Mar 28, 2018
Wallet Security: Albeit private keys are essentially secure, it’s the storing and activation of a private that can be left vulnerable to attacks from hackers and bugs. News about hacking cold storage wallets, operating systems and computer malware have been prevalent on the news recently. The solution we offer is the 2-stage blockchain-based private key system. The 1st stage of this system will incorporate passwords based on the 16-32 character non relatable methodology, similar to that presently used by router manufacturers, this will be the catalyst to providing you with public and private keys. The Eniac Network Blockchain will not be seen to be unfamiliar to your average user.
Smart Contracts: Eniac will endeavour to develop a stable and secure smart contract free of the typical vulnerabilities and errors found in other cryptocurrencies. A dedicated team of coders will be tasked with this undertaking, the smart contract will then be tested vigorously to ensure zero faults during the token stage.
Privacy: We are aware that many cryptocurrencies work specifically on this issue, but as for the Eniac team, the subject of security is of the highest priority. The Eniac team promises to enroll a mobile wallet platform that is not only easy to use but will also be host to some of the strongest security features available, notably Eniac plans to use the Zk-Snarks technology to further improve encryption and ensuring your data is kept confidential.
ENIAC PRIVACY SYSTEM
One of the principles that Eniac strives to utilise is the introduction of an internal biometric self authenticating security layer, coupled with a strengthened key generating system, this combination will ensure an accounts system and wallet with better digital security and certainty than any current model in place. Further data and code will be released to the Eniac GitHub to allow for a fully open source experience.
Below you will find the structuring and layout to our privacy systems;
Through Eniac you’ll produce your own public and private key through a 16-32 character password based around non relatable words, this is due to many people having their preferred set of credentials that they like to use, whether it be the town you were born in and the year you were born ~ london1972 ~ or your pet’s name followed by your age ~ alfie27 ~ no matter your method, chances are you have related it to yourself in one way or another, and you probably use this password on multiple accounts, Eniac will attempt to break this poor opsec by using the 16-32 character system mentioned earlier, many may have experienced a similar protocol with their network router WiFi passcode, e.g:
The password is set up in a easy to remember 16 character setting, consisting of a 5 letter word, a 4 letter word, a 3 letter word and all separated by dashes (5+4+3+3=16) this method allows for a non relatable, secure and easy to remember password.
Biometrics is the science of identifying an individual based on inherent physical or behavioral traits closely associated with the person. Biometric systems utilise iris, hand geometry, palm print, face, fingerprints, gait, voice and keyboard typing patterns to determine the the identity of a person. For the time being Eniac plans to pursue face and fingerprints, and from these samples The Eniac Network will be able to safely verify and determine the identity of it’s users, in the case of facial biometrics a generic system will be used to capture and segment the image of a person's face to extract a feature set from the segmented image, with this set the system can compare it to the face/fingerprint template present on the coin to render a decision regarding the identity of a individual, in such the generic biometric data can be viewed as pattern recognition, similar to how Shazam use spectrogram data to verify songs through it’s app, each song, face or fingerprint has a unique and specific set of scores, and with these scores the biometric system can efficiently decide whether to accept or reject a users attempted access. Eniac research shows that fingerprints are 98.99% accurate and 99.89% respectively for faces.
What is the spectrogram?
The frequency spectrum of a signal is calculated and displayed in a time-frequency-oriented graph. In short, it can be simply described as a unique graphic or indicator system for any symptom.
With a system similar to the spectrogram structure, your personal information will be saved on the blockchain with zero security faults and a result-oriented system will be developed. Moreover, thanks to a few minor changes on our blockchain system, you do not have to use this system. With the help of a single private key, you will be able to perform transactions on your account. In short,whether using the two step verification system, or standard verification your account will be secure.
Please keep in mind that while all this is done Eniac codes will be posted on GitHub. One of Eniac’s main goals is to develop a universal and valid blockchain without any queries, and to present it in the best way possible.
The acronym zk-SNARK stands for “Zero-Knowledge Succinct Non-Interactive Argument of Knowledge,” and refers to a proof construction where one can prove possession of certain information, e.g. a secret key, without revealing that information, and without any interaction between the prover and verifier.
The possibilities of zkSNARKS is impressive to say the least, it allows for a system that can accurately verify the correctness of computations without the need of executing them and without informing the user of what task was executed, just whether or not it was correct. Anyone with prior experience with RSA will see the 2 systems are very much alike.
zkSNARKS can be defined to 4 major yet simple principles, in this section Eniac will aim to explain and show understanding of these principles.
March 20, 2018
April 21, 2018
May 21, 2018
July 10, 2018
August 10, 2018
August 10-20, 2018
Attention. There is a risk that unverified members are not actually members of the team
This offer is based on information provided solely by the offeror and other publicly available information. The token sale or exchange event is entirely unrelated to ICOholder and ICOholder has no involvement in it (including any technical support or promotion). Token sales listed from persons that ICOholder has no relationship with are shown only to help customers keep track of the activity taking place within the overall token sector. This information is not intended to amount to advice on which you should rely. You must obtain professional or specialist advice or carry out your own due diligence before taking, or refraining from, any action on the basis of the content on our site. Any terms and conditions entered into by contributors in respect of the acquisition of Tokens are between them and the issuer of the Token and ICOholder is not the seller of such Tokens. ICOholder has no legal responsibility for any representations made by third parties in respect of any Token sale and any claim for breach of contract must also be made directly against the Token issuing entity listed herein.
If you have any concerns about the nature, propriety or legality of this token sale or the persons involved in it please contact [email protected] with detailed information about your concerns.