Post
Topic
Board Announcements (Altcoins)
Re: CASPER API it is first system decentralized cloud-based data storage for DAPPS
by
canaveralnonie
on 13/03/2018, 19:50:21 UTC
Do you know how to hack into servers?

The first step in any strategy is a port scanning. Each open port is a server-side program. Example: on the 21st port there is FTP. If you connect to it and get the appropriate rights, you can safely download or upload any files... on the first 1024 ports you can find many standard services, each of them is a kind of door. And the more there are, the easier it will be to find that one or more of them are not closed…
In fact, there are many websites on the Internet that publish information about new weaknesses. And given, that many of servers don't renew its security due to negligence or unqualified administrators, then many of them can be cracked because of "old" problems. But what if the project does not have a server? What to crack then? It is due to the lack of a single server and decentralised storage that a high level of security is achieved!

Casper places the file to be stored in multiple copies from different service providers around the world. The service provider must meet the requirements, which provides reliable distributed network. And when there is no single server, there is nothing to hack.

http://casperproject.io


I'm not good in IT works or even in networking job but I learn something on this post. Which mean, if no server, it will minimize all the line or accounts that may be hack. But my question is, if the Casper stored multiple copies from different service providers around the world ( like you've said ) , it means the target of the hacker is at least one of those service provider. Correct me if I'm wrong.

Files are kept encoded in network storage units and replicated to several computers of various storage service providers. In the case a computer of one provider becomes unavailable, another provider is selected immediately to maintain storage of duplicates of those files, which were stored on the disconnected computer. The new provider then downloads file duplicates from other providers that have the exact copies stored.
I think, nniecan001 saying is about hacking the service provider (at least one terminal or peer). If you have many duplicate files using different service provider, the hacker have a lot of option as possible to get what he need, cause if he get one service provider it's the same of all cause it's duplicated. Correct me if I'm wrong.