6 cryptoprocta who care about your personal data


6 cryptoprocta who care about your personal data

Often we have to choose to protect personal data or to exchange them for service, and it seems that the natural state of things — nothing like that. Technology is evolving, and maybe using the blockchain we will be able to immediately and control over their data and the ability to see and to do what you want, while staying safe. Here are six cryptoprocta who are trying to bring a future free from Big brother.

1. Promether

3. Substratum

One of the main problems of centralization — the possibility of censorship.

And it is not only cases when no one wants to provide hosting for the obviously illegal content, the company often removes the content due to the overly aggressive and ill-conceived policies for the protection of copyright, or simply because the material does not fit the brand image they want to create in the eyes of the consumer.

And we’re talking about a democratic society where the government puts pressure on companies, forcing them to suppress dissent.

Substratum offers a decentralized network solution for the storage and dissemination of all data uncensored. Any user who has the extra space can offer it to others, and, conversely, a user who need to store data, can pay for this place tokens Substrate and Atom feeds (similar to rubles and kopecks).

Access content stored in a network Substratum can be retrieved from any browser. Today the network is at an early stage of open beta testing.

4. Elastos

Elastos is also a project to create a decentralized network, but here is another idea: users do not receive content from web pages; each “site” in the network Elastos is a separate application.

Elastos network users download and run decentralized applications with many features. Although JavaScript has significantly added web page functionality, they are designed to display information, while a decentralized application is a complete program.

Like Java code, Elappos decentralized applications are executed locally on the user’s computer environment Elastos runs on top of any operating system. This approach allows Elastos to overcome the problem of slowness of applications are completely tied to the blockchain.

Due to the local execution speed is achieved, and by storing code in a distributed system — the security and stability of decentralized applications.

In July was launched DID, decentralized ID Elastos, so that it is already possible to experiment. In August the partial open source project, and the experts will be able to explore the inside how the system works.

5. SelfKey

SelfKey is aimed at protecting the person from possible violence. You register your identifying documents in SelfKey Identity Wallet, assuring them through the authorized organization.

For example, you carry the passport in a government Department, where he will check and make the check results in a purse SelfKey. When the validation is passed, the original passport is no longer needed — when it needs to be present, the user can use the wallet SelfKey, which, in particular, to sign the content of the transaction that no one else could read it.

In addition, the Protocol SelfKey allows the user to verify the presence of relevant identification information, not presenting a “digital passport” that creates even more opportunity for fine control of their data.

It is important that the original passport more no show — no business, not even government officials. No one sees your passport, all receive data only, showing that your documents have been checked.

Thus, even if the organization with which you interacted, not credible (or becomes a victim of hacking), it’s not scary because it had no data that could be used against you.

In a world where your documents are seen only you and the authority that issued it, identity theft becomes virtually impossible. Even if you don’t fear that the counterparty will misuse your data, it’s nice to have a completely new level of control. Now you decide how in different circumstances, your personal information is used.

6. Monero

If we talk about personal data, it is impossible not to mention Monero is one of the most famous of the block chain, and it was developed to address the privacy issues inherent in bitcoin.

Yes, bitcoin was created as a decentralized currency, but everyone, including governments, can read the public blockchain, which registers any movement of funds, and even determine the person performing a particular operation.

In Monero also have built-in “mixing” of the transaction, so that all actions remain anonymous. Imagine that we have a group of people, each of which is put on the table the contents of the purse. Then all the notes are shuffled, and each takes from the pile belonging to him the amount.

It turns out that it is impossible to know from whom and to whom transferred any money, so a third party overseeing the transaction, is not able to track the sender and recipient.

Thus, Monero is truly anonymous currency that is protected from the interest of government bodies and any other organizations.

Leave A Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.