Bitcoin Forum
November 15, 2024, 09:01:24 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Understanding blockchain & supply chains w/ luxury goods  (Read 164 times)
crackingcrypto.com (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 6


View Profile
January 09, 2020, 09:00:43 PM
Merited by hugeblack (2), DdmrDdmr (2), squatter (1)
 #1

Couldn't someone just copy any sort of blockchain address on a label or tag of a luxury good and then make a counterfeit product? Then when someone looks up the address of the luxury good, everything looks normal on the blockchain?

Hypothetical situation:

-Louis Vuitton manufactures a bag that comes with an RFID tag or QR code of a code to scan
-After scanning, a block explorer can show you its history and all other necessary information, including its authenticity
-Can't someone copy this tag or code and then reproduce the product with that same code? It would appear genuine when you scanned it

What am I missing? Thank you!
OgNasty
Donator
Legendary
*
Offline Offline

Activity: 4928
Merit: 4867


Leading Crypto Sports Betting & Casino Platform


View Profile WWW
January 09, 2020, 09:28:11 PM
 #2

I would guess the actual item has the private key somewhere.

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
squatter
Legendary
*
Offline Offline

Activity: 1666
Merit: 1196


STOP SNITCHIN'


View Profile
January 09, 2020, 10:54:27 PM
 #3

I would guess the actual item has the private key somewhere.

Does that solve the problem? Couldn't the counterfeiters just obtain one legitimate item, copy the legitimate keypair and tie it to lots of counterfeit goods? The purchasers would look up their tokens on the blockchain and be none the wiser.

I've struggled to understand how Nike's CryptoKicks or the New Balance/Cardano project solve this problem. The model has been described this way:

Quote
Each 3-D printed smart tag has a unique identifying code stamped into it, linking it to a specific pair of shoes, but it’s what is inside this smart tag that really counts: a small encrypted NFC chip like the one found inside a modern passport, which can be tracked just by scanning it with your phone. Because this chip is baked into the smart tag during the 3-D printing process, it’s impossible to break it out of the plastic without destroying it.

This suggests the tracking chips can't be easily reverse-engineered or duplicated. Counterfeiters are quite an ingenious bunch though, so we'll see if the model holds up over time.

mikeywith
Legendary
*
Offline Offline

Activity: 2422
Merit: 6622


be constructive or S.T.F.U


View Profile
January 10, 2020, 12:31:55 AM
Merited by DdmrDdmr (2), crackingcrypto.com (1)
 #4

Couldn't someone just copy any sort of blockchain address on a label or tag of a luxury good and then make a counterfeit product?

Most certainly, but this is not where the challenge is, the challenge lies within the difficulty of actually cloning the tag on those goods.

those tags use what's known as a UI or "unique identifier", the UI is a part of the chip physical existence and not just some sort of binary stored on it,so you can't just clone it, you need to be able to manufacture one that has the same exact private key, so nothing but brute-force will help you, and if you want to go that router, try Satoshi's wallet it has more value in it that a shoe tag  Grin , so now think of this as a private key which is not stored on the blockchain.

The NFC chip also has a public key stored in another part of the chip, known to everyone and can be read using any RFID reader (your smart phone for an example).

Now once they make that pair of shoes and assign the NFC tag to it, they add that piece of information to the blockchain (just like when a miner finds a block), now everyone knows the public key to that pair of shoe but only someone with access to the private key which is stored in that tag can sign a message on the blokchain to prove their ownership, you use the app that Nike or whoever product is as a block-chain wallet, the app (reader) can request the tag to sign a message using the public key and the private key, without knowing the private key your app knows if the signature is valid then the private key is correct thus the tag is real and pair of shoes is actually authentic.

if the encryption algorithm is compromised, knowing the public key will allow you to know that private key ( not a very serious threat "long story"), also by knowing a single private key, anyone will be able to make a dozen of the same tag and they will all "look" authentic on the blockchain, unless the manfuaturer has the ability to simply delete that piece of information from the blockchain which then is not a real blockchain to begin with.

But overall, this is pretty secure IMO, if they want this to be super secured, they could put this on a POW based coin and have people secure it for them.





█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!