Summary

In this chapter, we first covered design goals of Hyperledger Fabric that are tied to security. All the sets of points which were described are considered to keep Fabric security in mind. We briefly studied the Hyperledger Fabric Security and understood how strong identities are at the heart of Fabric security. We also took a look at chaincode security. 

Hyperledger, by itself, is adept at handling threats. We dove into the common Hyperledger security threats and how Fabric mitigates them. 

We also briefly looked at the impact of quantum computing on Hyperledger Fabric.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.218.239.182