Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Blockchain & The Battle To Secure Digital Identities
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/30/2016 | 12:35:49 PM
Hybridization
The idea of the "private" and "industry shared/private" blockchains is, ironically, paradoxical to the underlying idea/theory of blockchain -- in that the technology, being inherently "trustless," is theoretically more trustworthy because it relies on algorithms and distributed computing instead of a centralized authority who can potentially manipulate (or, for that matter, be used to manipulate should the centralized authority become breached/compromised).  And, yet, compliance and other "best-practice" dictates require (or, at least, are interpreted to require) that centralized authority be in charge.

Obviously, something is better than nothing, so it would seem.  But it's a bit funny how these hybrid blockchains have evolved and come to be.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2016 | 11:04:37 AM
circle of trust
This may be one of the most important aspect of blockchain. Trust relationship between users and banks also users and users.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2016 | 11:04:08 AM
Re: Blcokchain...
"... Blockchain holds a lot of promise ..."

Agree. For the fact that encryption strategies have their own flaws.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2016 | 11:02:43 AM
Re: Security failed
"...  it depends on how you use the internet ..."

Agree. You may be a well-educated users and would not click any link that is suspicious. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2016 | 11:00:47 AM
Re: Security failed
"...   online security is fake ..."

I would agree with you. That does not mean we need to give up.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/27/2016 | 10:58:06 AM
Digital identity
 

Ultimate goal of Digital identity should be identifying a person by staying anonymous. A challenge we need to achieve.
UmeshKTiwari
50%
50%
UmeshKTiwari,
User Rank: Strategist
10/26/2016 | 3:34:13 PM
Blcokchain...
Blockchain holds a lot of promise... let us see where we are in a year or two..:)
Maia2920
50%
50%
Maia2920,
User Rank: Apprentice
10/26/2016 | 9:09:43 AM
Re: Security failed
Probably it depends on how you use the internet and what virtual identity you get. Not everything is so transparent as you'd expect.
Maia2920
50%
50%
Maia2920,
User Rank: Apprentice
10/26/2016 | 8:04:22 AM
Security failed
I think the idea of internet or online security is fake. Better say a huge lie. There is always someone who follows every step and any click you do.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.