Goldilock || Just the right Data Storage...

IMG_20180808_045546_185.jpg

I've had to use some applications built on the blockchain and I must confess and I'm sure you'd agree; those private keys are long!

Clearly, being almost 60 characters long - in an alphanumeric mixed case nature - they were not meant to be memorized. Certainly, they were meant to be written down somewhere or somehow. I would still argue that they were not meant to be written down manually with pen and paper, as the task would be herculean, each and everytime a user wishes to access or make some value transactions on the blockchain, deterring blockchain applications usage and access or at worst even adoption of it. To a high degree, I'm quite certain that these private keys, were meant to be handled with my most favorite function in contemporary devices; Copy and Paste😏

...Not that I'll use any of it in this article though, this is an Original work😂

Another option would be to save the keys with the application browser. The question that pops up next is, where?

Where do you copy and paste it to? Where do you save it with your browser to?🤔

If you say a cloud storage or more generally, a hot storage, although it greatly enhances accessibility, you should also bear in mind that, it is connected to the "digital no man's land" - the internet - where it is prone to hacking, as they say, if it's connected to the internet, it can be hacked

If you say you'd save to a mobile device or more generally a cold storage, not only should you consider how strenuous accessibility would be, you should also consider that you'd have to always tote around the device or object on which it is saved which increases the chances of it being misplaced, damaged or stolen.

It's disheartening that this all revolutionary technology left us with this key handling responsibility and belive me when I say it has lead to major value losses in history. Myopically, I used to think a cloud storage was the best bet because of it's accessibility and it's "promised security", until I was almost hacked. Now I know that a storage system which combines the security of cold storage and the accessibility of hot storage is the "bestest" bet😏.

As regards this, allow me introduce to you, Goldilock! - the not hot storage, the not cold storage, just the right storage.

IMG_20180808_041856_526.jpg

Introducing Goldilock

Having considered these menacing problems facing keys storage and keeping other digital assets, Goldilock presents a solution that combines the security of cold storage to the accessibility of hot storage, through their patent-pending security suite. The Goldilock ready technology eliminates the security uncertainty in storing digital assets remotely over the internet by physically disconnecting it from the internet when the user is done with it using a physical air gap disconnection method.

IMG_20180808_041856_526.jpg

Goldilock - The digital Golden Lock

Never has this kind of technology being in existence before that provides just the right mix of both online and offline storage, it's a rare metal, just like Gold.
But then, is Goldilock sustainable and scalable? Does it provide a long-lasting storage solution suitable for both individuals and institutions? As regards, the stringent regulations set up by governments and the more data handling restrictions to come, how lined up is Goldilock to comply with them? When it is tempered by the heat of hackers, will this solution come out polished and refined just like gold or will it fail under stress?🤔

To honestly provide answers to these questions, Let's take a fair consideration of the Goldilock security suite and some of Goldilock team's missions;

IMG_20180808_041856_526.jpg

Goldilock Security Suite

Before mining out the treasures contained in this security suite, you should know about its backbone. The backbone of the Goldilock security suite is a patent-pending, user controlled, remotely activated airgap security solution.



Goldilock's Patent-pending Technology

Screenshot_20180807-231436.png

The air gap security solution is designed such that the storage device which holds client digital data automatically and physically disconnects from the internet after the user has made an encrypted access to his keys or other stored digital assets. Each time, a client wishes to access it again, the client "calls" it online with a non-IP mechnanism over the Public Switch Telephone Network (PSTN) which couples biometric gateways and device recognition to ensure high levels of security. This air gap trigger doesn't really need to call the wallet online for funds to be associated with the public address of the wallet. The triggers are only needed for withdrawals and transfers. Goldilock's non-IP mechnanism which makes the call possible over an air gap is a new technology and it's a property of Goldilock, for any other future implementation, the consent of Goldilock must be sought. For short, Goldilock ushers us into a new age of improved security possibilities in the digital world, by providing a solution that can be implemented on the already existing internet. Hackers, you should start think of getting a new business.😏

And now, the security suite;



The Goldilock Wallet

Specifically designed for big shots and the small shots still shooting in cryptocurrency investments, the wallet is aimed at making NEO the most secured cryptocurrency in the market because of some shared values between the NEO Economy and Goldilock. The wallet is built to be compatible with NEO, GAS and other NEP-5 tokens. Although the wallets will run inside a web browser authenticated over SSL, the wallet keys are not saved in it. They are saved in a unique, segmented and encrypted hardware wallet device that's disconnected from the internet. Each wallet has a unique personal assigned URL, which gives a 404 ERROR_NOT FOUND, before the wallet is called online through the non-IP command.

From the described process, you can imagine sending a non-IP command, maybe via a USSD code through your phone dial, confirmed by voice/device/pin/biometric verification which calls your wallet and key storage custody online and then you can use the keys which you can now access, to open your wallet and make transactions or withdrawals with saved tokens, which will require a Two-Factor Authentication (2FA). Immediately, a client closes the wallet after concluded transactions or withdrawals, the wallet is automatically disconnected and would require another call to bring it online.



Goldilock API Services

It's invalid to think that Goldilock has come to be a competition in the digital security space. Goldilock just seeks to build an ecosystem of securing cryptocurrencies, in order to usher us into a next generation of consent driven applications built for trust and security. As such, Goldilock provides API services that will allow other interested institutions improve security on their already existing wallet solutions through their patent-pending air gap disconnection technology.
Goldilock meets any required level of privacy by enabling the API services to run either on-premise, in Goldilock colocation facilities and in the cloud. These API services is also built with flexibility to ensure sustainability, as it can be integrated with any kind of application, ranging from non DApps to Standalone DApps.

IMG_20180808_041856_526.jpg

Did you Wonder Why NEO?

Goldilock shares some values with the NEO smart economy. The NEO community-based blockchain project is non-profit and it is aimed at using blockchain technology and digital Identity to digitize assets, automate the management of digital assets using smart contracts, realize a “smart economy” with a distributed network. Above all, it aims to enable a regulatory compliant smart economy recognized by both enterprises and the government. This why Goldilock is locked on to NEO.

NEO's blockchain network is currently cruising at a transaction speed of 10,000tps and it runs on a resource cost-effective consensus algorithm dubbed Delegated Byzantine Fault Tolerance (dBFT) - an improvement of Ethereum's Proof of Stake (PoS) and Bitcoin's Proof of Work (PoW) consensus algorithm. Armed with the features speed, resource conservation whilst not neglecting the need for regulatory compliance, Goldilock inherits NEO's key features that will allow for a rapid scaling or widespread of its solution for data storage.

IMG_20180808_041856_526.jpg

Goldilock's Vision

As more strict and stringent regulations pop up with penalty fines placed at over €20 million like for the EU General Data Protection Regulation (GDPR), for data storage technology providers who fail to implement the best storage technology to protect their client's data, Goldilock aims to position it's data storage solution to become a standard for data storage licensing by these regulators and so far, It's been doing an excellent Job. Goldilock has even got a mention from Forbes as one of the top new blockchain companies to watch out for. See here

IMG_20180808_041856_526.jpg

Goldilock and Safety First.

"Safety first" is the thought that comes across the mind of people before they make any decisions, delve into any venture or adopt a technology. For this simple reason, Statistics fail me, but so many individuals and businesses who feel their client data or operation data are too important choose to do things offline. They prefer "On Paper" or on an electronic device that has never known the Internet. They do not wish to sacrifice security for accessibility and all other mouthwatering possibilities the internet brings.

Goldilock doesn't just change how people handle just digital data, it changes how people and businesses handle data at all. By allowing people get the security of offline storage whilst not sacrificing the exciting possibilities of being connected to the internet. If statistics could be taken from now - the inception of Goldilock - to, say, three years from now, you'd see that most individuals and businesses would have eliminated their "no-man's-land fear" with Goldilock.

