{"id":1540,"date":"2023-03-07T23:59:39","date_gmt":"2023-03-07T23:59:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1540"},"modified":"2023-03-07T23:59:39","modified_gmt":"2023-03-07T23:59:39","slug":"%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8%ec%9d%98-%ec%a3%bc%ec%9a%94-%ed%8a%b9%ec%a7%95%ec%9c%bc%eb%a1%9c%ec%84%9c%ec%9d%98-%ed%94%84%eb%9d%bc%ec%9d%b4%eb%b2%84%ec%8b%9c-%eb%b0%8f-%eb%b3%b4%ec%95%88-2","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8\/%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8%ec%9d%98-%ec%a3%bc%ec%9a%94-%ed%8a%b9%ec%a7%95%ec%9c%bc%eb%a1%9c%ec%84%9c%ec%9d%98-%ed%94%84%eb%9d%bc%ec%9d%b4%eb%b2%84%ec%8b%9c-%eb%b0%8f-%eb%b3%b4%ec%95%88-2\/","title":{"rendered":"\ube14\ub85d\uccb4\uc778\uc758 \uc8fc\uc694 \ud2b9\uc9d5\uc778 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638\uc640 \ubcf4\uc548: 2\ubd80"},"content":{"rendered":"<p>In the first section, we briefly discuss Blockchain\u2019s most recent security and privacy developments as well as its operation and security measures. We will quickly discuss the privacy and security features of Blockchain technology in this second section.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"security-and-privacy-properties-of-blockchain\"><strong>\ube14\ub85d\uccb4\uc778\uc758 \ubcf4\uc548 \ubc0f \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638 \uc18d\uc131<\/strong><\/h2>\n\n\n<p>\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc740 \uc628\ub77c\uc778 \uac70\ub798\ub97c \uc704\ud574 \uc77c\ub828\uc758 \ubcf4\uc548 \ubc0f \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638 \uc694\uad6c \uc0ac\ud56d\uc744 \ucda9\uc871\ud574\uc57c \ud569\ub2c8\ub2e4. \ud604\uc7ac\uae4c\uc9c0 \uc798 \uc54c\ub824\uc838 \uc788\uace0 \uad11\ubc94\uc704\ud558\uac8c \uc5f0\uad6c\ub41c \uc77c\uacf1 \uac00\uc9c0 \ud2b9\uc131\uc774 \uc874\uc7ac\ud558\uba70, \uc544\ub798\uc5d0 \uac04\ub7b5\ud788 \uc124\uba85\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uae30\uad00 \uac04 \ucd1d\uacc4\uc815 \uc6d0\uc7a5\uc758 \uc77c\uad00\uc131<\/strong>: \uc774 \ud2b9\uc131\uc740 \uae08\uc735 \uae30\uad00 \uac04\uc758 \uc870\uc815, \uccad\uc0b0 \ubc0f \uacb0\uc81c \ud504\ub85c\uc138\uc2a4\uc640 \uad00\ub828\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uae30\uad00\ub4e4\uc740 \uace0\uc720\ud55c \uc544\ud0a4\ud14d\ucc98\uc640 \ube44\uc988\ub2c8\uc2a4 \uc6b4\uc601\uc744 \uac00\uc9c0\uace0 \uc788\uc73c\uba70, \uc774\ub294 \uc885\uc885 \uc218\uc791\uc5c5 \ud504\ub85c\uc138\uc2a4\ub97c \ud544\uc694\ub85c \ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc218\uc791\uc5c5 \ud504\ub85c\uc138\uc2a4\ub294 \uc0ac\uc6a9\uc790\uc5d0\uac8c \ub192\uc740 \uac70\ub798 \uc218\uc218\ub8cc\ub97c \ucd08\ub798\ud560 \ubfd0\ub9cc \uc544\ub2c8\ub77c, \uc11c\ub85c \ub2e4\ub978 \uae30\uad00 \uac04\uc758 \uc6d0\uc7a5\uc744 \uc624\ub958\uc640 \ubd88\uc77c\uce58\uc5d0 \ucde8\uc57d\ud558\uac8c \ub9cc\ub4ed\ub2c8\ub2e4. \ube14\ub85d\uccb4\uc778 \uae30\uc220\uc740 \uc740\ud589 \uae30\uad00 \uac04\uc758 \uc77c\uad00\ub41c \ucd1d\uacc4\uc815 \uc6d0\uc7a5\uc744 \ud45c\uc900\ud654\ud558\uba74\uc11c \uadf8\ub4e4\uc758 \uace0\uc720\ud55c \ud504\ub85c\uc138\uc2a4\ub97c \uc218\uc6a9\ud560 \uc218 \uc788\ub3c4\ub85d \ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uac70\ub798 \ubb34\uacb0\uc131:<\/strong> \ud22c\uc790 \ubc0f \uc790\uc0b0 \uad00\ub9ac\uc640 \uad00\ub828\ub41c \uc628\ub77c\uc778 \uac70\ub798\ub97c \ucc98\ub9ac\ud560 \ub54c, \uc8fc\uc2dd, \ucc44\uad8c, \uc5b4\uc74c, \uc18c\ub4dd \uba85\uc138\uc11c \ubc0f \uc608\ud0c1\uc99d\uc11c\uc640 \uac19\uc740 \uc5ec\ub7ec \uc790\uc0b0\uc774 \ub2e4\uc591\ud55c \uc911\uac1c\uc790\uc5d0 \uc758\ud574 \uad00\ub9ac\ub429\ub2c8\ub2e4. \uc774 \uc0c1\ud669\uc740 \uac70\ub798 \ube44\uc6a9\uc744 \uc99d\uac00\uc2dc\ud0ac \ubfd0\ub9cc \uc544\ub2c8\ub77c \uc99d\uba85\uc11c \uc704\uc870\uc758 \uac00\ub2a5\uc131\uc744 \ub0b4\ud3ec\ud569\ub2c8\ub2e4. \ube14\ub85d\uccb4\uc778 \uae30\uc220\uc744 \uc0ac\uc6a9\ud558\uc5ec \uac70\ub798\uc758 \ubb34\uacb0\uc131\uc774 \uc720\uc9c0\ub418\uba70, \uc870\uc791\uc774 \ud6a8\uacfc\uc801\uc73c\ub85c \ubc29\uc9c0\ub429\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc2dc\uc2a4\ud15c \ubc0f \ub370\uc774\ud130 \uac00\uc6a9\uc131:<\/strong> \uc628\ub77c\uc778 \uc2dc\uc2a4\ud15c\uc758 \uc0ac\uc6a9\uc790\ub294 \uc5b8\uc81c \uc5b4\ub514\uc11c\ub098 \uac70\ub798 \ub370\uc774\ud130\ub97c \uc561\uc138\uc2a4\ud560 \uc218 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4. \uc5ec\uae30\uc11c \uac00\uc6a9\uc131\uc740 \uc2dc\uc2a4\ud15c \uc218\uc900\uacfc \uac70\ub798 \uc218\uc900 \ubaa8\ub450\ub97c \uc758\ubbf8\ud569\ub2c8\ub2e4. \uc2dc\uc2a4\ud15c\uc740 \uac70\ub798 \uc218\uc900\uc5d0\uc11c \ub124\ud2b8\uc6cc\ud06c \uacf5\uaca9\uc774 \ubc1c\uc0dd\ud558\ub354\ub77c\ub3c4 \uc2dc\uc2a4\ud15c \uc218\uc900\uc5d0\uc11c \uc2e0\ub8b0\uc131 \uc788\uac8c \uc791\ub3d9\ud574\uc57c \ud569\ub2c8\ub2e4. \uc0ac\uc6a9\uc790\ub294 \uac70\ub798 \ub370\uc774\ud130\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\uc73c\uba70, \uc811\uadfc \ubd88\uac00\ub2a5\ud558\uac70\ub098 \uc77c\uad00\uc131\uc774 \uc5c6\uac70\ub098 \uc190\uc0c1\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc774\uc911 \uc9c0\ubd88 \ubc29\uc9c0: \ube14\ub85d\uccb4\uc778<\/strong> \uae30\uc220\uc740 \ub514\uc9c0\ud138 \ud654\ud3d0\ub97c \ud55c \ubc88 \uc774\uc0c1 \uc0ac\uc6a9\ud558\ub294 \uc774\uc911 \uc9c0\ubd88\uc744 \ubc29\uc9c0\ud574\uc57c \ud569\ub2c8\ub2e4. \uc911\uc559 \uc9d1\uc911\uc2dd \ud658\uacbd\uc5d0\uc11c\ub294 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc911\uc559 \uc81c3\uc790\uac00 \ub514\uc9c0\ud138 \ud654\ud3d0\uac00 \uc774\uc911 \uc9c0\ubd88\ub418\uc5c8\ub294\uc9c0 \uc5ec\ubd80\ub97c \ud655\uc778\ud558\ub294 \ucc45\uc784\uc744 \uc9d1\ub2c8\ub2e4. \ubd84\uc0b0 \ub124\ud2b8\uc6cc\ud06c \ud658\uacbd\uc5d0\uc11c \uc774\uc911 \uc9c0\ubd88 \uac70\ub798\ub97c \ubc29\uc9c0\ud558\uae30 \uc704\ud574 \uac15\ub825\ud55c \ubcf4\uc548 \uba54\ucee4\ub2c8\uc998\uacfc \ub300\uc751\ucc45\uc774 \ud544\uc694\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p><strong>\uac70\ub798 \ubb34\uacb0\uc131:<\/strong> \uc790\uc0b0 \uad00\ub9ac \ubc0f \ud22c\uc790\uc640 \uad00\ub828\ub41c \uc628\ub77c\uc778 \uac70\ub798\uc758 \uacbd\uc6b0, \uc8fc\uc2dd, \ucc44\uad8c, \uc5b4\uc74c, \uc18c\ub4dd \uba85\uc138\uc11c \ubc0f \uc608\ud0c1\uc99d\uc11c\uc640 \uac19\uc740 \ub2e4\uc591\ud55c \uc790\uc0b0\uc744 \uad00\ub9ac\ud558\ub294 \uc5ec\ub7ec \uc911\uac1c\uc790\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \uc0c1\ud669\uc740 \uac70\ub798 \ube44\uc6a9\uc744 \uc99d\uac00\uc2dc\ud0ac \ubfd0\ub9cc \uc544\ub2c8\ub77c \uc99d\uba85\uc11c \uc0ac\uae30\uc758 \uc704\ud5d8\uc744 \uc99d\uac00\uc2dc\ud0b5\ub2c8\ub2e4. \ube14\ub85d\uccb4\uc778 \uae30\uc220\uc744 \uc0ac\uc6a9\ud558\uc5ec \uac70\ub798\uc758 \ubb34\uacb0\uc131\uc774 \uc720\uc9c0\ub418\uba70, \uc870\uc791\uc774 \ud6a8\uacfc\uc801\uc73c\ub85c \ubc29\uc9c0\ub429\ub2c8\ub2e4.<\/p>\n\n\n\n<p><strong>\uac70\ub798 \uae30\ubc00\uc131:<\/strong> \ub300\ubd80\ubd84\uc758 \uc628\ub77c\uc778 \uae08\uc735 \uac70\ub798\uc5d0\uc11c \uc0ac\uc6a9\uc790\ub294 \uc804\uc790 \uc0c1\uac70\ub798 \uc2dc\uc2a4\ud15c \ub0b4\uc5d0\uc11c \uac70\ub798 \uc138\ubd80 \uc815\ubcf4\uc640 \uacc4\uc815 \uc815\ubcf4\uc758 \ub178\ucd9c\uc744 \uc81c\ud55c\ud558\uace0\uc790 \ud569\ub2c8\ub2e4. \uc774\ub294 1) \uc2b9\uc778\ub418\uc9c0 \uc54a\uc740 \uc0ac\uc6a9\uc790\uac00 \uac70\ub798 \uc815\ubcf4\uc5d0 \uc811\uadfc\ud558\uc9c0 \ubabb\ud558\ub3c4\ub85d \ud558\uace0; 2) \uc2dc\uc2a4\ud15c \uad00\ub9ac\uc790 \ubc0f \ub124\ud2b8\uc6cc\ud06c \ucc38\uac00\uc790\uac00 \uc0ac\uc6a9\uc790 \uc815\ubcf4\ub97c \ub3d9\uc758 \uc5c6\uc774 \ud0c0\uc778\uc5d0\uac8c \uacf5\uac1c\ud558\uc9c0 \ubabb\ud558\ub3c4\ub85d \ud558\uba70; 3) \uc608\uae30\uce58 \uc54a\uc740 \uc2e4\ud328\ub098 \uc545\uc758\uc801\uc778 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \uacbd\uc6b0\uc5d0\ub3c4 \uc0ac\uc6a9\uc790 \ub370\uc774\ud130\uc758 \uc77c\uad00\ub418\uace0 \uc548\uc804\ud55c \uc800\uc7a5 \ubc0f \uc811\uadfc\uc744 \ubcf4\uc7a5\ud558\ub294 \uac83\uc744 \ud3ec\ud568\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc0ac\uc6a9\uc790 \uc2e0\uc6d0 \uc775\uba85\uc131:<\/strong> Blockchain technology must respect users\u2019 right of anonymity and solves the difficulty of efficiently and securely sharing user data among various financial institutions.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uac70\ub798\uc758 \ube44\uc5f0\uacb0\uc131:<\/strong> unlike anonymity, the Blockchain guarantees users that transactions related to themselves cannot be linked because otherwise, all transactions relevant to a user can be linked, making it easier to infer information about the user, such as account balance and the type and frequency of your transactions. The cyber attacker can confidently guess the user\u2019s true identity using statistical data about transactions and accounts and previous knowledge about a user. For that reason, Blockchain technology must guarantee the aforementioned unblinking.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"basic-security-properties-in-blockchain-technology\"><strong>\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc758 \uae30\ubcf8 \ubcf4\uc548 \uc18d\uc131<\/strong><\/h2>\n\n\n<p>\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc758 \uae30\ubcf8 \ubcf4\uc548 \uc18d\uc131\uc740 \uc554\ud638\ud559\uc758 \ubc1c\uc804\uc5d0\uc11c \ube44\ub86f\ub418\uba70, \ube44\ud2b8\ucf54\uc778\uc758 \uc124\uacc4 \ubc0f \uad6c\ud604\uacfc \ud568\uaed8 \ubc1c\uc804\ud588\uc2b5\ub2c8\ub2e4. \ube14\ub85d\uccb4\uc778 \uae30\uc220\uc758 \uae30\ubcf8 \ubcf4\uc548 \ubc0f \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638 \uc18d\uc131\uc740 \uc544\ub798\uc5d0 \uc694\uc57d\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc77c\uad00\uc131:<\/strong> \ube14\ub85d\uccb4\uc778\uc758 \ub9e5\ub77d\uc5d0\uc11c \uc774 \uac1c\ub150\uc740 \ubaa8\ub4e0 \ub178\ub4dc\uac00 \ub3d9\uc2dc\uc5d0 \ub3d9\uc77c\ud55c \uc6d0\uc7a5\uc744 \uac00\uc9c0\ub294 \uae00\ub85c\ubc8c \uc6d0\uc7a5 \ubd84\uc0b0 \uc2dc\uc2a4\ud15c\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \ucd5c\uc885\uc801 \ub610\ub294 \uc57d\ud55c \uc77c\uad00\uc131\uc744 \uac00\uc9c4 \ube14\ub85d\uccb4\uc778\uacfc \uac15\ud55c \uc77c\uad00\uc131\uc744 \uac00\uc9c4 \ub2e4\ub978 \ube14\ub85d\uccb4\uc778\uc774 \uc788\uc2b5\ub2c8\ub2e4. \ucd5c\uc885 \uc77c\uad00\uc131 \ubaa8\ub378\uc740 \ube14\ub85d\uccb4\uc778\uc758 \uac01 \uc2dc\uc2a4\ud15c \ub178\ub4dc\uc5d0\uc11c \ube14\ub85d\uccb4\uc778\uc774 \uacb0\uad6d \uc77c\uad00\uc131\uc744 \uac16\uac8c \ub418\uc9c0\ub9cc, \ube14\ub85d\uccb4\uc778\uc5d0 \ub300\ud55c \uc77c\ubd80 \uc77d\uae30\/\uc4f0\uae30 \uc694\uccad\uc774 \uc624\ub798\ub41c \ub370\uc774\ud130\ub97c \ubc18\ud658\ud560 \uc218 \uc788\uc74c\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \ubc18\ub300\ub85c, \uac15\ud55c \uc77c\uad00\uc131\uc740 \ubaa8\ub4e0 \ub178\ub4dc\uac00 \ub3d9\uc2dc\uc5d0 \ub3d9\uc77c\ud55c \uc6d0\uc7a5\uc744 \uac00\uc9c0\uba70, \ubd84\uc0b0 \uc6d0\uc7a5\uc774 \uc0c8\ub85c\uc6b4 \ub370\uc774\ud130\ub85c \uc5c5\ub370\uc774\ud2b8\ub420 \ub54c, \uc774\ud6c4\uc758 \uc694\uccad\uc740 \uc774 \uc5c5\ub370\uc774\ud2b8\uc758 \ucee4\ubc0b\uc774 \uc644\ub8cc\ub420 \ub54c\uae4c\uc9c0 \ub300\uae30\ud574\uc57c \ud568\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc870\uc791\uc5d0 \ub300\ud55c \uc800\ud56d\uc131:<\/strong> \uc774 \uc18d\uc131\uc740 \uc2dc\uc2a4\ud15c, \uc81c\ud488 \ub610\ub294 \ub2e4\ub978 \ub17c\ub9ac\uc801 \ub610\ub294 \ubb3c\ub9ac\uc801 \uac1d\uccb4\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub294 \uc0ac\uc6a9\uc790 \ub610\ub294 \uc0ac\uc774\ubc84 \ubc94\uc8c4\uc790\uc5d0 \uc758\ud55c \uc758\ub3c4\uc801\uc778 \uc870\uc791 \ub610\ub294 \uc870\uc791\uc5d0 \ub300\ud55c \uc800\ud56d\uc131\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \ube14\ub85d\uccb4\uc778\uc758 \ubcc0\uc870 \uc800\ud56d\uc131\uc740 \ube14\ub85d \uc0dd\uc131 \uacfc\uc815 \uc911 \ubc0f \uc774\ud6c4\uc5d0 \ube14\ub85d\uccb4\uc778\uc5d0 \uc800\uc7a5\ub41c \uac70\ub798 \uc815\ubcf4\uac00 \ubcc0\uc870\ub420 \uc218 \uc5c6\uc74c\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DDoS \uacf5\uaca9\uc5d0 \ub300\ud55c \uc800\ud56d\uc131:<\/strong> A denial of service (DoS) attack disrupts hosted Internet services by making the host machine or network resource on the host unavailable to its intended users. DoS attacks attempt to overload the host system or host network resource by flooding it with superfluous requests, thus stalling the performance of legitimate services. A DDoS attack is referred to as a \u201cdistributed\u201d DoS attack, that is, the attack floods a victim with incoming traffic originating from many disparate sources distributed across the Internet.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The attacker can compromise and use an individual\u2019s computer to attack another by taking advantage of security vulnerabilities or weaknesses. By leveraging a pool of computers, a DDoS attacker can send large amounts of data to a hosting website or spam particular email addresses. This makes it very hard to stop the attack by just jamming one source at a time.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uc774\uc911 \uc9c0\ubd88 \uacf5\uaca9\uc5d0 \ub300\ud55c \uc800\ud56d\uc131:<\/strong> \ube14\ub85d\uccb4\uc778\uc5d0\uc11c\uc758 \uc774\uc911 \uc9c0\ubd88 \uacf5\uaca9\uc740 \ub514\uc9c0\ud138 \ud654\ud3d0 \uac70\ub798\uc5d0 \uace0\uc720\ud55c \ud2b9\uc815 \ubb38\uc81c\ub97c \uc758\ubbf8\ud569\ub2c8\ub2e4. \uc774\uc911 \uc9c0\ubd88 \uacf5\uaca9\uc740 \ub514\uc9c0\ud138 \uc815\ubcf4\uac00 \uc0c1\ub300\uc801\uc73c\ub85c \uc27d\uac8c \uc7ac\uc0dd\uc0b0\ub420 \uc218 \uc788\uae30 \ub54c\ubb38\uc5d0 \uc77c\ubc18\uc801\uc778 \ubcf4\uc548 \ubb38\uc81c\ub85c \uac04\uc8fc\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ud2b9\ud788, \uc804\uc790 \ud654\ud3d0\uc640 \uac19\uc740 \ub514\uc9c0\ud138 \ud1a0\ud070\uc758 \uad50\ud658\uc744 \ud3ec\ud568\ud55c \uac70\ub798\uc5d0\uc11c\ub294 \ubcf4\uc720\uc790\uac00 \ub514\uc9c0\ud138 \ud1a0\ud070\uc744 \ubcf5\uc81c\ud558\uc5ec \uc5ec\ub7ec \uc218\uc2e0\uc790\uc5d0\uac8c \ub3d9\uc77c\ud55c \ud1a0\ud070\uc744 \ubcf4\ub0bc \uc704\ud5d8\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uc911\ubcf5 \ub514\uc9c0\ud138 \ud1a0\ud070 \uac70\ub798\ub85c \uc778\ud574 \ubd88\uc77c\uce58\uac00 \ubc1c\uc0dd\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\uc911 \uc9c0\ubd88\uc744 \ubc29\uc9c0\ud558\uae30 \uc704\ud574 \uac01 \uac70\ub798\ub294 \ube14\ub85d\uccb4\uc778\uc758 \uac70\ub798 \uae30\ub85d\uc744 \uc0ac\uc6a9\ud558\uc5ec \ud569\uc758 \ud504\ub85c\ud1a0\ucf5c\ub85c \uc9c4\uc704 \uc5ec\ubd80\ub97c \ud3c9\uac00\ud558\uace0 \uac80\uc99d\ud569\ub2c8\ub2e4. <\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\ube14\ub85d\uccb4\uc778 \ub0b4 \ubaa8\ub4e0 \uac70\ub798\ub97c \ubcf4\ud638\ud568\uc73c\ub85c\uc368 \ud569\uc758 \ud504\ub85c\ud1a0\ucf5c\uc740 \ube14\ub85d\uc744 \uae00\ub85c\ubc8c \ube14\ub85d\uccb4\uc778\uc5d0 \ucee4\ubc0b\ud558\uae30 \uc804\uc5d0 \ube14\ub85d \ub0b4 \uac70\ub798\ub97c \uacf5\uac1c\uc801\uc73c\ub85c \uac80\uc99d\ud560 \uc218 \uc788\ub3c4\ub85d \ud558\uc5ec \uac01 \uac70\ub798\uc758 \ubc1c\uc2e0\uc790\uac00 \uc815\ub2f9\ud558\uac8c \uc18c\uc720\ud55c \ub514\uc9c0\ud138 \ud654\ud3d0\ub9cc\uc744 \uc0ac\uc6a9\ud558\ub3c4\ub85d \ubcf4\uc7a5\ud569\ub2c8\ub2e4. \ub610\ud55c, \uac01 \uac70\ub798\ub294 \ubcf4\uc548 \ub514\uc9c0\ud138 \uc11c\uba85 \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud558\uc5ec \ubc1c\uc2e0\uc790\uac00 \uc11c\uba85\ud569\ub2c8\ub2e4. \uc774\ub294 \ub204\uad70\uac00\uac00 \uac70\ub798\ub97c \uc704\uc870\ud55c \uacbd\uc6b0 \uac80\uc99d\uc790\uac00 \uc27d\uac8c \uac70\ub798\ub97c \uac10\uc9c0\ud560 \uc218 \uc788\ub3c4\ub85d \ubcf4\uc7a5\ud569\ub2c8\ub2e4. \ub514\uc9c0\ud138 \uc11c\uba85\ub41c \uac70\ub798\uc640 \ub2e4\uc218\uc758 \ud569\uc758\ub85c \uac70\ub798\ub97c \uacf5\uac1c\uc801\uc73c\ub85c \uac80\uc99d\ud558\ub294 \uc870\ud569\uc740 \ube14\ub85d\uccb4\uc778\uc774 \uc774\uc911 \uc9c0\ubd88 \uacf5\uaca9\uc744 \uacac\ub51c \uc218 \uc788\ub3c4\ub85d \ubcf4\uc7a5\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\ub2e4\uc218 \uc800\ud56d \ub610\ub294 \ud569\uc758 \uacf5\uaca9:<\/strong> \uc774 \uacf5\uaca9\uc740 \ub2e4\uc218 \ud569\uc758 \ud504\ub85c\ud1a0\ucf5c\uc5d0\uc11c\uc758 \ubd80\uc815 \ud589\uc704 \uc704\ud5d8\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc704\ud5d8 \uc911 \ud558\ub098\ub294 \ud2b9\ud788 \uc774\uc911 \uc9c0\ubd88\uc758 \ub9e5\ub77d\uc5d0\uc11c 51% \uacf5\uaca9\uc73c\ub85c \uc790\uc8fc \uc5b8\uae09\ub429\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, 51% \uacf5\uaca9\uc740 \uc545\uc758\uc801\uc778 \ucc44\uad74\uc790\uac00 \ube14\ub85d\uccb4\uc778\uc744 \uc720\uc9c0\ud558\uae30 \uc704\ud574 \ucef4\ud4e8\ud305 \ud30c\uc6cc\uc758 50% \uc774\uc0c1\uc744 \uc81c\uc5b4\ud558\ub294 \uacbd\uc6b0 \ubc1c\uc0dd\ud560 \uc218 \uc788\uc73c\uba70, \uc774\ub294 \uc554\ud638\ud654\ud3d0 \uac70\ub798\uc758 \ubaa8\ub4e0 \uac70\ub798\ub97c \uae30\ub85d\ud558\ub294 \ubd84\uc0b0 \uc6d0\uc7a5\uc785\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uac00\uba85\uc131:<\/strong> this property refers to a state of disguised identity. For example, in Bitcoin, addresses on the Blockchain are hashes of the public keys of a node or user on the network. Users can interact with the system using their public key hash as their pseudo-identity without revealing their real names. Therefore, a user\u2019s address can be seen as a pseudo-identity. We may consider a system\u2019s pseudonym private property to protect a user\u2019s actual name. Also, users can generate as many key pairs (multiple addresses) as they want, similar to how a person can create as many bank accounts as they want.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\ube44\uc5f0\uacb0\uc131:<\/strong> refers to the inability to establish the relationship between two observations or two observed entities of the system with high confidence. Anonymity refers to the state of being anonymous and unidentified. Although the blockchain ensures pseudonym by offering pseudo-identity as a support for the anonymity of a user\u2019s identity, it does not provide users with the protection of untying their transactions. <\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Intuitively, a user\u2019s complete anonymity can only be protected by ensuring both the pseudonym and unlinking if the user always uses her pseudo-identity to interact with the system. This is because unbinding makes it difficult to launch anonymization inference attacks, which link a user\u2019s transactions to discover their true identity in the presence of prior knowledge. Specifically, a user can have several pseudonymous addresses in systems similar to Bitcoin.  However, this does not provide perfect anonymity for Blockchain users because each transaction with the sender and recipient addresses is recorded in the ledger and is freely traceable by anyone using the associated sender and recipient addresses. Thus, anyone can relate a user\u2019s transaction to other transactions involving their accounts through a simple statistical analysis of the addresses used.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uac70\ub798\uc758 \uae30\ubc00\uc131\uacfc \ub370\uc774\ud130 \ud504\ub77c\uc774\ubc84\uc2dc:<\/strong> \ube14\ub85d\uccb4\uc778\uc5d0\uc11c\uc758 \ub370\uc774\ud130 \ud504\ub77c\uc774\ubc84\uc2dc\ub294 \uc800\uc7a5\ub41c \ubaa8\ub4e0 \ub370\uc774\ud130 \ub610\ub294 \ud2b9\uc815 \ubbfc\uac10\ud55c \ub370\uc774\ud130\uc5d0 \ub300\ud55c \uae30\ubc00\uc131\uc744 \uc81c\uacf5\ud560 \uc218 \uc788\ub294 \uc18d\uc131\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, \ube14\ub85d\uccb4\uc778\uc740 \uc2a4\ub9c8\ud2b8 \uacc4\uc57d, \uc800\uc791\uad8c \uc791\ud488, \uc0c1\uc5c5 \uccb4\uc778 \ub610\ub294 \uc870\uc9c1\uc758 \ub514\uc9c0\ud138\ud654\ub97c \uad00\ub9ac\ud558\ub294 \ub370 \uc0ac\uc6a9\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ubaa8\ub4e0 \ube14\ub85d\uccb4\uc778 \uc751\uc6a9 \ud504\ub85c\uadf8\ub7a8\uc5d0\uc11c \uacf5\ud1b5\ub41c \ubcf4\uc548 \uc18d\uc131\uc740 \uac70\ub798 \uc815\ubcf4, \uc608\ub97c \ub4e4\uc5b4 \uac70\ub798 \ub0b4\uc6a9 \ubc0f \uc8fc\uc18c\uc758 \uae30\ubc00\uc131\uc785\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<p>In resume, data privacy in recent decades has shown the risks of privacy leakage due to various inference attacks, linking sensitive transaction data and\/or pseudonyms to the true identity of real users, even if only used a pseudonym. Leakage can lead to a breach of confidentiality of transaction information. Thus, confidentiality and privacy pose a great challenge for Blockchain and its applications that involve confidential transactions and private data. We will dedicate a third section of this article to discuss Blockchain\u2019s privacy and security techniques.<\/p>","protected":false},"excerpt":{"rendered":"<p>\uccab \ubc88\uc9f8 \uc139\uc158\uc5d0\uc11c\ub294 \ube14\ub85d\uccb4\uc778\uc758 \ucd5c\uc2e0 \ubcf4\uc548 \ubc0f \ud504\ub77c\uc774\ubc84\uc2dc \ubc1c\uc804, \uc791\ub3d9 \ubc29\uc2dd \ubc0f \ubcf4\uc548 \uc870\uce58\uc5d0 \ub300\ud574 \uac04\ub7b5\ud788 \ub17c\uc758\ud569\ub2c8\ub2e4. \uc6b0\ub9ac\ub294 \ud504\ub77c\uc774\ubc84\uc2dc\uc640 \ubcf4\uc548\uc744 \ube60\ub974\uac8c \ub17c\uc758\ud560 \uac83\uc785\ub2c8\ub2e4\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8\/%eb%b8%94%eb%a1%9d%ec%b2%b4%ec%9d%b8%ec%9d%98-%ec%a3%bc%ec%9a%94-%ed%8a%b9%ec%a7%95%ec%9c%bc%eb%a1%9c%ec%84%9c%ec%9d%98-%ed%94%84%eb%9d%bc%ec%9d%b4%eb%b2%84%ec%8b%9c-%eb%b0%8f-%eb%b3%b4%ec%95%88-2\/\"><span class=\"screen-reader-text\">\ube14\ub85d\uccb4\uc778\uc758 \uc8fc\uc694 \ud2b9\uc9d5\uc778 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638\uc640 \ubcf4\uc548: 2\ubd80<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":1,"featured_media":1544,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blockchain&#039;s Privacy and Security (Part 2) | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\ube14\ub85d\uccb4\uc778\/\ube14\ub85d\uccb4\uc778\uc758-\uc8fc\uc694-\ud2b9\uc9d5\uc73c\ub85c\uc11c\uc758-\ud504\ub77c\uc774\ubc84\uc2dc-\ubc0f-\ubcf4\uc548-2\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain&#039;s Privacy and Security (Part 2) | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\ube14\ub85d\uccb4\uc778\/\ube14\ub85d\uccb4\uc778\uc758-\uc8fc\uc694-\ud2b9\uc9d5\uc73c\ub85c\uc11c\uc758-\ud504\ub77c\uc774\ubc84\uc2dc-\ubc0f-\ubcf4\uc548-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-07T23:59:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Privacy and Security as Main Characteristics of the Blockchain: Part 2\",\"datePublished\":\"2023-03-07T23:59:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\"},\"wordCount\":1665,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\",\"url\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\",\"name\":\"Blockchain's Privacy and Security (Part 2) | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"datePublished\":\"2023-03-07T23:59:39+00:00\",\"description\":\"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"Privacy and Security as Main Characteristics of the Blockchain Part II\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy and Security as Main Characteristics of the Blockchain: Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ube14\ub85d\uccb4\uc778\uc758 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638 \ubc0f \ubcf4\uc548 (\ud30c\ud2b8 2) | \ubcf4\uc548 \ube0c\ub9ac\ud551","description":"\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc774 \ub2e4\uc591\ud55c \uc0b0\uc5c5\uc5d0 \uc774\uc0c1\uc801\uc778 \uc194\ub8e8\uc158\uc774 \ub418\ub294 \ud504\ub77c\uc774\ubc84\uc2dc\uc640 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub294 \ubc29\ubc95\uc744 \ubc1c\uacac\ud558\uc2ed\uc2dc\uc624.