© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_20

20. Blockchain and Identity Management

Morey J. Haber1  and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

The level of hype around Bitcoin, Blockchain, and cryptocurrency is astonishing despite them still being in their infancy. When you hear your Uber driver candidly discussing it, or your local news carries a piece on how a family paid for their daughter’s wedding with Bitcoin, then you know that the hype is out of control.

If you know anything about these technologies, excellent; you are ahead of the curve. Hopefully, you have not realized too late that they actually have a more limited place in business than the hype ...

Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.