Questions tagged [blockchain]
The blockchain tag has no summary.
38 questions
-2 votes
1 answer
174 views
Specific Security Risks in Decentralized Identity and Self-Sovereign Identity (SSI)
I am exploring Self-Sovereign Identity (SSI) as a decentralized approach to identity management, similar to how Bitcoin addresses financial systems through blockchain (as verifiable data registry (VDR)...
1 vote
0 answers
68 views
How can blockchain P2P network help in bypassing country-level whitelist network blocking? [closed]
I've seen people on the web discussing the issue of network blocking, and they were discussing that if one day a country wanted to whitelist mode (i.e. outbound traffic is blocked by default, and ...
1 vote
1 answer
123 views
Does blockchain store digital signatures
Do digital signatures still get stored after validating a transaction for a blockchain ? I would assume it gets dumped after validation and only the message/data is stored. Additional info on this ...
9 votes
4 answers
1k views
Using Proof of Work to slow down login attempts
For a while I've been pondering a user authentication protocol that aims to ensure that a client does some computational work before the server will attempt to authenticate the password. The reason ...
1 vote
0 answers
125 views
ssl\tls public key vs ethereum blockchain public key [closed]
In a ssl/tls, the public key for a domain is included in the ssl/tls certificate that your computer downloaded and stored locally. In the ethereum blockchain ecosystem, the public key is derived from ...
1 vote
3 answers
321 views
Is it possible to generate a read-only key for a symmetrical encryption (AES)?
I am working with hardware that can only encrypt with AES. The problem with this is that the message must be publicly verifiable on the blockchain, without the encoding key being exposed. This is the ...
2 votes
1 answer
230 views
Non-interactive multi key encryption and decryption
I need some serious suggestions on my protocol, specifically for decryption. So the scenario is Organizations A and B encrypt their employees' records with their respective public keys and store them ...
0 votes
0 answers
1k views
Storing a private key in android/ios keychain encrypted or not
In my app, the user must use a private key to sign a transaction (on a blockchain). (It is quite common) I am facing questions regarding how to store my user's private key on the device. I am to use a ...
1 vote
2 answers
256 views
How is "Smart Contract" security different?
I am learning smart contract programming on Ethereum (using Solidity) and realizing that security is highly important here. Why? Because of 2 reasons: they deal with high-stake financial transactions, ...
3 votes
2 answers
2k views
How do companies manage & store cryptocurrency private keys?
For an individual, I see a some options for storing private keys, such as printing them on paper in a vault, using a hardware wallet, encrypting and storing on the machine, using AWS Secret Manager, ...
0 votes
1 answer
155 views
Ways to encrypt data that will be available to specific clients [closed]
I want to store information on the blockchain, but some part of it is private and must be available to selected clients (for example, users who belong to a common company) How can this be done? The ...
29 votes
3 answers
12k views
Disadvantages of replacing TCP/IP with blockchain
I read this blog (cached version) (and the related cached tweet) about replacing TCP/IP with blockchain. Tweet: The Internet has a serious fundamental flaw: the transmission control protocol/internet ...
0 votes
2 answers
204 views
Could blockchain be useful for a protocol to verify content from a trusted publisher in the way I'm thinking of? [closed]
The problem with static software whitelisting is that in the real world, employees with versatile jobs need to run unexpected programs. Company sets up a whitelist to limit what programs can run - ...
1 vote
3 answers
319 views
Use-case for decentralized identifiers (DIDs) with unique identities for each relationship
The W3C working group is working on the standardization of Decentralized Identifiers (DIDs). I watched a video presentation about DIDs and the presenter mentioned several times the possibility of ...
0 votes
2 answers
183 views
Use of distributed ledger/blockchain to stop data exfiltration? [closed]
If all our identities, our data (emails, pictures) are on distributed ledgers/blockchain, can the use of distributed ledgers/blockchain stop data exfiltration for good?