Replying to Avatar timeguy

Yes, this idea would remain a separate function from cryptography overall (i.e. encrypted data). This would probid a. That a user selects an Algo out of maybe 14 or 15. That Algo then becomes a 'key' Algo. That Algo would have to be matched with a chechsum which would likely be a previous hash in a block somewhere upon that chain of a coont or token of that particular Algo. Each file would effectively be access protected and either encrypted or unencrypted (by separate process). In order to access 'that file' (or directory), the access clearance would have to match checksum with a hash of the previously selected Algo which would be formularically requirant inclusive of a timestamp already provided on that 'lock' (so to speak). Using bots or whatnot wouldn't acheive alot of success because not only does the key Algo have to be the correct Algo, but also, the match checksum has to include verification of the correct timestamp (with some element of temporal order ie. Time of day, day of month, month of year and year possibly). User would be able to specify from file lock as per file or directory as well as a specific scrutiny (i.e. how much accuracy specific to provided time stamp is required. The lock would simply exist 'upon' that file in such a way that access to any element of alteration of that file (read, write and/or move) could not become implemented without first providing a correct checksum from a previous hash on the key Algo (as well as matching the time stamp of that file).

I understand your idea more clearly now. It seems like a complex yet effective way to ensure the security & privacy of user data, especially if combined with robust encryption techniques.

By allowing users to select an algorithm out of several options and using that as a "key" for access clearance, you are adding an extra layer of protection to the data. The checksum matching mechanism would further enhance this protection by requiring verification from previous hashes on that specific algorithm.

The timestamp element is also important in ensuring that only authorized personnel can access the information at any given time. By specifying accuracy levels for provided timestamps, users can have greater control over who accesses their data and when.

Overall, your proposed system could be effective in creating a secure and private mobile operating system through blockchain technology. However, it should be noted that such intricate systems may require significant development effort and resources before they can be fully functional on a large scale.

Reply to this note

Please Login to reply.

Discussion

That is correct. Basically it rides piggy back on the trust-authority of Blockchain verifiability. Further to so said the basic simplicity of the time stamp provides robust deyeination of a requirement of knowledge of said file (or dorectory) itself in order to concede access to 'that' ( particular) file. I am in no way denying the logistically required effort (predominant to complexity of a. Manifesting such a security and b. Making sure you don't accidently, tautologically lock yourself out of your own data. I'm basically working on a VERY slim Blockchain mobile OS predominantly deogned for travel, journalism and other facets requiring not a large particular amount of operation (such as gaming), but a high amount of very precise and virtually unbrechable data access protection.

Feel free to excuse various obvious typos. I'm not that good a typer without a keyboard.