IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 25, 2018, 09:01:32 AM |
|
I still have some questions about the ICO. When will it start?
It starts on the 28th of May and will continue for 2 months. Thank you. And what's the tokens' preliminary price and the minimum investment? The preliminary price is 0.01 ETH. It may change with the ETH rate. What's the mininmum investment? 0.1 ETH
|
|
|
|
bealarev
Jr. Member
Offline
Activity: 44
Merit: 2
|
|
May 25, 2018, 09:07:31 AM |
|
I still have some questions about the ICO. When will it start?
It starts on the 28th of May and will continue for 2 months. Thank you. And what's the tokens' preliminary price and the minimum investment? The preliminary price is 0.01 ETH. It may change with the ETH rate. What's the mininmum investment? Got it. Thank you for the information. I have to think it over.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 25, 2018, 09:11:11 AM |
|
I still have some questions about the ICO. When will it start?
It starts on the 28th of May and will continue for 2 months. Thank you. And what's the tokens' preliminary price and the minimum investment? The preliminary price is 0.01 ETH. It may change with the ETH rate. What's the mininmum investment? Got it. Thank you for the information. I have to think it over. You're always welcome.
|
|
|
|
rialoam
Newbie
Offline
Activity: 18
Merit: 0
|
|
May 25, 2018, 10:02:37 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
|
|
|
|
d3reeb1nho
Newbie
Offline
Activity: 56
Merit: 0
|
|
May 25, 2018, 10:13:34 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage.
|
|
|
|
ZhN
Newbie
Offline
Activity: 11
Merit: 0
|
|
May 25, 2018, 10:18:27 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud.
|
|
|
|
Carlo777Omari
Newbie
Offline
Activity: 61
Merit: 0
|
|
May 25, 2018, 10:23:27 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data.
|
|
|
|
funnyphotoretouch
Newbie
Offline
Activity: 14
Merit: 0
|
|
May 25, 2018, 10:33:44 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data. Yeah, dude. I think it's true. The situation is pretty sad.
|
|
|
|
funnyphotoretouch
Newbie
Offline
Activity: 14
Merit: 0
|
|
May 25, 2018, 10:49:05 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data. Yeah, dude. I think it's true. The situation is pretty sad. These guys say they've got a new algorithm that works better than all modern protection systems? What advantages does it have?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 25, 2018, 11:09:21 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data. Yeah, dude. I think it's true. The situation is pretty sad. These guys say they've got a new algorithm that works better than all modern protection systems? What advantages does it have? You can read in details on the site www.myidm.io
|
|
|
|
funnyphotoretouch
Newbie
Offline
Activity: 14
Merit: 0
|
|
May 25, 2018, 11:35:12 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data. Yeah, dude. I think it's true. The situation is pretty sad. These guys say they've got a new algorithm that works better than all modern protection systems? What advantages does it have? You can read in details on the site www.myidm.ioThank you, I'll take a look. But maybe you can tell in a few words?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 25, 2018, 11:45:49 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data. Yeah, dude. I think it's true. The situation is pretty sad. These guys say they've got a new algorithm that works better than all modern protection systems? What advantages does it have? You can read in details on the site www.myidm.ioThank you, I'll take a look. But maybe you can tell in a few words? This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.
|
|
|
|
HackerRevar
Newbie
Offline
Activity: 66
Merit: 0
|
|
May 25, 2018, 11:54:22 AM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data. Yeah, dude. I think it's true. The situation is pretty sad. These guys say they've got a new algorithm that works better than all modern protection systems? What advantages does it have? You can read in details on the site www.myidm.ioThank you, I'll take a look. But maybe you can tell in a few words? This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets. That sounds rather exciting.
|
|
|
|
euroconnections18
Newbie
Offline
Activity: 77
Merit: 0
|
|
May 25, 2018, 12:03:17 PM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data. Yeah, dude. I think it's true. The situation is pretty sad. These guys say they've got a new algorithm that works better than all modern protection systems? What advantages does it have? You can read in details on the site www.myidm.ioThank you, I'll take a look. But maybe you can tell in a few words? This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets. That sounds rather exciting. As I understand, in this case you have no need to use a data-centre.
|
|
|
|
d3reeb1nho
Newbie
Offline
Activity: 56
Merit: 0
|
|
May 25, 2018, 12:12:08 PM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data. Yeah, dude. I think it's true. The situation is pretty sad. These guys say they've got a new algorithm that works better than all modern protection systems? What advantages does it have? You can read in details on the site www.myidm.ioThank you, I'll take a look. But maybe you can tell in a few words? This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets.This technology works uses mathematical algorithms known in digital electronics to protect information. However, these operations have never been combined to special algorithms in special order of mathematical actions and have never been used for protecting information. As a result of applying these algorithms to any digital content, the content becomes overwritten to a new form. This new form is a set of digital packets. That sounds rather exciting. As I understand, in this case you have no need to use a data-centre. Yeah, and that sounds really good cause they take too much space and eveN damage the environment.
|
|
|
|
Pagin
Newbie
Offline
Activity: 44
Merit: 0
|
|
May 25, 2018, 12:37:15 PM |
|
Hi, everyone. It seems to me that this algorithm for data protection is something really new.
I agree because nowadays there are too many problems with data storage. Yeah, all these hackers who steal your photos and private information from the cloud. I don't think any system can save 100% of data. Let us better get to the project.
|
|
|
|
catchandeat
Newbie
Offline
Activity: 98
Merit: 0
|
|
May 25, 2018, 12:47:43 PM |
|
How often does your team uses outsorce specialists? Or you have all the profs you need right at your team? I mean your team is spread around the world, I bet you don't have any headquarter.
|
|
|
|
rialoam
Newbie
Offline
Activity: 18
Merit: 0
|
|
May 25, 2018, 12:55:42 PM |
|
I still can't understand about the miners. Anyone can become a miner?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 25, 2018, 01:04:19 PM |
|
I still can't understand about the miners. Anyone can become a miner?
Yes. They provide memory from their devices for rent and receive the remuneration via blockchain.
|
|
|
|
derr1paskha
Newbie
Offline
Activity: 56
Merit: 0
|
|
May 25, 2018, 01:12:57 PM |
|
I still can't understand about the miners. Anyone can become a miner?
Even retired people and can be miners, I think.
|
|
|
|
|