Pages:
Author

Topic: 📌📌[ANN] OFID - DISCONTINUED - page 3. (Read 751 times)

newbie
Activity: 28
Merit: 0
December 16, 2017, 05:41:01 AM
#12
How does OFID differ from other blockchain based identity systems?

Quite a few difference:

1. OFID number
The OFID platform issues a OFID number to every user. Each OFID number is mapped to multiple identity addresses. Each identity address is used solely to correspond with one service provider.This methodology ensures that user identity is not comprised by identity theft even through data mining.

2. Bi-directional Signature
Bi-directional Signature is a confirmative proof that both parties have approved the signed content.
a. To mark the consent of both parties. When the User submits the signed PII, a certificated validator signs the data again to verify the validity of the data.
b. To form a correspondence between addresses. The data validated on an application corresponding to an address under the same OFID number can be used on an application corresponding to another address under the current OFID number without having to re-validate it.
c. To correspond an anonymous blockchain address to a real name OFID address. Attributes such as skill, character, and quality etc. lack official certification. However, the OFID platform allows public to recognize and confirm such attributes of a user. OFID allows multiple users to endorse a single user. In such cases, there would be multiple Bi-directional Signatures on the same content. In this way, an unofficial verification and evaluation system can be established.

3. The Double-Layer Public Key Structure
The existing technology that protects data on the Internet is mainly dependent on discrete algorithm logarithm problem. However, the rapidly increasing computational power of quantumcomputers combined with the shor algorithm can crack the current public-key cryptographyschemes. It means the current encryption algorithms are no longer safe. This is where the double-layer public key structure comes to the rescue. Leveraging this double-layer public key structure,the OFID platform has upgraded the existing encryption algorithm to implement the latest securitystandards, effectively resisting external attacks.

4. Trusted Computing
The most vulnerable segment of the verification system is the management server. Identity data is stored on a distributed cloud. If a separate node is hacked, it will not affect the Identity data.However, if the management server is hacked or invaded, the data will be lost. Trusted computingoffers a perfect solution to this challenge.
Trusted computing is a paradigm aimed at enforcing trustworthy behaviour on computing platformsby identifying a complete ‘chain of trust’ and a list of all hardware and software that has been used.This chain of software can then be compared to a list of known ‘good’ applications.


5. Distributed Storage
Many organizations store the confidential data like PII in their data centers and storage areanetworks. However, data centers are the most vulnerable elements in an organization. When asecurity breach occurs on the storage server, sensitive data gets into the hands of the attackercausing huge losses to the organization and people. This is where distributed storage comes to the rescue.

Distributed storage system has adopted secret sharing scheme which is widely used to split secret data into various different kinds of pieces and stored at different locations. To retrieve this data, you should gather the plural pieces and construct that data. This method is known as Shamir’s (k, n)threshold scheme. The main idea is to split a secret S into n pieces (shares) for storage. To retrievethat data, a number of k pieces should be gathered for reconstruction. This theoretic securityfurnishes information that even if an attacker collects shares as far as they are less than the giventhreshold being represented by k, then they cannot get any information.

6. Open Algorithms (OPAL)
The OPAL project is an advanced model that aims at creating an extensive list of available data tobe inspected and analyzed without violating personal data privacy. Open Algorithms paradigm involves moving algorithm to the data and implementing at the data repository location so that the unprocessed data is never out of its repository. Only cumulative answers are reverted. Anothermain aspect is that the algorithms must be scrutinized by experts to be “secure” from any privacy requirement violation.
In future, OFID aims to use the open algorithms pattern to facilitate sharing of more rich information by the participants in the ecosystem. The OFID platform eventually shifts from an attributes-based unidirectional model to a richer algorithms-based interaction.
jr. member
Activity: 50
Merit: 1
December 16, 2017, 03:34:02 AM
#11
How does OFID differ from other blockchain based identity systems?
newbie
Activity: 28
Merit: 0
December 16, 2017, 03:01:44 AM
#10
We are trying to build the safest platform for IDV.
full member
Activity: 501
Merit: 127
December 15, 2017, 10:21:12 PM
#9
Bounty campaign will be available in a while. For now, we would like the community to see what's the project all about  Smiley
newbie
Activity: 28
Merit: 0
December 15, 2017, 09:51:55 PM
#8
Can I help you translate the ANN Thread to Indonesian?If needed in my linguage.
Hopefully your project in success.Thank you

Hope you can join our bounty by writing articles in Indonesian.
newbie
Activity: 28
Merit: 0
December 15, 2017, 09:17:03 PM
#7
Interesting project, great roadmap plan with a great team, do you have a bounty campaign program for OFID project dev? if any i am interested to participate in this project.

Thank you for your interest.
full member
Activity: 854
Merit: 100
SportsIcon - Connect With Your Sports Heroes
December 15, 2017, 09:09:06 PM
#6
Interesting project, great roadmap plan with a great team, do you have a bounty campaign program for OFID project dev? if any i am interested to participate in this project.
full member
Activity: 721
Merit: 100
December 15, 2017, 09:08:10 PM
#5
Can I help you translate the ANN Thread to Indonesian?If needed in my linguage.
Hopefully your project in success.Thank you
newbie
Activity: 28
Merit: 0
December 15, 2017, 09:00:37 PM
#4
we are going to launch a Bounty campaign very soon.
legendary
Activity: 2450
Merit: 1047
December 15, 2017, 08:51:02 PM
#3
Very interesting concept and roadmap, it's nice to know that Asians are participating in the development and growth of cryptocurrency in this region I'll definitely take part in bounty if they are going to set up one this is the kind of project worthy to promote.
full member
Activity: 501
Merit: 127
December 15, 2017, 08:31:29 PM
#2
reserved for further announcement and additional information that will be made by devs
full member
Activity: 501
Merit: 127
December 15, 2017, 08:30:51 PM
#1
Disclaimer: This ANN Thread will be answered directly by OFID Devs.







NOTICE:

THIS PROJECT HAS DISCONTINUED BY DEVS AND AFTER LEARNING THAT THEIR MARKETING STRUCTURE ISN'T ENOUGH THAT LED TO TERMINATION OF MY SUPPORT TO THIS ICO. THE SUPPORT ONLY LASTED FOR 4 DAYS

I KEEP ON ASKING DEVELOPERS TO MAKE AN OFFICIAL ANNOUNCEMENT BUT THEY ARE NO WHERE TO BE FOUND OR CONTACTED. IF THE COMMUNITY HAS QUESTIONS, PLEASE REACH OUR SLACK GROUP:

https://join.slack.com/t/ofid/shared_invite/enQtMjY5NDg3MzIwMTYwLTg1ZTY3NTcwOWRkZTQ2OTRmYmJjNTk4OGMxNTUxMjY1M2M0ZjIyOGYyNzQyYjBkNDYwNDZhZjdkNmM4ZDNhY2U

Disclaimer: I am not affiliated nor part of OFID team. I was only hired to manage their bounty campaign and when I learned that their marketing isn't active and developers barely respond to my follow ups, I immediately removed the bounty campaign which only lasted for 4 days. Payment for my service from this project that supposedly during the whole campaign got returned as well (payment was on hold via escrow). Though developers can't be contacted, I am still in touch with all participants and doing my best to answer all and explain the situation. Thank you for understanding and once again I am apologizing and thankful to those who expressed their help for 4 days.


 


OUR STORY
OFID provides a better way to manage your identity asset. You can easily access personalized online services with OFID verification function. OFID aims to build a personal data ecosystem, in which users can completely control their digital identity and online privacy.

OUR VISION
Freedom comes from social trust and social trust comes from order. Therefore, identity is the starting point for freedom. We need a better form of persistent online identity that supports the public commons and the values of civil society.

TECHNOLOGY
Blockchain is not enough for a trustworthy identity environment. We introduce trusted computing to gain maximum benefit from the hard-to-alter characteristics of hardware. Also we’ll migrate our solutions in line with the open algorithm.




ROADMAP





HOW IT WORKS






THE CHALLENGE

Our digital identities are fragmented and duplicated across the internet, making them difficult to link together and vulnerable to being stolen, faked, lost or altered, all of which drives significant cost and risk. There is no single authoritative source or credential, which can be used for asserting identity securely in an online transaction. People need to consider the security required for accessing online healthcare records, employment benefits and taxation, and recognize that these types of transaction require an increased level of security when it comes to the assertion of identity.

OUR SOLUTION

We put forward a bottom-up approach to digital identity, a system includes users, service providers and validators.
 
This is what allows digital identity networks to form within their natural boundaries, serving constituents in the ways that suit them best. This is the best way to a global blueprint for digital identity to emerge.









SMART CONTRACT ON GITHUB

[/s]

Pages:
Jump to: