ONTACT PROTOCOL EN
  • SUMMARY
  • Challenges in existing IoT Market
    • Data Sovereignty Issues
    • Personal Information Leakage Problem of Centralized Companies
    • Problems in Data Storage Process
  • Experiments to Realize Data Sovereignty
    • Decentralization
    • Decentralized Storage System
  • Ontact Protocol Solution
    • The Concept of Development
    • Decentralized Personal Authentication and Data Management
  • Use Cases of DIA & DPS
  • Ontact Protocol Ecosystem
    • Multi-directional Data Ecosystem Establishment
    • Ecosystem Expansion
    • The Strengths of the Ontact Protocol
    • Reward System using Tokens
  • Ontact Protocol Token
    • Token Information
    • Token Allocation
    • Tokenomics
  • Roadmap
  • Legal Disclaimer
  • Channels
Powered by GitBook
On this page
  1. Experiments to Realize Data Sovereignty

Decentralization

As mentioned earlier, we believe that the protection of data sovereignty is the core keyword of Web 3.0 and the key to its success. The core of data sovereignty lies in decentralization. Users directly manage the data they create, and allow others (individuals and companies) to access or use their data only by their own choice. Centralized companies or organizations cannot arbitrarily access these individuals' data, and this decentralized system effectively realizes true data sovereignty.

PreviousExperiments to Realize Data SovereigntyNextDecentralized Storage System

Last updated 2 years ago