{"id":1530,"date":"2023-03-05T22:08:15","date_gmt":"2023-03-05T22:08:15","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1530"},"modified":"2023-03-05T22:08:15","modified_gmt":"2023-03-05T22:08:15","slug":"%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8%ec%9d%98-%ec%a3%bc%ec%9a%94-%ed%8a%b9%ec%a7%95%ec%9c%bc%eb%a1%9c%ec%84%9c%ec%9d%98-%ed%94%84%eb%9d%bc%ec%9d%b4%eb%b2%84%ec%8b%9c-%eb%b0%8f-%eb%b3%b4%ec%95%88","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8\/%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8%ec%9d%98-%ec%a3%bc%ec%9a%94-%ed%8a%b9%ec%a7%95%ec%9c%bc%eb%a1%9c%ec%84%9c%ec%9d%98-%ed%94%84%eb%9d%bc%ec%9d%b4%eb%b2%84%ec%8b%9c-%eb%b0%8f-%eb%b3%b4%ec%95%88\/","title":{"rendered":"\ube14\ub85d\uccb4\uc778\uc758 \uc8fc\uc694 \ud2b9\uc9d5\uc778 \ud504\ub77c\uc774\ubc84\uc2dc \ubc0f \ubcf4\uc548: 1\ubd80"},"content":{"rendered":"<p>\u201cBlockchain\u201d is a term used to refer to a decentralized consensus technology that holds considerable potential for developing new foundations for socio-economic development and decentralizing security in emerging areas. Due to its ability to effectively build trust between humans and machines, blockchain reduces costs and improves resource utilization.<\/p>\n\n\n\n<p>\uadf8\ub9ac\uace0 <a href=\"\/ko\/Blockchain%20Facts%20What%20Is%20It,%20How%20It%20Works,%20and%20How%20It%20Can%20Be%20Used.htm\/\">\ube14\ub85d\uccb4\uc778<\/a> technology is becoming increasingly vital in various fields, including Bitcoin, Ethereum, and Hyperledger. However, over the last decade, significant advancements have been made in this technology, leading to diverse data security and privacy protection challenges. These challenges include transaction traceability, account pooling, Sybil attacks, eclipse attacks, and clever contract fraudulent attacks. These attacks severely violate users\u2019 data security and privacy and, therefore, must be addressed.<\/p>\n\n\n\n<p><strong>\ube14\ub85d\uccb4\uc778\uc5d0\uc11c\uc758 \ubcf4\uc548\uacfc \ud504\ub77c\uc774\ubc84\uc2dc\ub294 \uc5f0\uad6c \ubd84\uc57c\uc778\uac00\uc694?<\/strong><\/p>\n\n\n\n<p>\uc624\ub298\ub0a0 \ud559\uacc4\uc640 \uc0b0\uc5c5\uacc4\uc758 \uc5f0\uad6c\uc790\ub4e4\uc740 \uc815\uae30\uc801\uc73c\ub85c \ubaa8\uc5ec \ube14\ub85d\uccb4\uc778 \ub370\uc774\ud130 \uc5f0\uad6c, \ubcf4\uc548, \ud504\ub77c\uc774\ubc84\uc2dc \ubcf4\ud638\uc5d0 \ub300\ud574 \ub17c\uc758\ud569\ub2c8\ub2e4. \uadf8\ub4e4\uc740 \ube14\ub85d\uccb4\uc778 \uae30\uc220\uc758 \ubbf8\ub798 \ubc1c\uc804\uc5d0 \uc9c1\uba74\ud55c \ub3c4\uc804 \uacfc\uc81c\ub97c \ud3ec\uad04\uc801\uc73c\ub85c \uac80\ud1a0\ud558\uace0 \ucd5c\ucca8\ub2e8 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uae30\uc220\uc5d0 \ub300\ud55c \uc2ec\uce35 \ubd84\uc11d\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. \uadf8\ub4e4\uc774 \ub2e4\ub8e8\ub294 \ubaa8\ub4e0 \uce21\uba74\uc740 \ube14\ub85d\uccb4\uc778\uc5d0\uc11c\uc758 \ubcf4\uc548\uacfc \ud504\ub77c\uc774\ubc84\uc2dc\uc640 \uad00\ub828\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ube14\ub85d\uccb4\uc778\uacfc \uad00\ub828\ub41c \uc0c9\uc778\ud654\ub41c \uc0ac\uc124 \ubc0f \ud310\uc744 \ucc3e\uc744 \uc218 \uc788\uc73c\uba70, \uc774\ub354\ub9ac\uc6c0 \ube14\ub85d\uccb4\uc778\uc5d0\uc11c\uc758 \uac70\ub798 \uc138\ud0c1 \ud0d0\uc9c0 \ubc29\ubc95\uc758 \ubc1c\uc804, \ud53c\uc5b4 \ud22c \ud53c\uc5b4 \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \ub178\ub4dc\uc758 \ud0c8\uc911\uc559\ud654\ub97c \ud3c9\uac00\ud558\uae30 \uc704\ud55c \ud504\ub808\uc784\uc6cc\ud06c, \uc2a4\ub9c8\ud2b8 \uacc4\uc57d\uc5d0 \ub300\ud55c \uc554\ud638\ud654 \ub09c\ub3c5\ud654 \uc5f0\uad6c \ub4f1\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4. \uc77c\ubd80 \uc791\uc5c5\uc740 \uc0ac\uc6a9\uc790\uac00 \uc554\ud638\ud654\ub41c \uc2a4\ub9c8\ud2b8 \uacc4\uc57d\uc5d0 \uc554\ud638\ud654\ub41c \uc785\ub825\uc744 \uc81c\uacf5\ud558\uace0 \uc2e0\ub8b0\ud560 \uc218 \uc5c6\ub294 \uc81c3\uc790\uac00 \uc774\ub97c \uc2e4\ud589\ud560 \uc218 \uc788\ub3c4\ub85d \ud558\ub294 \uc2a4\ud0b4\uc744 \uc81c\uc2dc\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc740 \ube14\ub85d\uccb4\uc778 \ubcf4\uc548 \uc2e4\ubb34\uc758 \ud328\ud134\uc5d0 \ubc29\ud5a5\uc744 \uc81c\uacf5\ud558\uace0 \ub09c\ub3c5\ud654 \uc2a4\ud0b4\uc758 \ubcf4\uc548\uc744 \uc785\uc99d\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-other-intellectual-endeavors-on-blockchain-are-there\"><strong>\ube14\ub85d\uccb4\uc778\uc5d0 \ub300\ud55c \ub2e4\ub978 \uc9c0\uc801 \ub178\ub825\uc740 \ubb34\uc5c7\uc774 \uc788\uc2b5\ub2c8\uae4c?<\/strong><\/h2>\n\n\n<p>There are also efforts on measuring the decentralization of nodes in Blockchain peer to peer networks. In this sense, NodeMaps have been presented, which is a decentralization of data measurement framework nodes to capture, analyze and visualize data from various popular Blockchain P2P platforms, such as Bitcoin, Lightning Network, Cosmos, and Stellar. In other words, they perform IP address analysis and provide a snapshot of each Blockchain platform to compare and contrast their nodes\u2019 geographic, ASN, and version distribution information. The measurements are evaluated to elucidate the degree of decentralization of the nodes in the underlying network of the different blockchains.<\/p>\n\n\n\n<p>\ub610 \ub2e4\ub978 \uad00\uc2ec \uc8fc\uc81c\ub294 ERC20 \uc554\ud638\ud654\ud3d0\uc5d0 \ub300\ud55c \uc628\uccb4\uc778 \uc138\ud0c1 \uac70\ub798\uc758 \ud0d0\uc9c0 \ubc0f \uc815\ub7c9\ud654\uc785\ub2c8\ub2e4. \uc7ac\uc5f0\uad6c\uc758 \uc8fc\uc81c\ub294 \uc138\ud0c1 \uac70\ub798\uc785\ub2c8\ub2e4. <a href=\"\/ko\/ERC-20%20Token%20Standard%20ethereum.org.htm\/\">ERC20<\/a> \uc554\ud638\ud654\ud3d0\ub294 \uac70\ub798 \ub370\uc774\ud130 \uccb4\uc778\uc758 \uccb4\uacc4\uc801\uc778 \ubd84\uc11d\uc744 \uc218\ud589\ud558\uc5ec. \uc774\ub97c \uc704\ud574 \uc138\ud0c1 \uac70\ub798\ub294 \uc8fc\uc18c\uc758 \uc0c1\ud0dc \uc9d1\ud569\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc218\ud559\uc801\uc73c\ub85c \uc815\uc758\ub418\uc5c8\uc73c\uba70, \uc774\ub97c \uc704\ud574 \uc138\ud0c1 \uac70\ub798\uc758 \uc9c1\uc811\uc801\uc778 \uc99d\uac70\ub97c \ubcf4\uc874\ud558\uae30 \uc704\ud55c \uc54c\uace0\ub9ac\uc998\uc774 \uc81c\uc548\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uc138\ud0c1 \uac70\ub798\uc758 \ud2b9\uc131\uc744 \uc5bb\uc740 \ud6c4, \uadf8\ub4e4\uc740 \uc138\ud0c1 \uac70\ub798\uc758 \uc591\uc744 \uc815\ub7c9\ud654\ud558\uace0 \uc138\ud0c1 \uac70\ub798\ub97c \ubc29\uc9c0\ud558\uae30 \uc704\ud55c \uc2dc\uc7a5 \uaddc\uc81c\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub9c8\ucc2c\uac00\uc9c0\ub85c, \uace0\uc815 \ub178\ub4dc \uc2dc\uac04 \ub204\ucd9c\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc774\ub354\ub9ac\uc6c0 \uac70\ub798\ub97c \uac15\ub825\ud558\uac8c \uadf8\ub8f9\ud654\ud558\ub294 \ubc29\ubc95 \uac1c\ubc1c\uc5d0 \uc9c4\uc804\uc774 \uc788\uc5c8\uc2b5\ub2c8\ub2e4. \uc774 \uc2a4\ud0b4\uc740 \ubaa8\ub4e0 \uac70\ub798\ub97c \ud3ec\uad04\ud558\uba70 \ud504\ub77c\uc774\ubc84\uc2dc \ud5a5\uc0c1 \uae30\uc220\uc5d0 \uc800\ud56d\ud569\ub2c8\ub2e4. N\uac1c\uc758 \uace0\uc815 \ub178\ub4dc\ub85c\ubd80\ud130 \uc804\ub2ec\ub41c \ud0c0\uc784\uc2a4\ud0ec\ud504\ub97c \uc0ac\uc6a9\ud558\uc5ec \uac70\ub798\uc758 \ub124\ud2b8\uc6cc\ud06c \uc18d\uc131\uc744 \uc124\uba85\ud558\uace0, \uc2a4\ud0b4\uc740 \ub3d9\uc77c\ud55c \uc18c\uc2a4 \ub178\ub4dc\uc5d0\uc11c \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ub4e4\uc5b4\uc624\ub294 \uac70\ub798\ub97c \uadf8\ub8f9\ud654\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-the-blockchain-works\"><strong>\ube14\ub85d\uccb4\uc778\uc774 \uc791\ub3d9\ud558\ub294 \ubc29\uc2dd<\/strong><\/h2>\n\n\n<p>\ube14\ub85d\uccb4\uc778\uc740 \uae30\ub2a5\uc801\uc73c\ub85c \uac70\ub798 \uae30\ub85d\uc758 \uc548\uc804\ud558\uace0 \ubd84\uc0b0\ub41c \ub370\uc774\ud130\ubca0\uc774\uc2a4\ub85c \uc791\ub3d9\ud569\ub2c8\ub2e4. \ube44\ud2b8\ucf54\uc778 \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \uc0ac\uc6a9\uc790 A\uac00 \ub2e4\ub978 \uc0ac\uc6a9\uc790 B\uc5d0\uac8c \ube44\ud2b8\ucf54\uc778\uc744 \ubcf4\ub0b4\uace0 \uc2f6\ub2e4\uba74, \uadf8\ub294 \uc0ac\uc6a9\uc790 A\uc5d0 \uc758\ud574 \ube44\ud2b8\ucf54\uc778 \uac70\ub798\ub97c \uc0dd\uc131\ud560 \uac83\uc785\ub2c8\ub2e4. \uac70\ub798\ub294 \ube44\ud2b8\ucf54\uc778 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc758\ud574 \ucee4\ubc0b\ub418\uae30 \uc804\uc5d0 \ucc44\uad74\uc790\uc5d0 \uc758\ud574 \uc2b9\uc778\ub418\uc5b4\uc57c \ud569\ub2c8\ub2e4. \ucc44\uad74 \uacfc\uc815\uc744 \uc2dc\uc791\ud558\uae30 \uc704\ud574, \uac70\ub798\ub294 \ub124\ud2b8\uc6cc\ud06c\uc758 \ubaa8\ub4e0 \ub178\ub4dc\uc5d0 \ubc29\uc1a1\ub418\uba70, \ucc44\uad74\uc790\uc5d0 \uc758\ud574 \ube14\ub85d\uc758 \uac70\ub798\ub85c \uc218\uc9d1\ub429\ub2c8\ub2e4. \ucc44\uad74\uc790\ub294 \ube14\ub85d\uc758 \uac70\ub798\ub97c \uac80\uc99d\ud558\uace0 \ud569\uc758 \ud504\ub85c\ud1a0\ucf5c\uc744 \uc0ac\uc6a9\ud558\uc5ec \ube14\ub85d\uacfc \uadf8 \uac80\uc99d\uc744 \ubc29\uc1a1\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uacfc\uc815\uc740 \ub124\ud2b8\uc6cc\ud06c\uc758 \uc2b9\uc778\uc744 \ubc1b\uae30 \uc704\ud55c \uc791\uc5c5 \uc99d\uba85\uc73c\ub85c \uc54c\ub824\uc838 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub2e4\ub978 \ub178\ub4dc\uac00 \ube14\ub85d\uc5d0 \ud3ec\ud568\ub41c \ubaa8\ub4e0 \uac70\ub798\uac00 \uc720\ud6a8\ud558\ub2e4\uace0 \uac80\uc99d\ud558\uba74, \ube14\ub85d\uc740 \ube14\ub85d\uccb4\uc778\uc5d0 \ucd94\uac00\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ube14\ub85d\uc5d0 \ud3ec\ud568\ub41c \uac70\ub798\uac00 \ub2e4\ub978 \ub178\ub4dc\uc5d0 \uc758\ud574 \uc2b9\uc778\ub418\uace0 \ube14\ub85d\uccb4\uc778\uc5d0 \ucd94\uac00\ub420 \ub54c\ub9cc \uc0ac\uc6a9\uc790 A\uc5d0\uc11c \uc0ac\uc6a9\uc790 B\ub85c\uc758 \ube44\ud2b8\ucf54\uc778 \uc804\uc1a1\uc774 \uc644\ub8cc\ub418\uace0 \uc815\ub2f9\ud654\ub429\ub2c8\ub2e4. <\/p>\n\n\n\n<p>\uc774 \uacfc\uc815\uc740 \ub2e4\uc74c \ub2e8\uacc4\ub85c \uc694\uc57d\ub429\ub2c8\ub2e4: <\/p>\n\n\n\n<p>1) \uccb4\uc778 \uc800\uc7a5. <\/p>\n\n\n\n<p>2) \ub514\uc9c0\ud138 \uc11c\uba85. <\/p>\n\n\n\n<p>3) \uc804 \uc138\uacc4\uc801\uc73c\ub85c \uccb4\uc778 \uc800\uc7a5\uc5d0 \uc0c8 \ube14\ub85d\uc744 \ucd94\uac00\ud558\uae30 \uc704\ud55c \ud569\uc758.<\/p>\n\n\n\n<p>\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc740 \ud574\uc2dc \uccb4\uc778, \uba38\ud074 \ud2b8\ub9ac, \ub514\uc9c0\ud138 \uc11c\uba85\uacfc \uac19\uc740 \uc778\uae30 \uc788\ub294 \ubcf4\uc548 \uae30\uc220 \uc138\ud2b8\ub97c \uac00\uc9c0\uace0 \uc788\uc73c\uba70, \ud569\uc758 \uba54\ucee4\ub2c8\uc998\uc744 \ud1b5\ud574 \ube44\ud2b8\ucf54\uc778 \ube14\ub85d\uccb4\uc778\uc740 \ube44\ud2b8\ucf54\uc778 \uc774\uc911 \uc9c0\ucd9c \ubb38\uc81c\ub97c \ubc29\uc9c0\ud558\uace0 \ube14\ub85d\uc5d0 \uc131\uacf5\uc801\uc73c\ub85c \ucee4\ubc0b\ub41c \ud6c4 \ub370\uc774\ud130 \uac70\ub798\uc758 \ud68c\uace0\uc801 \uc218\uc815\uc744 \uc911\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"chained-storage-security-technique\"><strong>\uccb4\uc778 \uc800\uc7a5 \ubcf4\uc548 \uae30\uc220<\/strong><\/h2>\n\n\n<p>\ud574\uc2dc \ud3ec\uc778\ud130\uc640 \uba38\ud074 \ud2b8\ub9ac\ub294 \ube44\ud2b8\ucf54\uc778\uc5d0\uc11c \ube14\ub85d\uccb4\uc778\uc744 \uad6c\ud604\ud558\uae30 \uc704\ud574 \uac00\uc7a5 \ub110\ub9ac \uc0ac\uc6a9\ub418\ub294 \uccb4\uc778 \uc800\uc7a5 \uae30\uc220\uc785\ub2c8\ub2e4. \ud574\uc2dc \ud3ec\uc778\ud130\ub294 \ub370\uc774\ud130\uac00 \uc800\uc7a5\ub41c \uc704\uce58\ub97c \uac00\ub9ac\ud0a4\ub294 \ub370\uc774\ud130\uc758 \uc554\ud638\ud654 \ud574\uc2dc\uc785\ub2c8\ub2e4. \ud574\uc2dc \ud3ec\uc778\ud130\ub97c \uc0ac\uc6a9\ud558\uc5ec \ube14\ub85d\uccb4\uc778\uc740 \ub370\uc774\ud130 \ube14\ub85d\uc744 \uc11c\ub85c \uc5f0\uacb0\ud558\uba70, \uac01 \ube14\ub85d\uc740 \uc774\uc804 \ube14\ub85d\uc758 \ub370\uc774\ud130\uac00 \uc800\uc7a5\ub41c \uc8fc\uc18c\ub97c \ub098\ud0c0\ub0c5\ub2c8\ub2e4. \uc0ac\uc6a9\uc790\ub294 \uc800\uc7a5\ub41c \ub370\uc774\ud130\uc758 \ud574\uc2dc\ub97c \uacf5\uac1c\uc801\uc73c\ub85c \uac80\uc99d\ud558\uc5ec \ub370\uc774\ud130\uac00 \ubcc0\uc870\ub418\uc9c0 \uc54a\uc558\uc74c\uc744 \uc99d\uba85\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ud574\ucee4\uac00 \uc804\uccb4 \uccb4\uc778\uc758 \uc5b4\ub5a4 \ube14\ub85d\uc758 \ub370\uc774\ud130\ub97c \ubcc0\uacbd\ud558\ub824\uace0 \uc2dc\ub3c4\ud558\uba74, \uadf8\ub4e4\uc740 \ubaa8\ub4e0 \uc774\uc804 \ube14\ub85d\uc758 \ud574\uc2dc \ud3ec\uc778\ud130\ub97c \ubcc0\uacbd\ud574\uc57c \ud569\ub2c8\ub2e4. \uad81\uadf9\uc801\uc73c\ub85c \ud574\ucee4\ub294 \uccb4\uc778\uc758 \uba38\ub9ac\uc5d0\uc11c \ub370\uc774\ud130\ub97c \uc704\uc870\ud560 \uc218 \uc5c6\uae30 \ub54c\ubb38\uc5d0 \ubcc0\uc870\ub97c \uc911\ub2e8\ud574\uc57c \ud569\ub2c8\ub2e4. \ub9cc\uc57d \uc2dc\ub3c4\ud55c\ub2e4\uba74, \uc0ac\uc774\ubc84 \uacf5\uaca9\uc740 \uccb4\uc778\uc774 \uc870\uc791\uc5d0 \ub300\ud55c \uc800\ud56d\uc131\uc744 \uac00\uc9c0\uace0 \uc788\uae30 \ub54c\ubb38\uc5d0 \ubc1c\uacac\ub420 \uac83\uc785\ub2c8\ub2e4. \uc0ac\uc6a9\uc790\ub294 \ud2b9\ubcc4\ud55c \ube14\ub85d\uc73c\ub85c \ub3cc\uc544\uac00 \uccb4\uc778\uc758 \uc2dc\uc791\ubd80\ud130 \uc774\ub97c \ud655\uc778\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uba38\ud074 \ud2b8\ub9ac\ub294 \ud574\uc2dc \ud3ec\uc778\ud130\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc11c\ub85c \uc5f0\uacb0\ub41c \ub178\ub4dc\ub85c \uad6c\uc131\ub41c \uc774\uc9c4 \uac80\uc0c9 \ud2b8\ub9ac\uc785\ub2c8\ub2e4. \ube14\ub85d\uccb4\uc778\uc744 \uad6c\ucd95\ud558\ub294 \ub370 \uc0ac\uc6a9\ub418\ub294 \ub610 \ub2e4\ub978 \uc720\uc6a9\ud55c \ub370\uc774\ud130 \uad6c\uc870\uc785\ub2c8\ub2e4. \ub178\ub4dc\ub294 \uc11c\ub85c \ubd84\ub9ac\ub41c \uadf8\ub8f9\uc73c\ub85c \uadf8\ub8f9\ud654\ub418\uba70, \uac01 \ud558\uc704 \ub808\ubca8 \ub178\ub4dc \uc30d\uc740 \uc0c1\uc704 \ub808\ubca8\uc5d0\uc11c \ud558\ub098\ub85c \uadf8\ub8f9\ud654\ub429\ub2c8\ub2e4. \uc774\ub294 \ud2b8\ub9ac\uc758 \uc5b4\ub5a4 \ub178\ub4dc\ub85c\uc758 \ud574\uc2dc \ud3ec\uc778\ud130\ub97c \ud1b5\ud574 \ub370\uc774\ud130\ub97c \ubcc0\uacbd\ud558\ub294 \uac83\uc744 \ubc29\uc9c0\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc0ac\uc774\ubc84 \uacf5\uaca9\uc774 \uc790\uc2dd \ub178\ub4dc\uc758 \ub370\uc774\ud130\ub97c \uc870\uc791\ud558\ub824\uace0 \uc2dc\ub3c4\ud558\uba74, \uadf8\uac83\uc740 \ubd80\ubaa8 \ub178\ub4dc\uc758 \ud574\uc2dc \uac12\uc744 \ubcc0\uacbd\ud569\ub2c8\ub2e4. \ud574\ucee4\uac00 \uc0c1\uc704 \ub178\ub4dc\ub97c \uacc4\uc18d \uc870\uc791\ud558\ub354\ub77c\ub3c4, \uadf8\ub4e4\uc740 \uc544\ub798\uc5d0\uc11c \uc704\ub85c \uac00\ub294 \ubaa8\ub4e0 \ub178\ub4dc\ub97c \ubcc0\uacbd\ud574\uc57c \ud569\ub2c8\ub2e4. \uc870\uc791\uc744 \uac10\uc9c0\ud558\ub294 \uac83\uc740 \uc27d\uc2b5\ub2c8\ub2e4. \ub8e8\ud2b8 \ub178\ub4dc\uc758 \ud574\uc2dc \ud3ec\uc778\ud130\uac00 \uc800\uc7a5\ub41c \ud574\uc2dc \ud3ec\uc778\ud130\uc640 \uc77c\uce58\ud558\uc9c0 \uc54a\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4. \uba38\ud074 \ud2b8\ub9ac\uc758 \uc7a5\uc810 \uc911 \ud558\ub098\ub294 \ub370\uc774\ud130 \ub178\ub4dc\uc640 \ub8e8\ud2b8 \ub178\ub4dc\uae4c\uc9c0\uc758 \ubaa8\ub4e0 \uc870\uc0c1 \ub178\ub4dc\ub97c \ud45c\uc2dc\ud558\uc5ec \ub370\uc774\ud130 \ub178\ub4dc\uc758 \uba64\ubc84\uc2ed\uc744 \ud6a8\uacfc\uc801\uc774\uace0 \uac04\uacb0\ud558\uac8c \ud14c\uc2a4\ud2b8\ud560 \uc218 \uc788\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \uba38\ud074 \ud2b8\ub9ac\uc758 \uba64\ubc84\uc2ed\uc740 \uacbd\ub85c\uc758 \ud574\uc2dc\ub97c \uacc4\uc0b0\ud558\uace0 \ub8e8\ud2b8\uc5d0 \ub300\ud55c \ud574\uc2dc \uac12\uc744 \ud655\uc778\ud558\uc5ec \ub85c\uadf8 \uc2dc\uac04 \ub0b4\uc5d0 \uac80\uc99d\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"digital-signature-security-technique\"><strong>\ub514\uc9c0\ud138 \uc11c\uba85 \ubcf4\uc548 \uae30\uc220<\/strong><\/h2>\n\n\n<p>\uc774 \ubcf4\uc548 \uae30\uc220\uc744 \ud1b5\ud574 \ub370\uc774\ud130\uc758 \uc720\ud6a8\uc131\uc740 \uc554\ud638\ud654 \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud558\uc5ec \ucd94\uad6c\ub429\ub2c8\ub2e4. \uc774\ub294 \ub370\uc774\ud130\uac00 \uc870\uc791\ub418\uc9c0 \uc54a\uc558\uc74c\uc744 \uac80\uc99d\ud558\uae30 \uc704\ud55c \uc2a4\ud0b4\uc785\ub2c8\ub2e4. \ub514\uc9c0\ud138 \uc11c\uba85 \uc2a4\ud0b4\uc744 \uad6c\uc131\ud558\ub294 \uc138 \uac00\uc9c0 \uae30\ubcf8 \uad6c\uc131 \uc694\uc18c\uac00 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>The first component is the key generation algorithm, which creates two keys: one is used to sign messages and keep them private, called the private key, and the other is made publicly available, called the public key. The public key is used to validate whether the message\u2019s signature is signed with the private key.<\/p>\n\n\n\n<p>\ub450 \ubc88\uc9f8 \uad6c\uc131 \uc694\uc18c\ub294 \uc11c\uba85 \uc54c\uace0\ub9ac\uc998\uc73c\ub85c, \uc8fc\uc5b4\uc9c4 \uac1c\uc778 \ud0a4\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc785\ub825 \uba54\uc2dc\uc9c0\uc5d0 \uc11c\uba85\uc744 \uc0dd\uc131\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc138 \ubc88\uc9f8 \uad6c\uc131 \uc694\uc18c\ub294 <a href=\"https:\/\/www.khanacademy.org\/computing\/ap-computer-science-principles\/algorithms-101\/evaluating-algorithms\/a\/verifying-an-algorithm\" target=\"_blank\" rel=\"noreferrer noopener\">\uac80\uc99d \uc54c\uace0\ub9ac\uc998<\/a>, \uc73c\ub85c, \uc11c\uba85, \uba54\uc2dc\uc9c0, \uacf5\uac1c \ud0a4\ub97c \uc785\ub825\uc73c\ub85c \ubc1b\uc544 \uba54\uc2dc\uc9c0\uc758 \uc11c\uba85\uc744 \uacf5\uac1c \ud0a4\ub97c \uc0ac\uc6a9\ud558\uc5ec \uac80\uc99d\ud569\ub2c8\ub2e4. \uc774\ub294 \ubd80\uc6b8 \uac12\uc744 \ubc18\ud658\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc2e0\ub8b0\ud560 \uc218 \uc788\uace0 \uc548\uc804\ud55c \ub514\uc9c0\ud138 \uc11c\uba85 \uc54c\uace0\ub9ac\uc998\uc740 \ub450 \uac00\uc9c0 \uc18d\uc131\uc744 \ub9cc\uc871\ud560 \ub54c \uc798 \uc815\uc758\ub41c \uac83\uc73c\ub85c \uac04\uc8fc\ub429\ub2c8\ub2e4. \uccab \ubc88\uc9f8 \uc18d\uc131\uc740 \uc720\ud6a8\ud55c \uc11c\uba85\uc774 \uac80\uc99d \uac00\ub2a5\ud558\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \ub450 \ubc88\uc9f8 \uc18d\uc131\uc740 \uc11c\uba85\uc774 \uc874\uc7ac\uc801\uc73c\ub85c \uc704\uc870 \ubd88\uac00\ub2a5\ud558\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. <a href=\"https:\/\/www.hypr.com\/security-encyclopedia\/elliptic-curve-digital-signature-algorithm#:~:text=The%20Elliptic%20Curve%20Digital%20Signature%20Algorithm%20(ECDSA)%20is%20a%20Digital,public%20key%20cryptography%20(PKC).\" target=\"_blank\" rel=\"noreferrer noopener\">\ud0c0\uc6d0 \uace1\uc120 \ub514\uc9c0\ud138 \uc11c\uba85 \uc54c\uace0\ub9ac\uc998<\/a> (ECDSA)\ub294 \ube44\ud2b8\ucf54\uc778\uc5d0 \uc758\ud574 \ucc44\ud0dd\ub41c \uadf8\ub7ec\ud55c \uc54c\uace0\ub9ac\uc998\uc758 \uc608\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>\uc804 \uc138\uacc4\uc801\uc73c\ub85c \uccb4\uc778 \uc800\uc7a5\uc5d0 \uc0c8 \ube14\ub85d\uc744 \ucd94\uac00\ud558\uae30 \uc704\ud55c \ud569\uc758<\/strong><\/p>\n\n\n\n<p>\uc0c8 \ube14\ub85d\uc774 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc804\uc1a1\ub418\uba74, \uac01 \ub178\ub4dc\ub294 \ud574\ub2f9 \ube14\ub85d\uc744 \uc6d0\uc7a5\uc758 \uc0ac\ubcf8\uc5d0 \ucd94\uac00\ud558\uac70\ub098 \ubb34\uc2dc\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ud569\uc758\ub294 \ub124\ud2b8\uc6cc\ud06c\uc758 \ub300\ub2e4\uc218\uac00 \uc6d0\uc7a5\uc758 \ud655\uc7a5 \ub610\ub294 \ube14\ub85d\uccb4\uc778\uc758 \ud655\uc7a5\uc744 \ubcf4\uc7a5\ud558\uae30 \uc704\ud574 \ub2e8\uc77c \uc0c1\ud0dc \uc5c5\ub370\uc774\ud2b8\uc5d0 \ub3d9\uc758\ud558\ub294 \uac83\uc744 \ucc3e\uae30 \uc704\ud574 \uc0ac\uc6a9\ub429\ub2c8\ub2e4. \uc774\ub807\uac8c \ud568\uc73c\ub85c\uc368 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc744 \ubc29\uc9c0\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ud2b9\ud788 \ube14\ub85d\uccb4\uc778\uc740 \ubc29\ub300\ud55c \uacf5\uc720 \uae00\ub85c\ubc8c \uc6d0\uc7a5\uc774\uae30 \ub54c\ubb38\uc5d0 \ub204\uad6c\ub098 \uc774\ub97c \uc5c5\ub370\uc774\ud2b8\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc6d0\uc7a5\uc758 \uc0ac\ubcf8 \uc0c1\ud0dc\ub97c \ubcc0\uacbd\ud558\ub824\ub294 \ub178\ub4dc\uac00 \uc788\uac70\ub098 \uc5ec\ub7ec \ub178\ub4dc\uac00 \uc870\uc791\uc744 \uc2dc\ub3c4\ud560 \ub54c \uc0ac\uc774\ubc84 \uacf5\uaca9\uc774 \ubc1c\uc0dd\ud560 \uc218 \uc788\ub2e4\ub294 \uc0ac\uc2e4\uc744 \uac04\uacfc\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc608\ub97c \ub4e4\uc5b4, \uc0ac\uc6a9\uc790 A\uac00 \uc790\uc2e0\uc758 \uc9c0\uac11\uc5d0\uc11c \uc0ac\uc6a9\uc790 B\uc5d0\uac8c 10 \ube44\ud2b8\ucf54\uc778\uc744 \ubcf4\ub0c8\ub2e4\uba74, \uadf8\ub140\ub294 \ub124\ud2b8\uc6cc\ud06c\uc758 \ub204\uad6c\ub3c4 \uac70\ub798 \ub0b4\uc6a9\uc744 \ubcc0\uacbd\ud558\uc5ec 10 \ube44\ud2b8\ucf54\uc778\uc744 100 \ube44\ud2b8\ucf54\uc778\uc73c\ub85c \ubcc0\uacbd\ud560 \uc218 \uc5c6\ub3c4\ub85d \ud558\uace0 \uc2f6\uc5b4\ud560 \uac83\uc785\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc544\uc774\ub514\uc5b4\uc758 \uc21c\uc11c\uc5d0 \ub530\ub77c, \ube14\ub85d \uccb4\uc778\uc774 \uc804 \uc138\uacc4\uc801\uc73c\ub85c \ubcf4\uc548\uacfc \uc815\ud655\uc131\uc744 \ubcf4\uc7a5\ud558\uba70 \uc791\ub3d9\ud560 \uc218 \uc788\ub3c4\ub85d \ud558\uae30 \uc704\ud574, \uacf5\uc720 \uacf5\uac1c \uc6d0\uc7a5\uc740 \ud6a8\uc728\uc801\uc774\uace0 \uc548\uc804\ud55c \ud569\uc758 \uc54c\uace0\ub9ac\uc998\uc774 \ud544\uc694\ud558\uba70, \uc774\ub294 \ub2e4\uc74c\uc744 \ubcf4\uc7a5\ud574\uc57c \ud569\ub2c8\ub2e4:<\/p>\n\n\n\n<p>\ubaa8\ub4e0 \ub178\ub4dc\uac00 \ub3d9\uc2dc\uc5d0 \ub3d9\uc77c\ud55c \ube14\ub85d \uccb4\uc778\uc744 \uc720\uc9c0\ud558\uace0,<br>\uc911\uc559 \uad8c\uc704\uc5d0 \uc758\uc874\ud558\uc9c0 \uc54a\uace0 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc790\uac00 \ud569\uc758\uc5d0 \ub3c4\ub2ec\ud558\uae30 \uc704\ud55c \uc870\uc815 \uacfc\uc815\uc744 \ubc29\ud574\ud558\uc9c0 \ubabb\ud558\uac8c \ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"in-short\"><br>\uc694\uc57d\ud558\uc790\uba74<\/h2>\n\n\n<p>The majority of the network participants must approve each message transmitted between the nodes through a consensus-based agreement. Furthermore, the network must be resilient to partial failures, such as when a group of nodes is rogue or when a message in transit is corrupted. For this, a good consensus mechanism used in the Blockchain must comply with two properties: persistence and vivacity. That is, if one node in the network indicates that a transaction is in the \u201cstable\u201d state, then the other nodes in the network should also report it as stable if asked and answered honestly.<\/p>\n\n\n\n<p>\uc774 \uae30\uc0ac 2\ubd80\uc5d0\uc11c\ub294 \ube14\ub85d\uccb4\uc778 \ubcf4\uc548 \ubc0f \ud504\ub77c\uc774\ubc84\uc2dc \uc18d\uc131\uacfc \uae30\uc220\uc5d0 \ub300\ud574 \ub354 \ub9ce\uc774 \uc54c\ub824\ub4dc\ub9ac\uaca0\uc2b5\ub2c8\ub2e4.<\/p>","protected":false},"excerpt":{"rendered":"<p>\"\ube14\ub85d\uccb4\uc778\"\uc740 \uc0ac\ud68c \uacbd\uc81c\uc801 \ubc1c\uc804\uc744 \uc704\ud55c \uc0c8\ub85c\uc6b4 \uae30\ubc18\uc744 \uac1c\ubc1c\ud558\uace0 \uc2e0\ud765 \uc9c0\uc5ed\uc758 \ubcf4\uc548\uc744 \ubd84\uc0b0\uc2dc\ud0ac \uc218 \uc788\ub294 \uc0c1\ub2f9\ud55c \uc7a0\uc7ac\ub825\uc744 \uc9c0\ub2cc \ud0c8\uc911\uc559\ud654 \ud569\uc758 \uae30\uc220\uc744 \uc9c0\uce6d\ud558\ub294 \uc6a9\uc5b4\uc785\ub2c8\ub2e4. \ub54c\ubb38\uc5d0... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8\/%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8%ec%9d%98-%ec%a3%bc%ec%9a%94-%ed%8a%b9%ec%a7%95%ec%9c%bc%eb%a1%9c%ec%84%9c%ec%9d%98-%ed%94%84%eb%9d%bc%ec%9d%b4%eb%b2%84%ec%8b%9c-%eb%b0%8f-%eb%b3%b4%ec%95%88\/\"><span class=\"screen-reader-text\">\ube14\ub85d\uccb4\uc778\uc758 \uc8fc\uc694 \ud2b9\uc9d5\uc778 \ud504\ub77c\uc774\ubc84\uc2dc \ubc0f \ubcf4\uc548: 1\ubd80<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":1533,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Potential of Blockchain Technology Part 1 - Securitybriefing<\/title>\n<meta name=\"description\" content=\"Discover the potential of Blockchain technology for socio-economic development Learn how it builds trust, reduces costs, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\ube14\ub85d\uccb4\uc778\/\ube14\ub85d\uccb4\uc778\uc758-\uc8fc\uc694-\ud2b9\uc9d5\uc73c\ub85c\uc11c\uc758-\ud504\ub77c\uc774\ubc84\uc2dc-\ubc0f-\ubcf4\uc548\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Potential of Blockchain Technology Part 1 - Securitybriefing\" \/>\n<meta property=\"og:description\" content=\"Discover the potential of Blockchain technology for socio-economic development Learn how it builds trust, reduces costs, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\ube14\ub85d\uccb4\uc778\/\ube14\ub85d\uccb4\uc778\uc758-\uc8fc\uc694-\ud2b9\uc9d5\uc73c\ub85c\uc11c\uc758-\ud504\ub77c\uc774\ubc84\uc2dc-\ubc0f-\ubcf4\uc548\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-05T22:08:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Privacy and security as main characteristics of the Blockchain: Part 