Dissecting Bitcoin, Part 1 — The Technology
4 stars based on
79 reviews
Looking for a radical way to bolster all three points of the classic security CIA triad? Lucky for you, there's Bitcoin. Specifically, there are two concepts lurking in the Bitcoin verifying block database integrity bitcoin chart that are considerably more important than the currency itself: The direction this scripting capability will take isn't clear yet. A startup called Ethereum is well underway with its own programming language, Ethereum Script, and a platform verifying block database integrity bitcoin chart developers to create decentralized applications based on smart contracts without the middleman.
Another startup called Counterparty offers peer-to-peer financial tools specifically tied to Bitcoin. When it comes to the Bitcoin block chain, it's already crystal clear that there are big potential wins for security. If you're aware of Bitcoin, you're familiar with the idea that so-called Bitcoin miners harness high-speed computational processing power in an effort to solve mathematically difficult problems to secure and verify transactions, and create Bitcoins.
Miners earn transaction fees and subsidies -- paid in Bitcoins, of course. A new block is written every ten minutes, extending the chronological block chain, which is shared among nodes on a peer-to-peer network using the Bitcoin protocol. But it's more complicated and far more elegant than that. The block chain is a series of data records -- time-stamped transactions -- stored in a database.
The hash of each block beginning with the "Genesis block" is used to link to the next so that there is a single forward pathway through the blocks: This is the "chain. When a Bitcoin transaction occurs, the previous transaction's hash and the public key of the next owner are digitally signed with the current owner's private encryption key. If you want to transfer your Bitcoin that is, buy somethingyou have to have your secret key.
No key, no possession. Once an entry is written into the block chain, it cannot be altered without regenerating the previous blocks. In other words, data can be added to the transactions database, but it cannot be removed.
This prevents double-spending and ensures the forward linking of the block chain. Therein lies the security angle. If a company were to store its general ledger in the Bitcoin block chain, a bad apple in the accounting department would be completely unable to go back without detection and alter previous entries to cook the books.
Think of the potential impact on fraud prevention. While it might seem odd to think of storing those kinds of transactions in Bitcoin's block chain, in fact, you can store pretty much any sort of data. And people have occasionally done so, though admittedly with a verifying block database integrity bitcoin chart of a "toying with the system" approach.
There's a picture of Nelson Mandela in the block chain, for instance. There's even a model hacker exploit tip of the hat to Ken Shirriff's blog:. Note that the exploit had to do with a client program called MyWallet, not with the Bitcoin technology -- one definite issue in the Bitcoin economy is that wallet programs that store private keys have to remain unhacked.
Now, writing to the Bitcoin block chain isn't free. It is actually a little verifying block database integrity bitcoin chart if you start thinking about storing megabytes, so verifying block database integrity bitcoin chart one's likely to use it for directly storing their logs.
Verifying block database integrity bitcoin chart the concept of a decentralized database whose records are "secured" by 10, computers can, of course, be extended to other block chains.
A startup called Factom is working this angle. As Peter Kirby, the president of the Austin-based company, put it: Factom is just gearing up, but eventually will let its customers write to a separate block chain that's more suitable for data entries.
Cleverly, however, it ties those entries back to the Bitcoin block chain by storing a hash of each new Factom in the next Bitcoin block added to the chain. The hash can be used to verify the time of the Factom transactions and that the Factom block hasn't been tampered with.
There are other startups doing this, too. Storj is beta testing a distributed cloud storage service that uses block chain technology. MetaDisk is a file sync app built atop the Storj block chain infrastructure. BlockCypher is building a cloud block chain platform with APIs that make it easier for developers to build applications based on this technology. There's more than just secure recordkeeping lurking here, however. Digital assets can be controlled just like Bitcoins which are, after all, digital assets themselvesso digital rights management may well wind up with a whole new look and new capabilities such as easily transferring ownership of your music collection -- just try reselling stuff you bought through iTunes.
I can't help but think that there will be direct applications of block chain technology to the security space beyond immutable records. I don't have the killer block chain security app figured out yet, but I'm sure, all the same, that non-fungible developments spinning out of Bitcoin will be fascinating to watch from a security perspective. Follow him on Twitter: By submitting you agree to receive email from TechTarget and its partners.
If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Protecting an organization against cloud DDoS attacks doesn't have to be expensive. Expert Frank Siemons discusses the options Learn the essentials of how to manage cloud networks, from network architecture to how to store and transmit data to security. Wireless networking is changing at breakneck speeds, but Wi-Fi training isn't keeping up.
Find out why firms must pay more This week's roundup of analyst musings includes discussions about the importance of hybrid cloud data protection and whether it's AI for social good is a thing. SAS touts research on tracking cheetah populations, Microsoft showcases work on precision farming The days of corporate IT as a back-end function with its practitioners relegated to the basement are long over.
Microsoft's latest update to Windows 10 helps IT pros and users alike. On the user verifying block database integrity bitcoin chart, Focus Assist can help employees silence To keep users at their most effective, IT pros must focus on security, pick the right productivity apps, consider companion apps Three new tools illustrate Google's strategic approach to its cloud platform customers and echo an old proverb: Set them free, so Microsoft extended more of its AI capabilities to connected devices to resolve some of the IoT shortcomings of the public cloud's No enterprise wants verifying block database integrity bitcoin chart be surprised by its cloud computing bill.
And, even as providers offer more visibility into verifying block database integrity bitcoin chart costs Brexit requires huge IT and technology changes across government, but as departments seem to be struggling to get to grips with This article can also be found in the Premium Editorial Download: Malware analysis beyond the sandbox.
There are two concepts lurking in the Bitcoin phenomenon that are considerably more important than the verifying block database integrity bitcoin chart itself.
This was last published in June Misconfigured cloud storage leaves 1. RNC voter database left open to the public Choosing a threat intelligence platform: Best practices and design approaches What advanced security analysis tools are and how they work Load More View Verifying block database integrity bitcoin chart Get started. Bolster your DLP strategy with help from the cloud and CASBs How big data verifying block database integrity bitcoin chart and technologies can be protected from risk What advanced security analysis tools are and how they work Finding the right security analytics tools for your enterprise Load More View All Evaluate.
Government cybersecurity problems can teach enterprises what to do What's the best way to protect sensitive information while traveling? Cybersecurity and Applied Mathematics Behavioral threat assessment means real-time threat detection Government cybersecurity problems can teach enterprises what to do Microsoft SQL Server end of life: When's the time to migrate?
Load More View All Problem solve. Add My Comment Register. Login Forgot your password? Submit your e-mail address below. We'll send you an email containing your password. Your password has been sent to: Please create a username to comment.
How to protect your enterprise Protecting an organization against cloud DDoS attacks doesn't have to be expensive. Search Networking Cloud network management begins with the basics Learn the essentials of how to manage cloud networks, from network architecture to how to store and transmit data to security.
The importance of staying up to date with Wi-Fi training Wireless networking is changing at breakneck speeds, but Wi-Fi training isn't keeping up. Why hybrid cloud data protection is so crucial This week's roundup of analyst musings includes discussions about the importance of hybrid cloud data protection and whether it's Search CIO Artificial intelligence for social good: Big tech spins a new narrative AI for verifying block database integrity bitcoin chart good is a thing.
Corporate IT rebrands its modern role: Reduce complexity The days of corporate IT as a back-end function with its practitioners relegated to the basement are long over. Effective end-user management helps fuel productivity To keep users at their most effective, IT pros must focus on security, pick the right productivity apps, consider companion apps Search Cloud Computing Google tips open source cloud tools so customers can be free Three new tools illustrate Google's strategic approach to its cloud platform customers and echo an old proverb: Cloud billing APIs enable greater cost transparency No enterprise wants to be surprised by its cloud computing bill.
Five tips for killing the campers on your network Why is reducing cyber attacker dwell time important and how should this be tackled? Brexit is coming, but is the government technologically ready?
If 5G is the answer, what is the question?