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\ube14\ub85d\uccb4\uc778\/\ube14\ub85d\uccb4\uc778\uc758-\uc8fc\uc694-\ud2b9\uc9d5\uc73c\ub85c\uc11c\uc758-\ud504\ub77c\uc774\ubc84\uc2dc-\ubc0f-\ubcf4\uc548-2\/","og_locale":"ko_KR","og_type":"article","og_title":"Blockchain's Privacy and Security (Part 2) | Security Briefing","og_description":"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.","og_url":"https:\/\/securitybriefing.net\/ko\/\ube14\ub85d\uccb4\uc778\/\ube14\ub85d\uccb4\uc778\uc758-\uc8fc\uc694-\ud2b9\uc9d5\uc73c\ub85c\uc11c\uc758-\ud504\ub77c\uc774\ubc84\uc2dc-\ubc0f-\ubcf4\uc548-2\/","og_site_name":"Security Briefing","article_published_time":"2023-03-07T23:59:39+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"security","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"8\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Privacy and Security as Main Characteristics of the Blockchain: Part 2","datePublished":"2023-03-07T23:59:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/"},"wordCount":1665,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","articleSection":["Blockchain"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/","url":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/","name":"\ube14\ub85d\uccb4\uc778\uc758 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638 \ubc0f \ubcf4\uc548 (\ud30c\ud2b8 2) | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","datePublished":"2023-03-07T23:59:39+00:00","description":"\ube14\ub85d\uccb4\uc778 \uae30\uc220\uc774 \ub2e4\uc591\ud55c \uc0b0\uc5c5\uc5d0 \uc774\uc0c1\uc801\uc778 \uc194\ub8e8\uc158\uc774 \ub418\ub294 \ud504\ub77c\uc774\ubc84\uc2dc\uc640 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc81c\uacf5\ud558\ub294 \ubc29\ubc95\uc744 \ubc1c\uacac\ud558\uc2ed\uc2dc\uc624.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","width":600,"height":369,"caption":"Privacy and Security as Main Characteristics of the Blockchain Part II"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Privacy and Security as Main Characteristics of the Blockchain: Part 2"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\ubcf4\uc548","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin\uc740 \uc815\ubd80 \uae30\uc220\uc758 \uc120\uc784 \uc2a4\ud0dc\ud504 \uc791\uac00\uc785\ub2c8\ub2e4. \uc774\uc804\uc5d0\ub294 PYMNTS\uc640 \ubca0\uc774 \uc2a4\ud14c\uc774\ud2b8 \ubc30\ub108\uc5d0 \uae00\uc744 \uc37c\uc73c\uba70 \uce74\ub124\uae30 \uba5c\ub860\uc5d0\uc11c \ubb38\uc608\ucc3d\uc791 \ud559\uc0ac \ud559\uc704\ub97c \ubc1b\uc558\uc2b5\ub2c8\ub2e4. \ud604\uc7ac \ubcf4\uc2a4\ud134 \uc678\uacfd\uc5d0 \uac70\uc8fc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ko\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1540"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1544"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1540"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}