Position: Home page » Blockchain » Blockchain information leakage

Blockchain information leakage

Publish: 2021-04-25 00:57:20
1. In view of the security characteristics and shortcomings of the existing blockchain technology, we need to build a security system around the physical, data, application system, encryption, risk control and other aspects to improve the security performance of the blockchain system as a whole
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks

Article source: white paper on blockchain technology and application development in China
2. Forget it, this must be a professional mine, and the power expenditure and investment in basic equipment
it's estimated that the virtual currency that ordinary people can't afford is not easy to make, so don't think about it any more.
3. Can solve, bit box is a good application proof
4. This technology not only reces the risk of the transaction, but also makes the transaction transparent, timely follow-up transaction data, effectively improves the security and reces the risk of information leakage. Now, apps like six degree chain are actively introcing this technology.
5. No. Now the communication instry is developed, but personal information leakage is serious. It's normal to have such worries, which shows that people's self-protection awareness has improved. But the proct source chain is a high-tech, using the blockchain encryption technology, will completely encrypt the user's personal information, protect the security of the user's personal information, so, don't worry about this.
6. Unknown_Error
7. As long as you don't download software, install software, install things, download things in any inexplicable place, and don't enter the account password and verification code in any open page, you won't be poisoned and divulge information. Don't be stupid enough to enter the account password of anything in other people's place. Many frauds fake other landing pages and mistakenly think it's another landing address, For example, make a fake network landing page, input your network account password on it, don't be stupid enough to log in anywhere else, you won't be poisoned, don't install things, don't download things
8. Sooner or later, there will be no damage. Apart from the speculators who take over high positions, they will not have any impact on the real economy
9. Unknown_Error
10. 1. Maintain the company's operation index system, establish data analysis model according to the business line; 2. Study the user's life cycle; 2. Draw several people's behavior habits; 3. Establish mathematical model; 4. Clarify the conclusion of the relationship; 3. Continuously improve and optimize the model and data analysis results. Need to have a bachelor degree or above in mathematics, statistics, computer economy, familiar with statistical analysis data mining, familiar with SPSS. Sad. Stata and other statistical analysis, familiar with the operation of a software. 3 is to have the ability to independently write data analysis reports, and can give suggestions. 4 has data mining related project implementation experience is preferred, later development space
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750