How Blockchain will give us control back over our bodies

Within two years all medical data will be globally available – including your genomes – unless it can be blockchained by ethical start ups like Shivom.

Well, we say ethical start ups. Who knows? The CEO and founder, Dr Axel Schumacher, sounded very nice on the phone. And the 94 page white paper on Precision Medicine looks pretty convincing.

Then again, so did the likes of Facebook, Twitter and Google. They were into precision marketing.

Dr Axel Schumaker, CEO of Shivom

Dr Axel Schumacher – I don’t think I’d mind if he examined my genomes – he is a proper doctor after all

We didn’t know that. We all assumed they were philanthropists who let us use their expensive data centres to store all our private thoughts because they really wanted to ‘democratise the world’.

They told us they were levelling the playing field. Actually, they were looting our private lives.

It turns out they were selling every bit of information they could glean, to everyone from pyramid sellers, to debt collectors to oppressive government snooping agencies.

Still, we’re all a bit older and wiser now? We won’t get spooked again, will we? Sadly, it turns out we will and this time the data intrusions go even deeper. As if having our privacy ravished by cyber spivs wasn’t bad enough, the next generation of digital confidence gainers have taken snooping to the next level. They’ve devised a way to ransack our medical histories and taken privacy pillaging to a molecular level.

Did you know that all these wearable gadget companies, like Fitbit, sell the information you upload to them? You might not think your ECGs are all that exciting but pharmaceutical companies have an endless appetite for this sort of stuff. They’ve got absolute buckets of money, like futures and options traders on Friday night in a lap dancing club. Those rapacious pharmas will keep stuffing notes into our private places in the hope that we’ll show them more of our biology.

But who is profiting from this Medical Peep Show? Fitbit, that’s who. All you get is a useless wearable placebo which doesn’t seem to tell you much at all. You wonder how long people wear a Fitbit until they get bored with them and put them in the cupboard with the other fad equipment, between the Espresso Machine and the Sandwich Toaster.

Genome companies like 23&Me have even more detailed information about our DNA. Why? Because we’re mug enough to send them our blood samples, in the vain hope that they’ll tell us something about our genetic make up. Which one of the 12 tribes were we descended from? It’s the modern version of Astrology. I’ve got typical DNA of a Sagittarean, on the cusp of a privacy invasion.

Surely, if someone is going to pay to ogle at our double helix, we should be the ones getting paid. We shouldn’t be giving our bodies away free so that some wearable pimp can take all the profit. If I’m going to get my genomes out for the labs, I want a piece of the action.

This is where Blockchain can help us. it can put us back in control of our data. We can use wearable gadgets to measure and monitor us. But new blockchain companies like Shivom, will put a lock on our data, so we only give it up by consent. You wanna see my Genomes, Mr SmithKlineGlaxo? Well put ten dollars into my bitcoin!


Disk Ashur shows off his conditioned body and ‘disks of steel’ dressed by a range of to-die-for outfits in gorgeous pastel shades as it makes a rare appearance on the desktop

Here’s the Disk Ashur channeling its Edge technology as it shows off its toned and conditioned hard case dressed in beautiful pastel shades. This photographer just happened to catch Ashur in rare unposed footage of the hard disk as it made a rare appearance on the desktop.


It is nick named the Edge, which stands for Enhanced Dual Generating Encryption.

It was papped on the way from its multi-million pound data centre to the home from which its owner ‘works’ on Friday afternoons. According to local estate agents, the worker’s house is worth £500,000 (but they will probably listen to offers).

Ashur’s military grade hardware encryption drew some admiring glances. Its ability to instantly render information indecipherable to outsiders had hackers shaking their heads in despair.


The sleek lines of the toned kit drew some admiring glances from fans

What do they mean by ‘military grade’? I don’t know. They don’t say

The Dish Ashur impressed a crowd of admirers by using its own microprocessor to generate random numbers. The processor then stunned onlookers by performing feats of cryptography.

“This is clearly more than just a pretty face,” said one data centre insider. But Disk Ashur better be careful inside the cages, we heard. The other hard disks don’t take kindly to a drive that gets ideas above its work station. Some may try to infect it. Other criminals may attack it with a screw driver.


diskAshur DT² - Angle (2)

The Ashur reclines, while its onboard processor thinks of ways to make data indecipherable.

To prepare for such physical attacks Ashur has been toughening up in a studio, working to  harden up its outer case.

It’s got a tamper free mechanism too. The only way to get physical access to Ashur’s is to get through its enclosure. And that only happens with consent. Which it isn’t giving any time soon. This is a hard disk with a brain remember and nothing gets past its omnipotent processor.

The Ashur is physically protected from external tampering.

All the critical components on Ashur’s circuit board are covered by a layer of epoxy resin, which is harder than that stuff they use to make the Black Box of a plane.

Epoxy Resin is even tougher, claim some insiders, than those bits of Weetabix that welded to your breakfast bowl after they’ve been through the dishwasher.


When weetabix is melted by superheated, then dried by the temperatures hotter the earth’s core, a residue forms on a plate and creates the hardest known substance in the natural world

But what happens next may surprise you.

If some super human actually managed to remove the epoxy resin they’d almost certainly damage the components. Even if, by some miracle, they didn’t, they’d still face the type of labours that would make Hercules thrown in the towel.

Not least of the defence mechanisms is the Common Criteria EAL4+ microprocessor. Then there’s the PIN number.

The encryption is full strength too. It uses AES 256 bit XTS full disk encryption.

The pins and keys are always encrypted while at rest.

The drive is designed to comply with the latest government certifications.

The drive needs no software or drivers to be installed on your machine.

Because it’s intelligent it works on any computer with all operating systems – as long as they have a USB port any comp.

Amazingly, despite all the work it does to instantly encrypt data, you won’t notice any performance deficit. You won’t be kept waiting for your data.

Your data needs to be protected by a pin number.

And then it’s encrypted. By an intelligent hard drive. This is a hard disk with its own processor. Like an officious security guard.

Its brains are in its disk.

If you’re feeling really zealous you can programme in a self destruct feature. If someone tries to hack into your device by trying a random set of pin numbers, you can get your system to self wipe if,say, the croook types in the pin number 1234.

Whatever number you use for your unique self destruct pin code, the end result is the same. once it has been triggered it deletes the encryption key, all pins and data. It then creates a new encryption key.

If there are 15 attempts at a log in, then the system becomes closed down and the data wiped.

If you haven’t used the disk for a while, the system automatically locks so that people can’t, say, access your computer while you are at lunch.

Under article 34 of the terms of GDPR, you can be fine massively if you lose an unencrypted device with with customer data. If you lose in iStorage device, you will be fine however. You won’t even need to report the loss.

If there is an automated attack the disk gets clever and offers an instant state of paralysis called a Deadlock frozen state.


Summary BOX: What is Cryptography?

It’s a sort of Rhyming Slang for computers.

Crypting Slang possibly.

Except that’s a massive over simplification.

What does it do?

Makes data unintelligible to outsiders.

First it makes it impossible to find.

Then it makes it impossible to convert.

To be safe, it makes it impossible to read.

Isn’t that what marketing managers do with technology press releases?

It’s a bit like that. But this goes even deeper.

And there is one crucial difference.

It won’t complain about not being on the front page of the FT.

 How Do they do it?

Cryptography can only be created by assembling a critical mass of experts with knowledge of the following:


Computer science

Electrical engineering

Communication science and physics