The PDP application is a Proof of Concept (POC) encryption protocol designed to be a tool that helps improve user privacy. However, like any encryption method, other than One-Time Pad, it cannot be considered unbreakable. Therefore, we recommend that it be adopted only as an encryption layer that is useful for improving user privacy.
This is a type of experimental block encryption protocol, not certified, which performs encryption with different Nbit keys for each piece of data to be encrypted.
However, unlike the Cipher Block Chaining (CBC) encryption mode, it does not propagate the encrypted blocks, instead it generates a different encryption key for each block.
The App does not request a phone number and any type of sensitive data from the user.
There is no technical support for misuse of the protocol, such as loss of keys or misuse of keys.
Precious Data Protocol - PDP, is an experimental protocol used to perform encryption, storage, sharing, and decryption of diverse texts and files:
The protocol was first designed to manage user credentials for: access, encryption, sending, retrieving and decrypting data through the Bitcoin SV (BSV) network.
But the protocol can also be used to:
1 - For private personal storage, on disk, memory, internet clouds with Google Drive, DropBox, OneDrive, etc.
2 - For P2P sharing through different means such as: email, whatsapp, telegram, discord, bluetooth, sms (text), etc.
The storage or sharing of data using the BSV network is done through the MoneyButton platform (https://www.moneybutton.com),
To use the protocol through the BSV network, the only existing cost is related to sending data, which is defined by the transaction processors of the BSV network, currently about 0.000000005 BSV / Byte.
Data access and recovery is performed at no additional cost, requiring only user access and internet access credentials.
If the user only receives data from the BSV network, he can consult it freely through the PDP at no additional cost.
USER ACCESS CREDENTIALS
All management of access credentials is done locally by the user. The protocol assumes the user as being solely responsible for the secure storage of credentials for accessing their data stored on the network:
1 - Username;
2 - Password;
3 - User XPIN;
4 - Names of Contacts;
5 - XPIN of Contacts.
These five credentials provide access to all personal data sent and / or received through the PDP protocol on the BSV network.
Any combination of credentials other than those used when sending data makes it impossible to decrypt the stored content. Therefore, the user must be very careful, as there is no support for such misunderstandings.
Data recovery on any device is immediate, with the correct combination of credentials.
PROTOCOL FEATURES
- Encryption, storage, sharing, and decryption of various texts and files;
- Sending and retrieving data (personal or shared P2P) through the BSV Network;
- Data stored or shared with NBITS Encryption - (Encryption Key of Size in Data Bytes);
- Digitally signed data sharing option in ECDSA;
- Permanent backup, with numerous redundancies, in the DBs of transaction processors in the BSV network;
- You do not need a registration or phone number to use the App;
- It is not necessary to inform any type of sensitive data;
- Immediate data recovery using keys that only the user should have access to;
This is a type of experimental block encryption protocol, not certified, which performs encryption with different Nbit keys for each piece of data to be encrypted.
However, unlike the Cipher Block Chaining (CBC) encryption mode, it does not propagate the encrypted blocks, instead it generates a different encryption key for each block.
The App does not request a phone number and any type of sensitive data from the user.
There is no technical support for misuse of the protocol, such as loss of keys or misuse of keys.
Precious Data Protocol - PDP, is an experimental protocol used to perform encryption, storage, sharing, and decryption of diverse texts and files:
The protocol was first designed to manage user credentials for: access, encryption, sending, retrieving and decrypting data through the Bitcoin SV (BSV) network.
But the protocol can also be used to:
1 - For private personal storage, on disk, memory, internet clouds with Google Drive, DropBox, OneDrive, etc.
2 - For P2P sharing through different means such as: email, whatsapp, telegram, discord, bluetooth, sms (text), etc.
The storage or sharing of data using the BSV network is done through the MoneyButton platform (https://www.moneybutton.com),
To use the protocol through the BSV network, the only existing cost is related to sending data, which is defined by the transaction processors of the BSV network, currently about 0.000000005 BSV / Byte.
Data access and recovery is performed at no additional cost, requiring only user access and internet access credentials.
If the user only receives data from the BSV network, he can consult it freely through the PDP at no additional cost.
USER ACCESS CREDENTIALS
All management of access credentials is done locally by the user. The protocol assumes the user as being solely responsible for the secure storage of credentials for accessing their data stored on the network:
1 - Username;
2 - Password;
3 - User XPIN;
4 - Names of Contacts;
5 - XPIN of Contacts.
These five credentials provide access to all personal data sent and / or received through the PDP protocol on the BSV network.
Any combination of credentials other than those used when sending data makes it impossible to decrypt the stored content. Therefore, the user must be very careful, as there is no support for such misunderstandings.
Data recovery on any device is immediate, with the correct combination of credentials.
PROTOCOL FEATURES
- Encryption, storage, sharing, and decryption of various texts and files;
- Sending and retrieving data (personal or shared P2P) through the BSV Network;
- Data stored or shared with NBITS Encryption - (Encryption Key of Size in Data Bytes);
- Digitally signed data sharing option in ECDSA;
- Permanent backup, with numerous redundancies, in the DBs of transaction processors in the BSV network;
- You do not need a registration or phone number to use the App;
- It is not necessary to inform any type of sensitive data;
- Immediate data recovery using keys that only the user should have access to;
Show More