Bitcoin Forum
November 01, 2024, 09:13:30 AM *
News: Bitcoin Pumpkin Carving Contest
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 83 »
  Print  
Author Topic: [ANN][ICO] IDM Protect  (Read 14796 times)
shozenelz
Newbie
*
Offline Offline

Activity: 33
Merit: 0


View Profile
May 10, 2018, 10:26:17 PM
 #141

I would also like to learn more about the algorithm.
IDM Protect (OP)
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
May 10, 2018, 11:09:32 PM
 #142

I would also like to learn more about the algorithm.

You can find out more by reading our White Paper: https://www.myidm.io/img/doc/wp_en.pdf
wirenos
Jr. Member
*
Offline Offline

Activity: 75
Merit: 1


View Profile
May 11, 2018, 12:05:53 AM
 #143

But can you tell about the effects of the algorithm in a nutshell?
IDM Protect (OP)
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
May 11, 2018, 12:39:51 AM
 #144

But can you tell about the effects of the algorithm in a nutshell?

Our patented SIZE algorithm supports excellent file protection against loss (damage) and can guarantee file recovery from only 2% of remaining data.
euroconnections18
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
May 11, 2018, 01:18:11 AM
 #145

The ability to recover lost data is also relevant
sotik x
Member
**
Offline Offline

Activity: 166
Merit: 14


View Profile
May 11, 2018, 02:25:54 AM
 #146

What's wrong with what's already available?
wirenos
Jr. Member
*
Offline Offline

Activity: 75
Merit: 1


View Profile
May 11, 2018, 03:03:50 AM
 #147

What's wrong with what's already available?

There's hacking of the cloud and thieves are stealing data.
euroconnections18
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
May 11, 2018, 04:12:57 AM
 #148

As far as I know, the replication method is now used to store data.
Herm4nEstr4da
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
May 11, 2018, 04:30:40 AM
 #149

As far as I know, the replication method is now used to store data.

What's the point?
euroconnections18
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
May 11, 2018, 05:02:18 AM
 #150

As far as I know, the replication method is now used to store data.

What's the point?

It's hard to explain.
IDM Protect (OP)
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
May 11, 2018, 05:38:54 AM
 #151

As far as I know, the replication method is now used to store data.

What's the point?

This method involves making copies of the source file that will be stored as additional backup.
wirenos
Jr. Member
*
Offline Offline

Activity: 75
Merit: 1


View Profile
May 11, 2018, 06:04:48 AM
 #152

I've heard about the method of redundant coding. But that looks like it has problems too.
Herm4nEstr4da
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
May 11, 2018, 06:43:43 AM
 #153

Yes. And I think that this algorithm has its own weaknesses.
euroconnections18
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
May 11, 2018, 07:14:06 AM
 #154

Yes. And I think that this algorithm has its own weaknesses.

Yeah, of course.
IDM Protect (OP)
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
May 11, 2018, 07:31:19 AM
 #155

Yes. And I think that this algorithm has its own weaknesses.

Yeah, of course.

Theoretically, the only method you can use to access the information protected by SIZE technology are sets of data packets.
euroconnections18
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
May 11, 2018, 07:53:41 AM
 #156

Yes. And I think that this algorithm has its own weaknesses.

Yeah, of course.

Theoretically, the only method you can use to access the information protected by SIZE technology are sets of data packets.

That's what I was saying.
IDM Protect (OP)
Copper Member
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
May 11, 2018, 08:25:32 AM
 #157

Yes. And I think that this algorithm has its own weaknesses.

Yeah, of course.

Theoretically, the only method you can use to access the information protected by SIZE technology are sets of data packets.

That's what I was saying.

So hacking one block of data (16 bytes) with the simplest (second) level of protection, the most powerful computer will need more than 42 sextillion epochs of the Universe.
kolnides
Jr. Member
*
Offline Offline

Activity: 294
Merit: 1


View Profile
May 11, 2018, 10:07:49 AM
 #158

Hey everyone! I liked the idea that cryptocurrency users have a service to use cryptocurrency wallets without downloading on your computer.
wirenos
Jr. Member
*
Offline Offline

Activity: 75
Merit: 1


View Profile
May 11, 2018, 10:39:14 AM
 #159

Hey everyone! I liked the idea that cryptocurrency users have a service to use cryptocurrency wallets without downloading on your computer.

Yeah, it sounds interesting.
shozenelz
Newbie
*
Offline Offline

Activity: 33
Merit: 0


View Profile
May 11, 2018, 11:01:55 AM
 #160

How do you pay for that?
Pages: « 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 83 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!