{"id":8924,"date":"2020-09-25T17:00:39","date_gmt":"2020-09-25T15:00:39","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/?p=8924"},"modified":"2022-01-05T20:06:19","modified_gmt":"2022-01-05T19:06:19","slug":"blockchain-data-security","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/","title":{"rendered":"How Blockchain Technology Can Ensure Data Security in Space?"},"content":{"rendered":"\t\t\t\t<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-a4d23bf6      \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t>\n\t\t\t\t<div class=\"uagb-toc__wrap\">\n\t\t\t\t\t\t<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\tTable Of Contents\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-toc__list-wrap \">\n\t\t\t\t\t\t<ol class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#blockchain-technology-and-the-challenge-of-multiple-party-access-and-mixed-use-assets\" class=\"uagb-toc-link__trigger\">Blockchain technology and the challenge of multiple party access and mixed-use assets<\/a><li class=\"uagb-toc__list\"><a href=\"#introducing-dynamic-data-security\" class=\"uagb-toc-link__trigger\">Introducing Dynamic Data Security<\/a><li class=\"uagb-toc__list\"><a href=\"#want-a-career-in-blockchain-technlogy\" class=\"uagb-toc-link__trigger\">Want a career in blockchain technlogy?<\/a><li class=\"uagb-toc__list\"><a href=\"#want-to-launch-a-developer-event-despite-the-challenges-of-covid-19\" class=\"uagb-toc-link__trigger\">Want to launch a developer event despite the challenges of  COVID-19?<\/a><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\n\n<p class=\"eplus-FNqsHl\">You&#8217;ve probably thought about <strong style=\"user-select: auto;\"><span style=\"user-select: auto;\" id=\"urn:enhancement-8f7ff4e3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">securing<\/span> smart <span style=\"user-select: auto;\" id=\"urn:enhancement-239a07f5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/information_appliance\">devices<\/span><\/strong> such as cars and homes, but have you thought about <strong style=\"user-select: auto;\"><span style=\"user-select: auto;\" id=\"urn:enhancement-b83e31d4\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">securing<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-f5689c36\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> with blockchain technology<\/strong>? The increasing adoption of connected <span style=\"user-select: auto;\" id=\"urn:enhancement-740433ac\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/technology\">technologies<\/span> exposes aircraft, airports, <span style=\"user-select: auto;\" id=\"urn:enhancement-68fa9f07\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellites<\/span>, and the interdependent <span style=\"user-select: auto;\" id=\"urn:enhancement-17a1644\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/aerospace\">aerospace<\/span> ecosystem to new types of risks. And it&#8217;s being taken extremely seriously. <\/p>\n\n\n\n<p class=\"eplus-xTpOKM\">This year&#8217;s <strong style=\"user-select: auto;\"><span style=\"user-select: auto;\" id=\"urn:enhancement-744cab47\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/defcon\">DEFCON<\/span> Safe Mode<\/strong> even had <span style=\"user-select: auto;\" id=\"urn:enhancement-d121626b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-d336caad\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> on the agenda. The <span style=\"user-select: auto;\" id=\"urn:enhancement-4ad05b5a\" class=\"textannotation disambiguated wl-organization\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/united_states_air_force\">US Air Force<\/span> and <span style=\"user-select: auto;\" id=\"urn:enhancement-55624596\" class=\"textannotation disambiguated wl-organization\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/united_states_department_of_defense\">DOD<\/span>&#8216;s Defense Digital Service hosted the <span style=\"user-select: auto;\" id=\"urn:enhancement-dcef0d13\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">Space<\/span> Security Challenge 2020, a mixture of virtual workshops and prize challenges related to <span style=\"user-select: auto;\" id=\"urn:enhancement-f9198e14\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">securing<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-76939ef6\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> systems, including a live capture-the-flag (CTF) style <span style=\"user-select: auto;\" id=\"urn:enhancement-d6a48d0b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span> hacking competition dubbed &#8220;<a style=\"user-select: auto;\" target=\"_blank\" href=\"https:\/\/www.hackasat.com\/\" rel=\"noreferrer noopener\">Hack-A-Sa<\/a>t.&#8221; Then, this month the White House released a new <span style=\"user-select: auto;\" id=\"urn:enhancement-236bab3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-e905348a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/policy\">policy<\/span>&nbsp;<a style=\"user-select: auto;\" target=\"_blank\" href=\"https:\/\/www.whitehouse.gov\/presidential-actions\/memorandum-space-policy-directive-5-cybersecurity-principles-space-systems\/\" rel=\"noreferrer noopener\">Space Policy Directive (SPD) 5<\/a>. <\/p>\n\n\n\n<p class=\"eplus-DTktF5\">The <span style=\"user-select: auto;\" id=\"urn:enhancement-2e7c5552\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/policy\">policy<\/span> is considered by <span style=\"user-select: auto;\" id=\"urn:enhancement-4e749bca\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> experts as the first comprehensive government policy related to <span style=\"user-select: auto;\" id=\"urn:enhancement-30d4dab5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">cybersecurity<\/span> for <span style=\"user-select: auto;\" id=\"urn:enhancement-8149c724\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellites<\/span> and related <span style=\"user-select: auto;\" id=\"urn:enhancement-96e547fe\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span>, outlining <span style=\"user-select: auto;\" id=\"urn:enhancement-20f91b04\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/best_practice\">best practices<\/span> for agencies and companies to prevent <span style=\"user-select: auto;\" id=\"urn:enhancement-21a599d7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> systems from <span style=\"user-select: auto;\" id=\"urn:enhancement-a090e548\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/hacker_programmer_subculture\">hacking<\/span> and other cyber <span style=\"user-select: auto;\" id=\"urn:enhancement-4713afde\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/threat_computer\">threats<\/span>.<\/p>\n\n\n\n<p class=\"eplus-5YSH6A\">One <span style=\"user-select: auto;\" id=\"urn:enhancement-4a6feb2b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/company\">company<\/span>, <strong style=\"user-select: auto;\">Xage<\/strong>, is using&nbsp;<a style=\"user-select: auto;\" href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/blockchain-dev\/practical-business-cases-of-blockchain-based-solutions\/\">blockchain technology<\/a>&nbsp;to <strong style=\"user-select: auto;\">ensure <span style=\"user-select: auto;\" id=\"urn:enhancement-12baa883\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-3b7e62a7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> in <span style=\"user-select: auto;\" id=\"urn:enhancement-884c410d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span><\/strong>.&nbsp;<a style=\"user-select: auto;\" target=\"_blank\" href=\"https:\/\/xage.com\/\" rel=\"noreferrer noopener\">Xage Security<\/a>&nbsp;has developed a blockchain-protected <span style=\"user-select: auto;\" id=\"urn:enhancement-9a02ecfc\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> platform for <span style=\"user-select: auto;\" id=\"urn:enhancement-c278f7a7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet_of_things\">IoT<\/span>, creating a tamperproof &#8220;fabric&#8221; for <span style=\"user-select: auto;\" id=\"urn:enhancement-21013b79\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/communication\">communication<\/span>, authentication, and trust that assures <span style=\"user-select: auto;\" id=\"urn:enhancement-9068c598\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> at <span style=\"user-select: auto;\" id=\"urn:enhancement-440c902b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/scalability\">scale<\/span>. <\/p>\n\n\n\n<p class=\"eplus-rORHsq\">The platform supports any-to-any <span style=\"user-select: auto;\" id=\"urn:enhancement-147c2ae7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/communication\">communication<\/span>, <span style=\"user-select: auto;\" id=\"urn:enhancement-ec8ec9a5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">secures<\/span> user-based and machine-to-machine access to existing systems, works at the edge even with irregular connectivity, and gets stronger and stronger with every <span style=\"user-select: auto;\" id=\"urn:enhancement-42e13378\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/information_appliance\">device<\/span> added to the network. Their solutions have been deployed across a range of industries including energy, utilities, transportation and manufacturing.<\/p>\n\n\n\n<p class=\"eplus-4TEEF4\">I recently spoke with <span id=\"urn:enhancement-ad9d089c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/chief_executive_officer\">CEO<\/span> Duncan Greenwood and Kip Gerling. Sr Director Business Development at Xage <span id=\"urn:enhancement-a040809f\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span> to find out more. The explained that Xage had received a Phase 2 Air Force award to help protect the US <span id=\"urn:enhancement-96ca6b4a\" class=\"textannotation disambiguated wl-organization\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/air_force_space_command\">Space Command<\/span>. The heart of the <span id=\"urn:enhancement-82c5b9f3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/project\">project<\/span> is preparing the <span id=\"urn:enhancement-2cb1d4b3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space_force_action_force\">Space Force<\/span> for their upcoming challenges in <strong>distributed <span id=\"urn:enhancement-76ee1f3d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span><\/strong> and distributed coordination between different <span id=\"urn:enhancement-134e6dfb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span>.