CRIPTOKEY CUSTODY AND CONFIDENTIAL INFORMATION: Safe, practical and accessible

in #crypto6 years ago (edited)

Source



What is Goldilock?

Goldilock is an “Air Gap” security solution controlled by the user and activated remotely for the safekeeping of cryptocurrency keys and confidential digital assets.

Goldilock will set the trend in cryptocurrency key security systems and sensitive information for individuals and institutions and will transform the way we safeguard our confidential information.

All of us have had problems accessing our accounts or wallet, the key has been might be lost or we just don't remember it. To solve this problem we use storage devices or paper, but these can be damaged, lost, stolen, or simply become inaccessible unless you always carry them with you. One possible solution is to keep this data online but, of course, any information in the cloud is the target of hackers, and you might be the victim of theft and could have great losses.

Goldilock combines the best of the custody mechanisms (cold or hot) and gives you access to your keys or data when you need it, wherever you are without compromising security.

“NOT HOT STORAGE.
NOT COLD STORAGE.
JUST THE RIGHT STORAGE”


Current situation

One of the reasons why cryptocurrencies have not been adopted massively by institutions is the problems of key custody, although the blockchain technology is by definition more secure than traditional systems, it is under the same attack vectors.

Currently, the burden of protecting cryptocurrency wallets falls on investors and access codes are protected with complicated, obsolete, inefficient, primitive and impractical security measures. The user is forced to choose between hardware solutions for cold storage and online hot wallets, both with many risks and disadvantages.

  • Traditional Cold Storage Solutions: Paper, hard drives, USB drives, can be lost, stolen or damaged and the only way for users to have high accessibility is to permanently carry them everywhere. Furthermore, the storage offered by an encrypted cold wallet in a bank chamber is not a viable solution for a person or company that frequently makes transactions, access to your hardware can take days, compromising the business opportunities.

  • Hot storage solutions: Any Internet connection can be hacked by weaknesses or security breaches, this is demonstrated by the more than 4 billion files leaked in the last 2 years, compromising emails accounts, banks, credit card accounts, also the theft of more than 1,200 million USD in cryptocurrencies, especially the famous case Mt.Gox, where this company lost about 473 million USD in Bitcoins equivalent to 7% of available BTC.


How does Goldilock work?

Goldilock storage is physically disconnected from the internet (“air gaped”) and cannot be accessed without the user's wallet keys. But, through a non-IP mechanism, the user activates his wallet to make it accessible through the internet. The user accesses his wallet through an encrypted URL connection and provides owner credentials to execute his operations. Then the user closes the access and disconnects the wallet again from the internet.



Solutions:

  1. Consumers:
    • Private Key Custody
  2. Institutions or companies:
    • Criptocurrency Exchanges
    • Online/Hot Wallet Operators
    • Hardware/Cold Wallet Operators
    • Data Storage and Digital Asset Security

Applications

Goldilock Security Suite is an “Air Gap” solution remotely activated by the user that includes:

  • Goldilock Wallet for Cryptocurrency: It will run in a WEB browser authenticated over SSL certificate. The keys for each wallet reside on unique and encrypted hardware wallet, that is disconnected from the internet. This wallet will be connected through a command without IP and will be verified by PIN or voice recognition mechanisms with a switched telephone network without IP. When closing the wallet the device is disconnected from the internet. Each wallet will have a unique URL and each transaction will require Two-Factor authentication.
  • API Services: API Services will allow institutions that already have wallet solutions to improve its security levels and will be implemented in Goldilock housing facilities and in the cloud. They will also provide enterprises and partners to create privacy-focused and consent driven applications. They can also be integrated into decentralized applications or independent applications.

Technology

Goldilock uses NEO-NEP5 blockchain technology for generation of Token Lock that is combined with the logic of smart contracts. This technology will be the support of NEO currency and will make it the safest in the market. It will constitute an audit mechanism for all individual nodes with Default Byzantine Fault Tolerance (dBFT).

Why NEO and not another technology? Because it is the safest available so far, it is the first platform that offers features focused on the creation of Smart Economy that complies with international regulations incorporating:

  • Compliance regulations: NEO will use the Public Key Infrastructure (PKI) standard X.509 to verify identities so that it can issue and confirm digital identities. NEO is integrating this mechanism into their ecosystem.
  • Utilizes a Superior Consensus Mechanism: NEO uses consensus mechanisms called «Delegated Byzantine Failure Tolerance » (dBFT). The dBFT is a modification of the participation test protocol in which NEO token holders vote for delegates and delegates must reach consensus on acceptable transactions.
  • Faster Transaction Validation: The NEO consensus mechanism allows the blockchain to process more than 10,000 transactions per second without transaction costs.

Goldilock's utility

It can be used to store private cryptocurrency keys, banking and credit information, personal identities, health data, digital media, and signature or approval keys.


Who can use Goldilock?

  • Consumers and institutions seeking better security solutions for their private cryptocurrency keys than currently available.
  • Consumer who need more security, flexibility and global availability for custody of private keys.
  • Institutions seeking security improvements for the most confidential digital assets of their clients by elimination the connection of these when not in use, but that allow immediate Access.

This technology is ideal for banking and insurance companies to increase the security levels of their client's data and an option to eventually replace their current registration technology. Also, they could simplify the interaction processes with their clients making them more efficient, faster and less resource-consuming. Even more, the risk due information lose could be greatly lowered. In addition, the trending to increase the use of cryptocurrency and other digital assets indicates that eventually the national fiduciary currencies will eventually be replaced by a global ecosystem and economy based on the blockchain.


Goldilock Overview


Sort:  

This post has been submitted for the @OriginalWorks Sponsored Writing Contest!
You can also follow @contestbot to be notified of future contests!

@douglasflo, I do not understand anything written

Why you don´t understand it?