1\",\"datePublished\":\"2023-03-05T22:08:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/\"},\"wordCount\":1684,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg\",\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/\",\"url\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/\",\"name\":\"The Potential of Blockchain Technology Part 1 - Securitybriefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg\",\"datePublished\":\"2023-03-05T22:08:15+00:00\",\"description\":\"Discover the potential of Blockchain technology for socio-economic development Learn how it builds trust, reduces costs, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"Privacy and security as main characteristics of the Blockchain Part 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy and security as main characteristics of the Blockchain: Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc758 \uc7a0\uc7ac\ub825 1\ubd80 - \uc2dc\ud050\ub9ac\ud2f0\ube0c\ub9ac\ud551","description":"\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc758 \uc0ac\ud68c\uacbd\uc81c\uc801 \ubc1c\uc804 \uc7a0\uc7ac\ub825\uc744 \ubc1c\uacac\ud558\uc2ed\uc2dc\uc624. \uc2e0\ub8b0\ub97c \uad6c\ucd95\ud558\uace0 \ube44\uc6a9\uc744 \uc808\uac10\ud558\ub294 \ubc29\ubc95 \ub4f1\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\ube14\ub85d\uccb4\uc778\/\ube14\ub85d\uccb4\uc778\uc758-\uc8fc\uc694-\ud2b9\uc9d5\uc73c\ub85c\uc11c\uc758-\ud504\ub77c\uc774\ubc84\uc2dc-\ubc0f-\ubcf4\uc548\/","og_locale":"ko_KR","og_type":"article","og_title":"The Potential of Blockchain Technology Part 1 - Securitybriefing","og_description":"Discover the potential of Blockchain technology for socio-economic development Learn how it builds trust, reduces costs, and more.","og_url":"https:\/\/securitybriefing.net\/ko\/\ube14\ub85d\uccb4\uc778\/\ube14\ub85d\uccb4\uc778\uc758-\uc8fc\uc694-\ud2b9\uc9d5\uc73c\ub85c\uc11c\uc758-\ud504\ub77c\uc774\ubc84\uc2dc-\ubc0f-\ubcf4\uc548\/","og_site_name":"Security Briefing","article_published_time":"2023-03-05T22:08:15+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"8\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Privacy and security as main characteristics of the Blockchain: Part 1","datePublished":"2023-03-05T22:08:15+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/"},"wordCount":1684,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg","articleSection":["Blockchain"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/","url":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/","name":"\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc758 \uc7a0\uc7ac\ub825 1\ubd80 - \uc2dc\ud050\ub9ac\ud2f0\ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg","datePublished":"2023-03-05T22:08:15+00:00","description":"\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc758 \uc0ac\ud68c\uacbd\uc81c\uc801 \ubc1c\uc804 \uc7a0\uc7ac\ub825\uc744 \ubc1c\uacac\ud558\uc2ed\uc2dc\uc624. \uc2e0\ub8b0\ub97c \uad6c\ucd95\ud558\uace0 \ube44\uc6a9\uc744 \uc808\uac10\ud558\ub294 \ubc29\ubc95 \ub4f1\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-Par1-min-1.jpg","width":600,"height":369,"caption":"Privacy and security as main characteristics of the Blockchain Part 1"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Privacy and security as main characteristics of the Blockchain: Part 1"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1530"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1530\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1533"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1530"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}