IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 01:05:42 PM Last edit: July 14, 2018, 08:06:54 PM by IDM Protect |
|
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 03:22:02 PM Last edit: April 26, 2018, 12:37:23 PM by IDM Protect |
|
Hi there! Right now we are in Frankfurt on Blockchain Summit. There is a great atmosphere and nice people. If you are on the event or in Frankfurt, let me know. We can meet and discuss blockchain technology and our project in person. Cheers!http://blockchainsummitfrankfurt.com/
|
|
|
|
kerneal
Jr. Member
Offline
Activity: 41
Merit: 1
|
|
April 25, 2018, 03:26:21 PM |
|
Do you use an encryption? What is the standard?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 03:28:03 PM |
|
Do you use an encryption? What is the standard?
The technology we use is not an encryption. At the same time in terms of security, we protect data at the level of the absolute cypher. To prevent unauthorized access the SIZE algorithm coverts a file into small unidentifiable packets none of which contains a single bit of the original file. The protection of our algorithm is higher than AES256 in [exponent 147 of a 10] times.
|
|
|
|
the_southtraders
Newbie
Offline
Activity: 64
Merit: 0
|
|
April 25, 2018, 03:33:15 PM |
|
How do you protect data from man-in-the-middle attack?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 03:34:12 PM |
|
How do you protect data from man-in-the-middle attack?
A file is converted into a set of unidentifiable packets and then transmitted and stored on multiple nodes. There are no central servers in our system to attack. In addition, there is a secured communication channel, based on the same technology, between a user and the system. If an attacker somehow intercepts all the packets he would not be able to assemble the file without the key (metafile).
|
|
|
|
sotik x
Member
Offline
Activity: 166
Merit: 14
|
|
April 25, 2018, 03:37:56 PM |
|
Do you propose to use error correction code instead of replication?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 03:41:59 PM |
|
Do you propose to use error correction code instead of replication?
Yes, we propose a new method of using correction codes replacing traditional approaches to reliability and safety. At the same time this method has much better technical and commercial characteristics. I emphasize, there is no technology in the world that can come close to the abilities of SIZE algorithm.
|
|
|
|
Nik_Buff4l0
Newbie
Offline
Activity: 50
Merit: 0
|
|
April 25, 2018, 04:01:24 PM |
|
There is a term "miners" on your web site. Can I "mine" your tokens?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 04:02:37 PM |
|
There is a term "miners" on your web site. Can I "mine" your tokens?
Yes, you can. In our terminology, miners are owners of storage nodes. They provide spare memory on their devices for rent and then receive tokens as a reward.
|
|
|
|
r2d2ANDt100
Newbie
Offline
Activity: 39
Merit: 0
|
|
April 25, 2018, 04:10:35 PM |
|
I found on your website the following: The estimated reward from $4 to $5 for every 50GB of rented memory. There is a redundancy in your system. So, the volume of stored data will be bigger than the initial file. Also, you would probably keep a commission as the service provider. I can’t even guess how much your end user has to pay for storage.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 04:11:49 PM |
|
I found on your website the following: The estimated reward from $4 to $5 for every 50GB of rented memory. There is a redundancy in your system. So, the volume of stored data will be bigger than the initial file. Also, you would probably keep a commission as the service provider. I can’t even guess how much your end user has to pay for storage.
Data owners pay 1$ per 1GB per month.
|
|
|
|
Risty Moon
Member
Offline
Activity: 173
Merit: 10
|
|
April 25, 2018, 04:15:47 PM |
|
Not bad, except there are many free storages…
|
|
|
|
itod
Legendary
Offline
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
|
|
April 25, 2018, 04:16:49 PM |
|
Nice concept for the coin, but already implemented in Storj and Siacoin. Which new things this brings to the table compared to these two coins?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 04:17:26 PM |
|
Not bad, except there are many free storages…
The main task of the project is to ensure ultimate security. There is no free project with this LEVEL OF SECURITY. I would say there are no such projects at all, at least with competitive prices.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 04:34:29 PM |
|
Nice concept for the coin, but already implemented in Storj and Siacoin. Which new things this brings to the table compared to these two coins?
Thank you for this very important question! Just a brief comparison: - We don’t overload Blockchain network with all management and logging operations. We use it just for payments. Our SIZE algorithm manages the ecosystem autonomously: it controls operations and quality of nodes, manages their reputation and distributes data. - Our goal is not to create the cheapest storage. Our storage is most reliable and secure. So our storage nodes get good payment, while users get best protection and confidentiality. - We don’t use cryptography. We use correction codes which modify source information and convert any digital content into a new form — to the set of digital packages. Each of these individual packages has no functional value and may not even contain a single bit of the original information. To restore the initial information you have to reassemble a complete file from a set of packages in a specific way, performing series of mathematical operations.
|
|
|
|
Risty Moon
Member
Offline
Activity: 173
Merit: 10
|
|
April 25, 2018, 04:35:47 PM |
|
Not bad, except there are many free storages…
The main task of the project is to ensure ultimate security. There is no free project with this LEVEL OF SECURITY. I would say there are no such projects at all, at least with competitive prices. Maybe I going to use the service, but not much. However, good luck with ICO.
|
|
|
|
peleanket
Newbie
Offline
Activity: 74
Merit: 0
|
|
April 25, 2018, 04:40:22 PM |
|
Who are the founders?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 04:41:43 PM |
|
Who are the founders?
The team is international and includes experienced researchers, software developers and marketing professionals from UK, USA and Switzerland. The algorithm was developed by physics scientists Iskender Syrgabekov and mathematician Zadauly Erkin. You can check their patents here: https://patents.justia.com/inventor/iskender-syrgabekov
|
|
|
|
tuchenvi
Jr. Member
Offline
Activity: 154
Merit: 2
|
|
April 25, 2018, 04:51:57 PM |
|
Do we need An Absolute Protection From Quantum Supremacy? There is no quantum computer yet.
|
|
|
|
|