Security News
"The makers of the blockchain voting platform Voatz have had to go on the offensive to address assertions from MIT researchers that their app is insecure and can be easily hacked into. MIT researchers released a lengthy paper on Thursday that said hackers could change votes through the app, which has already been used in Oregon, West Virginia, Washington, and Utah since 2018."Their security analysis of the application, called Voatz, pinpoints a number of weaknesses, including the opportunity for hackers to alter, stop, or expose how an individual user has voted," MIT said in a news release. Michael Specter, a graduate student in MIT's Department of Electrical Engineering and Computer Science and a member of MIT's Internet Policy Research Initiative, and James Koppel, also a graduate student in EECS, described what went wrong with Voatz and how they discovered the vulnerabilities in their paper, "The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S Federal Elections."
In a conference call on Thursday, Voatz responded to MIT researchers' critique of its voting app. Voatz combines a smartphone app, biometric verification, and Hyperledger blockchain to make voting easy for people who can't physically make it to the ballot box.
It's not surprising that someone would eventually suggest blockchain could solve all of Wikipedia's security problems. As Krawisz said on Twitter, "It would be so cheap to record enough information about all Wikipedia interactions on the [Bitcoin] blockchain that you could probably eliminate all possible child porn distribution on it for very low fees. Think of the savings!".
Through 2022, 80% of supply chain blockchain initiatives will remain at a proof-of-concept or pilot stage, according to Gartner. "Today, supply chain leaders have now started to treat blockchain as part of a longer-term technology roadmap and risk management planning. We see that many leaders are adopting a broader end-to-end view across their supply chains and map all requirements - from sourcing across manufacturing to the final distribution," Mr. Stevens added.
CES 2020: A "Hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats. How the IoT devices work, basically the IoT solution is based on a very low-power CPU that is running the software, communicating through a gateway to the cloud and application.
CES 2020: A "Hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats. How the IoT devices work, basically the IoT solution is based on a very low-power CPU that is running the software, communicating through a gateway to the cloud and application.
Twitter Funds Team to Develop an Open and Decentralized Standard for Social Media read more
Sixgill, a leader in data automation and authenticity products and services, announced the commercial launch of Sixgill Integrity 1.0 for blockchain-enforced data authenticity. Sixgill Integrity...
Blockchain is a powerful security tool for mobile providers. Here's how to unlock its potential.
Blockchain isn't reserved for bitcoin. Here's how the telecommunications sector can benefit.