The standard of the modern living: the evolution of smart devices and their use in home with blockchain technology

August 21,

The standard of the modern living: the evolution of smart devices and their use in home with blockchain technology

Not even a decade ago, just like smart devices, smart homes seemed a distant future; today, however, they are actually becoming the technological standard. As customers are becoming increasingly demanding and technologically educated, they are also expecting the adjective “smart” in the technical description of their new devices. Therefore in the battle for competitiveness, manufactures of various household appliances, control systems and robots must increasingly provide this feature. This makes the smart house, and above all the comfort that it provides to the user, an example of modern living. Even more, it is becoming a status symbol. But, what role does blockchain technology play in this?

Smart devices are all those devices that communicate through the Internet. They are connected to each other and also to the Internet of Things (IoT). Today, there are a multitude of smart devices on the market: from various household robots to household machines and control systems. For home use, users connect them to shared networks using tools provided by the biggest online giants such as Google and Amazon that use smart assistants such as Alexa, Siri and Google Assistant to communicate with smart devices.

Even though it may seem that the user is communicating directly with the smart device, this is not (yet) the case. Namely, this communication is carried out in such a way that the user first communicates with the computer server or the cloud server through the application, to which he/she re-enters their username and password each time. This server then communicates on its behalf with the devices in the smart home or apartment.

Likewise, whether or not the user agrees, the server records the relevant information about its use of smart devices. How this kind of data is then stored and processed mainly depends on the ethics of the smart device company. To protect the users from the inappropriate use of their data in the European area introduced GDPR Directive. But this is precisely why server solutions for managing smart devices are also an interesting target for attackers, who can disable thousands of devices around the world in a single attack, thereby gaining terabytes of interesting data to abuse.

Most security and communication issues related to smart devices and systems can be solved by blockchain technology, which is therefore becoming a key competitive advantage for smart device providers. Namely, blockchain technology has some unique features, such as transparency, immutability, increased security, and the ability to isolate intermediaries in processes that can help solve the challenges of the information and communication industry. One of its key benefits is the decentralization of the smart devices network, which in other words means that the devices are not communicating via a server or cloud service, but directly with each other, which reduces the chances of intrusion and thus increases confidence and user satisfaction.

If we introduce blockchain technology to the smart device system and its use in smart homes, the communication between the user and the devices changes significantly in comparison with what we were used to before. Namely, the user and all his devices included in the network are given a unique identity by which they identify themselves. The blockchain network, however, has the role of verifying the identities of users and devices with each other, ensuring that information and instructions are only transmitted to those users and devices authorized to do so.

Similar to our digital identities that we use when we are interacting with different services online, identity on the blockchain network can carry various data and information, and their content is always encrypted. Identities on the network are verified by a system of public and private keys, where the private key represents the digital signature of the individual or an individual device. The essential difference is that the individual no longer accesses the server that communicates with the devices, as the communication between the devices and the individual is done directly through smart contracts; and servers get the role of nodes.

Smart contracts are automated commands written in the programming language on the blockchain network. When the conditions stipulated in the smart contract are fulfilled, the command that the smart contract carries is executed. In our case, this means that the individual and the device identify with each other with their private key, and the smart contract allows them to communicate with each other. When used in a smart home, this comes with a number of benefits: a single application allows the user to control multiple smart devices, and thus remotely control the heating, lighting, opening or closing of shutters, or locking the front door. Such use will only increase further in line with the development of the devices and their integration into the planning processes of the construction of future homes.

What are the benefits of blockchain technology?

From what has been written so far, we can summarize the following:

Safety: Imagine suddenly being unable to turn off the lights in the middle of the night; or that you can’t start the air conditioner on the heat nor turn on the cooler in the summer heat? Smart devices communicating with the user using blockchain technology are far more secure than if they do so via single-server solutions. When we eliminate central point of communication, it (ie. the central server) is no longer the single vulnerability that hackers often attack to disrupt entire systems which can put the end user in an unenviable and even dangerous position when they can no longer operate the devices in their own home due to an external attack.

Cost-effectiveness: Smart devices that communicate with each other on the blockchain network save on the cost of setting up and using server services, because we simply don’t need them in this case.

Privacy and protection of personal information: If communication between devices and individuals takes place on a blockchain, the device provider also cannot arbitrarily dispose of information about how and when the user uses his device, since the data is encrypted and can only be accessed by those who own a private key. This gives the user more privacy; on the other hand, it also offers the ability to make the data available to the provider in return for certain discounts, benefits or improvements.

Automation of device performance and upgrades: One of the key benefits of blockchain is that it is not necessary to upgrade applications with new generations of devices, as the identified devices find their new features on the network. Device manufacturers also have the ability to monitor the condition of devices remotely, identify errors more quickly and provide repair. Also, communication between the devices and the user takes place smoothly and continuously 24 hours a day, 7 days a week.

Device management through the blockchain network is thus becoming a reality in our country and in Europe as well. In Slovenia, we offer blockchain technology for business purposes at Netis, where we are developing AceBlock – an infrastructure that enables companies to subsequently develop various blockchain-based services. In addition to establishing a blockchain network, AceBlock also enables them to quickly establish identities on the blockchain and connect them to AceSpace’s distributed data storage service through the AceID solution.

This option is primarily for those companies that still want to securely store data on users and smart devices and develop additional services based on this. Namely, storing data in a distributed repository enables them to set up various innovative business systems or platforms with the potential to reward users in exchange for using their data. In this way, smart device providers can increase user satisfaction and restore their confidence by collecting personal information in a transparent, encrypted and also anonymous manner.

In the future, we can certainly expect smart devices and smart device networks to work with blockchain technology in our homes. Today, however, we are still in the phase of implementing pilot projects with providers of such devices who have decided to gain primacy in this field. Their courage and daring vision of the future will definitely pay off as successfully carried out pilot projects will become the basis for commercially accepted solutions that will undoubtedly be our new standard of living.


The article was first published in a professional magazine for architecture, construction, interior and design PRO Bauhaus.

Learn more about us

AceBlock is a blockchain technology framework which enables companies to develop innovative solutions on top of our modular infrastructure. One of its critical ready-made building blocks is AceID, with which any holder can present verifiable credentials everywhere online.

AceID is based on a concept of an SSI (Self-Sovereign-Identity) which promotes that digital identity becomes a right for every individual. Because it is portable, it allows online privacy and free movement between different web providers or services from one point, which is possible only when the individual becomes the owner of the data.

Give it a try and contact us at [email protected] for more.

Twitter got hacked. Could SSI prevent it?

July 25,

Twitter got hacked. Could SSI prevent it?

Cybercrime is on the rise. This time, the hackers got access to internal tools of Twitter and compromised high-profile and corporate Twitter accounts. Twitter reported that the attackers targeted 130 accounts, including those of Joe Biden, Elon Musk, Bill Gates, Barack Obama and accounts of Uber and Apple (see Financial Times, BBC and CNBC).


Twitter has shed some light on the attack by tweeting that hackers compromised their internal systems. The hack has revealed that one can tweet on behalf of another individual without even knowing their password. Why is this so alarming? The ability to control accounts and publish content on behalf of another individual can have severe consequences, and a similar attack could happen to any social media or online blog/news service.

In the diagram below, we demonstrate how Mallory (hacker) tweeted from Alice’s account and thus tricked Bob into sending him a Bitcoin: 

Could we prevent this?

Yes, if Alice had the possibility to digitally sign her tweets, and thus protect the integrity of her content. This way, even if Bob would receive a malicious tweet, he could quickly verify that the tweet is not signed by Alice and would have never sent that 1 BTC to Mallory.

Self-sovereign identity (SSI) is a perfect fit for solving this issue, as the solution enables users to fully control their electronic identity, request/exchange verifiable credentials, sign electronic documents, authenticate, etc.

Let us show you how SSI could help out Twitter:

A Twitter Mobile App featuring SSI would require all users of this social network (Alice, Bob and even Mallory) to create self-sovereign identities, register them in one of the publicly-available SSI registries (DID registry) and then link their SSIs with Twitter accounts.

In this case, Alice would have her private key stored securely on her device, so she could use it every time she wanted to sign her Tweets before publishing them on Twitter. Bob’s Twitter App with built-in SSI support would then verify the signature and confirm that the Tweet really comes from Alice. If the hacker Mallory wanted to scam Bob by sending a Tweet from Alice’s account using Tweeter’s internal tool, she wouldn’t be successful! She could still send him the Tweet, but Bob’s SSI App would spot right-away that the Tweet is either unsigned or worse, not signed by Alice. Thus Bob would have never given away that 1 BTC to Mallory.

We believe that the implementation of emerging technologies and concepts like SSI can help build and use better and safer digital ecosystems, offering us higher levels of trust, transparency, security and interoperability.

Let’s see if we will build the Twitter of tomorrow together, to make sure this never happens again:

Learn more about us

AceBlock is a blockchain technology framework which enables companies to develop innovative solutions on top of our modular infrastructure. One of its critical ready-made building blocks is AceID, with which any holder can present verifiable credentials everywhere online.

AceID is based on a concept of an SSI (Self-Sovereign-Identity) which promotes that digital identity becomes a right for every individual. Because it is portable, it allows online privacy and free movement between different web providers or services from one point, which is possible only when the individual becomes the owner of the data.

Give it a try and contact us at [email protected] for more.

Deloitte’s 2020 Global Blockchain Survey: From an experimental technology to a real strategic priority

July 2,

Deloitte's 2020 Global Blockchain Survey: From an experimental technology to a real strategic priority

In its third year, Deloitte’s Global Blockchain Survey reveals a compelling evolution of blockchain from an experimental, disruptive technology to a real strategic priority for organizations, meaning that blockchain is solidly entrenched in the strategic thinking of organizations across industries, sectors and applications.

Survey finds that leaders no longer consider the technology ground-breaking and merely promising – they now see it as integral to organizational innovation. Consequently, this indicated increased sentiment, investments, and more strategic talent sourcing and requirements for blockchain initiatives. For the first time, the survey digs into the role and evolution of digital assets. As with any business solution, there are still real-world challenges to overcome. Still in 2020, both bold and modest in-production proof points across a wide variety of implementation scenarios demonstrate that blockchain technology works – and can work – for many different organizations, businesses and industries.

Methodology: The survey polled a sample of nearly 1,500 senior executives and practitioners in 14 countries (Brazil, Canada, Germany, Hong Kong, Ireland, Israel, Mexico, Singapore, South Africa, Switzerland, the United Arab Emirates, the United Kingdom, and the United States) between February 6 and March 3, 2020.

The full report is available here.

Among the key survey findings:

• 39% of global respondents have already incorporated blockchain into production. This is a significant increase from 23% of respondents signalling production last year.
• 55% of responding organizations view blockchain as a top strategic priority, an increase from 53% in 2019 and 43% in 2018.
• Nearly 89% of those surveyed believe that digital assets will be “very” or “somewhat” important to their industries in the next three years.
• 82% percent of respondents said that they are hiring staff with blockchain expertise or plan to do so within the next 12 months, compared to 73% last year.
• 83% of respondents indicated their companies will lose competitive advantage if they don’t adopt blockchain (versus 77% in 2019).
• 70% call the pace of regulatory change for blockchain and digital asset solutions as “very” or “somewhat” fast.

 Increased advances of large-scale blockchain initiatives are occurring including blockchain-based financial infrastructure to simplify global money movement and commerce, as well as distributed ledger technology for trade finance and blockchain-enabled track-and-trace platforms, among others.

The survey report also revealed increased blockchain initiatives in daily processes including title transfer and protection, patient data storage and retrieval, and more efficient voting or food sourcing tracking.

Digital Assets Today & Tomorrow

A “digital asset” is defined as something represented in a digital form that has an intrinsic or acquired value. Aside from cryptocurrencies, examples may include everything from digital representations of land, commodities or fiat currency to tokenized debt or equity to a financial instrument, and beyond.

Digital assets therefore offer their users many benefits, which is why its no surprise that the survey respondents view them favorably with 89% saying they believe digital assets will be very or somewhat important to their industries in the next three years and will serve as an alternative to, or outright replacement for, fiat currency in the next five to 10 years. However, the survey shows no clear or specific consensus about exactly how those assets will be used or the specific role they will play.

What is more, we are witnessing new and significant changes across all facets of society with AI now being a leading contributor to that change. Businesses, and eventually customers and end-users need to learn to adapt to the latest technologies and solve the other issues that accompany assimilation of change. In other words: digital assets may be the future, however there remains an important, immediate need for organizations to become more comfortable with them, especially in terms of barriers to adoption and regulatory hurdles.


Judging by the answers about cybersecurity and overall blockchain or digital assets-related strategy, organizations might be concerned about the cybersecurity but may not fully recognize the importance of preparedness measures they should take to alleviate cyber threats. There is growing concern – not only about how to best protect valuable financial, health and other systems from being attack but also who owns and is, ultimately responsible for the information being sought. Despite blockchains inherently cryptographic character that offers high level of assurance that the foundational platform is safe from the attack and its distributed nature which suggests the expected degree of transparency, doubts still exits and organizations efforts to solve these issues remains a work in progress, meaning cybersecurity remains a problem in search of a viable solution at the moment.

Global digital identity

In many ways, global digital identity is still based on theory and likely not ready for full-scale implementation. Still, new insights into how it might potentially affect different market offerings and blockchain protocols are emerging and progress continues, as does the belief that it will be instrumental in fostering global transactions, delineating personal data ownership, streamlining regulatory requirements across jurisdictions (KYC/AML, anti-terrorist, illegal acts, related parties, etc.) and one worth pursuing. Nearly two-thirds of respondents said that a global digital identity will be very important, and having its greatest impact in global financial transactions (29%) and data privacy/ownership (27%). Eventually, this would also lead to other areas, however until the general population develops a greater understanding and acceptance of digital identity, the full benefits will likely remain untapped.

Regulatory considerations

Survey data suggests that respondents are generally confident in their ability to meet blockchain-related regulatory requirements in areas that include tax, financial reporting, industry-specific regulations, and securities laws. Even so, different governments adopt distinctly different positions on blockchain and digital assets, creating further complexity within a blockchain architecture. An absence of regulatory harmony in a blockchain and digital assets construct offers management, regulators, standard-setters, and professional service providers the chance to work together in forging common guidance and establishment of best practices. The survey therefore indicates that organizations will need to keep up and shows that 70% of survey respondents calling the pace of regulatory change very or somewhat fast.

Governance in blockchain consortia

In 2019, the Deloitte survey showed that business leaders fundamentally understand that joining a consortium could help them succeed, however they were concerned with issues related to the concept of coopetition and working toward a common goal with other organizations with which they traditionally compete. This year, this is becoming less of a roadblock with conversations evolving around how consortia are run, how decisions are made and how profits are shared across the members. This is why organizations are placing an increasing emphasis on performing due diligence and addressing key governance-related concerns before agreeing to participate in a consortium.

The Rise of Online Shopping: What About the Rise of Privacy Issues?

May 27,

The Rise of Online Shopping: What About the Rise of Privacy Issues?

When cities, municipalities and states declared quarantine, only the grocery shops were left open. Luckily today, we can find almost everything online! As a consequence, lockdown pushed much more people towards online shopping, resulting in e-commerce in full swing all around the globe. However, the rapid digitalisation of services is raising many questions connected with internet privacy and security of customers who leave more information about themselves online day after day.

Online shopping records unprecedented growth. What will become the “new ordinary”?

According to CCinsight March and April of 2020 have been one the most impressive months for e-commerce so far, with the growth of year-over-year e-commerce hitting at the 70-100% rate. Previously, this kind of increase occurred only during the holiday season.

Stay-at-home orders caused a massive increase in online shopping activities, but now we are slowly returning back to normal. What will that mean for our shopping habits? According to Forbes, it is very likely that online grocery, apparel, and entertainment shopping will replace store and mall visits permanently, or at least until a vaccine is available. The curve of e-commerce activities will probably flatten during the time when the pandemic will be revoked and certain measures won’t be in place anymore, but the new habits are probably here to stay, especially because more and more brands now heavily prioritize e-commerce.

Do consumers care about their data online?

In general, consumers care about their privacy online, however only seldom are informed about data management, and there are even fewer who take actions to protect their data. For example, 2019 Tealium Consumer Data Privacy Report surveyed 1,000 consumers in the USA about their relationships with brands and personal data privacy. They discovered that almost all (97%) consumers are somewhat or very concerned about protecting their data. Still, most consumers (62%) generally don’t read online terms or privacy policies, and nearly 70% of respondents had not heard of GDPR (General Data Protection Regulation) or CCPA (California Consumer Privacy Act). 

Similar data also apply to the European Union, where GDPR was enacted on the 25th of May 2018. Various surveys conducted in 2019 show that 67% of Europeans have heard of the GDPR, and 57% of Europeans know that there is a public authority in their country responsible for protecting their rights about personal data. Good news is that individuals are lately increasingly contacting data protection authorities about GDPR and lodge complaints about the respect of their rights. Despite the better awareness, the total number of queries and complaints from all data protection authorities remains rather small, comprising 144,376 cases from May 2018 through 2019 altogether.

All in all, the situation in the USA and the European Union is not that different as even though people are aware that their data privacy is essential, they don’t do much to preserve it in practice. This fact has probably not changed during the occurrence of covid19, however, it will be interesting to monitor the newest data for 2020.

Is e-commerce secure and what can be done to improve it?

If we take into the consideration that databases are vulnerable and often attacked by hackers,  the consumers should be proactive in demanding the protection of their data and privacy. One of the possible solutions to achieve that is certainly through a secure digital identity. 

For that, we at Netis, have developed Self-Sovereign Identity backed with blockchain technology, that ensures the following:

AceId is a secure authentication protocol that combines the following concepts: self-sovereign identity (SSI), data access management controlled and recorded via blockchain, end-to-end encryption and verification. These elements guarantee each user has complete control over who they share their data with, and for how long.

Since the blockchain is generally public, anyone can get information about the existence of the link. However, it is impossible to see what kind of data is stored on a given address. The data can be seen and read-only with a user’s private key used for their decryption.

Users’ data is stored locally on one’s device, and remotely on the AceSpace storage, where all the content is encrypted, making sure no one can read or change them.

How can e-commerce handle customers’ data in a secure, private and user-friendly manner?

As many businesses, online stores are also aware of the importance of the data they receive from customers, so the idea of allowing users to own and share personal data themselves is rather new to them. But, as we have written and pointed out many times before, it is precisely putting customers first that will play a key role in the near future. It is true that with secure digital identity the process of retrieving user data changes, but at the same time it enables businesses to build credibility and trust by promoting secure online practices. That way, you will also easily get additional data that can help you with segmentation, as customers will trust you more and will know for sure that their data is secure, anonymized and encrypted. What is more, you will be able to easily reward their loyalty with discounts, prizes or other benefits, without invading privacy. This is one excellent example of how the use of blockchain SSI initiates the development of different business models that will upgrade your service and attract more potential customers.

How does it work?

User onboarding is simple; first-time users need only to input their information into the application. After that, the process of filling the form is no longer required and that saves time and effort. When the user wants to log in to an online store, he or she simply scans a QR code which displays on the website. After the scanning, the user decides which piece of information one wants to share with a particular service.  After that, the user confirms the choice by pressing “Authorise” and with that action logs to a specific online shop or any other service. Using AceID certainly gives your business numerous benefits and can make users’ online shopping experience safer, fairer and simpler. Give it a try and contact us at [email protected] for more.

Blockchain technology solutions as a righteous shield against privacy attacks

April 28,

Blockchain technology solutions as a righteous shield against privacy attacks

Does the goal always justify the means? When freedom and democratic values are endangered, this should definitely not be the case. But, due to covid-19 crisis, we are witnessing questionable practices that are interfering with civil rights in several countries. However, if the governments would apply advanced technology solutions such as Self Sovereign Identity (SSI) on the blockchain, the invasion of the privacy could be prevented and the exchange of information done in a fairer and secure manner.

Since the COVID-19 outbreak, 10 European countries have introduced digital tracking measures. Among them are Italy, which was affected the most,  Iceland, Switzerland, Belgium, Germany, Poland, United Kingdom and Spain which is, according to covid-19 digital rights tracker, using this type of surveillance in Madrid and Catalonia.

The digital tracking measures were implemented with the intent to monitor the citizens who might have been affected by the virus and therefore need to abide to the decrees for isolation and social distancing as instructed by the authorities.

Even more, there are many other European countries that are also considering the possibility of digital tracking, whether by developing their own version of a dedicated digital-tracking app or by using one of those that are already available. And there are many out there: according to covid-19 digital rights tracker mentioned before, 43 contact tracing apps are available globally, whilst 28% among them have no privacy policy stated at all.

Given the persistence of the virus, the intention of governments to keep track of those who need to be quarantined and thereby prevent the possibility of further infections is somehow understandable. But what happens after the threat of virus spread is curbed? Can we really blindly believe that this kind of targeted and purposeful tracking will stop?

There is no such guarantee. The citizens will have no physical proof about it; as there will be no possibility to check that their government has really stopped the tracking.

And yet, we could change that! With the use of Self-Sovereign Identity, powered by blockchain technology, the citizens could receive the power to own, control and manage their personal data!

Self-Sovereign Identity (SSI) is a term that describes a form of identity that can be applied and used in a digital realm. It is about each user owning their data and arbitrarily sharing it with other people or services online. Appropriate technology, however, is one that ensures that the data is credible and trustworthy, and above all that it is visible to the person or company organization only for as long as we allow it. The ultimate result of the SSI used in the digital space would bring upon the equalisation of our digital and physical identity.

For this purpose, our company Netis has developed AceID, a simple, secure and widely-applicable authentication protocol that gives the users the ability to decide who, why and for how long they share their data with when interacting online. This is made possible by combining the following concepts: Self-Sovereign Identity (SSI), data access management controlled and recorded via blockchain, end-to-end encryption and verification. 

How does it work? In the case of AceID, the user’s data is stored locally on their mobile device, and remotely on the AceSpace storage, where all the content is encrypted. What AceID saves on the blockchain is only the reference to the data, and all of the permission actions related to them.

Onboarding is straightforward; a person simply has to fill the required data fields in the mobile app (serving as their own mobile digital wallet). Once this process has been completed, entering data is no longer required, and only a QR code authentication will suffice to interact with a service.

How would the app work in the case of digital tracking during the covid-19? Using it, a citizen would simply allow the authorities to access the GPS signal and revoke the access when monitoring is no longer necessary. Furthermore, the AceID can also be connected with smart devices, such as thermometer which can monitor the individual’s temperature.

Covid-19 pandemics and governments’ interference in citizens privacy also resulted in the formation of various privacy protection initiatives. For example, COVID Credentials Initiative, which  is a collaboration of several dozens of organisations, including ours, that are working to deploy verifiable credential solutions to help stop the spread of covid-19. Their goal is to enable society to return to previous (before the covid-19 state) in a controlled, measurable, and privacy-preserving way.

With AceBlock blockchain framework we at Netis strongly welcome and support such initiatives, as we believe privacy is one of the most critical issues that must be addressed. Otherwise, our society might suffer a severe attack on democracy and freedom of speech, especially in those countries where the level of democracy is already questionable.

The issues of privacy-breaching therefore need to be discussed and questioned, and especially in the times of distress, meaning the pandemics must in no way serve as an excuse for citizens to lose their rights.

How the Coronavirus Became a Catalyst for Impersonal and Automated Services

April 9,

How the Coronavirus Became a Catalyst for Impersonal and Automated Services

At this moment, the whole world is facing a common enemy: the fight to stem the covid-19 virus real. This battle translates through all layers in our society and it is only right that each business and individual strive to contain it as much as possible. On the other hand, we are witnessing a strange phenomenon as the pandemic has become a catalyst for quick and significant change in the way we are getting our affairs in order. In a matter of days, the strange disease has therefore shown us where we are lacking in structural digitized services, and forced us to start searching for answers.

When the World as we Know it Ceases to Exist

Because of the coronavirus epidemics, many stores have closed overnight. Even those that remain open are now subject to rigorous measures, which means that we have to respect the hours we can shop there and the distance between others, which all takes time and effort. Also, any gathering in a larger group, including doing grocery, presents an opportunity for infection. Both of these two important facts quickly tempted customers to shop, bank and “do” everything online: stores today can hardly keep up with the orders, banks and other public services are urging us not to go to physical locations, even schools are using online tools so the students are able to continue with their studies.

Digital Life Demands Digital Services: Are They Effective?

It seems that all of our affairs have in one way or another now become digitized. A term that only a month ago stood more for an “added value” has now become a new standard. However, using digital services is still not as easy as it should be.

