Bitcoin Forum

Alternate cryptocurrencies => Altcoin Discussion => Topic started by: Felicity no.1 on July 05, 2018, 03:05:27 PM



Title: What is CloudFish?
Post by: Felicity no.1 on July 05, 2018, 03:05:27 PM
CloudFish developed a security platform that enables companies and individual users to secure their assets stored in the cloud using blockchain technology. Instead of relying on a single private key stored on a server that can be hacked or stolen, CloudFish developed a unique technology that splits the users’ private security key into millions of fragments and store it in blockchain thereby making it impossible for someone to steal or hack the key.

The dynamic construction of encryption keys using blockchain provides a fool-proof mechanism to secure the digital assets like documents, files, emails etc. and crypto-currency keys stored in the cloud. CloudFish’s technology is backed by renowned researchers in the cloud security space. The company is an official member of Georgia Institute of Technology’s ATDC Accelerate program.

The security platform developed by CloudFish is integrated with major cloud services vendors including Dropbox, Google Drive, Box and Microsoft OneDrive. The company announced its plan to extend its product’s integration to Amazon Web Services (AWS), Salesforce.com and IBM Cloud.

Please check out our web site for details about the key innovation we are bringing to the cloud security industry

1. ICO website
cloud-fish.io

2. White paper
cloud-fish.io/CloudFishWhitepaper.pdf


Title: Re: What is CloudFish?
Post by: Braydean on July 06, 2018, 04:44:40 AM
Cloudfish is a data security platform that uses blockchain technology in order to secure digital assets that are stored in the cloud. The platform is based on proprietary technology generated by CloudFish, which allows the encryption of digital assets.


Title: Re: What is CloudFish?
Post by: Kakmakr on July 06, 2018, 06:30:31 AM
Storing any private key online is a stupid idea in my opinion, no matter how it is stored. In any organization, you get disgruntled or corrupt employees and this is the weak link. Once the developers of these companies leave, the information on how to exploit these methods are out there.

I am still in favour of storing your private keys in a off-line paper wallet and after the "sweep" this paper wallet should never be used again.  ::)