RAC_HL_37.png

CONTEXT: Robust data custodianship is a typical issue in emerging digital societies. While there is no doubt that hyper secure M2M data transfer between machines is a precondition, sadly, the same thing can't be said for M2C, C2M or C2C data exchanges..

HL_UC__12.png
RAC_UC#07__08.png

STATUS QUO

Private keys used for encrypting digital data transfers are stored in central online data repositories.
Private data is a lucrative resource, which can be mined, processed and sold.

LIMITATIONS

• Central key storage and data repository systems are goldmine for hackers
• Impossible to guarantee the robust cybersecurity and integrity of the third party custodian of the private data

RIDDLE&CODE SOLUTION

Combine Motorola's hardware development kit for Android phones with RIDDLE&CODE's blockchain-backed hardware.

BENEFITS

• Leveraging on ability of our crypto hardware to keep private key ‘off-the-bus’ and protects the key and the data from hacking.
• Satisfies the demand for privacy whilst precluding misuse of anonymity.

RAC_UC#07__10.png

STATUS QUO

Privacy is commonly accompanied/ enabled by anonymity.

 


LIMITATIONS

Misuse of anonymity to conceal illegal or unethical actions.

 

RIDDLE&CODE SOLUTION

Using standard digital communication Apps, data exchanged between two parties is encrypted with the private key, safely stored “off the bus”.

BENEFITS

• Attains perfect equilibrium/balance between anonymity and privacy: conversations are kept strictly private, while parties can be clearly identified.
• Satisfies the demand for privacy whilst precluding misuse of anonymity.

Element 11@4x_UC.png
RAC_UC#07__13.png
RAC_UC#07__14.png

The crypto hardware gets connected to the Motorola’s hardware development kit for Android phones. Immediately after, it gets provisioned* and attested** with relevant metadata on the blockchain.

RAC_UC#07__17.png
RAC_UC#07__19.png

Two or more parties with the same setup in their phones, can now have secure and private text and voice conversations using standard digital Apps.

This is a perfect tool for protecting sensible information in many different fields at a professional and personal level.

*Process by which the key pairs are created. **Process by which the public key of the crypto tag is registered on the blockchain of choice.

RAC_Web_Zeichenfläche 29.png
HL_PD_16.png
 
RAC_Web_Zeichenfläche 29.png
 
powered by Typeform