SlideShare a Scribd company logo
1 of 15
{
Data protection by
design and by default
on the blockchain
TILTing2019 - 17 May 2019
Alexandra Giannopoulou
Blockchain and Society Policy Lab
Institute for Information Law (IViR)
University of Amsterdam
 Immutability of the blockchain
 Transnational processing
 Some personal data processing is
essential for the functioning of
blockchains
Dessine-moi une blockchain…
Blocks containing transactions
 Metadata
 Encrypted personal data
 Hashed personal data
What do we store on the
distributed ledger?
Article 25 GDPR Data protection by design and by default
1. Taking into account the state of the art, the cost of implementation and the nature,
scope, context and purposes of processing as well as the risks of varying likelihood
and severity for rights and freedoms of natural persons posed by the processing, the
controller shall, both at the time of the determination of the means for processing
and at the time of the processing itself, implement appropriate technical and
organisational measures, such as pseudonymisation, which are designed to
implement data-protection principles, such as data minimisation, in an effective
manner and to integrate the necessary safeguards into the processing in order to
meet the requirements of this Regulation and protect the rights of data subjects.
1. The controller shall implement appropriate technical and organisational measures
for ensuring that, by default, only personal data which are necessary for each
specific purpose of the processing are processed. That obligation applies to the
amount of personal data collected, the extent of their processing, the period of their
storage and their accessibility. In particular, such measures shall ensure that by
default personal data are not made accessible without the individual's intervention
to an indefinite number of natural persons.
Not at odds conceptually because …
Blockchains and DPbD
Asymmetric encryption is a basic component and essential feature of
blockchains, contributing to giving the technology the value it has today
• Where does this awareness stem from?
However…
• Where does this awareness stem from?
However…
Crypto (as in encryption not in currency) communities imp
• Where does this awareness stem from?
The inherent goal of the PETs is to avoid re-identification of
parties and transactions
However…
Crypto (as in encryption not in currency) communities imp
• Where does this awareness stem from?
The inherent goal of the PETs is to avoid re-identification of
parties and transactions
• What about other features of data protection by design?
However…
Crypto (as in encryption not in currency) communities imp
But…
Escape the surveillance machine!
Escape the surveillance machine!
Trust the technology’s features but what about user control?
Escape the surveillance machine!
Trust the technology’s features but what about user control?
Respect for data protection
principles
Respect for data
subjects’ rights
 Privacy-enhancing technologies emerging on
the blockchain
Zero-knowledge proof
Ring signatures
Taproot “scriptless scripts”
 Which design features? Which standards?
Governance!
Technology to the rescue!
 Waiting on blockchain case law to form
guidelines and interpretations?
 How about liability?
Is there a conciliation
point in sight?
a.giannopoulou@uva.nl @alex_giann

More Related Content

What's hot

Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
IT Arena
 

What's hot (20)

The Future of Tokens - Fran Strajnar
The Future of Tokens - Fran Strajnar The Future of Tokens - Fran Strajnar
The Future of Tokens - Fran Strajnar
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An Introduction
 
Blockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscapeBlockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscape
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies
 
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
 
Blockchain with Immuto.io
Blockchain with Immuto.ioBlockchain with Immuto.io
Blockchain with Immuto.io
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
 
Block chain technology ppt
Block chain technology pptBlock chain technology ppt
Block chain technology ppt
 
Legal Issues in Big Data
Legal Issues in Big DataLegal Issues in Big Data
Legal Issues in Big Data
 
Bit coin basics 101
Bit coin basics 101Bit coin basics 101
Bit coin basics 101
 
3rd International Conference on Big Data and Blockchain (BDAB 2022)
3rd International Conference on Big Data and Blockchain (BDAB 2022)3rd International Conference on Big Data and Blockchain (BDAB 2022)
3rd International Conference on Big Data and Blockchain (BDAB 2022)
 
encryptedDB
encryptedDBencryptedDB
encryptedDB
 
Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?
 
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
Thomas Zakrzewski, EgisData. What is missing in blockchain to achieve scalabi...
 
Building Distributed Downstream Services Using OAI-PMH
Building Distributed Downstream Services Using OAI-PMHBuilding Distributed Downstream Services Using OAI-PMH
Building Distributed Downstream Services Using OAI-PMH
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?
 
