Blockchain technology has become synonymous with privacy and security, but those very characteristics have been put to the test over the past decade. With historical roots embedded in cryptography, many blockchain and cryptocurrency projects purport to offer unbridled security and privacy measures. The industry is split between public blockchain platforms like Bitcoin and private or permissioned blockchains focused on enterprise use.
Cointelegraph has previously explored the ins and outs of privacy concerns around blockchain technology, but the security of these systems is a major consideration on its own. In the years since Bitcoins (BTC) inception, a multitude of cryptocurrencies has been created, along with numerous blockchain projects in the private and public sphere.
The sheer number of working parts and industry participants means that vulnerabilities have been identified and exploited over the years. This is despite the best efforts of those involved to create the most secure blockchains, cryptocurrencies and exchanges.
This article will shine a spotlight on public blockchains and cryptocurrencies like Bitcoin, permissioned blockchains that offer enterprise solutions to mainstream corporate companies as well as privacy coins to delve into the different considerations of their perceived and actual levels of security.
Given that the use of cryptocurrencies primarily began with individual users and adoption by bigger entities such as financial institutions has been slow, a major concern is the security of blockchain or cryptocurrencies being used by individuals. In order to get an understanding of what makes these systems secure, Cointelegraph reached out to blockchain and cryptocurrency analysis firm CipherTrace.
John Jefferies, who is the companys chief financial analyst, identified and separated the different categories that are needed to fully understand the level of security of an open blockchain or cryptocurrency like Bitcoin:
There are three levels of security to consider: personal, platform and technology. Blockchains provide the technology layer, but the average user must trust the security of the particular wallet or exchange they are using. A well-validated, open-source blockchain built using known, trusted encryption, such as the Bitcoin blockchain, provides the level of security to assure the average user that their transaction data has not been tampered with.
When asked whether open blockchain systems have provided trusted security and privacy to users, Jefferies outlined two key elements of Bitcoins system that answered long-standing problems plaguing earlier digital currency projects. First of all, the Blockchain technology proved to be a major advancement, as it solved the double-spend issue in peer-to-peer transactions.
Another vital protocol that ensured security was the basis of Bitcoins consensus protocol, as Jefferies explained, the blockchain technology also deals with the Byzantine Generals Problem, where a messenger sharing information between generals can deliver false information. However, if all parties receive information that is verified by the majority, the corrupt messengers will be discovered. While these two elements provide robust security to the overall Bitcoin system, Jefferies makes a clear distinction between the security of the protocol and the privacy afforded to users:
It is a common misconception that Bitcoin was designed to be anonymous, but in actuality, the Bitcoin blockchain is pseudonymous, meaning transactions are publicly visible yet the individual users associated with transactions are not. Satoshis white paper only discusses privacy in two paragraphs. If privacy was the goal, it would have been designed differently.
Cointelegraph also reached out to Stanford University Ph.D. student Florian Tramr, who recently managed to discover vulnerabilities in privacy coins Monero (XMR) and Zcash (ZEC). A remote side-channel assault would enable an attacker to recover a users IP addresses, thereby destroying any semblance of anonymity and privacy of the users in a transaction.
Tramr weighed in on the level of security that open blockchain networks, like Bitcoin, offered the average user. He highlighted in a comment to Cointelegraph that Bitcoins consensus protocol has proved its efficacy on its own, but the development of numerous third-party applications, like exchanges, has added a number of vulnerabilities to the overall ecosystem:
The general idea of consensus via proof-of-work definitely seems to be standing the test of time in terms of security at least, not so much in terms of scalability. [...] On the security side, weve seen countless examples of vulnerabilities in smart contracts, wallets, exchanges, etc. From the privacy side, there have also been many studies showing that cryptocurrency transactions are relatively easy to trace and de-anonymize, even in systems, such as Monero and Zcash mostly because actually achieving good privacy requires a lot of extra care on the users side.
Private, or permissioned, blockchains have become a go-to solution for big companies and corporates that are looking for distributed ledger solutions for various business challenges. It goes without saying that bigger conglomerates will take no chances when it comes to security and so they turn to permissioned blockchains that are tailor-made and managed by specialist tech companies.
Prime examples are Microsoft Azure Blockchain Service and IBMs Blockchain platform, which is powered by the Linux foundations Hyperledger Fabric. Microsoft Azure Blockchain Service performs a similar function, allowing users to build and operate blockchain networks that scale. IBM Blockchain is aimed at large businesses and corporations and has a variety of existing blockchain platforms that companies can join. Clients can also build and launch their own platforms that can be programmed to carry out specific functions.
Related: Leveraging Hyperledger Fabric Enterprise Blockchain Unleashes Viable Solutions
When asked if permissioned blockchains are more secure than open networks, CipherTraces Jefferies offered an argument suggesting that these platforms arent inherently more secure:
No, they are simply attacked less because they do not move money and are not widely deployed. If anything, they could be more susceptible to hacks and security breaches because by nature of being permissioned, private blockchains are more centralized.
Tramrs take was similar to that of Jefferies about how permissioned blockchains would contrast the security of open blockchains:
The threat model is certainly different. Yet, some issues, such as smart-contract bugs, key management, etc., would also be a problem in a permissioned or private system.
While companies may turn to permissioned blockchains to operate closed-off ledger systems and other financial tasks, at the other end of the spectrum, there are privacy coins that aim to offer complete anonymity to users. Considering Tramrs research into perceived privacy and security offered by privacy coins, he insisted that assessing the actual degree of privacy and anonymity offered is not a clear-cut conversation:
On the one hand, Zcash and Monero use some fairly advanced and very recent developments in cryptography to offer, in principle, high degrees of privacy and anonymity for transactions. On the other hand, cryptography is only one part of a large distributed system implemented by these projects. And measuring privacy, or the lack thereof, at a systems level is very hard. There can be subtle implementation bugs and a variety of usage patterns or side-channel leaks that might reveal much more than the cryptography intends.
A key takeaway is that security concerns in the blockchain and cryptocurrency space transcend individual systems. One cannot label a single platform or cryptocurrency as insecure due to the fact that there are numerous systems that plug into one another. Tramr offered a comparison between traditional financial systems and the emergence of blockchain-based cryptocurrencies where no system is unhackable and that security concerns also come down to usability issues:
You shouldnt have to be an expert to use these cryptocurrencies in the most secure way possible. At the same time, striving for an unhackable system is not necessarily the right goal. If you look at the banking system for instance, things are clearly not unhackable. People get their credit cards and account logins stolen all the time; banks get hacked; theres a lot of fraud; and most of this gets handled by the legal framework and insurance. A similar framework for seamlessly and gracefully handling security breaches and losses in the cryptocurrency space doesnt exist yet.
In the decade following Bitcoins creation and the emergence of numerous altcoins, blockchain platforms, cryptocurrency exchanges and a multitude of other projects have sprung up. This inevitably included teething problems and hacks; fraud and security breaches were rife, particularly among cryptocurrency exchanges.
Meanwhile, technologists and developers have begun leveraging blockchain technology and cryptography to build secure and robust systems. The exploration of the capabilities continues today, and Jefferies believes that the technology will continue to drive the development of more secure systems across a wide range of industries:
Yes, there has been a lot of experimentation looking for use cases where blockchain provides benefits beyond traditional technology. [...] We are seeing companies and countries pursuing digital currencies because of the enhanced efficiency and control enabled by digitalization. In the next 10 years, every major economy will have their own Central Bank Digital Currency.
See more here:
Making Blockchain Safe and Secure, a Balancing Act That Never Ends - Cointelegraph
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]