Bitcoin Forum
September 26, 2018, 04:10:03 AM *
News: ♦♦ New info! Bitcoin Core users absolutely must upgrade to previously-announced 0.16.3 [Torrent]. All Bitcoin users should temporarily trust confirmations slightly less. More info.
 
   Home   Help Search Donate Login Register  
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 85 »
  Print  
Author Topic: [ANN][ICO] IDM Protect  (Read 3496 times)
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 01:05:42 PM
 #1


RUS
WHITE PAPER  |  PRESENTATION  |  ROAD MAP  |  VIDEO  |  BOUNTY  |  










▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
1537935003
Hero Member
*
Offline Offline

Posts: 1537935003

View Profile Personal Message (Offline)

Ignore
1537935003
Reply with quote  #2

1537935003
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 03:22:02 PM
 #2

Hi there! Right now we are in Frankfurt on Blockchain Summit. There is a great atmosphere and nice people. If you are on the event or in Frankfurt, let me know. We can meet and discuss blockchain technology and our project in person.
Cheers!


http://blockchainsummitfrankfurt.com/




▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
kerneal
Newbie
*
Offline Offline

Activity: 57
Merit: 0


View Profile
April 25, 2018, 03:26:21 PM
 #3

Do you use an encryption? What is the standard?
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 03:28:03 PM
 #4

Do you use an encryption? What is the standard?
The technology we use is not an encryption.  At the same time in terms of security, we protect data at the level of the absolute cypher. To prevent unauthorized access the SIZE algorithm coverts a file into small unidentifiable packets none of which contains a single bit of the original file. The protection of our algorithm is higher than AES256 in [exponent 147 of a 10] times.

▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
the_southtraders
Newbie
*
Offline Offline

Activity: 63
Merit: 0


View Profile
April 25, 2018, 03:33:15 PM
 #5

How do you protect data from man-in-the-middle attack?
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 03:34:12 PM
 #6

How do you protect data from man-in-the-middle attack?
A file is converted into a set of unidentifiable packets and then transmitted and stored on multiple nodes. There are no central servers in our system to attack. In addition, there is a secured communication channel, based on the same technology, between a user and the system.  If an attacker somehow intercepts all the packets he would not be able to assemble the file without the key (metafile).

▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
sotik x
Member
**
Offline Offline

Activity: 174
Merit: 14


View Profile
April 25, 2018, 03:37:56 PM
 #7

Do you propose to use error correction code instead of replication?
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 03:41:59 PM
 #8

Do you propose to use error correction code instead of replication?
Yes, we propose a new method of using correction codes replacing traditional approaches to reliability and safety. At the same time this method has much better technical and commercial characteristics. I emphasize, there is no technology in the world that can come close to the abilities of SIZE algorithm.

▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
Nik_Buff4l0
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
April 25, 2018, 04:01:24 PM
 #9

There is a term "miners" on your web site. Can I "mine" your tokens?
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 04:02:37 PM
 #10

There is a term "miners" on your web site. Can I "mine" your tokens?
Yes, you can. In our terminology, miners are owners of storage nodes. They provide spare memory on their devices for rent and then receive tokens as a reward.  

▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
r2d2ANDt100
Newbie
*
Offline Offline

Activity: 39
Merit: 0


View Profile
April 25, 2018, 04:10:35 PM
 #11

I found on your website the following:  The estimated reward from $4 to $5 for every 50GB of rented memory.  There is a redundancy in your system. So, the volume of stored data will be bigger than the initial file. Also, you would probably keep a commission as the service provider.  I can’t even guess how much your end user has to pay for storage.
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 04:11:49 PM
 #12

I found on your website the following:  The estimated reward from $4 to $5 for every 50GB of rented memory.  There is a redundancy in your system. So, the volume of stored data will be bigger than the initial file. Also, you would probably keep a commission as the service provider.  I can’t even guess how much your end user has to pay for storage.
Data owners pay 1$ per 1GB per month.

▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
Risty Moon
Member
**
Offline Offline

Activity: 179
Merit: 10

ĊƦyptoȁnaƦċhisƬ


View Profile
April 25, 2018, 04:15:47 PM
 #13

Not bad, except there are many free storages…

∞ In βlockchain I ƮrusƬ ∞
itod
Legendary
*
Offline Offline

Activity: 1330
Merit: 1013


^ Will code for Bitcoins


View Profile
April 25, 2018, 04:16:49 PM
 #14

Nice concept for the coin, but already implemented in Storj and Siacoin. Which new things this brings to the table compared to these two coins?
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 04:17:26 PM
 #15

Not bad, except there are many free storages…
The main task of the project is to ensure ultimate security.  There is no free project with this LEVEL OF SECURITY.  I would say there are no such projects at all, at least with competitive prices.

▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 04:34:29 PM
 #16

Nice concept for the coin, but already implemented in Storj and Siacoin. Which new things this brings to the table compared to these two coins?
Thank you for this very important question!
Just a brief comparison:
-    We don’t overload Blockchain network with all management and logging operations. We use it just for payments. Our SIZE algorithm manages the ecosystem autonomously: it controls operations and quality of nodes, manages their reputation and distributes data.
-    Our goal is not to create the cheapest storage. Our storage is most reliable and secure. So our storage nodes get good payment, while users get best protection and confidentiality.
-    We don’t use cryptography. We use correction codes which modify source information and convert any digital content into a new form — to the set of digital packages. Each of these individual packages has no functional value and may not even contain a single bit of the original information. To restore the initial information you have to reassemble a complete file from a set of packages in a specific way, performing series of mathematical operations.

▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
Risty Moon
Member
**
Offline Offline

Activity: 179
Merit: 10

ĊƦyptoȁnaƦċhisƬ


View Profile
April 25, 2018, 04:35:47 PM
 #17

Not bad, except there are many free storages…
The main task of the project is to ensure ultimate security.  There is no free project with this LEVEL OF SECURITY.  I would say there are no such projects at all, at least with competitive prices.
Maybe I going to use the service, but not much. However, good luck with ICO.

∞ In βlockchain I ƮrusƬ ∞
peleanket
Newbie
*
Offline Offline

Activity: 85
Merit: 0


View Profile
April 25, 2018, 04:40:22 PM
 #18

Who are the founders?
IDM Protect
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
April 25, 2018, 04:41:43 PM
 #19

Who are the founders?
The team is international and includes experienced researchers, software developers and marketing professionals from UK, USA and Switzerland. The algorithm was developed by physics scientists Iskender Syrgabekov and mathematician Zadauly Erkin. You can check their patents here: 
https://patents.justia.com/inventor/iskender-syrgabekov

▬▬

▄█▄▄
██████▄▄
██████████▄▄
██████████████▄▄
██████████████████▄▄
█████████████████████
██████████████████▀▀
██████████████▀▀
██████████▀▀
██████▀▀
▀█▀▀
tuchenvi
Newbie
*
Offline Offline

Activity: 83
Merit: 0


View Profile
April 25, 2018, 04:51:57 PM
 #20

Do we need An Absolute Protection From Quantum Supremacy?  There is no quantum computer yet.
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 85 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!