{"id":23057,"date":"2017-04-20T01:17:38","date_gmt":"2017-04-19T22:17:38","guid":{"rendered":"https:\/\/www.altoros.com\/blog\/?p=23057"},"modified":"2017-04-20T11:07:42","modified_gmt":"2017-04-20T08:07:42","slug":"blockchain-security-choosing-a-platform-is-only-the-first-step","status":"publish","type":"post","link":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/","title":{"rendered":"Blockchain Security: Choosing a Platform Is Only the First Step"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#Security_threats_everywhere\" >Security threats everywhere<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#A_secure_business_network_with_Hyperledger\" >A secure business network with Hyperledger<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#A_reference_architecture_for_secure_blockchain\" >A reference architecture for secure blockchain<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#Relying_on_Secure_Service_Containers\" >Relying on Secure Service Containers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#Blockchain_securing_diamonds\" >Blockchain securing diamonds<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#Related_reading\" >Related reading<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#About_the_speakers\" >About the speakers<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Security_threats_everywhere\"><\/span>Security threats everywhere<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Since last year, there have been several discussions surrounding blockchain technology\u2014ranging from <a href=\"https:\/\/www.altoros.com\/blog\/a-panel-how-soon-will-we-see-blockchain-in-finance\/\" target=\"_blank\">adoption predictions<\/a> to <a href=\"https:\/\/www.altoros.com\/blog\/a-panel-addresses-the-state-of-hyperledger-and-what-needs-improvement\/\" target=\"_blank\">requirements<\/a> from the financial industry. There was also increased interest and investment in the development of the technology with the inception of the <a href=\"https:\/\/www.altoros.com\/blog\/blockchain-at-ibm-interconnect-enterprise-deployment\/\" target=\"_blank\">Hyperledger Project<\/a> in December 2015.<\/p>\n<p>With both <a href=\"https:\/\/www.altoros.com\/blog\/canadian-financial-institutions-are-adopting-blockchain-6-success-stories\/\" target=\"_blank\">financial<\/a> and <a href=\"https:\/\/www.altoros.com\/blog\/ibm-interconnect-blockchain-to-transform-iot-supply-chains-and-the-world-around-us\/\" target=\"_blank\">non-financial<\/a> institutions adopting distributed ledgers and with the release of Hyperledger Fabric v1.0, keeping blockchain networks secure is the next step.<\/p>\n<p><center><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Threats.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Threats.png\" alt=\"IBM Blockchain Hyperledger Fabric InterConnect Security Threats\" width=\"640\" class=\"aligncenter size-full wp-image-23139\" \/><\/a><small><a href=\"https:\/\/www-01.ibm.com\/marketing\/iwm\/dre\/signup?source=mrs-form-2988&#038;S_PKG=ov47123&#038;ce=ISM0484&#038;ct=SWG&#038;cmp=IBMSocial&#038;cm=h&#038;cr=Security&#038;ccy=US\" target=\"_blank\">Source<\/a><\/small><\/center><\/p>\n<p>The figures are self-explanatory. For instance, <a href=\"https:\/\/www.cbc.ca\/news\/science\/ethereum-hack-blockchain-fork-bitcoin-1.3719009\" target=\"_blank\">Ethereum<\/a> lost millions due to a hack last year. At the same time, according to a an <a href=\"https:\/\/www-03.ibm.com\/security\/data-breach\/threat-intelligence-index.html\" target=\"_blank\">IBM X-Force report<\/a>, 60% of attacks are from internal threats.<\/p>\n<p>It&#8217;s hard to disagree with Constellation Research&#8217;s <a href=\"https:\/\/www.linkedin.com\/in\/lockstep\/\" target=\"_blank\">Steve Wilson<\/a>, who states that &#8220;confidentiality is not trivial.&#8221; At IBM InterConnect 2017, he presented the idea of &#8220;Blockchain 3.0,&#8221; describing it as the next generation of the distributed ledger model, which will require more security than ever.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/ibm-interconnect-blockchain-3-0-steve-wilson.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/ibm-interconnect-blockchain-3-0-steve-wilson.png\" alt=\"ibm-interconnect-blockchain-3-0-steve-wilson\" width=\"640\" class=\"aligncenter size-full wp-image-23200\" \/><\/a><\/p>\n<blockquote><p><em>&#8220;What does Blockchain 3.0 look like? It seems like people and processes are in the mix again. It&#8217;s not like the original public blockchain where we pretend people and processes don&#8217;t matter.&#8221; \u2014Steve Wilson, Constellation Research<\/em><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"A_secure_business_network_with_Hyperledger\"><\/span>A secure business network with Hyperledger<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Improving on current blockchain technology, IBM wants a blockchain that is &#8220;open, trusted, and for business.&#8221; This is realized by collaborating on <a href=\"https:\/\/www.altoros.com\/blog\/hyperledger-fabric-chaincode-practical-byzantine-fault-tolerance-and-v1-0\/\" >Hyperledger Fabric v1.0<\/a>\u2014an open-sourced private, permissioned blockchain technology.<\/p>\n<p>According to IBM&#8217;s <a href=\"https:\/\/www.linkedin.com\/in\/jerry-cuomo-0891902\/\" target=\"_blank\">Jerry Cuomo<\/a>, Hyperledger Fabric v1.0 is built on a trust model that is democratic with permissions and consensus, tamper-proof, and is auditable to better emulate how real businesses interacts. Transactions within this model would proceed as follows:<\/p>\n<ol>\n<li style=\"margin-bottom: 6px;\">Participants are issued a <em>cryptographic membership card<\/em> which represents their identity within the blockchain network.<\/li>\n<li style=\"margin-bottom: 6px;\">This membership card grants you access to see transactions in the ledger that pertain to <em>you and only you<\/em>.<\/li>\n<li style=\"margin-bottom: 6px;\">Auditors may be granted membership that allows them to see a little more of the ledger to ensure that transactions are <em>in compliance<\/em>.<\/li>\n<li style=\"margin-bottom: 6px;\">Trust is further built through the process of <em>consensus<\/em>. Transactions are first <em>proposed<\/em> to members of the network. These transactions are then <em>voted<\/em> on through the process of consensus.<\/li>\n<li>When the majority agree, consensus is reached. Then and only then, will the transaction be committed to the ledger and it <em>cannot be erased<\/em>.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-InterConnect-Blockchain-Hyperledger-Fabric-Jerry-Cuomo.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-InterConnect-Blockchain-Hyperledger-Fabric-Jerry-Cuomo.png\" alt=\"IBM InterConnect Blockchain Hyperledger Fabric Jerry Cuomo\" width=\"640\" class=\"aligncenter size-full wp-image-23067\" \/><\/a><\/p>\n<blockquote><p><em>&#8220;Hyperledger Fabric v1.0 is capable of transacting at rates way over 1,000 transactions per second.&#8221; \u2014Jerry Cuomo, IBM<\/em><\/p><\/blockquote>\n<p>Jerry also introduced <a href=\"https:\/\/www.altoros.com\/blog\/hyperledgers-fabric-composer-simplifies-business-network-modeling-on-blockchain\/\" target=\"_blank\">Hyperledger Fabric Composer<\/a>, a new tool that &#8220;allows business users and developers to speak the same language, thereby accelerate the creation of busineses solutions from days to minutes.&#8221;<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/03\/IBM-Blockchain-Hyperledger-Fabric-Composer-Playground.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/03\/IBM-Blockchain-Hyperledger-Fabric-Composer-Playground.png\" alt=\"IBM Blockchain Hyperledger Fabric Composer Playground\" width=\"640\" class=\"aligncenter size-full wp-image-22377\" \/><\/a><\/p>\n<p>With Hyperledger-based platforms and Fabric Composer, blockchain creation and management has been simplified, as users can:<\/p>\n<ul>\n<li style=\"margin-bottom: 6px;\"><strong>Rapidly develop<\/strong> a blockchain solution<\/li>\n<li style=\"margin-bottom: 6px;\">Find and <strong>govern<\/strong> blockchain networks<\/li>\n<li style=\"margin-bottom: 6px;\"><strong>Operate<\/strong> those networks with security and do it all at scale<\/li>\n<li><strong>Analyze<\/strong> into those networks by peering in to gain additional insight<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"A_reference_architecture_for_secure_blockchain\"><\/span>A reference architecture for secure blockchain<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>However, according to other speakers at IBM InterConnect, &#8220;choosing a fabric is just the first decision,&#8221; and more efforts are needed to secure the blockchain network. To explain this in detail, IBM&#8217;s <a href=\"https:\/\/www.linkedin.com\/in\/dimarzio\/\" target=\"_blank\">Paul DiMarzio<\/a> presented a typical architecture for a blockchain stack.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Architecture-1.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Architecture-1.png\" alt=\"IBM Blockchain Hyperledger Fabric InterConnect Security Architecture 1\" width=\"640\" class=\"aligncenter size-full wp-image-23152\" \/><\/a><\/p>\n<p>In this configuration, the hardware and firmware are physically secured, but everything else in the software level is vulnerable to attacks.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Architecture-2.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Architecture-2.png\" alt=\"IBM Blockchain Hyperledger Fabric InterConnect Security Architecture 2\" width=\"640\" class=\"aligncenter size-full wp-image-23153\" \/><\/a><\/p>\n<p>To achieve the same level of security at the hardware level, IBM adds several layers of security to slowly push up that protection to the very top of the stack. In this step, <a href=\"https:\/\/en.wikipedia.org\/wiki\/PR\/SM\" target=\"_blank\">PR\/SM virtualization<\/a> technology is used to protect different partitions in the system.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Architecture-3.