<\/p>\n\n\n\n<p class=\"eplus-TZLxq1\">Duncan explained that akin to <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/blockchain-dev\/blockchain-and-iot-in-industry-use-cases\/\">the digital transformation that has emerged across industries<\/a>, the <span id=\"urn:enhancement-90b11d7b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space_force_action_force\">Space Force<\/span> is trying to achieve <span id=\"urn:enhancement-40a96173\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> domain awareness, which includes a consolidation of <span id=\"urn:enhancement-1709f638\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span> <span id=\"urn:enhancement-99f25378\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> to try and get a complete picture of what&#8217;s going on both in <span id=\"urn:enhancement-11270990\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> and on the ground. This includes the <strong>creation of common <span id=\"urn:enhancement-6c353431\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> and <span id=\"urn:enhancement-6045f57e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> frameworks<\/strong>. However, this does pose some specific challenges in a more extreme form than those on the ground. As Duncan details:<\/p>\n\n\n\n<p class=\"eplus-8jXs07\">&#8220;You want the <span id=\"urn:enhancement-a29a1a03\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellites<\/span> to cooperate, but which <span id=\"urn:enhancement-47032a93\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellites<\/span> can talk to each other is constantly changing as they are all in different orbits and so they may or may not be able to see each other at any given moment. Similarly, the cooperation with assets on the ground may change at any given time. So each <span id=\"urn:enhancement-ae2147bb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span> or subsystem needs to be able to work independently but also needs to be able to cooperate successfully to <strong>aggregate <span id=\"urn:enhancement-b594833b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> to perform effective <span id=\"urn:enhancement-9f0e3203\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/analysis\">analysis<\/span><\/strong>.&#8221;<\/p>\n\n\n\n<div class=\"wp-block-image eplus-h3Tq1h\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/data-analysis-satellite-1024x576.jpg\" alt=\"\" class=\"wp-image-9926\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/data-analysis-satellite-1024x576.jpg 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/data-analysis-satellite-300x169.jpg 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/data-analysis-satellite-768x432.jpg 768w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/data-analysis-satellite-896x504.jpg 896w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/data-analysis-satellite-400x225.jpg 400w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/data-analysis-satellite.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p class=\"eplus-XdyphT\">There&#8217;s also an edge processing challenge. &#8220;Because you can get a lot of <span id=\"urn:enhancement-1ba93104\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> on the <span id=\"urn:enhancement-446674ef\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span>, it&#8217;s fairly difficult to move all of that <span id=\"urn:enhancement-548238f2\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> back to the ground. Thus intelligence processing at the edge is necessary.&#8221;<\/p>\n\n\n\n<h2 class=\"eplus-dWXd56 wp-block-heading\" id=\"h-blockchain-technology-and-the-challenge-of-multiple-party-access-and-mixed-use-assets\">Blockchain technology and the challenge of multiple party access and mixed-use assets<\/h2>\n\n\n\n<p class=\"eplus-A2o9J0\">There&#8217;s also the challenge of multiple parties and <strong style=\"user-select: auto;\"><span style=\"user-select: auto;\" id=\"urn:enhancement-10491ea5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-fa4eaebe\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/access_control\">access<\/span><\/strong>.<\/p>\n\n\n\n<p class=\"eplus-wsk3O6\">&#8220;It&#8217;s no longer just the air force wanting the <span style=\"user-select: auto;\" id=\"urn:enhancement-1b1e7e2d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span>, many different parts of the military or the government may want to view <span style=\"user-select: auto;\" id=\"urn:enhancement-e0b030c9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> and who can <span style=\"user-select: auto;\" id=\"urn:enhancement-8689753c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/access_control\">access<\/span> what is always a complicated problem in most situations. Some of the <span style=\"user-select: auto;\" id=\"urn:enhancement-ffed15e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> may be highly sensitive; even the fact that you&#8217;ve gathered the <span style=\"user-select: auto;\" id=\"urn:enhancement-3d49b811\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> may be controversial. So, this complex <span style=\"user-select: auto;\" id=\"urn:enhancement-56fea856\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/access_control\">access control<\/span> for <span style=\"user-select: auto;\" id=\"urn:enhancement-2feebadd\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> is a classic Xage problem that we deal with.&#8221;<\/p>\n\n\n\n<p class=\"eplus-HXhpKZ\">With <span style=\"user-select: auto;\" id=\"urn:enhancement-c37871dc\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> comes <strong style=\"user-select: auto;\">sharing<\/strong>: &#8220;A single <span style=\"user-select: auto;\" id=\"urn:enhancement-716141e5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span> may be able to handle a bunch of commercial <span style=\"user-select: auto;\" id=\"urn:enhancement-ac21cad\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/communication\">communication<\/span>, for <span style=\"user-select: auto;\" id=\"urn:enhancement-c74fa7f1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/instance_computer_science\">instance<\/span>, but it might also be performing some government functions at the same time.&#8221; <\/p>\n\n\n\n<p class=\"eplus-PPpSou\">While traditionally the <span style=\"user-select: auto;\" id=\"urn:enhancement-5f6340a7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellites<\/span>&#8216; challenge was either ensuring they were not under attack or their internal network broken into, the sharing of <span style=\"user-select: auto;\" id=\"urn:enhancement-b1b9aba5\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> raises new challenges such as <span style=\"user-select: auto;\" id=\"urn:enhancement-11d1251b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/access_control\">access control<\/span> and <span style=\"user-select: auto;\" id=\"urn:enhancement-28c46312\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-78732067\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span>, at the level of the individual <span style=\"user-select: auto;\" id=\"urn:enhancement-6f87020c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">applications<\/span>, individual sensors, the respective <span style=\"user-select: auto;\" id=\"urn:enhancement-98546a50\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/transaction_processing\">processing<\/span> units.<\/p>\n\n\n\n<h2 class=\"eplus-Lo2Kkk wp-block-heading\" id=\"h-introducing-dynamic-data-security\">Introducing Dynamic Data Security<\/h2>\n\n\n\n<p class=\"eplus-vahrDF\">In 2017, Xage <span style=\"user-select: auto;\" id=\"urn:enhancement-49bd49bb\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span> introduced <strong style=\"user-select: auto;\">the first and only blockchain-protected <span style=\"user-select: auto;\" id=\"urn:enhancement-ae43cdcd\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span> Fabric for industrial <span style=\"user-select: auto;\" id=\"urn:enhancement-136c5394\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/business_operations\">operations<\/span><\/strong>. Since then, Xage has built upon its platform to develop the first tamperproof <span style=\"user-select: auto;\" id=\"urn:enhancement-f4465836\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> and the first universal <span style=\"user-select: auto;\" id=\"urn:enhancement-9b683f5b\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/access_control\">access<\/span> control for all industrial <span style=\"user-select: auto;\" id=\"urn:enhancement-ef04d96c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/business_operations\">operations<\/span> and <span style=\"user-select: auto;\" id=\"urn:enhancement-3e1bce63\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/information_appliance\">devices<\/span>.<\/p>\n\n\n\n<p class=\"eplus-W0TdDK\">This hierarchical <span style=\"user-select: auto;\" id=\"urn:enhancement-679248fd\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> enables multiple simultaneous updates across the Fabric, regardless of location or connectivity\u2013\u2013and is a world-first for blockchain-protected <span style=\"user-select: auto;\" id=\"urn:enhancement-e6523773\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">security<\/span>.&nbsp;<\/p>\n\n\n\n<p class=\"eplus-8LCGf2\">&nbsp;Earlier this year Xage unveiled&nbsp;<a style=\"user-select: auto;\" target=\"_blank\" href=\"https:\/\/www.globenewswire.com\/news-release\/2020\/03\/31\/2009281\/0\/en\/Xage-Introduces-New-Security-Offering-to-Protect-Data-Sharing-From-the-On-Site-Operation-to-the-Cloud-Across-Suppliers-Customers-and-Internal-Operations.html\" rel=\"noreferrer noopener\">Dynamic Data Security<\/a>. This new offering enforces tamperproof <span style=\"user-select: auto;\" id=\"urn:enhancement-7047403c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> <span style=\"user-select: auto;\" id=\"urn:enhancement-938586e0\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span>, enabling <span style=\"user-select: auto;\" id=\"urn:enhancement-3be3ec9d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">secure<\/span> and dynamic <span style=\"user-select: auto;\" id=\"urn:enhancement-41b63bc7\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> sharing between multiple <span style=\"user-select: auto;\" id=\"urn:enhancement-c02d03df\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">systems<\/span>, multiple locations, and multiple parties. The DDS system can also support <strong style=\"user-select: auto;\"><span style=\"user-select: auto;\" id=\"urn:enhancement-a79992d6\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> hashing, signing, and encrypting from the <span style=\"user-select: auto;\" id=\"urn:enhancement-838ba27e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> source<\/strong>.<\/p>\n\n\n\n<p class=\"eplus-0DNfPt\">Additionally, it also stores <span style=\"user-select: auto;\" id=\"urn:enhancement-f5a2c05d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> metadata in the Xage Fabric. Using this <span style=\"user-select: auto;\" id=\"urn:enhancement-14f224b8\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> also means safe <span style=\"user-select: auto;\" id=\"urn:enhancement-d2fce6b3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> replicating across Fabric and all other places the <span style=\"user-select: auto;\" id=\"urn:enhancement-57834adf\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> may be consumed.<\/p>\n\n\n\n<p class=\"eplus-rwaiIi\"><span id=\"urn:enhancement-ea88145d\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/computer_security\">Security<\/span> is critically important in the age of <strong><span id=\"urn:enhancement-70820312\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> spoofing<\/strong> &#8211; where a hostile <span id=\"urn:enhancement-e3b57847\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span> could try to imitate one of your own <span id=\"urn:enhancement-a958e904\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellites<\/span>. Whether it&#8217;s from <span id=\"urn:enhancement-e01218ca\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span> to <span id=\"urn:enhancement-913cb3dd\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span> or <span id=\"urn:enhancement-24c934a1\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span> to ground, Xage guarantees the authenticity and confidentiality of <span id=\"urn:enhancement-a7d54067\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/satellite\">satellite<\/span> <span id=\"urn:enhancement-f0d10181\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> in <span id=\"urn:enhancement-fff5712c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/real-time_data\">real-time<\/span> on a zero-trust basis.<\/p>\n\n\n\n<p class=\"eplus-O8ge5R\">The air force has become increasingly innovative, creating&nbsp;<a target=\"_blank\" href=\"https:\/\/www.afwerx.af.mil\/index.html\" rel=\"noreferrer noopener\">AFWERX<\/a>&nbsp;in 2017, a program that facilitates <span id=\"urn:enhancement-a2ee0e9e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/interpersonal_relationship\">relationships<\/span> between startups, industry innovators, academia, and the military to create transformative opportunities and foster a culture of <span id=\"urn:enhancement-731c0fde\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/innovation\">innovation<\/span> across military and <span id=\"urn:enhancement-eda1a41a\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> tech.<\/p>\n\n\n\n<div class=\"wp-block-image eplus-myM6JL\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"531\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/afwerx-1024x531.jpg\" alt=\"\" class=\"wp-image-9927\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/afwerx-1024x531.jpg 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/afwerx-300x156.jpg 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/afwerx-768x398.jpg 768w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/afwerx.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p class=\"eplus-V53vQj\">Kip notes:<\/p>\n\n\n\n<p class=\"eplus-9FDhWG\">&#8220;I think the reason they initiated the program, from an innovation standpoint, is according to their intel, the bad guys are actually out-innovating from a defensive standpoint, which I think really caused them to lean forward, take pause and then create this program. They have very <span id=\"urn:enhancement-69e7f477\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/service_systems_architecture\">system architecture<\/span> for their mission needs. Part of the challenge is not only you have to have a <span id=\"urn:enhancement-860a9fa9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> <span id=\"urn:enhancement-ab27b67\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/infrastructure\">infrastructure<\/span> for a heterogeneous ecosystem. But if that <span id=\"urn:enhancement-1fcd2158\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> goes down, there has to be a redundant <span id=\"urn:enhancement-7f13dde9\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/system\">system<\/span> that can take over for that mission need.&#8221;<\/p>\n\n\n\n<p class=\"eplus-K7SpIe\">Part of the opportunity is the speed of <span id=\"urn:enhancement-1d7d4d4e\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/innovation\">innovation<\/span> itself. As Kip asserts, &#8220;They think in 3-5 years progress. This is how fast things are evolving. Just as you&#8217;re not going to run a warehouse five years from now as it currently operates, five years from now, you&#8217;re not going to run a <span id=\"urn:enhancement-1d48363c\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> system the same way.&#8221;<\/p>\n\n\n\n<p class=\"eplus-N0mw9S\">Duncan concludes, Xage&#8217;s ultimate goal is to bring Xage level protection into the Space Force, &#8220;A base level of protection to <span id=\"urn:enhancement-5deafe63\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/space\">space<\/span> commands, and with it enable a bunch of improvements in their operational <span id=\"urn:enhancement-f155cea3\" class=\"textannotation disambiguated wl-thing\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/capability-based_security\">capabilities<\/span> and combine that with a reduction in the cyber risks we&#8217;re facing. And if we can do that, then we&#8217;ll be pretty happy.&#8221;<\/p>\n\n\n\n<h2 class=\"eplus-yCxAG7 wp-block-heading\" id=\"h-want-a-career-in-blockchain-technlogy\">Want a career in blockchain technlogy?<\/h2>\n\n\n\n<p class=\"eplus-kKr5mY\"><strong><span id=\"urn:local-annotation-431375\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/blockchain\">Blockchain<\/span> technology<\/strong> is considered one of the most in-demand developer fields of the year. The opportunities evolve whether you want to&nbsp;<a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/blockchain-dev\/be-in-demand-how-and-why-to-become-a-blockchain-developer\/\">shift to a developer career in blockchain<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/blockchain-dev\/how-to-improve-your-blockchain-developer-career\/\">improve your blockchain developer career<\/a>.<\/p>\n\n\n\n<p class=\"eplus-olh5N2\">Duncan notes that there are a number of interesting companies tackling a variety of <strong>distributed system problems<\/strong>. &#8220;It may be&nbsp;cybersecurity&nbsp;like Xage, or it may be more about <span id=\"urn:local-annotation-90889\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/analytics\">analytics<\/span> or <strong><span id=\"urn:local-annotation-95833\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/artificial_intelligence\">AI<\/span><\/strong>, or more focused around data combination and data aggregation.<\/p>\n\n\n\n<p class=\"eplus-KpK55c\">It&#8217;s a part about finding the right company to work for, but also the willingness to work in very agile environments with very new technology: &#8220;I think it&#8217;s about the willingness to dive in and just try new stuff and see yourself out.&#8221;<\/p>\n\n\n\n<p class=\"eplus-lPMAA4\">Regarding blockchain technology resources, Duncan rates Stellar for developers and suggests you download <span style=\"user-select: auto;\" id=\"urn:local-annotation-656698\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/tensorflow\">TensorFlow<\/span> and play with distributed AI systems in <span style=\"user-select: auto;\" id=\"urn:local-annotation-143255\" class=\"textannotation disambiguated\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/microsoft_azure\">Azure<\/span>. <\/p>\n\n\n\n<p class=\"eplus-28LgTY\">There&#8217;s plenty of books, and he spoke of a recent interview of a prospective employee, noting, &#8220;For somebody who&#8217;s never practiced professionally, he really seemed to have a deep understanding of <a style=\"user-select: auto;\" href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/blockchain-dev\/the-blockchain-security-risks-that-you-dont-hear-about\/\">blockchain and security<\/a>, and I asked him if he found a great book to read or something. He looked at me funny and said, &#8216;You know, I found some great videos on YouTube.&#8217;<\/p>\n\n\n\n<p class=\"eplus-vTiihn\">Duncan also admits, &#8220;I can&#8217;t resist saying <strong style=\"user-select: auto;\">if they&#8217;re great developers, then they should certainly contact Xage!<\/strong>&#8220;<\/p>\n\n\n\n<h2 class=\"eplus-viWvHk wp-block-heading\" id=\"h-want-to-launch-a-developer-event-despite-the-challenges-of-covid-19\">Want to launch a developer event despite the challenges of  COVID-19?<\/h2>\n\n\n\n<p class=\"eplus-Dlirgv\">If you want to know more about how modern technologies and tools can support you for \u2013 and during \u2013 the organisation of a virtual event, don\u2019t miss this article showcasing the best tools we used to&nbsp;<a style=\"user-select: auto;\" href=\"https:\/\/www.codemotion.com\/magazine\/articles\/events\/hosting-virtual-conference\/\">host our online conferences<\/a>&nbsp;since the COVID-19 outbreak.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve probably thought about securing smart devices such as cars and homes, but have you thought about securing space with blockchain technology? The increasing adoption of connected technologies exposes aircraft, airports, satellites, and the interdependent aerospace ecosystem to new types of risks. And it&#8217;s being taken extremely seriously. This year&#8217;s DEFCON Safe Mode even had&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/\">Read more<\/a><\/p>\n","protected":false},"author":85,"featured_media":9920,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":6,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[13],"tags":[7152],"collections":[],"class_list":{"0":"post-8924","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blockchain","8":"tag-security","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Blockchain can be Used for Data Security in Space - Codemotion<\/title>\n<meta name=\"description\" content=\"Blockchain technology is being used to secure satellites in space, protect critical data, and facilitate the sharing of space data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Blockchain Technology Can Ensure Data Security in Space?\" \/>\n<meta property=\"og:description\" content=\"Blockchain technology is being used to secure satellites in space, protect critical data, and facilitate the sharing of space data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-25T15:00:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-05T19:06:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cate Lawrence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cate Lawrence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/\"},\"author\":{\"name\":\"Cate Lawrence\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1\"},\"headline\":\"How Blockchain Technology Can Ensure Data Security in Space?\",\"datePublished\":\"2020-09-25T15:00:39+00:00\",\"dateModified\":\"2022-01-05T19:06:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/\"},\"wordCount\":1439,\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Blockchain\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/\",\"name\":\"How Blockchain can be Used for Data Security in Space - Codemotion\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg\",\"datePublished\":\"2020-09-25T15:00:39+00:00\",\"dateModified\":\"2022-01-05T19:06:19+00:00\",\"description\":\"Blockchain technology is being used to secure satellites in space, protect critical data, and facilitate the sharing of space data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#primaryimage\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg\",\"width\":1200,\"height\":675,\"caption\":\"data security in space ISS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backend\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/backend\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Blockchain\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How Blockchain Technology Can Ensure Data Security in Space?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Codemotion.Italy\/\",\"https:\/\/x.com\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1\",\"name\":\"Cate Lawrence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"caption\":\"Cate Lawrence\"},\"url\":\"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Blockchain can be Used for Data Security in Space - Codemotion","description":"Blockchain technology is being used to secure satellites in space, protect critical data, and facilitate the sharing of space data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/","og_locale":"en_US","og_type":"article","og_title":"How Blockchain Technology Can Ensure Data Security in Space?","og_description":"Blockchain technology is being used to secure satellites in space, protect critical data, and facilitate the sharing of space data.","og_url":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2020-09-25T15:00:39+00:00","article_modified_time":"2022-01-05T19:06:19+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg","type":"image\/jpeg"}],"author":"Cate Lawrence","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Cate Lawrence","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/"},"author":{"name":"Cate Lawrence","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1"},"headline":"How Blockchain Technology Can Ensure Data Security in Space?","datePublished":"2020-09-25T15:00:39+00:00","dateModified":"2022-01-05T19:06:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/"},"wordCount":1439,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg","keywords":["Security"],"articleSection":["Blockchain"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/","url":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/","name":"How Blockchain can be Used for Data Security in Space - Codemotion","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg","datePublished":"2020-09-25T15:00:39+00:00","dateModified":"2022-01-05T19:06:19+00:00","description":"Blockchain technology is being used to secure satellites in space, protect critical data, and facilitate the sharing of space data.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg","width":1200,"height":675,"caption":"data security in space ISS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/blockchain-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Backend","item":"https:\/\/www.codemotion.com\/magazine\/backend\/"},{"@type":"ListItem","position":3,"name":"Blockchain","item":"https:\/\/www.codemotion.com\/magazine\/backend\/blockchain\/"},{"@type":"ListItem","position":4,"name":"How Blockchain Technology Can Ensure Data Security in Space?"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1","name":"Cate Lawrence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","caption":"Cate Lawrence"},"url":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-600x600.jpg","author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg",1200,675,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-300x169.jpg",300,169,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-768x432.jpg",768,432,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg",1200,675,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg",1200,675,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss.jpg",100,56,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/09\/iss-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_comment_info":0,"uagb_excerpt":"You&#8217;ve probably thought about securing smart devices such as cars and homes, but have you thought about securing space with blockchain technology? The increasing adoption of connected technologies exposes aircraft, airports, satellites, and the interdependent aerospace ecosystem to new types of risks. And it&#8217;s being taken extremely seriously. This year&#8217;s DEFCON Safe Mode even had&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/8924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=8924"}],"version-history":[{"count":17,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/8924\/revisions"}],"predecessor-version":[{"id":12035,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/8924\/revisions\/12035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/9920"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=8924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=8924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=8924"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=8924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}