For every new digital service they want to use, users still first need to sign up. And even though online application forms are becoming more user-friendly in this aspect, this does not change the fact that entering the same information over and over again, validating emails and memorizing new passwords can soon become tiresome and time-consuming. Autofill function can help in some cases, but it is seldomly compatible with all the data we give, which means users still have to double-check and replenish the forms.

Another problem that comes up with every new login and password we receive is that keeping them safe and in order can become messy. Users are encouraged to choose their passwords and usernames carefully, however by doing so, they also tend to forget them. It is even more dangerous, but also common, that we use the same password-username combination for different services or store the combinations on the computer. This can almost read as an open invitation for hackers to misuse our data.

Some digital services however, offer users the possibility that they login with the identity they use to access some of the most popular platforms such as Facebook, Twitter or Google. This seems like an ideal solution, but keep in mind that doing so users also give these services an access to the personal data Facebook, Twitter or Google have on them. This is why you first need to ask yourself what are you prepared to share and is this kind of exchange really secure?

In many countries, including ours, there is also a possibility for users to access public digital services with some kind of version of a personal digital certificate. However, user first needs to install the certificate to each device he/she is using, meaning that one cannot usually not use it on a mobile device nor a public or work computer without first facing many complications.

The common denominator to all of the above is that users give away sets of their personal information each time they interact with different providers. Even more: their digital identity doesn’t even exist independently from these systems, and represents a compilation of various information that different organizations store on them.

Self-Sovereign Identity on Blockchain: A Gateway to Safe and Secure Digital Services

The solution to the challenges addressed above exists within a concept known as a self-sovereign identity, or in short SSI. From a technical perspective, SSI represents a new paradigm of online identity management, allowing users and also (business) entities to manage their personal information by storing them locally on their own devices, and then selectively granting access to others.

Rather than allowing control over personal data to each service provider, SSI solutions are designed to give freedom and control of their privacy back in the hands of individuals. This is the reason such digital identities also aren’t locked into any given platform not controlled by any operator. They remain portable and interoperable across platforms so that they can allow each user to move from a service to service, and from one operator to another, freely and whenever they choose to. Compared to identity management in use today, SSI solutions also no longer need to refer to other trusted authority or third-party intermediary operators to validate these claims.

Let’s Create SSI for Your Business, Shall we? Meet AceID

In short, SSI eliminates the effort of collecting personal information that has already been gathered elsewhere. A blockchain based ID system adopts a user-centric approach, meaning it gives users far more freedom and privacy when interacting with online services. This is why you just may be wondering why companies need SSI as much as people? Here is the answer!

But first, look at an example: If a user wants to sign up for a new bank account online today, he will first be asked to provide a series of information such as a picture, valid ID, social security number, date and place of birth and other, similarly sensitive information. Only after a KYC provider, acting as a third-party intermediary, confirm and therefore verifies that the person is indeed the one they claim to be and that the information they have provided is true, one will be able to use the service. What is more, by becoming their new client, the bank will also be given a responsibility to digitally protect the user’s data. This is not a case with SSI.

As are you, the majority of businesses is also increasingly depending on electronic data to manage their daily operations, which leads them to store and transfer a growing number of sensitive information online. This is becoming a huge liability!

However, an identity system your business and others, including governments and institutions can trust, can actually enhance your operational capabilities without making you responsible to administer it. In other words, you can still access the data you need to complete transactions with the users without having to keep it in large collections. What is more, once a claim has been verified for one purpose, it can be reused several other times.

This is why SSI is a perfect fit for any digitally-aware business that wants to succeed in this precise moment in time, when digitalization is becoming increasingly necessary, and yet the processes connected with it still far too lengthy and complex, as the covid-19 crisis has confirmed.
But, to truly get there, businesses first need to adopt a different mindset by understanding that giving up user data in the end actually pays off! We are here to help you with that, whereas our solutions which we are building on top of the Aceblock blockchain framework are here to help you easily implement blockchain technology into your business.

As mentioned before, SSI is a concept and the road toward true SSI (which requires global standards and cross-border governance) is still long. However, a functional digital identity system is becoming a new prerequisite for a digitally connected world.

For all entrepreneurs who want to be the first ones in their industry by best meeting the demands and expectations of their customers, we have developed the ultimate and a fully-working SSI solution. Meet AceID, a portable identity on blockchain technology with which any holder can present verifiable credentials everywhere online. It gives users the ability to decide who, why and for how long they share their personal data with, and gives you a room to create a trustworthy, fast and effective business platform that strengthens the confidence in services you provide.

 Choose AceID to improve on:


AceId is a secure authentication protocol that combines the following concepts: self-sovereign identity (SSI), data access management controlled and recorded via blockchain, end-to-end encryption and verification. These elements guarantee each user has a complete control over who they share their data with, and for how long.

Simple user

A first-time user needs to input his/her personal information (name, date of birth, ID number etc.) into their own mobile digital wallet. Afterwards, each time he/she wishes to access a certain web service, this process is no longer necessary, and only a QR code authentication suffices to interact with a service.


