{"id":1540,"date":"2023-03-07T23:59:39","date_gmt":"2023-03-07T23:59:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1540"},"modified":"2023-03-07T23:59:39","modified_gmt":"2023-03-07T23:59:39","slug":"adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-2-resz","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-2-resz\/","title":{"rendered":"A blokkl\u00e1nc f\u0151 jellemz\u0151i: adatv\u00e9delem \u00e9s biztons\u00e1g: 2. r\u00e9sz"},"content":{"rendered":"<p>In the first section, we briefly discuss Blockchain\u2019s most recent security and privacy developments as well as its operation and security measures. We will quickly discuss the privacy and security features of Blockchain technology in this second section.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"security-and-privacy-properties-of-blockchain\"><strong>A Blockchain biztons\u00e1gi \u00e9s adatv\u00e9delmi tulajdons\u00e1gai<\/strong><\/h2>\n\n\n<p>A Blockchain technol\u00f3gi\u00e1nak meg kell felelnie egy sor biztons\u00e1gi \u00e9s adatv\u00e9delmi k\u00f6vetelm\u00e9nynek az online tranzakci\u00f3k sor\u00e1n. Eddig h\u00e9t j\u00f3l ismert \u00e9s alaposan tanulm\u00e1nyozott jellemz\u0151 l\u00e9tezik, amelyeket az al\u00e1bbiakban r\u00f6viden ismertet\u00fcnk:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>F\u0151k\u00f6nyvi konzisztencia az int\u00e9zm\u00e9nyek k\u00f6z\u00f6tt<\/strong>: Ez a jellemz\u0151 a p\u00e9nz\u00fcgyi int\u00e9zm\u00e9nyek k\u00f6z\u00f6tti egyeztet\u00e9si, elsz\u00e1mol\u00e1si \u00e9s kiegyenl\u00edt\u00e9si folyamatokra vonatkozik. Ezek az entit\u00e1sok k\u00fcl\u00f6nb\u00f6z\u0151 architekt\u00far\u00e1kkal \u00e9s \u00fczleti m\u0171veletekkel rendelkeznek, amelyek gyakran manu\u00e1lis folyamatokat ig\u00e9nyelnek. Ezek a manu\u00e1lis folyamatok nemcsak magas tranzakci\u00f3s d\u00edjakat eredm\u00e9nyeznek a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra, hanem a f\u0151k\u00f6nyveket is hajlamoss\u00e1 teszik a hib\u00e1kra \u00e9s elt\u00e9r\u00e9sekre a k\u00fcl\u00f6nb\u00f6z\u0151 int\u00e9zm\u00e9nyek k\u00f6z\u00f6tt. A Blockchain technol\u00f3gia lehet\u0151v\u00e9 teszi a konzisztens f\u0151k\u00f6nyv szabv\u00e1nyos\u00edt\u00e1s\u00e1t a banki int\u00e9zm\u00e9nyek k\u00f6z\u00f6tt, mik\u00f6zben alkalmazkodik az egyedi folyamataikhoz.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tranzakci\u00f3s integrit\u00e1s:<\/strong> Amikor online tranzakci\u00f3kkal foglalkozunk, amelyek befektet\u00e9ssel \u00e9s vagyonkezel\u00e9ssel kapcsolatosak, t\u00f6bbf\u00e9le eszk\u00f6zt, mint p\u00e9ld\u00e1ul r\u00e9szv\u00e9nyeket, k\u00f6tv\u00e9nyeket, jegyzeteket, j\u00f6vedelemkimutat\u00e1sokat \u00e9s let\u00e9ti igazol\u00e1sokat, k\u00fcl\u00f6nb\u00f6z\u0151 k\u00f6zvet\u00edt\u0151k fel\u00fcgyelnek. Ez a helyzet nemcsak n\u00f6veli a tranzakci\u00f3s k\u00f6lts\u00e9geket, hanem a tan\u00fas\u00edtv\u00e1ny hamis\u00edt\u00e1s\u00e1nak lehet\u0151s\u00e9g\u00e9t is mag\u00e1ban hordozza. A Blockchain technol\u00f3gia alkalmaz\u00e1s\u00e1val a tranzakci\u00f3k integrit\u00e1sa megmarad, \u00e9s b\u00e1rmilyen manipul\u00e1ci\u00f3 hat\u00e9konyan megakad\u00e1lyozhat\u00f3.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rendszer \u00e9s adat el\u00e9rhet\u0151s\u00e9ge:<\/strong> Az online rendszerek felhaszn\u00e1l\u00f3inak b\u00e1rmikor, b\u00e1rhol hozz\u00e1f\u00e9rni\u00fck kell a tranzakci\u00f3s adatokhoz. Az el\u00e9rhet\u0151s\u00e9g itt mind a rendszer szintj\u00e9re, mind a tranzakci\u00f3 szintj\u00e9re vonatkozik. A rendszernek megb\u00edzhat\u00f3an kell m\u0171k\u00f6dnie a rendszer szintj\u00e9n, m\u00e9g akkor is, ha a tranzakci\u00f3 szintj\u00e9n h\u00e1l\u00f3zati t\u00e1mad\u00e1s t\u00f6rt\u00e9nik. A felhaszn\u00e1l\u00f3k hozz\u00e1f\u00e9rhetnek a tranzakci\u00f3s adatokhoz an\u00e9lk\u00fcl, hogy azok el\u00e9rhetetlenek, k\u00f6vetkezetlenek vagy s\u00e9r\u00fcltek lenn\u00e9nek.