IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 31, 2018, 08:00:51 PM |
|
Could anyone explain me the uniqueness of this Size algorithm which is mentioned in the White paper?
I've read in the White paper they'll need much free memory from different devices. Hi everyone! The good thing is that memory can be used even from old smartphones. So not only new devices can be used.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 31, 2018, 08:11:17 PM |
|
We're ready to pay money to people who provide us with their free memory.
|
|
|
|
P0RT0CH3RV0
Newbie
Offline
Activity: 29
Merit: 0
|
|
May 31, 2018, 08:26:07 PM |
|
We're ready to pay money to people who provide us with their free memory.
Then of course it's a good opportunity to gain money.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 31, 2018, 08:40:34 PM |
|
I have to add that no modern algorithms can provide users with 100% safe data storage.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 31, 2018, 09:07:31 PM |
|
I have to add that no modern algorithms can provide users with 100% safe data storage.
I must say that it's sad but true. We all hear about these accidents with some photos being stolen from the cloud. Our patented Size algorithm can prevent that situation from happening because there's nearly no possibility to hack it.
|
|
|
|
Peebles917
Newbie
Offline
Activity: 12
Merit: 0
|
|
May 31, 2018, 09:20:21 PM |
|
How is the confidentiality of user data ensured?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 31, 2018, 09:31:22 PM |
|
How is the confidentiality of user data ensured?
If in a few words, there are an infinite number of ways to build files and algorithms provide only general guidelines. The user chooses a specific way of rewriting the information, and no one but him or a person to whom the user has communicated the information about the rewriting rules can access the protected information.
|
|
|
|
Peebles917
Newbie
Offline
Activity: 12
Merit: 0
|
|
May 31, 2018, 09:51:12 PM |
|
How is the confidentiality of user data ensured?
If in a few words, there are an infinite number of ways to build files and algorithms provide only general guidelines. The user chooses a specific way of rewriting the information, and no one but him or a person to whom the user has communicated the information about the rewriting rules can access the protected information. It sounds good. I think it can really prevent the system from a cyberattack.
|
|
|
|
d4s_b0t
Newbie
Offline
Activity: 44
Merit: 0
|
|
May 31, 2018, 10:06:33 PM |
|
I was surprised that today even most safe algorithms don't work properly because of the human factor,
|
|
|
|
sheriffcliff
Newbie
Offline
Activity: 47
Merit: 0
|
|
May 31, 2018, 10:22:37 PM |
|
I was surprised that today even most safe algorithms don't work properly because of the human factor,
It's always a problem, in all spheres, not only in data protection.
|
|
|
|
Peebles917
Newbie
Offline
Activity: 12
Merit: 0
|
|
May 31, 2018, 10:40:26 PM |
|
I was surprised that today even most safe algorithms don't work properly because of the human factor,
It's always a problem, in all spheres, not only in data protection. Yeah, those who succeed to solve this problem should receive a Nobel prize.
|
|
|
|
MinimalnoYeTechno
Jr. Member
Offline
Activity: 36
Merit: 1
|
|
May 31, 2018, 10:54:17 PM |
|
I was surprised that today even most safe algorithms don't work properly because of the human factor,
It's always a problem, in all spheres, not only in data protection. Yeah, those who succeed to solve this problem should receive a Nobel prize. It's really hard to invent something new in this sphere.
|
|
|
|
d4s_b0t
Newbie
Offline
Activity: 44
Merit: 0
|
|
May 31, 2018, 11:07:33 PM |
|
Isn't there at least a theoretical possibility to crack this new algorithm of data protection?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 31, 2018, 11:20:51 PM |
|
Isn't there at least a theoretical possibility to crack this new algorithm of data protection?
Not really. To hack a single block of data (16 bytes) with the simplest (second) level of protection, the most powerful computer will need more than 42 sextillion epochs of the universe.
|
|
|
|
d4s_b0t
Newbie
Offline
Activity: 44
Merit: 0
|
|
May 31, 2018, 11:31:46 PM |
|
Isn't there at least a theoretical possibility to crack this new algorithm of data protection?
Not really. To hack a single block of data (16 bytes) with the simplest (second) level of protection, the most powerful computer will need more than 42 sextillion epochs of the universe. It sounds really impossible, dev.
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
May 31, 2018, 11:45:50 PM |
|
Isn't there at least a theoretical possibility to crack this new algorithm of data protection?
Not really. To hack a single block of data (16 bytes) with the simplest (second) level of protection, the most powerful computer will need more than 42 sextillion epochs of the universe. It sounds really impossible, dev. Thank you. We are offering the data storage market something absolutely new and special.
|
|
|
|
sheriffcliff
Newbie
Offline
Activity: 47
Merit: 0
|
|
May 31, 2018, 11:57:41 PM |
|
When is the data storage service expected to launch?
|
|
|
|
IDM Protect (OP)
Copper Member
Newbie
Offline
Activity: 112
Merit: 0
|
|
June 01, 2018, 12:14:51 AM |
|
When is the data storage service expected to launch?
We plan to launch the IDM service in 2019.
|
|
|
|
sheriffcliff
Newbie
Offline
Activity: 47
Merit: 0
|
|
June 01, 2018, 12:30:22 AM |
|
When is the data storage service expected to launch?
We plan to launch the IDM service in 2019. It's not that long to wait then.
|
|
|
|
fgbvik
Newbie
Offline
Activity: 35
Merit: 0
|
|
June 01, 2018, 12:42:15 AM |
|
I have another question. Does the algorithm require the use of a large number of production facilities?
|
|
|
|
|