TOTAL: {[ getCartTotalCost() | currencyFilter ]} Update cart for total shopping_basket Checkout

Privacy Tech | The promise of blockchain in the digital age Related reading: Blockchain 101: An introduction

rss_feed
PrivacyTraining_ad300x250.Promo1-01
GDPR-Ready_300x250-Ad
Editor's Note:

This is the first in a three-part series by Seth Litwack exploring the potential uses of blockchain. 

Due to the prevailing forces driving global e-commerce, privacy professionals are keenly aware that individuals are rapidly losing control of their personal information. Even sensational news stories about the latest massive data breach have become a routine and unexciting. Many privacy professionals fear a day of reckoning as we cede control to weakly-regulated entities, and increasingly pervasive technologies and algorithms that analyze, track, predict and permanently remember everything about us.

There are others who see privacy-enabling promise in these same technologies. For each new privacy threat, high-tech innovations arise to help individuals claw back a little more control of their digital identities. One such innovation is blockchain technology.

By now, many have heard about blockchain-enabled cryptocurrencies, such as bitcoin. To the layperson, blockchain and cryptocurrency represent concepts too new and exotic to appreciate. Industry experts, however, believe that the underlying technology that powers today’s nascent cryptocurrency market may lead to tomorrow’s advancements (such as Ethereum) in massive, decentralized trust networks for sectors well beyond finance and banking. If successful, blockchain technologies may emerge as the backbone of a new system designed, in part, to control and protect one’s digital identity.

Blockchain: What exactly is it?

In order to understand how blockchain technology can affect privacy, you need to first apprehend its technical foundations. An earlier Privacy Tech post explored some of the math involved in blockchain, but in layman’s terms, it’s a foolproof distributed database that securely sends information and transactions. Unlike traditional databases, a blockchain is stored on multiple private computers, connected to a network that can solve computational enigmas to ensure the network is secure – a “decentralized database.” On the other hand, traditional databases utilize client-server network architecture, which lets people store information in a “centralized server.” A designated authority will be permitted control over both the server and database. If compromised, hackers can change or download the information.

All transactions within a blockchain network are logged on all copies of the blockchain linked to the network. Transactions are similar to rows you add to an Excel spreadsheet; they’re added to the record by blocks.

Each block has certain characteristics, including a digital footprint (cryptographic hash). Each transaction creates a time-stamped “block,” and each block is linked to the previous block via the digital footprint—creating a chain of transactions. These transactions are then verified prior to being written to the system and before the next transaction is transcribed.

Blockchains are divided into three types:

  • Public – Public blockchains are the foundation of the majority of cryptocurrencies, like bitcoin. Public blockchains usually cost more to operate and do not have the speed seen with consortium or private blockchains. However, they offer better transparency than the others and let anyone connect to the network. 
  • Private – Private blockchains limit who can access and write additional information to the chain. Private companies tend to use this option because they can control the features and modify it for various reasons.
  • Consortium – Consortium blockchain platforms have many of the same advantages of a private blockchain, but operate under the leadership of a group of businesses instead of a single entity.

What makes blockchain so unique?

The great thing about blockchains is that they can securely send data and stored value from one person to another without the need for an intermediary. Since there’s no intermediary, platforms can be developed that provide businesses and end-users more control over communications with other entities. The secure nature of blockchain ensures systems are far more dependable and safe. In fact, they are ideal for situations when information and transactions must be substantiated.

What are smart contracts?

Smart contracts differ from formal contracts in that they are not necessarily legally binding. These contracts carry out peer-to-peer agreements that conclude on their own when everything in the contract is completed.

An easy way to understand smart contracts is by thinking of a vending machine. If you insert a $1.50 in a vending machine and hit the soda button, it takes several seconds for the machine to give you the soda can. Similarly, smart contracts are small programs that execute “if this happens then do that” statements on the blockchain and are verified by computers connected to the blockchain.

Smart contracts allow decentralized applications to connect to a blockchain and are an essential feature of the popular cryptocurrency, Ethereum. Decentralized apps are like any web applications used – think Facebook – but give the developer the ability to use smart contracts on the platform. In the second part of this series, you’ll learn that dApps are extremely powerful tools that enable users more control over their personal data. 

Simply put… 

Blockchain technology can change how personal data is amassed, kept, shared and controlled. They allow trustless connections between two entities to take place, usually without the need for personal information. For example, blockchain technology may soon let individuals – anywhere in the world – attain a loan they need without giving away any personal information.

In Part Two of this series, I will further explore the potential for blockchain technology to change the way personal data is collected, stored, and shared in the forthcoming “Web 3.0”.

photo credit: jane.boyko Вitcoin via photopin (license)

1 Comment

If you want to comment on this post, you need to login.

  • comment Xavier Le Hericy • Apr 5, 2018
    First, I want to thank you for tackling a subject that is very difficult to grok (and I don't mean just intellectually understand). I certainly know that I do not grok it!
    Deep understanding of such complex subjects often rely on analogies, which I believe is what the soda machine example was meant to be.  However, if blockchains are needed to solve this problem, there must first be a problem; but I would argue that very few people see a problem with buying soda from a machine - you put money in the machine and it gives you a soda and your change if needed.  This exchange is based on trust - you trust the operator of the machine that if you put money in, you will get a soda.
    If my understanding is correct, where blockchains become valuable, is where trust cannot be assumed, and the terms of the exchange are such that the risk of a breach of trust are great. A better example might therefore be the title exchange for a real-estate purchase. 
    Many people can relate to the fact that the amounts of money involved are very high, and both the seller and buyer want to protect themselves from a breach of trust, hence why these transactions go through a Title company managing the escrow account.  This is I believe where the blockchain concept becomes powerful as it allows two parties to enter into a contract where they agree to conclude a transaction only when a series of conditions are met, and they put their trust in the unbiased mathematical certainty of the blockchain to "be the independent trusted third party Title company".
    It would also be useful to define privacy use-cases where the use of blockchain would fit. Would it simply replace encryption when transferring sensitive data?  Could it be use to ensure that sensitive data shared with a third party is only used for a given purpose? Could it prevent such sensitive data from being forwarded to a fourth party?  These, I believe, are the questions we need to answer.