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Kett\u0151s k\u00f6lt\u00e9s megel\u0151z\u00e9se: Blockchain<\/strong> technol\u00f3gi\u00e1nak meg kell akad\u00e1lyoznia a kett\u0151s k\u00f6lt\u00e9st, azaz a digit\u00e1lis valuta t\u00f6bbsz\u00f6ri elk\u00f6lt\u00e9s\u00e9t. A k\u00f6zpontos\u00edtott k\u00f6rnyezetben egy megb\u00edzhat\u00f3 k\u00f6zponti harmadik f\u00e9l felel\u0151s annak ellen\u0151rz\u00e9s\u00e9\u00e9rt, hogy egy digit\u00e1lis valut\u00e1t kett\u0151s k\u00f6lt\u00e9sre haszn\u00e1ltak-e. Er\u0151s biztons\u00e1gi mechanizmusokra \u00e9s ellenint\u00e9zked\u00e9sekre van sz\u00fcks\u00e9g\u00fcnk a kett\u0151s k\u00f6lt\u00e9s tranzakci\u00f3k megel\u0151z\u00e9s\u00e9re a decentraliz\u00e1lt h\u00e1l\u00f3zati k\u00f6rnyezetben.<\/li>\n<\/ul>\n\n\n\n<p><strong>Tranzakci\u00f3s integrit\u00e1s:<\/strong> Sz\u00e1mos k\u00f6zvet\u00edt\u0151 felel\u0151s k\u00fcl\u00f6nb\u00f6z\u0151 eszk\u00f6z\u00f6k kezel\u00e9s\u00e9\u00e9rt, bele\u00e9rtve a r\u00e9szv\u00e9nyeket, k\u00f6tv\u00e9nyeket, jegyzeteket, j\u00f6vedelemkimutat\u00e1sokat \u00e9s let\u00e9ti igazol\u00e1sokat, amikor online tranzakci\u00f3kr\u00f3l van sz\u00f3, amelyek vagyonkezel\u00e9ssel \u00e9s befektet\u00e9ssel kapcsolatosak. Ez a k\u00f6r\u00fclm\u00e9ny nemcsak n\u00f6veli a tranzakci\u00f3s k\u00f6lts\u00e9geket, hanem a tan\u00fas\u00edtv\u00e1ny csal\u00e1s\u00e1nak kock\u00e1zat\u00e1t is n\u00f6veli. A Blockchain technol\u00f3gia alkalmaz\u00e1s\u00e1val a tranzakci\u00f3k integrit\u00e1sa megmarad, \u00e9s a manipul\u00e1ci\u00f3 hat\u00e9konyan elker\u00fclhet\u0151.<\/p>\n\n\n\n<p><strong>Tranzakci\u00f3s titkoss\u00e1g:<\/strong> Az online p\u00e9nz\u00fcgyi tranzakci\u00f3k t\u00f6bbs\u00e9g\u00e9ben a felhaszn\u00e1l\u00f3k korl\u00e1tozott kitetts\u00e9get szeretn\u00e9nek a tranzakci\u00f3s r\u00e9szleteik \u00e9s sz\u00e1mlainform\u00e1ci\u00f3ik tekintet\u00e9ben egy e-kereskedelmi rendszerben. Ez mag\u00e1ban foglalja: 1) a jogosulatlan felhaszn\u00e1l\u00f3k megakad\u00e1lyoz\u00e1s\u00e1t a tranzakci\u00f3s inform\u00e1ci\u00f3khoz val\u00f3 hozz\u00e1f\u00e9r\u00e9sben; 2) a rendszergazd\u00e1k \u00e9s a h\u00e1l\u00f3zati r\u00e9sztvev\u0151k megtilt\u00e1s\u00e1t, hogy a felhaszn\u00e1l\u00f3i inform\u00e1ci\u00f3kat m\u00e1sokkal hozz\u00e1j\u00e1rul\u00e1s n\u00e9lk\u00fcl k\u00f6z\u00f6lj\u00e9k; \u00e9s 3) a felhaszn\u00e1l\u00f3i adatok k\u00f6vetkezetes \u00e9s biztons\u00e1gos t\u00e1rol\u00e1s\u00e1nak \u00e9s hozz\u00e1f\u00e9r\u00e9s\u00e9nek biztos\u00edt\u00e1s\u00e1t, m\u00e9g el\u0151re nem l\u00e1that\u00f3 hib\u00e1k vagy rosszindulat\u00fa kibert\u00e1mad\u00e1sok eset\u00e9n is.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Felhaszn\u00e1l\u00f3i identit\u00e1s anonimit\u00e1sa:<\/strong> Blockchain technology must respect users\u2019 right of anonymity and solves the difficulty of efficiently and securely sharing user data among various financial institutions.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tranzakci\u00f3k \u00f6sszekapcsol\u00e1s\u00e1nak megsz\u00fcntet\u00e9se:<\/strong> unlike anonymity, the Blockchain guarantees users that transactions related to themselves cannot be linked because otherwise, all transactions relevant to a user can be linked, making it easier to infer information about the user, such as account balance and the type and frequency of your transactions. The cyber attacker can confidently guess the user\u2019s true identity using statistical data about transactions and accounts and previous knowledge about a user. For that reason, Blockchain technology must guarantee the aforementioned unblinking.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"basic-security-properties-in-blockchain-technology\"><strong>Alapvet\u0151 biztons\u00e1gi tulajdons\u00e1gok a Blockchain technol\u00f3gi\u00e1ban<\/strong><\/h2>\n\n\n<p>A Blockchain technol\u00f3gia alapvet\u0151 biztons\u00e1gi tulajdons\u00e1gai a kriptogr\u00e1fia fejl\u0151d\u00e9s\u00e9b\u0151l sz\u00e1rmaznak, \u00e9s fejl\u0151d\u00e9se a Bitcoin tervez\u00e9s\u00e9vel \u00e9s megval\u00f3s\u00edt\u00e1s\u00e1val n\u0151tt. A Blockchain technol\u00f3gia alapvet\u0151 biztons\u00e1gi \u00e9s adatv\u00e9delmi tulajdons\u00e1gainak \u00f6sszefoglal\u00e1sa az al\u00e1bbiakban tal\u00e1lhat\u00f3:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Konzisztencia:<\/strong> A Blockchain kontextus\u00e1ban ez a fogalom a glob\u00e1lis f\u0151k\u00f6nyvi elosztott rendszerre utal, ahol minden csom\u00f3pont egyszerre rendelkezik ugyanazzal a f\u0151k\u00f6nyvvel. Vannak Blockchainek, amelyek v\u00e9g\u00fcl vagy gyeng\u00e9n konzisztenss\u00e9 v\u00e1lnak, \u00e9s m\u00e1s Blockchainek, amelyek er\u0151s konzisztenci\u00e1val rendelkeznek. A v\u00e9gs\u0151 konzisztencia modell azt jelenti, hogy a blockchain minden rendszer csom\u00f3pontj\u00e1n v\u00e9g\u00fcl konzisztenss\u00e9 v\u00e1lik, b\u00e1r n\u00e9h\u00e1ny olvas\u00e1si\/\u00edr\u00e1si k\u00e9r\u00e9s a blockchainhez elavult adatokat adhat vissza. Ezzel szemben az er\u0151s konzisztencia azt jelenti, hogy minden csom\u00f3pont egyszerre rendelkezik ugyanazzal a f\u0151k\u00f6nyvvel, \u00e9s amikor az elosztott f\u0151k\u00f6nyv \u00faj adatokkal friss\u00fcl, minden k\u00e9s\u0151bbi k\u00e9r\u00e9snek v\u00e1rnia kell, am\u00edg ez a friss\u00edt\u00e9s elk\u00f6telez\u0151dik.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Manipul\u00e1ci\u00f3val szembeni ellen\u00e1ll\u00e1s:<\/strong> Ez a tulajdons\u00e1g a sz\u00e1nd\u00e9kos manipul\u00e1ci\u00f3val vagy egy entit\u00e1s manipul\u00e1ci\u00f3j\u00e1val szembeni ellen\u00e1ll\u00e1sra utal, legyen az egy rendszer, egy term\u00e9k vagy egy m\u00e1sik logikai vagy fizikai objektum. A blockchainben a manipul\u00e1ci\u00f3val szembeni ellen\u00e1ll\u00e1s azt jelenti, hogy a blockchainben t\u00e1rolt tranzakci\u00f3s inform\u00e1ci\u00f3k nem manipul\u00e1lhat\u00f3k a blokk gener\u00e1l\u00e1si folyamat sor\u00e1n \u00e9s ut\u00e1n.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DDoS t\u00e1mad\u00e1sokkal szembeni ellen\u00e1ll\u00e1s:<\/strong> A denial of service (DoS) attack disrupts hosted Internet services by making the host machine or network resource on the host unavailable to its intended users. DoS attacks attempt to overload the host system or host network resource by flooding it with superfluous requests, thus stalling the performance of legitimate services. A DDoS attack is referred to as a \u201cdistributed\u201d DoS attack, that is, the attack floods a victim with incoming traffic originating from many disparate sources distributed across the Internet.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The attacker can compromise and use an individual\u2019s computer to attack another by taking advantage of security vulnerabilities or weaknesses. By leveraging a pool of computers, a DDoS attacker can send large amounts of data to a hosting website or spam particular email addresses. This makes it very hard to stop the attack by just jamming one source at a time.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Kett\u0151s k\u00f6lt\u00e9s t\u00e1mad\u00e1sokkal szembeni ellen\u00e1ll\u00e1s:<\/strong> a kett\u0151s k\u00f6lt\u00e9s t\u00e1mad\u00e1s a Blockchainen egy speci\u00e1lis probl\u00e9ma, amely egyed\u00fcl\u00e1ll\u00f3 a digit\u00e1lis valuta tranzakci\u00f3kra. Vegy\u00fck figyelembe, hogy a kett\u0151s k\u00f6lt\u00e9s t\u00e1mad\u00e1st \u00e1ltal\u00e1nos biztons\u00e1gi probl\u00e9m\u00e1nak lehet tekinteni, mivel a digit\u00e1lis inform\u00e1ci\u00f3 viszonylag k\u00f6nnyen reproduk\u00e1lhat\u00f3. K\u00fcl\u00f6n\u00f6sen a digit\u00e1lis tokenek, p\u00e9ld\u00e1ul az elektronikus valuta cser\u00e9j\u00e9vel kapcsolatos tranzakci\u00f3k eset\u00e9n fenn\u00e1ll annak a kock\u00e1zata, hogy a birtokos megdupl\u00e1zhatja a digit\u00e1lis tokent, \u00e9s azonos tokeneket k\u00fcldhet t\u00f6bb c\u00edmzettnek. Ha inkonzisztencia l\u00e9phet fel a digit\u00e1lis token tranzakci\u00f3k duplik\u00e1ci\u00f3ja miatt. A kett\u0151s k\u00f6lt\u00e9s elker\u00fcl\u00e9se \u00e9rdek\u00e9ben minden tranzakci\u00f3t \u00e9rt\u00e9kelnek \u00e9s hiteles\u00edtik a blockchain tranzakci\u00f3s nyilv\u00e1ntart\u00e1sai alapj\u00e1n egy konszenzus protokoll seg\u00edts\u00e9g\u00e9vel. <\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Az \u00f6sszes tranzakci\u00f3 biztos\u00edt\u00e1s\u00e1val a blockchainben a konszenzus protokoll lehet\u0151v\u00e9 teszi, hogy mindenki nyilv\u00e1nosan ellen\u0151rizze a tranzakci\u00f3kat egy blokkban, miel\u0151tt a blokkot a glob\u00e1lis blockchainhez k\u00f6tn\u00e9, biztos\u00edtva, hogy minden tranzakci\u00f3 k\u00fcld\u0151je csak a jogszer\u0171en birtokolt digit\u00e1lis valut\u00e1kat k\u00f6ltse el. Ezenk\u00edv\u00fcl minden tranzakci\u00f3t a k\u00fcld\u0151je al\u00e1\u00edr egy biztons\u00e1gos digit\u00e1lis al\u00e1\u00edr\u00e1si algoritmussal. Ez biztos\u00edtja, hogy az ellen\u0151rz\u0151 k\u00f6nnyen \u00e9szlelhesse a tranzakci\u00f3t, ha valaki meghamis\u00edtja azt. A digit\u00e1lisan al\u00e1\u00edrt tranzakci\u00f3k \u00e9s a tranzakci\u00f3k nyilv\u00e1nos ellen\u0151rz\u00e9s\u00e9nek t\u00f6bbs\u00e9gi konszenzussal val\u00f3 kombin\u00e1ci\u00f3ja biztos\u00edtja, hogy a blockchain ellen\u00e1lljon a kett\u0151s k\u00f6lt\u00e9s t\u00e1mad\u00e1s\u00e1nak.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>T\u00f6bbs\u00e9gi ellen\u00e1ll\u00e1s vagy konszenzus t\u00e1mad\u00e1s:<\/strong> ez a t\u00e1mad\u00e1s a t\u00f6bbs\u00e9gi konszenzus protokollban val\u00f3 csal\u00e1s kock\u00e1zataira utal. Az egyik ilyen kock\u00e1zatot gyakran 51% t\u00e1mad\u00e1snak nevezik, k\u00fcl\u00f6n\u00f6sen a kett\u0151s k\u00f6lt\u00e9s kontextus\u00e1ban. P\u00e9ld\u00e1ul a 51% t\u00e1mad\u00e1s akkor fordulhat el\u0151, ha rosszindulat\u00fa b\u00e1ny\u00e1szok jelenl\u00e9t\u00e9ben egy b\u00e1ny\u00e1sz a sz\u00e1m\u00edt\u00e1si teljes\u00edtm\u00e9ny t\u00f6bb mint 50%-j\u00e9t ir\u00e1ny\u00edtja a blockchain, a kriptovaluta kereskedelm\u00e9nek \u00f6sszes tranzakci\u00f3j\u00e1nak elosztott f\u0151k\u00f6nyv\u00e9nek fenntart\u00e1s\u00e1ra.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pszedonimit\u00e1s:<\/strong> this property refers to a state of disguised identity. For example, in Bitcoin, addresses on the Blockchain are hashes of the public keys of a node or user on the network. Users can interact with the system using their public key hash as their pseudo-identity without revealing their real names. Therefore, a user\u2019s address can be seen as a pseudo-identity. We may consider a system\u2019s pseudonym private property to protect a user\u2019s actual name. Also, users can generate as many key pairs (multiple addresses) as they want, similar to how a person can create as many bank accounts as they want.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u00d6sszekapcsolhatatlans\u00e1g:<\/strong> refers to the inability to establish the relationship between two observations or two observed entities of the system with high confidence. Anonymity refers to the state of being anonymous and unidentified. Although the blockchain ensures pseudonym by offering pseudo-identity as a support for the anonymity of a user\u2019s identity, it does not provide users with the protection of untying their transactions. <\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Intuitively, a user\u2019s complete anonymity can only be protected by ensuring both the pseudonym and unlinking if the user always uses her pseudo-identity to interact with the system. This is because unbinding makes it difficult to launch anonymization inference attacks, which link a user\u2019s transactions to discover their true identity in the presence of prior knowledge. Specifically, a user can have several pseudonymous addresses in systems similar to Bitcoin.  However, this does not provide perfect anonymity for Blockchain users because each transaction with the sender and recipient addresses is recorded in the ledger and is freely traceable by anyone using the associated sender and recipient addresses. Thus, anyone can relate a user\u2019s transaction to other transactions involving their accounts through a simple statistical analysis of the addresses used.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tranzakci\u00f3k titkoss\u00e1ga \u00e9s adatv\u00e9delem:<\/strong> Az adatv\u00e9delem a Blockchainben arra a tulajdons\u00e1gra utal, amely biztos\u00edthatja az \u00f6sszes adat vagy bizonyos \u00e9rz\u00e9keny adatok titkoss\u00e1g\u00e1t, amelyek benne vannak t\u00e1rolva. P\u00e9ld\u00e1ul a blockchain haszn\u00e1lhat\u00f3 okos szerz\u0151d\u00e9sek, szerz\u0151i joggal v\u00e9dett m\u0171vek \u00e9s kereskedelmi l\u00e1ncok vagy szervezetek digitaliz\u00e1l\u00e1s\u00e1nak kezel\u00e9s\u00e9re. Nem meglep\u0151, hogy a tranzakci\u00f3s inform\u00e1ci\u00f3k, p\u00e9ld\u00e1ul a tranzakci\u00f3 tartalma \u00e9s c\u00edmei titkoss\u00e1ga k\u00f6z\u00f6s biztons\u00e1gi tulajdons\u00e1g minden Blockchain alkalmaz\u00e1sban.<\/li>\n<\/ul>\n\n\n\n<p>In resume, data privacy in recent decades has shown the risks of privacy leakage due to various inference attacks, linking sensitive transaction data and\/or pseudonyms to the true identity of real users, even if only used a pseudonym. Leakage can lead to a breach of confidentiality of transaction information. Thus, confidentiality and privacy pose a great challenge for Blockchain and its applications that involve confidential transactions and private data. We will dedicate a third section of this article to discuss Blockchain\u2019s privacy and security techniques.<\/p>","protected":false},"excerpt":{"rendered":"<p>Az els\u0151 szakaszban r\u00f6viden megvitatjuk a blokkl\u00e1nc leg\u00fajabb biztons\u00e1gi \u00e9s adatv\u00e9delmi fejlem\u00e9nyeit, valamint annak m\u0171k\u00f6d\u00e9s\u00e9t \u00e9s biztons\u00e1gi int\u00e9zked\u00e9seit. Gyorsan megvitatjuk az adatv\u00e9delmi \u00e9s biztons\u00e1gi\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-2-resz\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A blokkl\u00e1nc f\u0151 jellemz\u0151i: adatv\u00e9delem \u00e9s biztons\u00e1g: 2. r\u00e9sz<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1544,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blockchain&#039;s Privacy and Security (Part 2) | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-2-resz\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain&#039;s Privacy and Security (Part 2) | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-2-resz\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-07T23:59:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Privacy and Security as Main Characteristics of the Blockchain: Part 2\",\"datePublished\":\"2023-03-07T23:59:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\"},\"wordCount\":1665,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\",\"url\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\",\"name\":\"Blockchain's Privacy and Security (Part 2) | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"datePublished\":\"2023-03-07T23:59:39+00:00\",\"description\":\"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"Privacy and Security as Main Characteristics of the Blockchain Part II\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy and Security as Main Characteristics of the Blockchain: Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A blokkl\u00e1nc adatv\u00e9delme \u00e9s biztons\u00e1ga (2. r\u00e9sz) | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Fedezze fel, hogyan biztos\u00edt a blokkl\u00e1nc technol\u00f3gia olyan adatv\u00e9delmi \u00e9s biztons\u00e1gi funkci\u00f3kat, amelyek ide\u00e1lis megold\u00e1ss\u00e1 teszik k\u00fcl\u00f6nb\u00f6z\u0151 ipar\u00e1gak sz\u00e1m\u00e1ra.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-2-resz\/","og_locale":"hu_HU","og_type":"article","og_title":"Blockchain's Privacy and Security (Part 2) | Security Briefing","og_description":"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.","og_url":"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-2-resz\/","og_site_name":"Security Briefing","article_published_time":"2023-03-07T23:59:39+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"8 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Privacy and Security as Main Characteristics of the Blockchain: Part 2","datePublished":"2023-03-07T23:59:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/"},"wordCount":1665,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","articleSection":["Blockchain"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/","url":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/","name":"A blokkl\u00e1nc adatv\u00e9delme \u00e9s biztons\u00e1ga (2. r\u00e9sz) | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","datePublished":"2023-03-07T23:59:39+00:00","description":"Fedezze fel, hogyan biztos\u00edt a blokkl\u00e1nc technol\u00f3gia olyan adatv\u00e9delmi \u00e9s biztons\u00e1gi funkci\u00f3kat, amelyek ide\u00e1lis megold\u00e1ss\u00e1 teszik k\u00fcl\u00f6nb\u00f6z\u0151 ipar\u00e1gak sz\u00e1m\u00e1ra.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","width":600,"height":369,"caption":"Privacy and Security as Main Characteristics of the Blockchain Part II"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Privacy and Security as Main Characteristics of the Blockchain: Part 2"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1540"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1544"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}