I want to know what the principles of your identity verification, but to know the blockchain but decentralized, you are going to open up a copy of the chain used to verify the main chain?
Our security system was designed by internationally acclaimed security experts, so we take this question very seriously. You may check the following:
How to Secure your MyEtherwallet Security/Private Key/Keystore File -
https://www.youtube.com/watch?v=NhdOzHrSzR8Furthermore, there are few more security measure we rely on.
1) Personal information is protected by encryption and biometric data
2) Data is hosted on user’s device
3) User is able to chose information provided to service
4) Document verification with digital sign
The initial information entered can be anything, even false information. However, when the order is processed we check the cardholder and the party who is paying the money. The card is issued by a bank, which performs some sort of check on its end. Potential agents also undergo a fairly in-depth verification process: utilities bills issued in their name and to their address, passport or other identification document, details of bank accounts that have been in existence for at least 45 days (this ensures another level of reliability, we do not want fly-by-night agents). We check those who will then check our clients.
A document identification system will be used to check the documents submitted during user verification, and we also perform an AML check and use various other internal and external services that allow us to verify the provided documents.
During the second stage of document verification, we use agents who must confirm that the person exists and that the documents indeed belong to him or her.
It is similar to the example of receiving a credit card from a bank. The bank sends a courier who checks the recipient and his or her documents.