区块链安全数据交换包括,区块链数据交换共享平台
请查看相关英文文档
A. Blockchain characteristics
Blockchain characteristics:
1. Anonymous/Anonymous
Due to the differences between the nodes of the blockchain The data exchange follows a fixed and predictable algorithm, so the blockchain network is trustless and can exchange data based on addresses rather than personal identities.
2. Autonomous
The blockchain adopts a consensus-based mechanism to enable all nodes in the entire system to freely and securely exchange data, record data, and update data in a trustless environment. No human intervention works.
3. Openness/Openness
The blockchain system is open, and any node can have the general ledger of the entire network. In addition to the private information of the parties directly related to the data being encrypted through asymmetric encryption technology , the data of the blockchain is open to all nodes, so the entire system information is highly transparent.
4. Programmable
The digital nature of distributed ledgers means that blockchain transactions can be associated with computational logic and are programmable in nature. Therefore, users can set algorithms and rules that automatically trigger transactions between nodes.
5. Traceability/Traceability
The blockchain stores all historical data after the creation block through the block data structure. Any piece of data on the blockchain can be traced through the chain structure. origin.
6. Untamperable/Tamper Proof
After the blockchain information passes the consensus and is added to the blockchain, it is jointly recorded by all nodes and is interconnected through cryptography to ensure that the difficulty of tampering is related to The cost is very high.
7. Collectively Maintain
The blockchain system is jointly maintained by all nodes with maintenance functions. All nodes can query blockchain data and develop related applications through public interfaces.
8. Permissionless/Permissionless
Permissionless means that all nodes can request that any transaction be added to the blockchain, but the transaction can only be carried out if all users consider it legal.
B. Blockchain knowledge: What are the characteristics of blockchain?
Blockchain knowledge: What are the characteristics of blockchain
Nowadays, blockchain has It has become an area of national concern, and many companies have already conducted in-depth research on the implementation of this technology. However, there are still a large number of people who are not familiar with the concepts related to blockchain technology. Recently, Viking Research Institute and Jiazi Think Tank jointly produced the "Blockchain Industry Dictionary". Bianews is authorized as a media partner and will popularize blockchain-related knowledge for everyone every day.
Today, Bianews will bring you a little knowledge about blockchain Chapter (2): The characteristics of blockchain
1. Anonymous/Anonymous Since the data exchange between nodes in the blockchain follows a fixed and predictable algorithm, the blockchain network does not require trust and can exchange data based on addresses rather than personal identities.
2. Autonomous/Autonomous blockchain adopts a mechanism based on consensus, allowing all nodes in the entire system to exchange data, record data, and update data freely and securely in a trustless environment. Any human intervention will doesn't work.
3. Openness/Openness The blockchain system is open, and any node can have the general ledger of the entire network. In addition to the private information of the parties directly related to the data being encrypted through asymmetric encryption technology, the blockchain The data is open to all nodes, so the entire system information is highly transparent.
4. Programmable/Programmable The digital nature of distributed ledgers means that blockchain transactions can be associated with computing logic and are programmable in nature. Therefore, users can set algorithms and rules that automatically trigger transactions between nodes.
5. Traceability/Traceability The blockchain stores all historical data after the creation block through the block data structure. Any piece of data on the blockchain can be traced back to its origin through the chain structure.
6. Cannot be tampered with/Tamper Proof. After the blockchain information is added to the blockchain through consensus, it is jointly recorded by all nodes, and is guaranteed to be interconnected through cryptography. The difficulty and cost of tampering are very high.
7. Collectively Maintain/Collectively Maintain The blockchain system is jointly maintained by all nodes with maintenance functions. All nodes can query blockchain data and develop related applications through public interfaces.
8. Permissionless/Permissionless means that all nodes can request that any transaction be added to the blockchain, but the transaction can only be carried out if all users consider it legal.
C. What is data blockchain (BlockChain) and how to explain it easier for people to understand
If you want to understand the application of blockchain, you can refer to many books and opinions, including "Illustrations" Blockchain", "Blockchain: Reshaping the Economy and the World", "New Economic Blueprint and Introduction", as well as articles from Binance Community, including a detailed understanding of the Binance Community platform, which is extremely powerful.
1. What is blockchain
Blockchain, as the name suggests, is composed of blocks and chains. It is a distributed data storage , point-to-point transmission, consensus mechanism, encryption algorithm and other new application models of computer technology. It is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable, non-forgeable, safe and trustworthy.distributed ledger.
In 2008, Satoshi Nakamoto first proposed the concept of blockchain and encrypted digital currency in his paper "Bitcoin: A Peer-to-Peer Electronic Cash System". Starting from Bitcoin, blockchain has become the underlying technology of various digital currencies.
2. The working principle of blockchain:
1. Basic concepts include: (1) Transaction: one operation will change the ledger status once, such as adding an Record; (2) Block (Block): records transactions and status data that occurred within a specified time, which is a consensus and preservation of the current ledger status; (3) Chain (Chain): blocks are connected in chronological order It is a log record of the entire state changes. After understanding the working concept of the blockchain, it is not difficult to understand its working principle. Suppose there is a distributed data record book. This record book only allows additions, deletions and changes are not allowed. Its structure is composed of "blocks" A linear chain formed in series (this is also the origin of the name "blockchain"). To add new data, it must be placed in a new block. The maintenance node can propose a new block, but it must go through a certain process. Consensus mechanism to reach agreement on the final selected block.
2. Take Bitcoin as an example to see how the blockchain works.
Bitcoin blocks are divided into two parts: block header and block body.
3. Core advantages and characteristics of blockchain
1. Verification, accounting, storage, maintenance and decentralization of blockchain data Transmission and other processes are based on a distributed system structure. There is no centralized hardware or management organization. The rights and obligations of any node are equal. The data blocks in the system are jointly maintained by nodes with maintenance functions in the entire system. 2. The open and transparent system is open. In addition to the private information of the transaction parties being encrypted, the blockchain data is open to everyone. Anyone can query the blockchain data and develop related applications through the public interface. Therefore, the entire System information is highly transparent. 3. Security Blockchain adopts consensus-based specifications and protocols (such as a set of open and transparent algorithms) to enable all nodes in the entire system to exchange data freely and securely in a trustless environment, thereby increasing trust in "people" Changed to trust in the machine, any human intervention will not work. 4. Information cannot be tampered with. Once the information is verified and added to the blockchain, it will be stored permanently. Unless more than 51% of the nodes in the system (almost impossible) can be controlled at the same time, modifications to the database on a single node will be Invalid, so the data stability and reliability of the blockchain are extremely high. 5. Anonymity Since the exchanges between nodes follow a fixed algorithm, the data interaction does not require trust (the program rules in the blockchain will judge whether the activity is valid by itself), so the counterparty does not need to reveal its identity to the other party. Generating trust is very helpful for the accumulation of credit.
4. Classification of Blockchain
ObjectFirst of all, the most mainstream classification of blockchain is based on different participants, which divides blockchain into public blockchain, private blockchain and consortium blockchain.
1. Public chain: Anyone can participate in the use and maintenance, and can obtain effective confirmation of the blockchain. The public chain is the earliest blockchain and the most widely used blockchain at present. , typically such as the Bitcoin blockchain, the information is completely public.
If a permission mechanism is introduced, it will include private chain and alliance chain. 2. Private chain: A company or individual only uses blockchain technology and has exclusive write permission to the blockchain, and the information is not made public. At present, conservative giants (traditional finance) all want to experiment with private blockchains, and the application products of private blockchains are still being explored. 3. Alliance chain: It is a blockchain between the public chain and the virtual chain, jointly controlled by multiple organizations. The use of this chain is managed with authority and can be subject to the manager or according to the manager’s wishes. Be open to others. In addition, according to the different usage scenarios and purposes of blockchain, it is divided into currency chains for the purpose of digital currency, property rights chains for the purpose of recording property rights, crowdfunding chains for the purpose of crowdfunding, etc.
5. Analysis of specific application scenarios of blockchain
1. Information anti-counterfeiting
On May 28, Tencent CEO Ma Huateng spoke at the Guiyang Digital Expo The problem of Moutai anti-counterfeiting has been raised: the anti-counterfeiting method based on cloud-based comprehensive blockchain technology will be much more efficient than traditional anti-counterfeiting methods. In future anti-counterfeiting verification scenarios, users may only need to perform a simple scan with their mobile phone to obtain a large amount of complete information based on different dimensions.
Take Moutai as an example:
Distillery address, production workshop, operating employees, inspectors, factory time, transportation vehicle information and driver information,
The vintage source of raw materials for wine, raw material suppliers, storage warehouse numbers, raw material transportation vehicles and driver information,
All information can be accurately traced, permanently recorded and cannot be tampered with.
The authenticity can be easily verified based on the above information.
2. Food safety issues
As early as November last year, Walmart had cooperated with IBM to ensure food safety by using blockchain technology to track food sources. safety and increase the circulation of food to reduce costs. For large supermarkets such as Wal-Mart, when food safety problems occurred in the past, it took several days to investigate the source of the problematic food. After using this technology, only one piece of information about the product is required. It can accurately trace the source of important information such as food origin, inspectors, suppliers, logistics and transportation, and quickly detect problems within a few minutes. Currently, products tracked using blockchain include packaging products in the United States and pork in China.
3. Information security
Blockchain technology is promoting aField information security technology changes. Three major security threats: man-in-the-middle attack, data tampering, and DDoS
(1) Identity protection
PKI is a common public key encryption used in various communication applications such as email, messaging applications, and websites. technology. However, since most PKI implementations rely on a centralized trusted third-party certification authority (CA) to issue, activate and store user certificates, hackers can attack PKI to fake user identities or crack encrypted information.
CertCoin is the first blockchain PKI implementation, coming from MIT, which removes the centralized certification center and uses the blockchain as a distributed ledger of domain names and public keys.
Pomcor Company: Blockchain PKI implementation path: retain the certification center and use the blockchain to store hash values of issued and activated certificates. Users can verify the authenticity of certificates through decentralized and transparent sources, while also improving network access performance through local authentication of keys and signatures based on blockchain copies.
(2) Data integrity protection
GuardTime has developed a keyless signature architecture (KSI) based on blockchain technology to replace key-based data authentication technology. KSI stores hashes of the original data and files on the blockchain, runs hashing algorithms to verify other copies, and compares the results with the data stored on the blockchain. Any tampering with the data will be quickly detected because the original hash table is stored on millions of nodes.
(3) Protection of critical infrastructure
The "Achilles' heel" of the Internet, DDoS has entered the TB era, and DDoS is still the easiest way for hackers to defeat large targets at low cost. As a weapon, DNS services are the primary target for hackers to carry out large-scale damage, but blockchain technology is expected to fundamentally solve it.
The distributed storage of blockchain makes hacker attacks lose focus. Nebulis is developing a distributed DNS system using the Ethereum blockchain and the InterPlanetary Internet File System (IPFS, a distributed alternative to HTTP product) to register and resolve domain names. The biggest weakness of DNS is caching. Caching makes DDoS attacks possible and is also the bane of centralized governments censoring social networks and manipulating DNS registrations. A highly transparent, distributed DNS system can effectively prevent any entity, including the government, from manipulating records.
IV. Financial Industry
(1) Digital Currency: Improving the convenience of currency issuance and use
For example, foreign Bitcoin and Ethereum, our country currently There are Nuo Compao and so on.
From the use of physical transactions, to physical currency and credit currency, to the rise of the Bitcoin network, more people are aware of the distributed ledger blockchain technology behind it, and gradually outside of digital currency applied in many scenarios.
(2) Cross-border payment and settlement: realize point-to-point transactions and reduce intermediate costs
Transfer and payment. At present, the most mature application of blockchain technology is payment and transfer.This technology can avoid complicated systems, save the process of inter-bank reconciliation and review, and speed up settlement; using virtual currency does not require the intervention of a clearing house and reduces transaction costs. The clearing procedures of each country are different. It takes 2 or 3 days for a single remittance to arrive, which is inefficient and accounts for a large proportion of funds in transit. No longer going through a third party, point-to-point payment is formed through blockchain technology. Eliminating the need for third-party institutions, you can make payments throughout the day, receive money in real time, quickly withdraw cash, and reduce hidden costs, helping to avoid financial risks. It is timely and convenient.
(3) Bills and supply chain financial business: reduce human intervention, reduce costs and operational risks
Point-to-point value transfer, physical bills or central system for control and verification; intermediary will be eliminated and human intervention reduced. Improved efficiency, smoother financing channels, lower risks, and benefits for all parties.
