Will Blockchain Video Conferencing Make Video Chats More Secure?
You can’t trust the internet. We all know it, and yet we use it hundreds of times a day without feeling any anxiety in the moment. We’ve come to accept an implicit risk in every transaction we make online, from banking to social media, and we ride our luck–like trusting other drivers on the roads to do the right thing.
But what if we had access to an internet where we didn’t need blind trust? What if there was an internet without “middlemen” between us and the friends, businesses, and entertainment we seek?
Blockchain technology is being promoted as the magic sauce that will make this hypothetical world a reality. It’s often referred to as a “trustless” network because every transaction made within a specific system is recorded and shared among the entire group–no one has to be taken at their word and no one controls any central gateway all must pass.
Blockchain is near-universally praised as a new level of security for digital transactions, one strong enough to support the entire Bitcoin currency system, which begs the question–could blockchain video conferencing be the most secure way to communicate in the future?
At its most basic, blockchain technology is a shared record of transactions, all chained together so that they cannot be broken. You just have to slightly tweak the way you understand a few of those terms in order to fully understand the technology.
By “shared” I mean everybody, or rather every computer, within a system has a duplicate copy of this record book that is updated instantly–there’s no single reserve all can access. Each record exists individually and is of equal importance.
Every action that occurs within a system is noted in every copy of the record, and every action must be authorized by every other record book keeper. These actions are then “chained” together permanently like the lines of a novel in which each new set of words is dependant on the ones before and after.
Most people associate blockchain technology with digital currency like Bitcoin, but since blockchain deals in digital information, it can be applied to all sorts of online transactions, including video conferencing.
Blockchain Video Conferencing Is in the Works
At the heart of every video conference is an exchange of digital information. The webcams and microphones you use retransform the analog data of your voice and image into digital bits that can be cut up, packaged, and sent over the internet to where your friend’s device can receive and unpack it all.
In every conversation, there’s a sender, a message, and a receiver. And blockchain is great at keeping track of all that information. Paired with end-to-end encryption, which grants unique little passwords to each end of a connection to keep it safe, blockchain promises a new level of video chatting security.
Several companies are already starting to build blockchain-based messaging and video apps to win the business of security-conscious WhatsApp and Snapchat users. PeerStream, Inc. (formerly Snap Interactive), for example, will launch Backchannel toward the end of this year. Backchannel will eventually be able to host one-on-one video calls over mobile. Going even further, under-development app e-Chat will soon perform the same video call trick with up to 10 people.
Those apps and their blockchain peers are a long way from replicating enterprise-scale video conferencing, but they are proof that there’s momentum building toward next-generation security for video.
Other Options for Video Conferencing Security
The current video conferencing security workload is shouldered by internal firewalls, “meeting lock” software–like that deployed by consumer VC vendor BlueJeans–and the type of end-to-end encryption that Skype is introducing across its platform.
In addition to these applications of existing security measures, there are also a couple of other technologies with potential. China recently staged the world’s first intercontinental video conference using quantum physics, a system researchers say is unshakable. And then there is the continued advancement of facial recognition. While not as data-centric as blockchain or encryption, high-end webcams are already being used to help create biological passwords based on unique human features. With an improvement of live AI technology, facial recognition could one day be deployed in-call to keep tabs on who’s on-screen.
All those security measures act within the existing internet system. Blockchain, by comparison, is a whole new network. As such, its adoption is likely to be dependant on the rise of entirely new apps, like those listed above. That, in turn, will likely slow its spread. Facebook Messenger, for instance, can’t suddenly upend its entire operating system to incorporate blockchain, despite how much the company could use a new security promise. Is heightened security enough to sway the hundreds of millions of WhatsApp and Snapchat users away from their established circles of friends and onto to whole new network? It would appear unlikely. The same need for upheaval applies to the business world as well, where legacy video conferencing systems would need to be replaced with entirely new VC vendors.
For all its obvious potential, blockchain is in for a slow build. Like we said at the beginning, everyone knows you can’t trust the internet, but we’re so comfortable in our current ways we’re still willing to take digital risks. It’s likely to take a lot of time–and a lot of security scares–to make blockchain ubiquitous.
- Sailpoint IIQ Consultant
- Up to £75,000
SailPoint IIQ consultant- London We are looking for a strong SailPoint IIQ consultant to work for this global enterprise, in this position you will be the lead consultant in regard to the IAM and PAM tools Duties include Responsible for designing, developing, testing, implementing, and integrating IAM (SailPoint) systems and solutions. Assessing requirements for Identity and Access Management solutions to meet stakeholders needs. Provide support for production IAM infrastructure systems and processes. Ensures the maintenance, patching, operating, and monitoring of IAM systems. Ensures senior management and staff are informed of any changes and updates in a timely manner. Experience with Maintaining and supporting SailPoint IIQ Assessing requirements for Privilege Access Management solutions to meet stakeholders needs We are looking for someone with the following experience SailPoint IIQ experience Expertise working with SailPoint Identity IQ platform - Access Lifecycle Management, Certifications, Role Management Expertise in onboarding applications with various connectors like Active Directory, JDBC, SCIM 2.0, Azure Active Directory Expertise in developing APIs (SCIM, REST) leveraging Java based developmentExperience of Privileged Access Management concepts and use cases Unfortunatly we are unable to provide sponsorship for this opportunity, therefore applications will need to be able to work in the UK
- SailPoint Consultant- Netherland-
- upto €700 per day
We are looking for a highly skilled SailPoint IIQ Consultant to work on a major deployment project. The ideal candidate will have experience with all aspects of SailPoint IIQ, including development, configuration, and administration. They will also be able to work independently and as part of a team to deliver high-quality results. · Responsibilities · Develop and configure Sailpoint IIQ solutions · Integrate SailPoint IIQ with other systems · Support SailPoint IIQ deployments · Provide technical support to users If you are a highly skilled SailPoint IIQ consultant who is looking for their next project, we encourage you to apply. look forward to hearing from you!
- Lead CyberArk deployment Consultant
- Upto £80,000 plus benefits
CyberArk Consultant is needed to be responsible for leading the deployment of CyberArk solutions for this expanding IT services business, You will work with customer both pre and post sales, getting involved in CyberArk Solution Design, helping to create CyberArk Strategic Roadmaps, on-boarding accounts, product and process integration into the CyberArk Solution and Proviso of Installation and technical Documentation. We are looking for this individual to have experience in: Installation of CyberArk PAS for V11.X and V12.X (Vault, DR Vault, Central Policy Manager and Password Vault Web Access) Upgrade of CyberArk from V9 and V10 (Vault, DR Vault, Central Policy Manager and Password Vault Web Access) Installation and Upgrade of Privilege Session Manager and Privilege Session Manager Proxy As some of your client will be government site, all individual will need to be put through SC clearance, therefore you must be eligible to receive this and happy to be put through(With a British Citizen or to have lived in the UK for the past 5 years) We are unable to provide work visa sponsorship for this opportunity
- Senior Business Analyst - Outside IR35 Contract, SC Clearance Required, London
- £400 per day outside IR35
Senior Business Analyst - Outside IR35 Contract, SC Clearance Required, Based in London Project- to engage with colleagues and stakeholders to investigate and model business functions, processes, information flows and data structures, using a range of business analysis techniques. • You will translate the solution to the business problem into detailed requirements by creating user stories and well-defined acceptance criteria. • Elicit end-to-end business requirements for a live cross-government service • Working across the Government departments to bring together varied business and operational outcomes to form a holistic overall set of service requirements Current SC clearance is required. As is the ability to travel to London.