Pages:
Author

Topic: [ANN][ICO] IDM Protect - page 83. (Read 14803 times)

copper member
Activity: 112
Merit: 0
April 25, 2018, 11:02:37 AM
#10
There is a term "miners" on your web site. Can I "mine" your tokens?
Yes, you can. In our terminology, miners are owners of storage nodes. They provide spare memory on their devices for rent and then receive tokens as a reward.  
newbie
Activity: 50
Merit: 0
April 25, 2018, 11:01:24 AM
#9
There is a term "miners" on your web site. Can I "mine" your tokens?
copper member
Activity: 112
Merit: 0
April 25, 2018, 10:41:59 AM
#8
Do you propose to use error correction code instead of replication?
Yes, we propose a new method of using correction codes replacing traditional approaches to reliability and safety. At the same time this method has much better technical and commercial characteristics. I emphasize, there is no technology in the world that can come close to the abilities of SIZE algorithm.
member
Activity: 166
Merit: 14
April 25, 2018, 10:37:56 AM
#7
Do you propose to use error correction code instead of replication?
copper member
Activity: 112
Merit: 0
April 25, 2018, 10:34:12 AM
#6
How do you protect data from man-in-the-middle attack?
A file is converted into a set of unidentifiable packets and then transmitted and stored on multiple nodes. There are no central servers in our system to attack. In addition, there is a secured communication channel, based on the same technology, between a user and the system.  If an attacker somehow intercepts all the packets he would not be able to assemble the file without the key (metafile).
newbie
Activity: 64
Merit: 0
April 25, 2018, 10:33:15 AM
#5
How do you protect data from man-in-the-middle attack?
copper member
Activity: 112
Merit: 0
April 25, 2018, 10:28:03 AM
#4
Do you use an encryption? What is the standard?
The technology we use is not an encryption.  At the same time in terms of security, we protect data at the level of the absolute cypher. To prevent unauthorized access the SIZE algorithm coverts a file into small unidentifiable packets none of which contains a single bit of the original file. The protection of our algorithm is higher than AES256 in [exponent 147 of a 10] times.
jr. member
Activity: 41
Merit: 1
April 25, 2018, 10:26:21 AM
#3
Do you use an encryption? What is the standard?
copper member
Activity: 112
Merit: 0
April 25, 2018, 10:22:02 AM
#2
Hi there! Right now we are in Frankfurt on Blockchain Summit. There is a great atmosphere and nice people. If you are on the event or in Frankfurt, let me know. We can meet and discuss blockchain technology and our project in person.
Cheers!


http://blockchainsummitfrankfurt.com/



copper member
Activity: 112
Merit: 0
April 25, 2018, 08:05:42 AM
#1

RUS
WHITE PAPER  |  PRESENTATION  |  ROAD MAP  |  VIDEO  |  BOUNTY  |  









Pages:
Jump to: