April 2018

Blockchain Security Tools

Introduction Basic blockchain architecture as it pertains to block creation and consensus mechanisms is very sound.  The algorithms used to accomplish the cryptographic functions might be questionable. Hence special consideration should be given to key management, key length, hashing algorithms, and the environment that activity is conducted in.  To date, none of the block chains …

Blockchain Security Tools Read More »

Blockchain Security

Introduction Blockchain has been the most searched term in 2017 and to date it still is.  In spite of the fact that blockchain technology has been around since 2009, with the first implementation being Bitcoin, there have not been any corporate-wide deployments yet.  There are three blockchain deployment models: Public Private Hybrid All the major …

Blockchain Security Read More »

Privacy By Design

  Privacy by Design The idea of “Privacy by Design” was first introduced in 1990’s by Ann Cavoukian the Information and Privacy Commissioner of Ontario from 1997 to 2014. GDPR also has adopted it. This is taking first principles approach. Foundational Principles The approach is based on seven foundational principles [http://www.ourcommons.ca/DocumentViewer/en/42-1/ETHI/report-12/page-36#5] : Proactive, not Reactive; …

Privacy By Design Read More »