For one, we know that the internet allows for a wider coordination of businesses across wide geopolitical zone with very little, as it obviously makes the world seem like a homogeneous global hamlet but at the same time, introduces different threats to communications and transactions - the different colors of hat hackers. These threats are ultimately eliminated by giving them little or no time to dig through encrypted data, and so anytime individuals or businesses ranging from banks to insurance firms, think "safety first" when using the internet for whatever reason, they think Goldilock and are encouraged to adapt to the contemporary means of data handling that comes with the internet.

In addition to these threats elimination, Goldilock shifts the focus of the world's population to the internet and blockchain by removing that insecurity tag it once had that deterred users from using it for either data management or value transactions. Opening these new set of security possibilities, Goldilock would encourage a mass adoption of cryptocurrencies as it actualizes the ease, efficiency, security and accessibility of envisaged and initiated by the blockchain technology.

IMG_20180808_041856_526.jpg

Use Cases

Although I might have subliminally emphasized on Goldilock being used to store cryptocurrency keys and cryptocurrencies themselves, starting from the NEO and Co. The Goldilock solution can be implemented on a variety of digital properties including, banking and credit information, personal identity, health data, digital media, signature or approval keys etcetera, for both individual consumers and institutions.
Goldilock also targets providing Platform-as-a- Service (PaaS) through it's partnerships and aim to increase it's instances of users Including cryptocurrency exchanges, hot and cold wallet operators, health, financial, legal firms etcetera, by providing an on-demand accessible storage for any kind of information.



A True Story

Goldilock can be used in the Educational system too for protection of students databases.

A friend of mine, a programming wiz, once told me the found out a fault on the university's web framework. That fault created an opening to allow him edit, delete and create students' records ranging from payment slips, results, personal data etcetera. The only issue he had now was who to report it to because if he reported to the school, they might accuse and penalize him or if he did a lecturer, he would be unsure of the lecturer's motives who might use it to his advantage.
With Goldilock, the flaw would not have opened access to the students databases. As that page would be locked in a secured data centre vault somewhere in the world and physically disconnected from the internet until the university needs it.

In addition to this, intellectual properties including ebooks and scholarly articles and some paid apps would be granted the sure security of disconnection whilst not sacrificing accessibility and the ease of distribution the internet provides.

IMG_20180808_041856_526.jpg

Goldilock's Token - LOCK™

The LOCK token is registered as in NEP-5 token on the NEO Blockchain. It governs and audits all operations or transactions performed on the Goldilock ecosystem. The auditing mechnanism formed by the LOCK token in combo with the smart contract logic and the audit information is written on Goldilock's own private blockchain.

Screenshot_20180808-032024.png

The LOCK token is also needed to access a Goldilock wallet. With the LOCK token, activities of users' nodes can be recorded and provided when needed, while encrypting and LOCKing away user-owned data from everyone including the Goldilock team. The LOCK token is also to be accepted means of subscription payment for individual users.
There are 1 billion LOCK tokens, out of which 670 million has been offered for sale to the Public by Q3 2018 and the others distributed as shown in the image below.
IMG_20180808_041606_514.jpg

IMG_20180808_041856_526.jpg

Goldilock Team

team1.JPG
team2.JPG
team3.JPG



Goldilock Advisors

advisors.JPG

IMG_20180808_041856_526.jpg

Goldilock Partnerships

IMG_20180805_090607_413.jpg

IMG_20180808_041856_526.jpg

Goldilock Mentions

IMG_20180808_041856_526.jpg

Goldilock Roadmap

IMG_20180808_043003_150.jpg

IMG_20180808_041856_526.jpg

Additional Information and Resources

See Video below for more information and Clarity;

All "Un-Sourced" Images are credited to Goldilock.

Tweet_Link:

goldilocktwitter
goldilock2018

H2
H3
H4
3 columns
2 columns
1 column
1 Comment
Ecency