21st Century Learning and Teaching
586.7K views | +0 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Cybersecurity', 'blockchain'. Clear
Scooped by Gust MEES
Scoop.it!

Internet of Things (IoT) Network Architecture, Connectivity and Technology Solutions | Do you know what’s connecting? | #ModernSociety #Benefits | #CyberSecurity #Dangers | #Blockchain

Internet of Things (IoT) Network Architecture, Connectivity and Technology Solutions | Do you know what’s connecting? | #ModernSociety #Benefits | #CyberSecurity #Dangers | #Blockchain | 21st Century Learning and Teaching | Scoop.it

Do you know what’s connecting?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

Gust MEES's insight:

Do you know what’s connecting?

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

DAOs, Hacks and the Law | #Blockchain #SmartContracts #Ethereum 

DAOs, Hacks and the Law | #Blockchain #SmartContracts #Ethereum  | 21st Century Learning and Teaching | Scoop.it
DAOs, Hacks and the Law
“The DAO” is in the midst of an epic hack due to an exploit on the originating smart contracts. Unfortunately it may seem that their own choice of legal infrastructures may force them to honor the exploit instead of the intent.
Smart contracts meet the law
While the specifics vary from land to land, the law has a broad set of parameters that are uniform. They govern the agreements made between humans and the rules which bind them.
Curiously, the DAO, in order to show it’s adherence to a certain form of “smart” contract stated that it would be fully and exclusively bound by these blockchain smart contracts.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethereum

 

http://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

Gust MEES's insight:
DAOs, Hacks and the Law
“The DAO” is in the midst of an epic hack due to an exploit on the originating smart contracts. Unfortunately it may seem that their own choice of legal infrastructures may force them to honor the exploit instead of the intent.
Smart contracts meet the law
While the specifics vary from land to land, the law has a broad set of parameters that are uniform. They govern the agreements made between humans and the rules which bind them.
Curiously, the DAO, in order to show it’s adherence to a certain form of “smart” contract stated that it would be fully and exclusively bound by these blockchain smart contracts.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Ethereum

 

http://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/

 

http://www.scoop.it/t/luxembourg-europe/?tag=Bitcoin

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=blockchain

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How Blockchain is the Key to a Secure IoT | #CyberSecurity #InternetOfThings 

How Blockchain is the Key to a Secure IoT | #CyberSecurity #InternetOfThings  | 21st Century Learning and Teaching | Scoop.it
The solution for Smeets and his team though is not to pile on extra layers of authentication, but rather to distribute them. And that's where blockchain comes it. Because the blockchain functions via a distributed and encrypted ledger shared across all of a network's users and devices, it creates a network of authentication that is verifiable and not easily hacked.

 

With blockchain implemented, a device cannot access a network unless it is verified through the entire ledger. In this scenario attacks like Mirai become significantly more difficult, if not impossible, because a hacker would need to modify the entire ledger, and not just the credentials of any one device.

Ericcson Research demonstrated a proof-of-concept of this idea at the 2017 Mobile World Congress in Barcelona this past March. The researchers set up a small WiFi network that used blockchain authentication instead of a typical username/password setup.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

Gust MEES's insight:
The solution for Smeets and his team though is not to pile on extra layers of authentication, but rather to distribute them. And that's where blockchain comes it. Because the blockchain functions via a distributed and encrypted ledger shared across all of a network's users and devices, it creates a network of authentication that is verifiable and not easily hacked.

 

With blockchain implemented, a device cannot access a network unless it is verified through the entire ledger. In this scenario attacks like Mirai become significantly more difficult, if not impossible, because a hacker would need to modify the entire ledger, and not just the credentials of any one device.

Ericcson Research demonstrated a proof-of-concept of this idea at the 2017 Mobile World Congress in Barcelona this past March. The researchers set up a small WiFi network that used blockchain authentication instead of a typical username/password setup.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=blockchain

 

No comment yet.