New to Busy?

GOLDILOCK Is The New Face oF Digital Storage Revolution

2 comments

apiprincz
52
last yearBusy8 min read

INTRODUCTION

There are two things that comes to our mind when we want to put our information online

  • Is my information safe?
  • Do I have the Full control over what happens with my data?

Many online service providers including data storage providers have claimed to offer security and privacy to their users but the statistics suggest otherwise.

According to Breach Level Index (BLI) 2017 report, the number of data records compromised surpassed 2.5 billion!, up 88% from 2016. With this increasing trend, it makes sense to say that the present technologies is becoming obsolete to tackle data security challenges.

Most of this attacks are being vetted out on sectors where user informations are most useful such as healthcare, financial services, education and government.

Identity theft is a common type of breach incidents which makes cryptocurrency exchanges, financial institutions the obvious target of this cyber attacks perpetrators!

So, How do we ensure the security of our data without disservice? How do we store our data securely and be able to access it securely anytime, anywhere?

GOLDILOCK is the ANSWER!

download.png

GOLDILOCK is a new type of storage system which acts as a cold storage until such time that a user needs access to their funds/data.

Before now, users have the option of choosing between a cold storage or an hot wallet

PicsArt_08-06-05.03.12.png

* Goldilock Data Storage Technology Vs Conventional Data Storage*

So clearly, the new Goldilock technology has a clear advantage over the present data storage technologies because it leverages the strong points of both conventional technologies!

SECURITY

GOLDILOCK defines security of data by keeping your data 'offline' as much as possible, this means that the physical device storing your sensitive data is physically diconnected from the internet.

media.4c1e409f.png

And when those data or information is needed, the user is granted limited time of access through a 'non-IP technology' with secure authentication layer. This means that your sensitive data are rarely connected to the internet where hackers could have the oppurtunity to steal your data!

Airgap technology is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks example the internet/hackers.

Source : From Wikipedia

Goldilock technology uses the principle of airgap technology to achieve the perfect security of our data! This is synonymous with banks moving customer funds into a vault rather than keeping it at the bank teller desk.

Centralized exchanges, financial institution and healthcare can benefit from implementing the Goldilock technology!

ACCESSSIBILITY

The Goldilock security suite is designed to give control to the users unlike some conventional custodial data storage wallet such as most centralized exchanges which means that an attack of the system automically translates to loss of funds/data.

Centralised exchanges is synonymous to keeping your funds/data in the bank, the bank takes control of your funds/data and can use it anyhow without your consent.

Goldilock doesnt keep custody of your private keys and password ONLY grant access for some limited time based on user request!

GOLDILOCK TECHNOLOGY

Goldilock have a host of technology solutions to ensure unique key custody and data storage are based on the following

  • Physical airgap disconnection from electronics networks, this helps to prevent interference from external circuits which might lead to data loss

  • Regressive Connectivity and signal processing, This helps to audit any incoming signal to help the system learn and recognise attacks before hackers can steal sensitive information.

  • Secured physical vaults in data centers dedicated to Goldilock for lease to organisation who plan on having full control of their data and key custody!

BENEFITS OF USING THE GOLDILOCK TECHNOLOGY

  • Users have full control over the security of their account

  • Goldilock offers its users a Fully- insured third party guarantees for the extraction of data to owners on demand or in case of business disruption

  • Multisite encrypted data backup, this means that users have the opportunity to control their data from more than one single source

  • Device recognition technology is embedded into the Goldilock ecosystem. This means that even if someone somehow gains control of your data, they wont be able to use it because the Goldilock system wont recognise the new device he used to logged in.

  • Biometric Gateways allows user to implement three factor authentication if they want.

Goldilock patent-pending Security Solution (GSS) is built on these three premises

PREMISE I

Users need access to their personal data quickly, but ONLY occasionally and for short periods of time. Otherwise, Online data is more useful to hackers than rightful owners.

1533567132764_image.png

Wallet is stored offline through a physical airgap mechanism, and is not accessible from the internet.

PREMISE II

Personal data (including private keys) must be isolated, secured from physical contact and related human error and fully backed-up

1533567274465_image.png

Using a non-IP mechanism, the user activates their wallet making it accessible over the internet.

PREMISE III

Personal data and private key must be easily accessible when needed!

1533566950873_image.png

User can securely access their wallet over an encrypted connection using a dedicated URL and access credentials

steemit.png

USE CASE

Say John wants to buy 1 BTC on a centralised exchange like coinbase and the volume on the site is extremely high, chances are that he will buy instantly. No problem

If the market price is the same on another exchange with very low volume , he may eat up all the sell orders before he can buy a whole Bitcoin.

Then John would need to buy the higher sell orders to satisfy his order, losing money and also making the price go up on that exchange.

Assuming he has a friend mary who tells him that he can use Goldilock to purchase instantly when the right sell order comes in without worrying about another buyer taking the chance. Then John will be able to save more money.

If the exchange utilise the Goldilock wallet, it will offer a more secure exchange in the event of an attack because they can manage their account from 'offline' in a secure manner and easily keep their liquidity in check because buy/sell orders can still be processed in good time from the Goldilock wallet!

With this approach, John is able to move his funds securely and save more money

Exchanges are able to store funds securely!

An attack on such exchange would lead to no or little loss of fund which means users funds are also secure!

Exchanges who require KYC of their users can as well integrate Goldilock private vault to ensure the full security of their customers cryptocurrencies and personal files.

HOW IT WORKS

image (2).png

Goldilock runs on the NEO blockchain, the choice of NEO blockchain is not far fetched as NEO was primarily built to

  • Integrate digital identity into the blockchain
  • NEO is based on cross-chain protocol
  • Secure Communication protocol

Goldilock also share the same features as NEO!

The Lock token will be use as the utility token to access services within the the Goldilock ecosystem

So whenever a user logs into the Goldilock wallet on his/her browser, the wallet will query the NEO blockchain to confirm if the user's public key address owns a LOCK token

Then the wallet will launch, the user enters his private key and can be granted access

Wallet write audit information and communicate with Goldilock Private Audit Blockchain

These audit helps to collect some basic info such as the user device information, IP address, browser type and some other security information

NOTE : THE AUDIT DOES NOT COLLECT, TAMPER OR STORE YOUR PRIVATE KEY. THE AUDIT ONLY HELPS TO ENSURE THAT THE USER IS COMMUNICATING WITH THE GOLDILOCK BLOCKCHAIN AND VICE-VERSA!

So whenever a user logs into the Goldilock wallet on his/her browser, the wallet will query the NEO blockchain to confirm if the user's public key address owns a LOCK token

Then the wallet will launch, the user enters his private key and can be granted access

Wallet write audit information and communicate with Goldilock Private Audit Blockchain

These audit helps to collect some basic info such as the user device information, IP address, browser type and some other security information

NOTE : THE AUDIT DOES NOT COLLECT, TAMPER OR STORE YOUR PRIVATE KEY. THE AUDIT ONLY HELPS TO ENSURE THAT THE USER IS COMMUNICATING WITH THE GOLDILOCK BLOCKCHAIN AND VICE-VERSA!

Lock token will be used to provide users with record of their node activity

Lock token will be the accepted method of subscription payment for individual users on Goldilock Security Suite (GSS).

Lock token information

Total Supply : 1 000 000 000
Hard Cap : $50M
Token Sale : Presale Already Ongoing

CONCLUSION

The Goldilock has find a subtle way to combine security with the ease of doing transactions via their airgap technology.

With this approach, hackers will sure have a hard time stealing sensitive information.

MEET THE TEAM

PicsArt_08-06-12.47.07.jpg
PicsArt_08-06-01.02.33.jpg

ROADMAP

TimelineAugust.d96ac70f.png

HELPFUL RESOURCES

HELPFUL LINKS

Link to Contest Post

Link to My Twitter Post

goldilock2018

Comments

Sort byBest