{"id":1545,"date":"2023-03-11T23:11:25","date_gmt":"2023-03-11T23:11:25","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1545"},"modified":"2024-05-31T23:44:31","modified_gmt":"2024-05-31T23:44:31","slug":"confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-3","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-3\/","title":{"rendered":"Confiden\u021bialitatea \u0219i securitatea ca principale caracteristici ale Blockchain: Partea 3"},"content":{"rendered":"<p>\u00cen cele dou\u0103 p\u0103r\u021bi anterioare, am explorat tehnologia Blockchain, caracteristicile \u0219i func\u021bionalit\u0103\u021bile sale. \u00cen aceast\u0103 sec\u021biune final\u0103, vom explora metodele de \u00eembun\u0103t\u0103\u021bire a confiden\u021bialit\u0103\u021bii \u0219i securit\u0103\u021bii. Cu toate acestea, \u00een ciuda beneficiilor sale, tranzac\u021biile Blockchain nu sunt anonime, deoarece publicul poate verifica adresele, permi\u021b\u00e2ndu-le s\u0103 urm\u0103reasc\u0103 tranzac\u021biile pseudonime ale unui utilizator.<\/p>\n\n\n\n<p>C\u00e2nd identitatea real\u0103 a unui utilizator este conectat\u0103 la o adres\u0103 de tranzac\u021bie, aceasta expune toate tranzac\u021biile lor la un poten\u021bial risc. Pentru a contracara acest lucru, dezvoltatorii au conceput servicii de amestecare sau flipper, care randomizeaz\u0103 monedele unui utilizator prin amestecarea lor cu monedele altor utilizatori. Aceast\u0103 metod\u0103 ajut\u0103 la protejarea anonimatului utilizatorului prin prevenirea urm\u0103ririi tranzac\u021biilor lor.<\/p>\n\n\n\n<p>De\u0219i amestecarea ascunde proprietatea monedelor pentru observatorii externi, serviciile de amestecare nu ofer\u0103 nicio protec\u021bie \u00eempotriva furtului de monede.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"there-are-two-mixing-services-mixcoin-and-coinjoin\"><strong>Exist\u0103 dou\u0103 servicii de amestecare: Mixcoin \u0219i CoinJoin<\/strong><\/h3>\n\n\n<p><strong>Mixcoin<\/strong> a fost prima tehnic\u0103 de ap\u0103rare \u00eempotriva atacurilor cibernetice pasive, permi\u021b\u00e2nd plata anonim\u0103 a criptomonedelor. A extins setul de anonimitate permi\u021b\u00e2nd tuturor utilizatorilor s\u0103-\u0219i amestece monedele simultan. Mixcoin ofer\u0103 anonimitate similar\u0103 cu comunicarea tradi\u021bional\u0103 de amestec pentru a combate atacurile cibernetice active.<\/p>\n\n\n\n<p>Pentru a detecta furtul, Mixcoin folose\u0219te un mecanism de responsabilitate care aliniaz\u0103 stimulentele, ar\u0103t\u00e2nd c\u0103 utilizatorii folosesc Mixcoin ra\u021bional f\u0103r\u0103 a fura criptomonede. <\/p>\n\n\n\n<p>Pe de alt\u0103 parte, <strong>CoinJoin<\/strong> este al doilea serviciu de amestecare pentru tranzac\u021bii anonime de criptomonede. Se bazeaz\u0103 pe ideea de plat\u0103 comun\u0103, unde un utilizator g\u0103se\u0219te un alt utilizator care dore\u0219te, de asemenea, s\u0103 efectueze o plat\u0103 \u0219i face o plat\u0103 comun\u0103 \u00eentr-o tranzac\u021bie.<\/p>\n\n\n\n<p>Utilizarea metodei de plat\u0103 comun\u0103 reduce semnificativ \u0219ansele de a lega intr\u0103rile \u0219i ie\u0219irile \u00eentr-o tranzac\u021bie, f\u0103c\u00e2nd dificil\u0103 urm\u0103rirea fluxului exact de bani pentru un anumit utilizator. Pentru a utiliza CoinJoin, utilizatorii trebuie s\u0103 schimbe tranzac\u021biile pe care inten\u021bioneaz\u0103 s\u0103 le amestece \u00eentr-o plat\u0103 comun\u0103. <\/p>\n\n\n\n<p>Cu toate acestea, genera\u021bia ini\u021bial\u0103 de servicii de amestecare care ofereau aceast\u0103 func\u021bionalitate se baza pe servere centralizate, ceea ce crea un risc de confiden\u021bialitate din cauza prezen\u021bei unui singur punct de e\u0219ec. <\/p>\n\n\n\n<p>Aceste servicii p\u0103streaz\u0103 \u00eenregistr\u0103ri ale tranzac\u021biilor \u0219i documenteaz\u0103 to\u021bi participan\u021bii la pl\u0103\u021bile comune, cer\u00e2nd utilizatorilor s\u0103 aib\u0103 \u00eencredere c\u0103 operatorul serviciului nu va fura sau nu va permite altora s\u0103 fure criptomonedele lor.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"anonymous-signatures\"><strong>Semn\u0103turi Anonime<\/strong><\/h2>\n\n\n<p>Dezvoltatorii au creat variante de tehnologie de semn\u0103tur\u0103 digital\u0103 care pot oferi anonimitate semnatarului, cunoscute sub numele de semn\u0103turi anonime. Dou\u0103 exemple sunt semn\u0103tura de grup \u0219i semn\u0103tura de inel.<\/p>\n\n\n\n<p>Semnarea de grup permite unui membru al grupului s\u0103 semneze un mesaj anonim folosind cheia sa secret\u0103 personal\u0103. Cheia public\u0103 a grupului verific\u0103 \u0219i autentific\u0103 semn\u0103tura de grup, dezv\u0103luind doar apartenen\u021ba la grup a semnatarului.<\/p>\n\n\n\n<p>\u00cen sistemul Blockchain, o entitate autorizat\u0103 este necesar\u0103 pentru a crea \u0219i gestiona grupuri pentru semnarea de grup. Semn\u0103turile de inel \u00eempiedic\u0103 dezv\u0103luirea identit\u0103\u021bii semnatarului \u00een timpul unei dispute, iar orice utilizator poate forma un \u2018inel\u2019 f\u0103r\u0103 configura\u021bii suplimentare. Termenul \u201csemn\u0103tur\u0103 de inel\u201d provine de la algoritmul de semn\u0103tur\u0103 care utilizeaz\u0103 o structur\u0103 \u00een form\u0103 de inel.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"homomorphic-encryption-he\"><strong>Criptografie Homomorf\u0103 (HE)<\/strong><\/h2>\n\n\n<p>Criptografia homomorf\u0103 folose\u0219te un cifru puternic care faciliteaz\u0103 calculele directe pe textul cifrat. C\u00e2nd se decripteaz\u0103 rezultatele calculate, opera\u021biunile executate pe datele criptate produc rezultate identice \u00een text simplu. Sistemele par\u021bial \u0219i complet homomorfe pot stoca date pe blockchain cu ajust\u0103ri minime, asigur\u00e2ndu-se c\u0103 preocup\u0103rile legate de confiden\u021bialitate asociate cu blockchain-urile publice sunt atenuate. <\/p>\n\n\n\n<p>Aceast\u0103 tehnic\u0103 ofer\u0103 protec\u021bie a confiden\u021bialit\u0103\u021bii \u0219i permite accesul facil la informa\u021biile criptate pentru gestionarea cheltuielilor angaja\u021bilor, audit \u0219i alte scopuri.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"attributebased-encryption-abe\"><strong>Criptografie Bazat\u0103 pe Atribute (ABE)<\/strong><\/h2>\n\n\n<p>Criptografia Bazat\u0103 pe Atribute este o metod\u0103 criptografic\u0103 care define\u0219te \u0219i guverneaz\u0103 textul cifrat cu atributele cheii secrete ale unui utilizator. Decriptarea este posibil\u0103 doar dac\u0103 atributele se potrivesc cu atributele textului cifrat. ABE este important\u0103 pentru rezisten\u021ba la coluziune pentru a preveni accesul atacatorilor cibernetici la alte date. Cu toate acestea, ABE este subutilizat\u0103 din cauza lipsei de \u00een\u021belegere a bazelor sale \u0219i a implement\u0103rii eficiente. \u00cen prezent, nicio opera\u021biune \u00een timp real nu a implementat ABE pe un blockchain.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"secure-multiparty-computing-mpc\"><strong>Calcul Multi-Partid Securizat (MPC)<\/strong><\/h2>\n\n\n<p>Calculul Multi-Partid Securizat este un protocol multi-partid care efectueaz\u0103 \u00een comun calcule pe intr\u0103ri de date private f\u0103r\u0103 a \u00eenc\u0103lca confiden\u021bialitatea intr\u0103rilor. Un atacator cibernetic nu \u00eenva\u021b\u0103 nimic despre intrare de la o parte autentic\u0103, ci de la ie\u0219ire. Succesul utiliz\u0103rii MPC \u00een votul distribuit, licita\u021biile private \u0219i recuperarea informa\u021biilor private l-a f\u0103cut o solu\u021bie popular\u0103 pentru multe probleme reale. Prima implementare la scar\u0103 larg\u0103 a MPC a fost \u00een 2008 pentru o problem\u0103 de licita\u021bie absolut\u0103 \u00een Danemarca. Sistemele Blockchain au utilizat MPC \u00een ultimii ani pentru a proteja confiden\u021bialitatea utilizatorilor.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"noninteractive-zeroknowledge-proof-nizk\"><strong>Dovad\u0103 Non-Interactiv\u0103 de Cunoa\u0219tere Zero (NIZK)<\/strong><\/h2>\n\n\n<p>Dovada non-interactiv\u0103 de cunoa\u0219tere zero este o tehnologie criptografic\u0103 care ofer\u0103 propriet\u0103\u021bi puternice de p\u0103strare a confiden\u021bialit\u0103\u021bii. Conceptul de baz\u0103 implic\u0103 crearea unui test formal pentru a confirma dac\u0103 un program, executat cu intrare cunoscut\u0103 doar de utilizator, poate genera rezultate accesibile publicului f\u0103r\u0103 a divulga informa\u021bii suplimentare.<\/p>\n\n\n\n<p>Cu alte cuvinte, un certificator poate dovedi unui verificator c\u0103 o afirma\u021bie este corect\u0103 f\u0103r\u0103 a oferi informa\u021bii utile. Aplica\u021biile Blockchain stocheaz\u0103 toate soldurile conturilor pe lan\u021b \u00eentr-un format criptat. Folosind dovezi de cunoa\u0219tere zero, un utilizator poate dovedi cu u\u0219urin\u021b\u0103 altui utilizator c\u0103 are un sold suficient pentru un transfer de bani f\u0103r\u0103 a dezv\u0103lui soldul contului s\u0103u.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"trusted-execution-environment-tee-based-smart-contracts\"><strong>Contracte inteligente bazate pe Mediu de Execu\u021bie de \u00cencredere (TEE):<\/strong><\/h2>\n\n\n<p>Aceast\u0103 tehnic\u0103 ofer\u0103 un mediu complet izolat pentru aplica\u021bie, care \u00eempiedic\u0103 alte aplica\u021bii software \u0219i sisteme de operare s\u0103 interfereze cu \u0219i s\u0103 cunoasc\u0103 starea aplica\u021biei care ruleaz\u0103 pe acesta. Software-ul Intel Guard eXtensions (SGX) este o tehnologie reprezentativ\u0103 de implementare TEE.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"gamebased-smart-contracts\"><strong>Contracte inteligente bazate pe jocuri<\/strong><\/h2>\n\n\n<p>Solu\u021biile bazate pe jocuri pentru verificarea contractelor inteligente sunt dezvolt\u0103ri recente care folosesc un \u201cjoc de verificare\u201d interactiv pentru a decide dac\u0103 o sarcin\u0103 computa\u021bional\u0103 a fost realizat\u0103 cu succes sau nu. Aceste solu\u021bii ofer\u0103 recompense pentru a \u00eencuraja juc\u0103torii s\u0103 verifice sarcinile computa\u021bionale \u0219i s\u0103 g\u0103seasc\u0103 erori, astfel \u00eenc\u00e2t un contract inteligent s\u0103 poat\u0103 efectua \u00een siguran\u021b\u0103 un calcul al sarcinii cu propriet\u0103\u021bi verificabile.<\/p>\n\n\n\n<p>\u00cen fiecare rund\u0103 a \u201cjocului de verificare\u201d, verificatorul verific\u0103 recursiv un subset mai mic al calculului, reduc\u00e2nd semnificativ sarcina computa\u021bional\u0103 pe noduri. Aceast\u0103 abordare ofer\u0103 o metod\u0103 eficient\u0103 \u0219i eficace pentru verificarea contractelor inteligente.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>\u00cen concluzie<\/strong><\/h2>\n\n\n<p>Am descris atributele de securitate \u0219i confiden\u021bialitate ale Blockchain-ului \u0219i tehnicile utilizate pentru a le atinge \u00een sistemele \u0219i aplica\u021biile bazate pe blockchain, inclusiv algoritmi de consens, amestecare, semn\u0103turi anonime, criptare, calcul multi-partid securizat \u0219i dovad\u0103 non-interactiv\u0103 de cunoa\u0219tere zero, \u0219i verificarea securizat\u0103 a contractelor inteligente.<\/p>\n\n\n\n<p>De\u0219i doar c\u00e2teva platforme Blockchain pot atinge obiectivele de securitate stabilite, securitatea \u0219i confiden\u021bialitatea blockchain-ului au c\u00e2\u0219tigat un interes semnificativ din partea cercet\u0103rii academice \u0219i a industriei. \u00cen\u021belegerea propriet\u0103\u021bilor de securitate \u0219i confiden\u021bialitate ale Blockchain-ului este crucial\u0103 pentru \u00eembun\u0103t\u0103\u021birea \u00eencrederii \u0219i dezvoltarea tehnicilor de ap\u0103rare \u0219i a contram\u0103surilor. Dezvoltarea algoritmilor criptografici u\u0219ori \u0219i a metodelor practice de securitate \u0219i confiden\u021bialitate este vital\u0103 pentru dezvoltarea viitoare a Blockchain-ului \u0219i a aplica\u021biilor sale.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00cen cele dou\u0103 p\u0103r\u021bi anterioare, am aprofundat tehnologia Blockchain, caracteristicile \u0219i func\u021bionalit\u0103\u021bile acesteia. \u00cen aceast\u0103 sec\u021biune final\u0103, vom explora metodele de \u00eembun\u0103t\u0103\u021bire a confiden\u021bialit\u0103\u021bii \u0219i securit\u0103\u021bii. Cu toate acestea, \u00een ciuda... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-3\/\">Continue reading <span class=\"screen-reader-text\">Confiden\u021bialitatea \u0219i securitatea ca principale caracteristici ale Blockchain: Partea 3<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1547,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy and Security in Blockchain - Part III | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-3\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy and Security in Blockchain - Part III | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-11T23:11:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T23:44:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Privacy and security as main characteristics of the Blockchain: Part 3\",\"datePublished\":\"2023-03-11T23:11:25+00:00\",\"dateModified\":\"2024-05-31T23:44:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\"},\"wordCount\":1059,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\",\"url\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\",\"name\":\"Privacy and Security in Blockchain - Part III | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"datePublished\":\"2023-03-11T23:11:25+00:00\",\"dateModified\":\"2024-05-31T23:44:31+00:00\",\"description\":\"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg\",\"width\":600,\"height\":369,\"caption\":\"characteristics of the Blockchain\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy and security as main characteristics of the Blockchain: Part 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Confiden\u021bialitate \u0219i Securitate \u00een Blockchain - Partea III | Informare de Securitate","description":"Descoperi\u021bi caracteristicile de confiden\u021bialitate \u0219i securitate ale blockchain-ului \u00een Partea 3. Afla\u021bi despre TEE, contractele inteligente bazate pe jocuri \u0219i serviciile de amestecare.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-3\/","og_locale":"ro_RO","og_type":"article","og_title":"Privacy and Security in Blockchain - Part III | Security Briefing","og_description":"Discover the privacy and security features of blockchain in Part 3. Learn about TEE, game-based smart contracts, and mixing services.","og_url":"https:\/\/securitybriefing.net\/ro\/lant-de-blocuri\/confidentialitate-si-securitate-ca-principale-caracteristici-ale-blockchain-partea-3\/","og_site_name":"Security Briefing","article_published_time":"2023-03-11T23:11:25+00:00","article_modified_time":"2024-05-31T23:44:31+00:00","og_image":[{"width":600,"height":369,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"5 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Privacy and security as main characteristics of the Blockchain: Part 3","datePublished":"2023-03-11T23:11:25+00:00","dateModified":"2024-05-31T23:44:31+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/"},"wordCount":1059,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","articleSection":["Blockchain"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/","url":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/","name":"Confiden\u021bialitate \u0219i Securitate \u00een Blockchain - Partea III | Informare de Securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","datePublished":"2023-03-11T23:11:25+00:00","dateModified":"2024-05-31T23:44:31+00:00","description":"Descoperi\u021bi caracteristicile de confiden\u021bialitate \u0219i securitate ale blockchain-ului \u00een Partea 3. Afla\u021bi despre TEE, contractele inteligente bazate pe jocuri \u0219i serviciile de amestecare.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/03\/Privacy-and-security-as-main-characteristics-of-the-Blockchain-1.jpg","width":600,"height":369,"caption":"characteristics of the Blockchain"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/blockchain\/privacy-and-security-as-main-characteristics-of-the-blockchain-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Privacy and security as main characteristics of the Blockchain: Part 3"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1545"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1545\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1547"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}