ONTACT PROTOCOL EN
  • SUMMARY
  • Challenges in existing IoT Market
    • Data Sovereignty Issues
    • Personal Information Leakage Problem of Centralized Companies
    • Problems in Data Storage Process
  • Experiments to Realize Data Sovereignty
    • Decentralization
    • Decentralized Storage System
  • Ontact Protocol Solution
    • The Concept of Development
    • Decentralized Personal Authentication and Data Management
  • Use Cases of DIA & DPS
  • Ontact Protocol Ecosystem
    • Multi-directional Data Ecosystem Establishment
    • Ecosystem Expansion
    • The Strengths of the Ontact Protocol
    • Reward System using Tokens
  • Ontact Protocol Token
    • Token Information
    • Token Allocation
    • Tokenomics
  • Roadmap
  • Legal Disclaimer
  • Channels
Powered by GitBook
On this page
  1. Challenges in existing IoT Market

Personal Information Leakage Problem of Centralized Companies

According to Business Insider Inc and Reuters, the personal information of about 533 million Facebook users was leaked on certain hacking online bulletin boards. This is personal information about Facebook users' phone numbers, IDs, names, residences, birthdays, history, e-mail addresses, and gender in 106 countries, and dozens of platform giants, as well as Facebook, repeatedly suffer from personal information leakage every year.

Companies collect customer personal information and provide various services using it. The collection and use of customer data are unavoidable for today's companies, and companies are paying huge expenses for various security solutions such as strengthening cyber security systems to protect customer information, managing passwords, and IDs and separating servers. Despite this, data stored by centralized companies, such as DDoS attacks on servers, is still a major target for hackers, and threats to IoT smart devices are becoming more serious.

In addition, although various efforts are being made to protect data, such as personnel training, compliance reinforcement, and legal response, centralized company data storage, whether technical or moral, still has great potential risk, and huge losses and social criticism due to leakage of data. It safely protects data generated by all participants, such as personal information, application usage history, and IoT device data. At the same time, it provides the convenience of using the data conveniently and widely on the premise that a fair value is paid to organizations or companies that need individual data.

PreviousData Sovereignty IssuesNextProblems in Data Storage Process

Last updated 2 years ago