Time for a privacy reckoning on blockchain


By Dylan Bushell-Embling
Friday, 11 September, 2020

Time for a privacy reckoning on blockchain

Security experts from the University of South Australia (UniSA) are calling on the ICT industry to consider developing variations of blockchain technology that take privacy seriously.

New research from the university, produced in collaboration with Charles Sturt University, suggests that the next generation of connected software and hardware could be the breaking point for issues around privacy and data protection.

According to UniSA emerging technologies researcher Dr Kirsten Wahlstrom, societies and economies are increasingly being organised around data, and that has huge implications for privacy.

“The main problem is, we’re still struggling to understand what ‘privacy’ actually means in an online world. It’s not the same as data security and protection; it’s about how individuals control their whole online identity, and expectations around that change from person to person and situation to situation,” she said.

“By now we should have smarter technologies that recognise those changing contexts and preferences, but so far that hasn’t been a priority so, in fact, emerging technologies like blockchain and the Internet of Things have the potential to further compromise people’s privacy.”

Dr Wahlstrom noted that the same features that make blockchain robust in terms of preventing fraud and manipulation also make it a privacy minefield — as well as a regulatory nightmare.

“The European Court of Justice ruled European citizens have the right to be forgotten,” Dr Wahlstrom explained, “but once someone’s details are embedded in a blockchain, the system never forgets — yes, those details might be encrypted, but they are also part of an irreversible ledger, and one that’s on the cloud.”

Alternatives being explored include a system known as Holochain, which uses a distributed hash table to break the blockchain up. This chain, instead of being stored on the cloud, sits where end users want it to sit.

“This allows individuals to verify data without disclosing all its details or permanently storing it in the cloud, but there are also still a lot of questions to answer about how this affects the long-term viability of the chain and how it obtains verifications,” Dr Wahlstrom said.

Image credit: ©stock.adobe.com/au/ayzek

Related News

Digital trust leaders outperform their peers: research

Companies categorised as leaders in implementing digital trust strategies are reaping the...

IT decision-makers believe AI is key to protect against cyber threats: report

According to reseach, 40% of Australian IT decision-makers believe the use of AI will help them...

New Relic upgrades app security testing suite

The New Relic Interactive Application Security Testing solution has been upgraded with new...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd