1. Importance in problem
Desire to remain anonymous in different spheres and different contexts it is possible
to trace on the extent of all existence of humanity. Impossibility to set accordance of
actions or their results and persons that stand after them has important positive and
negative consequences for the different subjects of public relations. Connection is obvious
between aspiring to anonymity and desire to avoid responsibility (both legal and all other
kinds) was one of reasons of claim of some negative attitude toward this phenomenon in
mass consciousness and displaced his positive functions on a background.
However in an informative epoch anonymity can fully disappear, that cardinally
and irreversibly will change human society.
From the moment of the creation the Internet was examined by many as unregulated
a right space anarchy and lawlessness reign in that. Positions are widely widespread and
now, that anonymity in a network is publicly the harmful phenomenon that assists
offences and must be overcame, including by means of the state and law enforcement
authorities.
However, on the present stage (in particular from the point of view of human rights
defenders) the fallaciousness of such approach becomes obvious. Nature of the Internet
does not assist anonymity not only, and actually does impossible her, fixing every action
of user. To remain anonymous without application of the special technologies, knowledge
and efforts becomes all more difficult. That experience of the legal adjusting of public
relations in the material world must be basis and for the legal relationships accomplished
by means of digital technologies is undoubted. But he must be sent foremost not to the
grant of additional plenary powers to the state, and on providing of fundamental human
rights.
The process of supervision and collection of these users of world wide web became
logical investigation of development of the internet. All want to get the prize catch of
information for the use in the aims. Elections 2016 in the USA and blocking of Telegram
in Russia, one of transparent communication means, weathering of these users of
Facebook is prime examples of unprotectedness of confidential data.
Not secret that large social media, messengers is related to the special services of
different countries. Our task to start an absolutely anonymous network for rings,
correspondences and other possibilities of world wide web. This network can be described
as an analogue of VPN is built on principle of technology of blockchain. A main feature
of project is absolute security.
It is planned that development of platform in future will allow effectively and safely
to use possibilities of world network.
2. How big is the threat of shadowing ?
The internet became inalienable part of humanity. Realizing this government
strengthens control of this sphere. Law enforcement authorities a long ago enough
"sharpen a tooth" on VPN- of service and services for anonymization for access to the
web-resources. They are convinced, that such mechanisms are used exceptionally in
criminal aims, as does not allow to calculate the location of computer of criminal.
However quite not begin to think that in the conditions of the global watching the users
of the internet from the side of some special services, corporations and malefactors, such
mechanisms simply help to realize it base rights on freedom of self-expression.
In 21 century, shadowing takes place not only your state. and and by large medias
by the firms of type of Google and Amazon, that want to obtain information about your
purchases and preferences, more effectively to stick to you the product that we not nearly
need on a large account.
For many people it is a large problem, even more than access to the personal
correspondence.
Governmental services and large corporations became the inalienable companions
of our marketing life. And scandals are related to confidentiality of these personal users
constantly raise concerns for accounts in social resources (Facebook, WhatsApp other).
So, basic threats it is been:
1) establishment by the state of the special equipment for control after activity
in the Internet;
2) duty of providers to collect and expose the personal data for public organs or
other persons;
3) wide-range collection and the use of the personal data private services for an
advertisement, marketing, personalisation etc.
Taking into account the above-stated threats, our command and decided to create a
project Secret Connection.
3. Team
Our international command consists of professionals of different spheres and
directions, movable ideas of privacy of private correspondence and anonymous activity
in a network.
Beginning of the work we began with the analysis of the modern internet.
It is shown in the table given below, whatever information people most do not
prefer to keep in the Internet.
4. Project
The realized functional will allow to thousands of people to share information
without fears for violation of their safety and confidentiality by the third persons. Getting
for it the real value, shown in digital token systems, easily convertible in other types of
digital property and ordinary currencies.
A platform will be maximally simple and clear in the use even for those, whoever
is acquainted with the world of blockchain technologies. Users will be so engaged in a
process, that will begin intuitively to use advantages of blockchain and cryptocurrencies.
4.1. Messenger for IOS/Android
A project will correspond to the time-spirit, in minimalism style will execute all
modern functions of messenger.
The account of user is determined by the private key that is kept only for him. An
user authorizes the actions this key, be that report, rings or money orders.
Access to conversation is given through two public keys - one on reading, other on
a record. Conversation is created by an user, access to conversation is given by a
transmission to other users of the corresponding public keys.
Presently already there is the closed alpha version of the program, created for
testing of the keys of encipherement and network of Blockchain.
4.2. Reward for breaking
We guarantee durability of our network and our messenger. Therefore we appoint
a reward for breaking of our network in size of 50 000 $. The set of wishing for a search
weaknesses of our alpha version of the program is already open presently, and also keys
of encipherement of Blockchain. For the receipt of access to alpha (only for the search of
weaknesses), write to us on mail with the mark #Test.
4.3. Quality of network
We eliminate the delays of reports (Ping) and problem with quality of network,
because the system will always use those telephones, that included in the system
Blockchain and are nearer than all to you, creating the same minimum possible ping.
Mining our tokens, it will take place each time by means of mobile, being the
participant of the blockchain-system, an information (transmission of package) transfer
was carried out. Breaking of package is impossible, because at passing through every
participant of chain, he gets a new, unique encipherement (on principle of TOR- of
browser).
4.4. Development of project
Realization of all our ideas we broke up on three basic phases:
First phase. The first aim of our project is a successful start of purse and creation
of digital economy, being based on a platform ETH. During registration of user in the
system he will get a purse number that will be the analogue of his telephone number, on
him it is possible to keep cryptocurrency and accomplish transactions. At the end of the
first phase it is pre-arranged to conduct a fork, for possibility of feasance of vocal rings
and videoreports.
Second phase. Start of the test Blockchain- network of Secret Connection. Creation
of in cipher network for communication of data. Distribution of the keys for alpha of
version of app.
Basic task of the second phase - there is a start of the program for mining our
tokens, on the basis of that will be created Blockchain-system. For mining separate
application (Android, IOS) is developed allowing to do your any "clever" device (from a
tv tuner to the smartphone) - by a participant Blockchain-system Secret Connection, by
means of that, and in cipher rings and dispatch of reports will come true, and miner for
participating tokens will get in the transmission of package of data.
Third phase
This creation of the in cipher system, analogue of VPN, that will provide maximal
safe being in a network. At the method chosen by us watching digital track is simply
impossible. In addition, for large users a start is planned on-line of depositories of
information, in that it will be possible to save the enormous arrays of necessary data,
access to that their proprietors will have only.
Term execution drawn up a plan 9. We suggest to become you familiar with our
travelling map where more in detail presented our the first steps on realization drawn up
a plan.
5. Time map
First quarter 2018 - Collection of command, market, audience analysis, exposure
of basic problems.
Second - third quarter 2018 - Creations of program prototype. Testing of
Blockchain- of the system
Fourth quarter 2018 - Preparation to producing of tokens. First stage of sale of
tokens.
First quarter 2019 - Second stage of sale of tokens.
Second quarter 2019 - Development of beta-version of app.
Third quarter 2019 - beta-version of blockchain chain. Third stage of sale of
tokens.
Fourth quarter 2019 - Start of app and app for mining.
First quarter 2020 - Updating of time map.
More information :
Author : Anggita dewi
Bitcointalk URL: https://bitcointalk.org/index.php?action=profile;u=1690762
Tidak ada komentar:
Posting Komentar