BaaSid
  • BaaSid White Paper
  • “100% Decentralization”
    • 1. Background of "BaaSid"
      • 1.1 What is "BaaSid"?
      • 1.2 Decentralization?
      • 1.3 Decentralization!
      • 1.4 Why "BaaSid"?
      • 1.5 Split & Distribution Engine
      • 1.6 Split ID
      • 1.7 Combination Engine Descrambling and Verification Stage
      • 1.8 One Pass: an all-in-in sophisticated verification
      • 1.9 BaaS Certification API Service
      • 1.10 "DB Governance” of BaaSid Participants
  • “Authorization based on Blockchain”
    • Key point & Technology of Authentication / 2FA & MFA
    • 2. Introduction
      • 2.1. Limitations of and problems with blockchain
      • 2.2. Borrowing the DB of BaaS based participants
      • 2.3. Split & Distribute Data
      • 2.4. Verification that is user-centered based on the Public or Private Network
      • 2.5 Proof of integrity for Split & Distribute data
  • “Blockchain as a Service”
    • 3. BaaS (Blockchain as a Service)
      • 3.1 “Core Technology”
      • 3.2 The Benefit of OSP using API of BaaSid
  • “No Original Copy”
    • 4. "BaaSid" algorithm
      • 4.1. Instant Access
      • 4.2. Non Original Copy
      • 4.3. Technical configuration of BaaSid
      • 4.4 Private Node Configuration
      • 4.5 Compare similar projects (Case of Blockchain)
      • 4.6 Compare similar projects (Case of Non-Blockchain)
      • 4.7 Compare similar projects (Case of Non-Blockchain)
  • “BaaSid commercial product”
    • 5. BaaSid develops various blockchain solutions and cloud
      • 5.1. Mission Statement
      • 5.2. BaaSid Product and Solutions
      • 5.3. Detail of Soteria Space
      • 5.4. Detail of Soteria API intergration Module
      • 5.5. Detail of Pistis
  • “Use case of BaaSid”
    • 6. Use case of "BaaSid"
      • 6.1. TWCC (Taiwan government agency DID development and supply)
      • 6.2. Hitachi Sunway (2FA, MFA Authenticator based on Blockchain & Decentralized Storage)
      • 6.3. API interworking compatible with major clouds and fast and easy decentralized storage construct
  • “Service(commercialization) Platform based on BaaSid”
    • 7. Service of "BaaSid"
      • 7.1. My Data Exchange Service
      • 7.2. BaaSid B&P
        • 7.2.1. BaaSid B&P System
        • 7.2.2. BaaSid B&P Structure
        • 7.2.3. BaaSid Bridge
        • 7.2.4. BaaSid Payment
        • 7.2.5. BaaSid Point System
      • 7.3. NFT Open Market Place
  • “About BaaSid”
    • 8. BaaSid Organization
      • 8.1. Organization
      • 8.2. BaaSid Key members
      • 8.3. Advisor
      • 8.4 Communiti Channels
      • 8.5 BaaSid (BAAS) Smart Contract
      • 8.6 Exchange partner
      • 8.7 BAAS Allocation
      • 8.8 Roadmap
      • 8.9 Contact us
      • 8.10 Press Release
Powered by GitBook
On this page
  1. “Authorization based on Blockchain”
  2. 2. Introduction

2.1. Limitations of and problems with blockchain

Previous2. IntroductionNext2.2. Borrowing the DB of BaaS based participants

Last updated 2 years ago

As was mentioned above, all intenet services store and later use a large amount of personal information that is stored on databases. Based on this, login, information confirmation, payment and all other user requests are verified by a provider and a third party verification authority.

This goes for services other than those that apply blockchain technology and includes all agencies, organizations, corporations and all free and charged services. And as a given, various security systems are developed and operated to protect such databases.

Also, the problem major leaks and hacking has resulted in governments of several countries to enact protecive legislation regarding personal information over the internet, and along with messages condemning the leakage and piracy of such personal information, many individuals, and all companies, financial institutions, agencies and organizations that have an online presence are requesting more effort be devoted to this problem.

Further, the blockchain world that is oriented towards decentralization is continually becoming more centralized, and with various targets susceptible to hacking and new problems that arise as a results, more ironic limitations are taking shape.

Blockchain service that shows other limitations of centralization