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Architecture-3.png\" alt=\"IBM Blockchain Hyperledger Fabric InterConnect Security Architecture 3\" width=\"640\" class=\"aligncenter size-full wp-image-23154\" \/><\/a><\/p>\n<p>Next is building Secure Service Containers into the virtualization layer now extends security up to the very top of the stack. (Read the next section for more on Secure Service Containers.)<\/p>\n<blockquote><p><em>&#8220;By building Secure Service Containers, we can entirely encapsulate a blockchain network and make it such that anybody even at the highest level of credentials can disrupt it.&#8221; \u2014Paul DiMarzio, IBM<\/em><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Architecture-4.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Architecture-4.png\" alt=\"IBM Blockchain Hyperledger Fabric InterConnect Security Architecture 4\" width=\"640\" class=\"aligncenter size-full wp-image-23157\" \/><\/a><\/p>\n<p>Finally, through the use of tamper-responsive hardware security modules, the system is protected from certificates theft. Attempts to steal the keys will cause them to self-destruct.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Relying_on_Secure_Service_Containers\"><\/span>Relying on Secure Service Containers<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>To secure the blockchain network itself, IBM makes use of Secure Service Containers. IBM&#8217;s <a href=\"https:\/\/www.linkedin.com\/in\/dimarzio\/\" target=\"_blank\">Paul DiMarzio<\/a> details how it protects blockchain software, chain code, and data:<\/p>\n<ul>\n<li style=\"margin-bottom: 6px;\">Root users and system administrators cannot access blockchain contents.<\/li>\n<li style=\"margin-bottom: 6px;\">Malware cannot self install in the container.<\/li>\n<li>Encryption keys are protected.<\/li>\n<\/ul>\n<p><center><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Secure-Service-Containers-v2.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Secure-Service-Containers-v2.png\" alt=\"IBM Blockchain Hyperledger Fabric InterConnect Secure Service Containers v2\" width=\"640\" class=\"aligncenter size-full wp-image-23214\" \/><\/a><small><a href=\"https:\/\/cloud.ibm.com\/docs\/services\/blockchain\/etn_ssc.html\" target=\"_blank\">Source<\/a><\/small><\/center><\/p>\n<p>&#8220;It&#8217;s a trusted environment, because it&#8217;s encrypted and signed in firmware so that we know if it&#8217;s been tampered with,&#8221; explained Paul. &#8220;You can&#8217;t inject malware. You can&#8217;t inject changes without the system knowing and stopping it. Once it&#8217;s running, operators have no access to it.&#8221;<\/p>\n<p>Secure Service Containers ensure that:<\/p>\n<ul>\n<li>No system admin access. Once the appliance image is built, OS access (SSH) it not possible.<\/li>\n<li>Only remote APIs are available.<\/li>\n<li>Memory access is disabled.<\/li>\n<li>Disks are encrypted.<\/li>\n<li>Debug data (dumps) is encrypted.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Paul-DiMarzio.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Paul-DiMarzio.png\" alt=\"IBM Blockchain Hyperledger Fabric InterConnect Security Paul DiMarzio\" width=\"640\" class=\"aligncenter size-full wp-image-23159\" \/><\/a><\/p>\n<blockquote><p><em>&#8220;It&#8217;s the ability to effectively put an impenetrable blockbox around any system, any application from the virtualization software all the way up to the application.&#8221; \u2014Paul DiMarzio, IBM<\/em><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Blockchain_securing_diamonds\"><\/span>Blockchain securing diamonds<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/leannekemp\/\" target=\"_blank\">Leanne Kemp<\/a> told the <a href=\"https:\/\/www.ibm.com\/press\/us\/en\/pressrelease\/50169.wss\" target=\"_blank\">story<\/a> of Everledger and how it was able to develop a trusted platform to protect the diamond industry from threats such as fraud, document tampering, synthetic stones, conflict stones, black markets, and double financing.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Everledger-stats.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Everledger-stats.png\" alt=\"IBM Blockchain Hyperledger Fabric InterConnect Security Everledger stats\" width=\"640\" class=\"aligncenter size-full wp-image-23173\" \/><\/a><\/p>\n<p>All of these issues were rooted on a lack of visibility and provenance along the supply chain. This was underpinned by a paper-based certification system that was vulnerable to tampering.<\/p>\n<p>Using Hyperledger-based IBM Blockchain on LinuxOne, Everledger built a platform that brought greater transparency to the open market places and global supply chain by ensuring that the authenticity of the asset is secured and stored among all industry participants. &#8220;We integrated the supply chain onto the same digital network creating a single version of the truth for all parties involved in the diamond trade,&#8221; said Leanne. &#8220;We shared records visible across the industry participants.&#8221;<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Everledger.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security-Everledger.png\" alt=\"IBM Blockchain Hyperledger Fabric InterConnect Security Everledger\" width=\"640\" class=\"aligncenter size-full wp-image-23168\" \/><\/a><\/p>\n<blockquote><p><em>&#8220;The blockchain is re-imagining the world&#8217;s luxury goods supply chain. \u2014Leanne Kemp, Everledger<\/em><\/p><\/blockquote>\n<p>With blockchain, Everledger is able to set meta data to identify diamonds, essentially creating a digital thumbprint for each stone. This information is then used to create immutable certificates that identify individual diamonds in the market and can be used by participants on a supply chain to form provenance and verify authenticity.<\/p>\n<p><p>Leanne is hopeful that the success Everledger has found with blockchain will eventually expand beyond diamonds and onto other luxury goods.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Related_reading\"><\/span>Related reading<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/ibm-interconnect-blockchain-to-transform-iot-supply-chains-and-the-world-around-us\/\">IBM: Blockchain to Transform IoT, Supply Chains, and the World Around Us<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/ibm-interconnect-talking-secure-hybrid-and-multi-cloud-infrastructures\/\">IBM InterConnect: Bringing in Secure, Hybrid, and Multi-Cloud Infrastructure<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/how-hyperledger-fabric-delivers-security-to-enterprise-blockchain\/\">How Hyperledger Fabric Delivers Security to Enterprise Blockchain<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/hyperledgers-fabric-composer-simplifies-business-network-modeling-on-blockchain\/\">Hyperledger\u2019s Fabric Composer: Simplifying Business Networks on Blockchain<\/a><\/li>\n<\/ul>\n<hr\/>\n<h3><span class=\"ez-toc-section\" id=\"About_the_speakers\"><\/span>About the speakers<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div>\n<div style=\"float: right;\"><a href=\"https:\/\/www.linkedin.com\/in\/leannekemp\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/leanne-kemp-everledger-bio.png\" alt=\"leanne kemp, everledger bio\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-23097\" \/><\/a><\/div>\n<div style=\"width: 600px;\"><small><a href=\"https:\/\/www.linkedin.com\/in\/leannekemp\/\">Leanne Kemp<\/a> is the founder and CEO of Everledger, a digital global ledger that tracks and protects items of value. With a wealth of successful startup companies under her belt, Leanne is pushing boundaries in protecting the global market of diamonds and luxury items. Utilizing her extensive background in emerging technologies, business, jewelry, and insurance, Leanne and Everledger are working towards creating global transparency and an ethical trade platform by constructing a digital and encrypted global certification system that assists in the reduction of fraud, black markets, and trafficking.<\/small><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<div style=\"float: right;\"><a href=\"https:\/\/www.linkedin.com\/in\/jerry-cuomo-0891902\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/jerry-cuomo-ibm-bio.png\" alt=\"jerry cuomo, ibm bio\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-23099\" \/><\/a><\/div>\n<div style=\"width: 600px;\"><small><a href=\"https:\/\/www.linkedin.com\/in\/jerry-cuomo-0891902\/\">Jerry Cuomo<\/a> is an IBM Fellow and newly appointed Vice President of Blockchain Technologies. In his new role, Jerry is leading the creation of an emerging business unit to define IBM&#8217;s blockchain strategy, offerings, and customer engagement approach. In 2016, IBM Blockchain was open for business, with the creation and open-source contributions to the new Linux Hyperledger Project, the introduction of IBM Blockchain Cloud Services, and the new Blockchain Garages to be opened in NYC, London, Japan, and Singapore.<\/small><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<div style=\"float: right;\"><a href=\"https:\/\/www.linkedin.com\/in\/dimarzio\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/Paul-DiMarzio-IBM-bio.png\" alt=\"Paul DiMarzio, IBM bio\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-23163\" \/><\/a><\/div>\n<div style=\"width: 600px;\"><small><a href=\"https:\/\/www.linkedin.com\/in\/dimarzio\/\">Paul DiMarzio<\/a> is Consulting Software Engineer at IBM. He has over 30 years of experience with IBM focused on bringing new emerging technologies to the mainframe. Paul is currently responsible for developing and executing IBM&#8217;s worldwide z Systems big data and analytics portfolio marketing strategy, including the role of z Systems in IBM&#8217;s cognitive and Internet of Things businesses. He is also currently working on z Systems blockchain marketing strategy.<\/small><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<div style=\"float: right;\"><a href=\"https:\/\/www.linkedin.com\/in\/lockstep\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/Steve-Wilson-Constellation-Research-bio.png\" alt=\"Steve Wilson, Constellation Research bio\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-23164\" \/><\/a><\/div>\n<div style=\"width: 600px;\"><small><a href=\"https:\/\/www.linkedin.com\/in\/lockstep\/\">Steve Wilson<\/a> is a researcher, innovator, analyst, and R&#038;D leader in digital identity and privacy. As Vice President and Principal Analyst at San Francisco-based Constellation Research, he leads the firm&#8217;s work in digital safety, privacy, and blockchain technologies. A 20-year veteran in cybersecurity, Wilson is one of the world&#8217;s most original thinkers in digital identity. Steve has been awarded nine patents, and is currently undertaking a PhD on the evolution of identity ecosystems.<\/small><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security threats everywhere<\/p>\n<p>Since last year, there have been several discussions surrounding blockchain technology\u2014ranging from adoption predictions to requirements from the financial industry. There was also increased interest and investment in the development of the technology with the inception of the Hyperledger Project in December 2015.<\/p>\n<p>With both financial and non-financial institutions [&#8230;]<\/p>\n","protected":false},"author":32,"featured_media":23175,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[672,753,761],"class_list":["post-23057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-opinion","tag-blockchain","tag-hyperledger","tag-ibm-interconnect"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blockchain Security: Choosing a Platform Is Only the First Step | Altoros<\/title>\n<meta name=\"description\" content=\"Multiple speakers from IBM InterConnect 2017 focused on the need to achieve blockchain security from hardware to the application level. Here are the highlights.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain Security: Choosing a Platform Is Only the First Step | Altoros\" \/>\n<meta property=\"og:description\" content=\"Security threats everywhere Since last year, there have been several discussions surrounding blockchain technology\u2014ranging from adoption predictions to requirements from the financial industry. There was also increased interest and investment in the development of the technology with the inception of the Hyperledger Project in December 2015. With both financial and non-financial institutions [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/\" \/>\n<meta property=\"og:site_name\" content=\"Altoros\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-19T22:17:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-20T08:07:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"Carlo Gutierrez\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carlo Gutierrez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/\"},\"author\":{\"name\":\"Carlo Gutierrez\",\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/#\\\/schema\\\/person\\\/833e109f77de753b2b472dca0236b442\"},\"headline\":\"Blockchain Security: Choosing a Platform Is Only the First Step\",\"datePublished\":\"2017-04-19T22:17:38+00:00\",\"dateModified\":\"2017-04-20T08:07:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/\"},\"wordCount\":1454,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif\",\"keywords\":[\"Blockchain\",\"Hyperledger\",\"IBM InterConnect\"],\"articleSection\":[\"News\\\/Opinion\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/\",\"url\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/\",\"name\":\"Blockchain Security: Choosing a Platform Is Only the First Step | Altoros\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif\",\"datePublished\":\"2017-04-19T22:17:38+00:00\",\"dateModified\":\"2017-04-20T08:07:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/#\\\/schema\\\/person\\\/833e109f77de753b2b472dca0236b442\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif\",\"contentUrl\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif\",\"width\":640,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/blockchain-security-choosing-a-platform-is-only-the-first-step\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockchain Security: Choosing a Platform Is Only the First Step\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/\",\"name\":\"Altoros\",\"description\":\"Insight\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/#\\\/schema\\\/person\\\/833e109f77de753b2b472dca0236b442\",\"name\":\"Carlo Gutierrez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/CG_portrait-2-96x96.jpg\",\"url\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/CG_portrait-2-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/CG_portrait-2-96x96.jpg\",\"caption\":\"Carlo Gutierrez\"},\"description\":\"Carlo Gutierrez is a Technical Writer at Altoros. As part of the editorial team, his focus has been on emerging technologies such as Cloud Foundry, Kubernetes, blockchain, and the Internet of Things. Prior to Altoros, he primarily wrote about enterprise and consumer technology. Carlo has over 12 years of experience in the publishing industry. Previously, he served as an Editor for PC World Philippines and Questex Asia, as well as a Designer for Tropa Entertainment.\",\"url\":\"https:\\\/\\\/www.altoros.com\\\/blog\\\/author\\\/carlo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blockchain Security: Choosing a Platform Is Only the First Step | Altoros","description":"Multiple speakers from IBM InterConnect 2017 focused on the need to achieve blockchain security from hardware to the application level. Here are the highlights.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/","og_locale":"en_US","og_type":"article","og_title":"Blockchain Security: Choosing a Platform Is Only the First Step | Altoros","og_description":"Security threats everywhere Since last year, there have been several discussions surrounding blockchain technology\u2014ranging from adoption predictions to requirements from the financial industry. There was also increased interest and investment in the development of the technology with the inception of the Hyperledger Project in December 2015. With both financial and non-financial institutions [...]","og_url":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/","og_site_name":"Altoros","article_published_time":"2017-04-19T22:17:38+00:00","article_modified_time":"2017-04-20T08:07:42+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif","type":"image\/gif"}],"author":"Carlo Gutierrez","twitter_misc":{"Written by":"Carlo Gutierrez","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#article","isPartOf":{"@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/"},"author":{"name":"Carlo Gutierrez","@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/833e109f77de753b2b472dca0236b442"},"headline":"Blockchain Security: Choosing a Platform Is Only the First Step","datePublished":"2017-04-19T22:17:38+00:00","dateModified":"2017-04-20T08:07:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/"},"wordCount":1454,"commentCount":0,"image":{"@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#primaryimage"},"thumbnailUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif","keywords":["Blockchain","Hyperledger","IBM InterConnect"],"articleSection":["News\/Opinion"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/","url":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/","name":"Blockchain Security: Choosing a Platform Is Only the First Step | Altoros","isPartOf":{"@id":"https:\/\/www.altoros.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#primaryimage"},"image":{"@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#primaryimage"},"thumbnailUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif","datePublished":"2017-04-19T22:17:38+00:00","dateModified":"2017-04-20T08:07:42+00:00","author":{"@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/833e109f77de753b2b472dca0236b442"},"breadcrumb":{"@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#primaryimage","url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif","contentUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/04\/IBM-Blockchain-Hyperledger-Fabric-InterConnect-Security.gif","width":640,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.altoros.com\/blog\/blockchain-security-choosing-a-platform-is-only-the-first-step\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.altoros.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Blockchain Security: Choosing a Platform Is Only the First Step"}]},{"@type":"WebSite","@id":"https:\/\/www.altoros.com\/blog\/#website","url":"https:\/\/www.altoros.com\/blog\/","name":"Altoros","description":"Insight","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.altoros.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/833e109f77de753b2b472dca0236b442","name":"Carlo Gutierrez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2021\/02\/CG_portrait-2-96x96.jpg","url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2021\/02\/CG_portrait-2-96x96.jpg","contentUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2021\/02\/CG_portrait-2-96x96.jpg","caption":"Carlo Gutierrez"},"description":"Carlo Gutierrez is a Technical Writer at Altoros. As part of the editorial team, his focus has been on emerging technologies such as Cloud Foundry, Kubernetes, blockchain, and the Internet of Things. Prior to Altoros, he primarily wrote about enterprise and consumer technology. Carlo has over 12 years of experience in the publishing industry. Previously, he served as an Editor for PC World Philippines and Questex Asia, as well as a Designer for Tropa Entertainment.","url":"https:\/\/www.altoros.com\/blog\/author\/carlo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/23057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/comments?post=23057"}],"version-history":[{"count":68,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/23057\/revisions"}],"predecessor-version":[{"id":23218,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/23057\/revisions\/23218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media\/23175"}],"wp:attachment":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media?parent=23057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/categories?post=23057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tags?post=23057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}