Published in


Who can protect your data from stealing?

Data growth trend

According to IDC’s 2017 data development trend report called “Data Age 2025”, by 2025, global data will reach 163ZB, which is ten times that of 2016. Since the development of the Internet, data has become a key element of business and social development. However, the explosive growth of data not only promotes society, but also brings many challenges.

Data Security

Since the Internet era comes, many companies around the world have been exposed to data leakages and abuses, and the impact of data leakages by Internet companies is particularly huge. According to the “ Cost of a Data Breach Report 2021 “ released by IBM, the cost of data breach in 2021 rose from 3.86 million dollars to 4.24 million dollars, and the average total cost increased by nearly 10% year-on-year. Remote work has increased the cost of data breaches by $1.07 million: Remote work and digital transformation caused by the COVID-19 outbreak have increased the average total cost of data breaches. The cost of data breaches in the healthcare industry has ranked first for 11 consecutive years.

Data misuse

While big data has made life more and more convenient, it has also brought about problems such as big data-enabled price discrimination against existing customers and excessive request for permissions, which has seriously damaged the legitimate interests of the public and aroused a strong public demand for privacy protection. In May 2018, the EU’s data security management regulation “General Data Protection Regulation” (GDPR) formally came into effect. It requires more detailed privacy protection measures in the company’s system, more detailed data protection agreements, and more user-friendly and detailed disclosures related to company privacy and data protection practices. GDPR made up for the lack of data privacy regulations.

Data sharing

As one of the most important assets in the 21st century, data has not really played its value due to various reasons. Data sharing is the key to maintaining and increasing the value of data. However, the monopoly of data and privacy protection requirements of Internet technology giants are a major obstacle on the road to data sharing. Coordinating the balance between data sharing and data security is the key to realizing the value of data. At present, in order to achieve reasonable protection of data and establish a safe and reliable data sharing environment, blockchain and privacy protection technology are the most effective solutions.

Blockchain provides a safe environment for data sharing

Blockchain is favored by people because of its decentralization, openness and transparency, and anti-tampering characteristics. It solves the trust problem in the use of data between various subjects. Combining blockchain and privacy computation technology can realize the value of sharing data with the condition of privacy protection. We take the GoodData blockchain as an example to specifically introduce how it is implemented.

GoodData blockchain platform

The GoodData blockchain deeply integrates multi-party secure computation, differential privacy, and machine learning into blockchain technology, and establishes a decentralized data sharing and privacy computation basic network, which can realize data availability but invisibility, and solve the problem of data security and privacy protection in the process of data collaborative computation between enterprises. In order to realize compliant data value mining and circulation, GoodData has built a complete incentive mechanism to coordinate economic activities among computing resource providers, data resource owners, and data users to meet the needs of different types of users.

Metaverse-ready digital identity: Cyborg-Goody

Cyborg-Goody is a special NFT on the GoodData blockchain. It exists in the blockchain network as a new generation of digital identity. In the blockchain environment, the backend code connects Cyborg-Goody NFT with personal data. Therefore, in addition to being a digital identity, Cyborg-Goody is also a collection of user capabilities, attributes, and behaviors, which is consistent with our imaginary Internet identity in the metaverse.


GoodData combines blockchain, NFT and privacy computation technology to break the “information isle” and provide a new solution for data value mining. It is an important guarantee for supporting the orderly flow of trusted data, and is important for realizing the security protection and sharing of big data.

Summary of GoodData’s official account


NFT introduction:

WeChat subscription account:Good Data Foundation

White paper:



Telegram :






Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store