lionel Messi penalty. Not even England winning its first two group matches. 

If you work in the data industry, what might have surprised you was seeing ads for a blockchain-enabled IoT business, Hdac. Filled with smart locks and connected fridges, it implied that a new world of machine-to-machine data flows was already at hand, all secured thanks to the use of blockchain.

Of course, if you do work in the data industry, have tried to stand up a live blockchain service or are wrestling with the internet of things, you will know that few of these things have reached a sustainable, viable state. Hdac may have jumped the gun, not least because its own infrastructure is not ready, but also by baffling unsuspecting football fans far too early in the adoption cycle.

Look closely at the company itself and the fact that it is advertising on commercial TV becomes even more surprising. The tech industry has form on this front, of course, the 2000 Super Bowl broadcast is famous for having 14 different dot.com advertisers, of which just four are still going concerns. In choosing to spend heavy on mass-market spots, Hdac may have risked joining that band. 

It has certainly btought to the surface a number of vital issues that the current wave of blockchain-enabled start-ups need to resolve, but seem to be ignoring.

Blockchain has a Problem with Governance
There is a simple rule to follow when considering whether to deploy blockchain to support a process - if it can be done in a conventional database, do so. The infrastructure underpinning distributed ledger technologies (DLT) continues to be exotic, unstable and reliant on a long chain of third-parties. 

When it comes to putting personal information into blockchain, the rule is simple - don’t.
When it comes to putting personal information into blockchain, the rule is even more simple - don’t. Regardless of the issue of how to correct any errors that might arise (as required by GDPR and as restricted by blockchain’s inherent immutability), there is a big question mark over what happens to that data when some of these projects inevitability fail. Leaving PII in unsupervised and abandoned systems creates a big risk that could come back to bite its creators. 

Hdac intends to use blockchain chiefly for machine-to-machine interactions. But if one of its smart locks is connected to a security system that monitors when people are in their homes, for example, that quickly becomes personal data because of the uniqueness of each of those data profiles. How will it apply the necessary governance which results?

Blockchain has a Big Problem with Smart Contracts
One of the most compelling arguments for blockchain and DLT is the ability to set up smart contracts that execute automatically, thereby removing delays and human intervention. But one of the biggest areas of legal action is contesting the terms of contracts, with courts regularly deciding that they are unfair or improperly constructed or otherwise deficient. 
Say hello to a future in which the very USP of blockchain no longer obtains…

So what are the consequences if a smart contract is challenged and needs to be revised? Again, the supposed immutability of blockchain would seem to make this impossible, putting participants in potential breach of court instructions to make changes. 

That is why one of the leading blockchain platforms, Ethereum, is working on protocols that would introduce mutability into the world of blockchain. Say hello to a future in which the very USP of blockchain no longer obtains…

Blockchain has a Very Big Problem with Cyberecurity

Despite the claims for the visibility of transactions in blockchain and the need for all participants to agree to each event, the world of crypto-currencies has a very poor record on protecting itself from hackers. Hdac is a prime example - one month after its $258 million initial coin offering, it had to halt withdrawals from its mining pool because of hacking activity.

This led to the most jaw-dropping of all its recent actions - the fact that it was able to disclaim all responsibility because of the decentralised nature of its blockchain-based crypto-currency. 

In other words, it has investors’ cash, but it respects no obligations around the tokens it issued in return. Imagine a CEO saying something similar in relation to a conventional share issue which turned out to have seen an undisclosed proportion of those shares stolen by criminals.

DataIQ

You Might Also Read: 

Blockchain: What Business Executives Need To Know:

Blockchain To Secure Storage Of Sensitive Data:

 

« China’s Electronic Surveillance Program Targets Muslims
White Hat To Combat Cyber-Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

NovaTech Automation

NovaTech Automation

NovaTech products and services make the world’s power grids and essential process industries more reliable, efficient, sustainable and secure.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

BlackScore

BlackScore

BlackScore is a technology company seeking to disrupt risk assessment using AI-driven technology.

Salt Cybersecurity

Salt Cybersecurity

Salt Cybersecurity offer a four-pronged approach to information security that includes Custom Security Policy, Vulnerability Assessment, Threat Detection, and Security Awareness Training.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.