Blockchain and POW are the leading technology behind Bitcoin. – Deadline News

Blockchain has the power to revolutionize all supply chain relationships, as it cuts out many intermediaries and improves transparency. As you might have heard, this new type of technology does not rely on servers to store and manage data for it to work.Instead, each companys blockchain uses cryptography to create decentralized networks that allow for instant value transfer without relying on external intermediaries. In addition, Bitcoin introduced blockchain and proof of work, a consensus algorithm allowing the execution of transactions with utter security in a trustless manner. Both blockchain and proof of work are two core technology of the entire bitcoin ecosystem; lets discuss everything you should know about these fundamental technologies. But before that, if you are planning to start your bitcoin trading journey, you may use a trusted platform like bitalpha-ai.io

Blockchain:Blockchain is an exciting new technology that can potentially change many peoples lives globally. Through blockchain technology, companies can now have an accurate, efficient, and transparent way to manage the entire lifecycle of their products, from sourcing raw materials through manufacturing, distribution, and sales to ensuring that the proper payments are being made along the way.

As a result, supply chain management companies will have significant cost savings due to this new technologys ability to circumvent fraudulent activities. The medical industry is another one ripe for disruption in various ways by blockchain technology. It will likely help to save lives by making food, drug, and preventative care distribution more efficient, secure, and transparent.

The benefits of using a blockchain are numerous, and the cost savings are significant. Blockchain technology offers several potential benefits regarding supply chain management, including greater operational efficiency, reduced costs, and increased quality assurance in data management. In addition, it also offers improved visibility across supply chains as well as improved data integrity due to its transparency features. A blockchain is essentially an immutable log shared across a network of many different parties that dont rely on centralized control or storage.

Proof of work:

Proof of work is a validation method in which the validity of transactions is confirmed by solving complex computationally tricky problems. In other words, this algorithm approves that a transaction has taken place. Its important to understand that this algorithm doesnt rely on data stored in any centralized database to verify its validity but instead relies on the computing power required to solve these computationally tricky problems.The blockchain networks are secured by miners who are rewarded with new bitcoin or other cryptocurrencies for their services while keeping track of the ledger. Proof of work may seem like a relatively new concept, but it has been around for quite some time. This algorithm is often called the grandfather of cryptography and was first used over a decade ago. Unlike other types of encryptions where the data is scrambled and then decoded at the receiving end, miners are required to solve cryptographic puzzles to verify transactions in proof of work.

Proof-of-work systems utilize advanced technologies that require significant levels of computer processing power input for secure blockchains to function. Unfortunately, it means that mining is only accessible to people who are able and willing to invest in their computing rigs or those who can afford more powerful machines.

Why blockchain and proof of work are essential for the bitcoin ecosystem?Both blockchain and proof of work are fundamental technologies to the bitcoin ecosystem. Theyre both so important that without them, its hard to imagine a world where cryptocurrencies would exist. As such, it makes sense that novices must acknowledge blockchain and proof of work before going deeper into the topic of bitcoin and other cryptocurrencies.

Proof of work is essential for bitcoin because this system requires an enormous amount of processing power and electricity to function correctly. Essentially, everyone who owns even a small number of bitcoins has access to this technology. Still, only those who can afford or are willing to spend a significant amount on their infrastructure can harness its full potential. In short, proof of work maintains the security and efficiency of the bitcoin ecosystem by validating each transaction. Also, it creates a high entry barrier for miners to enter the mining process.

When a transaction occurs, its verified and stored on a distributed computer network that is constantly updating the blockchain. In addition, it provides miners with new bitcoins or other forms of cryptocurrency as a reward for their services every time they process transactions.

The underlying science proof of work and blockchain are pretty similar. Still, with proof of work, transactions are verified by solving complex math problems utilizing a single computer system (the miner). In contrast, blockchain is shared between multiple computers at once to verify transactions simultaneously. In short, to prevent double-spending, the concept of blockchain is essential for the bitcoin network.

Here is the original post:
Blockchain and POW are the leading technology behind Bitcoin. - Deadline News

NTT Research Names Takashi Goto Head of the Technology Promotion Team – Business Wire

SUNNYVALE, Calif.--(BUSINESS WIRE)--NTT Research, Inc., a division of NTT (TYO:9432), today announced that it has named Takashi Goto as head of its Technology Promotion Team, a group set up to help productize well-developed research concepts. Mr. Goto was previously a director in the NTT R&D Planning Department and before that a senior manager and senior research engineer at the NTT Information Network Laboratory Group. He joined NTT Research on July 1, 2022, succeeding Dr. Kei Karasawa, who has taken an executive position at NTT R&D in Tokyo. Mr. Goto will join the executive team at NTT Research, where he will be responsible for exploring the market potential for technologies under development at NTT Research, as well as NTT R&D. One of the first targets for commercialization is attribute-based encryption (ABE), a form of cryptography that allows for sharing data while preserving the data owners privacy.

The mission of NTT Research is to conduct basic research tied to long-term goals, rather than specific product or service roadmaps. Yet, along the way, the companys researchers may generate technologies that have market potential. The purpose of the Technology Promotion Team is to test that hypothesis by interacting with a range of stakeholders involved in the commercialization of invented technologies or byproducts. Mr. Gotos task will be to interface with NTT operating companies, potential end users, possible third-party partners and standardization bodies. Technology promotion also involves feasibility studies, use-cases, competitive analysis, proof of concept (POC) demonstrations and related efforts.

We are very pleased to welcome Takashi Goto to our team in Sunnyvale, NTT Research President and CEO Kazuhiro Gomi said. He is a talented engineer and manager with significant experience at NTT R&D and a keen interest in technology promotion, making him a perfect fit for this important role.

A leading candidate for commercialization, ABE was Introduced in 2005 in a paper co-authored by NTT Research Cryptography & Information Security (CIS) Lab Director, Brent Waters. Two years ago, that paper was recognized with an International Association for Cryptologic Research (IACR) Test of Time Award. To date, NTT Research has been talking with NTT operating companies, on the assumption that ABE solutions could address security and privacy needs in the health care, medical, financial, education and government sectors. In November 2021, NTT announced an agreement with the University of Technology Sydney (UTS), which includes conducting a POC platform of ABE aimed at making the UTS internal systems more secure. NTT Research is planning a hackathon event around ABE, aimed at showcasing innovative ABE-related applications. Mr. Goto is currently engaged in planning that event.

I have long been interested in creating value and introducing NTTs superior technology to Japan and the world, so I am very excited about my new role at NTT Research, Mr. Goto said. My near-term plans include providing technical support for a commercialization project in Australia, evaluating recent technologies through the hackathon and improving the process of intellectual property management.

In addition to ABE, other NTT Research-related technologies with potential commercial byproducts include applications of multiparty computation (MPC), another area of research for CIS Lab cryptographers, and implementations of the coherent Ising machine (CIM), a quantum computing-related technology that is an area of focus for the NTT Research Physics & Informatics (PHI) Lab. Supporting Mr. Goto at NTT Research are Mr. Fang Wu, a consultant and technology veteran, formerly with NTT Global Networks, NTT America, Lucent and Bell Labs; and Dr. Yannis Rouselakis, a software architect specializing in cryptographic technologies. To advance NTT Researchs core scientific mission, the company, unique among industrial laboratories, has advanced an open lab vision and over the past three years has established more than 20 relationships with premier research organizations in the U.S., Japan and around the world.

About NTT ResearchNTT Research opened its offices in July 2019 as a new Silicon Valley startup to conduct basic research and advance technologies that promote positive change for humankind. Currently, three labs are housed at NTT Research facilities in Sunnyvale: the Physics and Informatics (PHI) Lab, the Cryptography and Information Security (CIS) Lab, and the Medical and Health Informatics (MEI) Lab. The organization aims to upgrade reality in three areas: 1) quantum information, neuroscience and photonics; 2) cryptographic and information security; and 3) medical and health informatics. NTT Research is part of NTT, a global technology and business solutions provider with an annual R&D budget of $3.6 billion.

NTT and the NTT logo are registered trademarks or trademarks of NIPPON TELEGRAPH AND TELEPHONE CORPORATION and/or its affiliates. All other referenced product names are trademarks of their respective owners. 2022 NIPPON TELEGRAPH AND TELEPHONE CORPORATION

Continue reading here:
NTT Research Names Takashi Goto Head of the Technology Promotion Team - Business Wire

Investigating the Use of Blockchain to Authenticate Data from the Statistics Canada Website – Statistique Canada

Executive summary

Do you know what a non-fungible token (NFT) is? This question started a chain reaction that resulted in an investigation by a diverse team into how Statistics Canada (StatCan) could use blockchain, or distributed ledger technology, to authenticate a document. The question was posed as part of a more significant idea of how the Dissemination Division might use NFTs, or similar technology, to authenticate the products leaving the StatCan website. Initially, our team was composed of internal StatCan employees: Mathieu Laporte, Director of the Dissemination Division; Jacqueline Luffman, Chief of Publishing Services; and Lillian Klein, Research Librarian. These individuals discussed the idea among other StatCan staff to evaluate whether it was feasible. However, as we recognized a gap in our blockchain experience, we reached out to academics who research various aspects of blockchain technology. Through those meetings, we were connected to four blockchain experts: Dr.Florian Martin-Bariteau from the University of Ottawa, Dr.Jeremy Clark from Concordia University, Dr.Victoria Lemieux from the University of British Columbia and Dr.Tracey Lauriault from Carleton University. We met with these experts for a brainstorming session, where Jeremy Clark presented the idea of using digital signatures to authenticate StatCan documents. With this idea in mind, a team of researchers was formed to explore up-to-date cryptographic technology and applications to develop a comprehensive understanding of the technology and determine whether using this technology in StatCans work would be meaningful. Our research team includes Kathryn Fedchun, a PhD student at Carleton University; Didem Demirag, a PhD candidate at Concordia University; and Lillian Klein, a research librarian with StatCan. This paper summarizes months of collaborative work completed by this team.

