Blockchain v World Cup – It Could Go To Penalties…

If you have been watching the World Cup on UK commercial TV, your jaw might have dropped. Not because of that Ronaldo free kick or Hannes Halldorson saving a Lionel Messi penalty. Not even England winning its first two group matches. 

If you work in the data industry, what might have surprised you was seeing ads for a blockchain-enabled IoT business, Hdac. Filled with smart locks and connected fridges, it implied that a new world of machine-to-machine data flows was already at hand, all secured thanks to the use of blockchain.

Of course, if you do work in the data industry, have tried to stand up a live blockchain service or are wrestling with the internet of things, you will know that few of these things have reached a sustainable, viable state. Hdac may have jumped the gun, not least because its own infrastructure is not ready, but also by baffling unsuspecting football fans far too early in the adoption cycle.

Look closely at the company itself and the fact that it is advertising on commercial TV becomes even more surprising. The tech industry has form on this front, of course, the 2000 Super Bowl broadcast is famous for having 14 different dot.com advertisers, of which just four are still going concerns. In choosing to spend heavy on mass-market spots, Hdac may have risked joining that band. 

It has certainly btought to the surface a number of vital issues that the current wave of blockchain-enabled start-ups need to resolve, but seem to be ignoring.

Blockchain has a Problem with Governance
There is a simple rule to follow when considering whether to deploy blockchain to support a process - if it can be done in a conventional database, do so. The infrastructure underpinning distributed ledger technologies (DLT) continues to be exotic, unstable and reliant on a long chain of third-parties. 

When it comes to putting personal information into blockchain, the rule is simple - don’t.
When it comes to putting personal information into blockchain, the rule is even more simple - don’t. Regardless of the issue of how to correct any errors that might arise (as required by GDPR and as restricted by blockchain’s inherent immutability), there is a big question mark over what happens to that data when some of these projects inevitability fail. Leaving PII in unsupervised and abandoned systems creates a big risk that could come back to bite its creators. 

Hdac intends to use blockchain chiefly for machine-to-machine interactions. But if one of its smart locks is connected to a security system that monitors when people are in their homes, for example, that quickly becomes personal data because of the uniqueness of each of those data profiles. How will it apply the necessary governance which results?

Blockchain has a Big Problem with Smart Contracts
One of the most compelling arguments for blockchain and DLT is the ability to set up smart contracts that execute automatically, thereby removing delays and human intervention. But one of the biggest areas of legal action is contesting the terms of contracts, with courts regularly deciding that they are unfair or improperly constructed or otherwise deficient. 
Say hello to a future in which the very USP of blockchain no longer obtains…

So what are the consequences if a smart contract is challenged and needs to be revised? Again, the supposed immutability of blockchain would seem to make this impossible, putting participants in potential breach of court instructions to make changes. 

That is why one of the leading blockchain platforms, Ethereum, is working on protocols that would introduce mutability into the world of blockchain. Say hello to a future in which the very USP of blockchain no longer obtains…

Blockchain has a Very Big Problem with Cyberecurity

Despite the claims for the visibility of transactions in blockchain and the need for all participants to agree to each event, the world of crypto-currencies has a very poor record on protecting itself from hackers. Hdac is a prime example - one month after its $258 million initial coin offering, it had to halt withdrawals from its mining pool because of hacking activity.

This led to the most jaw-dropping of all its recent actions - the fact that it was able to disclaim all responsibility because of the decentralised nature of its blockchain-based crypto-currency. 

In other words, it has investors’ cash, but it respects no obligations around the tokens it issued in return. Imagine a CEO saying something similar in relation to a conventional share issue which turned out to have seen an undisclosed proportion of those shares stolen by criminals.

DataIQ

You Might Also Read: 

Blockchain: What Business Executives Need To Know:

Blockchain To Secure Storage Of Sensitive Data:

 

« China’s Electronic Surveillance Program Targets Muslims
White Hat To Combat Cyber-Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

Silverse

Silverse

At Silverse, we specialize in building a comprehensive cybersecurity journey, anchored by our extensive experience, industry expertise, and an ecosystem of trusted partners.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.