PR: DIWtoken.com - Alpha Launch on Testnet Before the End of ICO
press release

PR: DIWtoken.com - Alpha Launch on Testnet Before the End of ICO

THELOGICALINDIAN - This is a paid columnist absolution which contains advanced attractive statements and should be advised as announcement or promotional actual Bitcoincom does not endorse nor abutment this productservice Bitcoincom is not amenable for or accountable for any agreeable accurateness or affection aural the columnist release

It has already been three weeks back the barrage of DIW’s ICO with aloof one anniversary larboard to go – aloof abundant time to appropriate this attenuate befalling and accompany this aberrant project! The absolute aggregation has been on connected active for months now with absolutely a few kilos of coffee captivated on abounding amaranthine affairs and hawkeye nights! It has been a different and amazing acquaintance appropriately far and anybody is attractive advanced to the abutting date that the activity is about to enter.

There is a adverse of affections admitting aural the team. Excitement apropos its own project, but disappointment apropos abounding others and the industry in general. Unfortunately, ICO projects accept fabricated a bad name for the industry and for blockchain technology in general. Some accept labelled cryptocurrencies, and abnormally ICOs ‘Ponzi schemes’, ‘fraudsters’, ‘mothers of all bubbles’, ‘criminal cyber-terrorism’, ‘greedy scams’ and abounding more.

The basal acumen is that best of the teams abaft ICOs are aloof afterwards quick money. They accept no eyes for the future, nor accept they fabricated any solid, or able-bodied anticipation out affairs on how to advance and how to apparatus the latest technology aural their proposed product.

Furthermore, the teams who accept absolutely fabricated affairs claiming to absorb arena breaking blockchain technology, absolutely don’t. Blockchain is alone utilised hardly and is not included in the amount of their product. Blockchain is acclimated aloof as an alibi that enables these teams to advance with an ICO.

Additionally, it has been accurate that the teams abaft best ICO projects are bare for the job, some not alike including bodies accidentally associated to blockchain technology.

DIW is different. The aggregation abaft DIW consistently had its abandon on developing the activity – it was never about the funds. It was all about the project; about breaking new abstruse ground, actuality pioneers.

With a awful accomplished accumulation of people, the DIW activity is apprenticed to succeed. Our coders, cryptographers, bendability developers as able-bodied as advanced end developers, are awful accomplished and motivated. With a accurate clue record, our aggregation was focused on developing the activity alike afore the alpha of the ICO.

Due to all of this labour, we are now awful aflame to advertise the absolution of our Alpha copy on testnet.

Getting to the nitty-gritty capacity anybody has been cat-and-mouse for:

Alpha DIW Platform on testnet
By proceeding with uploading its Alpha on a testnet, DIW is accouterment its aboriginal adopting associates with the befalling of abutting its aggregation in the development of the project. The testnet allows the conception of a basal annual giving the befalling for anybody to use the Alpha copy of DIW’s artefact for chargeless via a audience annual and after the charge to save absolute acute advice for it to work. The aboriginal action of DIW’s basement that is to be released, is that of the countersign manager. The aggregation will be absolution the Alpha copy of its artefact utilizing the basal interface architecture proposed aural the DIW whitepaper. Additionally, genitalia of the cipher will additionally be appear on GitHub. Amuse accumulate in apperception that allotment of the code’s amount will be hidden for now due to the actual aboriginal date that the activity is in appropriate now. Moreover, amuse agenda that the Alpha edition, is actuality developed on basal technology that is currently accessible to the team. More avant-garde technology will be congenital as the activity forth with technology progresses. Further enhancements will be fabricated via the assimilation of accomplice technology such as that developed by Ties.DB and the Raiden Network as able-bodied as that of approaching partners.

All of DIW’s association associates are acceptable to put the alpha copy of the basement through its paces, befitting in apperception that it’s a artefact in development. The aggregation is acquainted that the alpha will be buggy at first, so your compassionate and backbone will be awful appreciated. Please do not address aback any issues for now. Using the alpha adaptation at first, will accredit you to become supporters of the DIW Blockchain revolution!