Block chain technology and its applications
Block chain technology and its applications Block chain technology and its applications
Block chain technology and its applications
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?
 

Similar to Data protection by design and by default on the blockchain

ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
nsangary
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 

Similar to Data protection by design and by default on the blockchain (20)

GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
 
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR  DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
DN18 | Privacy by Design for Blockchain | Silvan Jongerius | TechGDPR
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
How MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR complianceHow MongoDB can accelerate a path to GDPR compliance
How MongoDB can accelerate a path to GDPR compliance
 
Documentation20
Documentation20Documentation20
Documentation20
 
Continuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric SecurityContinuous PCI and GDPR Compliance With Data-Centric Security
Continuous PCI and GDPR Compliance With Data-Centric Security
 
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
apidays LIVE Paris 2021 - Data privacy in the era of cloud native app by Guil...
 
Crypto.pdf
Crypto.pdfCrypto.pdf
Crypto.pdf
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
CRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKETCRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKET
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Gdpr and smart cities
Gdpr and smart citiesGdpr and smart cities
Gdpr and smart cities
 
WP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devsWP Helsinki Meetup - GDPR for devs
WP Helsinki Meetup - GDPR for devs
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Ransomware
RansomwareRansomware
Ransomware
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 

More from Alexandra Giannopoulou

More from Alexandra Giannopoulou (11)

Closing the circle:in Libra we trust?
Closing the circle:in Libra we trust?Closing the circle:in Libra we trust?
Closing the circle:in Libra we trust?
 
Distributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchainDistributed data protection and liability on the blockchain
Distributed data protection and liability on the blockchain
 
Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility
 
Altered carbon: from the law of the sleeve to the law of the stack
Altered carbon: from the law of the sleeve to the law of the stackAltered carbon: from the law of the sleeve to the law of the stack
Altered carbon: from the law of the sleeve to the law of the stack
 
To share or not to share? machine generated data for science
To share or not to share? machine generated data for science To share or not to share? machine generated data for science
To share or not to share? machine generated data for science
 
Social reputation systems: it's about ethics in AI
Social reputation systems: it's about ethics in AISocial reputation systems: it's about ethics in AI
Social reputation systems: it's about ethics in AI
 
Athens Commons fest- Ο εθελοντικός δημόσιος τομέας
Athens Commons fest- Ο εθελοντικός δημόσιος τομέας Athens Commons fest- Ο εθελοντικός δημόσιος τομέας
Athens Commons fest- Ο εθελοντικός δημόσιος τομέας
 
We are all Diù: a tale of wiki edits, disgrace and Greek politics
We are all Diù: a tale of wiki edits, disgrace and Greek politicsWe are all Diù: a tale of wiki edits, disgrace and Greek politics
We are all Diù: a tale of wiki edits, disgrace and Greek politics
 
Moral rights and the Creative Commons licenses
Moral rights and the Creative Commons licensesMoral rights and the Creative Commons licenses
Moral rights and the Creative Commons licenses
 
Les licences creative commons
Les licences creative commonsLes licences creative commons
Les licences creative commons
 
From technical protection measures to creative commons
From technical protection measures to creative commonsFrom technical protection measures to creative commons
From technical protection measures to creative commons
 

Recently uploaded

Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 

Recently uploaded (20)

Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 

Data protection by design and by default on the blockchain

  • 1. { Data protection by design and by default on the blockchain TILTing2019 - 17 May 2019 Alexandra Giannopoulou Blockchain and Society Policy Lab Institute for Information Law (IViR) University of Amsterdam
  • 2.  Immutability of the blockchain  Transnational processing  Some personal data processing is essential for the functioning of blockchains Dessine-moi une blockchain…
  • 3. Blocks containing transactions  Metadata  Encrypted personal data  Hashed personal data What do we store on the distributed ledger?
  • 4. Article 25 GDPR Data protection by design and by default 1. Taking into account the state of the art, the cost of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for rights and freedoms of natural persons posed by the processing, the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures, such as pseudonymisation, which are designed to implement data-protection principles, such as data minimisation, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects. 1. The controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility. In particular, such measures shall ensure that by default personal data are not made accessible without the individual's intervention to an indefinite number of natural persons.
  • 5. Not at odds conceptually because … Blockchains and DPbD Asymmetric encryption is a basic component and essential feature of blockchains, contributing to giving the technology the value it has today
  • 6. • Where does this awareness stem from? However…
  • 7. • Where does this awareness stem from? However… Crypto (as in encryption not in currency) communities imp
  • 8. • Where does this awareness stem from? The inherent goal of the PETs is to avoid re-identification of parties and transactions However… Crypto (as in encryption not in currency) communities imp
  • 9. • Where does this awareness stem from? The inherent goal of the PETs is to avoid re-identification of parties and transactions • What about other features of data protection by design? However… Crypto (as in encryption not in currency) communities imp But…
  • 11. Escape the surveillance machine! Trust the technology’s features but what about user control?
  • 12. Escape the surveillance machine! Trust the technology’s features but what about user control? Respect for data protection principles Respect for data subjects’ rights
  • 13.  Privacy-enhancing technologies emerging on the blockchain Zero-knowledge proof Ring signatures Taproot “scriptless scripts”  Which design features? Which standards? Governance! Technology to the rescue!
  • 14.  Waiting on blockchain case law to form guidelines and interpretations?  How about liability? Is there a conciliation point in sight?

Editor's Notes

  1. Decentralization is seen as the architectural guarantee of censorship resistance, and a safeguard against the coercive influence of any centralized, top-down force
  2. Multifaceted concept that goes beyond the aspect of confidentiality but that is often constrained within the limits of the pseudonymization goals.
  3. I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies). PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability. So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
  4. I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies). PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability. So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
  5. I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies). PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability. So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
  6. I think it is safe to say that the current privacy enhancing technologies that are being applied in blockchain technologies are mainly a result of the high privacy-awareness of what used to be the crypto community (crypto as in encryption and not as in cryptocurrencies). PETs have always quite predominantly been used as a means to make information harder to be linked to a natural person and in that sense, they are becoming popular because blockchains attribute a big role in reinforcing encryption techniques and technologies that focus on unlinkability. So, conceptually, a lot of similarities with the privacy by design broader theoretical context of protection. However, insufficient for the breadth of the data protection by design principles and what they imply.
  7. So the same principles that applied to the former cryptosavvy communities that were trying to develop technology that escape ubiquitous surveillance state mechanisms and technologies deployed by these institutions. This is a rather good stepping stone in the current highly ambivalent state of comformity of blockchains with data protection law. As it has been illustrated firstly by Michele Finck and by other academics, data protection rules are hard to reconcile within the realm of decentralized technologies. How can the tools available from the PETs be used to contribute to a better comformity with GDPR predominantly. In that sense, one could say that the blockchain’s reverts to trust in the technology’s ability to protect from reidentification and no on reinforcing the control aspect of individuals.
  8. So the same principles that applied to the former cryptosavvy communities that were trying to develop technology that escape ubiquitous surveillance state mechanisms and technologies deployed by these institutions. This is a rather good stepping stone in the current highly ambivalent state of comformity of blockchains with data protection law. As it has been illustrated firstly by Michele Finck and by other academics, data protection rules are hard to reconcile within the realm of decentralized technologies. How can the tools available from the PETs be used to contribute to a better comformity with GDPR predominantly. In that sense, one could say that the blockchain’s reverts to trust in the technology’s ability to protect from reidentification and no on reinforcing the control aspect of individuals.
  9. So the same principles that applied to the former cryptosavvy communities that were trying to develop technology that escape ubiquitous surveillance state mechanisms and technologies deployed by these institutions. This is a rather good stepping stone in the current highly ambivalent state of comformity of blockchains with data protection law. As it has been illustrated firstly by Michele Finck and by other academics, data protection rules are hard to reconcile within the realm of decentralized technologies. How can the tools available from the PETs be used to contribute to a better comformity with GDPR predominantly. In that sense, one could say that the blockchain’s reverts to trust in the technology’s ability to protect from reidentification and no on reinforcing the control aspect of individuals.