14.11.2016 Views

3FOOD

TIR-CG_Luxembourg-Final-Report_Long-Version

TIR-CG_Luxembourg-Final-Report_Long-Version

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Third Industrial Revolution Consulting Group<br />

mailing it a shared secret link or code. Banking, and other services that have identity-based<br />

regulations also request verifiable personal secrets like previous addresses, mother’s maiden<br />

names, and even a taxpayer's ID number or a state issued ID like a driver’s license and passport.<br />

These systems build large, centralized databases of personal ID information that are used to<br />

verify identities. As centralized repositories, they become single-vector targets, inherently<br />

vulnerable to increasingly sophisticated cyber-attacks. That means that at the same time that<br />

the value of the information contained in them increases over time, they also become less<br />

secure over time. One paradoxical result is that identity theft, fraud and other breaches of the<br />

identity system are easier to perpetrate against older people with identities that have accrued<br />

more value.<br />

With the Blockchain, instead of tying blockchain-related transactions to accounts with<br />

usernames and passwords, transactions are controlled by a collection of related encryption<br />

certificates. This is the device identity model and, when combined with the immutability of the<br />

Blockchain ledger, it has major benefits for security and privacy.<br />

Most people in Luxemburg own a variety of devices capable of cryptographic authentication,<br />

such as a smartphone, a tablet, a desktop or laptop computer. Increasingly, also, computing<br />

devices are embedded into machine-to-machine networks within the so-called Internet of<br />

Things. As the locus of authentication shifts to the user’s devices the would-be attacker’s target<br />

also shifts. Rather than fraudulently presenting themselves as any of the users of a service to<br />

break into its database (or simply downloading a copy of the hacked database online) the<br />

attacker that’s confronting the device identity model must compromise the actual device in the<br />

user’s possession. The result is much less value per attack.<br />

As more and more online services leverage the device identity model, expect identity fraud to<br />

more intensely concentrate on older systems that still rely on shared secrets such as passwords<br />

and Government ID numbers. Important applications like Facebook and ApplePay already rely<br />

on Device Identity to protect their systems, but the Blockchain was the first to exclusively rely<br />

on it. Additionally, because the ledger is distributed across a wide array of computers and is<br />

constantly validated by that network, the security around the information generated by those<br />

devices is also profoundly more secure than anything held on a centralized database.<br />

The concept will be vital to the Luxembourg Financial Working Group’s proposal for a data vault<br />

of citizens’ personal and property information with which they will use smart contracts to<br />

transact with each other, with corporate entities and with the government. Given the<br />

imperative of securing this highly sensitive pool of data -- and, in so doing, strengthening<br />

financial and government security while protecting personal privacy --, a transition from shared<br />

secret systems of identity to device-mediated ones secured on the Blockchain will be<br />

296

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!