Complete Protection from Quantum Supremacy

The global economy loses $114 billion annually due to the cybercrime. In the first six months of 2017 the volume of leaked personal and financial data increased almost 8 times, from 1.06 to 7.78 billion records.

Current trends and issues associated with cloud data storage.

The 21st century is the age of information. More and more data are generated on the daily basis creating an ever-increasing demand for storage space. Not every home computer, let alone a mobile device, can store all its own generated data. The capacity of the built-in memory is growing along with requirements for data safety. The increased volume of generated data proportionally increases the number of potential threats to the storage of this data.

With the growth in the number of devices, cloud storage services are becoming increasingly important. Many cloud storage providers promise fast, reliable and convenient services. However, the reality is a bit more complicated.

Protect your information today and tomorrow.

In the foreseeable future quantum computers will be able to break practically all existing types of cipher. For this reason, it is vitally important to start solving the problem of future data protection today. IDM service has solved this problem.

What kind of threats to the information are the most relevant today?

Compared to legacy systems, how would you rate the security of the cloud?

Pure statistics

The year 2013 was marked by a scandal involving the outdated SSL service certificate by Microsoft Azure, which provided criminals with an opportunity to hack the Xbox Live system;

The so-called Celebgate incident, which happened in 2015, when hackers stole intimate photos of celebrities from the iCloud (Apple) cloud storage;

The number of hacks inflicted on cloud services is growing every year at the rate around 50%;

Approximately 70% of companies have at least one application running in a cloud;

Lloyd’s of London and Cyence believe that a massive attack on cloud storage can cause losses in excess of $ 5 billion, and only 15-17% of the total amount will be covered by insurance;

In 2017, the data storage of Equifax, the US leading consumer credit report agency, had been hacked resulting a personal data loss of 143 million customers. Consequently, the value of company’s stocks has plummeted by 13%;

The absence of two-factor authentication resulted in a personal data theft of 80 million customers of Anthem, an American health insurance company.

Data loss in cloud storage

Despite the fact that this type of storage is called “cloud”, the data is stored in physical terrestrial and underground locations, called data centres.

The actual storage devices are hard disks prone to various effects similar to those inherent in modern HDDs, such as an appearance of bad sectors, errors caused by voltage drops or physical damage to the disk surface, both due to improper operation or a design defect.

As a rule, all information is duplicated in backup copies according to a specific schedule. However, this method does not fully guarantee the safety of your data. Also we must consider the human factor.

Theft of data from cloud storage

Data is not always lost as a result of technical failures. Often there is a banal theft. The criminals may steal information just for fun or with the purpose of honing their hacking skills. Information can be stolen with a very specific purpose: to make money through blackmailing or selling valuable data to interested parties.

Not long ago, the media was buzzing with the news regarding the theft of intimate photos of celebrities from the cloud storage belonging to one of the main players on the mobile market.

After the scandal, the company responsible for security of the storage, as a third-party contractor, left the market, but the pictures, however, went all over the world.

How Secure the Information in the “transparent” Cloud.

Almost all existing on the market cloud storage services guarantee the integrity and maximum protection of user information from external influence of third parties.

The world-famous company UBER was subjected to a massive cyber attack, as a result, the data of 57 million drivers and customers had been stolen. The most disturbing thing was covering by the company the very fact of hacking and theft, and the payment to the perpetrators a ransom of $ 100 thousand dollars.

The attack was interesting in itself because hackers got access to the company’s data through the GitHub service, where they hacked several accounts, downloaded data from Uber employees and with this data accessed a huge array of Uber data in the Amazon Web Services used by Uber for calculations.

Several years earlier, Yahoo and Equifax were hacked, along with many other companies and private accounts.

Not so long ago, one of the experts in the field of data security discovered a critical vulnerability in a seemingly secure WPA2 protocol, which is widely used in Wi-Fi networks around the world. By using the system called Key Reinstallation Attacks (Kracks) it is possible to gain access to the encrypted information on any device connected to Wi-Fi. It allows the intruder to steal virtually any information from the device, such as correspondence, photos, videos, browsing history and other critical data.

IDM has set itself an aim to become a new integral part of the life of every individual. The importance of this innovation can be compared to the importance of electronic signature. It is a unique storage of personal information with the most profound level of security that was previously inaccessible to the general population.


2010 – The SIZE algorithm was successfully tested on CamGrid network at the Cavendish Laboratory at the University of Cambridge in the United Kingdom.

2012 – Foundation of Equivalence AG

2014 – An ultra-secure file-sharing program based on SIZE technology was introduced at “Hack in Paris” where the global hacker community tried to crack the algorithm without success.

2015 – The launch of a publicly available version of the BoobookBox for business and private users.

March 2018 – Technology has been successfully tested in European cybersecurit laboratories.

April 2018 – ICO for the global decentralized ultra-secure storage service IDM

2019 – Launch of IDM service

2019 – Development of the cloud blockchain platform (SaaS) based on SIZE data protection technology

2019 – 2020 – Implementation of a marketing strategy for the promotion of the IDM service and SIZE technology

2020 – 2022 – Development of a decentralized and distributed cloud platform (PaaS) Ultra-Secure Digital Data Storage.


For further info. kindly visit:








Author: Tola Silver

Bitcointalk Profile Link:;u=1927004

ETH Address: 0x992136E48CCAD0f833C09eb2BbdC1Ac2cFAae055


Publication author

offline 1 year


Comments: 0Publics: 11Registration: 18-03-2018
Войти с помощью: 
Войти с помощью: 
Password generation