Bitcoin Forum
April 20, 2024, 08:20:24 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 »
  Print  
Author Topic: [ANN][STEEL][ICO]SISHUB - SECURITY INTELLIGENT SYSTEMS,DECENTRALIZED MESSENGER  (Read 26742 times)
qqniceguyqq
Member
**
Offline Offline

Activity: 358
Merit: 10


View Profile
August 17, 2018, 06:06:51 AM
 #301

PGP algorithm exists  for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it.
1713601224
Hero Member
*
Offline Offline

Posts: 1713601224

View Profile Personal Message (Offline)

Ignore
1713601224
Reply with quote  #2

1713601224
Report to moderator
It is a common myth that Bitcoin is ruled by a majority of miners. This is not true. Bitcoin miners "vote" on the ordering of transactions, but that's all they do. They can't vote to change the network rules.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713601224
Hero Member
*
Offline Offline

Posts: 1713601224

View Profile Personal Message (Offline)

Ignore
1713601224
Reply with quote  #2

1713601224
Report to moderator
1713601224
Hero Member
*
Offline Offline

Posts: 1713601224

View Profile Personal Message (Offline)

Ignore
1713601224
Reply with quote  #2

1713601224
Report to moderator
app2endad
Member
**
Offline Offline

Activity: 364
Merit: 10


View Profile
August 17, 2018, 06:24:38 AM
 #302

PGP algorithm exists  for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it.
However, why hasn’t this algorithm become popular if it is so effective? There’s smthng screwy about the matter.
qqniceguyqq
Member
**
Offline Offline

Activity: 358
Merit: 10


View Profile
August 17, 2018, 06:52:37 AM
 #303

PGP algorithm exists  for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it.
However, why hasn’t this algorithm become popular if it is so effective? There’s smthng screwy about the matter.
Popularity of PGR encryption has increased in the area of journalists, dissidents, justice fighters and campaigners over the recent years. Analysts appreciate its potential.
blkgranit33
Newbie
*
Offline Offline

Activity: 68
Merit: 0


View Profile
August 17, 2018, 07:21:50 AM
 #304

PGP algorithm exists  for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it.
However, why hasn’t this algorithm become popular if it is so effective? There’s smthng screwy about the matter.
Popularity of PGR encryption has increased in the area of journalists, dissidents, justice fighters and campaigners over the recent years. Analysts appreciate its potential.
Can anyone tell me how this algorithm will work in layman terms? I’d be very grateful!
mitchell69
Jr. Member
*
Offline Offline

Activity: 80
Merit: 1


View Profile
August 17, 2018, 09:31:37 AM
 #305

How will session key be created in the process of communication in the messenger?
alcoholbtc
Full Member
***
Offline Offline

Activity: 336
Merit: 100



View Profile
August 17, 2018, 09:47:38 AM
 #306

What’s the maximum length of  keys supported by PGR encryption algorithm? Or isn’t there any?   
deort
Member
**
Offline Offline

Activity: 406
Merit: 31


View Profile
August 17, 2018, 12:13:49 PM
 #307

Hi. Can i set an unlimited validity of encryption key? Or is it obligatory to set some particular validity period?   
momo
Newbie
*
Offline Offline

Activity: 294
Merit: 0


View Profile
August 17, 2018, 12:23:07 PM
 #308

How will key containers be protected within the framework of your ecosystem? It’s important for me  to make it impossible for anyone else to use it even in case of physical access is gained.
unkletoken
Full Member
***
Offline Offline

