IAME

Dear crypto-drivers! Greetings, on your blog!
Today we have on the agenda, there is a short overview of the prospective ICO, which has not yet begun! Nevertheless, I already predict the success of the project in advance and I want to dwell on it!
I ask to love and to pay - IAME!
Official video from developers
What is IAME, where does it come from, and where is the technology of blocking? Let's understand!
So, IAME is a specific product! This is the Identification Network, which will work only with a limited number of crypto-currencies, and more specifically with Ethereum and the IAM token!


IAME will provide its users with a tool that is designed to simplify their lives in matters of self-identification!
IAME WALLET - can be downloaded for use on a variety of mobile platforms! That is, in other words IAME will always be with you!
The IAME application allows its users to unite their identity, that is, to identify it and link it to their crypto-currency addresses (purses), and note that these identified addresses are only the first step in global integration!
Absolutely all documents and files that will be downloaded in the IAME application will be inextricably linked to a particular purse, but will be under reliable protection, being encrypted fragmentarily, and passing through the internal IEE Identification Network . Now, users can forget that such mistakes when confirming the identity, with such and such a system of protection!
The IAME application allows its users to unite their identity, that is, to identify it and link it to their crypto-currency addresses (purses), and note that these identified addresses are only the first step in global integration!
Absolutely all documents and files that will be downloaded in the IAME application will be inextricably linked to a particular purse, but will be under reliable protection, being encrypted fragmentarily, and passing through the internal IEE Identification Network . Now, users can forget that such mistakes when confirming the identity, with such and such a system of protection!

Of course, without the technology of blocking and smart contracts, it would be impossible to do this!
Application for the APPLE - https://itunes.apple.com/it/app/iame/id1356513567?l=en&mt=8
application for the ANDROID - https://play.google.com/store/apps/details?id=io .iame.android
application for the ANDROID - https://play.google.com/store/apps/details?id=io .iame.android
Let's try in a few words to understand the basic principles of the IAME identification system.
As already mentioned, we are talking about fragmented encryption, about a fragmented decentralized system! The developers claim that they created two different so-called blocks, two prototypes - one for identification and the other for verification, the so-called confirmation of identification!
You can personally see how they look and how they work in real time, right in your browser! Yes, the creators of the project, offer you this opportunity!
Identifier - https://blog.iame.io/identification-prototype/
The validator - https://blog.iame.io/identity-validation-iame-prototype/
The validator - https://blog.iame.io/identity-validation-iame-prototype/
In this prototype, we are viewing, as identification functions, based on IAME, from the user's point of view.

What is DFI? This is a decentralized fragmented method that the IAME system uses for cyclical, that is, reuse of the entire identity process!
Thanks to DFI, the data transmitted and shared in the transaction flows, in essence, are useless separately, given the preliminary fragmentation! Further, these data are anonymously distributed among independent third parties! These third-party third parties are not, in any way related to members of transactions
Of course, it is worth mentioning that in this network of third-party validators, according to all canons of the block, the task of confirmation is assigned, as well as verification of the reliability of each piece of data, that is, each fragment! The protection is ensured by the fact that separately these fragments do not represent any interest, and it is impossible to calculate the missing fragments, therefore falsification or loss of data is practically excluded!

Compilation, in other words, the process of collecting back into a single whole, these fragments will be a confirmation of identification for the transaction counterparty, in fact, just the same and confirming the authenticity of the person being identified!
This type of verification, through third-party validators, is much more reliable and safer than the ways in which identification is given to a particular organization or person!
As soon as the user tries to verify and confirm their identity, the data is fragmented and individual components are immediately sent to the platform of the validator, where ready to process the request, free validators, immediately accept the task assigned to them!
The validators are rewarded by the system for their contribution.
The validators are rewarded by the system for their contribution.

Also, IAME thought of the moment to exclude various manipulations of validators in order to obtain greater financial benefits!
In order to counteract the third-party validators trying to fool the system, the IAME identification network, in effect, deploys a symmetric game model - an antidote that employs the so-called tribunal method! This is when a consensus, that is, a community of validators, reaffirms the validation, in other words, secondary validators, come into play, if initially there is no compromise in initialization, there is doubt and an appeal is required. Accordingly, neither party has sole control over the authentication process. This means that every user can be sure that the validators of your personality are not interested in falsification or other manipulations with your data, but moreover, additionally verified by the intelligent system IAME.
Here is such a cool and interesting system offers us a team of developers!


And I, you suggest, get acquainted with the details of the coming token-sail.

And at will participate in the PRE-ICO, which will run until May 20, 2018

Token IAM
PreICO 1 ETH = 20,000 IAM
ICO 1 ETH = 10,000 IAM
PreICO 1 ETH = 20,000 IAM
ICO 1 ETH = 10,000 IAM
Soft cap 1,000,000 USD
Hard cap 25,000,000 USD
Hard cap 25,000,000 USD
site - https://iame.io/
WhitePaper - https://iame.io/res/180301-IAME-White-Paper-en.pdf
GitHub - https://github.com/iameidentity
Facebok - https: // facebook.com/IAMEidentity
Twitter - https://twitter.com/@iameidentity
Telegram - https://t.me/IAME_identity
WhitePaper - https://iame.io/res/180301-IAME-White-Paper-en.pdf
GitHub - https://github.com/iameidentity
Facebok - https: // facebook.com/IAMEidentity
Twitter - https://twitter.com/@iameidentity
Telegram - https://t.me/IAME_identity
my profile - https://bitcointalk.org/index.php?action=profile;u=2027828
ETH: 0x73998E2fB5604606E87585edc2C834539400985B
Comments
Post a Comment