SlideShare a Scribd company logo
1 of 21
UNLOCKING BLOCKCHAIN
FOR SECURITY
TRANSFORMATION
BRYAN K. FITE
NOVEMBER 29, 2017
ABOUT ME
AngusNo to Yes
Packet Master
Trusted Advisor
&
Herder of “Cats”
BLOCKCHAIN DEFINED
• A BLOCKCHAIN IS A DISTRIBUTED (ELECTRONIC/ONLINE) LEDGER MAINTAINED
BY A NETWORK OF PARTICIPATING NODES (COMPUTERS)
• IT RADICALLY REDUCES THE COST OF VERIFICATION AND NETWORKING
• IT DOES NOT REQUIRE TRUST - RATHER IT RELIES ON CRYPTOGRAPHY AND
GAME THEORY TO PROVIDE CONFIDENCE
OCTOBER 2008
Bitcoin: A Peer-to-Peer Electronic
Cash System
THE OLD WORLD
THE NEW WORLD
BLOCKCHAIN BONANZA
• According to @CoinMarketCap
there are 1326 “public”
cryptocurrencies available for
trading.
• It should be assumed there are
private blockchains that we
cannot track.
DENTACOI
N
CREDIT DEFAULT SWAP AGREEMENT
SUPPLY CHAIN VISIBILITY
BLOCKCHAIN DEFINED PERIMETER
http://www.blockarmour.com/
ATTENTION BASED ECONOMY
“As marketers, we face scarcity when we
want the attention of our audience, but are
competing with thousands of other
marketers, companies, people, and things
for that finite resource.”, Kimbe MacMaster
Basic Attention Token
BLOCKCHAIN BASED DIGITAL ADVERTISING
BUT WAIT THERE’S MORE…
• VOTING
• E-COMMERCE PLATFORM
• ANTI-TAMPERING/COUNTERFEIT SCHEMES
• ASSET MANAGEMENT
• CONFIGURATION MANAGEMENT DATABASE (CMDB)
• COMPLIANCE
• COMMODITY (E.G. ENERGY) TRADING
THE POWER OF BRAND, TRIBES & CONSORTIA
***Only limited by imagination and
math***
= ???+
WHAT COULD POSSIBLY GO WRONG?
DARKNETS
• Contraband: drugs, weapons and
stolen data
• Targeted hacking
• Extortion/Ransomware
• Distributed Denial of Service
attacks
• Sex trafficking
• Kidnapping
• Murder for hire
ONION ROUTING + ZERO KNOWLEDGE
SYSTEM + “TUMBLING”/MIXING + OPSEC =
ANONYMITY
BACKDOORS, BUGS & BAD CRYPTO
• PROOF OF WORK (RESOURCE THEFT)
• WALLETS
• HOT
• COLD STORAGE (OFFLINE)
• “WARM” (ESCROW)
• CONFIDENCE = TRUST + CONTROL
MINING, EXCHANGES & ICO’S
• POOLS & CAPACITY
• COLLUSION
• TRANSACTION THROTTLING – LOGICAL FUSES
• SEE ABOVE (THE POWER OF BRAND, TRIBES AND
CONSORTIA)
SLACK ATTACK
“Got Slack?”
Easter Eggs
PROCEED WITH CAUTION
• CENTRALIZATION
• BLOCKCHAIN AVAILABILITY
• TRANSACTION SPEEDS (FEES)
• CLOSED SOURCE OR LIMITED OPEN SOURCE ACTIVITY
• FORKS
• “CUSTOMER BASE”
• LACK OF DIVERSITY
• *HIDDEN DEPENDENCIES
*The Internet of Invisible Things
Q&A
@BryanFite
C’EST FINI
Thanks for your time and
attention

More Related Content

Similar to Unlocking Blockchain For Security Transformation

Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Дмитрий Плахов
 
Blockchain_FintechEvo_ver1.8_am
Blockchain_FintechEvo_ver1.8_amBlockchain_FintechEvo_ver1.8_am
Blockchain_FintechEvo_ver1.8_am
Anish Mohammed
 

Similar to Unlocking Blockchain For Security Transformation (20)

CRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptxCRYPTO CURRENCY.pptx
CRYPTO CURRENCY.pptx
 
CryptoJacking and Security: Evolution of a Hack
CryptoJacking and Security: Evolution of a HackCryptoJacking and Security: Evolution of a Hack
CryptoJacking and Security: Evolution of a Hack
 
A Blockchain Quest - Hacker House
A Blockchain Quest - Hacker HouseA Blockchain Quest - Hacker House
A Blockchain Quest - Hacker House
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101
 
Bitcoin Transaction Malleability
Bitcoin Transaction MalleabilityBitcoin Transaction Malleability
Bitcoin Transaction Malleability
 
From "Cash on the Internet" to "Digital Gold"
From "Cash on the Internet" to "Digital Gold"From "Cash on the Internet" to "Digital Gold"
From "Cash on the Internet" to "Digital Gold"
 
Blockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessBlockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your business
 
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
 
Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018Dubai Blockchain_channel_22072018
Dubai Blockchain_channel_22072018
 
Blockchain fundamentals
Blockchain fundamentalsBlockchain fundamentals
Blockchain fundamentals
 
Dom & Tom Presents: The Basics of Cryptocurrency & Blockchain
Dom & Tom Presents: The Basics of Cryptocurrency & BlockchainDom & Tom Presents: The Basics of Cryptocurrency & Blockchain
Dom & Tom Presents: The Basics of Cryptocurrency & Blockchain
 
Blockchain Knowedlge Sharing (revision 3)
Blockchain Knowedlge Sharing (revision 3) Blockchain Knowedlge Sharing (revision 3)
Blockchain Knowedlge Sharing (revision 3)
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
Blockchain_FintechEvo_ver1.8_am
Blockchain_FintechEvo_ver1.8_amBlockchain_FintechEvo_ver1.8_am
Blockchain_FintechEvo_ver1.8_am
 
Blockchain 101 presentation by fstream.io
Blockchain 101 presentation by fstream.ioBlockchain 101 presentation by fstream.io
Blockchain 101 presentation by fstream.io
 
Introduction to Blockchain, Crypto and Public Relations
Introduction to Blockchain, Crypto and Public RelationsIntroduction to Blockchain, Crypto and Public Relations
Introduction to Blockchain, Crypto and Public Relations
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Blockchain and distributed ledgers: so much more than just bitcoin
Blockchain and distributed ledgers: so much more than just bitcoinBlockchain and distributed ledgers: so much more than just bitcoin
Blockchain and distributed ledgers: so much more than just bitcoin
 
BlockChain BreakDown
BlockChain BreakDownBlockChain BreakDown
BlockChain BreakDown
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 

Recently uploaded (20)

UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 

Unlocking Blockchain For Security Transformation