What Does the EU’s GDPR Mean for Blockchain? 241

Generally we know that blockchain technology underpins cryptocurrencies, and there are many organizations using the technology for a myriad of other applications: executing contracts, modernizing land registries, even providing new systems for identity management. But there’s a small problem on the horizon. According to a post today from Washington, DC-based think tank Coin Center, blockchain technology may be fundamentally incompatible with Europe’s new privacy laws that will come into effect in May of this year.

General Data Protection Regulation

The General Data Protection Regulation (GDPR) will take effect on May 25th, under the new rule companies will be required to completely erase the personal data of any EU citizen who requests that they do so. The problem is that with blockchain, a complete erasure of any stored personal data might not be possible, experts told The Verge.

“Modifying data on a blockchain is very hard,” Oxford Law lecturer Michèle Finck told The Verge, “If you were to delete or modify data from the blockchain to comply with the GDPR’s rights to amendment or the ‘right to be forgotten,’ you wouldn’t just change that piece of data, but the hash of the block containing the data and of all subsequent blocks.”

Finck continued, “I think it’s safe to say that currently, most blockchains are incompatible with the GDPR, especially permissionless blockchains.” She said that although some blockchain projects are currently thinking about applications that would be GDPR-compliant, the problem is that “there are so many points of tension…way beyond the right [for personal data] to be forgotten.”

By their very nature, transactions on a blockchain aren’t meant to be deleted, but to be recorded permanently. It would also be difficult to stop every place transmitting a Bitcoin transaction. “This is by design… It’s the basics of blockchain technology,” Andries Van Humbeeck, co-founder and blockchain consultant at TheLedger.be, a Belgium company that provides blockchain-related training and advice, told The Verge.

“If you purge a block of transactions, the truthfulness of all subsequent blocks of transactions becomes questionable.” He continues,“all Bitcoin transactions after that purged block become untrustworthy, which would undermine the complete system.”

Because of all this, compliance headaches could afflict thousands of companies. Case in point: more than 1,000 apps are being built on the Ethereum blockchain alone, according to the stateofthedapps.com.

“I think it will impede some of the applications,” Greg McMullen, a lawyer based in Germany and blockchain expert, says of the law. “We’ll get a bit of a reality check on what the right kinds of applications are to build on a blockchain.”

 

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

SIMBA Chain Announces Connectivity to Over-260 Applications on Microsoft AppSource 3991

Blockchain innovator SIMBA Chain today announced the availability of its Smart Contract as a Service (SCaaS) platform on Microsoft AppSource, an online cloud marketplace providing tailored line-of-business solutions. With its low code and drag-and-drop approach, SIMBA Chain’s cloud-based blockchain platform democratizes distributed application (dapp) design, development, and deployment, providing a powerful business enabler that was previously the domain of elite developers with deep coding experience. By using the SIMBA Chain SCaaS platform, individuals with little or no coding experience can quickly create dapps for iOS, Android, and the web to solve a range of operational and mission-critical challenges that require secure, immutable data transmission, storage, and tracking.

Joel Neidig, CEO and co-founder of SIMBA Chain observed that inclusion on Microsoft AppSource supports “do-it-yourself” developers intent on prototyping and experimentation, as well as experienced developers who can use the platform to scale complex, enterprise-wide blockchains. “Our platform is so simple, intuitive, and fast that literally anyone with an idea can create a blockchain dapp. With the increased visibility and accessibility afforded by Microsoft AppSource, we hope to engage and motivate new users to design and test dapps for specific use cases,” Neidig continued. “Ultimately, we want empowered analysts—individuals with deep expertise in a specific industry who have an intuitive understanding of technology—to experiment with blockchain and unleash the next wave of digital transformation.”

Toby Bowers, General Manager, Business Applications Group, Microsoft Corp. said, “We’re happy to welcome the SIMBA Chain SCaaS platform to Microsoft AppSource, which gives our partners great exposure to cloud customers around the globe. Microsoft AppSource offers partner solutions such as the Simba Chain platform to help customers meet their needs faster.”

About SIMBA Chain, Inc.
Headquartered in South Bend, Indiana, SIMBA Chain is a Microsoft independent software vendor. Its SCaaS blockchain platform runs on the Microsoft Azure cloud computing platform, and the solution supports Ethereum, Quorum, RSK, Stellar, Hyperledger, and other blockchain protocols.

Secure Cryptophones 3764

In the recent past, various eye-opening revelations have been made about spying by government and private organizations. As a result, there has been a growing interest in how people can keep their communications private. After all, nobody likes to have his or her private conversations being snooped on.

Why Digital Privacy Matters So Much

Today, most people have their lives connected to their digital identities. With just a few keystrokes, hackers could empty your bank account and take measures that destroy your lives and the lives of those around you. Today, keeping your private communications is not simply a matter of philosophy; it is about guarding your livelihood. There are numerous examples of people who have their finances ruined because their private details leaked online.

How to Preserve Privacy

Today, there are various options for preserving privacy. For instance, you can opt to use a messaging service that offers end-to-end encryption. There are encrypted email services that allow you to send and receive encrypted emails to your friends and business partners. In general, there are numerous platforms and tools online to help you protect your privacy. It is especially important when you are sending sensitive documents with personal details.

Using Encrypted Phones

The problem with using encrypted apps and platforms is that communications still take place over an unsecured phone. As a result, even when those snooping on you cannot access these services, they can still access the phone itself and discover private details about you.

It is the reason why people seeking more protection are turning to encrypted phones. Cryptophones, as secure encrypted phones are called, offer a high degree of privacy protection compared to using individual apps. The pones use high-grade encryption to protect every aspect of the phone.

Consequently, those trying to gain access to any secure information will fail. Another benefit of these phones is that they encrypt voice communications between the two parties using the phones. The result is that anyone can discuss sensitive information on air without the fear that their information is visible to third parties, who might have malicious intent.

How to Pick a Secured Encrypted Phone

Besides communication, a modern Cryptophone should enable you to conduct financial transactions anonymously. You should thus go for a phone with full cryptocurrency supports. Cryptocurrencies ensure that your financial transactions do not go through a central hub, where they can be tracked.

Another you should look for is protection from GMS and GPS location tracking and IMSI catcher. The feature ensures that not only is your digital footprint protected but your physical movements also remain private.

A good example of a cryptophone that secures your privacy is the secure, encrypted Ano Phone from Germany. The phone is fitted with a protected Android OS that eliminates the risky backdoor APIs and Google library with tracking services. It arrives with a mobile-first secure private VPN service, and a firewall. It ensures all your private details remain protected at all times. The phone also brings support for cryptocurrencies and other payment options in favor of discerning customers. In recent comparisons and longterm tests, Ano Phone encryption on the hardware disk and the communication with end-to-end have been confirmed. In addition to the high-level security layer, it takes care of the OS performance, not slowing down though meeting the high encryption requirement and saving your battery with VPN running without leaks or interruptions.

Another option is the EMP line of phones from Canada. These phones also offer encrypted storage as well as secure voice and text communication. Other features included in the phone are secure call history protection, dynamic key generation after each call with same phone, and the lack of a central key management system. The device protects the data on the disk by software encryption. The product is not optimized for VPN usage for longterm but compatible for VPN on Wireless Lan without mobile data connections. By customer support, additional end-to-end communication tools can be purchased.

Besides, we found a lot of bad apples on the market with different brand names that still offer Google and Blackberry devices with built-in backdoors. Features like remote access, remote wipe, enrollment or distribution let you give up control to the provider, put privacy at risk and are a red flag.

Summary

In general, if your line of work entails handling sensitive communications over the internet, it is important to protect yourself. You never know what malicious actor could be dropping in on your calls. Cryptophones are also great for anyone who values their privacy and who wants to stay safe amidst the growing digitization of everyday life and the growth in cybercrime, especially identity theft.

WGRT Hodl & Rewards Campaign 3854

wgrt

Dear all, to celebrate the WGRT hit the new High 800%, Waykichain.com present our #WGRT Hodl Campaign! Waykichain.com are having 2 Campaigns from August 16(UTC) – August 22(UTC)

Campaign 1: Small Amount of Holding WGRT

Campaign Period: Any 5 days during 18:00 UTC on August 16, 2020 to 17:59 UTC on August 22, 2020

How to Receive Rewards:
1. Buy WGRT on OKEx Exchange
2. Leave your address of OKEx in Comments
3. Hold at least 10,000WGRT at the 3 daily snapshots
4. WGRT balance snapshots will be taken at 3 random times each day by Exchange
5. Start earning rewards of yield 20%+
6. Rewards will be distributed into your OKEx account within 1 weeks of when the campaign ends on August 30
7. Top 20 Hodls will share prize pool of 1000,000WGRT
8. For hodl

Eligibility:
To receive your WGRT earnings, at the time of distribution your OKEX account must:
* Be in good standing and cannot be closed or frozen
* Not be located in any of the prohibited countries or jurisdictions that are highlighted in the OKEx User Agreement

Campaign 2: Kol Hodl Rewards Campaign

Campaign Period: Any 3 days during 18:00 UTC on August 15, 2020 to 17:59 UTC on August 22, 2020

How to Receive Rewards:

1. Kol Hodl holding WGRT at least 5000,000 WGRT (both individual or collective from community eligible)
2. Leave your address of OKEx in Comments #Kol hodl
3. Hold at least 5000,000WGRT at the 3 daily snapshots
4. WGRT balance snapshots will be taken at 3 random times each day by Exchange
5. Start earning rewards of yield 80%
6. Rewards will be distributed into your OKEx account within 1 weeks of when the campaign ends on August 30
7. WGRT Hodls with huge amount more than 5000,000WGRT please contact: waykichainloiswhite on Telegram for more benefits

Terms & Conditions
1. Promotion Period: 14 days – 18:00 UTC on August 15th, 2020 to 17:59 UTC on August 22, 2020
2. To be eligible for rewards, you must hold at least 10,000WGRT in your OKEx account during at least one of the balance snapshots throughout the promotion period. The more WGRT you hold, the more prize you can get.
3. Rewards will be distributed proportionately for participants based on their WGRT balance.
4. Rewards will be distributed within 1 weeks after the promotion ends on August 30
5. We are unable to distribute rewards or airdrops to customer accounts that are frozen, closed, or based out of a country in our prohibited countries list. For further details, please refer to our User Agreement.
6. If we determine that an individual has used multiple accounts in order to win multiple prizes, we will distribute only one reward to that individual.

HyperPay Introduces TSS, Security Level Further Upgraded 4372

A few days ago, HyperPay wallet introduced TSS (Threshold Signature Scheme) advanced cryptography technology, and was the first to implement it in HSM (Hardware Security Module). HyperPay has fully implemented the ECDSA TSS solution and applied it in HSM. Through the encrypted interaction of multiple HSMs, the final signature is jointly calculated, which saves the on-chain multi-signature fees and avoids the on-chain multi-signature loopholes. It is the first time in the industry that combines TSS and HSM technologies to create the highest security level of off-chain products and wallet. HyperPay will maintain the unremitting pursuit of security technology in the subsequent business development, and maintain the security of the business operating environment.

Digital assets, a form of currency based on computer information technology, came into being due to the development of modern information technology and application. It improves transaction security because of its characteristics such as traceability, anti-counterfeiting, and anti-tampering, and has developed rapidly based on the government-encouraged blockchain technology.

However, the security accidents of blockchain digital assets are on the rise, caused by miscellaneous reasons, so the management and security problems of large assets have become the enduring focus in the industry.

Since the underlying logic of the public chain and smart contract may have loopholes, hackers may be lurking in them, waiting to steal the assets on the chain. Once the assets on the chain are stolen, the possibility of recovery is small, and it is clear that using multi-signature to protect the security of assets can no longer kept up with the needs of technological iteration.

New Direction of Asset Security Technology – TSS (Threshold Signature Scheme)

Threshold signature is a distributed multi-party signature protocol, including distributed private key generation, signature and verification algorithms. In recent years, with the rapid development of blockchain technology, signature algorithms have gained widespread attention in academic research and commercial applications, especially in the dimensions of security, ease of use, scalability, and distributability.

Because of the close and important connection between blockchain technology and signature algorithms, the development and the introduction of new paradigms of signature algorithms will directly affect the characteristics and efficiency of blockchain networks. In addition, the private key management needs of institutions and personal accounts inspired by distributed ledgers have also hastened the birth of many wallet applications, and this change has even spread to traditional enterprises.

Whether in blockchain or traditional financial institutions, threshold signature schemes can bring security and privacy improvements in a variety of scenarios. As an emerging technology, threshold signatures are still under academic research and implementation discussions. Among them, there are still unverified security risks and inconveniences.

Notes: Hardware Security Module is a computer hardware device used to protect and manage the digital private key for a strong authentication system and provide related cryptographic operations. Hardware Security Module is generally directly connected to a computer or network server in the form of an expansion card or an external device.

Traditionally, multi-signature technology is achieved based on the blockchain, such as Bitcoin-based native multi-signature (OP_MULTISIG) and Ethereum smart contract-based multi-signature. Those are implemented through the rules of the blockchain itself. Multiple signatures are combined together and put into the transaction body, and when the node receives the signature, it will verify whether all the signatures are successful through the corresponding public key. Only when all (that reaches the threshold) being successfully verified are considered the transaction is legal.

Then the TSS technology was first proposed in the cryptography field at the end of the 20th century. It progressed slowly, and due to the small demand for threshold cryptography at that time, there was no major breakthrough around 2017. There were many algorithms based on two-party TSS (ie 2-2 multi-signature), but were low-performance and impractical.

The Real Development of TSS

In recent couple of years, with the rapid development of blockchain technology, the significant increase of DeFi market value, this decentralization technology has been paid attention to by mainstream cryptographers again, the research on TSS technology based on ECDSA algorithm especially active. Israeli cryptographer Yehuda Lindell proposed fast 2-party TSS in 2017, and improved to fast n-party TSS in 2019; at the same time, Gennaro on behalf also proposed another n-party TSS in 2019 which has basically the same experimental performance as the former.

What differs TSS technology from traditional multi-signature on the chain is that TSS can be regarded as off-chain multi-signature. There is only one private key on the chain, and the single private key is dispersed into n components through cryptography. When signing, the final signature is jointly calculated through multi-party interaction, and this signature can pass the verification of the corresponding single public key. It is called MPC (multi-party computing) technology.

BOE exhibits leading-edge display technologies at Display Week 2020 4465

SID Display Week, the most influential tradeshow for the global display community, presented the first ever virtual show on August 3, 2020. BOE showed a slew of its innovative display technologies and applications such as printing OLED, flexible display, Mini LED, BD Cell, and reflective LCD display in mind-blowing videos, exposing global visitors to the charm of leading-edge technologies.

Mini LED stood out as one of the most sought-after technologies at Display Week 2020. BOE exhibited its 75-inch 8K and 27-inch 4K Mini LED products. The use of glass-based Mini-LED backlight and High Dynamic Range (HDR) technology helps to improve display effect significantly, enabling a brightness level of up to 1,500 nits and a contrast ratio of 1,000,000:1. The exceptional color performance gave the visitors an stunning visual experience.

BOE’s BD Cell display, recognized as Display of the Year 2020 by the Society for Information Display (SID), also appeared at the virtual event, as a brand-new breakthrough in display technology. BOE showcased a series of such products such as 110-inch 8K BD Cell display, 75-inch 8K BD Cell display, 98-inch 4K BD Cell display, and 3.5-inch BD Cell display for VR headsets. BOE’s BD Cell displays feature pixel-level ultra-fine light control, an ultra-high contrast ratio of up to million-level, and 12-bit color depth, which makes it possible to present perfect lifelike images. In addition to high-end TV products, BOE’s BD Cell technology will also be applied to monitors, vehicles, wearables and other products.

BOE also presented the world’s first 55-inch 8K printing OLED display at Display Week 2020. It is made using the world’s leading RGB printing technology and Oxide processes, which enables the perfect presentation of 8K images. This represents a major direction of development for large-sized OLED displays. BOE has also launched 14-inch, 17-inch, and 30-inch products to advance the development of printing OLED.

Moreover, BOE brought to visitors its flexible AMOLED displays that can be folded, bent and rolled up, showing them the unlimited potential of flexible displays. A laptop display with a refresh rate up to 360Hz, fully meet user requirements of playing games or watching videos. Reflective displays can be applied to e-books, tablets, bus stop signs, outdoor displays, etc., bringing people a healthier and more eco-friendly display solution.

Narkasa Cryptocurrency Exchange Targets the Global Market 4990

Narkasa

The cryptocurrency industry is always evolving, leading to increased awareness and popularity of Bitcoin and other crypto-assets. Among the leading areas of innovation in this emerging ecosystem is the evolution and sophistication of new cryptocurrency exchanges. A lot of existing exchanges create own and limited value proposition to its users, for instance, offering trade tutorials, global reach and mass adoption of cryptocurrencies. Other platforms focus on improving security features and customer support. However, few crypto exchanges are focused on user-centric features such as building a user-friendly platform, trading support and legal compliance across jurisdictions. Narkasa is a recently launched cryptocurrency exchange prides itself as being the most user-centric platform in the market and goes on to offer more than one solution to its users.

Launched in June 2020, Narkasa cryptocurrency exchange is duly registered and located in Istanbul. Legal and regulatory compliance is a huge competitive advantage of the exchange in its bid to ensure customer’s funds and data remain safe. Therefore, the exchange operates in compliance with the European Union’s AML/CTF and KYC guidelines.

Buying and selling cryptocurrencies has just been simplified for both new and experienced users! Users can access Narkasa services through its website as well as via iOS and Android devices. Trading experience is enhanced via the use of an API supported algorithmic trading technology. As a market leader in user-experience in the cryptocurrency industry, a user has an opportunity to interact with the various user-interfaces available on the exchange via the website even without a prior sign-up requirement. Hence, allowing its customers to decide to opt-in or not.

Further, Narkasa goes past being a user-friendly platform which is significant to driving crypto mass adoption and positions itself for global expansion and support. The exchange plans to introduce crypto trading supported by 156 national currencies. Therefore, allowing investors and other crypto enthusiasts from all over the world to buy and sell cryptocurrencies of their choice supported by host country fiat money/currency. Already, few weeks after launch the exchange supports transactions in various fiat currencies namely Ruble (Russia), Real (Brazil), Pound (Turkey), Tenge (Kazakhstan) and Hryvnia (Ukraine). Customer support and interaction with the trading platform is also available in 12 national languages. Choosing local or host country currency is win to Narkasa users because it’s an opportunity to save on foreign exchange cost otherwise charged if one has to convert funds from leading fiat currencies to a local one. Additionally, as a user you get to view your balances easily and intuitively in your local currency.

Why Choose Narkasa Exchange?

  • Multi-Currency support (both fiat and cryptocurrencies
  • Low Trading Fees
  • Zero Commission on Purchases of Cryptocurrencies via the Platform
  • User-Friendly Platform
  • Global Access
  • Multinational Platform -Supports 12 Languages
  • 24/7 Live Customer Support
  • Powerful Trade Engine backed by Artificial Intelligence (AI)
  • Fast, Safe and Secure Transactions

Are you frustrated with the complex user-interfaces experienced with cryptocurrency exchanges, huge costs and lack of consistent customer support? Narkasa is the exchange to be. Traders are reaping huge returns via the exchange by leveraging on its cutting-edge technology. What’s more, the exchange is running an offer, 50 per cent discount on all transactions via the platform within its 90 days after the official launch.