GOLDILOCK Is Re-inventing The Way We Store Our Sensitive Data

in #contest6 years ago (edited)

INTRODUCTION

I am sure most of you reading this article have being victims of your emails being hacked or your facebook password not working. Well, this may be as a result of your password being hacked!.

This is not an unusual trend if you keep up with the news in the digital sphere especially in the cryptocurrency universe. The statistics also support this claims as the records reveals that around 4 billion records of digital commodity such as email, credit cards has being stolen over the last two years coupled with an astonishing $1.2 billion dollars lost in cryptocurrency!

THE STATUS QUO - BEFORE GOLDILOCK

Cold storage such as paper wallet, Trezor or ledger wallet would have being a perfect choice for most cryptocurrency investors as it offers one of most secure means of storing digital datas such as cryptocurrency, credit card information and other highly sensitive datas but they are susceptible to loss, theft or damage and they are tagged as less active because they are not designed to be readily accessible all the time.

On the other hand, hot storage are always connected to the internet which presents high risk of security breach to user's sensitive data. So while hot storage offers users the needed flexibility to complete transactions at their own convenience without much hassle; they dont represent the best method for storing sensitive data in a safe and secure manner from the reach of hackers.

This presents users with a hard choice of choosing between the secured cold storage which are susceptible to theft, loss or hardware damage or go with a less secure and hackable online wallet such as your bitcoin wallet on an exchange.

This means that the present system is not adequate interms of providing a secure and easily accessible storage system simultaneously.

A SOLUTION IS NEEDED!

INTRODUCING GOLDILOCK


download.png

Goldilock is a new type of storage system which acts as a cold storage for cryptocurrencies and digital assets until these sentitive data are needed.

watch our introduction video here

Goldilock leverages the good qualities of using an hardware cold storage facility and the ease of accessibility offered by an online/hot storage facility to build an ecosystem that is SECURE yet offers the users easy access to their sensitive resources but ONLY when needed!

Goldilock technology thrives on 3 premises which outlines the present loopholes of the present system.

PicsArt_08-06-01.46.50.png

original image by me

So, Goldilock's patent-pending technology is built on this three premises which offer its users 3 major advantages in the core area of

DATA SECURITY

Cryptocurrency users will love to have access to their sensitive information at all times. But this come at a risk as all this vital informations could be gone in a seconds if the security protocol is breached!.

Goldilock will solve the problem of data security via the 'Physical Airgap Disconnection' to ensures that all sensitive datas are physically disconnected from the internet away from the reach of hackers!

So both the Cryptographic Nature of the NEO blockchain and Regressive Technology employed on Gridlock combines to create a unique and secure key custody and data storage solution for individuals and organisations!

EASY ACCESSIBILITY

This time the users are not compromised or forced to choose between hot storage or cold storage!

Goldilock uses a non-IP-trigger mechanism to grant temporary access to a user request before it reverts to act as an offline cold storage.

media.4c1e409f.png

The Goldilock technology is built such that all the user informations are physically disconnnected from the internet everytime any desired transaction is completed!

TRACELESS TRANSACTIONS

Every transactions on Goldilock are invisible and inaccesible to hackers because on Goldilock all transactions are carried out over an encrypted channel via a dedicated URL and access credentials!

What this means is that user must be securely logged in to the Goldilock server before they can have full access to their account. This is possible through the integration of proven technology such as two-factor authentication, device recognition software, biometric gateways, optional multi-signature security and multisite encrypted backup.

However, all transactions history will be available for the user offline

Note : Goldilock has no access to private keys or data stored on the client's encrypted storage device

THE GOLDILOCK SECURITY SUITES (GSS)

The backbone of the Goldilock Security Suite is a patent-pending, user-controlled, remotely activated airgap security solution for cryptocurrency key custody and storage of sensitive digital assets.

goldilock.png

original image by me

The Goldilock technology is relevant in many other sectors of human endeavour including healthcare!

HOW DOES GOLDILOCK COMPARES WITH HIS COMPETITOR

This table below summarises how Goldilock compares to Xapo, an offline digital storage provider
xapo vs goldilock.png
original image by me

WHO CAN USE THE GOLDILOCK TECHNOLOGY

This technology offers security as well as a making any system it is being employed easily accessible when needed!. Therefore, the Goldilock technology will find relevance in

  • Crypto Exchanges

To prevents their customers from security breach and hacks while ensuring they have complete control of their asset.

Expect to see exchanges partnering with gridlock unique solutions.

  • Individual Remote vaulted wallet

The Goldilock wallet is built such that your private data are kept offline and can only be accessed remotely via biometric gateways which must be signed by your private key to grant access to the user.

  • Secure Digital Vault

Other sensitive digital information such as credit card information, kyc information or private contract can be securely stored and accessed when needed ONLY, meaning all this information will be available offline until a request is made by the user!

Others applications of Goldilock technology are in the areas of

  • Credit Reporting Agencies
  • Banks
  • Digital Right Management
  • Healthcare Records

Goldilock is a GDPR compliant institution!

Use Case Scenario

Fred is a crypto investor that has being using the Xapo Offline storage for sometime without any issue until Xapo got hacked!

Fred lost all his cryptocurrency holdings. Joe, a kind friend of his offers to send him some cryptocurrency as a show of solidarity.

Joe also advised him that an institution like goldilock would have guaranteed the full extraction and delivery of his data in such a scenario. Fred saw potential in what joe recommended and signed up to the platform!

THE LOCK TOKEN ECONOMY

The lock token is required to access the goldilock wallet which means that users will purchase the lock token inorder to use the Goldilock platform

How it works

Other use cases of the Lock token within the goldilock ecosystem are

image (2).png

  • Allows Goldilock to provide users with record of their node activity
  • Lock token will be the accepted method of subscription payment for individual users on Goldilock Security Suite (GSS).

Lock token information

Total Supply : 1 000 000 000
Hard Cap : $50M
Token Sale : Presale Already Ongoing

CONCLUSION

The Goldilock technology is the perfect response to the disproportional question of security versus accessibility!

They have succesfully buck the trend that security have to be compromised for ease of accessibility and vice-versa.

This means that centralized exchange who employ the goldilock technology can offer their users a better control of how they store their data!

MEET THE TEAM

PicsArt_08-06-12.47.07.jpg
PicsArt_08-06-01.02.33.jpg

ROADMAP

TimelineAugust.d96ac70f.png

HELPFUL RESOURCES

Sort:  

This post has been submitted for the @OriginalWorks Sponsored Writing Contest!
You can also follow @contestbot to be notified of future contests!

@awesome-p, I do not understand anything written

Coin Marketplace

STEEM 0.28
TRX 0.13
JST 0.032
BTC 61367.99
ETH 2929.04
USDT 1.00
SBD 3.67