Pages:
Author

Topic: 📌📌[ANN] OFID - DISCONTINUED (Read 751 times)

full member
Activity: 501
Merit: 127
December 21, 2017, 08:16:28 PM
#52
You have OFID number and say it's great! Are you kidding on us? You have ID! ID! Guys! Are you going with ID that is just a number (just a number!) to compete with others projects? Sounds good. Sounds very good.
And what about OPAL? Oh you say OPAL is such a beautiful project! The project is doing by commecial organizations that aimed to get money, not spread their algorithms. The algorithms are not ready and who knows will they be realized or not.

I see your comments where you're trying to tell us how cool your guys are. But your guys don't show us really great product. Obviously you campaign is aimed to getting money from ICO. Even your site is focued on getting money.

So don't fool us guys. Just say that you wanna as much money as you can to get.

You're proud about your contracts written on Go. And what is this? Just a bunch of text storing on GitHub.

So I don't see any value in your "product" except your loud words about how great your team is.

Just another bla-bla-bla project. It's really sad.

Hi, this project is already discontinued and I didn't agree with some of their terms that led to termination of the bounty campaign and whole support. The project doesn't have structure enough and they cancelled their payment to me.
jr. member
Activity: 50
Merit: 1
December 21, 2017, 02:52:42 PM
#51
You have OFID number and say it's great! Are you kidding on us? You have ID! ID! Guys! Are you going with ID that is just a number (just a number!) to compete with others projects? Sounds good. Sounds very good.
And what about OPAL? Oh you say OPAL is such a beautiful project! The project is doing by commecial organizations that aimed to get money, not spread their algorithms. The algorithms are not ready and who knows will they be realized or not.

I see your comments where you're trying to tell us how cool your guys are. But your guys don't show us really great product. Obviously you campaign is aimed to getting money from ICO. Even your site is focued on getting money.

So don't fool us guys. Just say that you wanna as much money as you can to get.

You're proud about your contracts written on Go. And what is this? Just a bunch of text storing on GitHub.

So I don't see any value in your "product" except your loud words about how great your team is.

Just another bla-bla-bla project. It's really sad.
jr. member
Activity: 50
Merit: 1
December 21, 2017, 02:27:56 PM
#50
How are you gonna implement TEE?
full member
Activity: 501
Merit: 127
December 20, 2017, 07:14:13 AM
#49
This one is a good read about what our project is!  Smiley  https://medium.com/@ofidplatform/the-ofid-idv-platform-5238d2f51c54
newbie
Activity: 28
Merit: 0
December 19, 2017, 05:34:53 AM
#48
Does this project still accept new registration, and what does this project accept newbe account
YES, we accept new registrations, you can have a look at our Bounty Thread and official website:
https://bitcointalksearch.org/topic/m.26466610
www.ofid.io
legendary
Activity: 1610
Merit: 1004
December 19, 2017, 05:32:34 AM
#47
I watch every single point has been explained in lengthy and detailed posts already. There is no question about the potential which this project has at technical sides but my question is about the economical side. What team has planned to help the value of token to be sustained or to prevent it from devaluation in the period when development will be going on. There is big and long roadmap to achieve the goals.
newbie
Activity: 28
Merit: 0
December 19, 2017, 05:22:28 AM
#46
Open Algorithms (OPAL)
The OPAL project is an advanced model that aims at creating an extensive list of available data tobe inspected and analyzed without violating personal data privacy. Open Algorithms paradigm involves moving algorithm to the data and implementing at the data repository location so that the unprocessed data is never out of its repository. Only cumulative answers are reverted. Anothermain aspect is that the algorithms must be scrutinized by experts to be “secure” from any privacy requirement violation.
In future, OFID aims to use the open algorithms pattern to facilitate sharing of more rich information by the participants in the ecosystem. The OFID platform eventually shifts from an attributes-based unidirectional model to a richer algorithms-based interaction.
newbie
Activity: 1
Merit: 0
December 19, 2017, 05:05:16 AM
#45
Does this project still accept new registration, and what does this project accept newbe account
newbie
Activity: 28
Merit: 0
December 19, 2017, 05:03:20 AM
#44
Distributed Storage
Many organizations store the confidential data like PII in their data centers and storage areanetworks. However, data centers are the most vulnerable elements in an organization. When asecurity breach occurs on the storage server, sensitive data gets into the hands of the attackercausing huge losses to the organization and people. This is where distributed storage comes to the rescue.

Distributed storage system has adopted secret sharing scheme which is widely used to split secret data into various different kinds of pieces and stored at different locations. To retrieve this data, you should gather the plural pieces and construct that data. This method is known as Shamir’s (k, n)threshold scheme. The main idea is to split a secret S into n pieces (shares) for storage. To retrievethat data, a number of k pieces should be gathered for reconstruction. This theoretic securityfurnishes information that even if an attacker collects shares as far as they are less than the giventhreshold being represented by k, then they cannot get any information.
newbie
Activity: 28
Merit: 0
December 19, 2017, 04:55:17 AM
#43
Trusted Computing
The most vulnerable segment of the verification system is the management server. Identity data is stored on a distributed cloud. If a separate node is hacked, it will not affect the Identity data.However, if the management server is hacked or invaded, the data will be lost. Trusted computingoffers a perfect solution to this challenge.
Trusted computing is a paradigm aimed at enforcing trustworthy behaviour on computing platformsby identifying a complete ‘chain of trust’ and a list of all hardware and software that has been used.This chain of software can then be compared to a list of known ‘good’ applications.
newbie
Activity: 28
Merit: 0
December 19, 2017, 04:46:22 AM
#42
The Double-Layer Public Key Structure
The existing technology that protects data on the Internet is mainly dependent on discrete algorithm logarithm problem. However, the rapidly increasing computational power of quantumcomputers combined with the shor algorithm can crack the current public-key cryptographyschemes. It means the current encryption algorithms are no longer safe. This is where the double-layer public key structure comes to the rescue. Leveraging this double-layer public key structure,the OFID platform has upgraded the existing encryption algorithm to implement the latest securitystandards, effectively resisting external attacks.
newbie
Activity: 28
Merit: 0
December 19, 2017, 04:39:19 AM
#41
Bi-directional Signature
Bi-directional Signature is a confirmative proof that both parties have approved the signed content.
a. To mark the consent of both parties. When the User submits the signed PII, a certificated validator signs the data again to verify the validity of the data.
b. To form a correspondence between addresses. The data validated on an application corresponding to an address under the same OFID number can be used on an application corresponding to another address under the current OFID number without having to re-validate it.
c. To correspond an anonymous blockchain address to a real name OFID address. Attributes such as skill, character, and quality etc. lack official certification. However, the OFID platform allows public to recognize and confirm such attributes of a user. OFID allows multiple users to endorse a single user. In such cases, there would be multiple Bi-directional Signatures on the same content. In this way, an unofficial verification and evaluation system can be established.
newbie
Activity: 28
Merit: 0
December 19, 2017, 04:07:53 AM
#40
Blockchain is not enough for a trustworthy identity environment. OFID introduces trusted computing to gain maximum benefit from the hard-to-alter characteristics of hardware. Also OFID will migrate our solutions in line with the open algorithm.
newbie
Activity: 28
Merit: 0
December 19, 2017, 01:20:56 AM
#39
it is very exciting to join this project, it is very promising and has a very good roadmap, I hope this project becomes one of the successful projects in the future, and have a good progress



They have a great roadmap but I'm still confuse because there are a lot of ICO occur recently.
How can I'm explain for new investor about this project OFID, what's the advantage that OFID have but other well known ICO doesn't have ?
Quite a few difference:

1. OFID number
The OFID platform issues a OFID number to every user. Each OFID number is mapped to multiple identity addresses. Each identity address is used solely to correspond with one service provider.This methodology ensures that user identity is not comprised by identity theft even through data mining.

2. Bi-directional Signature
Bi-directional Signature is a confirmative proof that both parties have approved the signed content.
a. To mark the consent of both parties. When the User submits the signed PII, a certificated validator signs the data again to verify the validity of the data.
b. To form a correspondence between addresses. The data validated on an application corresponding to an address under the same OFID number can be used on an application corresponding to another address under the current OFID number without having to re-validate it.
c. To correspond an anonymous blockchain address to a real name OFID address. Attributes such as skill, character, and quality etc. lack official certification. However, the OFID platform allows public to recognize and confirm such attributes of a user. OFID allows multiple users to endorse a single user. In such cases, there would be multiple Bi-directional Signatures on the same content. In this way, an unofficial verification and evaluation system can be established.

3. The Double-Layer Public Key Structure
The existing technology that protects data on the Internet is mainly dependent on discrete algorithm logarithm problem. However, the rapidly increasing computational power of quantumcomputers combined with the shor algorithm can crack the current public-key cryptographyschemes. It means the current encryption algorithms are no longer safe. This is where the double-layer public key structure comes to the rescue. Leveraging this double-layer public key structure,the OFID platform has upgraded the existing encryption algorithm to implement the latest securitystandards, effectively resisting external attacks.

4. Trusted Computing
The most vulnerable segment of the verification system is the management server. Identity data is stored on a distributed cloud. If a separate node is hacked, it will not affect the Identity data.However, if the management server is hacked or invaded, the data will be lost. Trusted computingoffers a perfect solution to this challenge.
Trusted computing is a paradigm aimed at enforcing trustworthy behaviour on computing platformsby identifying a complete ‘chain of trust’ and a list of all hardware and software that has been used.This chain of software can then be compared to a list of known ‘good’ applications.


5. Distributed Storage
Many organizations store the confidential data like PII in their data centers and storage areanetworks. However, data centers are the most vulnerable elements in an organization. When asecurity breach occurs on the storage server, sensitive data gets into the hands of the attackercausing huge losses to the organization and people. This is where distributed storage comes to the rescue.

Distributed storage system has adopted secret sharing scheme which is widely used to split secret data into various different kinds of pieces and stored at different locations. To retrieve this data, you should gather the plural pieces and construct that data. This method is known as Shamir’s (k, n)threshold scheme. The main idea is to split a secret S into n pieces (shares) for storage. To retrievethat data, a number of k pieces should be gathered for reconstruction. This theoretic securityfurnishes information that even if an attacker collects shares as far as they are less than the giventhreshold being represented by k, then they cannot get any information.

6. Open Algorithms (OPAL)
The OPAL project is an advanced model that aims at creating an extensive list of available data tobe inspected and analyzed without violating personal data privacy. Open Algorithms paradigm involves moving algorithm to the data and implementing at the data repository location so that the unprocessed data is never out of its repository. Only cumulative answers are reverted. Anothermain aspect is that the algorithms must be scrutinized by experts to be “secure” from any privacy requirement violation.
In future, OFID aims to use the open algorithms pattern to facilitate sharing of more rich information by the participants in the ecosystem. The OFID platform eventually shifts from an attributes-based unidirectional model to a richer algorithms-based interaction.
legendary
Activity: 1148
Merit: 1006
Black Panther
December 19, 2017, 12:07:07 AM
#38
it is very exciting to join this project, it is very promising and has a very good roadmap, I hope this project becomes one of the successful projects in the future, and have a good progress



They have a great roadmap but I'm still confuse because there are a lot of ICO occur recently.
How can I'm explain for new investor about this project OFID, what's the advantage that OFID have but other well known ICO doesn't have ?
newbie
Activity: 28
Merit: 0
December 19, 2017, 12:04:08 AM
#37
it is very exciting to join this project, it is very promising and has a very good roadmap, I hope this project becomes one of the successful projects in the future, and have a good progress


Let's go ahead!
jr. member
Activity: 294
Merit: 1
December 18, 2017, 10:16:13 PM
#36
it is very exciting to join this project, it is very promising and has a very good roadmap, I hope this project becomes one of the successful projects in the future, and have a good progress

newbie
Activity: 28
Merit: 0
December 18, 2017, 09:45:21 PM
#35
OFID number:
The OFID platform issues a OFID number to every user. Each OFID number is mapped to multiple identity addresses. Each identity address is used solely to correspond with one service provider.This methodology ensures that user identity is not comprised by identity theft even through data mining.
newbie
Activity: 28
Merit: 0
December 18, 2017, 09:13:46 PM
#34
I think do not have to think long to join this project, a very good idea to follow, I really like the roadmap and detailed information provided, very professional, hopefully run well
Thank you for having your confidence on OFID!
member
Activity: 392
Merit: 10
December 18, 2017, 10:21:40 AM
#33
I think do not have to think long to join this project, a very good idea to follow, I really like the roadmap and detailed information provided, very professional, hopefully run well
Pages:
Jump to: