Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:30 PM
Michael Raziel
Michael Raziel
Connect Directly
E-Mail vvv

The Good & Bad News about Blockchain Security

Blockchain technology promises many things. But to succeed, it must offer users a better plan against hackers.

In a year of whiplash news cycles, bombshell stories, and incredible front-page scoops, one story — the blockchain and its potential world-shattering influence — has continuously dominated the news.

But blockchain technology — the endless link of cryptography-secured records that gave us Bitcoin but whose potential for other uses is limitless — is as controversial as it is conspicuous. Those who believe in the power of blockchain will take their worship to a near-religious level, while those who remain skeptical (or simply confused) by the complicated technology will tell you that it's all hype. It's a house of cards destined to fall, they'll say, or they'll tell you hackers will soon seize control of the entire system and leave us all penniless and destitute.

But here's the thing: both sides are right, and also wrong. That's because blockchain, in its current use, is incredibly restrictive. But if it can adapt and evolve as demand and interest grows, it could truly change the world.

What Is Blockchain?
First, a primer. Blockchain is, at its core, a method for humans to conduct secure, verified, and recorded transactions online without the use of a middle party. Bitcoin, in which money can be passed between online users without the presence of a bank or holdings company to verify and handle the transfer, is the most well-known type of blockchain.

It's always been believed that when it comes to important transactions, such as casting a vote in an election or paying for the cost of goods, we need a dominant central authority to manage the transaction in order to verify that it was indeed carried out, and also that the process is secure and protected. The bank confirms that the money is, indeed, in the account. The elections commissions confirm that the votes are, indeed, accurately cast and counted.

But using a form of math called cryptography, blockchain has created a workaround. Cryptography ensures that records can't be counterfeited or changed, and when you use blockchain to send money, or track digital assets, or even share intellectual property, the entire community of blockchain uses helps verify and secure the transaction, making it difficult for an outside party like a hacker to corrupt the system.

What Needs to Change?
In its current form, blockchain is very restrictive. Its proponents say that in 10 years we might use blockchain to pay our taxes. They declare that it will free up citizens to send money and aid to friends and family around the world, to build online businesses from the comfort of their home computers, and to free citizens from the financial grip of big banks and corporations who eat up their profits and don't share the wealth down the food chain.

That may all be true, but not in its current form. Right now, blockchain touts itself as being fully anonymous — no one online knows who you are or where you're located when you jump into the chain. It's democracy in its purest, most unadulterated form.

But anonymity, even in the darkest corners of the Web, is never 100% guaranteed. If you make transactions online, those transactions can be traced and followed, and eventually they will lead, just like a trail of crumbs, to your true and honest identity. It may take some digging, but one should understand that, when joining blockchain, our identity might not be fully obscured.

So, first and foremost, for blockchain to survive and thrive in the future, its users need to accept this reality.

No Silver Bullet
Much of blockchain's popularity comes from its reputation as an infallible currency. But there's an old adage that applies here: if it seems too good to be true, it probably is. Blockchain uses public key encryption schemas, which means they are quite hard to crack.

But just because the front door of blockchain is protected doesn't mean the back doors and garage are secure. Endpoint vulnerabilities — insecure key storage, or an insecure platform — could easily lead to exposure. A more distant potential threat is quantum computing. Theoretically, popular public-key algorithms can be efficiently broken down by quantum computers (see Shor's algorithm). If and when this becomes a reality, the underlying technology needs to change. There is also the looming possibility of "consensus" failure, when a significant number of participants team up against other members, especially considering the hostile geopolitical climate and locations of many mining farms. And let's not forget that blockchain technology is tangled and complex, meaning hidden vulnerabilities in code can lead to catastrophe.

Who Is the Watchdog?
Blockchain, meet stumbling block: in a perfect, utopian world, watchdogs who provide central authority and regulation wouldn't be necessary. And the liberation from the need for the middleman, and his controlling, profit-cutting, and potential corruption, is of course what makes blockchain appealing.

But all systems have a weakness, and all weaknesses are eventually exposed. Cryptocurrency funding is the Wild West — ICOs, or the initial coin offerings that bring funds to each new cryptocurrency venture — are totally unregulated. So, when the day comes that hackers take advantage of blockchain, the vacuum created by lack of a central authority will be deafening. In the case of loss or theft, central authorities are a lifeline. Who here hasn't had a fraudulent transaction on their credit card fixed by a simple phone call to the bank? If you have a credit card, you don't need to worry about theft. Should the worst happen, your money will be safely returned.

With blockchain, there is no such safety net. Blockchain, in order to survive, must find a way to remain democratic and open while still providing its users with some sort of security plan in place for the day that hackers take advantage of the system.

Blockchain offers great potential. To make it real, the next great innovation should pass three key hurdles: regulation, usability for the masses and unique use cases that can be fulfilled only through this technology. The world is waiting.

Related Content:

Michael is CTO of CyberGuild Ventures, a VC and venture builder dedicated to developing standout Israeli cybersecurity startups. Michael has 30 years of industry experience transforming vision into marketable technology products for global enterprises and startups. During ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Strategist
7/23/2018 | 3:58:20 PM
Blockchain Problems
And what of the significant power consumption needs of 'mining?' Mightn't cryptocurrency be brought down by power failures? And won't blockchain computer requirements, where all transactions are recorded on all ledgers, undo all the power efficiency goals we've implemented? 

Will governments start hunting down cryptocurrency traders for failure to pay taxes on capital gains? Will cryptocurrency traders attempt to write off value losses on taxes?

Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-16
SAP NetWeaver ABAP Server and ABAP Platform, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 804, does not create information about internal and external RFC user in consistent and distinguished format, which could lead to improper authentication and may be exploited by malicious u...
PUBLISHED: 2021-06-16
Valine 1.4.14 allows remote attackers to cause a denial of service (application outage) by supplying a ua (aka User-Agent) value that only specifies the product and version.
PUBLISHED: 2021-06-16
TeamViewer before 14.7.48644 on Windows loads untrusted DLLs in certain situations.
PUBLISHED: 2021-06-16
Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-o...
PUBLISHED: 2021-06-16
Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must b...