The main focus of this project is to understand more about blockchain and see whether, as StatCan expands its website, it could use blockchain technology to enable users to authenticate the data downloaded from the website. With an increased understanding of these emerging technologies, the aim of this project is to develop a process of authentication that would allow users to verify that the material downloaded from the StatCan website has not been tampered with and was produced by StatCan. This would increase overall trust in the agency as a statistical organization. By using blockchain to determine the authenticity of its data, StatCan has the ability to increase social trust with its users. It was identified that the ideal method of authenticating the data should be easy to use and available in an online and offline format to ensure users with varying degrees of Internet connection can authenticate their data.

Our research successfully defined and explained what blockchain is and identified how blockchain is currently being used in a Canadian context. We found that there has recently been a call to action for government agencies to embrace blockchain technology and take strides to implement it in their work. To create a well-rounded assessment of the technology, we included a review of concerns regarding blockchain. We focused primarily on the environmental impact, the public perception of the technology and any potential backlash our team could anticipate, the lack of regulations, and the potential to be blinded by the hype of blockchain technology. Finally, we completed a brief comparison of five blockchains that could be used in our solution. This comparison focuses on general information about each chain, along with the transactions per second, the consensus mechanism, whether it is private or public, and each blockchains environmental impact. This analysis enabled us to decide that Avalanche is the best option for us as we move forward with our technical solution.

With the knowledge gained from this research, our team recommends that this project could be the agencys opportunity to answer the call to action. We propose that StatCan conduct a pilot project based on Jeremy Clarks idea about using digital signatures and build an application that users can download to authenticate their data. We propose using a hybrid model with a blockchain that will allow both online and offline users to authenticate their data. The technical details of this project are explained in depth below; to summarize:

In the hybrid solution, authentication will occur through an application that users must download. The list of hashes of files is updated periodically to contain the hashes of new StatCan products. The authentication of a file will occur as follows: the user will need to upload the file needing authentication to the app. This action will prompt the app to compute the hash of the file and compare it with the list of already existing hashes from StatCan products. The app will then inform the user whether the file is valid.

This solution adds tremendous value to the agencys transparency and trust with users. Hosting the hash values on the blockchain creates an immutable record over time of the products the agency has released and increases users ability to trust the information downloaded from the StatCan website. This project is an opportunity to experiment with blockchain technology without overhauling the agencys existing system.

In the age of information, it is necessary to acknowledge the growing amount of digital information available to Canadians and their increasing distrust of digital sources (Ipsos Public Affairs for Canadas Centre for International Governance Innovation [CIGI-IPSOS], 2019). According to Ipsos Public Affairs for Canadas Centre for International Governance Innovation (2019), 36% of Canadians feel that the government contributes to their sense of distrust in the Internet. As Statistics Canada (StatCan) is the branch of government responsible for disseminating information to Canadians, it should not ignore this statistic. During the 2020/2021 fiscal year, the StatCan website had over 28million web page visitors and 766,589 table downloads (Statistics Canada, 2021). StatCan prides itself on its transparency and accountability to the public and strives to meet the needs of its users (Statistics Canada, 2018). As an organization, StatCan advertises itself as being a trusted source of statistics on Canada (Statistics Canada, 2018). According to StatCans Trust Centre, the people of Canada can trust that information gathered from them, and about them, is done so for themand that these activities are carried out with integrity and the highest ethical standards (Statistics Canada, 2018). The Statistics Act guides StatCan to ensure that it promotes and develops integrated social and economic statistics pertaining to the whole of Canada (Statistics Act, 1985).

Users count on the agency and expect to access and download authentic, reliable data when they enter the StatCan website. But once a product has been downloaded, it is challenging to validate that it belongs to StatCan and has not been tampered with by a malicious actor. This means that users may believe they are accessing untampered data from StatCan when downloading a corrupted comma-separated value (CSV) file. Regarding the likelihood of StatCan becoming a victim of cyber threats at the hands of malicious agents, the increased number of ransomware attacks on Canadian organizations shows that the country is a potential target (Communications Security Establishment Canada, 2021). Therefore, as StatCan begins to plan the expansion and innovation of its website, it is essential that it consider how it can give users the ability to verify and authenticate the data they download from the website.

This research aims to investigate whether StatCan could respond to the authentication gap on its website by integrating emerging technologies into its existing publication methods. To find answers, we began by familiarizing ourselves with the current research surrounding blockchain and distributed ledger technology. We then considered the importance of record keeping, confidentiality, trust and authentication. We looked at multiple examples of other Canadian organizations and government agencies using blockchain and found multiple articles calling on the government to adopt this new technology. However, we also considered concerns related to these emerging technologies, including environmental impact, public image and potential backlash, a lack of regulation, and the possibility of being blinded by the hype. We investigated five blockchains that could be used in our system design: Ethereum, Avalanche, Cardano, Hyperledger and Solana. With a better understanding of the technology available to StatCan, we worked to conceptualize a system that allows users to authenticate the data they download from the website. Our goal is that the system enables users to verify that the material downloaded from the website has not been tampered with and was produced by StatCan. We believe that our method of authenticating data should be available in online and offline formats to ensure that users with varying degrees of Internet connection can authenticate the data. Our team prioritized this component to serve all Canadian users, knowing that high-speed Internet connection is inconsistent because of the digital divide in the country (Canadas Public Policy Forum, 2014). Additionally, we prioritized usability when considering options for a solution, which needs to be as simple as possible to ensure the technology is accessible and easy to understand by users.

Before a solution can be recommended, it is necessary to introduce the technology behind it to provide the context required to understand how the technology can help StatCan accomplish its goal. The main features that need to be understood are the digital signatures and hash functions that support our concept. In addition to the introduction and literature review, Appendix A has a glossary of terms to help readers understand the more technical material.

Throughout the research process, we found a few gaps in the literature. Given that blockchain is still a relatively new technology, especially for government use, it is not surprising that gaps were found. It was difficult to find any concrete Canadian government regulations or policies on how to incorporate blockchain. This means that directives on the implementation of blockchain within the government are still coming to light. This gap leaves our team with questions surrounding how policies might change in the future to simplify or complicate the implementation of this project. Another identified gap is the lack of variety in the way organizations have published their method of incorporating blockchain into their daily work. We found a lot of material about how blockchain is being used in cryptocurrency, record keeping and financial technology (fintech). However, it was difficult to determine how blockchain is used by organizations on a daily basis. We were also unable to find significant information on the legal implications of using blockchain for our purposes. For example, in the case of health records discussed below, it was difficult to determine how patient files were uploaded or tracked on the blockchain. Furthermore, it was difficult to find research on similar projects. We were unable to locate published research seeking to address the issue of how to give users the ability to authenticate data that have been downloaded from a website. We believe that our project fills some of the gaps in the literature and is a valuable step in the direction of new technology for StatCan.

We performed a systematic literature review for this study, which allowed us to understand the breadth and depth of the existing body of work and identify gaps to explore (Xiao and Watson, 2019, p.93). A successful systematic literature review involves three stages: planning, conducting and reporting (Xiao and Watson, 2019, p.102). The first stage, planning, is when researchers identify the need for a review, specify research questions, and develop a review protocol (Xiao and Watson, 2019, p.102). In the second stage, researchers conduct the research and identify and select primary studies, extract, analyze, and synthesize data (Xiao and Watson, 2019, p.102). Finally, the third stage involves researchers writ[ing] the report to disseminate their findings (Xiao and Watson, 2019, p.102). For this project, we had the following three research questions in mind:

In the planning phase of this study, we compiled a list of search terms that focused on our areas of interest in this project. The list of search terms can be found in Appendix B. As Xiao and Watson (2019) described in their article on how to conduct a systematic literature review, we used these search terms to identify relevant articles. As we collected academic research articles, our team added more search terms. We then used a variety of combinations of the search terms listed in Appendix B with Boolean operators to focus our results. In total, we completed 15 unique searches.

Depending on the number of results listed in a search, we reviewed between 100 and 300 results. If the number of results listed was below 1,000, we examined the first 100. If the number of results was below 100,000, we reviewed the first 200; if there were over 100,000 results, we examined the first 300. In the review process, we assessed academic articles based on their relevance to this study using the title of the article, the abstract and the listed keywords. Overall, we collected 59 papers and entered the source information into a spreadsheet, including the title, authors, year the article or book was published, abstract, and complete citation.

Upon collecting the sources, we began reviewing each article to determine its relevance to this project. We assessed the abstracts in further detail and skimmed through the articles to assess their usefulness. Of the 59 papers, we found 18 sources that proved significantly valuable for this project. Most of the excluded papers were too technical for the purpose of this literature review. While we have attempted to make this paper relatively accessible, we have provided a list of technical terminology and definitions in Appendix A. While some of these definitions are paraphrased, they contain a fair amount of quoted material to maintain integrity.

From our 18 sources, we extracted relevant information and data and synthesized them into the literature review below. Using the research questions listed above, we provided a detailed overview of the technology; considered the significance of record keeping, confidentiality, trust and authentication; and provided a list of examples of other government organizations and agencies using blockchain. In addition, we were surprised to find multiple articles calling on the government to use these new technologies, and we also included this as a theme below.

Beyond academic articles, we reviewed multiple articles on the concerning aspects of blockchain related to environmental impact, public image and potential backlash, a lack of regulation, and the potential to be blinded by the hype of blockchain technology. We also researched five specific blockchains: Ethereum, Avalanche, Cardano, Hyperledger and Solana. The number of blockchains available grows each day, but our team chose to investigate these five. Ethereum is an extremely popular peer-to-peer blockchain that uses a fair amount of energy. Avalanche is a more environmentally friendly proof-of-stake blockchain, like Cardano, which is also a proof-of-stake blockchain that is easy on the environment compared with Ethereum. Hyperledger is an umbrella project of open-source blockchains and related tools, and Solana is a carbon-neutral, proof-of-stake blockchain. More information about these five blockchains and their differences is provided below. This systematic literature review strengthened our knowledge of this technology and supported us in creating recommended solutions and next steps for this project, found below.

This project aims to explore how technology can help users verify and authenticate data from the StatCan website. This literature review begins with a brief overview of cryptographic technology. Next, we consider the importance of record keeping, confidentiality, trust and authentication. We provide examples of organizations, agencies and companies in Canada that use this technology. Then, we list multiple sources that call on the government to move toward new technology such as blockchain. Next, we consider potential concerns with using blockchain, such as environmental impact, public image and potential backlash, a lack of regulation, and the possibility of being blinded by the hype of blockchain technology. Finally, we compare five blockchains: Ethereum, Avalanche, Cardano, Hyperledger and Solana. This project is a small step for StatCan toward new technology that can better protect its data.

In the early 1990s, cryptographers Scott Stornetta and Stuart Haber conceived the idea of connecting blocks via hashed data (Treiblmaier and Clohessy, 2020, p. v). Almost 20 years later, on October 31, 2008,

A mysterious individual, or group of individuals, known only as Satoshi Nakamoto, posted a link to a paper entitled Bitcoin: A Peer-to-Peer Electronic Cash System to an obscure mailing list called Cryptography List. In this paper, Nakamoto proposed the creation of what would become known as a blockchain as a means of enabling an electronic payment system that did not require a trusted third-party intermediary (Urban and Pineda, 2018, p.5).

A blockchain is a digital, decentralized and distributed ledger in which transactions are logged and added in chronological order with the goal of creating permanent and tamper-proof records (Treiblmaier, 2018, p.547). The idea of the ledger has existed for a long timeit is a permanent collection of recorded transactions, historically written in a physical book. Moving the ledger online into a digital currency is where blockchain originated. Since then, blockchain has broadened to include digital security beyond digital currency such as Bitcoin.

Much of this technology stems from cryptography. The term cryptography is derived from the Greek word kryptos, which is used to describe anything that is hidden, veiled, secret, or mysterious (Mohamed, 2020, np). Cryptography secures communication and information using technology and codes. It is well known that data are valuable and often vulnerable. In todays world, producing fake documents is becoming more common. As the fake ones accurately look like the originals, it is impractical for a common man to identify the real and the duplicate one (Prathibha and Krishna, 2021, p.71). Given this information, technology that uses cryptography and blockchain can protect the information, making it tamper-resistant [and] exceptionally hard to change or delete (DeFilippi, 2018, p. 3435). As people begin to recognize the significant and inherent value of data, blockchain and distributed ledger technology may force some organizations fundamentally to rethink their relations with users and approaches to privacy (Maull et al., 2017, p.484). Before providing some examples of blockchain use in Canada, we will discuss the importance of record keeping, confidentiality, trust and authentication for our project.

Victoria Lemieux, an archival studies scholar, claims that much of the discussion about trusted records or systems boils down to two interlinking concepts: reliability and authenticity (2016a, p.112). When a user accesses a record, they consider any potential risks associated with the data (Lemieux, 2016a). Users determine the reliability of data based on how they are accessing the data and on record creation, including who created the record and how (Lemieux, 2016a). Lemieux argues that long-term preservation of information in digital form requires that technical dangers to the longevity of authentic information be addressed (2016a, p.114). In our case, the purpose of what is actually stored on chain is not archiving but rather to establish that the original transaction record is authentic (Lemieux, 2016b, p.15). The aim of this project is to proactively safeguard StatCan data through the added value of blockchain technology.

This project demonstrates that StatCan recognizes the importance of confidentiality. When dealing with data, confidentiality refers to the protection of information, such as computer files or database elements, so that only authorized persons may access it in a controlled way (Mohamed, 2020, np). StatCan data need to be protected from potential threats or attacks. To accomplish this, we must determine the vulnerability or weakness of the current StatCan system (Mohamed, 2020). It is possible that data on the StatCan website could be altered without the users knowledge. This project attempts to fix the potential risk by addressing confidentiality and ensuring that information can be authenticated by the user.

According to a chapter on how authenticity can transform social trust, Batista et al. illustrate the three most important aspects of trust: accuracy, reliability and authenticity (2021, p.112). They argue that accurate [and reliable] records are precise, correct, truthful consistent, complete, and objective (Batista et al., 2021, p.114). To generate trust, the authors describe that authentic records need to preserve their identity and integrity over the period of long-term preservation (Batista et al., 2021, p.116). In the case of digital archives, the authors describe the difficulty in maintaining trust with a digital document. For example, suppose a statistical document has been altered. In this case, it might be challenging to detect the variances between the original and the copy that has been tampered with, and this can negatively impact social trust because of what they call uncertain authenticity (Batista et al., 2021, p.117). This project seeks to improve trust between StatCan and its users by providing a way to authenticate data from the StatCan website and removing uncertainty.

Authentication refers to the ability to determine the validity of a source. It answers the question, How does a receiver know that [the] remote communicating entity is who it is claimed to be? (Mohamed, 2020, np). In this project, StatCan wants to help users determine the validity of a source through an authentication process. Cryptographic algorithms support authenticated encryption, meaning that users can be sure the source is authentic (Mohamed, 2020). This verification also instills integrityit means they can know that the information has not been modified unless StatCan employees changed it through proper authorization (Mohamed, 2020). Evidently, record keeping, confidentiality, trust and authentication are significant factors in this project. Next, we provide examples in Canada that demonstrate this technology in use.

Many examples were found in our research of the Canadian government incorporating blockchain into specific projects. In a policy book published by the Mowat Centre for Policy Innovation at the University of Toronto, Urban and Pineda (2018, p. 6162) list many Canadian government agencies experimenting with blockchain, such as Innovation, Science and Economic Development Canada; the Treasury Board of Canada Secretariat; and the National Research Council Canada (NRCC). In January 2018, the Industrial Research Assistance Program in the NRCC used an Ethereum blockchain to proactively publish grants and contribution data in real-time (Industrial Research Assistance Program, 2019). This project was an experiment that ran for one year and concluded on March 1, 2019. While the experiment is not ongoing, this work has provided constructive insight into the potential for this technology and how it may be used for more open and transparent operations for public programs (National Research Council Canada, 2018).

Multiple levels of government have moved toward using blockchain for permits, including the Government of Ontario, the City of Toronto and the Government of British Columbia (Urban and Pineda, 2018, p.62). One article lists a variety of ways that governments are using blockchain, including for digital identity, the storing of judicial decisions, financing of school buildings and tracing money, marital status, e-voting, business licenses, passports, criminal records and even tax records (lnes, Ubacht, and Janssen, 2017, 357). The Government of Ontario also ran a blockchain hackathon that generated a number of ideas for other blockchain applications in government (Urban and Pineda, 2018, p.62). Supporting pilot projects that use blockchain is an effective way for the government to begin using these new technologies successfully (Urban and Pineda, 2018, p.67). Governments are using blockchain in many areas, and StatCan can use this knowledge and build upon their work in this project.

In addition to government agencies implementing blockchain and distributed ledger technology, health care is moving rapidly toward blockchain and digital health care records. Storing electronic health records on a blockchain is not only improving record keeping but also giving patients greater control over their own health and medical treatments (Urban and Pineda, 2018, p.42). Doctors, nurses, hospitals and other health care institutions are using blockchain to certify the health of patients (DeFilippi, 2018, p.112). It is being used to store encoded personal health records (Zheng, Zhu, and Si, 2019, p.17). The blockchain can provide access to specific individuals, so a persons health records can be secure and confidential when stored in a distributed ledger (Zheng, Zhu, and Si, 2019). Lemieux writes, the underlying conditions in Canada are particularly well-suited to leading blockchain research and implementation Canada has a vibrant, highly active blockchain technoscape, with a diversity of start-ups and consultancies doing innovative work (2016b, p.5). We are excited to add to this work in our project.

Multiple papers called on governments to move toward new technology to better secure their data. Urban and Pineda argue that blockchain can offer governments the possibility of improved transparency, efficiency, and effectiveness (2018, p.42). While blockchain is not a new technology, its use in government is relatively new, so the level of blockchain expertise and capacity within Canadian governments and regulators is currently limited (Urban and Pineda, 2018, p.61). They claim that one of the first things the Canadian government should do is what we are doing currently in this project: building up groups of technologists and policymakers within government who understand the technology, its implications, and the potential opportunities and challenges that flow from it (Urban and Pineda, 2018, p.61). While Urban and Pineda (2018) are pushing for more blockchain in government, lnes, Ubacht and Janssen emphasize that the government should shift from a technology-driven to need driven approach with blockchain applications (2017, p.355). They argue that blockchain will lead to innovation and transformation of governmental processes (lnes, Ubacht, and Janssen, 2017, p.355). Considering the ease with which digital files can be altered (Bell et al., 2019, p.6), we argue that this project is driven by a need for authentication on the StatCan website.

According to DeFilippi, governments have established and stewarded a variety of systems and institutions designed to enhance social welfare and provide the foundational infrastructure for economic and political growth throughout history (2018, p.107). In an article on cryptography and government, Aljeaid et al. argue that e-government acts as a communication bridge between government to citizen, or government to government, or government to business in efficient and reliable ways (2014, p.581). The authors emphasize the importance of data security in government related to potential vulnerability if left unsecured. They claim that end users need robust security solutions to achieve assurance when dealing with e-government systems (Aljeaid et al., 2014, p.581). Creating a tamper-resistant and resilient repository for public records (DeFilippi, 2018, p. 107108) using cryptography and blockchain can help the government avoid data leaks, data loss and other vulnerabilities. We agree with this call to action and believe that this project will improve public trust in StatCan and the Government of Canada.

While the call to action is significant, we also want to take the time to investigate any potential concerns regarding blockchain. We have summarized our findings into four categories: environmental impact, public image and potential backlash, a lack of regulation, and the potential to be blinded by the hype of blockchain technology.

There have been many claims about the environmental impact of new blockchain technology. In November 2021, a blockchain project called Solana contracted Robert Murphy, a climate and energy advisor, to publish an energy use report (Solana, 2021). They compared common activities that involve energy consumption with one Solana transaction, one Ethereum transaction and one Bitcoin transaction (Solana, 2021). While they did not include all of the blockchain options that we have chosen to investigate, it is helpful to consider how blockchain transactions compare with everyday activities. Conducting a single Google search uses 1,080 joules of energy, working on a computer with a monitor for an hour uses 46,800 joules, and using one gallon of gasoline uses 121,320,000 joules (Solana, 2021). By comparison, one Solana transaction uses 1,837 joules of energy, one Ethereum transaction uses 692,820,000 joules, and one Bitcoin transaction uses 6,995,592,000 joules (Solana, 2021). According to Huang, ONeill, and Tabuchi for The New York Times, the process of creating Bitcoin to spend or trade consumes around 91 terawatt-hours of electricity annually, more than is used by Finland, a nation of about 5.5million (2021). While we are not using Bitcoin for our project, these numbers are staggering.

Many of the big players in blockchain, including Ethereum, are using an astonishing amount of energy because of their proof-of-work (PoW) consensus mechanism. PoW requires network participants on the blockchain to expend large amounts of computational resources and energy on generating new valid blocks (Chandler, 2021). In comparison, proof of stake (PoS) requires network participants on the blockchain to stake cryptocurrency as collateral in favor of the new block they believe should be added to the chain (Chandler, 2021). Chandler argues that PoW, such as Ethereum, can be more secure and decentralized, but also uses an immense amount of electricity, is slower and is less scalable (Chandler, 2021). By contrast, PoS, such as Avalanche, Cardano and Solana, has a smaller environmental impact and allows for faster transactions and better scaleability, but it is a newer form of technology and may not be as secure or tamper-resistant as proof of work (Chandler, 2021). Evidently, both PoS and PoW have advantages and disadvantages, and we consider the specific environmental impact of five blockchains (Ethereum, Avalanche, Cardano, Hyperledger and Solana) in the chart below.

There have been multiple examples of companies and organizations that received backlash when attempting to use blockchain. In December 2021, Kickstarter announced that it was moving to blockchain (Plunkett, 2021). The blog post, titled Lets Build Whats Next for Crowdfunding Creative Projects, received many critiques and complaints from creators (Plunkett, 2021). Kickstarter responded by providing a frequently asked questions section, where it claims it is confident that a crowdfunding protocol built on top of Celo will not significantly negatively impact our carbon emissions given its underlying architecture (Kickstarter, 2022). Still, many creators and backers have claimed that they will no longer be using Kickstarter, given this information (Morse, 2021).

Similar to Kickstarter, the digital communication platform Discord tweeted about integrating Ethereum into its platform in November 2021 (Pearson, 2021). The founder and chief executive officer of Discord, Jason Citron, quickly backed off the project two days later, after public backlash (Pearson, 2021). Pearson states that people in the game industry hate blockchain either because of the environmental impact of proof-of-work tokens on Ethereum, the idea that blockchain collectibles are a grift based on mythical thinking, or both (2021). Many users unsubscribed from the platforms premium Nitro paid service or threatened to do so (Jiang, 2021). Given that both of these examples took place recently, in November and December 2021, it is difficult to consider what the public opinion might be regarding StatCan and this project. However, it is important to be aware of these examples and recognize that backlash is a potential outcome.

Another concern is the decentralized and unregulated nature of blockchain. Given that control and decision making about the blockchain is not conducted by a single entity, this is an area of concern for StatCan. Rather than putting trust in one entity, trust is put in mathematical algorithms. Given that there have been other blockchain projects by Canadian governments, they should be used as a guide for StatCan policies regarding this project. Between the five blockchains we look at below, each has different regulations, goals and abilities. It can also be difficult to scale, depending on the blockchain chosen. This may be a concern because it has not yet been decided how many StatCan products will be available for authentication. Since we looked at trust and confidentiality earlier in this literature review, the lack of regulation is less worrisome than the impact on the environment and public image. In fact, this project is an opportunity to be an early example and leader in blockchain implementation regulations, and we hope that we will be able to incorporate new policies into our project.

The overall hype of blockchain technology needs to be addressed. According to Victoria Lemieux, we need to address the shortcomings in designs and implementations of blockchain record keeping so as to be better able to realize the worthy vision of blockchains (Lemieux, 2019). She writes, claims associated with use of blockchain technology for recordkeeping are, in a number of cases, overhyped. As an example, blockchain solutions that claim to provide archival solutions do not actually preserve or provide for long-term accessibility of records (Lemieux, 2016b, p.4). She claims that the biggest danger in blockchain comes from blindly trusting it (2016b, p.23). However, critically investigating these limitations is the key to successfully leveraging technological innovations like the blockchain for the benefit of all Canadians (Lemieux, 2016b, p.8). While blockchain technology does not solve every problem that it has been claimed to, it is a useful technology that will continue to be used in industry and is deserving of further research and experimentation (Ruoti et al., 2020, p.53). While this relatively new technology is exciting, and considering risks can bring up fears of stifling innovation (Lemieux, 2016b, p.5), it is imperative that we are critical of the potential limitations and concerns about blockchain technology to have the best possible outcome in this project.

For this project, we chose to evaluate and compare five different blockchains, with specific considerations. We decided to look at Ethereum, Avalanche, Cardano, Hyperledger and Solana. Ethereum is one of the most popular blockchains, yet it conducts the fewest transactions per second and has significant energy consumption compared with other options because it uses proof of work (PoW). PoW means that a majority of users need to vote on each new blockchain, and this takes more time and effort than proof-of-stake (PoS) blockchains. We also included Avalanche and Cardano, which are both PoS public blockchains. While Avalanches environmental impact is carbon neutral, its transaction rate per second is the highest, compared with the other four blockchains we analyzed. Meanwhile, Cardano is less energy efficient and slower than Avalanche. We also chose to include Hyperledger, as it is a private blockchain that uses Practical Byzantine Fault Tolerance as its consensus mechanism. It is a private blockchain, which means that it is centralized. This potentially impacts trust, as fewer nodes can make the network less secure. Finally, we included Solana because it is carbon neutral, uses PoS and has provided a report on energy consumption in comparison with blockchains such as Ethereum. All of the blockchains outlined below have advantages and disadvantages. Upon reviewing them, we have decided to use Avalanche for this project. Avalanche is an open-source PoS blockchain with the highest transaction rate per second, at 4,500. Additionally, it is a public network that is carbon neutral, an important consideration for us.

Figure 1 displays an overview of five blockchains in a chart: Ethereum, Avalanche, Cardano, Hyperledger and Solana. In the chart, we provide general information about each blockchain, the transaction per second rate, the type of consensus mechanism that each blockchain uses, whether the blockchain is public or private, and the environmental impact of each blockchain. We also include a link to the website for each blockchain.

Our research team has designed a solution that incorporates blockchain technology using the knowledge gained from our literature review and pre-existing technical experience. This section outlines system details and the recommended solution for enabling users to authenticate documents downloaded from the StatCan website. We will begin by introducing three technical elements that are the pillars of our solution: digital signatures, hash functions and secure tunnels. These three technical elements interact as follows: a hash computed over the file that belongs to StatCan is used to make sure the file has not been tampered with; a digital signature over this hash proves that the file is owned by StatCan, and the secure tunnel ensures secure communication between the user and the StatCan website. In this section, we explain how these building blocks work and how they are integrated into our proposed solutions.

When users download a file from the StatCan website, there are two questions that they may have. First, do the data actually belong to StatCan? And second, have the data been tampered with?

To address this question, we propose using a digital signature. The idea is similar to signing a document with a penif you receive a signed letter or document from x, you can check whether the signature on the document belongs to x and consequently whether the document is theirs. In a digital signature scheme, a private-public key pair is used to sign a document and verify the signature over a documents hash. There are three steps to a digital signature scheme: StatCan needs to (1) generate the public-private key pair, so that (2) it can sign the hash of the document with its private key, and (3) any user with the public key can verify the signature.

Step1: Key generation.

Using a function that generates keys, StatCan can obtain a public-private key pair. The public key is shared on the website for users to download and use during the signature verification. StatCan would not share the private key, as it might lead to a malicious actor using the private key to forge StatCans signature on documents. It is important to note that key generation is a one-way function, which means that it is infeasible to compute the private key, given the public key. StatCan would use its private key to generate the signature over a documents hash rather than the document itself, as it is faster and more efficient, and the resulting signature is shorter. Consider the signature generation as a function that asks the user to provide their private key and hash of the document and generates a file that contains the signature.

Step2: Signing the hash of a document

To create the signature, StatCan needs its private key and the hash of the document. It is infeasible to compute a signature on the hash of a document if the private key is not known. The resulting signature is kept in a separate file. StatCan would upload the signature file and its public key on its website, so that users can download (1) the file they want to use, (2) the signature file created over the hash of that document and (3) StatCans public key. Consider the signature verification as a function that asks the user to provide the three files that they downloaded from the website.

Step3: Verifying a signature

Any user can verify the validity of the signature by providing (1) the file they want to check, (2) the signature file created over the hash of that document and (3) StatCans public key. If the signature is verified, the user can be sure that the file actually belongs to StatCan.

Public key infrastructure binds public keys with identities. This is done through a registration process where a certification authority (CA) issues certificates by signing StatCans public key. As a result, a CA verifies that the public key really belongs to StatCan. CAs are entities that issue certificates used to verify the ownership of a public key. Any user with access to the CAs public key can verify the certificate issued over StatCans public key. The certificates are valid for a specific amount of time.

Hash functions are used to create a unique fingerprint for the input message. This technology gives StatCan the ability to hash a document (such as a CSV file) and create a unique fingerprint of it in the form of a fixed-size hash. Once StatCan computes the hash of the file, it uploads it to the website. When users download a file, the document is hashed. The resulting hash is compared with the uploaded value to make sure that the file has not been tampered with. This part of the process is handled by the application itself. We will explain this in more detail in the proposed solutions.

To solve users concern about the authentication of their downloaded file, along with digital signatures, we must use hash functions in our solution. This is common practice in cryptography, as hash functions are known to be secure (Al-Kuwari, Davenport, and Bradford, 2011). They are used against malicious parties that may try to change data deliberately. Using hash functions fills a demand in our proposed system, because an attacker should not be able to create a file with a particular hash and replace it with a file from StatCan. For the hash functions to operate effectively, they require certain properties. For example, when two people hash the same document using the same hash function, they get the same hash value. The hash function produces the same output for a given input (which is also called pre-image); this means that hash functions are deterministic. Even if a single letter is added to a single cell in the document, the resulting hash will be different (see Figure2). The determinism property is relevant in the context of guessing the pre-image. Input to the hash function cannot be computed by just looking at the hash value. However, one can try to guess the pre-image, hash it and compare it with the hash value. Consider user authenticationpasswords are generally stored as hashes. If an attacker can access this database of hashes, they can pick a password (for example, one of the most commonly used passwords), hash it and compare it against the database to see whether there is a match.

Figure 2 is an illustration of how hashing works. The image shows a document with the word Hello, pointing toward a centre black box with the words hash function. On the right side of the image, there is a randomly generated list of numbers and letters. Below, there is a document with the word Hello! pointing toward the hash function black box. Because this document includes an exclamation mark, the hash output is distinct as well. When a document is hashed, a fixed-size output is created. Each distinct document has its own distinct output, even if only a single character is different.

Note: This image illustrates how hashing works. Document1 contains the word Hello, and the hash function creates Hash 1 over this document. The second document differs from Document1 by one character: Hello! The hash function creates Hash 2 over Document2. Hash 1 and Hash 2 have different values, as Document1 and Document2 are different. Hash 1 and Hash2 are the same size, as the hash function produces fixed-size outputs.

Most relevant to our project, it is imperative to note that we expect a hash function to have the collision resistance property, meaning that it is infeasible to find any two different messages that have the same hash. In other words, an adversary cannot find another CSV file with different content that has the same hash as the original document and cannot replace the original document with another one.

For the sake of a comprehensive understanding, we must also mention the other two properties that a hash function should have. To ensure clarity, note that a message to be hashed is known as the pre-image, and the resulting hash is known as an image. Pre-image resistance implies that given the hash of a message, it is infeasible to find a corresponding message. Weak collision resistance states that given a message, it is infeasible to find another message with the same hash. As previously mentioned, the hash function is also needed for the signing operation. StatCan signs the hash of the document, rather than the document itself, to have a shorter signature. This increases efficiency, as signing the hash is much faster. Since the hash is used in the signature function, we need the collision resistance property.

There are well-known hash functions, such as MD5, SHA1, SHA2 and SHA3. However, not all are secure. MD5 and SHA1 are proven to be insecure, as they do not have the collision resistance property. While it takes longer to attack SHA1 than MD5, both are currently considered weak. Hash functions can break over time, but they get replaced with secure ones. For now, we know that SHA2 and SHA3 are secure (National Institute of Standards and Technology, 2015). As SHA3 is more secure than SHA2, we propose using SHA3 in our solution.

The proposed solutions require a secure tunnel between the user and the StatCan website for communication. In both the offline and hybrid solutions found below, the user has to download an application from the StatCan website. The user has to make sure they get the actual application, and a secure tunnel is needed between the user and StatCan for that purpose. Also, in the online solution, the user communicates with the StatCan website using the secure tunnel. Https provides a secure tunnel, meaning that if an attacker observes the traffic in the tunnel, they will not know the content of the message being transmitted. All an attacker can observe is that there is traffic between two parties.

The secure tunnel provides

There are three potential solutions that could be implemented using the previously mentioned technology to resolve user needs to authenticate a StatCan document. Offline and hybrid solutions require the creation of an application that is downloaded by the user. In these solutions, the user interacts with the application to check the validity of a document.

Figure 3 is a detailed image of our offline solution. It displays the setup of the solution, which includes how Statistics Canada will hard-code the keys into the application, and an illustration of the secure tunnel between Statistics Canada and the application. The figure continues onto the next page and displays how the solution is used. This section involves a user uploading a .csv file to the application, the application computing the hash, the user providing the signature file to the application and the application checking whether the signature is verified over the hash.

In this solution, the user downloads an application from the StatCan website through the secure tunnel. This enables the user to ensure that the application they download belongs to StatCan. The application checks the validity of the users document. The user takes the CSV file and signature file they downloaded from the website together, then drags and drops the CSV file into the app. The app computes the hash over the file, then prompts the user to provide the corresponding signature file computed over the hash of the CSV file. The application checks whether the signature is verified over the hash. To do so, the StatCan keys must be hard-coded into the app (setup phase in Figure3). The key is needed to verify the signature over a file.

Figure 4 is a detailed illustration of our online solution. In this image, the setup involves the list of hashes on the Statistics Canada server and a secure tunnel between the Statistics Canada website and the user. Then, the figure displays the use of the online solution, which involves the user dragging and dropping a file they want to check into the Statistics Canada website through the secure tunnel. Next, the website computes the hash client-side over the file. Then, the website compares the hash with the list of hashes, and finally, the application prompts the user whether the file is valid.

In this solution, StatCan maintains a page on its website for the user to check document validity. The user communicates with the StatCan website using the secure tunnel, and they drag and drop a file that they want to check. Since the website knows the list of hashes of all files, it can compute the hash client side over the file provided by the user and compare it with the list; StatCan maintains a server where the list of hashes is kept. The user then learns whether the file they uploaded is valid. If valid, the file has not been tampered with and belongs to StatCan. Compared with the offline solution, this approach offers a more straightforward experience for the user, as they only have to provide the products file. However, this solution requires the user to be online, unlike the previous application that runs offline.

Figure 5 is a detailed illustration of the hybrid solution. In this image, the setup is more complex. Statistics Canada adds file hashes to the Statistics Canada server, which then get pushed to the website and application through a secure tunnel. The Statistics Canada server updates the list of hashes every three days. There is an illustration below of how the hybrid solution is used. It shows how the user uploads the .csv file to the application, how the application computes the hash, then how the application compares the hash against the updated list of hashes, and finally how the application prompts the user whether the file is valid.

In the hybrid solution, the user must download an application (similar to the offline solution) over the secure tunnel. The app has a list of hashes of files that belong to StatCan. To authenticate the document, the user uploads the file to the app, which computes the hash and compares it with the list. Then, the app informs the user whether the file is valid. The app occasionally connects to the StatCan website to update the list of hashes; StatCan maintains a server where the list of hashes is kept. While we suggest that the app connect every three days, the duration can be greater or shorter, depending on how frequently StatCan shares files. Every three days, the app receives the updated list of hashes that is kept on the server to have the most recent list. A signature over a hash proves ownership. Receiving the list of hashes over the secure connection means that StatCan is the owner of the hashes. This solution eliminates the step of providing the signature file, if the hash of the file that the user offers appears in the list of hashes. If the hash is not in the list, the app prompts the user to provide the signature file over the hash, so the app can compute the hash and verify the signature over the file. This situation might occur if a user tries to authenticate a file before the app has the opportunity to connect to the StatCan website and update the list of hashes.

Figure 6 is a detailed illustration of our recommended solution, which is the hybrid solution with the addition of blockchain. For the setup, Statistics Canada adds the hash of the file to the Statistics Canada server, and it is logged on the blockchain. This, in turn, gets pushed to the Statistics Canada website and then through a secure tunnel to the application. The list of hashes is updated every three days in the application. In the illustration of how the hybrid solution is used, the user uploads the .csv file to the application, the application computes the hash, then the application compares the hash against the updated list of hashes, and finally, the application prompts the user whether the file is valid. The image of the users experience is the same as Figure 5. It shows how the user uploads the .csv file to the application, how the application computes the hash, then how the application compares the hash against the updated list of hashes, and finally, how the application prompts the user whether the file is valid.

All three solutions offer users the opportunity to authenticate data from the StatCan website. However, they do not all equally meet the standards we set in our objectives for the project. While the offline solution meets our objective of allowing users across the digital divide to authenticate data, it requires the user to submit the corresponding signature file to the app. With regard to the online solution, the user only needs to provide the CSV file, minimizing the number of downloads for the user. Therefore, the online solution offers better usability compared with the offline solution. However, the online solution does not meet the requirement to provide an accessible method of authentication, regardless of the users access to the Internet.

For these reasons, we have decided that the hybrid solution is ideal because it provides a usability level comparable to the online solution and does not require the user to be online to check the file they have. This solution addresses the barriers discussed above regarding consistent access to the Internet. Adding blockchain to the hybrid solution provides improvements; it affects a subcomponent of the proposed solutionthe way the hash of a file is stored. StatCan creates the hash of a file and logs this hash on the ledger. When compared with Figure5, the hashes are logged on the blockchain, and the app receives the updated list of hashes from it. The added element of blockchain increases trust between StatCan and the public: StatCan cannot change the data once it is posted. If StatCan changes the data, a history of that change is recorded. Another benefit of including blockchain is that hashes can still be reached if the StatCan website is down, as they are recorded on the blockchain. Blockchain also offers better archival properties, as it ensures that the recorded data are reachable over a longer period than if the data are stored on a server. The server may go down or may not be continuously maintained, making the data unreachable. Blockchain provides provenance over the data (hash of the file) for a long time, but does not actually archive files. A possible drawback of incorporating blockchain into the hybrid solution is that if the ledger nodes manipulate the list of hashes, StatCan cannot do anything about ita global network has control over the data. Ledger nodes are the entities in this network that accept or reject a block of transactions based on their validity; they broadcast these transactions so all of the nodes stay up to date. However, in the hybrid solution without blockchain, StatCan maintains exclusive control.

Al-Kuwari, S., Davenport, J. H., and Bradford, R. J. (2011). Cryptographic Hash Functions: Recent Design Trends and Security Notions. Short Paper Proceedings of Inscrypt 10, 137. Retrieved 2022, from https://eprint.iacr.org/2011/565.pdf.

Aljeaid, D., Ma, X., and Langensiepen, C. (2014). Biometric identity-based cryptography for e-Government environment. Proceedings of 2014 Science and Information Conference, SAI 2014. 581-588. https://doi.org/10.1109/SAI.2014.6918245.

Batista, D., Kim, H., Lemieux, V.L., Stancic, H., and Unnithan, C. (2021). Block and provenance: How a technical system for tracing origins, ownership and authenticity can transform social trust. In V. Lemieux and C. Feng (eds.) Building decentralized trust: Multidisciplinary perspectives on the design of blockchains and distributed ledgers (First ed., pp. 111128). Springer. https://doi.org/10.1007/978-3-030-54414-0.

Bell, M., Green, A., Sheridan, J., Collomosse, J., Cooper, D., Bui, T., Thereaux, O., & Higgins, J. (2019). Underscoring archival authenticity with blockchain technology. Insights: The UKSG Journal, 32. https://link.gale.com/apps/doc/A594619025/AONE?u=anon~eafb9693&sid=googleScholar&xid=e1544e71

Canadas Public Policy Forum. (2014). Northern Connections: Broadband and Canadas Digital Divide. Public Policy Forum: Reports. Retrieved January 27, 2022, from https://ucarecdn.com/68b98fff-32c9-4904-904c-09b1d98cdd2e/

Chandler, S. (2021, December 22). Proof of stake vs. proof of work: Key differences between these methods of verifying cryptocurrency transactions. Business Insider. https://www.businessinsider.com/personal-finance/proof-of-stake-vs-proof-of-work

Chowdhury, N. (2019). Inside blockchain, Bitcoin, and cryptocurrencies. Auerbach.

Communications Security Establishment Canada. (2021, December 6). Ministers urge Canadian organizations to take action against Ransomware. Canada.ca. Retrieved January 26, 2022, https://www.canada.ca/en/communications-security/news/2021/12/ministers-urge-canadian-organizations-to-take-action-against-ransomware.html

Computer Security Resource Center. (n.d.a). Certification authority. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/certification_authority

Computer Security Resource Center. (n.d.b). Collision. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/collision

Computer Security Resource Center. (n.d.c). Collision resistance. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/collision_resistance

Computer Security Resource Center. (n.d.d). Key generation. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/key_generation

Computer Security Resource Center. (n.d.e). Message digest. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/message_digest

Computer Security Resource Center. (n.d.f). Node. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/node

Computer Security Resource Center. (n.d.g). Preimage. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/preimage

Computer Security Resource Center. (n.d.h). Preimage resistance. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/preimage_resistance

Computer Security Resource Center. (n.d.i). Public key infrastructure (PKI). In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/public_key_infrastructure.

De Filippi, P. D. F. (2018). Blockchain and the law: The rule of code. Harvard University Press. https://doi.org/10.4159/9780674985933

Hirose, S. (2004). Yet another definition of weak collision resistance and its analysis. In Lim JI., Lee DH. (eds) Information Security and Cryptology - ICISC2003. ICISC2003. Lecture Notes in Computer Science, vol.2971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24691-6_8

Huang, J., ONeill, C., and Tabuchi, H. (2021, September 3). Bitcoin uses more electricity than many countries. How is that possible? The New York Times. https://www.nytimes.com/interactive/2021/09/03/climate/bitcoin-carbon-footprint-electricity.html

Industrial Research Assistance Program. (2019). Blockchain publishing prototype. National Research Council of Canada. Government of Canada. https://nrc-cnrc.explorecatena.com/en

Ipsos Public Affairs for Canadas Centre for International Governance Innovation. (2019). Global Survey Internet Security & Trust. CIGI-Ipsos Global Survey Internet Security Trust Part I & II: Internet security, online privacy & trust. Retrieved from, https://www.cigionline.org/sites/default/files/documents/2019%20CIGI-Ipsos%20Global%20Survey%20-%20Part%201%20%26%202%20Internet%20Security%2C%20Online%20Privacy%20%26%20Trust.pdf

Jiang, S. (2021, November 9). Discords hints about crypto, NFTs are tearing its community apart. Kotaku. https://kotaku.com/discords-hints-about-crypto-nfts-are-tearing-its-commu-1848023955

Katz, A., & Dash, S. (n.d.). Error correcting codes. Brilliant Math & Science Wiki. Retrieved January 27, 2022, from https://brilliant.org/wiki/error-correcting-codes/

Read more here:
Investigating the Use of Blockchain to Authenticate Data from the Statistics Canada Website - Statistique Canada

6 Technological Innovations in the New York Sports Betting Industry – Qrius

As you know, New York has been among the top states in the United States to make it to the peak of gambling. To blend it with digitization and modernity, online gambling has incorporated multiple technological benefits to make their way stronger for the future.

The sports betting industry has evolved over the last decade, and this transformation knows no boundaries. Gambling operations over the digitized platform need a convergence of technology, website security, player privacy, convenient payment options, etc. The emerging New York sports betting apps have promised to cover all these needs and bring more to the gamblers. Looking ahead to the industry, these apps will become the sectors future, and the continued innovations are bound to elevate the domain further and make the experience even more seamless. Read along to know more about some of these technological advancements simultaneously revolutionizing the entire industry.

It is essential to understand the imagination of players and bring them to reality. Computer-generated reality does precisely the same. It empowers online sports betting websites to catch gamblers thought processes or originality. They tend to understand these players challenges and eliminate them while hosting an online event.

Considering virtual reality, one can watch multiple games with VR headsets and dive deep into the three-dimensional approach of the event. One can wager as well as enjoy the computer-generated events happening around the globe. The innovation has allowed bookmakers to captivate the players with hundreds of opportunities. These games are the best for players asking for something more than random stuff.

Blockchain technology has been a massive change for the world, and the gambling industry has significantly impacted its operations. When cryptocurrency took charge over the online betting market, people started feeling relaxed about their modes of payment. By the time cryptography started making establishments worldwide, the gambling sector had already fostered them.

Not only gambling, but numerous organizations are also engaging their work culture with cryptos and crypto payments to make transactions safe and secure. Safety in payments is one of the significant lookouts of any person scrolling through the internet. This is why betting operators have shifted to cryptographic forms to make deposits and withdrawals easy for bettors.

The creation of virtual reality and live streaming services is one of the achievements of online sports betting operators. It is a valuable asset to keep bettors loyal and engaged to the operator. And this means no harm to them as it brings out several options for them to explore.

Having an opportunity to watch the sports event or the match live and perhaps wager on it through the app itself is exciting. Live streaming has paved the way for endless opportunities. These options are increasingly valuable for players wishing to invest in live in-play betting markets.

One of the biggest reasons to think twice before making online transactions is to doubt the payment method or the provider. However, gambling operators worldwide use encryptions to protect the players financial information. Also, these encryptions make it easy for the players and the operator to encode and decode. All betting apps these days are encrypted, making it impossible for hackers to steal any information from an individuals account. Companies sometimes use systems to make a trade over your data. This stores a users unique information in their memory. Try to be smart when you make payments and check for encryptions.

VR is no more a new thing to this world. VR lets you explore your imaginative ends quickly and conveniently in the comfort of your homes when out of reality. All you need to gather is a VR headset, a glass, and perhaps a set of gloves. VR takes you to a different zone, immersive a realistic, three-dimensional experience associated with gaming. It acts as a catalyst for the entire gambling industry as gamers enjoy the real-life experience by not taking the pain of traveling to traditional gambling platforms. VR has gathered a total number of audiences over the last decade.

You already know VR and how it functions. The metaverse is another relevant thing to consider when it comes to technology. It is the future iteration of technology or the internet. Online gambling is expected to live within this metaverse in the future.

Virtual realities and physical changes will be blended to provide gamers with new experiences. This will allow a considerable number of players to interact with each other virtually on global terms. Payments would be conducted seamlessly and securely. Metaverse would allow an expansion of the entire gambling sphere. It brings a common currency within the space, eliminating translational complexity among the players.

Online sports betting has significantly evolved due to technological advancements in New York and worldwide. Gamblers these days are no more interested in traveling to traditional platforms. They take an interest in wagering online with the comfort of emerging betting apps and improvements in technology. However, to make the best use of these apps, one must be aware of the evolving technology.

Stay updated with all the insights.Navigate news, 1 email day.Subscribe to Qrius

View post:
6 Technological Innovations in the New York Sports Betting Industry - Qrius

EMVCo reports on the future of contactless payments – NFC World

INSIGHTS: NFCWs Sarah Clark discusses the future of contactless payments with EMVCos Brian Byrne and Jonathan Main

A slide deck and video recording of EMVCos keynote presentation at Contactless World Congress on the future of contactless payments are now available to access free of charge in the NFCW Knowledge Centre.

During the session, Brian Byrne, EMVCos director of engagement and operations, and Jonathan Main, chair of the EMVCo Board of Managers, provided insight into how EMVCos forthcoming Contactless Kernel Specification will simplify and advance global contactless acceptance, how elliptic curve cryptography (ECC) offers a state-of-the-art security solution and how IQ demodulation supports improved transaction speeds and more reliable data transmission.

They also explained how developments in wireless technologies including ultra wideband (UWB), Bluetooth Low Energy (BLE) and WiFi offer opportunities for new use cases, including in-aisle in-store payments and automatic entry payments for events or transport.

EMVCo works with industry stakeholders to develop specifications for payment technologies in order to guarantee worldwide interoperability. It has developed the EMV Contactless Kernel Specification in order to address issues of cost and complexity caused by the current diversity of contactless kernels used in payment terminals, the speakers explained.

The specification will streamline contactless payment acceptance globally whilst supporting existing contactless architecture, co-existing with legacy kernels and minimising impact on processing networks. It will also be optimised for cloud operation and support offline transactions, they said.

In addition, the specification will lead to enhanced security in contactless transactions by incorporating advanced technologies such as ECC, which provides a higher level of security whilst working with smaller cryptographic keys than existing RSA cryptography solutions.

The implementation of IQ demodulation technology will also offer more reliable data transmission that will improve transaction speeds as well as greater flexibility in where the card or device can be positioned to be read by a payment terminal.

EMVCo is also currently exploring the opportunities and challenges of longer-range wireless technologies such as BLE, UWB, WiFi and mobile data to determine how they might impact on contactless payment systems and how future specifications might be introduced to ensure interoperability and security across new use cases, especially those involving longer-range wireless data transfer, Byrne and Main revealed.

During the Q&A session, chaired by NFCW editor Sarah Clark, the speakers answered questions relating to the availability, implementation and impact of the EMV Contactless Kernel Specification, technologies including software POS contactless acceptance solutions and biometrics, and issues that EMVCo is exploring in relation to UWB, BLE and other longer-range contactless technologies.

A video recording of the event, along with a copy of EMVCos slide deck from the session, is now available to watch in the NFCW Knowledge Centre here.

Next: Get your free registration to Contactless World Congress, a new kind of event for a new kind of world.

View post:
EMVCo reports on the future of contactless payments - NFC World

Quantum eMotion to Present at the H.C. Wainwright 24th Annual Global Investment Conference in New York – Digital Journal

Montreal, Quebec(Newsfile Corp. September 12, 2022) Quantum eMotion Corp. (TSXV: QNC) (OTCQB: QNCCF) (FSE: 34Q) (QNC or the Corporation) announces its participation at the H.C. Wainwright 24th Annual Global Investment Conference in be held in New York September 12-14, 2022.

The Companys live streaming presentation will be available on Tuesday, September 13, 2022, at 12:30 PM ET for conference participants. Quantum eMotion invites all interested parties to view the presentation by visiting our website at: http://www.quantumemotion.com.

About QeM

The Companys mission is to address the growing demand for affordable hardware security for connected devices. The patented solution for a Quantum Random Number Generator exploits the built-in unpredictability of quantum mechanics and promises to provide enhanced security for protecting high value assets and critical systems.

The Company intends to target the highly valued Financial Services, Blockchain Applications, Cloud-Based IT Security Infrastructure, Classified Government Networks and Communication Systems, Secure Device Keying (IOT, Automotive, Consumer Electronics) and Quantum Cryptography.

For further information, please contact:

Francis Bellido, Chief Executive OfficerTel : 514.956.2525Email: [emailprotected]Website: http://www.quantumemotion.com

Neither TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

This press release may contain forward-looking statements that are subject to known and unknown risks and uncertainties that could cause actual results to vary materially from targeted results. Such risks and uncertainties include those described in the Corporations periodic reports including the annual report or in the filings made by QeM from time to time with securities regulatory authorities.

To view the source version of this press release, please visit https://www.newsfilecorp.com/release/136800

See the rest here:
Quantum eMotion to Present at the H.C. Wainwright 24th Annual Global Investment Conference in New York - Digital Journal

The emerging role of cybersecurity in the automotive sector – The Financial Express

By Manav Kapur

The fast-paced technological advancements have transformed operations across all industries and the automotive industry has been no exception. However, with the automotive sector joining the digital bandwagon, it is also exposed to malicious cybersecurity threats and attacks. While the integration of the Internet of Things (IoT) and state-of-the-art connected car technology has facilitated customers with an advanced driving experience with remote managing and servicing, cybersecurity has become a critical concern for not only original equipment manufacturers (OEMs) but all stakeholders across the automotive sector.

With advances in the trend connected, autonomous, shared and electrified, cars are getting smarter each day in terms of functionalities like intelligent dashboards and advanced automated driving. Also, certain features like multi-modal interaction, multi-display interaction, 5G connectivity, V2X, OTA and digital keys are increasingly becoming common in the new-age connected cars. The connected car industry, thereby, has also witnessed steady growth in recent years.

Connected cars these days enable computers or mobile applications to remotely control and monitor almost all systems in a vehicle including the steering, brakes, locking and unlocking, and the engine itself. This leaves the cars vulnerable to hackers who can obtain information or even take control of an automated car if the system is not adequately protected; making cybersecurity a grave concern for both customers and the automakers. Automated vehicle manufacturers are dealing with multiple facets of cybersecurity like computing systems, communication systems, vehicle interface, data transfer, back end, cloud, etc., to ensure safe and secure mobility.

All vehicles that are connected to modern age innovations like information technology, digitalization, IoT, etc., are potential victims of cybersecurity threats. Some of the common threats among these are:

Malware: Malware attacks can refer to different types of attacks like viruses, Trojans, worms, ransomware, spyware, etc. In simpler terms, malware is software designed to breach the integrity of a network and it can deny access to the system to authorized users, steal confidential information or disrupt the system entirely.

Internet-of-things (IoT) attacks: While the application of IoT can facilitate customers with advanced driving experience, increasing IoT devices in vehicles is a matter of grave concern since it can be a gateway for hackers to breach and exploit other devices in the network.

Password hack: This can be a key threat for the car infotainment systems as attackers can use various methods like using exploiting media platforms, accessing password databases, and exploiting networks to access unprotected passwords to decipher a private password.

Denial-of-service (DoS): DoS refers to shutting down a machine or network, making it inaccessible to its intended users. With a DoS attack, hackers can overload a system and the drivers can be completely denied legitimate requests.

Major automotive players across the globe have been opting for state-of-the-art cyber-security technologies such as blockchain, 5G, and artificial intelligence to mitigate security risks like malfunctions or cyber-attacks. However, with the technology evolving steadily, the automotive cyber-security is also witnessing newer trends like Cryptographic Hash Functions (CHF) providing improved security in public and private blockchains, Quantum Cryptography (QC) borne out of the application of quantum physics and Vehicle Anti-theft Systems, to name a few.

The author is Manav Kapur, Executive Director, Steelbird International

Disclaimer: Views expressed are personal and do not reflect the official position or policy of Financial Express Online. Reproducing this content without permission is prohibited.

See more here:
The emerging role of cybersecurity in the automotive sector - The Financial Express

Jack Dorseys Web5 is a solution to a problem thats already been solved – VentureBeat

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

Web3 thrives on its ability to provide both transparency and anonymity, but merging the two has been a seemingly arduous task particularly when it comes to securing personal data.

Jack Dorsey the cofounder and former CEO of Twitter believes hes found a solution to the problem in the form of Web5, his newly announced decentralized data and identity platform leveraging Bitcoin. But while Dorsey unveils designs for a new decentralized web using the Bitcoin network, other blockchain technologies have moved far beyond the conceptual stage.

While somewhat confusing, the name of Dorseys proposal actually implies a literal combination of Web2 and Web3 features as in two plus three equals five thus Web5 was coined. Seeking to act as the extra decentralized web equivalent, Web5 proposes to put control back in users hands and grant them autonomy over their digital data and identity.

In essence, the three main pillars of Web5 are decentralized identifiers, verifiable credentials and decentralized web nodes which, frankly, sounds similar to existing modern blockchain technologies. Dorseys rationale for Web5 is that while the current internet democratized the exchange of information, it is still missing an essential component the reclamation of personal identity.

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

Currently, personal data is generally secured via accounts and passwords, and its been this way for quite a while. In this model, identity and personal data are essentially the property of third parties, such as big tech companies. Historically, this system has been fraught with issues, whether that be huge data leaks, illicit exchanges of consumer data, or the general lack of control for the end user.

What Web5 attempts to bring about is decentralized identity and data storage for internet applications. It promises developers can focus on creating meaningful user experiences while returning the ownership of personal information to individuals. While self-sovereign identity and data ownership are essential facets of the decentralized web this already exists.

