Encryption

Brief Introduction To Self-Sovereign Identity

Introduction In this brief introduction to self-sovereign identity, we will talk about how we build identity systems to create trust.  Trust was something that was local and useful for establishing trust in a single domain.  The only issue with existing identity systems is that they are not trust worthy.  Still there is no good way […]

Brief Introduction To Self-Sovereign Identity Read More »

Blockchain Security

Introduction Blockchain has been the most searched term in 2017 and to date it still is.  In spite of the fact that blockchain technology has been around since 2009, with the first implementation being Bitcoin, there have not been any corporate-wide deployments yet.  There are three blockchain deployment models: Public Private Hybrid All the major

Blockchain Security Read More »

Privacy By Design

  Privacy by Design The idea of “Privacy by Design” was first introduced in 1990’s by Ann Cavoukian the Information and Privacy Commissioner of Ontario from 1997 to 2014. GDPR also has adopted it. This is taking first principles approach. Foundational Principles The approach is based on seven foundational principles [http://www.ourcommons.ca/DocumentViewer/en/42-1/ETHI/report-12/page-36#5] : Proactive, not Reactive;

Privacy By Design Read More »

Cryptocurrency Anonymity, Privacy, & Fungibility

Introduction Today I will be talking about how privacy is being addressed by various blockchain solutions. I provided a brief introduction on why privacy is needed on blockchain and some solutions trying to address it in my previous post, https://www.securityprivacyrisk.com/what-are-privacy-coins/ Anonymity, Privacy, & Fungibility When Bitcoin was introduced, it was said that transactions were anonymous.

Cryptocurrency Anonymity, Privacy, & Fungibility Read More »