Why Blockchain Technology Is Here To Stay

Why Blockchain Technology Is Here To Stay

We keep up the tradition of giving the stage to crypto advocates to talk about the cryptoindustry. This time we will review the usefulness of blockchain technology and why it deserves a say in the modern world

If you asked anyone about the blockchain technology five years ago, they would have probably rolled their eyes in dismissal. However, the dramatic rise of Bitcoin has put its underlying tech in the limelight. Even though some people are predicting the fall of Bitcoin, everybody agrees that blockchain will stick around for a very long time.

Blockchain is a revolutionary technology that still many people have a hard time comprehending how it works. Simply put, it includes an immutable, decentralized public ledger that eliminates the need for a central authority, ensures privacy, and makes the transfer of data transparent. Bitcoin was the first implementation of this tech, and many industries quickly found numerous applications for it within their niches.

For example, did you know that 90% of major North American and European banks are exploring blockchain-based solutions? Or that 15% of healthcare organizations adopted blockchain for commercial deployment in 2017?

Businesses and organizations across multiple industries seem to be on a race to adopt blockchain technology, and it’s for a good reason. The way it works just makes uses keep rolling out.

How Does It Work?

The blockchain-based system is a decentralized or distributed network that works on the peer-to-peer principle. This means that it is not governed nor maintained by any central authority or administrator, but by several or numerous independent computers.

A blockchain system can’t work without a ledger which registers any change of data on the network. It is not possible to conduct any transactions or transfers of data without this registration. Depending on the needs of the users maintaining the network, these ledgers could be public (the most popular use), private, or consensus.

Now, before data transfer is completed and registered on the ledger, other members on the network need to verify it. This step is necessary to prevents frauds and double transactions.

After verification, transactions are added as a block of data to the chain that contains all previous blocks of data. Each of them contains information of the previous blocks, making the chain unbreakable. In other words, you cannot cut the chain and remove any part of it without destroying the entire system.

This is precisely what makes it so secure. As we already said, the chain of data is not stored on a central network of computers but is copied over across different computers. If hackers ever wanted to breach into a system, they would first have to gain control over individual computers. This is nearly impossible, considering that a blockchain network could be composed of millions of different machines.  

This way of storing data and other opportunities that blockchain offers have quickly attracted many businesses and organization who began implementing blockchain solutions in their daily operations. Not relying on a central clearing authority translates directly to improved security, lower costs, and faster transactions.

Since the system completes most of the operations by itself, the need for human interference is nearly eliminated, which further means that human errors could not impact how blockchain and transactions work.

Furthermore, transactions between people conducted on such a system can be trustworthy, as it is not possible to change or remove data once it’s registered on the ledger and added to the blockchain.

Some Implementations

Nearly all major industries have already adopted the technology. Let’s see a few examples.


In the cybersecurity industry, for example, there are already countless startups working on improving online security and eliminating hacking, identity thefts, etc. By using blockchain, these new solutions do not have to rely on the old 'username-password' system, as it is now possible to access and use a service without ever creating usernames and passwords.

The improved security levels are, of course, much better than what we had before, but since the industry is still young, these solutions are not perfect yet and could be still vulnerable to attacks in some cases.

Internet of Things (IoT)

This is yet another industry that has profited from implementing the blockchain technology. Some big names like IBM and Samsung, as well as numerous startups, are working on creating decentralized apps that will be responsible for controlling IoT devices. Since they will be blockchain-powered, the network will be harder to breach into, and there will be significantly fewer abuses.


Blockchain solutions in the healthcare industry are already the old news. Since it is now possible to store patients’ personal and medical data on a distributed network, there are fewer frauds with leaked social security numbers, insurance, social benefits, etc.


Considering that the blockchain technology is currently the best way to store and transact data, many experts agree not only that it is here to stay, but that it will grow in the future. We should not be surprised by such predictions, as it is not easy to replace it with other currently existing technology.

The competing tech would have to be simpler, offer higher levels of security, efficiency, and transparency, but also be able to penetrate all major industries.

At this moment, blockchain does not have such competition.

Related news

Mass. General breach exposes private info on 9,900 in research programs

A data breach in the neurology department of Massachusetts General Hospital (MGH) exposed private data, including genetic information, on 9,900 people participating in research programs, the hospital said, placing the blame on an “unauthorized third party” who gained access between June 10 and June 16. The hospital was quick to point out that “the research data did not include any study participant’s Social Security Number, insurance information, or any financial information” or involve its medical records system. But according to Dan Tuchler, CMO at SecurityFirst, the breach is still “troubling.” “Medical information, including medical history, diagnoses and even genetic information, have been compromised,” said Tuchler. “We don’t have much experience yet in what kind of lasting damage can be caused with this very personal info, but this is surely going to grow in the future.” He said the intrusion “was caused by computer applications used in neurological studies, which would likely be very cutting-edge programs developed by sophisticated computer experts,” but pointed out that “without careful attention to security best practices” even those programs could be vulnerable. “In fact there are usually tighter controls on basic business programs that there are on research programs,” said Tuchler. The nature of the breach raises the question as to whether Mass General “outsourced the data or the research to a third party, perhaps to another country, thus also outsourcing their security,” said Lucy Security CEO Colin Bastable. “The medical industry was the first to be phished, over 20 years ago, and it still ‘leads the way’ in data incontinence.” It’s not the first breach that Mass General has experienced. In early 2016, an unauthorized individual accessed the network of Patterson Dental Supply, a division of Patterson Companies, a Saint Paul, Minn.-based medical supplies conglomerate, which services MGH with the software used in managing dental practice information, and exposed the PII of 4,300 of the hospital’s patients. The purloined data included patients’ names, dates of birth, Social Security numbers and, in some cases, the particulars of dental appointments. A year-earlier breach – this time at the hands of an MGH employee who inadvertently sent an email containing personal information to the wrong email address – exposed the names, lab results and Social Security numbers of 648 patients. “Another case of data breach déjà vu,” said Jonathan Deveaux, head of enterprise data protection at comforte AG, noting the commonality between the 2016 and 2019 breaches “is that unauthorized individuals gained access to sensitive data.” The latest incident, though, didn’t include SSNs, insurance information or financial data, which Deveaux cites as a plus. “The decision to not include data in a database is a good decision from a data privacy point of view,” he said. “Should the database get exposed, or should unauthorized individuals gain access, there would be no sensitive data to worry about.” Whether Mass. General is dealing with an advanced, coordinated attack or overprovisioned access rights to a data resource, neither “is an easy one to address,” said STEALTHbits Technologies CMO Adam Laub. “Sophisticated attackers consistently circumvent security controls with high degrees of success and assessing, reviewing, and adjusting access rights across all data resources – especially in organizations like health care institutions that house sensitive data in virtually every corner of their networks – requires tremendous discipline and commitment monetarily, culturally, and otherwise.” Mass. General said as soon as it discovered the breach on June 24, “it took steps to prevent further unauthorized access and restore the affected research computer applications and databases,” and also tapped “a third-party forensic investigator to conduct a review and has contacted federal law enforcement as a precaution.” In the wake of the incident, the hospital said that it “continues to review and enhance the security processes in place for its research programs.” The post Mass. General breach exposes private info on 9,900 in research programs appeared first on SC Media.
SC Media

Hot news

By continuing to browse, you agree to the use of cookies. Read Privacy Policy to know more or withdraw your consent.