Can / How Blockchain manages and protects data?

I was wondering if Blockchain can / should be used to store data that can only be inserted, but the data should only be readable by those for whom the data was authorized.

So I thought that a blockchain would contain elements other than header information for lookups. To make it a little more efficient, I would say that the header contains ID and block type. If the block type is Data or Authorization, Access, or Bucket

The "data" block contains the ID as well as all other data encrypted using a secret along with a SHA sum to verify the result of the encryption.

The "authorization" block provides the ID and an asymmetrically encrypted version of the secret for the data block + data block ID. It also contains a hash of the public key. This would be done by n-fingerprint hashes and a hash algorithm identifier (this will help reduce the likelihood of duplication if the block chain size becomes too large) (n> = 2)

The "access" block combines multiple permissions so that those with the same hashes are grouped together. It also combines buckets (discussed later) that are used by the access block. The "access" is thus usually the smallest sentence and one of the most important parts that need to be dismantled. The largest set of "permissions" wins the dismantling.

The "bucket" block is like the access block, but combines the information stored in multiple "data" blocks into a single larger block. So no big scan of the blockchain needs to be done to find the data. Like access, the biggest bucket wins.

By the way, I'm not sure if this kind of question would be better off here or something like programming stack exchange. If so, please move it there or to another location if necessary.

dnd 5e – Before which truth-finding magic (except the realm of truth) protects a ring of mind shield?

A ring of mind shielding has the following effect:

As you wear this ring, you are immune to magic, allowing other creatures to read your mind, determine if you are lying, knowing your alignment, or knowing your creature type.

Jeremy Crawford has unofficially stated on Twitter that this ring does not protect or connect to the magic of the Zone of Truth: mindshielding protection against a zone of truth /

Suppose that judgment is true, What is the complete list of spells or other magic against which the ring clause clause provides immunity?

My motivation behind this question is to discover if there is such a magic at all or if this clause of the ring text is indeed superfluous.

USB drive – USB bootable CD protects against rootkits?

I have an infected computer that I try to diagnose. The attack is probably very sophisticated, and I'm not sure if it happened in the BIOS, in the mbr, in the active partition, or in any other area. The attack is ongoing, but I have to figure it out during the incident.

I'm considering using a USB bootable operating system to diagnose the device.

I have not done this for a while, but what is the typical boot sequence when I try to load the operating system from a USB device?

The reason I'm asking is that if my bios / mbr / other partition is infected, even if I load from USB, my computer and its information are still at risk.

Many Thanks

Why is not Trump just picking up the congress? You are worthless and the president is the ONLY one who protects us?

Oh man. How great would that be, right?

I do not know, I'm just happy that he digs his own grave. I will not beat it up by hoping it'll throw its whole party in there and cover it in cement, right ???

But it is a nice look. Many Thanks!


Trump now has 94 percent approval from Republican women and over 5 billion for the Wall. Trump protects?

The left always shows how crazy they are. I'm not just talking about their tendency to bark in the sky. I'm talking about putting homosexuality in the neck (NPI), the glorification of transgender people – an obviously mentally disturbed micro-group, the coming pressure to normalize PEDOPHILIA, the war on men, the war on white people. ETC. ETC. ETC.

These are NOT your parents liberals.

As for Trump, it does not matter what he does. They are STILL SHOCK to Hillary's loss and have freed the disgusting monster that lies within the left.


SQL Server – In this scenario, TDE encryption protects my SQL database from hackers

Some of your previous answers have not been well received and you run the risk of being blocked from answering.

Please note the following notes exactly:

  • Please be sure answer the question, Enter details and share your research!

But avoid

  • Ask for help, clarification or answering other answers.
  • Make statements based on opinions; secure them with references or personal experiences.

For more information, see our tips for writing great answers.

Windows Credential Guard protects credentials, but not remote access with the same credentials?

I wonder what the real purpose is to protect credentials through Windows Credential Guard (WCG) when malicious administrators can access them cached Credentials (i.e., those not protected by WCG) and request WCG to issue a remote login token to effectively access a critical remote system, as if the "real" credentials (which are stored in WCG)?

AFAIK, while WCG protects credentials (for PtH and the like), does not protect it access which can be retrieved with the same credentials (for example, remote login to a system).

Can someone explain / explain this? Many Thanks