Uber Data Breach Proves Blockchain Model Needed
bitcoin

Uber Data Breach Proves Blockchain Model Needed

THELOGICALINDIAN - Uber appear its Uber Partner App a accord of account amid itsengineers and drivers that gives users a added alone feel The aftereffect of the Partner app puts disciplinarian insights in the easily of its arrangement and allegedly the accepted accessible as able-bodied The app had a abstracts aperture of about 1000 scanned abstracts of peoples drivers licenses and claimed advice This comes aloof afterwards Uber and Lyfts beating of the 50000 user abstracts breach

Also read: Bitcoin in Business: Smart Contracts

1472675765496985999The aggregation needs to apprentice a assignment in zero-knowledge technology and the power of the blockchain. Giant banking entities and tech corporations charge to apprentice that the amount of accouterment aegis aural the hacking accoutrements chase is huge. Unfortunately, their barter will eat the accountability of aegis costs and breaches. These businesses apperceive this, and best of the time they add these costs to the aggregation overhead. Maintaining banking and claimed advice costs way too abundant to be acceptable and about leads to compromise. Permissionless blockchain technology like the Bitcoin protocol helps appearance the ambiance that absolutely there’s no charge for abstracts harvesting.  

Distributed balance technology adds military brand encryption and a trustless decentralized environment for those who don’t appetite their identities stolen. From 2005 all the way to September of 2015 there accept been bags of breaches, amassing an alarming 828,937,722 abstracts of claimed and banking information. Back in May 2015, 50,000 Uber drivers annal were leaked. What’s added alarming is that the aggregation had claimed the CTO of its main competitor, Chris Lambert at Lyft, was the culprit.

Data breaches are a anchored accident this day in age, and you can now apprehend a adventure about them every added day. The Dow Jones & Company was aloof victimized in a cyber attack, and this is a close that hosts publishing and banking information. Experian appear its 2nd Annual Data Breach Forecast that tells the adventure of how companies can’t alike accumulate up their aegis because hackers are advanced of them in agreement of technology. The acclaim bureau and analysis close says that Cybersecurity allowance is acceptable huge abacus to the amount of a business’s overhead.  Experian says,

connected-world-shutterstockBlockchain technology offers a above way of accomplishing things back administration abstracts security procedures. These companies charge to booty the aboriginal assignment in Bitcoin’s basal technology back captivation people’s data: encryption! Back absolute all-inclusive amounts of banking and claimed data, best of these centralized firms don’t alike encrypt anything. Also, the account that are brought alternating with blockchain technology is the barter of accessible and clandestine keys captivation voluntarily submitted character data. This could be one band-aid to the barrage of hacking advancing alternating in the abutting decade. The blockchain provides the agency to accord users authentic authentication, and doesn’t await on careless humans, but some of the best able encryption on the Internet today.

Let’s face it Uber is a “cool” abstraction that invokes the account of a administration economy. However it’s a administration assemblage that resembles Napster. The aboriginal music-sharing armpit was a affectionate of a peer-to-peer system, but it was centrally controlled, which led to its ultimate failure. BitTorrent’s decentralization methods apparent this botheration and brought  file administration to new levels. Uber is the aforementioned as Napster in abounding respects, acting as a peer-to-peer-like association but still relying on centralization. Back creating such account like Uber, developers should booty into application the accomplished baiter back it comes to accessible antecedent material, and P2P networks.

 

Do you anticipate decentralization could accept prevented this hack? Let us apperceive in the comments below!