SlideShare a Scribd company logo
1 of 18
Blockchain Security: Attacks and
Defense
Prof. Dr. Sonali Patil
Head, Department of Information Technology
Pimpri Chinchwad College of Engineering, Pune
Syllabus
• Unit IV - Blockchain Security: Attacks & Defense
Pseudo-anonymity vs. anonymity, Zcash and Zk-SNARKS for anonymity
preservation, attacks on Blockchains: Sybil attacks, selfish mining and 51%
attacks; Advent of Algorand, and Sharding based consensus algorithms to
prevent the attacks.
• Unit VI - Limitations of Block Chain
Myths v/s. Reality of blockchain technology.
Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 2
Bitcoin Cryptocurrency
 Introduced in :2008
 By: Satoshi Nakamoto
3
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE.
• Have you heard the name “Satoshi Nakamoto”? If you’re into crypto,
you’ve definitely heard about this infamous founder (s) of Bitcoin. Satoshi
Nakamoto is a pseudonym whose identity is still anonymous.
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 4
Pseudonymity
5
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE.
Anonymity
6
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE.
Pseudonymity Vs. Anonymity
Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 7
Sr. No. Anonymity Pseudonymity
1 It means that the identity of a person is
unknown and its actions are not trackable
(traceable).
It means that a person’s identity is
unknown, but it is possible to assign
actions to the same person.
2 Anonymity Pseudonymity, however, is a much weaker
form.
3 e.g. Zcash e.g. Bitcoin
4 it is impossible to link any transaction to a
specific person.
all the actions the person made can be
linked to this person.
5 Strong form of Anonymity Weaker Form of Anonymity
ZCash
• ZCash (ZEC) is an alt coin with the primary
motive of allowing for completely anonymous
transactions and protecting user privacy as
much as possible using advanced cryptographic
mechanisms.
• Transaction Types ZCash allows for several
different transaction types, each for exchanges
between its two different address types, private
and public (or z-addresses and t-addresses).
Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 8
zk-SNARK
• Zero-Knowledge Succinct Non-Interactive Argument of Knowledge
(zk-SNARK) refers to a proof construction where one can prove
possession of certain information, e.g. a secret key, without revealing
that information, and without any interaction between the prover and
verifier.
• A zero-knowledge proof must satisfy the following three conditions in
order to be valid:
Completeness: If the statement is true then an honest verifier can be
convinced of it by an honest prover.
Soundness: If the prover is dishonest, they can’t convince the verifier of the
soundness of the statement by lying.
Zero-Knowledge: If the statement is true, the verifier will have no idea what
the statement actually is.
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 9
Sybil Attacks
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 10
selfish mining and 51% attacks
• Selfish mining is a deceitful mining strategy on proof-of-work
blockchains in which one miner (or a group) mines a block,
withholds it privately, and eventually releases it to surpass the
honest miners’ chains to ‘steal’ the mining rewards.
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 11
Advent of Algorand
• Security: It provides military-grade security to network and consensus
protocol levels and prevents hacks/malicious attacks.
• Scalability: The upgraded PPoS algorithm enables the network to scale
thousands and thousands of people and sustain a high throughput rate
without incurring higher costs to users.
• Decentralization: As a decentralized platform, all the decisions will be taken
by the nodes participating in the network. Everyone will have a chance to
be a part of the committee that approves blocks.
Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 12
Shrading
• Splitting a blockchain into multiple pieces, or shards, and storing
them in different places
• Using sharding, it is possible for nodes to function without having to
maintain all of that data at once
• Transactions will be processes simultaneously and in parallel on each
shard
• Network nodes will process only certain specific operations and not
the all as they were doing in linear model
•
Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 13
• Sharding works with PoS
• Stakersndealing with different shards of the same blockchain, and
accordingly processing a network transaction
• Shard Sharing: Process through which the information of a shrad is
shared with other nodes
• Scalability
• Processing time
• PoS
• Problem: Security issue
Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 14
Sharding based, consensus algorithms
• Sharding is one of several popular methods being explored by
developers to increase transactional throughput. Simply stated,
sharding is a way of partitioning to spread out the computational
and storage workload across a peer-to-peer (P2P) network so
that each node isn't responsible for processing the entire
network's transactional load. Instead, each node only maintains
information related to its partition, or shard.
• The information contained in a shard can still be shared among
other nodes, which keeps the ledger decentralized and secure
because everyone can still see all the ledger entries; they
simply don't process and store all the information.
Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 15
Myths Vs Reality
• BLOCKCHAIN IS A CLOUD-BASED DATABASE
• BLOCKCHAIN IS NOT PREPARED FOR BUSINESS ADOPTION
• EVERY TRANSACTION ON BLOCKCHAIN IS ANONYMOUS
• BLOCKCHAINS ARE 100% SECURE
• ALL BLOCKCHAINS ARE PUBLIC
• BLOCKCHAIN IS EQUAL TO BITCOIN
• BLOCKCHAIN CAN JUST BE USED FOR STRENGTHENING
CRYPTOCURRENCIES LIKE BITCOIN
• BLOCKCHAIN IS THE MOST EFFECTIVE SOLUTION FOR EVERYTHING
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 16
Limitations of Blockchain
• Scalability
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 17
Thank You!!!
18
ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE.

