SlideShare a Scribd company logo
1 of 2
Download to read offline
The Different Uses Of Blockchain
Blockchain technology is a relatively new and exciting technological advancement, although it
has been a known technology for a number of years, it has not received much attention until
recently through cryptocurrency and Non-Fungible Tokens, which for a brief period took the
internet by storm.
Finance
The most common and well-known use of blockchain technology is its use as a ledger for
cryptocurrencies. In the world of cryptocurrency, this ledger stores all information and
transactions. It stores the solved mathematical equations that people have solved and then
distributes a financial reward to the solvers. This stored data is immutable (cannot be changed)
and is verified by all other machines on the network to agree that the data is correct, in order to
prevent bad actors from stealing money or faking the work to gain money. All information is
stored on the blockchain, which makes it traceable, however, a user’s identity is hidden through
the use of anonymous identifiers such as random numbers to identify users instead of their real
names, although this does mean that if someone links both the numbers and the real name then
the identity becomes revealed and cannot be hidden without a new identifier.
Real Estate
In a scenario such as the transfer of ownership of property, blockchain technology would be very
useful as it will show who owns the property, which can also be traced back to who they bought
the property from and the property’s several other previous owners. It could also show the
previous buy and sell prices to help estimate the property value. This would be a very secure
method of storing all this data, as all input data cannot be removed or changed, while making it
readily available to all those that would need it, such as estate agents.
NFTs
Non-Fungible Tokens (NFTs) are commonly used as ways to own the rights to digital art as the
ledger records all ledgers and any information cannot be changed, meaning that the blockchain
shows verifiable proof that the user owns that digital art, and only the buyer will have access to
the verifiable original piece of digital art.
Data Storage
Due to the decentralised nature of blockchain technology, it would help make data storage far
more resilient against attacks. If an attacker gained access to the network and attempted to
take, delete or replace any data then all other machines on the network would have to authorise
that request, and the attacker would be very hard-pressed to gain control over more than half of
the machines on the network. In the event that that was even managed by the attackers, then
the victim’s data would still be intact so long as it remained on at least one machine out of the
many on the network, as this one machine would be used to entirely rebuild the network. In the
event that the attackers managed to steal data, it may be encrypted, which means they may
also require an encryption key in order to gain access to the actual information. This key may be
kept on a completely separate device, such as someone's memory stick, which would likely be
completely inaccessible to the attacker.
DDoS Prevention
One form of attack that is becoming increasingly common is the Distributed Denial of Service
(DDoS) attack. In this attack, the attackers attempt to overwhelm a network by flooding it with
server requests or data. This may result in increased loading times for users that operate on this
network, or even lead to server crashes that render the network non-functional. This form of
attack is typically used to weaken and distract the victims in preparation to further penetrate and
exploit the network. Blockchain technology can be used to counter this form of attack by
creating a network that is simply too big to be effectively attacked. DDoS attacks rely on
overwhelming the hardware of a network, but with blockchain technology, anyone and everyone
have the capability to host a part of a network, so not only would attackers struggle to pin a
target (they would need the IP address of every node), but they would have to overwhelm the
potentially millions of machines powering the network.
Written by Daniel Martin Cyber

More Related Content

Similar to The Different Uses Of Block Chain.pdf

chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.ppt
jishnub8
 
Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...
Richa575316
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain Security
RagaviRaghavan
 
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pixel Crayons
 

Similar to The Different Uses Of Block Chain.pdf (20)

chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
BLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.pptBLOCKCHAIN TECHNOLOGY.ppt
BLOCKCHAIN TECHNOLOGY.ppt
 
Blockchain.pptx
Blockchain.pptxBlockchain.pptx
Blockchain.pptx
 
Blockchain based electronic voting system
Blockchain based electronic voting systemBlockchain based electronic voting system
Blockchain based electronic voting system
 
Consequences of Misusing Blockchain Technology.
Consequences of Misusing Blockchain Technology.Consequences of Misusing Blockchain Technology.
Consequences of Misusing Blockchain Technology.
 
Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...Blockchain could be a data structure that could be a growing list of informat...
Blockchain could be a data structure that could be a growing list of informat...
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Role of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in CybersecurityRole of Blockchain Technology in Cybersecurity
Role of Blockchain Technology in Cybersecurity
 
Why are cryptocurrencies important
Why are cryptocurrencies importantWhy are cryptocurrencies important
Why are cryptocurrencies important
 
Introduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrenciesIntroduction to blockchain & cryptocurrencies
Introduction to blockchain & cryptocurrencies
 
Blockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdfBlockchain- Ammar Ahmad.pdf
Blockchain- Ammar Ahmad.pdf
 
Blockchain tutorial
Blockchain tutorial Blockchain tutorial
Blockchain tutorial
 
Securing IoT Data With Blockchain - A New Age Innovation
Securing IoT Data With Blockchain - A New Age InnovationSecuring IoT Data With Blockchain - A New Age Innovation
Securing IoT Data With Blockchain - A New Age Innovation
 
Block chain technology a myriad of possibilities
Block chain technology   a myriad of possibilitiesBlock chain technology   a myriad of possibilities
Block chain technology a myriad of possibilities
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain Security
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Blockchain for business
Blockchain for businessBlockchain for business
Blockchain for business
 
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePros and Cons of Blockchain Technology: Your Complete Go-to Guide
Pros and Cons of Blockchain Technology: Your Complete Go-to Guide
 
Blockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfBlockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdf
 
BLOCKCHAIN.pptx
BLOCKCHAIN.pptxBLOCKCHAIN.pptx
BLOCKCHAIN.pptx
 

More from Daniel Martin

More from Daniel Martin (8)

Activities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, DorsetActivities To Do In And Around Poole, Dorset
Activities To Do In And Around Poole, Dorset
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
What Makes A Good Local Councillor
What Makes A Good Local CouncillorWhat Makes A Good Local Councillor
What Makes A Good Local Councillor
 
What Is The Role Of A Local Councillor
What Is The Role Of A Local CouncillorWhat Is The Role Of A Local Councillor
What Is The Role Of A Local Councillor
 
Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility Tackling Fraudulent Benefit Claims: A Council's Responsibility
Tackling Fraudulent Benefit Claims: A Council's Responsibility
 
The History Of Poole
The History Of PooleThe History Of Poole
The History Of Poole
 
Things to do in Poole
Things to do in PooleThings to do in Poole
Things to do in Poole
 
Poole Councillors .pdf
Poole Councillors .pdfPoole Councillors .pdf
Poole Councillors .pdf
 

Recently uploaded

Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
drm1699
 

Recently uploaded (20)

OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
 
Community is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletCommunity is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea Goulet
 
From Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIFrom Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST API
 
[GRCPP] Introduction to concepts (C++20)
[GRCPP] Introduction to concepts (C++20)[GRCPP] Introduction to concepts (C++20)
[GRCPP] Introduction to concepts (C++20)
 
Abortion Pill Prices Jozini ](+27832195400*)[ 🏥 Women's Abortion Clinic in Jo...
Abortion Pill Prices Jozini ](+27832195400*)[ 🏥 Women's Abortion Clinic in Jo...Abortion Pill Prices Jozini ](+27832195400*)[ 🏥 Women's Abortion Clinic in Jo...
Abortion Pill Prices Jozini ](+27832195400*)[ 🏥 Women's Abortion Clinic in Jo...
 
The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)
 
Novo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMsNovo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMs
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdf
 
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
 
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
 
Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?
 
BusinessGPT - Security and Governance for Generative AI
BusinessGPT  - Security and Governance for Generative AIBusinessGPT  - Security and Governance for Generative AI
BusinessGPT - Security and Governance for Generative AI
 
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanWorkshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
 
Abortion Clinic In Stanger ](+27832195400*)[ 🏥 Safe Abortion Pills In Stanger...
Abortion Clinic In Stanger ](+27832195400*)[ 🏥 Safe Abortion Pills In Stanger...Abortion Clinic In Stanger ](+27832195400*)[ 🏥 Safe Abortion Pills In Stanger...
Abortion Clinic In Stanger ](+27832195400*)[ 🏥 Safe Abortion Pills In Stanger...
 
