Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:30 PM
Michael Raziel
Michael Raziel
Connect Directly
E-Mail vvv

The Good & Bad News about Blockchain Security

Blockchain technology promises many things. But to succeed, it must offer users a better plan against hackers.

In a year of whiplash news cycles, bombshell stories, and incredible front-page scoops, one story — the blockchain and its potential world-shattering influence — has continuously dominated the news.

But blockchain technology — the endless link of cryptography-secured records that gave us Bitcoin but whose potential for other uses is limitless — is as controversial as it is conspicuous. Those who believe in the power of blockchain will take their worship to a near-religious level, while those who remain skeptical (or simply confused) by the complicated technology will tell you that it's all hype. It's a house of cards destined to fall, they'll say, or they'll tell you hackers will soon seize control of the entire system and leave us all penniless and destitute.

But here's the thing: both sides are right, and also wrong. That's because blockchain, in its current use, is incredibly restrictive. But if it can adapt and evolve as demand and interest grows, it could truly change the world.

What Is Blockchain?
First, a primer. Blockchain is, at its core, a method for humans to conduct secure, verified, and recorded transactions online without the use of a middle party. Bitcoin, in which money can be passed between online users without the presence of a bank or holdings company to verify and handle the transfer, is the most well-known type of blockchain.

It's always been believed that when it comes to important transactions, such as casting a vote in an election or paying for the cost of goods, we need a dominant central authority to manage the transaction in order to verify that it was indeed carried out, and also that the process is secure and protected. The bank confirms that the money is, indeed, in the account. The elections commissions confirm that the votes are, indeed, accurately cast and counted.

But using a form of math called cryptography, blockchain has created a workaround. Cryptography ensures that records can't be counterfeited or changed, and when you use blockchain to send money, or track digital assets, or even share intellectual property, the entire community of blockchain uses helps verify and secure the transaction, making it difficult for an outside party like a hacker to corrupt the system.

What Needs to Change?
In its current form, blockchain is very restrictive. Its proponents say that in 10 years we might use blockchain to pay our taxes. They declare that it will free up citizens to send money and aid to friends and family around the world, to build online businesses from the comfort of their home computers, and to free citizens from the financial grip of big banks and corporations who eat up their profits and don't share the wealth down the food chain.

That may all be true, but not in its current form. Right now, blockchain touts itself as being fully anonymous — no one online knows who you are or where you're located when you jump into the chain. It's democracy in its purest, most unadulterated form.

But anonymity, even in the darkest corners of the Web, is never 100% guaranteed. If you make transactions online, those transactions can be traced and followed, and eventually they will lead, just like a trail of crumbs, to your true and honest identity. It may take some digging, but one should understand that, when joining blockchain, our identity might not be fully obscured.

So, first and foremost, for blockchain to survive and thrive in the future, its users need to accept this reality.

No Silver Bullet
Much of blockchain's popularity comes from its reputation as an infallible currency. But there's an old adage that applies here: if it seems too good to be true, it probably is. Blockchain uses public key encryption schemas, which means they are quite hard to crack.

But just because the front door of blockchain is protected doesn't mean the back doors and garage are secure. Endpoint vulnerabilities — insecure key storage, or an insecure platform — could easily lead to exposure. A more distant potential threat is quantum computing. Theoretically, popular public-key algorithms can be efficiently broken down by quantum computers (see Shor's algorithm). If and when this becomes a reality, the underlying technology needs to change. There is also the looming possibility of "consensus" failure, when a significant number of participants team up against other members, especially considering the hostile geopolitical climate and locations of many mining farms. And let's not forget that blockchain technology is tangled and complex, meaning hidden vulnerabilities in code can lead to catastrophe.

Who Is the Watchdog?
Blockchain, meet stumbling block: in a perfect, utopian world, watchdogs who provide central authority and regulation wouldn't be necessary. And the liberation from the need for the middleman, and his controlling, profit-cutting, and potential corruption, is of course what makes blockchain appealing.

But all systems have a weakness, and all weaknesses are eventually exposed. Cryptocurrency funding is the Wild West — ICOs, or the initial coin offerings that bring funds to each new cryptocurrency venture — are totally unregulated. So, when the day comes that hackers take advantage of blockchain, the vacuum created by lack of a central authority will be deafening. In the case of loss or theft, central authorities are a lifeline. Who here hasn't had a fraudulent transaction on their credit card fixed by a simple phone call to the bank? If you have a credit card, you don't need to worry about theft. Should the worst happen, your money will be safely returned.

With blockchain, there is no such safety net. Blockchain, in order to survive, must find a way to remain democratic and open while still providing its users with some sort of security plan in place for the day that hackers take advantage of the system.

Blockchain offers great potential. To make it real, the next great innovation should pass three key hurdles: regulation, usability for the masses and unique use cases that can be fulfilled only through this technology. The world is waiting.

Related Content:

Michael is CTO of CyberGuild Ventures, a VC and venture builder dedicated to developing standout Israeli cybersecurity startups. Michael has 30 years of industry experience transforming vision into marketable technology products for global enterprises and startups. During ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Strategist
7/23/2018 | 3:58:20 PM
Blockchain Problems
And what of the significant power consumption needs of 'mining?' Mightn't cryptocurrency be brought down by power failures? And won't blockchain computer requirements, where all transactions are recorded on all ledgers, undo all the power efficiency goals we've implemented? 

Will governments start hunting down cryptocurrency traders for failure to pay taxes on capital gains? Will cryptocurrency traders attempt to write off value losses on taxes?

Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
5 Common Errors That Allow Attackers to Go Undetected
Matt Middleton-Leal, General Manager and Chief Security Strategist, Netwrix,  2/12/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-02-19
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
PUBLISHED: 2020-02-19
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
PUBLISHED: 2020-02-19
A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper in...
PUBLISHED: 2020-02-19
A vulnerability in Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on the affected software. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker ...
PUBLISHED: 2020-02-19
An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is rel...