Blockchain : A Secure Digital Identity

We all leave comprehensive digital footprints whenever we transact online. The more platforms we use, the more digital traces we leave. Internet platforms process financial transactions, including Paypal, Credit card processors, direct banking, Google Wallet, Apple Pay, Amazon Pay, Net banking, Venmo, and cryptocurrencies. Basically, you need to disclose personal and financial data to use these services.

We definitely have a human right to identity, commencing the moment we are born. The most surface level of identity consists of one’s first and last name, date of birth, nationality, etc. Without a valid ID, one can’t own a property, business ownership, vote, or receive government services.

Have you ever been victimized by an identity threat? Calling up credit/ debit card companies to change all your card dispute charges and resetting passwords to all of your applications and worrying about whether someone may call up your cell phone provider with your leaked information to commit a SIM porting hack. And once someone has access to your texts, a gateway is created into many online services, even if you are using two-factor authentication. In the following article, we will be learning about Blockchains and how they are secure.


  1. What is BLockchain?
  2. How does Blockchain work?
  3. How private is Blockchain?
  4. Is Blockchain secure?
  5. Blockchain vs. Bitcoin
  6. Vulnerabilities in blockchain

blockchain large3

What is Blockchain?

A blockchain is a public ledger of information collected through a network that sits on top of the Internet. The information is recorded that gives blockchain its groundbreaking potential.

Blockchain is neither a company nor an app, but rather an entirely new way of documenting data on the internet. The technology is used to develop blockchain applications, like social networks, messengers, games, exchanges, storage platforms, online shops, voting systems, etc. In a sense, it is similar to the Internet, which is why some have dubbed it ‘The Internet 3.0’.

A chain of ‘blocks,’ but not in the traditional sense of words. When we say the words ‘block’ and ‘chain’ together in this context, we are actually talking about information (the ‘block) stored in a public database (the ‘chain’). 

  1. Blocks store information about transactions like date, time, and amount of your most recent purchases from online shopping websites, for example.
  2. Blocks store information about who is participating in transactions. A block for your splurge purchase from an online shop records your name along with the website. Instead of using your actual name, your purchase is recorded without any identifying information using a unique ‘digital signature.’
  3. Block stores information that distinguishes them from other blocks. Each block stores a unique code called a ‘hash’ that allows it to tell that it is apart from every other block. Even if your details of new transactions look nearly identical to your earlier purchases, the blocks are way apart because of their unique codes.

While the blocks are used to store single purchases from online shopping websites, the reality is a little different. A single block on the blockchain actually stores up to 1 MB of data. Depending on the size of the transactions, a single block can house a thousand transactions under one roof.

How does Blockchain work?

When a block stores new data, it is added to the blockchain. Multiple blocks that are strung together. However, the following are the four things that must happen:

  1. A transaction must occur.
  2. The transaction must be verified. After making the purchase, your transaction must be verified. When you make your purchase, the network of computers rushes to check that your transaction happened in a way you opted for, i.e., they confirm your details of the purchase, including the transaction’s time, date, amount, and participants.
  3. The transaction must get stored in a block. After verifying the transaction, it gets a green light and gets stored in a block where it joins hundreds or thousands of other transactions like it.
  4. The block must get an identity of a hash. A unique identifying code called hash is given to the block. Once hashed, the block is then added to the blockchain.
  5. After the new block is added to the blockchain, it becomes publicly available for anyone to view – even you! In the case of Bitcoin’s blockchain, you have access to transaction data, along with information about when (Time), where (Height), and by who (Relayed by) the block was added to the blockchain.

How Private is Blockchain?

Anyone can view the contents of the blockchain and connect their computers to the blockchain network. By doing so, their computers receive a copy of the blockchain that is updated automatically whenever a new block is added, for example, just like any social networking site- when you add posts.

Every computer in the blockchain network has its own copy of the blockchain. That means there are thousands, or in case of Bitcoins millions of copies of the same blockchain. Although each copy of the blockchain is identical, spreading that information across the networks of computers makes the information more difficult to manipulate.

The main question arises- If you cannot know who is adding blocks to the blockchain, how can you trust blockchain or the network of computers upholding it?

cloud network blockchain bitcoin storage 100745950 large

Is Blockchain Secure?

Blockchain technology accounts for the issues of security and trust in security and trust in several ways. New blocks are always stored linearly and chronologically. The new blocks are always added to the ‘end’ of the blockchain. As of February 2019, the block’s height had topped 562,000.

After the addition of the new block at the end of the blockchain, it becomes difficult to go back and alter the contents of the block. Hash codes are created by a math function that turns digital information into a string of numbers and letters.

For example, let’s say- a hacker attempts to edit your transaction from your online shopping account so that you actually have to pay for your purchase twice. As soon as they edit the dollar amount of your transaction, the block’s hash will change. The next block in the earlier chain will still contain the old hash and the hacker will need to update the block in order to cover their tracks. By doing so, this will change the block’s hash. In other words, once a block is added to the blockchain it becomes very difficult to edit and impossible to delete.