The user`s data is stored locally on /her device, and remotely on the AceSpace storage, where all the content is encrypted. What AceID actually stores on a blockchain is just the reference to the data and all of the permission actions related to them,


Since the blockchain is generally public, anyone can get information about the existence of the link. However, it is impossible to see what kind of data are stored on a given address. The data can be seen and read only with a user`s private key used for their decryption.


To access an online service, a website displays a QR code. Each time the registered user scans the QR code, he/she can choose which pieces of information they allow to be shared, and confirm their choice by pressing “Authorize”. The result of this last action logs them into a website.

Data management &

Due the fact the personal data is not stored directly on a blockchain, the user can easily make changes, such as deleting or adding the data. Each time the user interacts with a business or changes the permissions, the mobile application reacts in real-time.


The user keeps his/her personal information locally. Prior to sending the data to the AceSpace storage, they are encrypted with the user`s private key, making sure no one can read or change them.

Perhaps quarantine time has offered you the best time to start thinking about new ways to reach out and offer more benefits to your customers?

Book a meeting and let’s get started:

How to Develop Your Tailored Blockchain Strategy?

March 24,

How to Develop Your Tailored Blockchain Strategy?

As the blockchain technology matures, it is also getting more and more attention across industries. An increasing number of business leaders is therefore now challenged to envision the blockchain strategy to improve their consumers’ lives and business operations within their organization.

If you too wish to start with blockchain within your organization, your leadership, management and employees first need to share the understanding of the technology, as this will help you get a better picture to what the blockchain can do for your particular business.

Follow these steps to implement a blockchain into your business:

Understand the Technology

Before you start thinking in your own cases of use for blockchain, you first need to come to the agreement what blockchain is, and even more importantly, what it isn’t. Namely, blockchain is not a cryptocurrency, it is not a programming language, nor even something as a cryptographic codification. On the contrary, blockchain is a whole new technology that enables you to store any kind of information in a sequence of blocks (or a group of transactions) which are then chained together and distributed among the users. As such, blockchain basically forms an immutable record of transactions that don’t depend on an internal or external authority, making the implications of the technology so far-reaching. In other words, blockchain allows you to create an immutable system for recording in which users rely on the technology itself to ensure the integrity and authenticity of data.

Explore the Business Potential

The blockchain technology is constantly evolving; nevertheless, its basic use remains the same, and that is to support global businesses to be more efficient and effective. Therefore, the blockchain is best used in scenarios in which diverse stakeholders form a collaborative, simpler and transparent network to share data and transactions, which represents a key shift from the majority of systems in use today. Besides increased transparency among business partners, such systems are also beneficiary for their customers who, in addition to gaining faster, safer and more reliable digital services, also greatly benefit from newer, more affordable and flexible offerings.

In short, blockchains for business are mainly used to:

• reduce costs of trust and coordination with external parties
• unlock new business models through multi sided-markets and digital assets
• improve business network accountability and operational efficiency
• future-proof businesses against older process models

Important! : Digital identity wallet

The idea of a digital identity that would allow the end user to sign up for multiple services from one point is not new, however, up to this point, security has been its biggest challenge. As a bullet-proof security system that allows us to store and manage sensitive (personal) data and as such, blockchain represents a technological backbone to develop and lunch a number of secure digital services, which are in an increasingly high demand. To help your business improve the process of identity verification, we have developed a portable identity on blockchain AceID, check it out.

Define Your Individual Blockchain Strategy

Blockchain is more a strategy matter than it is an IT matter. The technology can fit to any business, and offer answers to different business objectives. The key task here is in figuring out how you can leverage the technology in your own, unique way. Rather than artificially creating the problem for the sake of using the blockchain and being “in trend”, focus on real problems that need to be solved by asking yourself the following:
– Where is your organization using intermediaries that could be replaced with blockchain technology in favor of reduced costs and a more direct customer relationship?
– Where within your value chain is trust and transparency particularly relevant?
– In comparison to traditional monetization models, where do micro-payments and cryptocurrencies fit into your vision?
– Where and how would ID wallets fit into your authentication processes?
– Who among your business partners could offer a complementary set of solutions and be interested in creating a trust network to benefit both?

Start small by Identifying a low-risk pilot project

There are companies that clearly know how they want to use the technology. For others, it is advisable to conduct in-house workshops, either alone or with the help of experienced blockchain consultants, to identify those areas hat could be promoted and improve with blockchain. After you define and narrow down the search, carry out a smaller, low-scale prototype to evaluate in practice how the case works, how big an intervention this is for your business, how much expertise and resources you already have or need to continue and what steps are needed to develop a fully-working solution in the scope you are aiming for. We highly recommend you to take an iterative approach as this will help you validate your vision, pivot in time and test your solution to make sure it is ready for launch.

What can AceBlock help you with?

We specialize in blockchain consulting and development, and combine our extensive business experience with top-notch expertise in applying blockchain solutions. We offer private and public blockchain development, audit and contract developments with a focus on private networks, SSI and consensus design with blockchain solutions in fintech, energy, healthcare, tourism and other industries.