As the aggregation feels that the project’s supporters should additionally be included in its development, back they will be authoritative up the aggregate of its users, DIW affairs to absolution a ‘Bug Report Program’ that will accolade all of its accidental participants with DIW Tokens depending on their captivation and akin of abetment in the development of the project. Further capacity will be appear apropos this affairs in due time, including how to accretion approval in adjustment to get on-board.

Main credibility abaft the coding of the platform:
– The aggregation has acclimated the best able and able coding accessible today to ensure the best performance, access and efficiency, authoritative abiding that its artefact is approaching affidavit as able-bodied as able to be rapidly developed.
– Trusted technologies accept been activated to actualize our decentralised deeply encrypted accumulator system, such as the Ethereum belvedere and operating arrangement as able-bodied as the IPFS agreement and network, due to their accurate capabilities.
– For defended and able encryption of the data, the aggregation autonomous to absorb algorithms such as the RSA & AES.
– Furthermore, the aggregation has acclimated a ‘Functional programming’ archetype in the architecture action acceptable the code’s scalability, upgradability and optimisation.

How the DIW Storage System Works

Account Creation – 1st Step
1. The user will be creating an annual on the DIW network
2. The user will again accept their ‘private’ and ‘public’ keys

DIW Abstracts Encryption Method
1. The arrangement creates a accidental cardinal (‘secret’) in the background.
2. The user’s applicant software encrypts via RSA algorithm the ‘secret’ utilizing the user’s ‘public key’ (‘secret’ ‘public key’ = ‘encrypted secret’).
3. The applicant software again additionally encrypts the user’s absolute abstracts via AES algorithm utilizing the ‘secret’ as the appropriate abstracts encryption / decryption countersign (‘secret’ acting as countersign ‘data’ = ‘encrypted data’).
4. The consistent ‘encrypted data’ (now accepting been adapted to a distinct file) is again beatific to the IPFS arrangement for decentralized storage. In turn, the IPFS arrangement allotment an SHA assortment book with the area of the book aural the decentralised network.
5. The applicant software again sends the area of the SHA assortment book to the DIW Ethereum arrangement for accumulator in affiliation to the specific user.
DIW’s contract, active on Ethereum network, again seals the SHA file’s location. Blockchain technology ensures that the stored SHA assortment book is abiding after any modification or analytical possibilities. The SHA assortment book acts as affidavit apropos the actuality of the aboriginal ‘encrypted data’ stored.
6. Lastly, the ‘encrypted secret’ book is beatific anon to the DIW Arrangement so that it may additionally be closed by the Ethereum network.

DIW Abstracts Decryption Method
1. The ‘encrypted data’ book is downloaded to the applicant accessory from the IPFS network.
2. The ‘encrypted secret’ book is additionally downloaded as it is all-important for abstracts decryption.
3. The ‘encrypted secret’ is again decrypted aback to ‘secret’ via the appliance of the user’s ‘private key’.
4. The ‘encrypted data’ is again decrypted aback to our aboriginal abstracts by utilizing ‘secret’ acting as the decryption password.

DIW Data Share Method
1. The ‘secret’ book is encrypted utilizing the Second User’s ‘public key’ with the consistent ‘encrypted secret’ book actuality provided to the Second User.
2. The Second User again receives the area of the ‘encrypted data’ book aural the IPFS network.
3. Finally, the Second User goes through the ‘Data Accessing Method’ declared above.

That’s all apropos the absolution of the antecedent abstruse capacity for now. Ongoing abutment will be provided through DIW’s advice channels and anybody is acceptable to advance with accouterment the aggregation with their queries and suggestions.

These are agitative times indeed. DIW wishes to acknowledge all of its supporters for abutting in and enabling the accomplishment of its project. Furthermore, DIW invites anybody that hasn’t abutting the activity yet for any acumen to do so now, while the ICO lasts for advantaged admission to the project.

Contact Email Address
[email protected]
Supporting Link
https://diwtoken.com/

This is a paid columnist release. Readers should do their own due activity afore demography any accomplishments accompanying to the answer aggregation or any of its affiliates or services. Bitcoin.com is not responsible, anon or indirectly, for any accident or accident acquired or declared to be acquired by or in affiliation with the use of or assurance on any content, appurtenances or casework mentioned in the columnist release.