IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 04:52:38 PM |
|
Do we need An Absolute Protection From Quantum Supremacy? There is no quantum computer yet.
There is at least one (actually more than one), as Google announced: Researchers from Google are testing a quantum computer with 72 quantum bits, or qubits, scientists reported March 5 at a meeting of the American Physical Society. The team hopes to use the larger quantum chip to demonstrate quantum supremacy for the first time, performing a calculation that is impossible with traditional computers.
|
|
|
|
MinimalnoYeTechno
Jr. Member
Offline
Activity: 36
Merit: 1
|
|
April 25, 2018, 04:55:12 PM |
|
I like the very idea of decentralization. A truly decentralized service can help everyone to earn money. And you use blockchain system. These are not the app-tokens that depend entirely on a one team that can continue to develop application or stop it. This is an application that is supported by the community. An interesting ecosystem is developing.
|
|
|
|
chizhbtc
Member
Offline
Activity: 207
Merit: 10
|
|
April 25, 2018, 04:58:24 PM |
|
How much redundancy does your algorithm generate?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 04:58:53 PM |
|
How much redundancy does your algorithm generate?
At the first level, for example, with the same reliability as mirroring with a 2-fold redundancy, the file size will increase only by 1.5 times from the original. At the 5th level, the redundancy will increase by 7,6 times. Therefore, if we compare our algorithm with a replication method, then to have the same reliability of storage it would be necessary to make 32 backup copies. That is, the redundancy of the replication method, in this case, will be 32 versus 7.6 for the SIZE algorithm!
|
|
|
|
chizhbtc
Member
Offline
Activity: 207
Merit: 10
|
|
April 25, 2018, 05:00:48 PM |
|
Following all the advantages of the technology, we wonder how complex is it? What device do we need to run the algorithm?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 25, 2018, 05:02:03 PM |
|
Following all the advantages of the technology, we wonder how complex is it? What device do we need to run the algorithm?
The SIZE algorithm is simple. It does not use any complex mathematical operations, it works within the framework of standard binary logic, and does not need significant computational capabilities. This also makes possible to use as a data storage the memory on smartphones that work on simple ARM processors.
|
|
|
|
Andeze17
|
|
April 25, 2018, 05:04:58 PM |
|
Do we need An Absolute Protection From Quantum Supremacy? There is no quantum computer yet.
There is at least one (actually more than one), as Google announced: Researchers from Google are testing a quantum computer with 72 quantum bits, or qubits, scientists reported March 5 at a meeting of the American Physical Society. The team hopes to use the larger quantum chip to demonstrate quantum supremacy for the first time, performing a calculation that is impossible with traditional computers.If it seems Google has only just begun to test quantum computers it would seem quantum attacks are still a long time away from being realistic threats. In what timeframe do you estimate they will become a threat?
|
|
|
|
honey0199
Newbie
Offline
Activity: 114
Merit: 0
|
|
April 25, 2018, 07:15:11 PM |
|
It’s indeed a promising project. Can you provide more detailed information about your projects?
|
|
|
|
itod
Legendary
Offline
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
|
|
April 26, 2018, 11:36:13 AM |
|
Nice concept for the coin, but already implemented in Storj and Siacoin. Which new things this brings to the table compared to these two coins?
Thank you for this very important question! Just a brief comparison: - We don’t overload Blockchain network with all management and logging operations. We use it just for payments. Our SIZE algorithm manages the ecosystem autonomously: it controls operations and quality of nodes, manages their reputation and distributes data. - Our goal is not to create the cheapest storage. Our storage is most reliable and secure. So our storage nodes get good payment, while users get best protection and confidentiality. - We don’t use cryptography. We use correction codes which modify source information and convert any digital content into a new form — to the set of digital packages. Each of these individual packages has no functional value and may not even contain a single bit of the original information. To restore the initial information you have to reassemble a complete file from a set of packages in a specific way, performing series of mathematical operations. Thank's for the details, but the last part of an answer is not raising the confidence in a project. What you are saying in essence is that you are not using any accepted encryption/decryption algo, and instead you have used your DIY method. These attempts always bite you in the back once serious cryptographers get in business verifying your method. The fact the parts of files are shuffled around doesn't make them more protected if the encryption scheme can be broken and those parts of the file are exposed.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 26, 2018, 12:42:37 PM |
|
Hi there! Thanks for the interesting questions, we will reply within a day. Right now we are in Frankfurt on Blockchain Summit. There is a great atmosphere and nice people. If you are on the event or in Frankfurt, let me know. We can meet and discuss blockchain technology and our project in person. Cheers!http://blockchainsummitfrankfurt.com/
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 26, 2018, 01:41:32 PM |
|
Do we need An Absolute Protection From Quantum Supremacy? There is no quantum computer yet.
There is at least one (actually more than one), as Google announced: Researchers from Google are testing a quantum computer with 72 quantum bits, or qubits, scientists reported March 5 at a meeting of the American Physical Society. The team hopes to use the larger quantum chip to demonstrate quantum supremacy for the first time, performing a calculation that is impossible with traditional computers.If it seems Google has only just begun to test quantum computers it would seem quantum attacks are still a long time away from being realistic threats. In what timeframe do you estimate they will become a threat? Judging by the speed of development of quantum computing we recon quantum computers will be available to public in less than two years.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 26, 2018, 01:42:41 PM |
|
It’s indeed a promising project. Can you provide more detailed information about your projects?
Wellcome to myidm.io
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
April 26, 2018, 01:43:46 PM |
|
Nice concept for the coin, but already implemented in Storj and Siacoin. Which new things this brings to the table compared to these two coins?
Thank you for this very important question! Just a brief comparison: - We don’t overload Blockchain network with all management and logging operations. We use it just for payments. Our SIZE algorithm manages the ecosystem autonomously: it controls operations and quality of nodes, manages their reputation and distributes data. - Our goal is not to create the cheapest storage. Our storage is most reliable and secure. So our storage nodes get good payment, while users get best protection and confidentiality. - We don’t use cryptography. We use correction codes which modify source information and convert any digital content into a new form — to the set of digital packages. Each of these individual packages has no functional value and may not even contain a single bit of the original information. To restore the initial information you have to reassemble a complete file from a set of packages in a specific way, performing series of mathematical operations. Thank's for the details, but the last part of an answer is not raising the confidence in a project. What you are saying in essence is that you are not using any accepted encryption/decryption algo, and instead you have used your DIY method. These attempts always bite you in the back once serious cryptographers get in business verifying your method. The fact the parts of files are shuffled around doesn't make them more protected if the encryption scheme can be broken and those parts of the file are exposed. Not quite DIY. The technology has already been tested by third party labs, for instance, by Stormshield, Airbus Security subsidiary.
|
|
|
|
itod
Legendary
Offline
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
|
|
April 27, 2018, 10:50:33 AM |
|
Nice concept for the coin, but already implemented in Storj and Siacoin. Which new things this brings to the table compared to these two coins?
Thank you for this very important question! Just a brief comparison: - We don’t overload Blockchain network with all management and logging operations. We use it just for payments. Our SIZE algorithm manages the ecosystem autonomously: it controls operations and quality of nodes, manages their reputation and distributes data. - Our goal is not to create the cheapest storage. Our storage is most reliable and secure. So our storage nodes get good payment, while users get best protection and confidentiality. - We don’t use cryptography. We use correction codes which modify source information and convert any digital content into a new form — to the set of digital packages. Each of these individual packages has no functional value and may not even contain a single bit of the original information. To restore the initial information you have to reassemble a complete file from a set of packages in a specific way, performing series of mathematical operations. Thank's for the details, but the last part of an answer is not raising the confidence in a project. What you are saying in essence is that you are not using any accepted encryption/decryption algo, and instead you have used your DIY method. These attempts always bite you in the back once serious cryptographers get in business verifying your method. The fact the parts of files are shuffled around doesn't make them more protected if the encryption scheme can be broken and those parts of the file are exposed. Not quite DIY. The technology has already been tested by third party labs, for instance, by Stormshield, Airbus Security subsidiary. Great. Can we see the results of these tests? Where were they published? It's also important who in those labs did the review of the technology, is that some person known in the cryptographic community?
|
|
|
|
marytareq92
Jr. Member
Offline
Activity: 165
Merit: 2
|
|
April 29, 2018, 12:24:32 PM |
|
HOW many tokens do you allocate for the bounty campaigns ?
|
MONARCH | THE COMPLETE CRYPTO SOLUTION | Private Sale is LIVE! ▬▬ "Be your own KING" | PRE-SALE: JUNE 15, 2018 ▬▬▬▬▬
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 02, 2018, 03:24:57 PM |
|
HOW many tokens do you allocate for the bounty campaigns ?
Hello! 2% will be set aside for the bounty campaign.
|
|
|
|
kickstarter
|
|
May 02, 2018, 04:43:55 PM |
|
I strongly agree with you on this – "secure data storage is a vital necessity". I feel like everyone's out to spy on me (I have proof, by the way) As far as similar security-centric projects go, what's your main advantage? What's the biggest selling point when it comes to IDM coin?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 03, 2018, 01:47:06 AM |
|
I strongly agree with you on this – "secure data storage is a vital necessity". I feel like everyone's out to spy on me (I have proof, by the way) As far as similar security-centric projects go, what's your main advantage? What's the biggest selling point when it comes to IDM coin?
Thank you for a good question! IDM service provides a decentralized distributed cloud data storage system where the security of data both, from loss and theft, is provided by the unique SIZE algorithm. To procure the distributed data storage, the service will rent a free memory from miners for a reward. The miners all over the world would be able to lease a memory on their devices, including devices morally and technically obsolete (old smartphones, dated hard disks) and receive a continuous remuneration. Our patented algorithm SIZE supports an excellent protection of a file from loss (corruption) and can guarantee a file recovery from only 2% of the remaining data. Administration of the service will be managed by blockchain technology. The properties of SIZE, in information recovery, favorably differ from traditional and widespread methods, like 3 or 4-fold Backup or replication, embedded in Hadoop, ZFS file systems from Google, Luster, etc. The SIZE encoding algorithm can provide the same level of safety with much less redundancy. The use of SIZE technology can significantly reduce the gap between the amount of generated digital information and the amount of available storage. If we are talking about safety, i can tell that in the security of storage SIZE technology has parameters incomparably better than all existing crypto algorithms. Please, read the whitepepper ( https://myidm.io/img/doc/wp_en.pdf) for more information. You're welcome!
|
|
|
|
Fedechka
Member
Offline
Activity: 217
Merit: 12
|
|
May 06, 2018, 05:19:16 PM |
|
Hi everyone! I’ve read that there's a project that provides complete data protection against hacking.
|
|
|
|
kolnides
Jr. Member
Offline
Activity: 294
Merit: 1
|
|
May 06, 2018, 05:23:43 PM |
|
I heard about this too, but really have no idea how it all works.
|
|
|
|
|