Will your products be aimed at mobile or PC devices? I believe you should start with the first world.
We live in the world where ads based on cookie files, cyber attacks and commercial espionage have become real. 80% of users of social networks are concerned about access of advertisers to their data and 70% are concerned about the fact that the government tracks their personal data.
|
|
|
Hi. How long will the second stage of your ICO last.
It’ll last from 26.11.2018 to 07.12.2018.
|
|
|
Hello. Are there any additional bonuses for big investors.
Everyone who buys tokens for more than 10 Eth access a contest, the main prize is 10 million tokens.
|
|
|
Are you sure that there will be demand for such a high privacy level? I’m afraid that you can experience difficulties in terms of audience attraction.
We live in the world where ads based on cookie files, cyber attacks and commercial espionage have become real. 80% of users of social networks are concerned about the fact that the government tracks their personal data. The demand already exists, it’s just necessary to provide people with the product that they need.
|
|
|
According to the platform development plan, when will integration with Ethereum take place? It seems to me that this will give a great boost to the development of the entire platform!
It’s planned to carry put integration with Ethereum platform in April, 2019, but we make every effort to maximize development paces.
|
|
|
Do i have to sign up on your platform in order to take part in the ICO?
Yes, you have to undergo a quick and simple procedure of open integration.
|
|
|
What fate awaits for the tokens which won’t be sold during the ICO, if there will be any?
All the unsold tokens will be burnt, this will increase the cost of the tokens that have been sold.
|
|
|
What will the nominal price of the token be during the following sale stage?
You can get 250k STEEL tokens for 1 ЕТН.
|
|
|
Good evening. How many tokens were put on sale within the framework of the ICO?
We will issue 35 billion tokens within the framework of our ICO.
|
|
|
Why did you decide to use several encryption mechanisms in your system at the same time? It seemed to me that one would be enough.
We’re eager to provide our users with the most effective means for protection of their private data. In addition, some users may have preferences, and they’ll be able to make choice due to implementation of several algorithms.
|
|
|
Hello. Will the size of the data be changed after it gets encrypted? As a rule, the size reduces.
RPG compresses data before encryption in order to make the size of files and messages smaller and make PRG cryptoanalysis harder. Compressed, small and weakly compressed files aren’t compressed.
|
|
|
How will key containers be protected within the framework of your ecosystem? It’s important for me to make it impossible for anyone else to use it even in case of physical access is gained.
A secret phrase is used to protect key container.
|
|
|
Hi. Can i set an unlimited validity of encryption key? Or is it obligatory to set some particular validity period?
Each type of keys can have limited or unlimited period.
|
|
|
What’s the maximum length of keys supported by PGR encryption algorithm? Or isn’t there any?
PGP supports three types of keys. It’s length is from 1024 to 4096 bits depending on technology.
|
|
|
How will session key be created in the process of communication in the messenger?
A session key is generated with the help of secure random number generator. A session key is encrypted with the help of an open key of a recipient with the usage of RSA or Elgamal algorithms (depending on the type of recipient’s key).
|
|
|
PGP algorithm exists for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it. However, why hasn’t this algorithm become popular if it is so effective? There’s smthng screwy about the matter. Popularity of PGR encryption has increased in the area of journalists, dissidents, justice fighters and campaigners over the recent years. Analysts appreciate its potential. Can anyone tell me how this algorithm will work in layman terms? I’d be very grateful! PGP encryption is based on public keys exchange method, in case of usage of which a pair of keys is responsible for encryption and decryption of data. The principle of described in details in our WP.
|
|
|
Hi. Are there supernodes in your ecosystem? They can be often found on majoe blockchain platforms.
Our platform won’t have neither headquarters nor supernodes to control communication between the nodes.
|
|
|
I saw a similar model in browsers like Top that allow to remain anonymous. Did you take their idea?
STEEL ecosystem will operate on blockchain and will be supported by a hybrid P2P Tor-alike network, offering really anonymous Internet-access and transactions.
|
|
|
Hello. What encryption algorithms will be used within the framework of your ecosystem, to protect the users’ data?
PGP, AES, CBC, DSA, HMAC, SHA-256, as well as tunnels and complex identification instead of IP addresses.
|
|
|
Good afternoon. I have seen hundreds of platforms which offer just to add blockchain to solve their problems, but, obviously, it isn't enough. What makes Sishub different?
As for me, i think that Sishub is different because it wants to create a full-fledged ecosystem i stead of relying on integration with other projects. However, it'll be hard for this ecosystem’s messenger to take the audience of rhe current leaders of this segment of the market. I hardly believe that it'll succeed. Believe me, the demand for solutions allowing to protect your own data has increased by tens of times against the background of the recent privacy scandals. Yes, that's why many messengers release special anonymous versions which satisfy this demand, right? All these messengers are centralized, so your data is transferred via the company's servers. Most likely, the tales about anonymity are just a marketing hook. Let’s say you’re right. With the help of which technology will STEEL messenger be able to ensure high level of privacy? Will it remain convenient for a final user? PGP encryption used in STEEL is dedicated to ensure the level of privacy and safety unreachable for existing messengers. The process of PGP encryption, including key exchange, is carried out automatically, the users have just to set their own speed and safety parameters.
|
|
|
|