(4) Securities issuance and trading: realize quasi-real-time asset transfer and accelerate transaction clearing speed
The application of blockchain technology can make the securities trading process simpler, more transparent and faster , Reduce IT systems with repetitive functions and improve the efficiency of market operations. For stocks, blockchain can eliminate paper and pen or spreadsheet records, reduce human errors in transactions, and improve the transparency and traceability of trading platforms. Citi and Nasdaq collaborate to advance blockchain applications.
(5) Customer credit reporting and anti-fraud: reduce legal compliance costs and prevent financial crimes
Customer information and transaction records recorded in the blockchain help banks identify Abnormal transactions and effectively prevent fraud. The technical characteristics of blockchain can change the existing credit reporting system. When banks perform "know your customer" (KYC), the data of customers with bad records will be stored in the blockchain.
Equity crowdfunding: Equity crowdfunding based on blockchain technology can achieve decentralized trust and investors’ returns are guaranteed.
5. Supply chain management
Distributed ledger system, participants track the ownership of assets throughout the process, and can be used to track auto parts when moving between countries and factories.
Toyota is developing blockchain technology solutions for its core parts supply chain operations. Using a large amount of data helps Toyota more efficiently ensure the accuracy of recorded data and can also help manage the supply chain. At the same time, the blockchain supply chain can control warranty, repair goods-related costs and specifications through smart contracts, and transactions throughout the product life cycle are irrevocable.
The shipping industry’s first public solution, deployed by Maritime Transport International (MTI), uses blockchain supply chain technology to share Verified Gross Mass (VGM) information for shipping containers. Information about container VGM is important to ensure ships are properly stowed and to prevent accidents at sea and in ports. VGM data is stored on the blockchain supply chain, providing a permanent record for port officials, shipping companies, shippers and cargo owners. This replaces cumbersome logs, spreadsheets, data brokers and private databases.
Logistics Integrity System Truck Helps TruckBang launched a blockchain-based financial solution for logistics enterprises, aiming to provide enterprises with reliable financial services. It can not only help drivers solve the problem of loan difficulty, but also change the current situation of lack of integrity in the industry and help build a logistics integrity system. Help build the identity chain of logistics companies and create a trusted data ecosystem for logistics companies. Using a transparent, supervisory, and traceable algorithm model, we screen reliable companies that need financial support and provide them with financial services. On the other hand, at the technical level, various law enforcement departments are linked to jointly punish dishonest companies.
6. Government management
(1) Election
Based on the characteristics of blockchain technology and considering the shortcomings of current election technology, we will build an open source , Blockchain applications for elections, voting and lottery, we call it ElectionChain. We hope to optimize election and voting technology to make voting more open and transparent, reduce human manipulation, and allow voters to verify their election results.
Including identity authentication, multi-chain system, flash investment protocol, consensus algorithm EDPOS, privacy protection, voting mechanism design, decentralized ELC rental market, storage solutions, smart contracts, etc.
(2) Government services
Aiming to realize an e-government digital ecosystem based on blockchain technology and provide citizens with government services and an automated mechanism for the business of various government departments, it must be All areas of national government affairs are combined to form a common information space, including government agencies, economic data, financial transactions and social fields. This ecosystem should also include registries and corresponding software for building smart contract-based applications and platforms for government agencies, businesses and public users.
D. In what fields can blockchain be used to play its greatest role
Blockchain is a decentralized distributed database technology that has high reliability , strong security, non-tampering and other advantages, it can be used in many fields. The following are some common fields:
Financial field: Blockchain technology can be applied to digital currency, smart contracts, asset management, In terms of transaction settlement and other aspects, it can reduce intermediary costs and improve transaction efficiency and security.
Internet of Things field: Blockchain technology can be used for data exchange and value exchange between Internet of Things devices to ensure the authenticity and security of data.
Copyright protection field: Blockchain technology can be used for digital copyright protection to ensure that the rights and interests of intellectual property owners are protected.
Social media field: Blockchain technology can be used to establish a decentralized social network platform, where users can independently control their own data privacy and copyright.
Logistics field: Blockchain technology can be used for data recording and supervision in the logistics process to ensure the safety and accurate delivery of goods.
In general, blockchain technology can be applied to many fields and can achieve decentralization and security of trust mechanisms, but it needs to be based onMake technology selection and implementation plan formulation based on specific circumstances.
E. How blockchain improves security and data sharing
In view of the security features and shortcomings of existing blockchain technology, it is necessary to focus on physics, data, application systems, encryption, Build a security system in terms of risk control and other aspects to improve the security performance of the blockchain system as a whole.