Activity: 350
Merit: 100



View Profile
August 17, 2018, 01:08:06 PM
 #309

PGP algorithm exists  for a long time. It seems to me that it has been already hacked repeatedly, so it isn’t rational to use it in STEEL ecosystem.
There have been no known cases of crack of an PRG protocol carried out with the help of cryptographic or computing methods. If you find the info about real case of crack, please tell the platform representatives about it.
However, why hasn’t this algorithm become popular if it is so effective? There’s smthng screwy about the matter.
Popularity of PGR encryption has increased in the area of journalists, dissidents, justice fighters and campaigners over the recent years. Analysts appreciate its potential.
Can anyone tell me how this algorithm will work in layman terms? I’d be very grateful!
PGP encryption is based on public keys exchange method, in case of usage of which a pair of keys is responsible for encryption and decryption of data. The principle of described in details in our WP.
unkletoken
Full Member
***
Offline Offline

Activity: 350
Merit: 100



View Profile
August 17, 2018, 01:16:33 PM
 #310

How will session key be created in the process of communication in the messenger?
A session key is generated with the help of secure random number generator. A session key is encrypted with the help of an open key of a recipient with the usage of  RSA or Elgamal  algorithms (depending on the type of recipient’s key).
unkletoken
Full Member
***
Offline Offline

Activity: 350
Merit: 100



View Profile
August 17, 2018, 01:24:44 PM
 #311

What’s the maximum length of  keys supported by PGR encryption algorithm? Or isn’t there any?   
PGP supports three types of keys. It’s length is from  1024 to 4096 bits depending on technology.
unkletoken
Full Member
***
Offline Offline

Activity: 350
Merit: 100



View Profile
August 17, 2018, 01:30:05 PM
 #312

Hi. Can i set an unlimited validity of encryption key? Or is it obligatory to set some particular validity period?   
Each type of keys can have limited or unlimited period.
unkletoken
Full Member
***
Offline Offline

Activity: 350
Merit: 100



View Profile
August 17, 2018, 01:37:07 PM
 #313

How will key containers be protected within the framework of your ecosystem? It’s important for me  to make it impossible for anyone else to use it even in case of physical access is gained.
A secret phrase is used to protect key container.
lilurammm
Newbie
*
Offline Offline

Activity: 82
Merit: 0


View Profile
August 17, 2018, 04:20:06 PM
 #314

Hello. Will the size of the data be changed after it gets encrypted? As a rule, the size reduces.       
hichemdj
Newbie
*
Offline Offline

Activity: 71
Merit: 0


View Profile
August 17, 2018, 06:19:02 PM
 #315

Why did you decide to use several encryption mechanisms in your system at the same time?  It seemed to me that one would be enough. 
gilberpro
Newbie
*
Offline Offline

Activity: 105
Merit: 0


View Profile
August 17, 2018, 08:17:00 PM
 #316

Good evening. How many tokens were put on sale within the framework of the ICO?   
RedlehA04
Newbie
*
Offline Offline

Activity: 106
Merit: 0


View Profile
August 17, 2018, 10:21:28 PM
 #317

What will the nominal price of the token be during the following sale stage?     
gilberpro
Newbie
*
Offline Offline

Activity: 105
Merit: 0


View Profile
August 18, 2018, 06:07:46 AM
 #318

I believe that you should refuse using the AES encryption method. As you can seem, it doesn’t succeed in protection of US government data.   
MkrKing
Member
**
Offline Offline

Activity: 322
Merit: 12


View Profile
August 18, 2018, 06:41:24 AM
 #319

I believe that you should refuse using the AES encryption method. As you can seem, it doesn’t succeed in protection of US government data.   
This is one of the most advanced encryption algorithms. Believe me, the STEEL team is experienced and it wouldn’t use the methods which won’t work out or have turned out to be ineffective.     
gilberpro
Newbie
*
Offline Offline

Activity: 105
Merit: 0


View Profile
August 18, 2018, 07:05:41 AM
 #320

I believe that you should refuse using the AES encryption method. As you can seem, it doesn’t succeed in protection of US government data.   
This is one of the most advanced encryption algorithms. Believe me, the STEEL team is experienced and it wouldn’t use the methods which won’t work out or have turned out to be ineffective.     
But i constantly hear the news about leakage of secret US government info, that’s what made me doubting encryption quality.   
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!