SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Information security in
private blockchains
Dr Gideon Greenspan, Founder and CEO
Overview
•  Blockchain databases
•  Internal risks
•  External risks
•  Mitigation strategies
•  Summary
Centralized databases
ClientServer
Client
Request
Blockchain databases
Node
Node
Node
NodeTransaction
Block
Blockchain databases
Node
Node
Node
NodeTransaction
Block
Blockchain
Consensus created
by validator nodes
Ledgers in regular databases
Account number Balance
04823872 £ 229.94
20956298 £ 431.05
38103749 £ 183.67
Ledgers in blockchains
Public key hash Balance
13B9cMd5Ch9fu6qU4
94gHTfAPFQfq3ZSGx
£ 229.94
1FRZvSBc1cRFbmwbz
NhhaQTyRJXRujN2Sq
£ 431.05
1HDxhfeoSQmVNzTnZ
RLe2Z6nJ1LLAuGWpa
£ 183.67
Ledgers in blockchains
Public key hash Balance
13B9cMd5Ch9fu6qU4
94gHTfAPFQfq3ZSGx
£ 229.94
1FRZvSBc1cRFbmwbz
NhhaQTyRJXRujN2Sq
£ 146.83
1FRZvSBc1cRFbmwbz
NhhaQTyRJXRujN2Sq
£ 284.22
Multiple entries for one account ⇒
concurrent distributed transactions
Internal risks: regular node
•  What can a bad regular node do?
⤫  Spend somebody else’s money
⤫  Create more money
⤫  Spend own money twice
⤫  Flood the network (denial of service)
⤫  Censor transactions
•  Why are we so confident?
ü  7 years of bitcoin history
Internal risks: validator node
•  What can a bad validator node do?
⤫  Spend somebody else’s money
⤫  Create more money
⤫  Spend own money twice
⤫  Flood the network (denial of service)
⤫  Censor transactions
ü  Delay transaction confirmation
ü  Resolve conflicts with bias
Internal risks: validator majority
•  What can a bad validator majority do?
⤫  Spend somebody else’s money
⤫  Create more money
⤫  Spend own money twice
⤫  Flood the network (denial of service)
ü  Censor transactions
ü  Delay transaction confirmation
ü  Resolve conflicts with bias
External risks: network violation
⤫  Denial of service
–  Peer-to-peer resilience
⤫  Wiretapping
–  Handshaking with digital signatures
–  Extend to encrypted communication
⤫  Spoofing / Man-in-the-middle
–  Impossible without key compromise
–  Transaction source irrelevant anyway
External risks: host violation
Blockchain
node
Centralized
client
Centralized
server
Read mine ✓︎ ✓ ✓︎︎
Read all ✓ ✕ ✓︎
Write mine ✓ ✓ ✓
Write all ✕ ✕ ✓
Mitigation: Cold storage
•  Offline “cold” private key (air gapped)
– Most funds stored in cold address
– Refill “hot” address as necessary
http://bitcoingarden.tk/trezor-the-
hardware-bitcoin-wallet/
Mitigation: Multisignature
•  Lock funds under n different keys
– Stored on different nodes/devices
•  Require m of those keys to spend
– Special type of ledger entry
•  Variations:
– 1 of 2 for key loss
– 2 of 2 for host security
– 2 of 3 for escrow
Blockchain security: summary
Confidentiality ▼
Integrity ▲
Availability ▲
*
* Watch: zero-knowledge proofs

Contenu connexe

Tendances

Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyRemaisha Ali
 
Vilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusVilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusAudrius Ramoska
 
EUIPO DPM knowledge share: Blockchain and IP
EUIPO DPM knowledge share: Blockchain and IPEUIPO DPM knowledge share: Blockchain and IP
EUIPO DPM knowledge share: Blockchain and IPAudrius Ramoska
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyAayt Bahaa
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology Niuversity
 
CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101Blockstrap.com
 
An introduction to block chain technology
An introduction to block chain technologyAn introduction to block chain technology
An introduction to block chain technologyyaminisindhurabandar
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainArunimShukla
 
KOIOS - Introduction to Blockchain Technology
KOIOS - Introduction to Blockchain TechnologyKOIOS - Introduction to Blockchain Technology
KOIOS - Introduction to Blockchain TechnologyRicardoEradus
 
How to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on EthereumHow to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on EthereumDEV Cafe
 
Introduction to Consensus techniques
Introduction to Consensus techniques Introduction to Consensus techniques
Introduction to Consensus techniques Vasiliy Suvorov
 
Sidechain talk
Sidechain talkSidechain talk
Sidechain talkjojva
 
Testing in the blockchain
Testing in the blockchainTesting in the blockchain
Testing in the blockchainCraig Risi
 
Blockchain Technology - The Next Superpower By Priyank Vaghela
Blockchain Technology - The Next Superpower By Priyank VaghelaBlockchain Technology - The Next Superpower By Priyank Vaghela
Blockchain Technology - The Next Superpower By Priyank VaghelaPriyankVaghela
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architectureTomasz Tomczyk
 
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...Romeo Kienzler
 
CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101Blockstrap.com
 
A quick introduction to Consensus Models
A quick introduction to Consensus ModelsA quick introduction to Consensus Models
A quick introduction to Consensus ModelsOded Noam
 

Tendances (20)

Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Intro into blockchain
Intro into blockchainIntro into blockchain
Intro into blockchain
 
What is Block chain
What is Block chain What is Block chain
What is Block chain
 
Vilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusVilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensus
 
EUIPO DPM knowledge share: Blockchain and IP
EUIPO DPM knowledge share: Blockchain and IPEUIPO DPM knowledge share: Blockchain and IP
EUIPO DPM knowledge share: Blockchain and IP
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology
 
CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101
 
An introduction to block chain technology
An introduction to block chain technologyAn introduction to block chain technology
An introduction to block chain technology
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
KOIOS - Introduction to Blockchain Technology
KOIOS - Introduction to Blockchain TechnologyKOIOS - Introduction to Blockchain Technology
KOIOS - Introduction to Blockchain Technology
 
How to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on EthereumHow to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on Ethereum
 
Introduction to Consensus techniques
Introduction to Consensus techniques Introduction to Consensus techniques
Introduction to Consensus techniques
 
Sidechain talk
Sidechain talkSidechain talk
Sidechain talk
 
Testing in the blockchain
Testing in the blockchainTesting in the blockchain
Testing in the blockchain
 
Blockchain Technology - The Next Superpower By Priyank Vaghela
Blockchain Technology - The Next Superpower By Priyank VaghelaBlockchain Technology - The Next Superpower By Priyank Vaghela
Blockchain Technology - The Next Superpower By Priyank Vaghela
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architecture
 
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
 
CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101CBGTBT - Part 2 - Blockchains 101
CBGTBT - Part 2 - Blockchains 101
 
A quick introduction to Consensus Models
A quick introduction to Consensus ModelsA quick introduction to Consensus Models
A quick introduction to Consensus Models
 

Similaire à Information security in private blockchains

C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...Citrin Cooperman
 
Cryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantagesCryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantagesMBA Student
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerBlockstrap.com
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introductionInitio
 
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016Marshall Swatt
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinKeenan Olsen
 
Crytomining hacking
Crytomining hackingCrytomining hacking
Crytomining hackingCis siva
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMDiego Alberto Tamayo
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Diego Alberto Tamayo
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMDiego Alberto Tamayo
 
DLT developments in finance
DLT developments in financeDLT developments in finance
DLT developments in financeAlphons Ranner
 
DLT developments in Finance
DLT developments in FinanceDLT developments in Finance
DLT developments in FinanceAlphons Ranner
 
Introduction to Lightning Network
Introduction to Lightning NetworkIntroduction to Lightning Network
Introduction to Lightning NetworkAlan Carbery
 
2018 Lunch & Learn Blockchain Overview
2018 Lunch & Learn Blockchain Overview2018 Lunch & Learn Blockchain Overview
2018 Lunch & Learn Blockchain OverviewPaperchain
 
CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102Blockstrap.com
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain FundamentalsBruno Lowagie
 
Distributed Blockchain Processing
Distributed Blockchain ProcessingDistributed Blockchain Processing
Distributed Blockchain ProcessingAlexey Troshichev
 
SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017LERNER Consulting
 

Similaire à Information security in private blockchains (20)

C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
 
Cryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantagesCryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantages
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
Crytomining hacking
Crytomining hackingCrytomining hacking
Crytomining hacking
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBM
 
DLT developments in finance
DLT developments in financeDLT developments in finance
DLT developments in finance
 
DLT developments in Finance
DLT developments in FinanceDLT developments in Finance
DLT developments in Finance
 
Introduction to Lightning Network
Introduction to Lightning NetworkIntroduction to Lightning Network
Introduction to Lightning Network
 
2018 Lunch & Learn Blockchain Overview
2018 Lunch & Learn Blockchain Overview2018 Lunch & Learn Blockchain Overview
2018 Lunch & Learn Blockchain Overview
 
CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102CBGTBT - Part 6 - Transactions 102
CBGTBT - Part 6 - Transactions 102
 
Blockchain Fundamentals
Blockchain FundamentalsBlockchain Fundamentals
Blockchain Fundamentals
 
Ethereum overview
Ethereum overviewEthereum overview
Ethereum overview
 
Creda Cash Tech Pitch
Creda Cash Tech PitchCreda Cash Tech Pitch
Creda Cash Tech Pitch
 
Distributed Blockchain Processing
Distributed Blockchain ProcessingDistributed Blockchain Processing
Distributed Blockchain Processing
 
SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017
 

Dernier

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Information security in private blockchains

  • 1. Information security in private blockchains Dr Gideon Greenspan, Founder and CEO
  • 2. Overview •  Blockchain databases •  Internal risks •  External risks •  Mitigation strategies •  Summary
  • 6. Ledgers in regular databases Account number Balance 04823872 £ 229.94 20956298 £ 431.05 38103749 £ 183.67
  • 7. Ledgers in blockchains Public key hash Balance 13B9cMd5Ch9fu6qU4 94gHTfAPFQfq3ZSGx £ 229.94 1FRZvSBc1cRFbmwbz NhhaQTyRJXRujN2Sq £ 431.05 1HDxhfeoSQmVNzTnZ RLe2Z6nJ1LLAuGWpa £ 183.67
  • 8. Ledgers in blockchains Public key hash Balance 13B9cMd5Ch9fu6qU4 94gHTfAPFQfq3ZSGx £ 229.94 1FRZvSBc1cRFbmwbz NhhaQTyRJXRujN2Sq £ 146.83 1FRZvSBc1cRFbmwbz NhhaQTyRJXRujN2Sq £ 284.22 Multiple entries for one account ⇒ concurrent distributed transactions
  • 9. Internal risks: regular node •  What can a bad regular node do? ⤫  Spend somebody else’s money ⤫  Create more money ⤫  Spend own money twice ⤫  Flood the network (denial of service) ⤫  Censor transactions •  Why are we so confident? ü  7 years of bitcoin history
  • 10. Internal risks: validator node •  What can a bad validator node do? ⤫  Spend somebody else’s money ⤫  Create more money ⤫  Spend own money twice ⤫  Flood the network (denial of service) ⤫  Censor transactions ü  Delay transaction confirmation ü  Resolve conflicts with bias
  • 11. Internal risks: validator majority •  What can a bad validator majority do? ⤫  Spend somebody else’s money ⤫  Create more money ⤫  Spend own money twice ⤫  Flood the network (denial of service) ü  Censor transactions ü  Delay transaction confirmation ü  Resolve conflicts with bias
  • 12. External risks: network violation ⤫  Denial of service –  Peer-to-peer resilience ⤫  Wiretapping –  Handshaking with digital signatures –  Extend to encrypted communication ⤫  Spoofing / Man-in-the-middle –  Impossible without key compromise –  Transaction source irrelevant anyway
  • 13. External risks: host violation Blockchain node Centralized client Centralized server Read mine ✓︎ ✓ ✓︎︎ Read all ✓ ✕ ✓︎ Write mine ✓ ✓ ✓ Write all ✕ ✕ ✓
  • 14. Mitigation: Cold storage •  Offline “cold” private key (air gapped) – Most funds stored in cold address – Refill “hot” address as necessary http://bitcoingarden.tk/trezor-the- hardware-bitcoin-wallet/
  • 15. Mitigation: Multisignature •  Lock funds under n different keys – Stored on different nodes/devices •  Require m of those keys to spend – Special type of ledger entry •  Variations: – 1 of 2 for key loss – 2 of 2 for host security – 2 of 3 for escrow
  • 16. Blockchain security: summary Confidentiality ▼ Integrity ▲ Availability ▲ * * Watch: zero-knowledge proofs