More Related Content

Similar to PCCOER_Blockchain_FoP_Jan23.pptx

Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
AlAtfat
 

Similar to PCCOER_Blockchain_FoP_Jan23.pptx (20)

Eur par-fpdapp28082018 fn.fabrizio
Eur par-fpdapp28082018 fn.fabrizioEur par-fpdapp28082018 fn.fabrizio
Eur par-fpdapp28082018 fn.fabrizio
 
Block chain technology
Block chain technology Block chain technology
Block chain technology
 
Blockchain Tech by Iqbal Matheen.pptx
Blockchain Tech by Iqbal Matheen.pptxBlockchain Tech by Iqbal Matheen.pptx
Blockchain Tech by Iqbal Matheen.pptx
 
BASIC INTRODUCTION TO BLOCKCHAIN - JOEL SUMANTH RAJ.pdf
BASIC INTRODUCTION TO BLOCKCHAIN  - JOEL SUMANTH RAJ.pdfBASIC INTRODUCTION TO BLOCKCHAIN  - JOEL SUMANTH RAJ.pdf
BASIC INTRODUCTION TO BLOCKCHAIN - JOEL SUMANTH RAJ.pdf
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain ppt
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptx
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
The future of Fintech and Blockchain
The future of Fintech and BlockchainThe future of Fintech and Blockchain
The future of Fintech and Blockchain
 
Blockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxBlockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptx
 
Blockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptxBlockchain Technology ppt project.pptx
Blockchain Technology ppt project.pptx
 
blockchain.pdf
blockchain.pdfblockchain.pdf
blockchain.pdf
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain ppt
 
LBSNov2.pptx
LBSNov2.pptxLBSNov2.pptx
LBSNov2.pptx
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Technical seminar blockchain.pptx
Technical seminar blockchain.pptxTechnical seminar blockchain.pptx
Technical seminar blockchain.pptx
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docxUnlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
Unlocking the Potential of Cross-Chain Bridging_ A Deep Dive.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

