Databloc is a platform which is the 9th generation that has been developed by a leading technology company, Stonefly. Some people judge that Databloc and Stonefly are the same platforms — both providing data storage services online, but with different operating systems. Which is where Databloc integrates the as its operating system, while Stonefly does not. But in reality Stonefly also uses technology that can support its operation in a document backup system.
The technology that is integrated by Stonefly is useful for detecting or conducting verification processes for companies that set service standards that focus on increasing customer convenience. This is also the same as Databloc which integrates the to get decentralized services that can serve customer requests quickly and precisely. This is because the main function of the is a database that is able to and distribute data quickly and precisely. Exactly what that means, even though the data is available in a decentralized system. Not that the data can be accessed by all interested parties. But the use of technology can all data information accurately, so that it can determine who can access the data. This stored data will later form various chains of transaction records that continue to grow. Automatically this technology can copy all the chain records. This is done to avoid things that are not desirable, such as lost data or attacks originating from cyber parties. Data stored and copied will certainly not change from the form or contents. Therefore the users do not need to feel worried about all the trust that has been given.
The main function of technology is not only obtained by Databloc and Stonefly, but also by all platforms. But that also depends on the policies they issue.
Similarly, Databloc has a stone which is also called a utility that is able to interact with a number of clouds. In the system, Stonefly has a stone or Stone365 DR365 which can produce a unique cryptographic “fingerprint” or better known as the hash available for each file. This also applies, if the file has a change in form or formation from its original form. Then the fingerprint can automatically change, even though the percentage change is very small. Therefore it will be very difficult for the attacker or unrelated parties to the data to determine the original input. This method is done by hash originating from all data containing fingerprints which will be recorded in the system. Then later it can be verified by the parties related to the data.
From here we can see that Stonefly only uses technology in terms of data backup only. But to operate it generally still uses the initial technological components. In this phase the has the task of storing each additional note at the end of the chain. Basically file backup is needed by all data stored online. Because in the case of data stored with georedudancy techniques. Where the data is stored at different location points and if the data is deleted intentionally or accidentally. Then the data stored at all points of the location will also disappear.
To increase user trust, every data that is reserved will get a certificate. This certificate is of course formed automatically by using technology. This certificate contains information stating that the reserved data has not changed form or formation at all.
Compared to Stonefly which currently only uses technology on file backup only. Therefore, Databloc is currently implementing technology for all its operating systems. This is because Databloc was originally designed as a complete technology based platform. Unlike the case with Stonefly, from the beginning it was designed not to use the principles of technology on the .
The technology integrated by Stonefly for data backup, is also automatically integrated by Databloc for the same use. This happened because of the development of Databloc’s own technology which had been under Stonefly’s control and authority.
Reference
Website
Whitepaper
Telegram:
Executive-summary:
Bounty:
Twitter:
Published at Sat, 11 May 2019 01:46:03 +0000