Qortal Project

The future of blockchain platforms

User Tools

Site Tools


state-of-the-art_security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
state-of-the-art_security [02/07/2022 09:33] gfactorstate-of-the-art_security [04/27/2023 18:33] (current) gfactor
Line 11: Line 11:
 There are two entirely separate encryption engines in Qortal: the Core and the User Interface (UI). The Core can verify the transaction created by the UI and ensure it was created correctly, but the Core doesn’t need the information that created the transaction. Traditional systems contain a database of username/password information that could be hacked. Qortal does not have a database of information, it merely allows transactions to be created, signed, and submitted as long as the user contains the keys necessary to do so. Therefore, there is NO DATABASE OF USER INFO TO HACK. There are two entirely separate encryption engines in Qortal: the Core and the User Interface (UI). The Core can verify the transaction created by the UI and ensure it was created correctly, but the Core doesn’t need the information that created the transaction. Traditional systems contain a database of username/password information that could be hacked. Qortal does not have a database of information, it merely allows transactions to be created, signed, and submitted as long as the user contains the keys necessary to do so. Therefore, there is NO DATABASE OF USER INFO TO HACK.
  
-Qortal’s security when compared to credit cards, is a perfect example. If you lose your card, any other person could make use of it since the information to USE THE ACCOUNTis printed ON THE CARD. This is NO SECURITY AT ALL. So credit card companies often have to rely upon ‘fraud prevention’ and ‘refunds’ to people since they experience countless fraudulent transactions daily. In Qortal, it simply isn’t possible for any other user to access an account, unless the creator of the account gives the other user the passphrase to decrypt their locally saved backup information. Qortal’s security system is as simple as that, it just isn’t possible to access another user’s account without the account owner providing the information to do so.+Qortal’s security when compared to credit cards, is a perfect example. If you lose your card, any other person could make use of it since the information to USE THE ACCOUNT is printed ON THE CARD. This is NO SECURITY AT ALL. So credit card companies often have to rely upon ‘fraud prevention’ and ‘refunds’ to people since they experience countless fraudulent transactions daily. In Qortal, it simply isn’t possible for any other user to access an account, unless the creator of the account gives the other user the passphrase to decrypt their locally saved backup information. Qortal’s security system is as simple as that, it just isn’t possible to access another user’s account without the account owner providing the information to do so.
  
-Now if we take the same method of security used for the accounting side of Qortal, and applying it to on-chain services within Qortal, Qortal now provides secure INFRASTRUCTURE that can rebuild nearly every application, website, social media, communications, etc. that exist today in the world. On top of that, is the ability to utilize the verification system of Qortal - to verify other applications. Therefore, Qortal can make its own or host a third-party application securely, while at the same time not requiring users to need individual username/password combinations for each app. In other words, once the users verify with Qortal, they are verified for any application that utilizes Qortal!+Now if we take the same method of security used for the accounting side of Qortal, and apply it to on-chain services within Qortal, Qortal now provides secure INFRASTRUCTURE that can rebuild nearly every application, website, social media, communications, etc. that exist today in the world. On top of that, is the ability to utilize the verification system of Qortal - to verify other applications. Therefore, Qortal can make its own or host a third-party application securely, while at the same time not requiring users to need individual username/password combinations for each app. In other words, once the users verify with Qortal, they are verified for any application that utilizes Qortal!
  
 Qortal can become a global authentication system so users NEVER NEED TO REMEMBER A BUNCH OF USER/PASSWORD COMBINATIONS AGAIN. This provides a level of security to the overall that has yet to be seen in the world. This means there is no centralized database to hack, no need for multiple different user/password combos for different apps/sites, and complete security for the world. Qortal can become a global authentication system so users NEVER NEED TO REMEMBER A BUNCH OF USER/PASSWORD COMBINATIONS AGAIN. This provides a level of security to the overall that has yet to be seen in the world. This means there is no centralized database to hack, no need for multiple different user/password combos for different apps/sites, and complete security for the world.
  
-Taking the method Qortal uses for verification and applying it to other avenues is the overall goal of Qortal. Blockchains are by far the most secure databases in the world, and the methods Qortal uses are more secure than most blockchains. Therefore, making use of this security at the base level of Qortal and taking it to other aspects of the world’s needs is the overall goal. +Taking the method Qortal uses for verification and applying it to other avenues is the overall goal of Qortal. Blockchains are by far the most secure databases in the world, and the methods Qortal uses are more secure than most blockchains. Therefore, making use of this security at the base level of Qortal and taking it to other aspects of the world’s needs is the overall goal. For example, Qortal can utilize its security for web hosting and data storage. Data that is put up is verified by the users account and can only be changed by the user. It’s truly as simple as that. Any other method will not allow the data to be changed so the account that created the data is the only account that can modify it.
- +
-For example, Qortal can utilize its security for web hosting and data storage. Data that is put up by the user's account can ONLY ABLE TO BE CHANGED BY THE USER. It’s truly as simple as that. Any other method will not allow the data to be changed so the account that created the data is the only account that can modify it.+
  
 Continuing to utilize these methods and improving them in the Qortal Network will allow a TRULY SECURE infrastructure that the future world may utilize to bring back SECURITY and individual sovereignty worldwide. Continuing to utilize these methods and improving them in the Qortal Network will allow a TRULY SECURE infrastructure that the future world may utilize to bring back SECURITY and individual sovereignty worldwide.
state-of-the-art_security.1644244434.txt.gz · Last modified: 02/07/2022 09:33 by gfactor