yuansuyi
Member
Offline
Activity: 210
Merit: 10
|
|
April 08, 2018, 05:59:29 PM |
|
And how exactly will all the data be collected?
To do this, the system uses a cross-board file system (IPFS), which is a distributed file structure that combines all the storage in the computing devices into one file system. And on this file system, user data is stored in a decentralized manner, right? That's right, all right. This will be stored in this distributed file system in the form of encrypted fragments. Access to this will have only one user.
|
|
|
|
EccLipSe
Member
Offline
Activity: 168
Merit: 10
|
|
April 08, 2018, 06:03:23 PM |
|
And how exactly will all the data be collected?
To do this, the system uses a cross-board file system (IPFS), which is a distributed file structure that combines all the storage in the computing devices into one file system. And on this file system, user data is stored in a decentralized manner, right? That's right, all right. This will be stored in this distributed file system in the form of encrypted fragments. Access to this will have only one user. Encrypt all the information will be after the end of the collection phase, but before this information can be intercepted in any way. How to avoid hacking at this stage?
|
|
|
|
yuansuyi
Member
Offline
Activity: 210
Merit: 10
|
|
April 08, 2018, 06:06:09 PM |
|
And how exactly will all the data be collected?
To do this, the system uses a cross-board file system (IPFS), which is a distributed file structure that combines all the storage in the computing devices into one file system. And on this file system, user data is stored in a decentralized manner, right? That's right, all right. This will be stored in this distributed file system in the form of encrypted fragments. Access to this will have only one user. Encrypt all the information will be after the end of the collection phase, but before this information can be intercepted in any way. How to avoid hacking at this stage? I do not quite understand what stage you are talking about
|
|
|
|
EccLipSe
Member
Offline
Activity: 168
Merit: 10
|
|
April 08, 2018, 06:10:27 PM |
|
And how exactly will all the data be collected?
To do this, the system uses a cross-board file system (IPFS), which is a distributed file structure that combines all the storage in the computing devices into one file system. And on this file system, user data is stored in a decentralized manner, right? That's right, all right. This will be stored in this distributed file system in the form of encrypted fragments. Access to this will have only one user. Encrypt all the information will be after the end of the collection phase, but before this information can be intercepted in any way. How to avoid hacking at this stage? I do not quite understand what stage you are talking about I talked about security at the stage of entering information into the system. How do they plan to secure this process?
|
|
|
|
yuansuyi
Member
Offline
Activity: 210
Merit: 10
|
|
April 08, 2018, 06:13:44 PM |
|
And how exactly will all the data be collected?
To do this, the system uses a cross-board file system (IPFS), which is a distributed file structure that combines all the storage in the computing devices into one file system. And on this file system, user data is stored in a decentralized manner, right? That's right, all right. This will be stored in this distributed file system in the form of encrypted fragments. Access to this will have only one user. Encrypt all the information will be after the end of the collection phase, but before this information can be intercepted in any way. How to avoid hacking at this stage? I do not quite understand what stage you are talking about I talked about security at the stage of entering information into the system. How do they plan to secure this process? For security at the entry stage, a tool is used to detect and treat viruses, and to prevent the data source from being compromised and exposed, a keyboard protection module and an obfuscation solution are used.
|
|
|
|
EccLipSe
Member
Offline
Activity: 168
Merit: 10
|
|
April 08, 2018, 06:17:05 PM |
|
And how exactly will all the data be collected?
To do this, the system uses a cross-board file system (IPFS), which is a distributed file structure that combines all the storage in the computing devices into one file system. And on this file system, user data is stored in a decentralized manner, right? That's right, all right. This will be stored in this distributed file system in the form of encrypted fragments. Access to this will have only one user. Encrypt all the information will be after the end of the collection phase, but before this information can be intercepted in any way. How to avoid hacking at this stage? I do not quite understand what stage you are talking about I talked about security at the stage of entering information into the system. How do they plan to secure this process? For security at the entry stage, a tool is used to detect and treat viruses, and to prevent the data source from being compromised and exposed, a keyboard protection module and an obfuscation solution are used. I'm understood, thank you. This is a really great security solution. And when can we see it in work? When is the release scheduled for this?
|
|
|
|
yuansuyi
Member
Offline
Activity: 210
Merit: 10
|
|
April 08, 2018, 06:21:34 PM |
|
And how exactly will all the data be collected?
To do this, the system uses a cross-board file system (IPFS), which is a distributed file structure that combines all the storage in the computing devices into one file system. And on this file system, user data is stored in a decentralized manner, right? That's right, all right. This will be stored in this distributed file system in the form of encrypted fragments. Access to this will have only one user. Encrypt all the information will be after the end of the collection phase, but before this information can be intercepted in any way. How to avoid hacking at this stage? I do not quite understand what stage you are talking about I talked about security at the stage of entering information into the system. How do they plan to secure this process? For security at the entry stage, a tool is used to detect and treat viruses, and to prevent the data source from being compromised and exposed, a keyboard protection module and an obfuscation solution are used. I'm understood, thank you. This is a really great security solution. And when can we see it in work? When is the release scheduled for this? Well, if you mean the launch of the service, then it is scheduled for the first quarter of 2019. All platform systems will be implemented in stages throughout 2018. For more information about this, you can familiarize yourself with the road map. This is presented on the project website.
|
|
|
|
EccLipSe
Member
Offline
Activity: 168
Merit: 10
|
|
April 08, 2018, 06:30:04 PM |
|
And how exactly will all the data be collected?
To do this, the system uses a cross-board file system (IPFS), which is a distributed file structure that combines all the storage in the computing devices into one file system. And on this file system, user data is stored in a decentralized manner, right? That's right, all right. This will be stored in this distributed file system in the form of encrypted fragments. Access to this will have only one user. Encrypt all the information will be after the end of the collection phase, but before this information can be intercepted in any way. How to avoid hacking at this stage? I do not quite understand what stage you are talking about I talked about security at the stage of entering information into the system. How do they plan to secure this process? For security at the entry stage, a tool is used to detect and treat viruses, and to prevent the data source from being compromised and exposed, a keyboard protection module and an obfuscation solution are used. I'm understood, thank you. This is a really great security solution. And when can we see it in work? When is the release scheduled for this? Well, if you mean the launch of the service, then it is scheduled for the first quarter of 2019. All platform systems will be implemented in stages throughout 2018. For more information about this, you can familiarize yourself with the road map. This is presented on the project website. Well I understand, I will definitely get to know this. I will follow the development of the project, I think this is a very interesting concept.
|
|
|
|
russBOY
|
|
April 08, 2018, 07:33:47 PM |
|
guerilla events? a very interesting and unusual name), please tell me, but the company of translators is no more?
|
|
|
|
MOO76MAN
Newbie
Offline
Activity: 14
Merit: 0
|
|
April 09, 2018, 12:31:17 PM |
|
These personal information is such a big issue.
But the main goal of MyCreditChain is to give everyone of us the control of our own information.
MyCreditChain makes us own our information by letting us to sell it on blockchain.
|
|
|
|
miakaplan3
Newbie
Offline
Activity: 64
Merit: 0
|
|
April 09, 2018, 01:29:25 PM |
|
I think credit bureau will refuse to cooperate with MCC.... any how??
|
|
|
|
MCC_Matthew
Newbie
Offline
Activity: 56
Merit: 0
|
|
April 09, 2018, 01:31:16 PM |
|
Hi ! Thank you for your interest. To answer your question, I think credit bureau will refuse to cooperate with MCC.... any how??
==> With MyCreditChain in service, people don’t have to put up with the misuse of banks and SNS using their information for free. So Credit Bureau would not have much power any more. Any one or any company can come into MCC and use the big data to generate useful information. Credit Bureau cannot have the power they have now. Because they will become just one of the many credit scoring providers using personal information. Once their monopoly of personal information is disrupted by MyCreditChain Service, they become a minor player. Everyone get paid for providing the information on the meantime. People get their power back. If you have more suggestions for MCC, please feel free to comment here or our Telegram chat. Thanks again! Website: http://mycreditchain.org/download: http://mycreditchain.org/paper/MycreditChain(MCC)_whitepaper_en_v1.5.pdf Medium: https://medium.com/mycreditchainFacebook: https://www.facebook.com/mycreditchain
|
|
|
|
damiansmith1
Newbie
Offline
Activity: 44
Merit: 0
|
|
April 09, 2018, 01:34:27 PM |
|
Banks will afraid to lose their grip of the financial market... I think that first step for MCC is the collaboration with banks
|
|
|
|
MCC_Matthew
Newbie
Offline
Activity: 56
Merit: 0
|
|
April 09, 2018, 01:35:34 PM |
|
Hi ! Thank you for your interest. To answer your question, Banks will afraid to lose their grip of the financial market... I think that first step for MCC is the collaboration with banks
==> MyCreditChain aims to provide that service for the whole globe. Bank issue could be simple. Currently South Korean lawmakers are preparing constitutional amendment that establishes personal information right to be the fundamental right. Personal information right is about each individual’s right to decide how their personal information used. That is exactly what MyCreditchain is aiming to provide. Banks have been prone to hacking. They have been losing tens of millions of personal information of their customers. Blockchain can solve the problem because MyCreditChain’s decentralized data structure does not have a point of attack. If you have more suggestions for MCC, please feel free to comment here or our Telegram chat. Thanks again! Website: http://mycreditchain.org/download: http://mycreditchain.org/paper/MycreditChain(MCC)_whitepaper_en_v1.5.pdf Medium: https://medium.com/mycreditchainFacebook: https://www.facebook.com/mycreditchain
|
|
|
|
mootbritton7
Newbie
Offline
Activity: 51
Merit: 0
|
|
April 09, 2018, 01:37:37 PM |
|
What is special about MyCreditChain Credit Information?
|
|
|
|
MCC_Matthew
Newbie
Offline
Activity: 56
Merit: 0
|
|
April 09, 2018, 01:38:37 PM |
|
Hi ! Thank you for your interest. To answer your question, What is special about MyCreditChain Credit Information?
==> To know a person and to gauge his credit worthiness, MyCreditChain is looking at first his objective personal credit information. However, that is not enough. When we say we know a person, the most important information is ‘who are the people around the person.’ If I know your friends and families, would you try to cheat me? Your reputation is at stake. Our airdrop system is about mapping a user personal network. We give gifts to people we like/care/ want to get to know. Those are important people, and we don’t want to risk our reputation. If you have more suggestions for MCC, please feel free to comment here or our Telegram chat. Thanks again! Website: http://mycreditchain.org/download: http://mycreditchain.org/paper/MycreditChain(MCC)_whitepaper_en_v1.5.pdf Medium: https://medium.com/mycreditchainFacebook: https://www.facebook.com/mycreditchain
|
|
|
|
delcastillo1
Copper Member
Jr. Member
Offline
Activity: 138
Merit: 1
|
|
April 09, 2018, 01:40:09 PM |
|
What is the total supply of MCC Tokens? and any hard cap or a soft cap?
|
|
|
|
|
mootbritton7
Newbie
Offline
Activity: 51
Merit: 0
|
|
April 09, 2018, 01:42:31 PM |
|
Is this project developing credit ecosystem or one’s credit history over blockchain that can be used eventually for credit? Do you guys have any partnership?
|
|
|
|
MCC_Matthew
Newbie
Offline
Activity: 56
Merit: 0
|
|
April 09, 2018, 01:43:39 PM |
|
Hi ! Thank you for your interest. To answer your question, Is this project developing credit ecosystem or one’s credit history over blockchain that can be used eventually for credit? Do you guys have any partnership?
==> MCC is building credit information ecosystem by allowing all of us to own and sell our personal credit information. However, all the information is stored in hyperledger such that the information is traceable over time as well. Yes we do. We are in partnership with 19 companies as of 3/27. We expect the number of companies in partnership will be increasing. Among our partners, many of them actually participated funding for MyCreditChain project. MyCreditChain business model is recognized by other companies. If you have more suggestions for MCC, please feel free to comment here or our Telegram chat. Thanks again! Website: http://mycreditchain.org/download: http://mycreditchain.org/paper/MycreditChain(MCC)_whitepaper_en_v1.5.pdf Medium: https://medium.com/mycreditchainFacebook: https://www.facebook.com/mycreditchain
|
|
|
|
|