IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
July 06, 2018, 09:51:30 AM |
|
You confirm that it's impossible to hack the algorithm?
Well, the fact is that to hack a single block of data (16 bytes) with the simplest (second) level of protection, the most powerful computer will need more than 42 sextillion epochs of the Universe.
|
|
|
|
|
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
|
t4iw4nch1k
Newbie
Offline
Activity: 31
Merit: 0
|
|
July 06, 2018, 10:00:08 AM |
|
You confirm that it's impossible to hack the algorithm?
Well, the fact is that to hack a single block of data (16 bytes) with the simplest (second) level of protection, the most powerful computer will need more than 42 sextillion epochs of the Universe. In this case there are no computing resources or methods in the world today or foreseen in the near future capable of breaking the protection offered by the IDM service.
|
|
|
|
ArthurEntern
Newbie
Offline
Activity: 72
Merit: 0
|
|
July 06, 2018, 10:20:34 AM |
|
I have one more question. Are there any restrictions on the amount of memory that miners should provide in the lease?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
July 06, 2018, 10:36:30 AM |
|
I have one more question. Are there any restrictions on the amount of memory that miners should provide in the lease?
Ok, what makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.
|
|
|
|
t4iw4nch1k
Newbie
Offline
Activity: 31
Merit: 0
|
|
July 06, 2018, 10:50:13 AM |
|
I have one more question. Are there any restrictions on the amount of memory that miners should provide in the lease?
Ok, what makes IDM unique is that miners can rent out as much space as they want and still bring in revenue. I like the idea that this project can benefit both users and miners.
|
|
|
|
vekazpel
Newbie
Offline
Activity: 40
Merit: 0
|
|
July 06, 2018, 11:00:03 AM |
|
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
July 06, 2018, 11:19:45 AM |
|
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?
That means the possibility of using devices that aren't otherwise being used.People can earn money leasing unused memory on mobile or home devices.
|
|
|
|
ArthurEntern
Newbie
Offline
Activity: 72
Merit: 0
|
|
July 06, 2018, 11:32:14 AM |
|
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?
That means the possibility of using devices that aren't otherwise being used.People can earn money leasing unused memory on mobile or home devices. I think this project can surely be very interesting to investors. As for me, I'm just thinking about taking part on the ICO.
|
|
|
|
ArthurEntern
Newbie
Offline
Activity: 72
Merit: 0
|
|
July 06, 2018, 12:09:38 PM |
|
I've got another vital question. What will be the price of your product? There are, after all, a lot of very cheap offers on the market now.
Yeah, I'd like to know it too. It's an important nuance.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
July 06, 2018, 12:37:59 PM |
|
I've got another vital question. What will be the price of your product? There are, after all, a lot of very cheap offers on the market now.
Yeah, I'd like to know it too. It's an important nuance. It will be competitive. Today there are services entering the market with an unprecedentedly low price for services. However, the economic model of these services is not clear. Simply declaring a low price is not enough to have a successful business.
|
|
|
|
komutevan
Newbie
Offline
Activity: 76
Merit: 0
|
|
July 06, 2018, 12:43:18 PM |
|
If we talk about the general situation, would you say that the number of cybercrimes is growing at the present time?
|
|
|
|
vekazpel
Newbie
Offline
Activity: 40
Merit: 0
|
|
July 06, 2018, 12:57:16 PM |
|
If we talk about the general situation, would you say that the number of cybercrimes is growing at the present time?
It seems to me that it's quite obvious.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
July 06, 2018, 01:12:03 PM |
|
If we talk about the general situation, would you say that the number of cybercrimes is growing at the present time?
It seems to me that it's quite obvious. Well, cybercrime is something that we are talking about more as it grows in scale. The digital age means that there are new opportunities for thieves to do their business and they no longer require the in-person confrontation that goes along with traditional forms of theft.
|
|
|
|
b4rb4ras3xy
Newbie
Offline
Activity: 68
Merit: 0
|
|
July 06, 2018, 01:22:14 PM |
|
I'd like to ask dev how does your system ensure data privacy?
|
|
|
|
lirene
|
|
July 06, 2018, 01:39:31 PM |
|
If we talk about the general situation, would you say that the number of cybercrimes is growing at the present time?
It seems to me that it's quite obvious. Well, cybercrime is something that we are talking about more as it grows in scale. The digital age means that there are new opportunities for thieves to do their business and they no longer require the in-person confrontation that goes along with traditional forms of theft. this is all the realities of modern life, and it is very good that there are projects like IDM, that which can solve this problem, I will follow their development
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
July 06, 2018, 01:41:18 PM |
|
I'd like to ask dev how does your system ensure data privacy?
In fact there is an infinite number of ways to build files and algorithms. The user chooses a specific way of rewriting the information, and no one but him or a person to whom the user has communicated the information about the rewriting rules can access the protected information.
|
|
|
|
EVGENIYbb
Newbie
Offline
Activity: 50
Merit: 0
|
|
July 08, 2018, 12:28:32 PM |
|
Please tell me where you can see the functionality of the token?
|
|
|
|
Ruicosta.ac
Newbie
Offline
Activity: 112
Merit: 0
|
|
July 10, 2018, 03:38:08 AM |
|
The project has patented data protection technology, an urgent topic in which large funds are investing now. IDM ICO is very interesting and promising, I will continue to folow this project.
|
|
|
|
Groc
Sr. Member
Offline
Activity: 560
Merit: 250
Bounty manager (https://t.me/Gudwinn)
|
|
July 12, 2018, 11:04:57 AM |
|
Dear friends. I regret to inform you that the bounty is closing. The developers in the person of @TonyBatler turned out to be scammers. They decided to abandon the bounty program. And do not pay me and you, earned tokens. So, rather remove your signatures and avatars. I propose to express our discontent in their social networks and in the ANN thread. If you need more proofs PM mehttps://bitcointalk.org/index.php?topic=3399154.new#newthis is chat whith @TonyBatler. Main person in this scam.
|
|
|
|
T85083598
Member
Offline
Activity: 336
Merit: 10
|
|
July 12, 2018, 12:55:54 PM |
|
The product is definitely needed, since quantum computers are the biggest threat to blockchain technology.
|
|
|
|
|