Pages:
Author

Topic: [ANN][ICO] IDM Protect - page 81. (Read 14803 times)

newbie
Activity: 39
Merit: 0
May 06, 2018, 02:41:20 PM
#50
Can you give me more details?
copper member
Activity: 112
Merit: 0
May 06, 2018, 02:32:13 PM
#49
Yes, I'm still wondering what makes this data storage system impossible to hack.

I'd like to know, too. I'm not very good with this stuff, but it sounds really good

All metadata is generated and stored exclusively on user computers and is never transmitted over the Internet.
jr. member
Activity: 294
Merit: 1
May 06, 2018, 02:23:00 PM
#48
Yes, I'm still wondering what makes this data storage system impossible to hack.

I'd like to know, too. I'm not very good with this stuff, but it sounds really good
member
Activity: 217
Merit: 12
May 06, 2018, 02:12:43 PM
#47
Yes, I'm still wondering what makes this data storage system impossible to hack.
copper member
Activity: 112
Merit: 0
May 06, 2018, 02:04:31 PM
#46
Friends, let's get back to discussing our  project.
jr. member
Activity: 73
Merit: 2
May 06, 2018, 01:51:45 PM
#45
I strongly agree with you on this – "secure data storage is a vital necessity". I feel like everyone's out to spy on me (I have proof, by the way)
As far as similar security-centric projects go, what's your main advantage? What's the biggest selling point when it comes to IDM coin?

Thank you for a good question!

IDM service provides a decentralized distributed cloud data storage system where the security of data both, from loss and theft, is provided by the unique SIZE algorithm. To procure the distributed data storage, the service will rent a free memory from miners for a reward. The miners all over the world would be able to lease a memory on their devices, including devices morally and technically obsolete (old smartphones, dated hard disks) and receive a continuous remuneration. Our patented algorithm SIZE supports an excellent protection of a file from loss (corruption) and can guarantee a file recovery from only 2% of the remaining data. Administration of the service will be managed by blockchain technology.
The properties of SIZE, in information recovery, favorably differ from traditional and widespread methods, like 3 or 4-fold Backup or replication, embedded in Hadoop, ZFS file systems from Google, Luster, etc. The SIZE encoding algorithm can provide the same level of safety with much less redundancy.

The use of SIZE technology can significantly reduce the gap between the amount of generated digital information and the amount of available storage.
If we are talking about safety, i can tell that in the security of storage SIZE technology has parameters incomparably better than all existing crypto algorithms. Please, read the whitepepper (https://myidm.io/img/doc/wp_en.pdf) for more information.

You're welcome!
Yes, it sounds interesting, of course, but still nothing is clear.

If you don't understand, then it's probably not for you.

Thank you, very nice
newbie
Activity: 53
Merit: 0
May 06, 2018, 01:38:35 PM
#44
I strongly agree with you on this – "secure data storage is a vital necessity". I feel like everyone's out to spy on me (I have proof, by the way)
As far as similar security-centric projects go, what's your main advantage? What's the biggest selling point when it comes to IDM coin?

Thank you for a good question!

IDM service provides a decentralized distributed cloud data storage system where the security of data both, from loss and theft, is provided by the unique SIZE algorithm. To procure the distributed data storage, the service will rent a free memory from miners for a reward. The miners all over the world would be able to lease a memory on their devices, including devices morally and technically obsolete (old smartphones, dated hard disks) and receive a continuous remuneration. Our patented algorithm SIZE supports an excellent protection of a file from loss (corruption) and can guarantee a file recovery from only 2% of the remaining data. Administration of the service will be managed by blockchain technology.
The properties of SIZE, in information recovery, favorably differ from traditional and widespread methods, like 3 or 4-fold Backup or replication, embedded in Hadoop, ZFS file systems from Google, Luster, etc. The SIZE encoding algorithm can provide the same level of safety with much less redundancy.

The use of SIZE technology can significantly reduce the gap between the amount of generated digital information and the amount of available storage.
If we are talking about safety, i can tell that in the security of storage SIZE technology has parameters incomparably better than all existing crypto algorithms. Please, read the whitepepper (https://myidm.io/img/doc/wp_en.pdf) for more information.

You're welcome!
Yes, it sounds interesting, of course, but still nothing is clear.

If you don't understand, then it's probably not for you.
jr. member
Activity: 73
Merit: 2
May 06, 2018, 01:27:36 PM
#43
I strongly agree with you on this – "secure data storage is a vital necessity". I feel like everyone's out to spy on me (I have proof, by the way)
As far as similar security-centric projects go, what's your main advantage? What's the biggest selling point when it comes to IDM coin?

Thank you for a good question!

IDM service provides a decentralized distributed cloud data storage system where the security of data both, from loss and theft, is provided by the unique SIZE algorithm. To procure the distributed data storage, the service will rent a free memory from miners for a reward. The miners all over the world would be able to lease a memory on their devices, including devices morally and technically obsolete (old smartphones, dated hard disks) and receive a continuous remuneration. Our patented algorithm SIZE supports an excellent protection of a file from loss (corruption) and can guarantee a file recovery from only 2% of the remaining data. Administration of the service will be managed by blockchain technology.
The properties of SIZE, in information recovery, favorably differ from traditional and widespread methods, like 3 or 4-fold Backup or replication, embedded in Hadoop, ZFS file systems from Google, Luster, etc. The SIZE encoding algorithm can provide the same level of safety with much less redundancy.

The use of SIZE technology can significantly reduce the gap between the amount of generated digital information and the amount of available storage.
If we are talking about safety, i can tell that in the security of storage SIZE technology has parameters incomparably better than all existing crypto algorithms. Please, read the whitepepper (https://myidm.io/img/doc/wp_en.pdf) for more information.

You're welcome!
Yes, it sounds interesting, of course, but still nothing is clear.
newbie
Activity: 45
Merit: 0
May 06, 2018, 01:02:31 PM
#42
Does anyone know how it actually all works?
newbie
Activity: 39
Merit: 0
May 06, 2018, 12:30:06 PM
#41
This would be amazing and I know since I've had quite a data breach myself.
jr. member
Activity: 294
Merit: 1
May 06, 2018, 12:23:43 PM
#40
I heard about this too, but really have no idea how it all works.
member
Activity: 217
Merit: 12
May 06, 2018, 12:19:16 PM
#39
Hi everyone! I’ve read that there's a project that provides complete data protection against hacking.
copper member
Activity: 112
Merit: 0
May 02, 2018, 08:47:06 PM
#38
I strongly agree with you on this – "secure data storage is a vital necessity". I feel like everyone's out to spy on me (I have proof, by the way)
As far as similar security-centric projects go, what's your main advantage? What's the biggest selling point when it comes to IDM coin?

Thank you for a good question!

IDM service provides a decentralized distributed cloud data storage system where the security of data both, from loss and theft, is provided by the unique SIZE algorithm. To procure the distributed data storage, the service will rent a free memory from miners for a reward. The miners all over the world would be able to lease a memory on their devices, including devices morally and technically obsolete (old smartphones, dated hard disks) and receive a continuous remuneration. Our patented algorithm SIZE supports an excellent protection of a file from loss (corruption) and can guarantee a file recovery from only 2% of the remaining data. Administration of the service will be managed by blockchain technology.
The properties of SIZE, in information recovery, favorably differ from traditional and widespread methods, like 3 or 4-fold Backup or replication, embedded in Hadoop, ZFS file systems from Google, Luster, etc. The SIZE encoding algorithm can provide the same level of safety with much less redundancy.

The use of SIZE technology can significantly reduce the gap between the amount of generated digital information and the amount of available storage.
If we are talking about safety, i can tell that in the security of storage SIZE technology has parameters incomparably better than all existing crypto algorithms. Please, read the whitepepper (https://myidm.io/img/doc/wp_en.pdf) for more information.

You're welcome!
full member
Activity: 420
Merit: 105
May 02, 2018, 11:43:55 AM
#37
I strongly agree with you on this – "secure data storage is a vital necessity". I feel like everyone's out to spy on me (I have proof, by the way)
As far as similar security-centric projects go, what's your main advantage? What's the biggest selling point when it comes to IDM coin?
copper member
Activity: 112
Merit: 0
May 02, 2018, 10:24:57 AM
#36
HOW many tokens do you allocate for the bounty campaigns ?

