{"id":1545,"date":"2023-03-11T23:11:25","date_gmt":"2023-03-11T23:11:25","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1545"},"modified":"2024-05-31T23:44:31","modified_gmt":"2024-05-31T23:44:31","slug":"adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-3-resz","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-3-resz\/","title":{"rendered":"A mag\u00e1n\u00e9let \u00e9s a biztons\u00e1g mint a Blockchain f\u0151 jellemz\u0151i: 3. r\u00e9sz"},"content":{"rendered":"<p>In the previous two parts, we delved into Blockchain technology, its characteristics, and functionalities. In this final section, we will explore methods for enhancing privacy and security. Nonetheless, despite its benefits, Blockchain transactions are not anonymous as the public can verify addresses, enabling them to trace a user\u2019s pseudonymous transactions.<\/p>\n\n\n\n<p>When a user\u2019s actual identity is connected to a transaction address, it exposes all of their transactions to potential risk. To counteract this, developers have devised merge or flipper services, which randomize a user\u2019s coins by merging them with coins from other users. This method helps to safeguard user anonymity by preventing the tracing of their transactions.<\/p>\n\n\n\n<p>B\u00e1r a kever\u00e9s elrejti az \u00e9rm\u00e9k tulajdonjog\u00e1t a k\u00fcls\u0151 megfigyel\u0151k el\u0151l, a kever\u00e9si szolg\u00e1ltat\u00e1sok nem ny\u00fajtanak v\u00e9delmet az \u00e9rm\u00e9k ellop\u00e1sa ellen.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"there-are-two-mixing-services-mixcoin-and-coinjoin\"><strong>K\u00e9t kever\u00e9si szolg\u00e1ltat\u00e1s l\u00e9tezik: Mixcoin \u00e9s CoinJoin<\/strong><\/h3>\n\n\n<p><strong>Mixcoin<\/strong> volt az els\u0151 technika a passz\u00edv kibert\u00e1mad\u00e1sok elleni v\u00e9dekez\u00e9sre, amely lehet\u0151v\u00e9 tette a kriptovalut\u00e1k anonim fizet\u00e9s\u00e9t. Kiterjesztette az anonimit\u00e1si halmazt az\u00e1ltal, hogy lehet\u0151v\u00e9 tette az \u00f6sszes felhaszn\u00e1l\u00f3 sz\u00e1m\u00e1ra, hogy egyszerre keverje az \u00e9rm\u00e9it. A Mixcoin a hagyom\u00e1nyos kever\u00e9si kommunik\u00e1ci\u00f3hoz hasonl\u00f3 anonimit\u00e1st biztos\u00edt az akt\u00edv kibert\u00e1mad\u00e1sok elleni k\u00fczdelemhez.<\/p>\n\n\n\n<p>A lop\u00e1s \u00e9szlel\u00e9s\u00e9re a Mixcoin egy elsz\u00e1moltathat\u00f3s\u00e1gi mechanizmust haszn\u00e1l, amely \u00f6szt\u00f6nz\u0151ket igaz\u00edt, megmutatva, hogy a felhaszn\u00e1l\u00f3k \u00e9sszer\u0171en haszn\u00e1lj\u00e1k a Mixcoin-t an\u00e9lk\u00fcl, hogy kriptovalut\u00e1t lopn\u00e1nak. <\/p>\n\n\n\n<p>M\u00e1sr\u00e9szt, <strong>CoinJoin<\/strong> a m\u00e1sodik kever\u00e9si szolg\u00e1ltat\u00e1s az anonim kriptovaluta tranzakci\u00f3khoz. A k\u00f6z\u00f6s fizet\u00e9s \u00f6tlet\u00e9re t\u00e1maszkodik, ahol egy felhaszn\u00e1l\u00f3 tal\u00e1l egy m\u00e1sik felhaszn\u00e1l\u00f3t, aki szint\u00e9n fizetni szeretne, \u00e9s k\u00f6z\u00f6s fizet\u00e9st hajtanak v\u00e9gre egy tranzakci\u00f3ban.<\/p>\n\n\n\n<p>A k\u00f6z\u00f6s fizet\u00e9si m\u00f3dszer haszn\u00e1lata jelent\u0151sen cs\u00f6kkenti az es\u00e9ly\u00e9t annak, hogy egy tranzakci\u00f3ban \u00f6sszekapcsolj\u00e1k a bemeneteket \u00e9s kimeneteket, megnehez\u00edtve a p\u00e9nz pontos \u00e1raml\u00e1s\u00e1nak nyomon k\u00f6vet\u00e9s\u00e9t egy adott felhaszn\u00e1l\u00f3 sz\u00e1m\u00e1ra. A CoinJoin haszn\u00e1lat\u00e1hoz a felhaszn\u00e1l\u00f3knak ki kell cser\u00e9lni\u00fck azokat a tranzakci\u00f3kat, amelyeket k\u00f6z\u00f6s fizet\u00e9sbe k\u00edv\u00e1nnak egyes\u00edteni. <\/p>\n\n\n\n<p>Mindazon\u00e1ltal az ilyen funkcionalit\u00e1st biztos\u00edt\u00f3 kever\u00e9si szolg\u00e1ltat\u00e1sok els\u0151 gener\u00e1ci\u00f3ja k\u00f6zpontos\u00edtott szerverekre t\u00e1maszkodott, ami adatv\u00e9delmi kock\u00e1zatot jelentett egyetlen hibapont jelenl\u00e9te miatt. <\/p>\n\n\n\n<p>Ezek a szolg\u00e1ltat\u00e1sok meg\u0151rzik a tranzakci\u00f3k nyilv\u00e1ntart\u00e1s\u00e1t, \u00e9s dokument\u00e1lj\u00e1k az \u00f6sszes k\u00f6z\u00f6s fizet\u00e9si r\u00e9sztvev\u0151t, megk\u00f6vetelve a felhaszn\u00e1l\u00f3kt\u00f3l, hogy b\u00edzzanak a szolg\u00e1ltat\u00f3ban, hogy nem vesz r\u00e9szt lop\u00e1sban, vagy nem engedi m\u00e1soknak, hogy ellopj\u00e1k kriptovalut\u00e1ikat.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"anonymous-signatures\"><strong>Anonim al\u00e1\u00edr\u00e1sok<\/strong><\/h2>\n\n\n<p>A fejleszt\u0151k l\u00e9trehoztak digit\u00e1lis al\u00e1\u00edr\u00e1si technol\u00f3giai v\u00e1ltozatokat, amelyek anonimit\u00e1st biztos\u00edthatnak az al\u00e1\u00edr\u00f3nak, ezeket anonim al\u00e1\u00edr\u00e1soknak nevezik. K\u00e9t p\u00e9lda a csoportos al\u00e1\u00edr\u00e1s \u00e9s a gy\u0171r\u0171s al\u00e1\u00edr\u00e1s.<\/p>\n\n\n\n<p>Group signing enables a group member to sign a message anonymously using their personal secret key. The group\u2019s public key verifies and authenticates the group signature, revealing only the signer\u2019s group membership.<\/p>\n\n\n\n<p>In the Blockchain system, an authorized entity is required to create and manage groups for group signing. Ring signatures prevent disclosing the signer\u2019s identity during a dispute, and any user can form a \u2018ring\u2019 without additional configuration. The term \u201cring signature\u201d comes from the signature algorithm that uses a ring-shaped structure.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"homomorphic-encryption-he\"><strong>Homomorf titkos\u00edt\u00e1s (HE)<\/strong><\/h2>\n\n\n<p>A homomorf kriptogr\u00e1fia egy er\u0151teljes titkos\u00edt\u00e1st alkalmaz, amely lehet\u0151v\u00e9 teszi a k\u00f6zvetlen sz\u00e1m\u00edt\u00e1sokat a titkos\u00edtott sz\u00f6vegen. Amikor a sz\u00e1m\u00edtott eredm\u00e9nyeket visszafejtik, a titkos\u00edtott adatokon v\u00e9grehajtott m\u0171veletek azonos sima sz\u00f6veges eredm\u00e9nyeket hoznak l\u00e9tre. A r\u00e9szleges \u00e9s teljesen homomorf rendszerek minim\u00e1lis m\u00f3dos\u00edt\u00e1sokkal t\u00e1rolhatj\u00e1k az adatokat a blokkl\u00e1ncon, biztos\u00edtva, hogy a nyilv\u00e1nos blokkl\u00e1ncokkal kapcsolatos adatv\u00e9delmi agg\u00e1lyok enyh\u00fcljenek. <\/p>\n\n\n\n<p>Ez a technika adatv\u00e9delmi v\u00e9delmet ny\u00fajt, \u00e9s lehet\u0151v\u00e9 teszi a titkos\u00edtott inform\u00e1ci\u00f3k k\u00f6nny\u0171 el\u00e9r\u00e9s\u00e9t a munkav\u00e1llal\u00f3i k\u00f6lts\u00e9gek kezel\u00e9s\u00e9re, k\u00f6nyvvizsg\u00e1latra \u00e9s m\u00e1s c\u00e9lokra.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"attributebased-encryption-abe\"><strong>Attrib\u00fatum-alap\u00fa titkos\u00edt\u00e1s (ABE)<\/strong><\/h2>\n\n\n<p>Attribute-Based Encryption is a cryptographic method that defines and governs ciphertext with a user\u2019s secret key attributes. Decryption is only possible if the attributes match the ciphertext attributes. ABE is important for collusion resistance to prevent cyber attackers from accessing other data. However, ABE is underutilized due to a lack of understanding of its basics and efficient implementation. Currently, no real-time operations have implemented ABE on a blockchain.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"secure-multiparty-computing-mpc\"><strong>Biztons\u00e1gos t\u00f6bbp\u00e1rti sz\u00e1m\u00edt\u00e1s (MPC)<\/strong><\/h2>\n\n\n<p>Secure Multi-Party Computing is a multi-party protocol that jointly performs computations on private data inputs without violating input privacy. A cyber attacker learns nothing about the input from an authentic party but from the exit. The success of using MPC in distributed voting, private bidding, and private information retrieval has made it a popular solution to many real-world problems. The first large-scale deployment of MPC was in 2008 for an absolute auction issue in Denmark. Blockchain systems have utilized MPC in recent years to safeguard users\u2019 privacy.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"noninteractive-zeroknowledge-proof-nizk\"><strong>Nem-interakt\u00edv z\u00e9r\u00f3-tud\u00e1s bizony\u00edt\u00e9k (NIZK)<\/strong><\/h2>\n\n\n<p>A nem-interakt\u00edv z\u00e9r\u00f3-tud\u00e1s bizony\u00edt\u00e9k egy kriptogr\u00e1fiai technol\u00f3gia, amely er\u0151teljes adatv\u00e9delmi tulajdons\u00e1gokat k\u00edn\u00e1l. A f\u0151 koncepci\u00f3 egy form\u00e1lis teszt l\u00e9trehoz\u00e1sa, amely meger\u0151s\u00edti, hogy egy program, amelyet csak a felhaszn\u00e1l\u00f3 \u00e1ltal ismert bemenettel hajtanak v\u00e9gre, k\u00e9pes nyilv\u00e1nosan el\u00e9rhet\u0151 eredm\u00e9nyeket gener\u00e1lni an\u00e9lk\u00fcl, hogy tov\u00e1bbi inform\u00e1ci\u00f3kat k\u00f6z\u00f6lne.<\/p>\n\n\n\n<p>M\u00e1s szavakkal, egy hiteles\u00edt\u0151 bizony\u00edthatja egy ellen\u0151rz\u0151nek, hogy egy \u00e1ll\u00edt\u00e1s helyes an\u00e9lk\u00fcl, hogy hasznos inform\u00e1ci\u00f3t szolg\u00e1ltatna. A blokkl\u00e1nc-alkalmaz\u00e1sok minden sz\u00e1mlaegyenleget titkos\u00edtott form\u00e1tumban t\u00e1rolnak a l\u00e1ncon. A z\u00e9r\u00f3-tud\u00e1s bizony\u00edt\u00e9kok haszn\u00e1lat\u00e1val egy felhaszn\u00e1l\u00f3 k\u00f6nnyen bizony\u00edthatja egy m\u00e1sik felhaszn\u00e1l\u00f3nak, hogy elegend\u0151 egyenlege van egy p\u00e9nz\u00e1tutal\u00e1shoz an\u00e9lk\u00fcl, hogy felfedn\u00e9 sz\u00e1mlaegyenleg\u00e9t.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"trusted-execution-environment-tee-based-smart-contracts\"><strong>Megb\u00edzhat\u00f3 v\u00e9grehajt\u00e1si k\u00f6rnyezet (TEE) alap\u00fa okos szerz\u0151d\u00e9sek:<\/strong><\/h2>\n\n\n<p>Ez a technika teljesen elszigetelt k\u00f6rnyezetet biztos\u00edt az alkalmaz\u00e1s sz\u00e1m\u00e1ra, amely megakad\u00e1lyozza, hogy m\u00e1s szoftveralkalmaz\u00e1sok \u00e9s oper\u00e1ci\u00f3s rendszerek beavatkozzanak, \u00e9s megismerj\u00e9k az azon fut\u00f3 alkalmaz\u00e1s \u00e1llapot\u00e1t. Az Intel Guard eXtensions (SGX) szoftver egy reprezentat\u00edv TEE megval\u00f3s\u00edt\u00e1si technol\u00f3gia.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"gamebased-smart-contracts\"><strong>J\u00e1t\u00e9k-alap\u00fa okos szerz\u0151d\u00e9sek<\/strong><\/h2>\n\n\n<p>Game-based solutions for smart contract verification are recent developments that use an interactive \u201cverification game\u201d to decide if a computational task was successful or not. These solutions offer rewards to encourage players to verify computational tasks and find errors so that a smart contract can safely perform a task calculation with verifiable properties.<\/p>\n\n\n\n<p>In each round of the \u201cverification game\u201d, the verifier recursively checks a smaller subset of the computation, significantly reducing the computational load on the nodes. This approach provides an efficient and effective method for verifying smart contracts.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>K\u00f6vetkeztet\u00e9s<\/strong><\/h2>\n\n\n<p>We described Blockchain\u2019s security and privacy attributes and techniques used to achieve them in blockchain-based systems and applications, including consensus algorithms, shuffling, anonymous signatures, encryption, secure multi-party computing, and non-interactive zero-knowledge proof, and secure verification of smart contracts.<\/p>\n\n\n\n<p>Although only a few Blockchain platforms can achieve the set security objectives, blockchain security, and privacy have gained significant interest from academic research and industry. Understanding Blockchain\u2019s security and privacy properties is crucial in enhancing trust and developing defense techniques and countermeasures. Developing lightweight cryptographic algorithms and practical security and privacy methods is vital for the future development of Blockchain and its applications.<\/p>","protected":false},"excerpt":{"rendered":"<p>Az el\u0151z\u0151 k\u00e9t r\u00e9szben a blokkl\u00e1nc technol\u00f3gi\u00e1t, annak jellemz\u0151it \u00e9s funkci\u00f3it t\u00e1rgyaltuk. Ebben a v\u00e9gs\u0151 szakaszban a mag\u00e1n\u00e9let \u00e9s a biztons\u00e1g fokoz\u00e1s\u00e1nak m\u00f3dszereit fogjuk megvizsg\u00e1lni. Mindazon\u00e1ltal, annak ellen\u00e9re, hogy\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-3-resz\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A mag\u00e1n\u00e9let \u00e9s a biztons\u00e1g mint a Blockchain f\u0151 jellemz\u0151i: 3. r\u00e9sz<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1547,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy and Security in Blockchain - Part III | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-3-resz\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy and Security in Blockchain - Part III | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-3-resz\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-11T23:11:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T23:44:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Privacy and security as main characteristics of the Blockchain: Part 3\",\"datePublished\":\"2023-03-11T23:11:25+00:00\",\"dateModified\":\"2024-05-31T23:44:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\"},\"wordCount\":1059,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\",\"url\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\",\"name\":\"Privacy and Security in Blockchain - Part III | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"datePublished\":\"2023-03-11T23:11:25+00:00\",\"dateModified\":\"2024-05-31T23:44:31+00:00\",\"description\":\"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"characteristics of the Blockchain\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy and security as main characteristics of the Blockchain: Part 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adatv\u00e9delem \u00e9s biztons\u00e1g a blokkl\u00e1ncban - III. r\u00e9sz | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Ismerje meg a blockchain adatv\u00e9delmi \u00e9s biztons\u00e1gi funkci\u00f3it a 3. r\u00e9szben. Tudjon meg t\u00f6bbet a TEE-r\u0151l, a j\u00e1t\u00e9k alap\u00fa okosszerz\u0151d\u00e9sekr\u0151l \u00e9s a kever\u00e9si szolg\u00e1ltat\u00e1sokr\u00f3l.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-3-resz\/","og_locale":"hu_HU","og_type":"article","og_title":"Privacy and Security in Blockchain - Part III | Security Briefing","og_description":"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.","og_url":"https:\/\/securitybriefing.net\/hu\/blokklanc\/adatvedelem-es-biztonsag-mint-a-blokklanc-fo-jellemzoi-3-resz\/","og_site_name":"Security Briefing","article_published_time":"2023-03-11T23:11:25+00:00","article_modified_time":"2024-05-31T23:44:31+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"5 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Privacy and security as main characteristics of the Blockchain: Part 3","datePublished":"2023-03-11T23:11:25+00:00","dateModified":"2024-05-31T23:44:31+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/"},"wordCount":1059,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","articleSection":["Blockchain"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/","url":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/","name":"Adatv\u00e9delem \u00e9s biztons\u00e1g a blokkl\u00e1ncban - III. r\u00e9sz | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","datePublished":"2023-03-11T23:11:25+00:00","dateModified":"2024-05-31T23:44:31+00:00","description":"Ismerje meg a blockchain adatv\u00e9delmi \u00e9s biztons\u00e1gi funkci\u00f3it a 3. r\u00e9szben. Tudjon meg t\u00f6bbet a TEE-r\u0151l, a j\u00e1t\u00e9k alap\u00fa okosszerz\u0151d\u00e9sekr\u0151l \u00e9s a kever\u00e9si szolg\u00e1ltat\u00e1sokr\u00f3l.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","width":600,"height":369,"caption":"characteristics of the Blockchain"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Privacy and security as main characteristics of the Blockchain: Part 3"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1545"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1545\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1547"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}