Researchers describe the main risk factors associated with blockchain that they know

Office Data gives you office 365 database with full contact details. If you like to buy the office database then you can discuss it here.
Post Reply
Rakhirandiseo
Posts: 398
Joined: Tue Dec 03, 2024 10:15 am

Researchers describe the main risk factors associated with blockchain that they know

Post by Rakhirandiseo »

Nine Reasons to Be Cautious with Blockchain
Alexander Zhuravlev | 03.22.2018
Blockchain is considered one of the most secure technologies for using networks . However, as a group of researchers recently stated, there are many factors for its vulnerability . The content of the scientific article they published was reported by the portal ZDNet .

Is blockchain, a network of globally distributed online ledgers, really a secure technology? Its proponents say yes, because it records transactions or smart contracts on an immutable ledger that is verifiable by multiple parties. However, a recent research paper highlights a number of blockchain vulnerabilities.

The paper, authored by Xiaoqi Li, Peng Jiang and Xiapu Luo of the pakistan whatsapp data Kong Polytechnic University, Ting Chen of the University of Electronic Science and Technology of China and Qiaoyan Wen of Peking University, argues that there are a number of vulnerabilities in blockchain that users need to be aware of.

As blockchain becomes more and more embedded in business operations, there is a need to more thoroughly examine the potential security risks that the new technology poses. As the number of decentralized applications based on blockchain increases, the authors of the article argue, “the risks of leakage of sensitive data will become more serious. The decentralized application itself, as well as the process of communication between the application and the Internet, are subject to the risks of leakage of sensitive information.” To address this problem, the authors recommend the wider use of special techniques such as code obfuscation, application security hardening, and Trusted Execution hardware technologies.
Post Reply