KKL 0.00% 1.5¢ kollakorn corporation limited

Certain ID

  1. 20,185 Posts.
    lightbulb Created with Sketch. 1778
    The time that KKL has been removed from trading is rather strange to say the least?
    Why would a company be allowed to remain yet not trade, unless there is something important that is unseen yet?

    I am hoping it has something to do with this?

    https://research.csiro.au/distributed-systems-security/certain-id/
    https://research.csiro.au/distributed-systems-security/iot/
    https://research.csiro.au/distributed-systems-security/our-science/iot-security-vision/
    IoT Security Vision

    “Trust in the source of the data (collected the right capta) and that it was reliably captured, transmitted and not tampered with (else skeptics will challenge the result, or worse, wrong actions will be taken).” … We will develop new understandings of how IoT can improve the connected experience of our stakeholders and how IoT can be used to protect against cybersecurity threats.  

    [Data61 Science Vision H1, p. 6]

    The IoT is a networking paradigm that connects the physical world with the cyber world through a large number of embedded small sensors, actuators, and low-power wireless networks. Example IoT applications include home automation, precision agriculture, smart health, smart city, and smart manufacturing. However, these applications also bring huge risks, since compromised IoT data may have serious impacts, such as causing harm to patients and leading to a citywide blackout. A widely applicable information security model is the CIA triad, standing for Confidentiality, Integrity and Availability – three key principles that should be guaranteed in any kind of secure system. However, the IoT security triad includes Authentication, Integrity and Confidentiality. Though Confidentiality and Integrity principles in IoT introduce many new challenges, they were not the first order priority areas of DSS. Our focus is on the Authentication principle of IoT seecurity. Pivoted to device authentication, some of the key research questions DSS aims to address are:

    Q1: How to authenticate heterogeneous sources (constrained IoT devices) under a future proof ubiquitous and dynamic deployment model operating in a variety of networks?

    The challenge is to develop new lightweight authentication protocols, which can efficiently run over large-scale deployment of small IoT devices under centralised, hybrid and fully-distributed application scenarios, in either controlled or hostile environments. The non-intrusive authentication protocols need to be designed by taking into account the dynamic nature of the deployment, heterogeneous network environments, capture resistance and quantum resistance. DSS leverages the applied cryptography capability developed in cloud security in order to develop a lightweight public-key encryption scheme and design a mutual authentication protocol.

    Q2: How to achieve end-to-end data stream security in the IoT environment?

    IoT applications in risk-critical domains need near-real-time stream data processing. The key problem is how to ensure online end-to-end security (e.g., confidentiality, integrity, and authenticity) of data streams for such applications without having negative impacts on the latency and bandwidth. Existing data security solutions cannot be applied in such applications as they cannot deal with data streams with high-volume and high-velocity data in real time. Traditionally, end-to-end data security means the secure communication between sensors and cloud, cloud and user applications. In the IoT environment, most of the data produced will never be transmitted to the cloud, but rather be consumed at the edge of the network in the stream form. DSS further investigates the developed lightweight cryptographic methods and uses a levelled approach in designing novel end-to-end data security to address this challenge.

    Q3: How to develop methods to identify, upgrade and protect IoT devices so that they can be trusted?

    This challenge includes the identification of IoT devices for security enforcement, and to dynamically update the IoT device firmware to ensure up-to-date software for trusted operation. This challenge is addressed by further investigating the developed authentication methods to support dynamic device to device authentication without involvement of the third party, and how such authentication protocol can be exploited to upgrade firmware in IoT devices. We further look into the intrusion detection systems that can be deployed in a resource constrained and hugely diverse environment to protect IoT devices. This might require applying a brownfield development approach to security designs: the security mechanisms must be able to co-exist with potentially insecure devices and software users have already deployed and will deploy in the IoT applications. DSS aims to develop appropriate methods to facilitate the trustworthiness of IoT devices.

    ------------------------------------------------------------------------------------
    support.blockchain.com › en-us › articles › 360018080172-Identity-...
    4 days ago - Identity Verification Overview. Verifying your identity helps prevent fraud and ensures that no one, except you, is able to use your payment information to make exchanges. Silver verification is the most basic level of verifying your identity. For Silver verification, you'll just need to verify your email address and ...
    https://www.csiro.au/en/News/News-r...rt-explores-blockchains-future-beyond-bitcoin


    09 Apr 2019
    New report explores blockchain’s future beyond bitcoin
    Chris Chelvan Communication Manager
    News releases and statements
    A new report released today by the Australian Computer Society (ACS) and authored by CSIRO’s Data61, Blockchain 2030: A look at the future of Blockchain in Australia, explores eight scenarios for future adoption of blockchain technology in Australia.
    Blockchain presents an opportunity to improve business processes, increase transparency and drive the creation of new jobs and industries. The scenarios are designed to challenge current perspectives, define and explore key uncertainties, and provide a common set of shared narratives for industry, government and community stakeholders.
    As of April 2019, CSIRO’s Data61 is among the top blockchain research organisations in the world, and the author of five of the 30 most-cited blockchain research papers globally.

    “It’s fair to say that the hype around blockchain is fading and we’re likely heading towards what is sometimes called the ‘trough of disillusionment’,” Dr Alexandra Bratanova, Research Scientist at CSIRO’s Data61 and lead author of the report said.
    “It’s been over a decade since blockchain was first introduced but distributed ledger technology is far from dead,”
    ACS President Yohan Ramasundara said investment in blockchain is still growing significantly.
    “Right now there are 14 job positions for every blockchain developer. And while current activity is largely concentrated in financial and insurance services, there are many potential applications across the gamut of Australia’s industries.” Mr Ramasundara said.
    The report outlines Australia’s competitive advantage, already home to world-first blockchain applications in bonds operations, smart programmable money and international standards, as well as industry-specific trials in energy, agriculture and the public sector.
    “Using the lens of the Gartner Hype Cycle for new technologies, the next phase of development is what is known as the ‘plateau of productivity’, where technologies simply become a part of the fabric of the technology and business landscape.” Dr Bratanova said.
    “Trust is the big X factor,” Mr Ramasundara said.
    “Citizen reactions to the Cambridge Analytica scandal, the banking enquiry and rising incoming inequality has seen an erosion of trust in centralised institutions. Should this trend continue, it may very well be the platform to ignite blockchain adoption and other decentralised technologies.”
    To read the full report, visit: Blockchain 2030 - A Look at the Future of Blockchain in Australia
    -----------------------------------------------------------------------------------------------------------

    This is from Blockchain themselves, do they pass the visual information over the net? I very much doubt that, is it Certain ID does that, hope so?
    https://support.blockchain.com/hc/en-us/articles/360018080172-Identity-Verification-Overview

    Blockchain Support Center Identity Verification Identity Verification Overview
    Tuesday at 00:50
    Identity Verification Overview
    Verifying your identity helps prevent fraud and ensures that no one, except you, is able to use your payment information to make exchanges. Depending on your exchange preferences, you can choose between two levels of verifying your identity, Silver and Gold.
    Silver verification is the most basic level of verifying your identity. It will allow you to trade up to $1000 worth of cryptocurrency per year on Swap, our in-wallet crypto-to-crypto exchange.
    For Silver verification, you’ll just need to verify your email address and provide your:
    Country of residence
    First name, last name, and date of birth
    Residential address
    Gold Level verification will allow you to trade up to $25,000 per day on Swap and participate in our airdrop program. Your personal information and documents are reviewed by ID verification software, as well as our support agents.
    In most cases, acceptable forms of ID will include a passport or driver's license. To see which documents are accepted by country, click here
    For Gold verification, you’ll need to complete all of the above steps for Silver verification, as well as:
    Upload identity document
    Take a picture/video of yourself
    If your submission for Gold verification is clear and consistent, the automated verification may take anywhere from 5 minutes to 2 hours. If there are problems with the automated verification and manual review is required, it may take approximately 5 business days. This timeline may vary slightly if there are any significant increases in submissions requiring manual reviews. We’ll stay in touch throughout the verification process, and you can shoot us a question any time on Twitter or by opening a support request.
    Verifying with an ID:

    Verifying with a passport:


    Was this article helpful?

    249 out of 315 found this helpful
    Have more questions? Submit a request
    Comments

    Article is closed for comments.
    Related articles

    Last edited by moosey: 10/04/20
 
watchlist Created with Sketch. Add KKL (ASX) to my watchlist

Currently unlisted public company.

arrow-down-2 Created with Sketch. arrow-down-2 Created with Sketch.