Alternative Universe

in #snaxbountyprogram5 years ago

Alternative Universe (Security system)

Are you looking for a secure system, a Swiss bank account for your digital secrets? Check Alternative Universe! For register, you don’t need to give your phone number, address, e-mail, or any other personal details! You can use your own storage total anonymously! No-one can identify you including us. All you have to do is give to the system username and password(s) and keep your private files safe.

So far this is fine, but what really distinguishes our solution from those in the market today?
Basically, we focus on security during development and minimize all the potential for the vulnerability to our system. Additionally, we try to ignore any operation that unnecessarily complicates or slows data access. This is a very thin area where we have to find a balance between safety and simplicity. Besides the existing technologies, we have to use a large number of self-developed solutions which are making our system a real digital Swiss bank. One of them is the special sign-up and sign-in platform, which provides 100% anonymity for our users and makes it impossible for accounts to be accessed by unauthorized users. If users follow some simple rules it will not be possible to identify their identity. For sign-up system asks only a username and the account is ready to use. Of course, this is only a first step and after that needs a configuration method to set up passwords and any other identification tools. Nobody needs to use his/her real name, address or e-mail address neither. The Alternative Universe system never log users IP address or geolocation data except if customers set them up!
The connection between the users and the system is a thin, lightweight client. This is the only way to gain access to the backend. The client does not contain any information about the encryption method so pointless to hack it. Every algorithm and code run on the backend in secured layers. Alternative Universe is a decentralized system. Each user has a certain part of the backend. A self-developed algorithm slices the backend for more tiny pieces and installs to users’ computers.
The software has a built-in, self-developed spyware and keylogger check algorithm which runs during the installation and every system start-up. That means the client won’t install to the computer or run until it detects any malicious code. This prevents the stealing of passwords and other data.

star-trails-828656.jpg

Sort:  

Congratulations @flaci75! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 2 years!

You can view your badges on your Steem Board and compare to others on the Steem Ranking

Vote for @Steemitboard as a witness to get one more award and increased upvotes!