Press Release

IDM Platform – Complete Protection from Quantum Supremacy

Share

Blockchain, a familiar technology. Similarly for digital currency, Bitcoin. We all have agreed already to know, that Blockchain technology that supports this digital currency. Where this technology is a relatively new way to secure transactions with a decentralized system.

This technology is a kind of digital record in using cryptography to secure transactions. Because transactions are done on multiple computers instead of just one computer, and consequently it’s much harder to change transactions, or hack.

Although many think Blockchain applications are more to monetary transactions, it can be used for many types of transactions as well. For example, this technology can be used to record historical or political events because it is not easy to forge or change.

But for the discussion this time, will be discussed related to Blockchain technology that can be used in Blockchain, a technology that is not foreign to be heard. Similarly for digital currency, Bitcoin. We all have agreed already to know, that Blockchain technology that supports this digital currency. Where this technology is a relatively new way to secure transactions with a decentralized system.

This technology is a kind of digital record in using cryptography to secure transactions. Because transactions are done on multiple computers instead of just one computer, and consequently it’s much harder to change transactions, or hack.

Although many think Blockchain applications are more to monetary transactions, it can be used for many types of transactions as well. For example, this technology can be used to record historical or political events because it is not easy to forge or change.

But for the discussion this time, will be discussed related to Blockchain technology that can be used in Data Security

What is IDM?

Ideal Data Memory (IDM) is a platform providing a secure data storage and exchange service. One of the unique features of the project is that data security is guaranteed by post-quantum cryptography. IDM service is utilizing the patented technology called SIZE. The SIZE algorithm which has being developed as part of the project is stronger than AES 256 by power of 147 (!!!). It should be noted that SIZE is the unique standalone technology.

SIZE technology has four main features (Safety, Security, Scalability and Data governance), appearing simultaneously and making this technology unique. Thanks to this new technology, users can stop worrying about unauthorized access to their data. Anyone can be a miner and rent a spare memory on his or her device (smartphone, computer, gaming console, NAS etc.) and get paid for it. With SIZE technology the service is capable of utilizing up to 100% of any storage media.

The product should be in a high demand against the background of ongoing scandals about data leakage, mail servers hacking, surveillance of citizens. It is important to note that SIZE technology has been created, patented and implemented in a product called BoobookBox. IDM service is raising funds for further development of this unique product.

Global problem
Rough estimates suggest, as a result of a cybercriminals’ activity, the global economy loses$ 114 billion annually. Since the emergence of the WorldWide Web, the United Stated alone suffered losses of around $400 billion. This is three times more than the country’s annual budget for education.
Solution to the global problem
Global expansion of the IDM data storage service powered by SIZE technology, will prevent consumers and businesses from losing data, and therefore, from suffering losses associated with hacker attacks and theft of information

Architecture

 

 

Countermeasures to emerging threats
  • The encryption of data by the user could be a viable method of countering cyber-attacks and potential data theft;
  • Another way is to select an additional option offered by cloud service, which provides uploaded data to be encrypted by the service;
  • The two-factor authentication (2FA) allows to increase the level of data access protection with minimum costs; 4. An anti-virus software which is a more conservative method of data protection.
Safety rating of popular cloud storage services

 

 

The world-famous company UBER was subjected to a massive cyber attack, as a result, the data of 57 million drivers and customers had been stolen.
The most disturbing thing was covering by the company the very fact of hacking and theft, and the payment to the perpetrators a ransom of $ 100 thousand dollars. The attack was interesting in itself because hackers got access to the company’s data through the GitHub service, where they hacked several accounts, downloaded data from Uber employees and with this data accessed a huge array of Uber data in the Amazon Web Services used by Uber for calculations.
Several years earlier, Yahoo and Equifax were hacked, along with many other companies and private accounts.

 

 

The need for the guaranteed security of stored documents
Currently, there isn’t a single data storage on the market that can guarantee the absolute security of the documents that have special value and, at the same time, is accessible for the ordinary people
  • The consumers have the demand for secure storage of their personal and classified documents of particular importance
  • IDM introduces the service that can boast the superior level of security which is way higher than the one offered by any of the similar providers on the market and exceeds all State standards regarding the secure data storage
  • Despite the fact that almost all State services have the highest level of data protection, they also experience the leak of data

Token Sale Information

Symbol Token: IDM
Platform: Ethereum
Type token: ERC20
Accepting: ETH
ICO date: 04.06.2018 – 04.10.2018
ICO price: 1 IDM = 0,001 ETH
Soft cap: 3,000,000 USD
Hard cap: 27,000,000 USD
Positives:
  • clear business model and marketing strategy;
  • experienced team;
  • implemented and patented technology.

Negatives:

  • Difficulty in understanding data storage technology, encryption algorithms may prevent from appreciating unique advantages provided by the IDM service.

Disclaimer: All information on this post is made to educate our readers. Don’t invest in any ICO unless you’re confident about its capabilities and do so at your own risk.



Website | Whitepaper | Facebook  | Twitter ~|Bitcointalk | Medium | Telegram


Author

Ivan Albrado
Bitcointalk Profile: Pixmartz
Bitcointalk Link: https://bitcointalk.org/index.php?action=profile;u=841835
ETH Address: 0xa38370065430E1c101A339f0c779D52685c754D7


Share

Leave a Reply

Your email address will not be published. Required fields are marked *