{"id":13671,"date":"2017-08-25T04:13:47","date_gmt":"2017-08-25T08:13:47","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=13671"},"modified":"2023-06-01T07:38:58","modified_gmt":"2023-06-01T11:38:58","slug":"beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/","title":{"rendered":"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain"},"content":{"rendered":"<p>The cloud has been instrumental in advancing innovations in many areas including security. Without <a href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-security-in-cloud-computing\/\">cloud computing<\/a>, biometrics security wouldn\u2019t be nearly as effective.<\/p>\n<p>There is just one problem. The cloud is just a server and as such could provide a vulnerability that can be breached. If a hacker is able to get through the line of defense, then it is a virtual buffet once they get in. With the rate that AI is improving, it may be only a matter of time before it can be used to mimic human actions and infiltrate even the best security systems.<\/p>\n<p>Which is why people should be looking closely at the blockchain. It is not impossible to hack into, but it is so difficult that it could be considered as such. The blockchain has gone far beyond just issuing cryptocurrencies. The questions now are not about where to buy bitcoin and moved to questions about how to make the internet more secure.<\/p>\n<p>In this article, I will go over several of the ways that biometrics and security can become better managed through the blockchain.<\/p>\n<p><strong>Decentralized is the answer<\/strong><\/p>\n<p>A cloud server is basically just one server. It is physically located in one place with probably a few backups scattered around the world. The blockchain resides on millions of computers.<\/p>\n<p>If somebody wanted to steal the biometric data from somebody that had it stored on the blockchain, the hacker would need to hack into millions of computers simultaneously and change the hash where the data is stored. It should be obvious the difficulty here that borders on the impossible.<\/p>\n<p>Another threat to security beyond the idea of data being hacked is that often there is a third party involved somewhere that is buying and selling the biometric data. Not only is this unethical but it can also be used for some nefarious purposes.<\/p>\n<p>That can\u2019t happen in the blockchain because people have more control. They would know immediately if the hash is changed and even a third party attempting to gather data from the hash would set alarm bells to those monitoring the blockchain if the user didn\u2019t explicitly allow it.<\/p>\n<p><strong>Blockchain-based smartphones<\/strong><\/p>\n<p>Another weak link in biometric security is on our smartphone. Unfortunately, we use our phones as an extension of our hands and depend on it for a range of sensitive transactions. Phones are so easily hacked that our data is extremely vulnerable even when the cloud server is very secure.<\/p>\n<p>There has been a lot of innovation by the likes of Samsung and HTC to create a blockchain-based smartphone. Instead of connecting to cloud servers, they will connect to the blockchain. In other words a totally <a href=\"https:\/\/www.theguardian.com\/technology\/2018\/sep\/08\/decentralisation-next-big-step-for-the-world-wide-web-dweb-data-internet-censorship-brewster-kahle\" rel=\"noreferrer\">decentralized web<\/a>.<\/p>\n<p>All of the apps on the phone will run through the peer to peer backed blockchain. Nobody will be able to hack the apps on the phone without using the keys that the owner of the phone has. Even the owner of the phone will lose access if they lose the keys themselves.<\/p>\n<p>Though that\u2019s is a sign that the security is extremely high, it is also a downside as people may spend a lot on a phone that becomes useless if they lose access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cloud has been instrumental in advancing innovations in many areas including security. Without cloud computing, biometrics security wouldn\u2019t be<\/p>\n","protected":false},"author":398,"featured_media":16605,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-13671","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"The cloud has been instrumental in advancing innovations in many areas including security. Without cloud computing, biometrics security wouldn\u2019t be\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-25T08:13:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-01T11:38:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/08\/bitcoin-cryptocurrency-gold-coin-on-laptop-blockch-EK4ZWQN_800x455.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\"},\"headline\":\"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain\",\"datePublished\":\"2017-08-25T08:13:47+00:00\",\"dateModified\":\"2023-06-01T11:38:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/\"},\"wordCount\":548,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/\",\"name\":\"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2017-08-25T08:13:47+00:00\",\"dateModified\":\"2023-06-01T11:38:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/","og_locale":"en_US","og_type":"article","og_title":"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain - Digital Transformation of Government Services","og_description":"The cloud has been instrumental in advancing innovations in many areas including security. Without cloud computing, biometrics security wouldn\u2019t be","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2017-08-25T08:13:47+00:00","article_modified_time":"2023-06-01T11:38:58+00:00","og_image":[{"width":800,"height":455,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/08\/bitcoin-cryptocurrency-gold-coin-on-laptop-blockch-EK4ZWQN_800x455.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c"},"headline":"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain","datePublished":"2017-08-25T08:13:47+00:00","dateModified":"2023-06-01T11:38:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/"},"wordCount":548,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/","name":"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2017-08-25T08:13:47+00:00","dateModified":"2023-06-01T11:38:58+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-the-cloud-how-to-make-biometrics-more-secure-with-the-blockchain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Beyond The Cloud: How To Make Biometrics More Secure With The Blockchain"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Matthew Bennett","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13671"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=13671"}],"version-history":[{"count":4,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13671\/revisions"}],"predecessor-version":[{"id":19927,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13671\/revisions\/19927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16605"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=13671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=13671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=13671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}