Will Blockchain Video Conferencing Make Video Chats More Secure?
You can’t trust the internet. We all know it, and yet we use it hundreds of times a day without feeling any anxiety in the moment. We’ve come to accept an implicit risk in every transaction we make online, from banking to social media, and we ride our luck–like trusting other drivers on the roads to do the right thing.
But what if we had access to an internet where we didn’t need blind trust? What if there was an internet without “middlemen” between us and the friends, businesses, and entertainment we seek?
Blockchain technology is being promoted as the magic sauce that will make this hypothetical world a reality. It’s often referred to as a “trustless” network because every transaction made within a specific system is recorded and shared among the entire group–no one has to be taken at their word and no one controls any central gateway all must pass.
Blockchain is near-universally praised as a new level of security for digital transactions, one strong enough to support the entire Bitcoin currency system, which begs the question–could blockchain video conferencing be the most secure way to communicate in the future?
At its most basic, blockchain technology is a shared record of transactions, all chained together so that they cannot be broken. You just have to slightly tweak the way you understand a few of those terms in order to fully understand the technology.
By “shared” I mean everybody, or rather every computer, within a system has a duplicate copy of this record book that is updated instantly–there’s no single reserve all can access. Each record exists individually and is of equal importance.
Every action that occurs within a system is noted in every copy of the record, and every action must be authorized by every other record book keeper. These actions are then “chained” together permanently like the lines of a novel in which each new set of words is dependant on the ones before and after.
Most people associate blockchain technology with digital currency like Bitcoin, but since blockchain deals in digital information, it can be applied to all sorts of online transactions, including video conferencing.
Blockchain Video Conferencing Is in the Works
At the heart of every video conference is an exchange of digital information. The webcams and microphones you use retransform the analog data of your voice and image into digital bits that can be cut up, packaged, and sent over the internet to where your friend’s device can receive and unpack it all.
In every conversation, there’s a sender, a message, and a receiver. And blockchain is great at keeping track of all that information. Paired with end-to-end encryption, which grants unique little passwords to each end of a connection to keep it safe, blockchain promises a new level of video chatting security.
Several companies are already starting to build blockchain-based messaging and video apps to win the business of security-conscious WhatsApp and Snapchat users. PeerStream, Inc. (formerly Snap Interactive), for example, will launch Backchannel toward the end of this year. Backchannel will eventually be able to host one-on-one video calls over mobile. Going even further, under-development app e-Chat will soon perform the same video call trick with up to 10 people.
Those apps and their blockchain peers are a long way from replicating enterprise-scale video conferencing, but they are proof that there’s momentum building toward next-generation security for video.
Other Options for Video Conferencing Security
The current video conferencing security workload is shouldered by internal firewalls, “meeting lock” software–like that deployed by consumer VC vendor BlueJeans–and the type of end-to-end encryption that Skype is introducing across its platform.
In addition to these applications of existing security measures, there are also a couple of other technologies with potential. China recently staged the world’s first intercontinental video conference using quantum physics, a system researchers say is unshakable. And then there is the continued advancement of facial recognition. While not as data-centric as blockchain or encryption, high-end webcams are already being used to help create biological passwords based on unique human features. With an improvement of live AI technology, facial recognition could one day be deployed in-call to keep tabs on who’s on-screen.
All those security measures act within the existing internet system. Blockchain, by comparison, is a whole new network. As such, its adoption is likely to be dependant on the rise of entirely new apps, like those listed above. That, in turn, will likely slow its spread. Facebook Messenger, for instance, can’t suddenly upend its entire operating system to incorporate blockchain, despite how much the company could use a new security promise. Is heightened security enough to sway the hundreds of millions of WhatsApp and Snapchat users away from their established circles of friends and onto to whole new network? It would appear unlikely. The same need for upheaval applies to the business world as well, where legacy video conferencing systems would need to be replaced with entirely new VC vendors.
For all its obvious potential, blockchain is in for a slow build. Like we said at the beginning, everyone knows you can’t trust the internet, but we’re so comfortable in our current ways we’re still willing to take digital risks. It’s likely to take a lot of time–and a lot of security scares–to make blockchain ubiquitous.
- IAM Product/ Project Manager
- Upto €80,000 plus benefits
IAM product/project manager is need for this expanding service provider to help develop their IAM (CIAM) strategy roadmap. This role will have two main functions, to work between the front end digital team and the backend IAM development team to ensure that the current deployment of the solution runs smoothly and is fit for purpose, the Second function is to look at the business’ future digital offerings and to understand how the IAM/CIAM solution will develop with the new digital strategy, you will be looking at the future technology and the ensuring the IAM solution is fit for purpose. The business is an agile environment and you will require agile experience. This is a great opportunity to help shape a key product within the future digital strategy of this expanding service provider. We are looking for someone with both IAM and strong product management experience Project management experience would be beneficial. If you are interested speak to Robert Anderton on 0044 (0) 7957 493501 and he will be able to discuss the role in more details IAM product/project manager is needed for this expanding service provider to help develop their IAM (CIAM) strategy roadmap. This role will have two main functions, to work between the front end digital team and the backend IAM development team to ensure that the current deployment of the solution runs smoothly and is fit for purpose, the second function is to look at the business’ future digital offerings and to understand how the IAM/CIAM solution will develop with the new digital strategy, you will be looking at the future technology and the ensuring the IAM solution is fit for purpose. The business is an agile environment and you will require agile experience. This is a great opportunity to help shape a key product within the future digital strategy of this expanding service provider. We are looking for someone with both IAM and strong product management experience Project management experience would be beneficial. If you are interested then speak to Robert Anderton on 0044 (0) 7957 493501 and he will be able to discuss the role in more details
- Cyber Incident Manager, Proactive planning and management. SC
Cyber Incident Manager, Proactive planning and management. Cyber incident Manager needed to join a large and complex business to help them prepare for a cyber related incidents. SC clearance will be required. Current or the ability to achieve. This role does not require specific current hands on technical Incident response experience, but this background would give a distinct advantage. The role has two key functions: to help the business prepare for an event and to steer them through when / if that happens. The Cyber Incident response managers role will include, but not be limited to; working with internal stakeholders to develop a security incident management plan along with its and supporting policies. Developing plans and implementing strategies on how incidents are detected, reported, assessed and responded to. Engaging with leadership teams both internal and external, proactively mapping out this large business to identify and engage the various other stakeholders and their teams. Build out and document incident scenarios and their processes, ensure incident management procedures are updated, playbooks and key training etc. You should have experience working with both internal teams and external suppliers. The role will also focus on liaising with the various teams to ensure the security incident response plan is delivered effectively. CCIM, GCIH, CIPR (NCSC-Certified Cyber Incident Planning & Response) Looking to interview immediately.
- SOC Manager. SC Clearance. Immediate opportunity.
Permanent SOC Manager. SC cleared / clearable, London / Birmingham. SOC Manager needed to replace a SOC contractor I placed into a client who is due to complete their assignment at the end of March. The ability to achieve SC clearance is essential. Looking for someone that is a blend of strategic stakeholder engagement with strong technical skills. The role will sit in a relatively new SOC environment. The position is to setup, implementation and management of resources to help with the initial and on-going stages of a new SOC. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-manager-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- Security engineer. Financial Services. UK. Permanent
CH7863 Security engineer. End User . Financial Services Security Engineer needed to monitor and manage a security suite of tools within an End User environment. The Security Engiener will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-