The Good & Bad News about Blockchain Security

Blockchain technology promises many things. But to succeed, it must offer users a better plan against hackers.

Michael Raziel, CTO, CyberGuild Ventures

May 23, 2018

5 Min Read

In a year of whiplash news cycles, bombshell stories, and incredible front-page scoops, one story — the blockchain and its potential world-shattering influence — has continuously dominated the news.

But blockchain technology — the endless link of cryptography-secured records that gave us Bitcoin but whose potential for other uses is limitless — is as controversial as it is conspicuous. Those who believe in the power of blockchain will take their worship to a near-religious level, while those who remain skeptical (or simply confused) by the complicated technology will tell you that it's all hype. It's a house of cards destined to fall, they'll say, or they'll tell you hackers will soon seize control of the entire system and leave us all penniless and destitute.

But here's the thing: both sides are right, and also wrong. That's because blockchain, in its current use, is incredibly restrictive. But if it can adapt and evolve as demand and interest grows, it could truly change the world.

What Is Blockchain?
First, a primer. Blockchain is, at its core, a method for humans to conduct secure, verified, and recorded transactions online without the use of a middle party. Bitcoin, in which money can be passed between online users without the presence of a bank or holdings company to verify and handle the transfer, is the most well-known type of blockchain.

It's always been believed that when it comes to important transactions, such as casting a vote in an election or paying for the cost of goods, we need a dominant central authority to manage the transaction in order to verify that it was indeed carried out, and also that the process is secure and protected. The bank confirms that the money is, indeed, in the account. The elections commissions confirm that the votes are, indeed, accurately cast and counted.

But using a form of math called cryptography, blockchain has created a workaround. Cryptography ensures that records can't be counterfeited or changed, and when you use blockchain to send money, or track digital assets, or even share intellectual property, the entire community of blockchain uses helps verify and secure the transaction, making it difficult for an outside party like a hacker to corrupt the system.

What Needs to Change?
In its current form, blockchain is very restrictive. Its proponents say that in 10 years we might use blockchain to pay our taxes. They declare that it will free up citizens to send money and aid to friends and family around the world, to build online businesses from the comfort of their home computers, and to free citizens from the financial grip of big banks and corporations who eat up their profits and don't share the wealth down the food chain.

That may all be true, but not in its current form. Right now, blockchain touts itself as being fully anonymous — no one online knows who you are or where you're located when you jump into the chain. It's democracy in its purest, most unadulterated form.

But anonymity, even in the darkest corners of the Web, is never 100% guaranteed. If you make transactions online, those transactions can be traced and followed, and eventually they will lead, just like a trail of crumbs, to your true and honest identity. It may take some digging, but one should understand that, when joining blockchain, our identity might not be fully obscured.

So, first and foremost, for blockchain to survive and thrive in the future, its users need to accept this reality.

No Silver Bullet
Much of blockchain's popularity comes from its reputation as an infallible currency. But there's an old adage that applies here: if it seems too good to be true, it probably is. Blockchain uses public key encryption schemas, which means they are quite hard to crack.

But just because the front door of blockchain is protected doesn't mean the back doors and garage are secure. Endpoint vulnerabilities — insecure key storage, or an insecure platform — could easily lead to exposure. A more distant potential threat is quantum computing. Theoretically, popular public-key algorithms can be efficiently broken down by quantum computers (see Shor's algorithm). If and when this becomes a reality, the underlying technology needs to change. There is also the looming possibility of "consensus" failure, when a significant number of participants team up against other members, especially considering the hostile geopolitical climate and locations of many mining farms. And let's not forget that blockchain technology is tangled and complex, meaning hidden vulnerabilities in code can lead to catastrophe.

Who Is the Watchdog?
Blockchain, meet stumbling block: in a perfect, utopian world, watchdogs who provide central authority and regulation wouldn't be necessary. And the liberation from the need for the middleman, and his controlling, profit-cutting, and potential corruption, is of course what makes blockchain appealing.

But all systems have a weakness, and all weaknesses are eventually exposed. Cryptocurrency funding is the Wild West — ICOs, or the initial coin offerings that bring funds to each new cryptocurrency venture — are totally unregulated. So, when the day comes that hackers take advantage of blockchain, the vacuum created by lack of a central authority will be deafening. In the case of loss or theft, central authorities are a lifeline. Who here hasn't had a fraudulent transaction on their credit card fixed by a simple phone call to the bank? If you have a credit card, you don't need to worry about theft. Should the worst happen, your money will be safely returned.

With blockchain, there is no such safety net. Blockchain, in order to survive, must find a way to remain democratic and open while still providing its users with some sort of security plan in place for the day that hackers take advantage of the system.

Blockchain offers great potential. To make it real, the next great innovation should pass three key hurdles: regulation, usability for the masses and unique use cases that can be fulfilled only through this technology. The world is waiting.

Related Content:

About the Author(s)

Michael Raziel

CTO, CyberGuild Ventures

Michael is CTO of CyberGuild Ventures, a VC and venture builder dedicated to developing standout Israeli cybersecurity startups.

Michael has 30 years of industry experience transforming vision into marketable technology products for global enterprises and startups. During his 10 year tenure at Intel, Michael held several executive positions including senior cybersecurity innovation architect and was granted numerous patents in different areas of cybersecurity, focusing mainly on bio-behavioral authentication, automotive security and data protection. Michael worked with global OEMs and software vendors including Lenovo, HP, McAfee and BMW. As chief architect, he spearheaded and designed enterprise security products including Intel Authenticate(tm), Intel Small Business Advantage (SBA)(tm), Intel Setup and Configuration Service (SCS)(tm).

Prior to Intel, Michael held senior roles at several startups, consulted at CA Technologies and lead the R&D team at the Israeli Ministry of Finance. Michael has a BSc in Computer Science from the Hebrew University in Jerusalem.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights