Pages:
Author

Topic: [ANN][ICO] IDM Protect - page 3. (Read 14803 times)

copper member
Activity: 112
Merit: 0
July 06, 2018, 07:37:59 AM
I've got another vital question. What will be the price of your product? There are, after all, a lot of very cheap offers on the market now.

Yeah, I'd like to know it too. It's an important nuance.

It will be competitive. Today there are services entering the market with an unprecedentedly low price for services. However, the economic model of these services is not clear. Simply declaring a low price is not enough to have a successful business.
newbie
Activity: 72
Merit: 0
July 06, 2018, 07:09:38 AM
I've got another vital question. What will be the price of your product? There are, after all, a lot of very cheap offers on the market now.

Yeah, I'd like to know it too. It's an important nuance.
newbie
Activity: 72
Merit: 0
July 06, 2018, 06:32:14 AM
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?

That means the possibility of using devices that aren't otherwise being used.People can earn money leasing unused memory on mobile or home devices.

I think this project can surely be very interesting to investors. As for me, I'm just thinking about taking part on the ICO.
copper member
Activity: 112
Merit: 0
July 06, 2018, 06:19:45 AM
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?

That means the possibility of using devices that aren't otherwise being used.People can earn money leasing unused memory on mobile or home devices.
newbie
Activity: 40
Merit: 0
July 06, 2018, 06:00:03 AM
What do you mean when you write in the White paper that the system gives a second life to the memory of various devices?
newbie
Activity: 31
Merit: 0
July 06, 2018, 05:50:13 AM
I have one more question. Are there any restrictions on the amount of memory that miners should provide in the lease?

Ok, what makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.

I like the idea that this project can benefit both users and miners.
copper member
Activity: 112
Merit: 0
July 06, 2018, 05:36:30 AM
I have one more question. Are there any restrictions on the amount of memory that miners should provide in the lease?

Ok, what makes IDM unique is that miners can rent out as much space as they want and still bring in revenue.
newbie
Activity: 72
Merit: 0
July 06, 2018, 05:20:34 AM
I have one more question. Are there any restrictions on the amount of memory that miners should provide in the lease?
newbie
Activity: 31
Merit: 0
July 06, 2018, 05:00:08 AM
You confirm that it's impossible to hack the algorithm?

Well, the fact is that to hack a single block of data (16 bytes) with the simplest (second) level of protection, the most powerful computer will need more than 42 sextillion epochs of the Universe.

In this case there are no computing resources or methods in the world today or foreseen in the near future capable of breaking the protection offered by the IDM service.
copper member
Activity: 112
Merit: 0
July 06, 2018, 04:51:30 AM
You confirm that it's impossible to hack the algorithm?

Well, the fact is that to hack a single block of data (16 bytes) with the simplest (second) level of protection, the most powerful computer will need more than 42 sextillion epochs of the Universe.
newbie
Activity: 68
Merit: 0
July 06, 2018, 04:38:04 AM
You confirm that it's impossible to hack the algorithm?
copper member
Activity: 112
Merit: 0
July 06, 2018, 04:25:40 AM
Sure! When processing a source file, SIZE automatically creates a file that can be considered a "key" in the cryptographic sense. This "key file" is always created only once and never repeated. Even if the same file is converted several times using SIZE technology, a new "key" file will be created each time. The conversion process itself is not determined by the "key", and the settings of the program are selected by the user at random. You can read more on our website - www.myidm.io Everything is explained there.

Could you please tell me what is their official status?
Could you please tell me what is their official status?
Could you please tell me what is their official status?
Could you please tell me what is their official status?

Yes! The IDM tokens are not a security, financial instrument or an electronic currency; are not registered under the US Securities Act and are not subject to laws on securities in other countries  where token owners are residing. IDM tokens may not be transferred or sold to individuals or legal entities from countries where financial transactions with tokens are restricted or prohibited by law or will be restricted or prohibited after the entry into force of this document.
member
Activity: 336
Merit: 10
July 05, 2018, 01:45:31 PM
This is a research and physical team with experience in the field of security. I would like to watch the team and product in the future.
member
Activity: 336
Merit: 10
July 05, 2018, 01:45:09 PM
This is a research and physical team with experience in the field of security. I would like to watch the team and product in the future.
newbie
Activity: 76
Merit: 0
July 05, 2018, 06:49:06 AM
As I understand it, it is not an encryption algorithm, but it protects the information, as well as an absolute cipher.

Yeah, it's something new. I've never heard of that before. You should always keep your eyes open to not miss something interesting.
newbie
Activity: 68
Merit: 0
July 05, 2018, 06:25:19 AM
As I understand it, it is not an encryption algorithm, but it protects the information, as well as an absolute cipher.
copper member
Activity: 112
Merit: 0
July 05, 2018, 05:57:29 AM
Sure! When processing a source file, SIZE automatically creates a file that can be considered a "key" in the cryptographic sense. This "key file" is always created only once and never repeated. Even if the same file is converted several times using SIZE technology, a new "key" file will be created each time. The conversion process itself is not determined by the "key", and the settings of the program are selected by the user at random. You can read more on our website - www.myidm.io Everything is explained there.
copper member
Activity: 112
Merit: 0
July 05, 2018, 04:48:19 AM
Hello! Does this new algorithm have patents, certificates?

Hello! Yes, of course. The technology is protected by 23 international patents and has been successfully tested in the Cavendish laboratory of Cambridge University in the UK. You can find the, on myidm.io.
newbie
Activity: 35
Merit: 0
July 05, 2018, 04:14:20 AM
Hello! Does this new algorithm have patents, certificates?
newbie
Activity: 35
Merit: 0
July 05, 2018, 03:35:25 AM
Hello! I've read about this post-quantum encryption technology, and I find it very interesting.

Hi! I've never heard about something like this before.

I heard something like that, but here it's more in details. It's really an awesome project,

What is it about? Protection of data in the cloud?

The system uses a new algorithm which gives 100% protection against hackers and data breaches.

I'd like to understand all the technical details.
Pages:
Jump to: