ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will Your Online Privacy Be Better Using Blockchain?

Will Your Online Privacy Be Better Using Blockchain?

Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the focus directed to Bitcoin, it is easy to forget that the blockchain has other uses - uses that are geared toward increased cybersecurity, transparency, and privacy.

The Sovrin Network
However, many companies haven’t forgotten, and have come together to form a nonprofit organization dedicated to creating a network that will enable far more secure online exchanges of information and credentials. This association, called the Sovrin Foundation, is working to create something called the Sovrin Network using blockchain technology.

This network would allow each user to maintain a digital wallet containing identification credentials, banking and other financial credentials, and even employment credentials or a company ID.

Their Mission
The Sovrin Foundation was founded in response to what many companies see as a fundamental flaw in the infrastructure of the Internet. After a year during which 2.9 billion records were compromised in assorted data breaches and cyberattacks, these companies have banded together to create an improved system for confirming one’s identity online that also limits the opportunity for identity-based cybercrimes.

In short, the intention is to create a standardized means of establishing digital credentials, as well as a method of verifying them as they are used. The Sovrin Foundation is leveraging blockchain technology in order to do so.

How Will It Work for the End User?
Of course, there is always the concern that people will be resistant to change, despite the benefits that this change will bring them. Furthermore, it isn’t very likely that the average layperson is suddenly going to come to the conclusion that they need to download an app that provides them with a secure online identity wallet.

That’s why organizations, like financial institutions and businesses, will be able to access these capabilities through QR codes and other, similar means of identification.

Using the blockchain, different institutions could securely contact one another in seeking out information about you, and the minimal amount of information needed to satisfy the inquiry would be shared. For example, if a user was trying to take out a bank loan and both the financial institution and their employer were a part of the blockchain network, the employer could confirm that the user meets the minimum income requirement for the loan without actually sharing the salary of the user.

In this way, the Sovrin Network would put the power to control their information back in the hands of the user.

But What If I Lose My Phone?
Let’s face it, you wouldn’t want to lose your actual wallet, never mind one that contains your entire digital identity - so what should you do if your phone is misplaced or stolen with credentials from the Sovrin Network on it?

The same thing that you should do if the same happened to your actual wallet - cancel your credentials and have new ones issued.

Is This Approach Really Better?
In so many words, yes. As a society, we are increasingly reliant on data and information to ensure our own security, and proceed with daily business as usual. Any means we have to make that security more reliable is something that we should consider.

What do you think about all this? Share your thoughts in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Smartphones Small Business Upgrade Microsoft Office Network Mobile Devices Managed IT Services Communication Data Recovery Productivity Quick Tips Social Media VoIP Users Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Apps Managed Service Windows 10 IT Support Browser Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Data Management Remote Work Government Saving Money Operating System Workplace Strategy Networking Windows Artificial Intelligence Gadgets Managed IT services Remote Bandwidth Encryption Mobile Device Management WiFi App Business Technology Virtualization Blockchain Spam Server Information Employee/Employer Relationship Budget Gmail Office Apple Two-factor Authentication Information Technology Office 365 History Health Cybercrime Wi-Fi Analytics BDR Big Data Conferencing Access Control Data Security Patch Management Vendor Compliance Remote Monitoring Remote Computing Voice over Internet Protocol Help Desk Hacking Cost Management IT Management Training Document Management Hacker Save Money Employer-Employee Relationship Retail Firewall Applications Alert Augmented Reality Word Project Management Hiring/Firing BYOD Vulnerabilities IBM Outlook Password Website Computing Vendor Management Hard Drive Mobile Office Managed Services Data loss Legal Search... Data storage Money Best Practice Customer Service Unified Threat Management Social Engineering Cryptocurrency Paperless Office Antivirus Black Market iPhone Cleaning Maintenance Education Cortana User Robot Content Filtering Monitoring Healthcare Windows 11 Websites Router Remote Workers Mobility Chrome Meetings Windows 7 The Internet of Things YouTube Free Resource Twitter Google Maps Scam Law Enforcement How To Mobile Computing End of Support Laptop Printer VPN Marketing Running Cable Update Storage Social Sports Travel SaaS DDoS Virtual Reality Data Breach Office Tips Holidays Memory Private Cloud Processor Cooperation Disaster Video Conferencing Physical Security HIPAA Politics Virtual Machines Settings Computer Repair Lithium-ion battery Machine Learning Multi-factor Authentication Professional Services Start Menu Solid State Drive Downloads Computer Care Processors Vulnerability Saving Time Chromebook Software as a Service Drones Managed Services Provider Data Protection Computers Bitcoin Automobile Virtual Private Network Telephone PowerPoint Administration How To Current Events Wireless Technology Microchip Presentation eWaste Excel Solutions Flexibility Specifications IT Consultant Integration Downtime Tech Terms Images 101 Hack Safety Identity Theft Customer Relationship Management Display Notifications Managed IT Co-Managed IT Digital Unified Communications Virtual Assistant Entertainment Virtual Desktop Experience Employees Google Docs Bluetooth Taxes Avoiding Downtime Distributed Denial of Service SSID Staffing Health IT Equifax IP Address Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Audit Media Workplace Strategies Botnet Username File Sharing Virtual Machine Freedom of Information Rental Service Redundancy Reviews Troubleshooting Micrsooft Startup Optimization Flash Cache Addiction email scam Teamwork Navigation 2FA Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor News Medical IT Recovery User Tip Shopping Competition Legislation Smart Technology Network Management CCTV SQL Server Printing Evernote Paperless LiFi Banking Touchscreen PCI DSS Entrepreneur Google Wallet Licensing Computer Malfunction Fake News Documents Messenger Emergency Proxy Server Gig Economy Business Owner Application Deep Learning Emails Humor Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Business Intelligence Computing Infrastructure Azure Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Securty Books Tech Human Resources Supply Chain Domains Language Business Mangement Going Green Net Neutrality Society Business Cards Error Financial Data Tablets Monitors IT Visible Light Communication Reading Bookmark Risk Management Inbound Marketing Google Calendar Term Google Apps Workplace Download Windows 8 Supercomputer Piracy Virus Telework HTML Public Speaking Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Relocation Browsers Smartwatch Streaming Media Comparison Google Play Scams Electronic Payment Work/Life Balance Google Drive Upload Procurement Tech Support Software License Social Network FinTech Keyboard Hard Drives Corporate Profile Screen Reader IT Assessment Knowledge Data Analysis CES In Internet of Things Television Security Cameras Cables Telephony Trends Supply Chain Management Phone System intranet Employer Employee Relationship Mobile Technology Value Wireless Hacks Customer Resource management Organization Shortcut Network Congestion Cabling Devices Cyber security Heating/Cooling Writing Tablet Smart Devices Environment G Suite Tip of the week Reliable Computing Fileless Malware Windows XP Mouse Point of Sale VoIP Gamification Remote Working Social Networking Tracking Company Culture Telephone System AI Regulations Trend Micro Backup and Disaster Recovery Electronic Health Records Computer Accessories Web Server Transportation Scalability Directions Digital Security Cameras Shortcuts Administrator SharePoint Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Modem Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Access Database Surveillance Videos Be Proactive Time Management Music Public Cloud Managing Costs

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?