PCCOER_Blockchain_FoP_Jan23.pptx

  • 1. Blockchain Security: Attacks and Defense Prof. Dr. Sonali Patil Head, Department of Information Technology Pimpri Chinchwad College of Engineering, Pune
  • 2. Syllabus • Unit IV - Blockchain Security: Attacks & Defense Pseudo-anonymity vs. anonymity, Zcash and Zk-SNARKS for anonymity preservation, attacks on Blockchains: Sybil attacks, selfish mining and 51% attacks; Advent of Algorand, and Sharding based consensus algorithms to prevent the attacks. • Unit VI - Limitations of Block Chain Myths v/s. Reality of blockchain technology. Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 2
  • 3. Bitcoin Cryptocurrency  Introduced in :2008  By: Satoshi Nakamoto 3 ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE.
  • 4. • Have you heard the name “Satoshi Nakamoto”? If you’re into crypto, you’ve definitely heard about this infamous founder (s) of Bitcoin. Satoshi Nakamoto is a pseudonym whose identity is still anonymous. ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 4
  • 5. Pseudonymity 5 ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE.
  • 6. Anonymity 6 ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE.
  • 7. Pseudonymity Vs. Anonymity Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 7 Sr. No. Anonymity Pseudonymity 1 It means that the identity of a person is unknown and its actions are not trackable (traceable). It means that a person’s identity is unknown, but it is possible to assign actions to the same person. 2 Anonymity Pseudonymity, however, is a much weaker form. 3 e.g. Zcash e.g. Bitcoin 4 it is impossible to link any transaction to a specific person. all the actions the person made can be linked to this person. 5 Strong form of Anonymity Weaker Form of Anonymity
  • 8. ZCash • ZCash (ZEC) is an alt coin with the primary motive of allowing for completely anonymous transactions and protecting user privacy as much as possible using advanced cryptographic mechanisms. • Transaction Types ZCash allows for several different transaction types, each for exchanges between its two different address types, private and public (or z-addresses and t-addresses). Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 8
  • 9. zk-SNARK • Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) refers to a proof construction where one can prove possession of certain information, e.g. a secret key, without revealing that information, and without any interaction between the prover and verifier. • A zero-knowledge proof must satisfy the following three conditions in order to be valid: Completeness: If the statement is true then an honest verifier can be convinced of it by an honest prover. Soundness: If the prover is dishonest, they can’t convince the verifier of the soundness of the statement by lying. Zero-Knowledge: If the statement is true, the verifier will have no idea what the statement actually is. ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 9
  • 10. Sybil Attacks ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 10
  • 11. selfish mining and 51% attacks • Selfish mining is a deceitful mining strategy on proof-of-work blockchains in which one miner (or a group) mines a block, withholds it privately, and eventually releases it to surpass the honest miners’ chains to ‘steal’ the mining rewards. ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 11
  • 12. Advent of Algorand • Security: It provides military-grade security to network and consensus protocol levels and prevents hacks/malicious attacks. • Scalability: The upgraded PPoS algorithm enables the network to scale thousands and thousands of people and sustain a high throughput rate without incurring higher costs to users. • Decentralization: As a decentralized platform, all the decisions will be taken by the nodes participating in the network. Everyone will have a chance to be a part of the committee that approves blocks. Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 12
  • 13. Shrading • Splitting a blockchain into multiple pieces, or shards, and storing them in different places • Using sharding, it is possible for nodes to function without having to maintain all of that data at once • Transactions will be processes simultaneously and in parallel on each shard • Network nodes will process only certain specific operations and not the all as they were doing in linear model • Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 13
  • 14. • Sharding works with PoS • Stakersndealing with different shards of the same blockchain, and accordingly processing a network transaction • Shard Sharing: Process through which the information of a shrad is shared with other nodes • Scalability • Processing time • PoS • Problem: Security issue Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 14
  • 15. Sharding based, consensus algorithms • Sharding is one of several popular methods being explored by developers to increase transactional throughput. Simply stated, sharding is a way of partitioning to spread out the computational and storage workload across a peer-to-peer (P2P) network so that each node isn't responsible for processing the entire network's transactional load. Instead, each node only maintains information related to its partition, or shard. • The information contained in a shard can still be shared among other nodes, which keeps the ledger decentralized and secure because everyone can still see all the ledger entries; they simply don't process and store all the information. Faculty Orientation Program on Honor Course “BLOCKCHAIN TECHNOLOGY", by PCCoER, PUNE. 15
  • 16. Myths Vs Reality • BLOCKCHAIN IS A CLOUD-BASED DATABASE • BLOCKCHAIN IS NOT PREPARED FOR BUSINESS ADOPTION • EVERY TRANSACTION ON BLOCKCHAIN IS ANONYMOUS • BLOCKCHAINS ARE 100% SECURE • ALL BLOCKCHAINS ARE PUBLIC • BLOCKCHAIN IS EQUAL TO BITCOIN • BLOCKCHAIN CAN JUST BE USED FOR STRENGTHENING CRYPTOCURRENCIES LIKE BITCOIN • BLOCKCHAIN IS THE MOST EFFECTIVE SOLUTION FOR EVERYTHING ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 16
  • 17. Limitations of Blockchain • Scalability ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE. 17
  • 18. Thank You!!! 18 ISTE/AICTE Approved One Week Refresher Course on “BLOCKCHAIN TECHNOLOGIES AND IT'S USES", by MMCOE, PUNE.