Verification does not imply the subsequent preservation of personal data in a particular place, but only confirmation of information that a person is not a bot
|
|
|
Most recently, I was looking for interesting threads on this forum, and I found a couple of interesting projects with exchangers, on which the protection of the client
I do not understand what it means to protect the client? Maybe it's better, or worse, than in this project? How can you understand your expression? Speech unequivocally goes about more perfect protection of the transaction, as well as the purse of the person who chose the exchanger as the main one on which it will produce trades And what's wrong with protecting this project? it is no worse than the protection of other similar platforms, I would even add that it is copied from the other exchangers On other exchangers, very different protocols and the level of protection. on some of them already introduced two-factor authentication, as well as verification of the identity
|
|
|
Most recently, I was looking for interesting threads on this forum, and I found a couple of interesting projects with exchangers, on which the protection of the client
|
|
|
And what specifically in this project is undertaken to achieve maximum protection of the seller and the buyer? What is the innovation and competitive advantage of this platform relative to the rest?
Try reading the white paper, guys. The second part describes many ways to protect your wallet against various types of aggression, and each time the algorithms hit What example is there an algorithm? Suppose, if a transaction is made using the service COTI, the server is attacked by a ddos attack... 11.8 Denial of Service (DDOS) Attacks As a result of the servers’ centralised nature, an attacker could flood the Trust Score Server with requests. Such an attack implies that users will not able to get Trust Scores easily and the system might slow down, or even be incapable of processing transactions [12]. To prevent this, COTI will employ standard DDOS prevention mechanisms, such as load balancing for centralised servers. A similar attack could be launched against specialised nodes, such as the DSP Nodes because of their somewhat centralised nature. However, since some of the specialised nodes will eventually be general users, they may not have access to load balancing. COTI will therefore need to ensure that at least some of the specialised nodes that are hosted by general users will make use of robust networking technology to the extent that the network will not cease operation. Oh, that's very good! In the 11th paragraph of the technical white paper, all types of attacks were analyzed and methods were found for their elimination and deviation
|
|
|
to be honest, I completely did not understand why this system surpasses the usual crypto currency exchangers? It is absolutely the same exchanger with small features
"Our payments network was designed to take over where traditional payment systems left off, namely with instantaneous transfers, low-to-zero fees and cost effective buyer-seller protections. This is a major advantage for consumers and merchants alike as compared to traditional banking, credit cards and P2P platforms."
|
|
|
All because for the transfer of reports between user devices it is not necessary to spend a lot of traffic, but each modern phone has sufficient characteristics to solve the algorithm
It's right! But it's all about the operating system of a mobile device, I believe. Write a program and firmware for the Android operating system - it's easy, and the rest will need to look for an approach .. Do you doubt that the developers will not be able to write a similar program for example for iOS? I do not think so, because now most of the users prefer the products of the Apple. Nevertheless, devices on the IOS are very protected from unwanted software, and therefore not everyone is able to write an application that will easily solve this issue... In this case, the development team has a lot to do, as indeed packets with encrypted personal data can be perceived as a trojan that uses personal data.
|
|
|
Yeah, the main thing is for the development team to take care of the security of my data. It will be very insulting if their system does not survive the simplest attack and all the data that was passed on to the client will fall into the wrong hands
Inaccessibility of Private Data Traditional machine learning requires datasets to be uploaded to a dedicated server. Due to privacy concern, massive amount of private data stored in individual devices is untapped. In fact, I think that the developers made the mistake of sending algorithms of machine analysis to user devices. Yet mobile devices are not so perfect, and processing will take a long time It would be better to assign the solution of these algorithms to the miners, and also pay them a small commission, which would be enough to pay back the costs of the farm. In this case, the developers would not be able to create an environment where personal data does not go away from users' devices. This is also not a good solution Well, if network performance really increases in that case .. Then it will not be a bad decision. In that case, why does not anyone run the network of devices? Because it is not as productive as mining with the farm's GPU, for example, or with ASIC Actually, there is a project that seems to be called the world-wide Wi-Fi. In it for the provided Internet traffic, through a single router, all users of the network farm crypt for the owner of the network All because for the transfer of reports between user devices it is not necessary to spend a lot of traffic, but each modern phone has sufficient characteristics to solve the algorithm
|
|
|
Yeah, the main thing is for the development team to take care of the security of my data. It will be very insulting if their system does not survive the simplest attack and all the data that was passed on to the client will fall into the wrong hands
Inaccessibility of Private Data Traditional machine learning requires datasets to be uploaded to a dedicated server. Due to privacy concern, massive amount of private data stored in individual devices is untapped. In fact, I think that the developers made the mistake of sending algorithms of machine analysis to user devices. Yet mobile devices are not so perfect, and processing will take a long time It would be better to assign the solution of these algorithms to the miners, and also pay them a small commission, which would be enough to pay back the costs of the farm. In this case, the developers would not be able to create an environment where personal data does not go away from users' devices. This is also not a good solution
|
|
|
Yeah, the main thing is for the development team to take care of the security of my data. It will be very insulting if their system does not survive the simplest attack and all the data that was passed on to the client will fall into the wrong hands
Inaccessibility of Private Data Traditional machine learning requires datasets to be uploaded to a dedicated server. Due to privacy concern, massive amount of private data stored in individual devices is untapped. In fact, I think that the developers made the mistake of sending algorithms of machine analysis to user devices. Yet mobile devices are not so perfect, and processing will take a long time
|
|
|
There are few types of DML Protocol participants. How will each of the participant types use the test?
Customers Companies, research institutions, governments or non-governmental organizations request machine learning algorithms for prediction reports. Algorithm Developers Create algorithms and request for fine-tuning of algorithms. Algorithm creations are decentralized and crowdsourced in developer community. Layers of Decentralized Nodes Distributing Nodes deliver algorithms, Federated Nodes aggregate results, Report Nodes produce reports and Algo Refining Nodes improve algorithms. 4 Data Owners Contribute idle processing power and allow access of private datasets of their devices for local prediction results, participate in fine-tuning of algorithms.
I think that everyone will use this product the way it is prescribed to them. That is, for example, buyers will give requests and receive answers, analyze them Absolutely agree. All groups of users will perform their duties as prescribed, and the developers of algorithms will look at how the environment works in the context of working with real people data
|
|
|
Hello! I have a topic for discussion. Who do you think will benefit from this platform?
Very good question! I believe that now there is no one who would be interested in this platform, since despite the movement in the project, the team was never able to catch up on its road map Why do you think the project team does not manage to fulfill the tasks of its road map? They also created a closed beta version of their platform, as promised APR 2018 Token Generation Event and Launch of DML Protocol Gen 0 (DML Algo Marketplace) Beta Where is that? But now it's only the beginning of April, what are you talking about? After all, in fact, if you consider that the prototype is already somewhere out there, because it has already been shot review videos, then soon there really will be a beta test of the marketplace According to the road map, they have one more step in the same month: APR-MAY 2018 DML Algo Marketplace online That is, they will need to try to run both the beta version and the official I think that this requires not much effort. In fact - if the beta version is working, then you can run the alpha version (working) on the next day Yeah, and it turns out that the developers took care that there was time to fix the errors of their beta version, and I think that there will be a lot of them
|
|
|
Hello! I have a topic for discussion. Who do you think will benefit from this platform?
Very good question! I believe that now there is no one who would be interested in this platform, since despite the movement in the project, the team was never able to catch up on its road map Why do you think the project team does not manage to fulfill the tasks of its road map? They also created a closed beta version of their platform, as promised
|
|
|
Hello! I have a topic for discussion. Who do you think will benefit from this platform?
|
|
|
But the team has a ready-made prototype, see the video of his work on the site. Among other things, the github has not been updated for a long time, so it seems to me that such a project can not last long
This is a wrong conclusion. Despite the fact that the project was not edited on the github, it does not mean that it was not edited at all! Software changes in any case are made on the local device, but if the developer makes a public project such as this one - he needs to report on the work done, and, as far as possible, fill the code with the github Are you saying that here is the case when the developer lazily upload changes to the github? He wants to say that developers do not change anything and do not improve the project in any way, so it can stop functioning after a while due to vulnerabilities And what if the developers just took care of everything and at the moment there are no vulnerabilities? with some exception this also happens, is not it? Yes, it may be, but why in this case we can not provide a demo version of the work of the engine of the system? This would allow users to get better acquainted with the product You should understand that in order to provide the engine for testing - you need to write a separate shell for it. Exactly for the functionality that is available at the moment And for what we pay money? we invest in some obscure platform that abstractly should help businessmen with market analysis through machine learning The project description is available in the white paper of the project. Read it, please, and you will not have questions about what exactly this project does. Visualization here does not hurt, I agree .. That's it! Visualization is something that no modern project can do without. The video is of course also good, but it would be better if everyone had the opportunity to use the product Just to ensure that another team of developers could not afford this - it is necessary to constantly work on the project: increase its resistance to attacks and fix vulnerabilities
|
|
|
But the team has a ready-made prototype, see the video of his work on the site. Among other things, the github has not been updated for a long time, so it seems to me that such a project can not last long
This is a wrong conclusion. Despite the fact that the project was not edited on the github, it does not mean that it was not edited at all! Software changes in any case are made on the local device, but if the developer makes a public project such as this one - he needs to report on the work done, and, as far as possible, fill the code with the github Are you saying that here is the case when the developer lazily upload changes to the github? He wants to say that developers do not change anything and do not improve the project in any way, so it can stop functioning after a while due to vulnerabilities And what if the developers just took care of everything and at the moment there are no vulnerabilities? with some exception this also happens, is not it? Yes, it may be, but why in this case we can not provide a demo version of the work of the engine of the system? This would allow users to get better acquainted with the product You should understand that in order to provide the engine for testing - you need to write a separate shell for it. Exactly for the functionality that is available at the moment And for what we pay money? we invest in some obscure platform that abstractly should help businessmen with market analysis through machine learning
|
|
|
But the team has a ready-made prototype, see the video of his work on the site. Among other things, the github has not been updated for a long time, so it seems to me that such a project can not last long
This is a wrong conclusion. Despite the fact that the project was not edited on the github, it does not mean that it was not edited at all! Software changes in any case are made on the local device, but if the developer makes a public project such as this one - he needs to report on the work done, and, as far as possible, fill the code with the github Are you saying that here is the case when the developer lazily upload changes to the github? He wants to say that developers do not change anything and do not improve the project in any way, so it can stop functioning after a while due to vulnerabilities And what if the developers just took care of everything and at the moment there are no vulnerabilities? with some exception this also happens, is not it?
|
|
|
But the team has a ready-made prototype, see the video of his work on the site. Among other things, the github has not been updated for a long time, so it seems to me that such a project can not last long
Yes, the project has not really been finalized for a long time, and the video with the prototype work has already been done for a long time, so we do not see any changes.
|
|
|
So far I have not seen the working prototype of the project. If the engine on which the calculations were made were ready, and we could see its work
|
|
|
As well as increasing the exchange rate, currency holders and active users of the crypto-exchange area receive their bonuses in the form of coins with delivery by the airdrop mechanism
Really? when the rate increases, will the holders of the currency be able to receive a bonus in the form of additional coins? or did I misunderstand something? No, it's not right. Nobody will give anything to anyone with a bonus in case the course rises, especially coins. Do you imagine a situation in which when the course is raised, coins with an increased rate are simultaneously issued It only sounds silly, but as soon as you can get extra coins that will also have an increased cost - I'll see how you'll talk
|
|
|
Prompt! I want to know the information about the bounty program. Who can help me?
https://bitcointalk.org/index.php?topic=3009721.0Hold, this is a link for getting information on the bounty project program. in fact, this program has been going on for a long time, so there may be some problems with the time, hurry up
|
|
|
|