Blockchain v World Cup – It Could Go To Penalties…

If you have been watching the World Cup on UK commercial TV, your jaw might have dropped. Not because of that Ronaldo free kick or Hannes Halldorson saving a Lionel Messi penalty. Not even England winning its first two group matches. 

If you work in the data industry, what might have surprised you was seeing ads for a blockchain-enabled IoT business, Hdac. Filled with smart locks and connected fridges, it implied that a new world of machine-to-machine data flows was already at hand, all secured thanks to the use of blockchain.

Of course, if you do work in the data industry, have tried to stand up a live blockchain service or are wrestling with the internet of things, you will know that few of these things have reached a sustainable, viable state. Hdac may have jumped the gun, not least because its own infrastructure is not ready, but also by baffling unsuspecting football fans far too early in the adoption cycle.

Look closely at the company itself and the fact that it is advertising on commercial TV becomes even more surprising. The tech industry has form on this front, of course, the 2000 Super Bowl broadcast is famous for having 14 different dot.com advertisers, of which just four are still going concerns. In choosing to spend heavy on mass-market spots, Hdac may have risked joining that band. 

It has certainly btought to the surface a number of vital issues that the current wave of blockchain-enabled start-ups need to resolve, but seem to be ignoring.

Blockchain has a Problem with Governance
There is a simple rule to follow when considering whether to deploy blockchain to support a process - if it can be done in a conventional database, do so. The infrastructure underpinning distributed ledger technologies (DLT) continues to be exotic, unstable and reliant on a long chain of third-parties. 

When it comes to putting personal information into blockchain, the rule is simple - don’t.
When it comes to putting personal information into blockchain, the rule is even more simple - don’t. Regardless of the issue of how to correct any errors that might arise (as required by GDPR and as restricted by blockchain’s inherent immutability), there is a big question mark over what happens to that data when some of these projects inevitability fail. Leaving PII in unsupervised and abandoned systems creates a big risk that could come back to bite its creators. 

Hdac intends to use blockchain chiefly for machine-to-machine interactions. But if one of its smart locks is connected to a security system that monitors when people are in their homes, for example, that quickly becomes personal data because of the uniqueness of each of those data profiles. How will it apply the necessary governance which results?

Blockchain has a Big Problem with Smart Contracts
One of the most compelling arguments for blockchain and DLT is the ability to set up smart contracts that execute automatically, thereby removing delays and human intervention. But one of the biggest areas of legal action is contesting the terms of contracts, with courts regularly deciding that they are unfair or improperly constructed or otherwise deficient. 
Say hello to a future in which the very USP of blockchain no longer obtains…

So what are the consequences if a smart contract is challenged and needs to be revised? Again, the supposed immutability of blockchain would seem to make this impossible, putting participants in potential breach of court instructions to make changes. 

That is why one of the leading blockchain platforms, Ethereum, is working on protocols that would introduce mutability into the world of blockchain. Say hello to a future in which the very USP of blockchain no longer obtains…

Blockchain has a Very Big Problem with Cyberecurity

Despite the claims for the visibility of transactions in blockchain and the need for all participants to agree to each event, the world of crypto-currencies has a very poor record on protecting itself from hackers. Hdac is a prime example - one month after its $258 million initial coin offering, it had to halt withdrawals from its mining pool because of hacking activity.

This led to the most jaw-dropping of all its recent actions - the fact that it was able to disclaim all responsibility because of the decentralised nature of its blockchain-based crypto-currency. 

In other words, it has investors’ cash, but it respects no obligations around the tokens it issued in return. Imagine a CEO saying something similar in relation to a conventional share issue which turned out to have seen an undisclosed proportion of those shares stolen by criminals.

DataIQ

You Might Also Read: 

Blockchain: What Business Executives Need To Know:

Blockchain To Secure Storage Of Sensitive Data:

 

« China’s Electronic Surveillance Program Targets Muslims
White Hat To Combat Cyber-Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

D3 Security

D3 Security

D3's Smart SOAR platform is at the forefront of the security automation revolution, helping clients around the world to rapidly identify, analyze, and resolve advanced threats.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

Beazley Security

Beazley Security

Beazley Security is a global cyber security firm committed to helping clients develop true cyber resilience: the ability to withstand and recover from any cyberattack.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.