top of page


Public·15 members
Demian Suvorov
Demian Suvorov

Free Blockchain Based Secure Password Manager: B.lock

KeePass is a free open source password manager, which helps you to manageyour passwords in a secure way. You can store all your passwords in onedatabase, which is locked with a master key. So you only have to remember onesingle master key to unlock the whole database. Database files are encryptedusing the best and most secure encryption algorithms currently known(AES-256, ChaCha20 and Twofish).For more information, see the features page.

Free Blockchain Based Secure Password Manager: b.lock

Download Zip:

Abstract:In recent years, many researchers have focused on developing a feasible solution for storing and exchanging medical images in the field of health care. Current practices are deployed on cloud-based centralized data centers, which increase maintenance costs, require massive storage space, and raise privacy concerns about sharing information over a network. Therefore, it is important to design a framework to enable sharing and storing of big medical data efficiently within a trustless environment. In the present paper, we propose a novel proof-of-concept design for a distributed patient-centric image management (PCIM) system that is aimed to ensure safety and control of patient private data without using a centralized infrastructure. In this system, we employed an emerging Ethereum blockchain and a distributed file system technology called Inter-Planetary File System (IPFS). Then, we implemented an Ethereum smart contract called the patient-centric access control protocol to enable a distributed and trustworthy access control policy. IPFS provides the means for decentralized storage of medical images with global accessibility. We describe how the PCIM system architecture facilitates the distributed and secured patient-centric data access across multiple entities such as hospitals, patients, and image requestors. Finally, we deployed a smart contract prototype on an Ethereum testnet blockchain and evaluated the proposed framework within the Windows environment. The evaluation results demonstrated that the proposed scheme is efficient and feasible.Keywords: blockchain; distributed storage; medical image sharing; healthcare system; smart contract; IPFS

I am using a proprietary password manager and have hundreds of passwords stored there. I am just a bit worried that the service once goes down and I lose all my passwords (including encryption keys of crypto wallets). With a blockchain-based solution, the risk of this happening should be decreased in my opinion.

Every e-government system must guarantee the confidentiality, integrity and availability of the services. Confidentiality is achieved when information is not disclosed to unauthorised users; integrity is achieved by protecting information from any form of modification, whilst availability means information is available when needed and is free from DoS or DDoS or other similar service disruption. This section provides a theoretical qualitative analysis on the security and privacy performance of the blockchain-based e-government system.

Methods: The PHR architecture in this study comprised 2 main components. The first component was the PHR management platform, on which users could upload PHRs, view their record content, authorize PHR exchanges with doctors or other medical health care providers, and check their block information. When a PHR was uploaded, the hash value of the PHR would be calculated by the SHA-256 algorithm and the PHR would be encrypted by the Rivest-Shamir-Adleman encryption mechanism before being transferred to a secure database. The second component was the blockchain exchange architecture, which was based on Ethereum to create a private chain. Proof of authority, which delivers transactions through a consensus mechanism based on identity, was used for consensus. The hash value was calculated based on the previous hash value, block content, and timestamp by a hash function.

The Blind Assignment for Blockchain Extension (BABE) is one of the two central components of the hybrid consensus mechanism that Polkadot utilizes to secure and maintain its network. BABE is a mechanism for producing blocks, while its counterpart, GHOST-based Recursive Ancestor Deriving Prefix Agreement (GRANDPA), is a mechanism for finalizing the state of the blockchain.

GRANDPA (GHOST-based Recursive Ancestor Deriving Prefix Agreement) is one of the two central components of the hybrid consensus mechanism that Polkadot utilizes to secure and maintain its network. GRANDPA is a mechanism for finalizing the state of the blockchain, while its counterpart, Blind Assignment for Blockchain Extension (BABE), is a mechanism for producing blocks.

A HMAC-based One-Time Password (HOTP) is a password that makes use of a one-time password (OTP) algorithm leveraging Hash-Based Message Authentication Code (HMAC). HOTPs, like Time-based One-Time Passwords (TOTPs), are used as a security measure for specialized authentication methods such as two-factor authentication (2FA). The HOTP mechanism uses a hash-generated one-time password that allows users to securely log in to various websites often through their mobile phone using an authentication application.

Launched in 2012, Medium is a blogging platform that hosts articles written by a combination of amateur and professional writers. Medium has an in-house staff of paid writers and also incentivizes independent writers through a compensation program based on reader engagement. While some articles are free, some are behind a paywall and require a paid membership to access them. In the blockchain industry, Medium has become a popular place for blockchain teams to reach their communities, post technical updates, and share project-related news.

Created by the DFINITY Foundation, the Motoko programming language was designed to build blockchains (subnets), decentralized applications (dApps), and other tools on the Internet Computer (ICP) protocol. While based on the WebAssembly (WASM) programming language, Motoko was designed to be more adaptable, secure, and efficient than the traditional WASM language. Motoko also compiles down to WASM because of its backwards-compatible web versatility and browser functionality. This also allows any language that can compile to WASM the ability to deploy code on the ICP protocol.

A Random Beacon is a specialized blockchain-based random number generator used by the Keep Network blockchain protocol to help employ its containerization private data model. The Random Beacon uses threshold signatures with digital signature relays to randomly select groups of KEEP token holders to be network transaction signers. Signers are responsible for creating new bitcoin (BTC) key pairs that are used to create tBTC tokens. Randomness is an integral component in creating secure and hack-resistant technical blockchain architecture.

Sharding is a mechanism that is used to partition a blockchain network or other type of computer network or database. Its purpose is to distribute the network's computational and storage workload across a broader set of devices, or nodes, in order to increase the throughput and transaction speed of the entire system. Each node only maintains information related to its specific shard or partition, and since each node is only responsible for processing a fraction of the overall network's transactional load, the network's overall processing capabilities and resilience can be vastly improved. As a result, the increased transaction speeds made possible through sharding have allowed many blockchain-based networks to be exponentially faster, more secure, and better suited for widespread enterprise use.

As far as SFA services go, usernames and passwords are not the most secure. One problem with password-based authentication is it requires knowledge and diligence to create and remember strong passwords. Passwords require protection from many insider threats, such as carelessly stored sticky notes with login credentials, old hard drives and social engineering exploits. Passwords are also prey to external threats, such as hackers using brute-force, dictionary or rainbow table attacks.

Consequently, many organizations are turning to passwordless authentication. Using methods such as biometrics and secure protocols enables users to securely authenticate themselves in their applications without having to enter passwords. In business, this means employees can access their work without having to enter passwords and IT still maintains total control across every login. The use of blockchain, for example, through decentralized identity or self-sovereign identity, is also gaining attention as an alternative to traditional authentication methods.


Welcome to the group! You can connect with other members, ge...


bottom of page