Today, we use various web applications such as google to do something on our smartphones and PCs.
When you access those web applications for the first time, you can usually sign up, register your user ID, password, and in some cases your address, and then log in.
The basis of this login mechanism is that when you enter login information (ID and password), the back end on the platform side of the Web application checks whether the registered information matches the information entered by signing in.
It is a simple mechanism that you can log in if there is a match, that is, you can access the service and your data.
Platforms that using these login mechanisms that we casually use are also information administrators.
However, this mechanism also has a bigger problem.
If this platform has a backdoor,
or, if any of these information managers are malicious, the data we provide at login can be easily accessed.
These backdoors can be introduced by hackers, governments, or the platform itself, but they are invisible to the user.
Some web applications work with other platforms such as Google to enable sign-in,
Again, the risk remains the same, and if that Google account is hacked, or if Google itself is hacked, it’s just as risky.
Especially in recent years, it is said that the damage caused by hacking in the world in 2020 has increased by more than 200% due to the spread of home-based work worldwide.
It will be a very important theme in the future for avoid these risk.
Meanwhile, the other day, the distributed storage “ChainSafe Files” using the IPFS / Filecoin system started.
＜ChainSafe Files＞ https://files.chainsafe.io/
This ChainSafe Files is a web service that serves as a window for distributed storage, and you can easily upload and download data on IPFS.
In addition, such data is encrypted within the IPFS mechanism and managed under strong security.
And as one special function, it introduces one major security measure.
That is “distributed login”.
Distributed login is a mechanism that allows you to log in without the need for authentication by a specific administrator, and is a technology provided by Torus.
With this authentication flow built by Torus using a distributed login provider called tKey,
it doesn’t store login information in one place like before, and it seems that you can log in with a single click without the need for a specific administrator.
There is a demonstration of logging in using this system on the Torus site, so why not give it a try?
Click “GENERATE PRIVATE KEY” in this to proceed with the login demo.
As you all know, the data stored in IPFS cannot be easily hacked, but ChainSafe Files, which has strong security even for service login with this tKey, utilizes blockchain among many cloud server services nowadays.
It may be said that it is one of the most cutting-edge services that has created a strong security system.