{"id":256,"date":"2018-05-03T02:14:53","date_gmt":"2018-05-03T02:14:53","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/28920\/Will-Privacy-Be-A-Stumbling-Block-For-Blockchain.html"},"modified":"2018-05-03T02:14:53","modified_gmt":"2018-05-03T02:14:53","slug":"will-privacy-be-a-stumbling-block-for-blockchain","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/","title":{"rendered":"Will Privacy Be A Stumbling Block For Blockchain?"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/media.scmagazine.com\/images\/2018\/04\/25\/blockchain_1416747.jpg?format=jpg&amp;zoom=1&amp;quality=70&amp;anchor=middlecenter&amp;mode=pad\" alt=\"Will privacy be a stumbling block for blockchain?\" title=\"Will privacy be a stumbling block for blockchain?\" border=\"0\"\/><\/div>\n<p>Will privacy be a stumbling block for blockchain?<\/p>\n<p>Best known as the infrastructure underlying the wildly popular Bitcoin cryptocurrency, blockchain technology has really come into its own in the past year or so\u2014being viewed, trialed and utilized as a means of better executing and sharing corporate documents, managing identity and authentication, even running an emerging social media network. Proponents say the beauty and attraction of blockchain is two-fold: it creates a decentralized or \u201cshared\u201d ledger of transactions and activities, and it is (thus far) immutable.<\/p>\n<p>While most organizations have historically created centralized applications and systems, blockchain by contrast \u201cis a protocol of trust,\u201d says Nick Spanos, CEO and founder of Zap.org, and founder of Bitcoin Center NYC and Blockchain Technologies Corp.<\/p>\n<p>\u201cIt&#8217;s counterproductive when organizations rely on human trust instead of the mathematically-proven trust protocol of blockchain,\u201d Spanos says. \u201cAll security compromises have occurred with flawed, centralized systems interfacing with but not actually built on the trust protocol &#8212; like exchanges.\u201d<\/p>\n<p>Since the distributed ledger is pseudonymous, Spanos points out, \u201cyou know something happened or is occurring, but you don&#8217;t know who the users are. It simply publicly proves that events happened.\u201d<\/p>\n<p>But therein lies one major potential issue in the \u2018trust, but verify&#8217; approach upon which many private- and public-sector programs systems have typically been built, as well as the privacy laws dictated by consumer groups and regulators. Rebecca Herold, CEO of The Privacy Professor and president of Simbus LLC, says that the fact that \u201ctrust that must be depended upon to make shared ledgers work is one of the biggest risks, and brings significant privacy issues.\u201d Since there is no central authority or third-party moderator involved in the blockchain, she sees shared ledger technology currently as \u201cgenerally expensive and inefficient.\u201d<\/p>\n<p>In many industries\u2014like financial services and healthcare, where privacy is a regulatory and legal imperative\u2014using blockchain may present some concerns, say experts.<\/p>\n<p>Arran Stewart, co-owner of the blockchain-based recruitment platform Job.com, says ultimately problems may arise depending on \u201cthe quality of how a blockchain is put together, specifically the information stored on it and the encryption of the data being held on the blockchain. Like the early stages of any technology or system, breaches, scandals, or other issues are almost an inevitability. This because of the nature of human error.\u201d<\/p>\n<p>\u201cSomeone somewhere will list information publicly that is sensitive and someone else will spend a lot of time figuring out how to get it,\u201d Stewart adds. \u201cThis is where I envisage there being a privacy issue\u2026 Companies are already talking about putting medical records on the blockchain, which is probably the most sensitive data available.\u201d<\/p>\n<p>As Will Gragido, the director of advanced threat protection at Digital Guardian, points out, blockchain has already captured the attention of the criminal element due to the popularity of Bitcoin for making virtually anonymous transactions. \u201cIt&#8217;s attractive because [the system] is decentralized and pseudo-anonymous,\u201d he says. \u201cThere is a potential for exploitation, maybe not as much as other systems, but there is the potential.\u201d<\/p>\n<p><strong>Invasion of Privacy?<br \/><\/strong><\/p>\n<p>While it&#8217;s still early days for blockchain being used as an underlying infrastructure, developments have been snowballing quickly\u2014even among organizations in the most highly regulated sectors, where there are likely to be the biggest concerns surrounding data privacy. Despite the relatively restrictive nature of HIPAA, Herold, who has several clients in the healthcare space, says there are \u201cgrowing initiatives in healthcare to seriously pursue blockchain as a type of solution to privacy risks and patient data security. Many have already implemented blockchain, at least in limited ways.\u201d<\/p>\n<p>\u201cImplementing blockchain does not fit neatly within most legal and regulatory compliance requirements that exist, and those working to meet compliance are likely new to blockchain and may not realize all the associated compliance issues,\u201d Herold says, adding that \u201cvalidating the security and privacy of blockchain is not a simple goal to accomplish.\u201d<\/p>\n<p>Vitali Kremez, director of research at Flashpoint, says while the technology implementations and even pilots here are only just emerging, he knows of at least one major Wall Street financial firm that is planning to adopt blockchain for financial transactions as opposed to using a traditional mechanism like the automated clearinghouse.<\/p>\n<p>As Gragido points out, \u201cThere&#8217;s a lot of talk right now, but not a lot of understanding. [Using blockchain] could be more secure, but it remains to be seen based on the implementation and the state of overall risk.\u201d<\/p>\n<p>Aside from HIPAA in healthcare and a bevy of existing industry-specific and over-arching privacy rules and regulations that could call into question the use of blockchain, the biggest issue is expected to emerge as the European Union&#8217;s highly impactful General Data Protection Regulation (GDPR) comes into effect this month [May 2018].<\/p>\n<p>Since GDPR will affect any company with customers in the EU and impose heavy fines on those organizations that violate this compliance, many experts are considering how blockchain might complicate data privacy either by allowing information to be too easy shared or limiting the ability for companies or consumers themselves to remove or erase their data from a purportedly unalterable ledger.<\/p>\n<p>\u201cA blockchain is essentially a shared record of past activity that is unchangeable,\u201d says John McLeod, chief information security officer for AlienVault. \u201cThe potential privacy issues occur with how a company would process the data of that shared record and with Data Subject Rights under GDPR, as the shared record cannot be changed, Data Subject Rights are limited.\u201d<\/p>\n<p>Hence, McLeod, a panelist on a recent International Association of Privacy Professionals session on this topic, believes that in the immediate future any company affected by GDPR might have privacy concerns or issues with blockchain.<\/p>\n<p>Since regulations and laws typically change at a very slow pace, McLeod expects that eventual court cases will dictate how to interpret the laws overseeing data privacy in regard to blockchain. And, to that end, he expects to see court cases emerge in this arena by the end of 2018, with the outcome \u201clikely to change companies and improve the language of GDPR.\u201d<\/p>\n<p>Stewart points out that the related regulatory and legal concerns will likely present a \u201cmassive challenge as blockchain is universally spread.\u201d But it will also force regulators, governments and organizations to consider more carefully how they handle their own records and the impact of cross-border data and network sharing.<\/p>\n<p>\u201cHow do you tackle the issue of a European record being stored on an Indian-based blockchain network?\u201d Stewart asks.<\/p>\n<p>\u201cMeasures will need to be taken, such as being very clear to users that their information may sit on a blockchain outside of Europe or that their information could potentially be exposed so they can make the right decision for themselves on whether they share certain things with the blockchain or not,\u201d he says.Read More <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/28920\/Will-Privacy-Be-A-Stumbling-Block-For-Blockchain.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read More HERE&#8230;<\/p>\n","protected":false},"author":1,"featured_media":257,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[136],"class_list":["post-256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinecryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Will Privacy Be A Stumbling Block For Blockchain? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Will Privacy Be A Stumbling Block For Blockchain? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-03T02:14:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/will-privacy-be-a-stumbling-block-for-blockchain.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"379\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@thadmin\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"thadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/\"},\"author\":{\"name\":\"thadmin\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/b07e00649871a6dd150cd57b33f7db66\"},\"headline\":\"Will Privacy Be A Stumbling Block For Blockchain?\",\"datePublished\":\"2018-05-03T02:14:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/\"},\"wordCount\":1145,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/will-privacy-be-a-stumbling-block-for-blockchain.jpg\",\"keywords\":[\"headline,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/\",\"name\":\"Will Privacy Be A Stumbling Block For Blockchain? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/will-privacy-be-a-stumbling-block-for-blockchain.jpg\",\"datePublished\":\"2018-05-03T02:14:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/will-privacy-be-a-stumbling-block-for-blockchain.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/will-privacy-be-a-stumbling-block-for-blockchain.jpg\",\"width\":700,\"height\":379},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/will-privacy-be-a-stumbling-block-for-blockchain\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinecryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Will Privacy Be A Stumbling Block For Blockchain?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/b07e00649871a6dd150cd57b33f7db66\",\"name\":\"thadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"caption\":\"thadmin\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thadmin\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Will Privacy Be A Stumbling Block For Blockchain? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/","og_locale":"en_US","og_type":"article","og_title":"Will Privacy Be A Stumbling Block For Blockchain? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-03T02:14:53+00:00","og_image":[{"width":700,"height":379,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/will-privacy-be-a-stumbling-block-for-blockchain.jpg","type":"image\/jpeg"}],"author":"thadmin","twitter_card":"summary_large_image","twitter_creator":"@thadmin","twitter_site":"@threatshub","twitter_misc":{"Written by":"thadmin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/"},"author":{"name":"thadmin","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/b07e00649871a6dd150cd57b33f7db66"},"headline":"Will Privacy Be A Stumbling Block For Blockchain?","datePublished":"2018-05-03T02:14:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/"},"wordCount":1145,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/will-privacy-be-a-stumbling-block-for-blockchain.jpg","keywords":["headline,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/","url":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/","name":"Will Privacy Be A Stumbling Block For Blockchain? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/will-privacy-be-a-stumbling-block-for-blockchain.jpg","datePublished":"2018-05-03T02:14:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/will-privacy-be-a-stumbling-block-for-blockchain.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/will-privacy-be-a-stumbling-block-for-blockchain.jpg","width":700,"height":379},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/will-privacy-be-a-stumbling-block-for-blockchain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinecryptography\/"},{"@type":"ListItem","position":3,"name":"Will Privacy Be A Stumbling Block For Blockchain?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/b07e00649871a6dd150cd57b33f7db66","name":"thadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","caption":"thadmin"},"sameAs":["https:\/\/x.com\/thadmin"]}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/256\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/257"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}