In the proof of work system, the computer must ‘prove’ that they have done ‘work’ by solving a complex computational math problem. If a computer solves one of these problems, they become eligible to add a block to the blockchain. The process of adding blocks to the blockchain it’s called ‘mining’ in the world of cryptocurrency. If a hacker wanted to coordinate an attack on the blockchain, they would need to solve complex computational math problems at 1 in 5.8 trillion odds like everyone else. The cost of organizing such an attack would almost certainly outweigh the benefits.

Blockchain vs. Bitcoin:

The goal of blockchain is to allow digital information to be recorded and distributed and not to be edited. The concept is difficult to wrap our heads without seeing the technology in action. The technology of Blockchain was first outlines in 1991 by Stuart Haber and W. Scott Stornetta, two researchers who implemented a system where document timestamps could not have tampered. Almost two decades later, with the launch of  Bitcoin in January 2009, the blockchain had it’s first real-world application.

The Bitcoin protocol is built on the blockchain. When it comes to the printed money, the use of printed currency is regulated and verified by a central authority, usually a bank or government. Transactions made in Bitcoin are verified by a network of computers as Bitcoin is not controlled by anyone.

When one person pays another for goods using Bitcoin, computers on the Bitcoin network race to verify the transactions. Whilst, a user runs a program on their computers and try to solve a complex mathematical problem, called a ‘hash’. the completed transactions are publicly recorded and stored as blocks on the blockchains and so it becomes unalterable.

The complete user data is not publicly recorded as compared to the transactions. In order to conduct transactions on the Bitcoin network, users must run a program called ‘wallet’. Each wallet consisting of two unique and distinct cryptographic keys – a public key and a private key. The key that appears on the blockchain ledger as the user’s digital signature.

However, due to the complexity of this equation, it is almost impossible to reverse the process and generate a private key from a public key. Hence, Blockchain is considered confidential.

Blockchain Technology Cybersecurity

Vulnerabilities in Blockchain:

  1. Endpoint Vulnerabilities: Endpoints are the computers that individuals and businesses use to access blockchain-based services. The process of accessing the blockchain data is the most vulnerable. For accessing the blockchain, both public and private keys re required.
  2. Vendor Risks:  Weak security on the systems, flawed codes and personnel vulnerabilities can expose the clients to unauthorized persons. Avoiding vendor-related weakness requires a thorough vetting of every vendor who will contribute to the blockchain ecosystem.
  3. Untested at Full Scale: DLT architectures are inherently scaleable. Keeping it from being corrupted is probably not hard as it may seem.
  4. Lack of Standards and Regulations: The lack of standard protocols means blockchain developers cannot easily benefit from the mistakes of others. Forced regulations, self-imposed regulations is where it will make sense.
  5. Untested Code: Blockchains are not dedicated to cryptocurrencies and are heavily experimental.
  6. Low transactions per second.
  7. Speed inefficiency.

Blockchain technology has proven itself robust and secure. This shall not mean that there are no blockchain technology problems that can affect the security of the entire ecosystem. It is still emerging technology and evolving with each passing day. Most security vulnerabilities are patches up quickly and in extreme cases, they result in a new version of blockchain.

As we head towards the third decade of Blockchain is finally making name for itself for the technology already being implemented and explored. Yes, there will be vulnerabilities, if not then how will the world prosper.

Navigating through the highlighted complex world of blockchain requires a thorough understanding of the security issues and ho to mitigate them. But on your side, you can make sure everything remains profoundly sound. Following are simple steps for keeping hackers from stealing your blockchain keys:

  1. Use a good and sturdy antivirus for Windows and Android devices and make sure you keep the systems updated.
  2. Run anti-malware scans regularly.
  3. Never store your blockchain keys in a text file like Word documents or Notepads.
  4. Never mention either of your keys in the body of an email to anyone for any purpose.

So, when all things considered, blockchain is a much better solution to storing and exchanging digital values than anything that has come before. Does that mean we are secure now? No, but then nothing is! With time technologies keep developing and improving to ensure that data or transactions are as secure as possible. That’s all folks! If you are interested in gaining more information about day-to-day cyber threats please visit the blog section to know more. As the scenario of online surveillance is becoming more and more prevalent, there are critical tools that help you stay private and secure online. Tor (The Online Router) is a powerful tool for online anonymity. Nevertheless, there is no such thing as 100% security. It is hence essential to consider its threat models and make sure that you understand what Tor can or can’t protect you against. For more information visit here!

Stay Updated. Stay Protected!

- Advertisement -

An Architect by profession & practice, Pranita is a keen observer and specialises in content, visualisation, and presentation. Cyber attacks & Architecture Technology in the far more technologically-advanced world made her realise that there is a lack of necessary awareness among people. Hence, keeping you all updated and protected by all means with subjects from Architecture Technology to Security Awareness.Currently working as a Head of Content, content writer & creator at BLARROW.TECH

- Advertisement -

Latest articles

Related articles