Encryption Recap: A Refresher on Key Concepts
Encryption Recap: A Refresher on Key ConceptsEncryption Recap: A Refresher on Key Concepts
Encryption Recap: A Refresher on Key Concepts
 
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
 
Workshop - Architecting Innovative Graph Applications- GraphSummit Milan
Workshop -  Architecting Innovative Graph Applications- GraphSummit MilanWorkshop -  Architecting Innovative Graph Applications- GraphSummit Milan
Workshop - Architecting Innovative Graph Applications- GraphSummit Milan
 
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
Abortion Pill Prices Jane Furse ](+27832195400*)[ 🏥 Women's Abortion Clinic i...
 
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
Abortion Pills For Sale WhatsApp[[+27737758557]] In Birch Acres, Abortion Pil...
 
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with GraphGraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
 

The Different Uses Of Block Chain.pdf

  • 1. The Different Uses Of Blockchain Blockchain technology is a relatively new and exciting technological advancement, although it has been a known technology for a number of years, it has not received much attention until recently through cryptocurrency and Non-Fungible Tokens, which for a brief period took the internet by storm. Finance The most common and well-known use of blockchain technology is its use as a ledger for cryptocurrencies. In the world of cryptocurrency, this ledger stores all information and transactions. It stores the solved mathematical equations that people have solved and then distributes a financial reward to the solvers. This stored data is immutable (cannot be changed) and is verified by all other machines on the network to agree that the data is correct, in order to prevent bad actors from stealing money or faking the work to gain money. All information is stored on the blockchain, which makes it traceable, however, a user’s identity is hidden through the use of anonymous identifiers such as random numbers to identify users instead of their real names, although this does mean that if someone links both the numbers and the real name then the identity becomes revealed and cannot be hidden without a new identifier.
  • 2. Real Estate In a scenario such as the transfer of ownership of property, blockchain technology would be very useful as it will show who owns the property, which can also be traced back to who they bought the property from and the property’s several other previous owners. It could also show the previous buy and sell prices to help estimate the property value. This would be a very secure method of storing all this data, as all input data cannot be removed or changed, while making it readily available to all those that would need it, such as estate agents. NFTs Non-Fungible Tokens (NFTs) are commonly used as ways to own the rights to digital art as the ledger records all ledgers and any information cannot be changed, meaning that the blockchain shows verifiable proof that the user owns that digital art, and only the buyer will have access to the verifiable original piece of digital art. Data Storage Due to the decentralised nature of blockchain technology, it would help make data storage far more resilient against attacks. If an attacker gained access to the network and attempted to take, delete or replace any data then all other machines on the network would have to authorise that request, and the attacker would be very hard-pressed to gain control over more than half of the machines on the network. In the event that that was even managed by the attackers, then the victim’s data would still be intact so long as it remained on at least one machine out of the many on the network, as this one machine would be used to entirely rebuild the network. In the event that the attackers managed to steal data, it may be encrypted, which means they may also require an encryption key in order to gain access to the actual information. This key may be kept on a completely separate device, such as someone's memory stick, which would likely be completely inaccessible to the attacker. DDoS Prevention One form of attack that is becoming increasingly common is the Distributed Denial of Service (DDoS) attack. In this attack, the attackers attempt to overwhelm a network by flooding it with server requests or data. This may result in increased loading times for users that operate on this network, or even lead to server crashes that render the network non-functional. This form of attack is typically used to weaken and distract the victims in preparation to further penetrate and exploit the network. Blockchain technology can be used to counter this form of attack by creating a network that is simply too big to be effectively attacked. DDoS attacks rely on overwhelming the hardware of a network, but with blockchain technology, anyone and everyone have the capability to host a part of a network, so not only would attackers struggle to pin a target (they would need the IP address of every node), but they would have to overwhelm the potentially millions of machines powering the network. Written by Daniel Martin Cyber