Pages:
Author

Topic: [ANN][ICO] IDM Protect - page 75. (Read 14803 times)

newbie
Activity: 77
Merit: 0
May 12, 2018, 04:49:44 AM
And what are the projected revenues?
jr. member
Activity: 75
Merit: 1
May 12, 2018, 04:35:52 AM
If this really works, it should be in great demand.
newbie
Activity: 45
Merit: 0
May 12, 2018, 04:17:45 AM
How do you pay for that?

750,000 users in 2019.
newbie
Activity: 43
Merit: 0
May 11, 2018, 01:27:43 PM
I think IDM Protect also deserves attention as a medium project.
jr. member
Activity: 75
Merit: 1
May 11, 2018, 11:14:24 AM
I wonder how big of an audience there will be.

500,000 I think.
jr. member
Activity: 75
Merit: 1
May 11, 2018, 10:22:12 AM
I think this kind of project will be in demand

Yeah, it's way overdue.
member
Activity: 166
Merit: 14
May 11, 2018, 09:56:46 AM
I think this kind of project will be in demand
copper member
Activity: 112
Merit: 0
May 11, 2018, 08:44:26 AM
How do you pay for that?

The miner's reward is also calculated in IDM tokens
copper member
Activity: 112
Merit: 0
May 11, 2018, 07:46:23 AM
How do you pay for that?

I can tell yoy that the smart contract calculates the number of tokens required for payment and accepts it.
member
Activity: 166
Merit: 14
May 11, 2018, 06:30:26 AM
How do you pay for that?

In tokens, I think.
newbie
Activity: 33
Merit: 0
May 11, 2018, 06:01:55 AM
How do you pay for that?
jr. member
Activity: 75
Merit: 1
May 11, 2018, 05:39:14 AM
Hey everyone! I liked the idea that cryptocurrency users have a service to use cryptocurrency wallets without downloading on your computer.

Yeah, it sounds interesting.
jr. member
Activity: 294
Merit: 1
May 11, 2018, 05:07:49 AM
Hey everyone! I liked the idea that cryptocurrency users have a service to use cryptocurrency wallets without downloading on your computer.
copper member
Activity: 112
Merit: 0
May 11, 2018, 03:25:32 AM
Yes. And I think that this algorithm has its own weaknesses.

Yeah, of course.

Theoretically, the only method you can use to access the information protected by SIZE technology are sets of data packets.

That's what I was saying.

So hacking one block of data (16 bytes) with the simplest (second) level of protection, the most powerful computer will need more than 42 sextillion epochs of the Universe.
newbie
Activity: 77
Merit: 0
May 11, 2018, 02:53:41 AM
Yes. And I think that this algorithm has its own weaknesses.

Yeah, of course.

Theoretically, the only method you can use to access the information protected by SIZE technology are sets of data packets.

That's what I was saying.
copper member
Activity: 112
Merit: 0
May 11, 2018, 02:31:19 AM
Yes. And I think that this algorithm has its own weaknesses.

Yeah, of course.

Theoretically, the only method you can use to access the information protected by SIZE technology are sets of data packets.
newbie
Activity: 77
Merit: 0
May 11, 2018, 02:14:06 AM
Yes. And I think that this algorithm has its own weaknesses.

Yeah, of course.
newbie
Activity: 45
Merit: 0
May 11, 2018, 01:43:43 AM
Yes. And I think that this algorithm has its own weaknesses.
jr. member
Activity: 75
Merit: 1
May 11, 2018, 01:04:48 AM
I've heard about the method of redundant coding. But that looks like it has problems too.
copper member
Activity: 112
Merit: 0
May 11, 2018, 12:38:54 AM
As far as I know, the replication method is now used to store data.

What's the point?

This method involves making copies of the source file that will be stored as additional backup.
Pages:
Jump to: