Welcome!

Weblogic Authors: Yeshim Deniz, Elizabeth White, Michael Meiner, Michael Bushong, Avi Rosenthal

Related Topics: @DXWorldExpo, @CloudExpo, Cloud Security, FinTech Journal, @ThingsExpo

@DXWorldExpo: Article

Privacy and Security on Blockchains | @CloudExpo #FinTech #AI #Blockchain

Decentralization of everything might still seem a bit utopian if you inspect it closely

Privacy and Security on Blockchains: What Protection Measures the Networks Are Adopting to Secure Their Users

Decentralization of everything, the great new idea of which the web can’t stop babbling, might still seem a bit utopian if you inspect it closely.

Yes, blockchains are likely to reshape our economy, or a huge part of it, and benefit considerably those who are currently unbanked.

They might also facilitate the creation of rating/reputation systems that are not controlled by any single entity and thus allow people (say Uber drivers who’d like to work for Lyft) to switch employers without having to establish their credibility anew.

They might give users complete control over their assets; protect them, to a degree, from being robbed and provide tools to sustain privacy even when a state-level actor – a bank or a government – is after their identity.

But before these things start to happen the issues of privacy and security, which are currently pressing on blockchains, must be dealt with.

In this article, we’ll discuss how some major networks are trying to tackle the problems of safety and dispense advice to those using decentralized ledgers as to how to keep their assets protected at all times.

Let’s get started!

The concept we should introduce first before we proceed to talk about security is that of digital wallets.

In layman’s terms, a wallet is a software program in which public and private keys are stored. After accessing it, one could manage the crypto assets it contains, and carry out, seamlessly, all sorts of transactions.

Currently, there are four types of digital wallets in the blockchain ecosystem – desktop, web, mobile, and hardware ones. And to protect them, users encrypt the wallets with long, complicated passwords.

So, what might go wrong?

Security on Blockchains: What might go wrong?

In 2011, a member of bitcointalk forum (someone “allinvain”) wrote a panicky post – a cry for help – to his fellow forum members after finding out that he’d been hacked and robbed of 25,000 BTC (which now, in October 2017, would be worth about $150m).

Evidently, the attacker had managed to gain access to allinvein’s PC and had, somehow, emptied out his digital wallet. He (or she) had either sent the transaction directly from the victim’s machine or copied the wallet.dat file and ran it from his (or her) own.

Another noteworthy theft was reported on the Bitcoin subreddit. The user, asoltys, was fairly careful with his blockchain.info wallet, so it came as an utter shock to him to discover, one day, that 160 bitcoins had been stolen from it.

The vulnerability that made the theft possible lay with blockchain.info mobile app; it had to do with the user’s rooting his Android phone.

Generally, when one attempts to enter their blockchain.info wallet (from a desktop computer) they are asked to type in two passwords – a long one (16-20 digits) to access the entire wallet, and a shorter one (typically 8 digits) to get ahold of private keys.

However, since typing lengthy passwords is tiresome on a smartphone, the wallet app will often have it memorized, and only require you to enter the second one.

Therefore, if someone hacks into your phone, the one that’s been rooted, they might find out where the main password is stored and decrypt it. Afterward, they can crack the second PIN code (hackers often use GPU or cloud-based computing clusters to brute force an 8 digit password promptly) and gain complete control over your wallet.

A few smart contracts on Ethereum, the second largest blockchain in the world, were attacked as well..

Ethereum isn’t just a cryptocurrency. It is also a platform on which one could build decentralized apps.

The software that’s hosted on the network, therefore, must be designed impeccably: its code must contain zero vulnerabilities. Or else, it’s bound to fall prey to clever attackers.

Here are some famous (or should we say infamous) instances of hacking on the Ethereum network:

The DAO hack. One of the first major ICOs had a bug in its smart contract, of which attackers took advantage. Nearly $50m worth of ether was stolen and, though the assets were eventually returned to the DAO token holders (the blockchain developers performed a hard-fork), the hack led to a network split.

The Parity hack. The second biggest hack in the history of Ethereum happened a few months ago and resulted in a 153,037 ETH loss (~$32m at the time of theft). The vulnerability, which hackers managed to exploit, lay in the source code which Parity, a wallet “vendor” on Ethereum, had been giving out to users who wanted to create a personal multi-sig wallet.

We won’t be delving deeply into the technical aspects of the robbery; we’ll just say that, in a nutshell, bad actors sent two transactions to the affected contracts – one to obtain ownership of the wallets and another to drain them; they were able to do so due to a tiny flaw in the multi-sigs’ code.

What happened next, however, was even more amazing. A group of white cap hackers promptly emptied out the rest of the wallets to prevent further damage. They saved over $75m worth of ether and then returned the funds to the rightful owners once the vulnerability was removed.

The weak spot, according to the Parity blog, had been fixed; the new, improved version of their implementation of a multi-sig wallet was deployed after June 20.

