Senders and receivers of past transactions are represented and signified by their addresses; users' identities are not revealed. Public addresses do not reveal personal information or identification; rather, they act as pseudonymous identities. It is suggested by Joshi, Archana (2018) that users do not use a public address more than once; this tactic avoids the possibility of a malicious user tracing a particular address' past transactions in an attempt to reveal information. Private keys are used to protect user identity and security through digital signatures. Private keys are used to access funds and personal wallets on the blockchain; they add a layer of identity authentication. When individuals wish to send money to other users, they must provide a digital signature that is produced when provided with the private key. This process protects against theft of funds.
In large corporations, a large amount of users' personal data is stored on single devices, posing a security risk if an authority's system is hacked, lost, or mishandled. Blockchain technology aims to remove this reliance on a central authority. To achieve this, blockchain functions in a way where nodes or devices in a blockchain network can confirm the validity of a transaction rather than a third party. In this system, transactions between users (such as sending and receiving cryptocurrency) are broadcast to every node in the network. Before the transaction is recorded as a block on the blockchain, nodes must ensure a transaction is valid. Nodes must check past transactions of the spender to ensure he/she did not double spend or spend more funds than they own.
Another method of obfuscating the flow of transactions on the public blockchain are Ring signatures, a method used by Monero.
As blockchain technology has evolved, there has been a growing push to transition health record storage onto the blockchain. Rather than having both physical and electronic copies of records, blockchains could allow the shift to electronic health records (EHR). Medical records on the blockchain would be in the control of the patient rather than a third party, through the patients' private and public keys. Patients could then control access to their health records, making transferring information less cumbersome. Because blockchain ledgers are immutable, health information could not be deleted or tampered with. Blockchain transactions would be accompanied by a timestamp, allowing those with access to have updated information.
Businesses and individuals may purchase goods which need to be shipped from the seller to the buyer. Shipment of goods is normally accompanied by shipping documents like a bill of lading. Smart bill of lading relies on blockchain technology and buyers do not need to spend more on the issue of these documents. Also with the blockchain technology, goods can be tracked anytime, and the data is updated regularly ensuring real time management of shipments. The buyer and only the party given the shipping contract can view the real time data related to the shipment increasing the privacy of the process.
Because virtual currencies and the blockchain's protection of identity has proved to be a hub for criminal purchases and activity, FBI and Justice Department created Blockchain Alliance. This team aims to identify and enforce legal restrictions on the blockchain to combat criminal activities through open dialogue on a private-public forum. This allows law enforcers to fight the illegal exploitation of the technology. Examples of criminal activity on the blockchain include hacking cryptocurrency wallets and stealing funds. Because user identities are not tied to public addresses, it is difficult to locate and identify criminals.
Although blockchain technology enables users to control their own data without necessarily relying on third parties, certain characteristics may infringe on user privacy. Public blockchains are decentralized and allow any node to access transactions, events and actions of users. Block explorers can be used to trace the financial history of a wallet address, which can be combined with OSINT research to develop profiles of criminal actors or potential scamming victims.
Due to blockchain's decentralized nature, a central authority is not checking for malicious users and attacks. Users might be able to hack the system anonymously and escape. Because public blockchains are not controlled by a third party, a false transaction enacted by a hacker who has a user's private key cannot be stopped. Because blockchain ledgers are shared and immutable, it is impossible to reverse a malicious transaction.
Private keys provide a way to prove ownership and control of cryptocurrency. If one has access to another's private key, one can access and spend these funds. Because private keys are crucial to accessing and protecting assets on the blockchain, users must store them safely. Storing the private key on a computer, flashdrive or telephone can pose potential security risks if the device is stolen or hacked. If such a device is lost, the user no longer have access to the cryptocurrency. Storing it on physical media, such as a piece of paper, also leaves the private key vulnerable to loss, theft or damage.
While blockchain technology is anticipated to solve privacy issues such as data breaching, tampering, and other threats, it is not immune to malicious attacks. In 2016, the DAO opened a funding window for a particular project. The system was hacked during this period, resulting in the loss of cryptocurrency then worth $US3.6 million from the Ether fund. Due to the ever-changing price of cryptocurrencies, the amount stolen has been estimated at $US64-100.
"BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Iansiti, Marco; Lakhani, Karim R. (1 January 2017). "The Truth About Blockchain". Harvard Business Review. ISSN 0017-8012. Retrieved 27 April 2022. https://hbr.org/2017/01/the-truth-about-blockchain
"BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
"BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
"BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
"Blockchain - What it is, and a non-financial use case" (PDF). KTH Royal Institute of Technology. S2CID 27665746. http://kth.diva-portal.org/smash/get/diva2:1121133/FULLTEXT01.pdf
Nofer, Michael; Gomber, Peter; Hinz, Oliver; Schiereck, Dirk (1 June 2017). "Blockchain". Business & Information Systems Engineering. 59 (3): 183–187. doi:10.1007/s12599-017-0467-3. ISSN 1867-0202. S2CID 212620853. /wiki/Doi_(identifier)
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Guegan, Dominique (2017). "Public Blockchain versus Private blockhain". Documents de Travail du Centre d'Économie de la Sorbonne.
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
"BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Wang, Yunsen (2018). "Designing Confidentiality-Preserving Blockchain-Based Transaction Processing Systems". International Journal of Accounting Information Systems. 30: 1–18. doi:10.1016/j.accinf.2018.06.001. S2CID 52931003. /wiki/Doi_(identifier)
Wang, Yunsen (2018). "Designing Confidentiality-Preserving Blockchain-Based Transaction Processing Systems". International Journal of Accounting Information Systems. 30: 1–18. doi:10.1016/j.accinf.2018.06.001. S2CID 52931003. /wiki/Doi_(identifier)
Wang, Yunsen (2018). "Designing Confidentiality-Preserving Blockchain-Based Transaction Processing Systems". International Journal of Accounting Information Systems. 30: 1–18. doi:10.1016/j.accinf.2018.06.001. S2CID 52931003. /wiki/Doi_(identifier)
Faife, Corin (8 August 2022). "US Treasury bans Tornado Cash mixer for role in crypto money laundering". The Verge. Retrieved 16 August 2022. https://www.theverge.com/2022/8/8/23296778/us-treasury-tornado-cash-crypto-mixer-sanctions-ethereum-north-korea
Sun, Mengqi (24 April 2024). "Crypto Mixer Samourai Wallet's Co-founders Arrested for Money Laundering". Wall Street Journal. ISSN 0099-9660. Retrieved 26 June 2025. https://www.wsj.com/articles/crypto-mixer-samourai-wallets-co-founders-arrested-for-money-laundering-df237a4e
Guegan, Dominique (2017). "Public Blockchain versus Private blockhain". Documents de Travail du Centre d'Économie de la Sorbonne.
Guegan, Dominique (2017). "Public Blockchain versus Private blockhain". Documents de Travail du Centre d'Économie de la Sorbonne.
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Guegan, Dominique (2017). "Public Blockchain versus Private blockhain". Documents de Travail du Centre d'Économie de la Sorbonne.
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Joshi, Archana (2018). "A Survey on Security and Privacy Issues of Blockchain Technology". Mathematical Foundations of Computing. 1 (2): 121–147. doi:10.3934/mfc.2018007. https://doi.org/10.3934%2Fmfc.2018007
Are blockchains compatible with data privacy law? https://www.qmul.ac.uk/media/news/2018/hss/are-blockchains-compatible-with-data-privacy-law.html
Kolb, John; AbdelBaky, Moustafa; Katz, Randy H.; Culler, David E. (5 February 2020). "Core Concepts, Challenges, and Future Directions in Blockchain: A Centralized Tutorial". ACM Computing Surveys. 53 (1): 9:1–9:39. doi:10.1145/3366370. ISSN 0360-0300. S2CID 211041743. https://doi.org/10.1145%2F3366370
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
"BlockChain Technology: Beyond Bitcoin" (PDF). http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.
Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Dagher, Gaby G.; et al. (2018). "Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology". Sustainable Cities and Society. 39: 283–297. doi:10.1016/j.scs.2018.02.014. https://doi.org/10.1016%2Fj.scs.2018.02.014
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.
Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.
Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.
Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.
"Crucial Factors for Implementing Warehouse Management System - SIPMM Publications". publication.sipmm.edu.sg. 19 December 2021. Retrieved 26 October 2022. https://publication.sipmm.edu.sg/crucial-factors-implementing-warehouse-management-system/#Blockchain_Technology_for_WMS
Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)
Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)
Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)
Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)
Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)
Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)
Berberich, M.; Steiner, M. (2016). "Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers?". European Data Protection Law Review. 2 (3): 422. doi:10.21552/EDPL/2016/3/21. /wiki/Doi_(identifier)
Crosby, Michael; et al. (2016). "Blockchain Technology: Beyond Bitcoin" (PDF). Applied Innovation Review (2): 6–19. http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf
Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html
Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html
Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html
Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html
Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html
Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html
Heroux, Mark (October 2018). "Cryptocurrency: Compliance challenges and IRS enforcement". Tax Adviser. https://www.thetaxadviser.com/issues/2018/oct/cryptocurrency-compliance-challenges-irs-enforcement.html
Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.
Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.
Suzuki, Bryce; Taylor, T.; Marchant, G. (2018). "Blockchain: How It Will Change Your Legal Practice". The Computer and Internet Lawyer. 35 (7): 5–9.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Primavera De Filippi (2018). "The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies". Journal of Peer Production (9). /wiki/Primavera_De_Filippi
Primavera De Filippi (2018). "The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies". Journal of Peer Production (9). /wiki/Primavera_De_Filippi
"Follow the Bitcoin With Python, BlockExplorer and Webhose.io". bellingcat. 15 September 2017. Retrieved 16 August 2022. https://www.bellingcat.com/resources/2017/09/15/follow-bitcoin-python-blockexplorer-webhose-io/
Primavera De Filippi (2018). "The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies". Journal of Peer Production (9). /wiki/Primavera_De_Filippi
Primavera De Filippi (2018). "The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies". Journal of Peer Production (9). /wiki/Primavera_De_Filippi
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Li, X (2017). "A survey on the security of blockchain systems". Future Generation Computer Systems. 107: 841–853. arXiv:1802.06993. doi:10.1016/j.future.2017.08.020. S2CID 3628110. /wiki/ArXiv_(identifier)
Li, X (2017). "A survey on the security of blockchain systems". Future Generation Computer Systems. 107: 841–853. arXiv:1802.06993. doi:10.1016/j.future.2017.08.020. S2CID 3628110. /wiki/ArXiv_(identifier)
Li, X (2017). "A survey on the security of blockchain systems". Future Generation Computer Systems. 107: 841–853. arXiv:1802.06993. doi:10.1016/j.future.2017.08.020. S2CID 3628110. /wiki/ArXiv_(identifier)
Li, X (2017). "A survey on the security of blockchain systems". Future Generation Computer Systems. 107: 841–853. arXiv:1802.06993. doi:10.1016/j.future.2017.08.020. S2CID 3628110. /wiki/ArXiv_(identifier)
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Kshetri, Nir (2017). "Blockchain's roles in strengthening cybersecurity and protecting privacy" (PDF). Telecommunications Policy. 41 (10): 1027–1038. doi:10.1016/j.telpol.2017.09.003. http://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_2017.pdf
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
Wieczner, Jen (2017). "The 21St-Century Bank Robbery". Fortune. 176 (3): 34–41.
"North Korea hackers stole $400m of cryptocurrency in 2021, report says". BBC News. 14 January 2022. Retrieved 4 February 2022. https://www.bbc.com/news/business-59990477
"North Korea stole a record $400 million in cryptocurrency last year, researchers say". NBC News. Retrieved 4 February 2022. https://www.nbcnews.com/tech/security/north-korea-stole-record-400-million-cryptocurrency-last-year-research-rcna12080
"Bittrex to Delist 'Privacy Coins' Monero, Dash and Zcash". https://www.yahoo.com/now/bittrex-delist-privacy-coins-monero-183110456.html
Chatzigiannis, Panagiotis; Baldimtsi, Foteini; Chalkias, Konstantinos (2021). SoK: Auditability and Accountability in Distributed Payment Systems. ACNS 2021. doi:10.1007/978-3-030-78375-4_13. https://link.springer.com/chapter/10.1007%2F978-3-030-78375-4_13