Blockchain v World Cup – It Could Go To Penalties…

If you have been watching the World Cup on UK commercial TV, your jaw might have dropped. Not because of that Ronaldo free kick or Hannes Halldorson saving a Lionel Messi penalty. Not even England winning its first two group matches. 

If you work in the data industry, what might have surprised you was seeing ads for a blockchain-enabled IoT business, Hdac. Filled with smart locks and connected fridges, it implied that a new world of machine-to-machine data flows was already at hand, all secured thanks to the use of blockchain.

Of course, if you do work in the data industry, have tried to stand up a live blockchain service or are wrestling with the internet of things, you will know that few of these things have reached a sustainable, viable state. Hdac may have jumped the gun, not least because its own infrastructure is not ready, but also by baffling unsuspecting football fans far too early in the adoption cycle.

Look closely at the company itself and the fact that it is advertising on commercial TV becomes even more surprising. The tech industry has form on this front, of course, the 2000 Super Bowl broadcast is famous for having 14 different dot.com advertisers, of which just four are still going concerns. In choosing to spend heavy on mass-market spots, Hdac may have risked joining that band. 

It has certainly btought to the surface a number of vital issues that the current wave of blockchain-enabled start-ups need to resolve, but seem to be ignoring.

Blockchain has a Problem with Governance
There is a simple rule to follow when considering whether to deploy blockchain to support a process - if it can be done in a conventional database, do so. The infrastructure underpinning distributed ledger technologies (DLT) continues to be exotic, unstable and reliant on a long chain of third-parties. 

When it comes to putting personal information into blockchain, the rule is simple - don’t.
When it comes to putting personal information into blockchain, the rule is even more simple - don’t. Regardless of the issue of how to correct any errors that might arise (as required by GDPR and as restricted by blockchain’s inherent immutability), there is a big question mark over what happens to that data when some of these projects inevitability fail. Leaving PII in unsupervised and abandoned systems creates a big risk that could come back to bite its creators. 

Hdac intends to use blockchain chiefly for machine-to-machine interactions. But if one of its smart locks is connected to a security system that monitors when people are in their homes, for example, that quickly becomes personal data because of the uniqueness of each of those data profiles. How will it apply the necessary governance which results?

Blockchain has a Big Problem with Smart Contracts
One of the most compelling arguments for blockchain and DLT is the ability to set up smart contracts that execute automatically, thereby removing delays and human intervention. But one of the biggest areas of legal action is contesting the terms of contracts, with courts regularly deciding that they are unfair or improperly constructed or otherwise deficient. 
Say hello to a future in which the very USP of blockchain no longer obtains…

So what are the consequences if a smart contract is challenged and needs to be revised? Again, the supposed immutability of blockchain would seem to make this impossible, putting participants in potential breach of court instructions to make changes. 

That is why one of the leading blockchain platforms, Ethereum, is working on protocols that would introduce mutability into the world of blockchain. Say hello to a future in which the very USP of blockchain no longer obtains…

Blockchain has a Very Big Problem with Cyberecurity

Despite the claims for the visibility of transactions in blockchain and the need for all participants to agree to each event, the world of crypto-currencies has a very poor record on protecting itself from hackers. Hdac is a prime example - one month after its $258 million initial coin offering, it had to halt withdrawals from its mining pool because of hacking activity.

This led to the most jaw-dropping of all its recent actions - the fact that it was able to disclaim all responsibility because of the decentralised nature of its blockchain-based crypto-currency. 

In other words, it has investors’ cash, but it respects no obligations around the tokens it issued in return. Imagine a CEO saying something similar in relation to a conventional share issue which turned out to have seen an undisclosed proportion of those shares stolen by criminals.

DataIQ

You Might Also Read: 

Blockchain: What Business Executives Need To Know:

Blockchain To Secure Storage Of Sensitive Data:

 

« China’s Electronic Surveillance Program Targets Muslims
White Hat To Combat Cyber-Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).