The Internet Computer (ICP) blockchain launched its genesis block on May 10, 2021, and has been designed to make a fully functioning decentralized internet a reality. By onboarding websites, DeFi, social media, games, and metaverse projects entirely on-chain, running at modern web speeds, ICP strives to blur the lines between blockchain and the internet and create an interoperable future. Yet, amongst this system lies what is otherwise known as Internet Identity, abbreviated simply to II.

II allows users to anonymously authenticate their credentials to decentralized applications (dApps) running on ICP using their personal devices. To achieve this, the anonymous authentication framework combines Web Authentication (WebAuthn), a two-factor authentication standard of the World Wide Web Consortium (W3C) that is supported by the majority of modern devices, and Chain Key cryptography a breakthrough in modern cryptography that will allow ICP to run millions of nodes at scale.

One of the most notable aspects of the chain is that it enables any device to verify the authenticity of artifacts generated by ICP, including smartwatches and mobile phones. Compatible authentication methods include traditional Hardware Security Modules (HSM) USB devices that plug into a personal computer and manage keys and any mobile device with a Trusted Platform Module (TPM) chip common in modern laptops and phones.

This means that, for example, anyone can authenticate themselves when accessing dApps by simply using the fingerprint sensor on their laptop or the camera on their phone. The system provides a frictionless login experience that still maintains privacy. Thanks to the Chain Key cryptography working behind the scenes, users cannot be linked across dApps and are not at risk of having any of their data collected, scraped or hacked at any point.

The possibilities here are endless, but one of the first obvious benefits is that users will be free to anonymously interact with the web without fear of being tracked. Secondly, you also wont need to keep track of dozens of accounts and passwords or cryptographic key material.

Even better, users can have a single key that confirms who they are to the blockchain while creating an unlimited amount of pseudonym IIs that can each be unique to a specific service. So, from the user side, it will seem like just one identity, but services will each see a different name attached to it. This eliminates the ability for account information to be correlated across multiple platforms, further preserving privacy.

Users can have a different II for social media, financial activity, shopping, gaming or anything else. Users can also create multiple forms of backup for such an identity, ensuring they can retain access even if a device they were logged in on should get lost, damaged or stolen. This opens up a world where anyone can gain access to their bank account or workplace with a simple facial scan, but it will be done in a way where the user controls all data, meaning they cant be arbitrarily tracked.

So while Dorseys Web5 looks to put the control back in users hands, it may take a while for its products to take form. Fortunately, Internet Identity already has Web3 covered.

Josh Drake is the chief operating officer at DFINITY Foundation.

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even considercontributing an articleof your own!

Read More From DataDecisionMakers

Continue reading here:
Jack Dorseys Web5 is a solution to a problem thats already been solved - VentureBeat

What is Cryptography in security? What are the different types of …

Table of Contents

Cryptography is the study of securing communications from outside observers.Encryption algorithmstake the original message, orplaintext, and converts it into ciphertext, which is not understandable. The key allows the user todecryptthe message, thus ensuring on they can read the message. The strength of the randomness of anencryptionis also studied, which makes it harder for anyone to guess the key or input of the algorithm. Cryptography is how we can achieve more secure and robust connections to elevate our privacy. Advancements in cryptography makes it harder to break encryptions so that encrypted files, folders, or network connections are only accessible to authorized users.

Cryptography focuses on four different objectives:

These objectives help ensure a secure and authentic transfer of information.

Cryptography began with ciphers, the first of which was the Caesar Cipher. Ciphers were a lot easier to unravel compared to modern cryptographic algorithms, but they both used keys and plaintext. Though simple, ciphers from the past were the earliest forms of encryption. Todays algorithms and cryptosystems are much more advanced. They use multiple rounds of ciphers and encrypting the ciphertext of messages to ensure the most secure transit and storage of data. There are also methods of cryptography used now that are irreversible, maintaining the security of the message forever.

The reason for more advanced cryptography methods is due to the need for data to be protected more and more securely. Most of the ciphers and algorithms used in the early days of cryptography have been deciphered, making them useless for data protection. Todays algorithms can be deciphered, but it would require years and sometimes decades to decipher the meaning of just one message. Thus, the race to create newer and more advanced cryptography techniques continues.

Cryptography can be broken down into three different types:

Secret Key Cryptography, or symmetric cryptography, uses a single key to encrypt data. Both encryption and decryption in symmetric cryptography use the same key, making this the easiest form of cryptography. The cryptographic algorithm utilizes the key in a cipher to encrypt the data, and when the data must be accessed again, a person entrusted with the secret key can decrypt the data. Secret Key Cryptography can be used on bothin-transit and at-rest data, but is commonly only used on at-rest data, as sending the secret to the recipient of the message can lead to compromise.

Examples:

Public Key Cryptography, or asymmetric cryptography, uses two keys to encrypt data. One is used for encryption, while the other key can decrypts the message. Unlike symmetric cryptography, if one key is used to encrypt, that same key cannot decrypt the message, rather the other key shall be used.

One key is kept private, and is called the private key, while the other is shared publicly and can be used by anyone, hence it is known as the public key. The mathematical relation of the keys is such that the private key cannot be derived from the public key, but the public key can be derived from the private. The private key should not be distributed and should remain with the owner only. The public key can be given to any other entity.

Examples:

Hash functions are irreversible, one-way functions which protect the data, at the cost of not being able to recover the original message. Hashing is a way to transform a given string into a fixed length string. A good hashing algorithm will produce unique outputs for each input given. The only way to crack a hash is by trying every input possible, until you get the exact same hash. A hash can be used for hashing data (such as passwords) and in certificates.

Some of the most famous hashing algorithms are:

Continue reading here:
What is Cryptography in security? What are the different types of ...

RKVST Launches RKVST Free and RKVST Team SaaS Supply Chain Integrity, Transparency and Trust Solution – Business Wire

SANTA CLARA, Calif. & CAMBRIDGE, England--(BUSINESS WIRE)--RKVST, a leading provider of supply chain integrity, transparency and trust, announces a Free and subscription-based Team tier of its award-winning enterprise SaaS solution, allowing organizations of any size to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

The RKVST platform removes the hassles, mistakes and risk associated with the manual processes and paperwork involved in sharing data across organizations, enabling all partners in the supply chain to collaborate and work with a single source of truth. RKVST does this by capturing the identity of sources and origin of data, enforcing sharing and visibility rules with strong cryptography, and underpinning that with distributed ledger technology that prevents forgery, back-dating or shredding of evidence. Together, provenance, governance and immutability bring the right level of trust in data for faster, confident decisions with lower business risk for organizations.

Jon Geater, chief technology and product officer at RKVST, says:

With the RKVST Free tier, we are making our award-winning enterprise blockchain accessible to the mainstream market. Delivering integrity, transparency and trust to digital supply chains is now available to everyone with a single API call or a single click. RKVST ensures that the right data gets to the right place at the right time, matching the speed and complexity challenges of todays digital infrastructure and delivering the continuous assurance required for zero trust architecture.

Cost and complexity have traditionally been barriers for unifying supply chain operations, making them the preserve of large government agencies and enterprises, and where small suppliers are often left out. This creates blind spots that increase security and business risks for the entire supply chain as well as significant amounts of human resource spent auditing and validating partner data. RKVST is changing all of that by delivering a range of service options to suit organizations of every size. RKVST Free provides DevOps and R&D professionals with a try-before-you-buy option, and a free-forever service for small businesses. RKVST Team employs a pay-as-you-grow model for increased asset capacity, more features and more users per account tenancy.

Green aerospace company SATAVIA is using RKVST to provide transparent continuous asset assurance for the complex and often opaque carbon offset market in the aviation industry. By enabling aircraft operators to forecast, prevent, quantify and offset surface warming caused by aircraft-generated condensation trails or contrails, aviations per-flight climate impact can be reduced by up to 60%. SATAVIA started out using RKVST Free, transitioning to RKVST Team as their user and asset capacity needs increased.

Dr Adam Durant, chief executive officer, SATAVIA, says:

SATAVIAs ClimateTech platform DECISIONX:NETZERO optimizes aircraft flight plans for contrail prevention and quantifies climate benefit in terms of avoided surface warming. Immutable storage of flight-by-flight data, with clear oversight of provenance and governance, is a central requirement of climate benefit accounting. Were pleased to be working with RKVST to solve these technical challenges, leveraging data integrity for climate-positive activity.

The launch of RKVST Free and RKVST Team comes at a time when the push to adopt solutions that build trust and transparency is moving with unprecedented speed. The U.S. Executive Order 14028 highlights the need to transition to a zero trust mindset with supply chain transparency and trust as major pillars. The Internet Engineering Task Force (IETF) has established a new working group focused on the issues of supply chain integrity, transparency and trust, and the latest cybersecurity review from the U.K.s National Cyber Security Centre highlights the serious threats posed by supply chain attacks.

About RKVST

RKVST enables organizations to collaborate confidently and securely with partners, tracking physical and digital assets, reducing operational costs and increasing business resiliency. Customers use RKVST to provide integrity, transparency and trust for digital supply chains, solving challenges ranging from nuclear waste tracking and compliance in construction and other industries, to zero trust connected devices and software bill of materials (SBOMs). The RKVST software-as-a-service (SaaS) captures the identity of sources and origin of data, enforces sharing and visibility rules with strong cryptography, and is underpinned by distributed ledger technology that prevents forgery, back-dating or shredding of evidence. This zero trust approach, continuously verifying then trusting data, enables organizations to make confident business decisions based on verifiable data with real-time context. To learn more, visit RKVST.com.

Here is the original post:
RKVST Launches RKVST Free and RKVST Team SaaS Supply Chain Integrity, Transparency and Trust Solution - Business Wire