But on November 8, just a few months later, it, too, got hacked due to a bug in the multi-sig’s code.This time, the loss of funds amounted to ~$155m worth of Ether.

Both Parity and Ethereum itself have yet to make a decision as to how to return the funds to rightful owners. Most likely, we’ll see another fork.

But, as of now, things are still a bit unclear.

How Can Developers Improve Security on Blockchains?
ZKP protocols

Security on Blockchains: ZKP protocols

Since security on public networks depends largely on whether private data is accessed by a malicious actor or not, some major blockchains are planning to adopt something known as zero-knowledge proof (ZKP) protocols.

To understand what ZKP is, imagine this: you’re at a bar, your phone has just died; you’re standing alone, sipping at a cocktail, when, suddenly, a guy shows up from nowhere and starts talking, anxiously, about how your close friend has gotten in some serious trouble.

He invites you to walk a few blocks with him, to the place where she’s currently at, so you can rescue her together. And says persuasively that there’s no time left for stalling.

You realize you’ve never met the guy, but, again, your phone is shut off, there’s no way of finding out whether he’s telling the truth and, frankly, you are worried.

So, what do you do?

Well, you could interrogate him. Ask specific and complicated questions – the ones only a person who has really seen her would be able to answer – and keep requesting more info, again and again, until it’s clear to you that he’s not lying.

In this equation you are the verifier whose making a prover, the other participant in the interaction, jump through hoops to convince you of the validity of his claims. He can’t transmit a memory of meeting your friend from his head to yours – he’s no telepath – so answering correctly to your questions, which you’re making up on the spot, is the only way to make you believe him. This is, essentially, how ZKP works.

In the world of blockchains, a prover isn’t incapable of disclosing sensitive information; he’s just not willing to. He wants to indicate, for example, that a certain transaction has taken place and keep in secret the transaction details. He wants to establish privacy and thus ensure security.

Such level of confidentiality is precisely what Zcash, along with some other blockchain applications, is meant to provide. And after ZKP is adopted widely, experts say, the number of malicious activities on distributed networks will drastically drop.

Formal verification

Security on Blockchains: Formal verification

The smallest bug in an otherwise perfectly written smart contract can still lead to substantial losses – the Parity incident has proved that vividly.

Therefore, having a system on blockchains that checks if a piece of software does what it claims to do, and scans whether its code is buggy, would potentially prevent a great deal of smart contract hacking.

The idea behind this concept comes from math, and it is called formal verification.

Blockchain networks, huge and small ones, are now thinking to launch a piece of code that can formally verify, with mathematical proof, that other pieces of code satisfy predefined fairness properties.

Tezos, for example, a project that has recently raised over $200m via an ICO, is a smart contract technology that’s meant to facilitate formal verification.

And if it succeeds in doing so – if it creates a system that will prevent software with poorly written code from ever being deployed – that might become a game changer for the entire blockchain world.

Summing up
Decentralization has its flaws; the complete security and privacy are yet to be achieved.

It doesn’t mean, however, that blockchains are unsafe: substantial progress has been made already in the security area and clever developers keep on improving the technology on a regular basis.

The losses, which are, of course, no insignificant ones, still don’t approach even closely the amounts of money that have been stolen from centralized value storages such as banks and centralized exchanges. And, if anything, the trust in blockchains has now even grown.
Ethereum, which used to be perceived as Bitcoin’s less celebrated cousin, could soon be worth more than Silicon Valley. So there’s every reason for blockchain enthusiasts to be optimistic.

If you’d like to learn more about privacy and security on blockchains, please contact our expert – a wise and cheerful man – to get a free consultation.

The post Privacy and Security on Blockchains: What Protection Measures The Networks are Adopting to Secure their Users appeared first on Perfectial.


DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the conference tracks for CloudEXPO | DXWorldEXPO 2018 New York.

DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City.

Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.

A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes.

Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)

Sponsorship Opportunities Here

Speaking Opportunities Here

Sponsorship and Speaking Inquiries: [email protected].

2018 Conference Agenda, Keynotes and 10 Conference Tracks

DXWordEXPO New York 2018 and Cloud Expo New York 2018 agenda present 222 rockstar faculty members, 200 sessions and 22 keynotes and general sessions in 10 distinct conference tracks.

  • Cloud-Native | Serverless
  • DevOpsSummit
  • FinTechEXPO - New York Blockchain Event
  • CloudEXPO - Enterprise Cloud
  • DXWorldEXPO - Digital Transformation (DX)
  • Smart Cities | IoT | IIoT
  • AI | Machine Learning | Cognitive Computing
  • BigData | Analytics
  • The API Enterprise | Mobility | Security
  • Hot Topics | FinTech | WebRTC

Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)

DXWorldEXPO | CloudEXPO 2018 New York cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 200 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor brings together the world's leading companies throughout the world of Cloud Computing, DevOps, FinTech, Digital Transformation, and all they entail.

As your enterprise creates a vision and strategy that enables you to create your own unique, long-term success, learning about all the technologies involved is essential. Companies today not only form multi-cloud and hybrid cloud architectures, but create them with built-in cognitive capabilities.

Cloud-Native thinking is now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector.

CloudEXPO is the world's most influential technology event where Cloud Computing was coined over a decade ago and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals.

FinTech Is Now Part of the DXWorldEXPO | CloudEXPO Program!

Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expensive intermediate processes from their businesses.

Accordingly, attendees at the upcoming 22nd CloudEXPO | DXWorldEXPO November 11-13, 2018 in New York City will find fresh new content in two new tracks called:

  • FinTechEXPO
  • New York Blockchain Event

which will incorporate FinTech and Blockchain, as well as machine learning, artificial intelligence and deep learning in these two distinct tracks.

Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)

Sponsorship Opportunities Here

Speaking Opportunities Here

Sponsorship and Speaking Inquiries: [email protected].

FinTech brings efficiency as well as the ability to deliver new services and a much improved customer experience throughout the global financial services industry. FinTech is a natural fit with cloud computing, as new services are quickly developed, deployed, and scaled on public, private, and hybrid clouds.

More than US$20 billion in venture capital is being invested in FinTech this year. DXWorldEXPOCloudEXPO are pleased to bring you the latest FinTech developments as an integral part of our program.

DXWorldEXPO | CloudEXPO are accepting speaking submissions for this new track, so please visit Cloud Computing Expo for the latest information or contact us at [email protected]

Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)

Sponsorship Opportunities Here

Speaking Opportunities Here

Sponsorship and Speaking Inquiries: [email protected].

Download Slide Deck ▸ Here

Only DXWorldEXPO | CloudEXPO bring together all this in a single location:

Attend DXWorldEXPO | CloudEXPO. Build your own custom experience. Learn about the world's latest technologies and chart your course to Digital Transformation.

22nd International DXWorldEXPO | CloudEXPO, taking place November 11-13, 2018, in New York City, will feature technical sessions from a rock star conference faculty and the leading industry players in the world.

Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)

Sponsorship Opportunities Here

Speaking Opportunities Here

Sponsorship and Speaking Inquiries: [email protected].

Download Slide Deck: ▸ Here

Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS - software, platform, and infrastructure as a service.

With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.

Every Global 2000 enterprise in the world is now integrating cloud computing in some form into its IT development and operations. Midsize and small businesses are also migrating to the cloud in increasing numbers.

Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)

Sponsorship Opportunities Here

Speaking Opportunities Here

Sponsorship and Speaking Inquiries: [email protected].

Download Slide Deck: ▸ Here

Companies are each developing their unique mix of cloud technologies and services, forming multi-cloud and hybrid cloud architectures and deployments across all major industries. Cloud-driven thinking has become the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, and the public sector.

Sponsorship Opportunities

DXWorldEXPO | CloudEXPO are the single show where technology buyers and vendors can meet to experience and discus cloud computing and all that it entails. Sponsors of DXWorldEXPO | CloudEXPO will benefit from unmatched branding, profile building and lead generation opportunities through:

  • Featured on-site presentation and ongoing on-demand webcast exposure to a captive audience of industry decision-makers.
  • Showcase exhibition during our new extended dedicated expo hours
  • Breakout Session Priority scheduling for Sponsors that have been guaranteed a 35-minute technical session
  • Online advertising on 4,5 million article pages in SYS-CON's i-Technology Publications
  • Capitalize on our Comprehensive Marketing efforts leading up to the show with print mailings, e-newsletters and extensive online media coverage.
  • Unprecedented PR Coverage: Unmatched editorial coverage on Cloud Computing Journal.
  • Tweetup to over 100,000 plus Twitter followers
  • Press releases sent on major wire services to over 500 industry analysts.

Secrets of Our Most Popular Sponsors and Exhibitors ▸ Here

For more information on sponsorship, exhibit, and keynote opportunities, contact [email protected].

Sponsorship Opportunities Here

Download Slide Deck:Here

Speaking Opportunities

The upcoming 22nd International DXWorldEXPO | CloudEXPO November 11-13, 2018 in New York City, NY announces that its Call For Papers for speaking opportunities is now open.

Secrets of Our Most Popular Faculty Members ▸ Here

Submit your speaking proposal Here or by email [email protected].

Download Slide Deck: ▸ Here

About DXWorldEXPO LLC

DXWorldEXPO LLC is a Lighthouse Point, Florida-based trade show company and the creator of DXWorldEXPODigital Transformation Conference & Expo. The company produces and presents CloudEXPO, DevOpsSummitFinTechEXPO Blockchain Event, the world's most influential conferences and trade shows.

More Stories By Rostyslav Demush

Ross Demush is a digital marketing specialist at custom software development company Perfectial, a leading provider of web & mobile development services, specializing in FinTech, Real Estate, Media & Entertainment & eLearning.

IoT & Smart Cities Stories
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...