[EVENTS] AceBlock on the Slovenian Blockchain Partnership Meet-Up

December 18,

[EVENTS] AceBlock on the Slovenian Blockchain Partnership Meet-Up

As active members of the Slovene blockchain community, our representatives have participated on the Slovenian Blockchain Partnership Meet-Up to discuss AceBlock’s blockchain-based solution for digital identity and our involvement into building the European Blockchain Services Infrastructure.


On Wednesday, 11th of December 2019, a Slovene Blockchain Partnership Meeting took place, bringing together various stakeholders of Slovenian blockchain ecosystem, including ministries, conventional and blockchain companies, local communities, educational institutions, representatives of civil society organizations and individuals, and others stakeholders of the ecosystem of convergence technologies.

The event titled “With the convergence of technologies to the digital transformation of society” aimed to reference examples of good practice in the field of blockchain and present all the activities the public sector and private companies have been involved in to lead blockchain technology to a wider adoption.

After introductory speeches made by the state representatives, Nena Dukuzov (Head of Project Group for New Economy and Blockchain Technologies at Ministry of Economic Development and Technology) summarized the department’s achievements that have made Slovenia widely recognized as a blockchain-friendly country. She also presented the European project EBSI (EU Blockchain Services Infrastructure), dedicated to bringing Europe a standardized and interoperable blockchain for the benefit of both, the public and the private sector.

Our COO Tomaž Furlan has also been invited to join the stage to explain AceBlock’s involvement in the EBSI in details, as our experts are part of the EBSI technical group, ensuring the scalability, reliability and safety of the emerging system. Besides, Tomaž has also been appointed by Republic of Slovenia to take part in the EBSI workgroup for Self-Sovereign Identity Framework (ESSIF).

To make the entire EBSI infrastructure and especially its usability easier to understand, the leading bodies have also prepared an explanatory video in which you can follow Eva’s User Story. As you can see, the interaction with public services will become much easier, whereas Eva will be able to:

– being in self-control of her Identity Data,
– having one standardized way to interact with the EU and National Administration and
– allowing full traceability of cross-border administrative processes.

What is more, as of January 2020, the members of the partnership will have the possibility to test the infrastructure and try out different functionalities (e.g. to request issuance of Verifiable ID, request Diploma Verifiable Attestation, apply to a Master’s program at a University, receive Master’s diploma VA to their SSI Wallet, notarize documents and apply for EU Funding), all inspired by Eva’ journey.

Even more, already in the first months of 2020, the EBSI will be materialized as a network of distributed nodes across Europe. This is why the member states have already been invited to host a European Blockchain Node, and many have applied to do it.

Certainly, one of the more important moments on the Meet-Up was also the presentation of the selected 7 Demo Pilot projects, representing various consortia of Slovenian companies that have connected with an aim to explore and develop a service or a solution using blockchain technology and gained financial incentives to do so. Amongst all projects presented, we are most proud of Tourism 4_0 in which our business partner Lucis is actively involved. The consortium made of most prominent Slovenian organizations is dedicated to building a comprehensive platform to support the promotion of our country, digitalization of tourist services and sustainable tourism through innovation with a blockchain-based digital identity named DOTI playing a key role.

AceBlock’s Experts Active in Core Services Team for European Blockchain Infrastructure (EBSI)

September 4,

AceBlock's Experts Active in Core Services Team for European Blockchain Infrastructure (EBSI)

Together with representatives of 21 other European states, experts from AceBlock cooperate in a joint project led by European Commission and European Blockchain Partnership (EBP) with an aim to create a first-of-a-kind European Blockchain Service Infrastructure (EBSI).


The European Blockchain Partnership (EBP) is considered to be a vehicle for cooperation amongst Member States to exchange experience and expertise in technical, policy making and regulatory fields and prepare for the launch of EU-wide Blockchain applications across the Digital Single Market for the benefit of the public and private sector. The Partnership was founded in April 2018 with 22 European countries (Austria, Belgium, Bulgaria, Czech Republic, Estonia, Finland, France, Germany, Ireland, Latvia, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Slovakia, Slovenia, Spain, Sweden, UK, Greece, Romania) signing a Declaration on its establishment.

To contribute to the creation of an enabling environment, the European Commission and the European Blockchain Partnership (EBP) have initiated the European Blockchain Services Infrastructure (EBSI), a joint project which will be materialized as a network of distributed nodes across Europe, leveraging a increasing number of applications focused on specific use cases.

For their expertise, AceBlock experts have been invited to participate in EBSI Core Service Team and therefore advise on the use of appropriate blockchain technologies and selection of other crucial technical parameters that will ensure such system is safe, reliable and scalable.

For 2019, four use cases have been selected to be further developed, meaning the delivery of prototype applications on the EBSI blockchain is expected by 2020. These are:

European Self-Sovereign Identity
Trusted Data Sharing

Our experts are also involved in EBSI workgroup for Self-Sovereign Identity Framework (SSIF), a body dedicated to implementing a generic Self-Sovereign Identity capability, allowing users to create and control their own identity across borders without relying on centralized authorities. 

We are very proud and honored to participate in a project of this scale and complexity that will standardize the use of blockchain technology and give European companies the tools and guidance to build better, faster and safer services for our citizens. We will keep you updated.