top of page
Blog: Blog2
Search
id-bound

TRIO crypto wallet makes hacker attacks- futile

Updated: Mar 15

TRIO wallet is a self-custodial, named crypto wallet for Ethereum-based networks.

In my previous post - TRIO Wallet - the Freedom from Fear, I have outlined the five issues resolved by TRIO:

1. the fear of losing it all, including losing the wallet or the "password" to your wallet.

2. the fear of losing some, including making erroneous transfers due to honest mistakes and deliberate transfer fraud.

3. the fear of criminals, including the infamous "5-dollar-wrench attack" and ransomware attack.

4. the fear of hackers, including stealing your private key

5. the fear of fear, including mistrust in technology and failed promises.

In this post, I will address the fourth one, namely, the fear of hackers.


A hacker may steal your crypto wallet's private key and wipe your wallet clean.



We have written about this problem before in this post

Now we will address our comprehensive solution, including two parts.

Part 1: TRIO Wallet

Quoting from Patent No US 11,366,910

“A method for securing blockchain transactions in real-time, comprising;

· identifying a user, sending said transaction in real-time, using personally identifiable endpoint devices and hardware and software-based identification-as-a-service, resulting in storing said identification in database memory;

· Integrating computer-based wallet, performing cryptographic functions for signing blockchain transactions and said identification, using said identification-as-a-service, wherein integration results in said identification being part of said cryptographic functions and said blockchain transactions;

· calculating, in real-time, the user's private key using said wallet and said identification-as-a-service, wherein said private key is re-created every time said wallet is opened or initialized;

· applying said user's private key to sign a transaction using an application, performing a specific activity, and linking to said wallet application;

· storing said transaction in a blockchain ledger memory, storing transactions and records, and linking to said application.”


In other words, the private key is not stored statically and, therefore cannot be exported or stolen. Instead, it is generated dynamically using software-hardware-cloud interaction.

But there is a theoretical possibility of a brute force attack on a public address to deduce private keys using quantum computers.

To eliminate this future vulnerability, we have developed a TRIO token.


Part 2: TRIO token

Quoting from US patent # 11,507,945

A method for preventing cryptocurrency theft and money laundering, comprising:

· Running a public blockchain network, including a smart contract for cryptocurrency creation and operation; such smart contract includes various pre-defined transaction functions and a plurality of users, each having a different public account address;

· establishing the identity of some of the said users while the rest of the users remain anonymous;

· executing said smart contract transaction functions, wherein public account addresses of cryptocurrency sender and recipient are parameters of these functions;

· excluding said execution of said smart contract transaction functions for anonymous cryptocurrency recipient.


In other words, a transfer of TRIO tokens to an anonymous recipient ( attacker) is prohibited, thus preventing even the theoretical possibility of brute force attack.



Stay tuned!


4 views0 comments

Recent Posts

See All

Comentarios


bottom of page