{"id":1545,"date":"2023-03-11T23:11:25","date_gmt":"2023-03-11T23:11:25","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1545"},"modified":"2024-05-31T23:44:31","modified_gmt":"2024-05-31T23:44:31","slug":"privatliv-og-sikkerhed-som-hovedtraek-ved-blockchain-del-3","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/blokchain\/privatliv-og-sikkerhed-som-hovedtraek-ved-blockchain-del-3\/","title":{"rendered":"Privacy og sikkerhed som de vigtigste egenskaber ved Blockchain: Del 3"},"content":{"rendered":"<p>I de to foreg\u00e5ende dele dykkede vi ned i Blockchain-teknologien, dens egenskaber og funktionaliteter. I dette sidste afsnit vil vi udforske metoder til at forbedre privatlivets fred og sikkerhed. P\u00e5 trods af fordelene er Blockchain-transaktioner dog ikke anonyme, da offentligheden kan verificere adresser, s\u00e5 de kan spore en brugers pseudonyme transaktioner.<\/p>\n\n\n\n<p>N\u00e5r en brugers faktiske identitet er forbundet med en transaktionsadresse, uds\u00e6tter det alle deres transaktioner for en potentiel risiko. For at modvirke dette har udviklere udt\u00e6nkt merge- eller flipper-tjenester, som randomiserer en brugers m\u00f8nter ved at fusionere dem med m\u00f8nter fra andre brugere. Denne metode hj\u00e6lper med at sikre brugernes anonymitet ved at forhindre sporing af deres transaktioner.<\/p>\n\n\n\n<p>Selv om blanding sl\u00f8rer ejerskabet af m\u00f8nter for eksterne observat\u00f8rer, giver blandingstjenester ikke nogen beskyttelse mod tyveri af m\u00f8nter.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"there-are-two-mixing-services-mixcoin-and-coinjoin\"><strong>Der findes to blandingstjenester: Mixcoin og CoinJoin<\/strong><\/h3>\n\n\n<p><strong>Mixcoin<\/strong> var den f\u00f8rste teknik til at forsvare sig mod passive cyberangreb ved at muligg\u00f8re anonym betaling af kryptovalutaer. Den udvidede anonymiteten ved at give alle brugere mulighed for at blande deres m\u00f8nter samtidig. Mixcoin giver anonymitet svarende til traditionel mix-kommunikation for at bek\u00e6mpe aktive cyberangreb.<\/p>\n\n\n\n<p>For at opdage tyveri bruger Mixcoin en ansvarlighedsmekanisme, der justerer incitamenterne og viser, at brugerne bruger Mixcoin rationelt uden at stj\u00e6le kryptovaluta. <\/p>\n\n\n\n<p>P\u00e5 den anden side, <strong>CoinJoin<\/strong> er den anden blandingstjeneste til anonyme kryptovaluta-transaktioner. Den bygger p\u00e5 ideen om f\u00e6lles betaling, hvor en bruger finder en anden bruger, som ogs\u00e5 \u00f8nsker at betale, og foretager en f\u00e6lles betaling i en transaktion.<\/p>\n\n\n\n<p>Ved at bruge den f\u00e6lles betalingsmetode reduceres chancerne for at forbinde input og output i en transaktion betydeligt, hvilket g\u00f8r det udfordrende at spore den n\u00f8jagtige pengestr\u00f8m for en bestemt bruger. For at bruge CoinJoin skal brugerne udveksle de transaktioner, de har til hensigt at flette sammen til en f\u00e6lles betaling. <\/p>\n\n\n\n<p>Ikke desto mindre var den f\u00f8rste generation af blandingstjenester, der leverede denne funktionalitet, afh\u00e6ngig af centraliserede servere, hvilket skabte en risiko for privatlivets fred p\u00e5 grund af tilstedev\u00e6relsen af et enkelt fejlpunkt. <\/p>\n\n\n\n<p>Disse tjenester registrerer transaktioner og dokumenterer alle f\u00e6lles betalingsdeltagere og kr\u00e6ver, at brugerne stoler p\u00e5, at tjenesteudbyderen ikke beg\u00e5r tyveri eller tillader andre at stj\u00e6le deres kryptovalutaer.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"anonymous-signatures\"><strong>Anonyme underskrifter<\/strong><\/h2>\n\n\n<p>Udviklere har skabt varianter af digital signaturteknologi, der kan give underskriveren anonymitet, kendt som anonyme signaturer. To eksempler er gruppesignatur og ringsignatur.<\/p>\n\n\n\n<p>Gruppesignering g\u00f8r det muligt for et gruppemedlem at signere en besked anonymt ved hj\u00e6lp af sin personlige hemmelige n\u00f8gle. Gruppens offentlige n\u00f8gle verificerer og autentificerer gruppesignaturen og afsl\u00f8rer kun underskriverens gruppemedlemskab.<\/p>\n\n\n\n<p>I Blockchain-systemet kr\u00e6ves der en autoriseret enhed til at oprette og administrere grupper til gruppesignering. Ringsignaturer forhindrer, at underskriverens identitet afsl\u00f8res under en tvist, og enhver bruger kan danne en \"ring\" uden yderligere konfiguration. Udtrykket \"ringsignatur\" kommer fra signaturalgoritmen, der bruger en ringformet struktur.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"homomorphic-encryption-he\"><strong>Homomorfisk kryptering (HE)<\/strong><\/h2>\n\n\n<p>Homomorfisk kryptografi anvender en kraftig kode, der muligg\u00f8r direkte beregninger p\u00e5 chiffertekst. N\u00e5r de beregnede resultater dekrypteres, giver de operationer, der udf\u00f8res p\u00e5 krypterede data, identiske resultater i klartekst. Delvist og fuldt homomorfe systemer kan gemme data p\u00e5 blockchain med minimale justeringer, hvilket sikrer, at bekymringer om privatlivets fred i forbindelse med offentlige blockchains mindskes. <\/p>\n\n\n\n<p>Denne teknik beskytter privatlivets fred og giver ubesv\u00e6ret adgang til krypterede oplysninger til h\u00e5ndtering af medarbejderudgifter, revision og andre form\u00e5l.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"attributebased-encryption-abe\"><strong>Attributbaseret kryptering (ABE)<\/strong><\/h2>\n\n\n<p>Attributbaseret kryptering er en kryptografisk metode, der definerer og styrer ciffertekst med en brugers hemmelige n\u00f8gleattributter. Dekryptering er kun mulig, hvis attributterne matcher ciffertekstens attributter. ABE er vigtig for at modvirke aftalt spil og forhindre cyberangribere i at f\u00e5 adgang til andre data. ABE er dog underudnyttet p\u00e5 grund af manglende forst\u00e5else af det grundl\u00e6ggende og effektiv implementering. I \u00f8jeblikket har ingen realtidsoperationer implementeret ABE p\u00e5 en blockchain.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"secure-multiparty-computing-mpc\"><strong>Sikker Multi-Party Computing (MPC)<\/strong><\/h2>\n\n\n<p>Secure Multi-Party Computing er en flerpartsprotokol, der i f\u00e6llesskab udf\u00f8rer beregninger p\u00e5 private datainput uden at kr\u00e6nke input-privatlivet. En cyberangriber l\u00e6rer ikke noget om input fra en autentisk part, men fra udgangen. Succesen med at bruge MPC til distribueret afstemning, privat budgivning og privat informationss\u00f8gning har gjort det til en popul\u00e6r l\u00f8sning p\u00e5 mange problemer i den virkelige verden. Den f\u00f8rste store anvendelse af MPC var i 2008 i forbindelse med en absolut auktion i Danmark. Blockchain-systemer har brugt MPC i de senere \u00e5r til at beskytte brugernes privatliv.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"noninteractive-zeroknowledge-proof-nizk\"><strong>Ikke-interaktivt nul-viden-bevis (NIZK)<\/strong><\/h2>\n\n\n<p>Non-interactive zero-knowledge Proof er en kryptografisk teknologi, der tilbyder st\u00e6rke privatlivsbevarende egenskaber. Kernekonceptet g\u00e5r ud p\u00e5 at skabe en formel test for at bekr\u00e6fte, om et program, der udf\u00f8res med input, som kun brugeren kender, kan generere offentligt tilg\u00e6ngelige resultater uden at afsl\u00f8re yderligere oplysninger.<\/p>\n\n\n\n<p>Med andre ord kan en certificator bevise over for en verifikator, at en p\u00e5stand er korrekt, uden at give nyttige oplysninger. Blockchain-applikationer gemmer alle kontosaldi i k\u00e6den i et krypteret format. Ved hj\u00e6lp af zero-knowledge proofs kan en bruger nemt bevise over for en anden bruger, at vedkommende har tilstr\u00e6kkelig saldo til en pengeoverf\u00f8rsel uden at afsl\u00f8re sin egen kontosaldo.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"trusted-execution-environment-tee-based-smart-contracts\"><strong>Trusted Execution Environment (TEE) baseret p\u00e5 smarte kontrakter:<\/strong><\/h2>\n\n\n<p>Denne teknik giver et helt isoleret milj\u00f8 for applikationen, som forhindrer andre softwareapplikationer og operativsystemer i at manipulere med og kende tilstanden af den applikation, der k\u00f8rer p\u00e5 den. Intel Guard eXtensions (SGX)-software er en repr\u00e6sentativ TEE-implementeringsteknologi.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"gamebased-smart-contracts\"><strong>Spilbaserede smarte kontrakter<\/strong><\/h2>\n\n\n<p>Spilbaserede l\u00f8sninger til verifikation af smartkontrakter er den seneste udvikling, der bruger et interaktivt \"verifikationsspil\" til at afg\u00f8re, om en beregningsopgave var vellykket eller ej. Disse l\u00f8sninger tilbyder bel\u00f8nninger for at tilskynde spillerne til at verificere beregningsopgaver og finde fejl, s\u00e5 en smart kontrakt sikkert kan udf\u00f8re en opgaveberegning med verificerbare egenskaber.<\/p>\n\n\n\n<p>I hver runde af \"verifikationsspillet\" kontrollerer verifikatoren rekursivt en mindre delm\u00e6ngde af beregningen, hvilket reducerer beregningsbelastningen p\u00e5 knudepunkterne betydeligt. Denne tilgang giver en effektiv metode til at verificere smarte kontrakter.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>Som konklusion<\/strong><\/h2>\n\n\n<p>Vi beskrev Blockchains sikkerheds- og privatlivsattributter og teknikker, der bruges til at opn\u00e5 dem i blockchain-baserede systemer og applikationer, herunder konsensusalgoritmer, shuffling, anonyme signaturer, kryptering, sikker flerpartsberegning og ikke-interaktivt nulvidensbevis samt sikker verifikation af smarte kontrakter.<\/p>\n\n\n\n<p>Selvom kun f\u00e5 blockchain-platforme kan n\u00e5 de fastsatte sikkerhedsm\u00e5l, har blockchain-sikkerhed og -privatliv f\u00e5et betydelig interesse fra akademisk forskning og industri. At forst\u00e5 Blockchains sikkerheds- og privatlivsegenskaber er afg\u00f8rende for at \u00f8ge tilliden og udvikle forsvarsteknikker og modforanstaltninger. Udvikling af lette kryptografiske algoritmer og praktiske sikkerheds- og privatlivs-metoder er afg\u00f8rende for den fremtidige udvikling af Blockchain og dens applikationer.<\/p>","protected":false},"excerpt":{"rendered":"<p>I de to foreg\u00e5ende dele dykkede vi ned i Blockchain-teknologi, dens karakteristika og funktionaliteter. I denne sidste sektion vil vi udforske metoder til at forbedre privatliv og sikkerhed. Ikke desto mindre, p\u00e5 trods af dens\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/blokchain\/privatliv-og-sikkerhed-som-hovedtraek-ved-blockchain-del-3\/\">Read more <span class=\"screen-reader-text\">Privacy og sikkerhed som de vigtigste egenskaber ved Blockchain: Del 3<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1547,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy and Security in Blockchain - Part III | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/blokchain\/privatliv-og-sikkerhed-som-hovedtraek-ved-blockchain-del-3\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy and Security in Blockchain - Part III | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/blokchain\/privatliv-og-sikkerhed-som-hovedtraek-ved-blockchain-del-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-11T23:11:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T23:44:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Privacy and security as main characteristics of the Blockchain: Part 3\",\"datePublished\":\"2023-03-11T23:11:25+00:00\",\"dateModified\":\"2024-05-31T23:44:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\"},\"wordCount\":1059,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\",\"url\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\",\"name\":\"Privacy and Security in Blockchain - Part III | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"datePublished\":\"2023-03-11T23:11:25+00:00\",\"dateModified\":\"2024-05-31T23:44:31+00:00\",\"description\":\"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"characteristics of the Blockchain\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy and security as main characteristics of the Blockchain: Part 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privatliv og sikkerhed i Blockchain - del III | Sikkerhedsbriefing","description":"Opdag blockchains privatlivs- og sikkerhedsfunktioner i del 3. L\u00e6r om TEE, spilbaserede smart contracts og mixing services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/blokchain\/privatliv-og-sikkerhed-som-hovedtraek-ved-blockchain-del-3\/","og_locale":"da_DK","og_type":"article","og_title":"Privacy and Security in Blockchain - Part III | Security Briefing","og_description":"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.","og_url":"https:\/\/securitybriefing.net\/da\/blokchain\/privatliv-og-sikkerhed-som-hovedtraek-ved-blockchain-del-3\/","og_site_name":"Security Briefing","article_published_time":"2023-03-11T23:11:25+00:00","article_modified_time":"2024-05-31T23:44:31+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"C\u00e9sar Daniel Barreto","Estimeret l\u00e6setid":"5 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Privacy and security as main characteristics of the Blockchain: Part 3","datePublished":"2023-03-11T23:11:25+00:00","dateModified":"2024-05-31T23:44:31+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/"},"wordCount":1059,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","articleSection":["Blockchain"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/","url":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/","name":"Privatliv og sikkerhed i Blockchain - del III | Sikkerhedsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","datePublished":"2023-03-11T23:11:25+00:00","dateModified":"2024-05-31T23:44:31+00:00","description":"Opdag blockchains privatlivs- og sikkerhedsfunktioner i del 3. L\u00e6r om TEE, spilbaserede smart contracts og mixing services.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","width":600,"height":369,"caption":"characteristics of the Blockchain"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Privacy and security as main characteristics of the Blockchain: Part 3"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto er en anerkendt cybersikkerhedsskribent og -ekspert, der er kendt for sin dybdeg\u00e5ende viden og evne til at forenkle komplekse cybersikkerhedsemner. Med omfattende erfaring inden for netv\u00e6rkssikkerhed og databeskyttelse bidrager han regelm\u00e6ssigt med indsigtsfulde artikler og analyser om de seneste cybersikkerhedstendenser, der uddanner b\u00e5de fagfolk og offentligheden.","url":"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=1545"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1545\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/1547"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=1545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=1545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=1545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}