1. Physical security
The network and hosts running the blockchain system should be in a protected environment. The protection measures vary according to the regulatory requirements of the specific business. They can be not limited to VPN private networks, firewalls, physical Isolation and other methods are used to protect physical networks and hosts.
2. Data security
Data exchange between nodes in the blockchain should not be transmitted in plain text in principle. For example, asymmetric encryption negotiation keys can be used, and symmetric encryption algorithms can be used to encrypt data. and decryption. Data providers should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures.
3. Application system security
The security of the application system needs to start from the aspects of identity authentication, permission system, transaction rules, anti-fraud strategy
and other aspects. The relevant personnel involved in the operation of the application, transaction nodes, Transaction data should be controlled beforehand and auditable afterward. Taking the financial blockchain as an example, a consensus algorithm with stronger fault tolerance, fraud resistance and higher performance can be used to avoid joint fraud by some nodes.
4. Key security
The keys used to encrypt communication data between blockchain nodes and to encrypt data stored on blockchain nodes should not exist in plain text on the same node and should be passed through The encryption machine keeps the private key securely. When a key is lost or leaked, the system can identify relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to invalidate the original key. Keys should also undergo strict life cycle management and should not be permanently valid and need to be replaced after a certain period of time.
5. Risk control mechanism
There should be careful detection measures for the network layer of the system, host operations, data access of the application system, transaction frequency and other dimensions, and alarms should be issued for any suspicious operations. , record, and verify. If illegal operations are discovered, damage assessment should be conducted, remediation should be carried out at the technical and business levels, security measures should be strengthened, and the source of the illegal operations should be traced to prevent further attacks.
Article source: China Blockchain Technology and Application Development White Paper
F. What is the concept of blockchain? Is blockchain a scam? The most complete explanation of blockchain< /p>
What is the concept of blockchain?
On October 25, 2019, the country advocated the development of blockchain. Overnight, the blockchain concept became popular.
However, many people are hearing about blockchain for the first time.
So, blockchainwhat is it then?
Let’s take a look at it from an academic perspective:
Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithms. Blockchain is essentially a decentralized database. As the underlying technology of Bitcoin, it is a series of data blocks generated using cryptographic methods. Each data block contains a batch of Bitcoin network transactions. Information, used to verify the validity of its information (anti-counterfeiting) and generate the next block.
In fact, blockchain is essentially a decentralized database.
Is blockchain the same as Bitcoin? Blockchain is not Bitcoin. The first application of blockchain is Bitcoin.
What are the characteristics of blockchain? Now let’s take a look at several characteristics of the blockchain:
1. Decentralization:
The most important feature of the blockchain is decentralization, and the blockchain system is different Based on a centralized database, it is not controlled by any person or entity. Through distributed storage, data is completely copied and distributed on multiple computers, and each node realizes information self-verification, transmission and management.
2. Non-tamperability:
The blockchain system also has the characteristics of non-tamperability. In the blockchain system, each node is the center and no information can be changed, not even the administrator can modify this information. The consensus mechanism of the blockchain has the characteristics of "the minority obeys the majority" and "everyone is equal". Only when more than 51% of the accounting nodes in the entire network are controlled, it is possible to forge a non-existent record. This situation is basically impossible, thus eliminating the possibility of fraud.
3. Publicity:
In a blockchain system, all nodes in the network can easily access information. The foundation of blockchain technology is open source. In addition to private information being encrypted, blockchain data is open to everyone. Anyone can query blockchain data and develop related applications through public interfaces, so the entire system information is highly transparent. .
4. Independence:
Because the blockchain is decentralized, it can facilitate peer-to-peer transactions, so there is no need for a third party whether in transaction or exchange of funds. of approval.
Based on consensus specifications and protocols, the entire blockchain system does not rely on other third parties. All nodes can automatically and securely verify and exchange data within the system without any human intervention.
Let’s assume an environment: 6 people live in dormitory 188 of the university
There is a ledger in the dormitory for Xiao Li, who is good at calculation, to keep accounts.
At the beginningWhenever he sells paper boxes or buys some public items in the dormitory, Xiao Li will record them in his account book. If Xiao Li wanted to enrich himself and made false accounts, there would be less money in the account books, but no one would know.
After all, there is already a general ledger room, who would have nothing to do to keep track of the ledgers?
However, one day, because Xiao Li took more, there were obvious errors in the account book. Now, he could no longer hide it, so Xiao Li had to admit his mistake and make up the money.
So, how to solve this problem?
If blockchain is used to solve the problem:
Everyone in the dormitory takes out a ledger, and every time a transaction occurs, everyone records it in their own ledger. , such problems will not arise, because everyone is keeping accounts and can see the transaction records and final results on the ledger.
Xiao Li can’t change, you can’t change, and neither can your lower bunk. No one can change it.
This is because the previous accounting model was a centralized accounting model, and the current accounting model is a decentralized accounting model, where everyone is the center and everyone is the accountant.
If someone wants to change it, it will obviously be ineffective if they only change the data on their own account book, unless they bribe three people.
So, is blockchain a scam?
With the emergence of the great benefits of blockchain, in a short period of time, the prices of blockchain-related assets have soared, and ordinary investors are becoming more and more interested in blockchain. And criminals have also taken aim at this. There are some criminals who put on the gorgeous cloak of "blockchain" and use the blockchain to commit fraud or issue digital currencies without permission, causing many people to think that the blockchain is a scam.
But in fact, it is not. Blockchain is just a technology. If it can be used well, it will benefit the public and promote the development of the industry.
In particular, the application of blockchain is very wide and can be applied to almost everything of value to human beings.
Medical field: For example, when you go to the hospital for medical treatment, you can directly check the previous medical treatment in your own database, which greatly saves medical resources and saves medical expenses for repeated examinations.
Food traceability: Do you know where the food on your table comes from? Which logistics team is transporting it? This information can be tracked using blockchain. It can provide us with a single source of truth.
Supply chain application: For example, when we buy a product on Moubao, the product leaves the factory, goes to the distributor for logistics turnover, goes to the seller's store warehouse, and then reaches the consumer's hands. During these processes, if something goes wrong, only you will know about it, and others, especially consumers, will not.
Well, that’s all the relevant knowledge about the concept of blockchain is introduced here, I hope it can be helpful to you.
G. How artificial intelligence in blockchain technology ensures the authenticity and security of data
Chongqing Jinwowo: Artificial intelligence has the ability to analyze massive data at high speed. As the basis of artificial intelligence, data must be accurate and secure, and there must be no forged data.
If blockchain technology is used, the authenticity and security of data can be guaranteed.
The consciousness chain forms a data collection pool by combining the two, creates an efficient data exchange center, and ultimately builds a three-dimensional and multi-functional artificial intelligence ecosystem.
H. What issues do you need to know about blockchain technology security?
I believe everyone should be familiar with blockchain technology, and today we will take a look at it together. What are the issues in the field that require our attention? Let’s start with today’s main content. Currently, most blockchain projects carried out within enterprises are so-called "private chains with permissions". Unlike public blockchains, private blockchains can only be accessed by a selected group of users who have the authority to enter, verify, record, and exchange data on the ledger. Of course, for an "outsider" who has never been allowed to join, such a network is almost impossible to break. But with the emergence of private chains, another question arises: In order to improve privacy and security, do we really need to abandon decentralization? Mike Orcutt from "MIT Technology Review" wrote that a private chain system "might make its owners feel more secure, but it really just gives them more control, meaning they can make changes regardless of whether other network participants agree or not." Such systems need to come up with balancing mechanisms to grant different levels of permissions to different user groups and perform identity checks on validators to ensure they are who they claim to be. That’s why many companies are looking for a way to have both—the decentralization of a public chain and the extra security of a private chain. Consortium chains developed by major vendors such as IBM, Corda, and Ripple currently appear to be good security options. Simply put, they provide businesses with access to centralized systems that themselves have a level of cryptographic auditability and security. Other companies are also considering how to adjust public chains to meet their security needs. For example, the Ethereum blockchain already provides mechanisms that can be used to ensure the privacy of network participants, including ring signatures, stealth addresses, and storing private data on the public chain. In general, the blockchain field is developing steadily towards new solutions that define technology-granular privacy layers for public chains, private chains, and consortium chain networks. IT training discovered by various companiesKnown vulnerabilities are being actively investigated and patched, and new mechanisms are being implemented to ensure that all parties are protected and that no malicious hacker can break into and exploit vulnerabilities in the ledger.