Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will Your Online Privacy Be Better Using Blockchain?

Will Your Online Privacy Be Better Using Blockchain?

Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the focus directed to Bitcoin, it is easy to forget that the blockchain has other uses - uses that are geared toward increased cybersecurity, transparency, and privacy.

The Sovrin Network
However, many companies haven’t forgotten, and have come together to form a nonprofit organization dedicated to creating a network that will enable far more secure online exchanges of information and credentials. This association, called the Sovrin Foundation, is working to create something called the Sovrin Network using blockchain technology.

This network would allow each user to maintain a digital wallet containing identification credentials, banking and other financial credentials, and even employment credentials or a company ID.

Their Mission
The Sovrin Foundation was founded in response to what many companies see as a fundamental flaw in the infrastructure of the Internet. After a year during which 2.9 billion records were compromised in assorted data breaches and cyberattacks, these companies have banded together to create an improved system for confirming one’s identity online that also limits the opportunity for identity-based cybercrimes.

In short, the intention is to create a standardized means of establishing digital credentials, as well as a method of verifying them as they are used. The Sovrin Foundation is leveraging blockchain technology in order to do so.

How Will It Work for the End User?
Of course, there is always the concern that people will be resistant to change, despite the benefits that this change will bring them. Furthermore, it isn’t very likely that the average layperson is suddenly going to come to the conclusion that they need to download an app that provides them with a secure online identity wallet.

That’s why organizations, like financial institutions and businesses, will be able to access these capabilities through QR codes and other, similar means of identification.

Using the blockchain, different institutions could securely contact one another in seeking out information about you, and the minimal amount of information needed to satisfy the inquiry would be shared. For example, if a user was trying to take out a bank loan and both the financial institution and their employer were a part of the blockchain network, the employer could confirm that the user meets the minimum income requirement for the loan without actually sharing the salary of the user.

In this way, the Sovrin Network would put the power to control their information back in the hands of the user.

But What If I Lose My Phone?
Let’s face it, you wouldn’t want to lose your actual wallet, never mind one that contains your entire digital identity - so what should you do if your phone is misplaced or stolen with credentials from the Sovrin Network on it?

The same thing that you should do if the same happened to your actual wallet - cancel your credentials and have new ones issued.

Is This Approach Really Better?
In so many words, yes. As a society, we are increasingly reliant on data and information to ensure our own security, and proceed with daily business as usual. Any means we have to make that security more reliable is something that we should consider.

What do you think about all this? Share your thoughts in the comments!

Technology Basics: CMS
Have You Implemented These Security Best Practices...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, July 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Business Computing Tech Term Hackers Android IT Support Malware Google Software Cybersecurity Business Management User Tips Internet Data Recovery Data Smartphone Ransomware Backup Data Backup Innovation Email Small Business Managed IT Services Windows 10 Artificial Intelligence Efficiency Cloud Productivity Computer IT Management Business Phishing Communications Cost Management BDR Hardware Business Technology Mobile Device Management Cybercrime Access Control Outsourced IT Applications Data Security Encryption Hard Drive Update Managed IT Services Saving Money Blockchain App Antivirus IT Services Collaboration Patch Management Gadgets Network Smartphones Money Social Media Data loss Tech Terms Search Hacking Business Continuity Project Management Touchscreen Save Money Mobile Device Microsoft Data Breach Office 365 Law Enforcement Passwords Start Menu Windows Browser VPN Server Internet of Things Operating System Data Management Bitcoin Facebook Disaster Recovery Maintenance Remote Monitoring Social Engineering Microsoft Office Data Protection Gmail Alert Spam Word Vulnerabilities Document Management Digital Automation Apps Bandwidth Scam Holiday Websites Laptop SaaS Conferencing Identity Theft Network Management News Analytics Travel Virtual Assistant Government How to Apple Chromebook Comparison Desktop Service Level Agreement Fake News Google Drive Devices Username Legal Downtime Virus Upgrades Emails Backup and Disaster Recovery Going Green Managed Service Provider Big Data Telephony Compliance Google Maps Hard Drive Disposal Downloads Piracy Specifications YouTube Bluetooth Download Emergency Microsoft Excel Running Cable VoIP WiFi Regulations email scam Solid State Drive VoIp Software License Television Telephone Systems Settings Wireless Headphones Printer Mobile Security Upload Vulnerability Cryptocurrency Cabling IT Support Wireless Accountants Audit Mobile Devices Mobility Mouse Consultant Administration Cleaning Paperless Office Two-factor Authentication Trends DDoS Time Management Corporate Profile Training eWaste Uninterrupted Power Supply Information Technology Managed IT Computers Database Multi-factor Authentication Gamification Worker Password Equifax Computer Care Robot Google Calendar Mobile Technology Nanotechnology Tactics Device security Excel Cloud Computing Samsung History Unified Threat Management Unified Threat Management Startup Augmented Reality Outlook SharePoint Addiction Website Content Disaster Tip of the week Vendor Mangement IBM Computing Infrastructure Google Docs Virtual Reality Distributed Denial of Service Hosted Solutions Access Automobile Screen Reader Machine Learning BYOD Business Mangement Best Practice Legislation Unified Communications Networking Communication Budget Company Culture Redundancy Freedom of Information Employer-Employee Relationship Spyware HTML Information Knowledge Cortana Printing Business Cards Software as a Service Unsupported Software Tablet Virtualization Windows 10 Twitter Marketing CrashOverride Managing Stress Multi-Factor Security Office Users Office Tips

Latest Blog

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.