Geeks
162.4K views | +0 today
Follow
Geeks
Geeks
Informatique Geek Portable Tablette Mobile Camera Appareil Photo   Français Anglais
Curated by 694028
Your new post is loading...
Your new post is loading...
Rescooped by 694028 from IT News
Scoop.it!

Microsoft is developing blockchain tech that lets you manage your digital identity | #Privacy 

Microsoft is developing blockchain tech that lets you manage your digital identity | #Privacy  | Geeks | Scoop.it

Microsoft is out to prove blockchain naysayers wrong. In an effort to show the potential of the technology beyond its applications in cryptocurrency, the Redmond giant has announced plans to use blockchain tech as the foundation for storing and processing digital identity data.

 


Via Gust MEES, massimo facchinetti, John Lasschuit ®™
Gust MEES's curator insight, February 15, 2018 7:07 AM
Microsoft is out to prove blockchain naysayers wrong. In an effort to show the potential of the technology beyond its applications in cryptocurrency, the Redmond giant has announced plans to use blockchain tech as the foundation for storing and processing digital identity data.

Following a collaboration with the Decentralized Identity Foundation (DIF), Microsoft has revealed its plans to rely on blockchain technology to solve some of the challenges we face when managing our identities and personal data digitally, such as improving privacy and security across the physical and digital world.

“We believe it is essential for individuals to own and control all elements of their digital identity,” the company said in a blog post. “Rather than grant broad consent to countless apps and services, and have their identity data spread across numerous providers, individuals need a secure, encrypted digital hub where they can store their identity data and easily control access to it.”

To this end, the company is developing an off-chain solution – akin to the Lightning Network – that will allow it to process massive volumes of ID data without congesting the blockchain network.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Digital+Identity

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

Vivalist's curator insight, February 16, 2018 6:32 AM
It's good to see big companies start to see the power of the blockchain logic beyond the overly advertized cryptocurrencies. The tech needs to be improved, but its potential for legal applications (smart contracts, digital citizenship, etc...) is real.

And in my opinion, it's the most interesting part of blockchain.
Aleksej Vasyliev's curator insight, February 19, 2018 3:11 AM
#microsoft and #cybersecurity
Rescooped by 694028 from ICT Security-Sécurité PC et Internet
Scoop.it!

New malware sets up anonymous proxies on infected PCs | CyberSecurity

New malware sets up anonymous proxies on infected PCs | CyberSecurity | Geeks | Scoop.it
ProxyBack stealthily uses your bandwidth to route traffic from a shady Russian proxy seller. ...


For as long as people have been doing productive things with software, there have been jerks making malware to screw things up and make money. As security gets better, the malware has gotten smarter over the years. Some modern variants like ransomware are pretty clever, but Palo Alto Networks has just reported discovery of something new. ProxyBack sets up anonymous proxies on infected PCs to route traffic over the victim’s connection.


There is demand for proxy connections in various countries, for both legitimate and non-legitimate uses. When ProxyBack managed to infiltrate a system (probably via deceptive software downloads), it goes to work setting up a reverse tunnel on the machine. This allows ProxyBack to circumvent security measures like software and hardware firewalls that prevent the flow of data.



Via Gust MEES
Gust MEES's curator insight, December 30, 2015 2:31 PM
ProxyBack stealthily uses your bandwidth to route traffic from a shady Russian proxy seller. ...


For as long as people have been doing productive things with software, there have been jerks making malware to screw things up and make money. As security gets better, the malware has gotten smarter over the years. Some modern variants like ransomware are pretty clever, but Palo Alto Networks has just reported discovery of something new. ProxyBack sets up anonymous proxies on infected PCs to route traffic over the victim’s connection.


There is demand for proxy connections in various countries, for both legitimate and non-legitimate uses. When ProxyBack managed to infiltrate a system (probably via deceptive software downloads), it goes to work setting up a reverse tunnel on the machine. This allows ProxyBack to circumvent security measures like software and hardware firewalls that prevent the flow of data.