{"id":1540,"date":"2023-03-07T23:59:39","date_gmt":"2023-03-07T23:59:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1540"},"modified":"2023-03-07T23:59:39","modified_gmt":"2023-03-07T23:59:39","slug":"confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-2","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-2\/","title":{"rendered":"Confiden\u021bialitatea \u0219i securitatea ca principale caracteristici ale Blockchain: Partea 2"},"content":{"rendered":"<p>\u00cen prima sec\u021biune, vom discuta pe scurt cele mai recente evolu\u021bii \u00een materie de securitate \u0219i confiden\u021bialitate ale tehnologiei Blockchain, precum \u0219i func\u021bionarea \u0219i m\u0103surile de securitate ale acesteia. \u00cen aceast\u0103 a doua sec\u021biune vom discuta rapid caracteristicile de confiden\u021bialitate \u0219i securitate ale tehnologiei Blockchain.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"security-and-privacy-properties-of-blockchain\"><strong>Propriet\u0103\u021bile de securitate \u0219i confiden\u021bialitate ale Blockchain<\/strong><\/h2>\n\n\n<p>Tehnologia Blockchain trebuie s\u0103 \u00eendeplineasc\u0103 un set de cerin\u021be de securitate \u0219i confiden\u021bialitate pentru tranzac\u021biile online. P\u00e2n\u0103 \u00een prezent, exist\u0103 \u0219apte caracteristici bine cunoscute \u0219i studiate pe larg, care sunt prezentate pe scurt mai jos:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Coeren\u021ba registrului general \u00eentre institu\u021bii<\/strong>: Aceast\u0103 caracteristic\u0103 se refer\u0103 la procesele de reconciliere, compensare \u0219i decontare \u00eentre institu\u021biile financiare. Aceste entit\u0103\u021bi au arhitecturi \u0219i opera\u021biuni comerciale distincte, care necesit\u0103 adesea procese manuale. Aceste procese manuale nu numai c\u0103 contribuie la taxe de tranzac\u021bionare ridicate pentru utilizatori, dar fac, de asemenea, ca registrele generale s\u0103 fie susceptibile la erori \u0219i discrepan\u021be \u00eentre diferite institu\u021bii. Tehnologia Blockchain faciliteaz\u0103 standardizarea unui registru general coerent \u00eentre institu\u021biile bancare, \u021bin\u00e2nd cont \u00een acela\u0219i timp de procesele lor unice.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Integritatea tranzac\u021biei:<\/strong> \u00cen cazul tranzac\u021biilor online legate de gestionarea investi\u021biilor \u0219i a activelor, active multiple precum ac\u021biuni, obliga\u021biuni, note, declara\u021bii de venit \u0219i certificate de depozit sunt supravegheate de o serie de intermediari. Aceast\u0103 situa\u021bie nu numai c\u0103 spore\u0219te cheltuielile de tranzac\u021bionare, dar prezint\u0103 \u0219i un poten\u021bial de falsificare a certificatelor. Prin utilizarea tehnologiei Blockchain, integritatea tranzac\u021biilor este men\u021binut\u0103, iar orice manipulare este prevenit\u0103 \u00een mod eficient.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Disponibilitatea sistemului \u0219i a datelor:<\/strong> Utilizatorii sistemelor online trebuie s\u0103 poat\u0103 accesa datele tranzac\u021biilor oric\u00e2nd \u0219i oriunde. Disponibilitatea se refer\u0103 aici at\u00e2t la nivelul sistemului, c\u00e2t \u0219i la nivelul tranzac\u021biei. Sistemul trebuie s\u0103 func\u021bioneze fiabil la nivel de sistem, chiar \u0219i \u00een timpul unui atac de re\u021bea la nivel de tranzac\u021bie. Utilizatorii pot accesa datele tranzac\u021biilor f\u0103r\u0103 a fi inaccesibili, inconsecven\u021bi sau corup\u021bi.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Prevenirea dublei cheltuieli: Blockchain<\/strong> tehnologia trebuie s\u0103 \u00eempiedice dubla cheltuire, adic\u0103 cheltuirea unei monede digitale de mai multe ori. \u00cen mediul centralizat, o ter\u021b\u0103 parte central\u0103 de \u00eencredere este responsabil\u0103 pentru verificarea dac\u0103 o moned\u0103 digital\u0103 a fost cheltuit\u0103 de dou\u0103 ori sau nu. Avem nevoie de mecanisme \u0219i contram\u0103suri de securitate solide pentru a preveni dubla cheltuire a tranzac\u021biilor \u00eentr-un mediu de re\u021bea descentralizat\u0103.<\/li>\n<\/ul>\n\n\n\n<p><strong>Integritatea tranzac\u021biei:<\/strong> O serie de intermediari sunt \u00eens\u0103rcina\u021bi cu gestionarea unei variet\u0103\u021bi de active, inclusiv ac\u021biuni, obliga\u021biuni, note, declara\u021bii de venit \u0219i certificate de depozit, atunci c\u00e2nd este vorba de tranzac\u021bii online care implic\u0103 gestionarea activelor \u0219i investi\u021biile. Pe l\u00e2ng\u0103 cre\u0219terea costurilor de tranzac\u021bionare, aceast\u0103 circumstan\u021b\u0103 cre\u0219te riscul de fraudare a certificatelor. Integritatea tranzac\u021biilor este men\u021binut\u0103 \u0219i manipularea este evitat\u0103 \u00een mod eficient prin utilizarea tehnologiei Blockchain.<\/p>\n\n\n\n<p><strong>Confiden\u021bialitatea tranzac\u021biei:<\/strong> \u00cen majoritatea tranzac\u021biilor financiare online, utilizatorii doresc o expunere limitat\u0103 a detaliilor tranzac\u021biei \u0219i a informa\u021biilor despre contul lor \u00een cadrul unui sistem de comer\u021b electronic. Aceasta presupune 1) prevenirea accesului utilizatorilor neautoriza\u021bi la informa\u021biile privind tranzac\u021biile; 2) interzicerea administratorilor de sistem \u0219i a participan\u021bilor la re\u021bea s\u0103 divulge informa\u021bii despre utilizatori altor persoane f\u0103r\u0103 consim\u021b\u0103m\u00e2ntul acestora; \u0219i 3) asigurarea stoc\u0103rii \u0219i accesului consecvente \u0219i sigure la datele utilizatorilor, chiar \u0219i \u00een cazul unor defec\u021biuni neprev\u0103zute sau al unor atacuri cibernetice r\u0103u inten\u021bionate.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Anonimatul identit\u0103\u021bii utilizatorului:<\/strong> Tehnologia Blockchain trebuie s\u0103 respecte dreptul la anonimat al utilizatorilor \u0219i rezolv\u0103 dificultatea partaj\u0103rii eficiente \u0219i sigure a datelor utilizatorilor \u00eentre diverse institu\u021bii financiare.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Dezlegarea tranzac\u021biilor:<\/strong> Spre deosebire de anonimat, Blockchain garanteaz\u0103 utilizatorilor c\u0103 tranzac\u021biile legate de ei \u00een\u0219i\u0219i nu pot fi legate, deoarece, \u00een caz contrar, toate tranzac\u021biile relevante pentru un utilizator pot fi legate, ceea ce faciliteaz\u0103 deducerea informa\u021biilor despre utilizator, cum ar fi soldul contului \u0219i tipul \u0219i frecven\u021ba tranzac\u021biilor. Atacatorul cibernetic poate ghici cu \u00eencredere adev\u0103rata identitate a utilizatorului folosind date statistice despre tranzac\u021bii \u0219i conturi \u0219i cuno\u0219tin\u021be anterioare despre un utilizator. Din acest motiv, tehnologia Blockchain trebuie s\u0103 garanteze neclintirea men\u021bionat\u0103 mai sus.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"basic-security-properties-in-blockchain-technology\"><strong>Propriet\u0103\u021bi de securitate de baz\u0103 \u00een tehnologia Blockchain<\/strong><\/h2>\n\n\n<p>Propriet\u0103\u021bile de securitate de baz\u0103 ale tehnologiei Blockchain provin din progresele \u00een domeniul criptografiei, iar evolu\u021bia acesteia a crescut odat\u0103 cu proiectarea \u0219i implementarea Bitcoin. Setul de propriet\u0103\u021bi de securitate \u0219i confiden\u021bialitate de baz\u0103 ale tehnologiei Blockchain este rezumat mai jos:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Consisten\u021b\u0103:<\/strong> \u00cen contextul Blockchain, acest concept se refer\u0103 la sistemul distribuit al registrului global \u00een care toate nodurile au simultan acela\u0219i registru. Exist\u0103 Blockchains cu consisten\u021b\u0103 eventual\u0103 sau slab\u0103 \u0219i alte Blockchains cu consisten\u021b\u0103 solid\u0103. Modelul consecven\u021bei eventuale \u00eenseamn\u0103 c\u0103 blockchain-ul de pe fiecare nod al sistemului devine consecvent \u00een cele din urm\u0103, de\u0219i unele solicit\u0103ri de citire\/scriere \u00een blockchain pot returna date vechi. Dimpotriv\u0103, consisten\u021ba solid\u0103 \u00eenseamn\u0103 c\u0103 toate nodurile au acela\u0219i registru \u00een acela\u0219i timp, iar atunci c\u00e2nd registrul distribuit este actualizat cu date noi, orice cereri ulterioare vor trebui s\u0103 a\u0219tepte p\u00e2n\u0103 la comiterea acestei actualiz\u0103ri.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rezisten\u021ba la manipulare:<\/strong> Aceast\u0103 proprietate se refer\u0103 la rezisten\u021ba la orice manipulare sau manipulare inten\u021bionat\u0103 a unei entit\u0103\u021bi de c\u0103tre utilizatori sau infractori cibernetici care au acces la entitate, fie c\u0103 este vorba despre un sistem, un produs sau un alt obiect logic sau fizic. Rezisten\u021ba la manipulare \u00een blockchain \u00eenseamn\u0103 c\u0103 orice informa\u021bie privind tranzac\u021bia stocat\u0103 \u00een blockchain nu poate fi manipulat\u0103 \u00een timpul \u0219i dup\u0103 procesul de generare a blocului.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rezisten\u021ba la atacurile DDoS:<\/strong> Un atac de tip denial of service (DoS) perturb\u0103 serviciile de internet g\u0103zduite prin indisponibilitatea ma\u0219inii gazd\u0103 sau a resursei de re\u021bea de pe gazd\u0103 pentru utilizatorii destina\u021bi. Atacurile DoS \u00eencearc\u0103 s\u0103 supra\u00eencarce sistemul gazd\u0103 sau resursa de re\u021bea gazd\u0103 prin inundarea acesteia cu cereri inutile, bloc\u00e2nd astfel performan\u021ba serviciilor legitime. Un atac DDoS este denumit atac DoS \"distribuit\", adic\u0103 atacul inund\u0103 o victim\u0103 cu trafic de intrare provenit din mai multe surse disparate distribuite pe internet.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Atacatorul poate compromite \u0219i utiliza computerul unui individ pentru a ataca un altul, profit\u00e2nd de vulnerabilit\u0103\u021bile sau punctele slabe de securitate. Prin utilizarea unui grup de computere, un atacator DDoS poate trimite cantit\u0103\u021bi mari de date c\u0103tre un site de g\u0103zduire sau poate trimite spam anumitor adrese de e-mail. Acest lucru face ca atacul s\u0103 fie foarte greu de oprit prin bruierea unei singure surse la un moment dat.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rezisten\u021b\u0103 la atacurile cu cheltuieli duble:<\/strong> atacul dublei cheltuieli asupra Blockchain se refer\u0103 la o problem\u0103 specific\u0103 tranzac\u021biilor cu moned\u0103 digital\u0103. Trebuie remarcat faptul c\u0103 atacul dubl\u0103rii cheltuielilor poate fi considerat o problem\u0103 general\u0103 de securitate, deoarece informa\u021biile digitale pot fi reproduse relativ u\u0219or. \u00cen special, \u00een cazul tranzac\u021biilor care implic\u0103 schimbul de jetoane digitale, cum ar fi moneda electronic\u0103, exist\u0103 riscul ca de\u021bin\u0103torul s\u0103 poat\u0103 duplica jetonul digital \u0219i s\u0103 trimit\u0103 jetoane identice mai multor destinatari. \u00cen cazul \u00een care se poate produce o inconsecven\u021b\u0103 ca urmare a duplic\u0103rii tranzac\u021biilor cu jetoane digitale. Pentru a evita dubla cheltuire, fiecare tranzac\u021bie este evaluat\u0103 \u0219i verificat\u0103 pentru autenticitate utiliz\u00e2nd \u00eenregistr\u0103rile tranzac\u021biilor de pe blockchain-ul dvs. cu un protocol de consens. <\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Prin securizarea tuturor tranzac\u021biilor din blockchain, protocolul de consens permite tuturor s\u0103 verifice public tranzac\u021biile dintr-un bloc \u00eenainte de a trimite blocul \u00een blockchain-ul global, asigur\u00e2ndu-se c\u0103 expeditorul fiec\u0103rei tranzac\u021bii cheltuie\u0219te numai monedele digitale. Pe care le de\u021bine de drept. \u00cen plus, fiecare tranzac\u021bie este semnat\u0103 de expeditorul s\u0103u folosind un algoritm securizat de semn\u0103tur\u0103 digital\u0103. Aceasta asigur\u0103 faptul c\u0103 verificatorul poate detecta cu u\u0219urin\u021b\u0103 tranzac\u021bia dac\u0103 cineva o falsific\u0103. Combina\u021bia dintre tranzac\u021biile semnate digital \u0219i verificarea public\u0103 a tranzac\u021biilor cu consensul majorit\u0103\u021bii asigur\u0103 c\u0103 blockchain-ul poate rezista atacului de dubl\u0103 cheltuire.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rezisten\u021ba majorit\u0103\u021bii sau atacul consensului:<\/strong> acest atac se refer\u0103 la riscurile de tri\u0219are \u00een cadrul protocolului de consens majoritar. Un astfel de risc este adesea denumit atacul 51%, \u00een special \u00een contextul dubl\u0103rii cheltuielilor. De exemplu, atacul 51% poate ap\u0103rea \u00een prezen\u021ba unor mineri r\u0103u inten\u021biona\u021bi dac\u0103 un miner controleaz\u0103 mai mult de 50% din puterea de calcul pentru a men\u021bine blockchain-ul, registrul distribuit al tuturor tranzac\u021biilor de tranzac\u021bionare a unei criptomonede.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pseudonimatul:<\/strong> aceast\u0103 proprietate se refer\u0103 la o stare de identitate deghizat\u0103. De exemplu, \u00een Bitcoin, adresele din Blockchain sunt hash-uri ale cheilor publice ale unui nod sau utilizator din re\u021bea. Utilizatorii pot interac\u021biona cu sistemul folosind hash-ul cheii lor publice ca pseudo-identitate, f\u0103r\u0103 a-\u0219i dezv\u0103lui numele real. Prin urmare, adresa unui utilizator poate fi privit\u0103 ca o pseudoidentitate. Putem considera pseudonimul unei propriet\u0103\u021bi private a sistemului pentru a proteja numele real al unui utilizator. De asemenea, utilizatorii pot genera oric\u00e2te perechi de chei (adrese multiple) doresc, similar cu modul \u00een care o persoan\u0103 poate crea oric\u00e2te conturi bancare dore\u0219te.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Nelegabilitate:<\/strong> se refer\u0103 la incapacitatea de a stabili cu un grad ridicat de \u00eencredere rela\u021bia dintre dou\u0103 observa\u021bii sau dou\u0103 entit\u0103\u021bi observate ale sistemului. Anonimatul se refer\u0103 la starea de a fi anonim \u0219i neidentificat. De\u0219i blockchain asigur\u0103 pseudonimatul prin oferirea unei pseudoidentit\u0103\u021bi ca suport pentru anonimatul identit\u0103\u021bii unui utilizator, acesta nu ofer\u0103 utilizatorilor protec\u021bia de a-\u0219i dezlega tranzac\u021biile. <\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00cen mod intuitiv, anonimatul complet al unui utilizator poate fi protejat numai prin asigurarea at\u00e2t a pseudonimului, c\u00e2t \u0219i a dezleg\u0103rii, dac\u0103 utilizatorul \u00ee\u0219i folose\u0219te \u00eentotdeauna pseudoidentitatea pentru a interac\u021biona cu sistemul. Acest lucru se datoreaz\u0103 faptului c\u0103 dezlegarea face dificil\u0103 lansarea atacurilor de inferen\u021b\u0103 a anonimiz\u0103rii, care leag\u0103 tranzac\u021biile unui utilizator pentru a descoperi adev\u0103rata sa identitate \u00een prezen\u021ba cuno\u0219tin\u021belor prealabile. Concret, un utilizator poate avea mai multe adrese pseudonime \u00een sisteme similare cu Bitcoin.  Cu toate acestea, acest lucru nu asigur\u0103 un anonimat perfect pentru utilizatorii Blockchain, deoarece fiecare tranzac\u021bie cu adresele expeditorului \u0219i destinatarului este \u00eenregistrat\u0103 \u00een registru \u0219i poate fi urm\u0103rit\u0103 \u00een mod liber de oricine utilizeaz\u0103 adresele expeditorului \u0219i destinatarului asociate. Astfel, oricine poate corela tranzac\u021bia unui utilizator cu alte tranzac\u021bii care implic\u0103 conturile sale printr-o simpl\u0103 analiz\u0103 statistic\u0103 a adreselor utilizate.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Confiden\u021bialitatea tranzac\u021biilor \u0219i confiden\u021bialitatea datelor:<\/strong> Confiden\u021bialitatea datelor \u00een Blockchain se refer\u0103 la proprietatea care poate oferi confiden\u021bialitate pentru toate datele sau pentru anumite date sensibile stocate \u00een acesta. De exemplu, blockchain-ul poate fi utilizat pentru gestionarea contractelor inteligente, a lucr\u0103rilor protejate prin drepturi de autor \u0219i a digitaliz\u0103rii lan\u021burilor comerciale sau a organiza\u021biilor. Deloc surprinz\u0103tor, o proprietate de securitate comun\u0103 tuturor aplica\u021biilor Blockchain este confiden\u021bialitatea informa\u021biilor privind tranzac\u021biile, cum ar fi con\u021binutul \u0219i adresele tranzac\u021biilor.<\/li>\n<\/ul>\n\n\n\n<p>\u00cen rezumat, confiden\u021bialitatea datelor din ultimele decenii a ar\u0103tat riscurile de scurgere a confiden\u021bialit\u0103\u021bii din cauza diverselor atacuri de inferen\u021b\u0103, care leag\u0103 datele sensibile ale tranzac\u021biilor \u0219i\/sau pseudonimele de adev\u0103rata identitate a utilizatorilor reali, chiar dac\u0103 au folosit doar un pseudonim. Scurgerile pot duce la o \u00eenc\u0103lcare a confiden\u021bialit\u0103\u021bii informa\u021biilor privind tranzac\u021biile. Astfel, confiden\u021bialitatea \u0219i via\u021ba privat\u0103 reprezint\u0103 o mare provocare pentru Blockchain \u0219i aplica\u021biile sale care implic\u0103 tranzac\u021bii confiden\u021biale \u0219i date private. Vom dedica o a treia sec\u021biune a acestui articol discut\u0103rii tehnicilor de confiden\u021bialitate \u0219i securitate ale Blockchain.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00cen prima sec\u021biune, vom discuta pe scurt cele mai recente evolu\u021bii \u00een materie de securitate \u0219i confiden\u021bialitate ale Blockchain, precum \u0219i func\u021bionarea \u0219i m\u0103surile de securitate ale acestuia. Vom discuta rapid despre confiden\u021bialitatea \u0219i securitatea... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-2\/\">Continue reading <span class=\"screen-reader-text\">Confiden\u021bialitatea \u0219i securitatea ca principale caracteristici ale Blockchain: Partea 2<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1544,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blockchain&#039;s Privacy and Security (Part 2) | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-2\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain&#039;s Privacy and Security (Part 2) | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-07T23:59:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Privacy and Security as Main Characteristics of the Blockchain: Part 2\",\"datePublished\":\"2023-03-07T23:59:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\"},\"wordCount\":1665,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\",\"url\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\",\"name\":\"Blockchain's Privacy and Security (Part 2) | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"datePublished\":\"2023-03-07T23:59:39+00:00\",\"description\":\"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"Privacy and Security as Main Characteristics of the Blockchain Part II\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy and Security as Main Characteristics of the Blockchain: Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Confiden\u021bialitatea \u0219i securitatea Blockchain (partea 2) | Security Briefing","description":"Descoperi\u021bi cum tehnologia blockchain ofer\u0103 caracteristici de confiden\u021bialitate \u0219i securitate care o transform\u0103 \u00eentr-o solu\u021bie ideal\u0103 pentru diverse industrii.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-2\/","og_locale":"ro_RO","og_type":"article","og_title":"Blockchain's Privacy and Security (Part 2) | Security Briefing","og_description":"Discover how blockchain technology provides privacy and security features that make it an ideal solution for various industries.","og_url":"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-2\/","og_site_name":"Security Briefing","article_published_time":"2023-03-07T23:59:39+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"8 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Privacy and Security as Main Characteristics of the Blockchain: Part 2","datePublished":"2023-03-07T23:59:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/"},"wordCount":1665,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","articleSection":["Blockchain"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/","url":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/","name":"Confiden\u021bialitatea \u0219i securitatea Blockchain (partea 2) | Security Briefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","datePublished":"2023-03-07T23:59:39+00:00","description":"Descoperi\u021bi cum tehnologia blockchain ofer\u0103 caracteristici de confiden\u021bialitate \u0219i securitate care o transform\u0103 \u00eentr-o solu\u021bie ideal\u0103 pentru diverse industrii.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-Security-as-Main-Characteristics-of-the-Blockchain-Part2-1.jpg","width":600,"height":369,"caption":"Privacy and Security as Main Characteristics of the Blockchain Part II"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Privacy and Security as Main Characteristics of the Blockchain: Part 2"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1540"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1544"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}