Hello! 2% will be set aside for the bounty campaign.
jr. member
Activity: 165
Merit: 2
April 29, 2018, 07:24:32 AM
#35
HOW many tokens do you allocate for the bounty campaigns ?
legendary
Activity: 1974
Merit: 1077
^ Will code for Bitcoins
April 27, 2018, 05:50:33 AM
#34
Nice concept for the coin, but already implemented in Storj and Siacoin. Which new things this brings to the table compared to these two coins?
Thank you for this very important question!
Just a brief comparison:
-    We don’t overload Blockchain network with all management and logging operations. We use it just for payments. Our SIZE algorithm manages the ecosystem autonomously: it controls operations and quality of nodes, manages their reputation and distributes data.
-    Our goal is not to create the cheapest storage. Our storage is most reliable and secure. So our storage nodes get good payment, while users get best protection and confidentiality.
-    We don’t use cryptography. We use correction codes which modify source information and convert any digital content into a new form — to the set of digital packages. Each of these individual packages has no functional value and may not even contain a single bit of the original information. To restore the initial information you have to reassemble a complete file from a set of packages in a specific way, performing series of mathematical operations.

Thank's for the details, but the last part of an answer is not raising the confidence in a project. What you are saying in essence is that you are not using any accepted encryption/decryption algo, and instead you have used your DIY method. These attempts always bite you in the back once serious cryptographers get in business verifying your method. The fact the parts of files are shuffled around doesn't make them more protected if the encryption scheme can be broken and those parts of the file are exposed.
Not quite DIY. The technology has already been tested by third party labs, for instance, by Stormshield, Airbus Security subsidiary.

Great. Can we see the results of these tests? Where were they published? It's also important who in those labs did the review of the technology, is that some person known in the cryptographic community?
copper member
Activity: 112
Merit: 0
April 26, 2018, 08:43:46 AM
#33
Nice concept for the coin, but already implemented in Storj and Siacoin. Which new things this brings to the table compared to these two coins?
Thank you for this very important question!
Just a brief comparison:
-    We don’t overload Blockchain network with all management and logging operations. We use it just for payments. Our SIZE algorithm manages the ecosystem autonomously: it controls operations and quality of nodes, manages their reputation and distributes data.
-    Our goal is not to create the cheapest storage. Our storage is most reliable and secure. So our storage nodes get good payment, while users get best protection and confidentiality.
-    We don’t use cryptography. We use correction codes which modify source information and convert any digital content into a new form — to the set of digital packages. Each of these individual packages has no functional value and may not even contain a single bit of the original information. To restore the initial information you have to reassemble a complete file from a set of packages in a specific way, performing series of mathematical operations.

Thank's for the details, but the last part of an answer is not raising the confidence in a project. What you are saying in essence is that you are not using any accepted encryption/decryption algo, and instead you have used your DIY method. These attempts always bite you in the back once serious cryptographers get in business verifying your method. The fact the parts of files are shuffled around doesn't make them more protected if the encryption scheme can be broken and those parts of the file are exposed.
Not quite DIY. The technology has already been tested by third party labs, for instance, by Stormshield, Airbus Security subsidiary.
copper member
Activity: 112
Merit: 0
April 26, 2018, 08:42:41 AM
#32
It’s indeed a promising project. Can you provide more detailed information about your projects?
Wellcome to myidm.io
copper member
Activity: 112
Merit: 0
April 26, 2018, 08:41:32 AM
#31
Do we need An Absolute Protection From Quantum Supremacy?  There is no quantum computer yet.
There is at least one (actually more than one), as Google announced:   Researchers from Google are testing a quantum computer with 72 quantum bits, or qubits, scientists reported March 5 at a meeting of the American Physical Society.  The team hopes to use the larger quantum chip to demonstrate quantum supremacy for the first time, performing a calculation that is impossible with traditional computers.

If it seems Google has only just begun to test quantum computers it would seem quantum attacks are still a long time away from being realistic threats. In what timeframe do you estimate they will become a threat?
Judging by the speed of development of quantum computing we recon quantum computers will be available to public in less than two years.
Pages:
Jump to: