Sabtu, 29 September 2018

Secret Connection


1.  Importance in problem

 Desire to remain anonymous in different spheres and different contexts it is possible to trace on the extent of all existence of humanity. Impossibility to set accordance of actions or their results and persons that stand after them has important positive and negative consequences for the different subjects of public relations. Connection is obvious between aspiring to anonymity and desire to avoid responsibility (both legal and all other kinds) was one of reasons of claim of some negative attitude toward this phenomenon in mass consciousness and displaced his positive functions on a background. However in an informative epoch anonymity can fully disappear, that cardinally and irreversibly will change human society. From the moment of the creation the Internet was examined by many as unregulated a right space anarchy and lawlessness reign in that. Positions are widely widespread and now, that anonymity in a network is publicly the harmful phenomenon that assists offences and must be overcame, including by means of the state and law enforcement authorities. However, on the present stage (in particular from the point of view of human rights defenders) the fallaciousness of such approach becomes obvious. Nature of the Internet does not assist anonymity not only, and actually does impossible her, fixing every action of user. To remain anonymous without application of the special technologies, knowledge and efforts becomes all more difficult. That experience of the legal adjusting of public relations in the material world must be basis and for the legal relationships accomplished by means of digital technologies is undoubted. But he must be sent foremost not to the grant of additional plenary powers to the state, and on providing of fundamental human rights. The process of supervision and collection of these users of world wide web became logical investigation of development of the internet. All want to get the prize catch of information for the use in the aims. Elections 2016 in the USA and blocking of Telegram in Russia, one of transparent communication means, weathering of these users of Facebook is prime examples of unprotectedness of confidential data. Not secret that large social media, messengers is related to the special services of different countries. Our task to start an absolutely anonymous network for rings, correspondences and other possibilities of world wide web. This network can be described as an analogue of VPN is built on principle of technology of blockchain. A main feature of project is absolute security. It is planned that development of platform in future will allow effectively and safely to use possibilities of world network.



 2. How big is the threat of shadowing ? 

The internet became inalienable part of humanity. Realizing this government strengthens control of this sphere. Law enforcement authorities a long ago enough "sharpen a tooth" on VPN- of service and services for anonymization for access to the web-resources. They are convinced, that such mechanisms are used exceptionally in criminal aims, as does not allow to calculate the location of computer of criminal. However quite not begin to think that in the conditions of the global watching the users of the internet from the side of some special services, corporations and malefactors, such mechanisms simply help to realize it base rights on freedom of self-expression. In 21 century, shadowing takes place not only your state. and and by large medias by the firms of type of Google and Amazon, that want to obtain information about your purchases and preferences, more effectively to stick to you the product that we not nearly need on a large account. For many people it is a large problem, even more than access to the personal correspondence. Governmental services and large corporations became the inalienable companions of our marketing life. And scandals are related to confidentiality of these personal users constantly raise concerns for accounts in social resources (Facebook, WhatsApp other). So, basic threats it is been: 1) establishment by the state of the special equipment for control after activity in the Internet; 2) duty of providers to collect and expose the personal data for public organs or other persons; 3) wide-range collection and the use of the personal data private services for an advertisement, marketing, personalisation etc. Taking into account the above-stated threats, our command and decided to create a project Secret Connection. 

3. Team 

Our international command consists of professionals of different spheres and directions, movable ideas of privacy of private correspondence and anonymous activity in a network. Beginning of the work we began with the analysis of the modern internet. It is shown in the table given below, whatever information people most do not prefer to keep in the Internet.






4. Project 

The realized functional will allow to thousands of people to share information without fears for violation of their safety and confidentiality by the third persons. Getting for it the real value, shown in digital token systems, easily convertible in other types of digital property and ordinary currencies. A platform will be maximally simple and clear in the use even for those, whoever is acquainted with the world of blockchain technologies. Users will be so engaged in a process, that will begin intuitively to use advantages of blockchain and cryptocurrencies. 

4.1. Messenger for IOS/Android A project will correspond to the time-spirit, in minimalism style will execute all modern functions of messenger. The account of user is determined by the private key that is kept only for him. An user authorizes the actions this key, be that report, rings or money orders. Access to conversation is given through two public keys - one on reading, other on a record. Conversation is created by an user, access to conversation is given by a transmission to other users of the corresponding public keys. Presently already there is the closed alpha version of the program, created for testing of the keys of encipherement and network of Blockchain. 

4.2. Reward for breaking We guarantee durability of our network and our messenger. Therefore we appoint a reward for breaking of our network in size of 50 000 $. The set of wishing for a search weaknesses of our alpha version of the program is already open presently, and also keys of encipherement of Blockchain. For the receipt of access to alpha (only for the search of weaknesses), write to us on mail with the mark #Test. 

4.3. Quality of network We eliminate the delays of reports (Ping) and problem with quality of network, because the system will always use those telephones, that included in the system Blockchain and are nearer than all to you, creating the same minimum possible ping. Mining our tokens, it will take place each time by means of mobile, being the participant of the blockchain-system, an information (transmission of package) transfer was carried out. Breaking of package is impossible, because at passing through every participant of chain, he gets a new, unique encipherement (on principle of TOR- of browser). 

4.4. Development of project Realization of all our ideas we broke up on three basic phases: First phase. The first aim of our project is a successful start of purse and creation of digital economy, being based on a platform ETH. During registration of user in the system he will get a purse number that will be the analogue of his telephone number, on him it is possible to keep cryptocurrency and accomplish transactions. At the end of the first phase it is pre-arranged to conduct a fork, for possibility of feasance of vocal rings and videoreports. Second phase. Start of the test Blockchain- network of Secret Connection. Creation of in cipher network for communication of data. Distribution of the keys for alpha of version of app. Basic task of the second phase - there is a start of the program for mining our tokens, on the basis of that will be created Blockchain-system. For mining separate application (Android, IOS) is developed allowing to do your any "clever" device (from a tv tuner to the smartphone) - by a participant Blockchain-system Secret Connection, by means of that, and in cipher rings and dispatch of reports will come true, and miner for participating tokens will get in the transmission of package of data. Third phase This creation of the in cipher system, analogue of VPN, that will provide maximal safe being in a network. At the method chosen by us watching digital track is simply impossible. In addition, for large users a start is planned on-line of depositories of information, in that it will be possible to save the enormous arrays of necessary data, access to that their proprietors will have only. Term execution drawn up a plan 9. We suggest to become you familiar with our travelling map where more in detail presented our the first steps on realization drawn up a plan. 

5. Time map

 First quarter 2018 - Collection of command, market, audience analysis, exposure of basic problems. Second - third quarter 2018 - Creations of program prototype. Testing of Blockchain- of the system Fourth quarter 2018 - Preparation to producing of tokens. First stage of sale of tokens. First quarter 2019 - Second stage of sale of tokens. Second quarter 2019 - Development of beta-version of app. Third quarter 2019 - beta-version of blockchain chain. Third stage of sale of tokens. Fourth quarter 2019 - Start of app and app for mining. First quarter 2020 - Updating of time map.

More information :


Author : Anggita dewi



Tidak ada komentar:

Posting Komentar