Data Supremacy

When hackers, AI, Tech Giants, Governments, Rouge System Administrators Cannot Compromise Your Data

Read: From Data Producer to Data Consumer

What is RAIDA? Like the Blockchain but stores data efficiently

The RAIDA is a patented (USPTO #10,650,375), next-generation system that operates globally. RAIDA has Data Supremacy; meaning no one can bring it down, control, or manipulate it. Yet RAIDA is faster, more secure, totally private, more energy-efficient, quantum-safe, and scalable. RAIDA does what blockchain simply cannot do.

Go fast and beyond with RAIDA

RAIDA is vastly superior to blockchain and any other authentication system. The following are its main attributes:

Patented technology

The essence of money is that it cannot be counterfeited, allowing us to track who among us has done work and created value for the economy. RAIDA-based currencies take trust to the highest level ever. Using the patented RAIDA technologies (the patent is to keep others from locking us out of the technology), independent system administrators from all around the world leverage thousands of servers and networks to create an unbreakable system that nobody and nothing can dictate. Note that the RAIDA does not create, store, transmit, track, or broker any currency. The only function of each RAIDA Cloud is to detect the authenticity of the coin.

Self-repairing

Sometimes, the Sentinels will be unavailable. When unavailable, Sentinels are restored or replaced. The repair protocol cloud is called Triple Kerberos because it uses three tickets. Kerberos is a network authentication protocol that works based on tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. lt is designed to provide strong authentication for client/server applications by using secret-key cryptography.

Quantum safe

RAIDA is genuinely private and doesn’t have a public ledger. If you were to capture one of the RAIDA servers, you would only have 1/32 of 1/25th of the authentication data. Even if you could decrypt that segment of code, it would not give you ownership of any data. To crack the encryption, you would need to guess the Authenticity Numbers of a majority of the RAIDA. Blockchain can be hacked using quantum computers as it doesn’t have a bottleneck of how many guesses can be done each second. With RAIDA, one can only guess 8 million per second per RAIDA. Even with the help of quantum computers, hacking RAIDA would take all the time in the universe.

Eco-friendly

RAIDA transactions cost as little as 0.00002 cents per transaction. Legacy blockchains use 235,000 times more electricity per year. RAIDA achieves incredible transaction speed without compromising the overall efficiency.

How can RAIDA be used?

No matter what industry or business you’re in, products built on RAIDA stand above your competition in terms of efficiency and privacy.

Data

Store, transfer and manage your data on a fast, secure and private network.

Security

RAIDA can authenticate and protect anything from digital data to physical products.

Communication

Build a secure and private environment where you can share, store, chat and make video calls efficiently.

Anti-counterfeiting

RAIDA protects your brand’s authenticity, helps engage more customers and makes trading better.

Tokenization

Tokenize ownership with a simple, compliant platform to generate investment and enhance liquidity.

How is RAIDA the world’s most secure data system?

UDP/IP

Low Latency Transport

The User Datagram Protocol (UDP) is a communication protocol used for time-sensitive transmissions such as video playback or DNS lookups. It speeds communications through refusal of connection until data is transferred. This helps make RAIDA the fastest payment system in the world.

AES

Advanced Encryption Standard

The RAIDA uses a 128-bit AES (Advanced Encryption Standard) symmetric encryption algorithm to transmit data between the client and RAIDA clouds. It was designed for energy-efficiency in both hardware and software. AES encryption is used by the U.S. government for securing sensitive data. AES is faster and more quantum-safe than the public-key encryption used by almost all other payment systems. This helps make RAIDA the fastest and most quantum-safe payment system in the world.

Binary Protocol

3rd layer of security

The RAIDA uses custom binary protocols that are designed to minimize the amount of network traffic needed for the requests. Authenticating a single note requires only 57 bytes (fewer bytes than some DNS requests) and can fit into a single UDP packet. This helps RAIDA to be the fastest payment system in the world.

Reverse Proxies

Defending the RAIDA

RAIDA Nodes are made up of many servers that are constantly synchronizing. The Primary RAIDA are built for speed while the mirrors are built for fault tolerance. Should a Primary Node go down, the system will switch to the Mirror instantly. While Primaries are located in high-speed data centers, the Mirrors are hidden behind reverse proxy servers (servers that hide their locations). Each RAIDA has its own administrator and is housed in a different legal jurisdiction/country—ensuring no systemic failure.

RAIDA Clouds

Data Supremacy

The RAIDAs are clouds of servers. The Primary RAIDA in a cloud is usually located in a data center using 4 Gbps bandwidth. All 25 RAIDA Clouds have over 100 Gbps. This generous bandwidth allows CloudCoin to authenticate all 1.4 billion of its coins in under a second. The RAIDA can process thousands of notes in microseconds because the software was written in the high-performance C language, and all data is kept in RAM. RAIDA’s performance can be boosted through increasing server power and sharding data, making it both vertically and horizontally scalable. However, the RAIDA is already able to handle the world's transactions faster than any other payment system.

RAIDA Sentinels

There are 25 RAIDA clouds called Sentinels that provide RAIDA Resolution. Some of the Sentinels have "Shards'', and know the secret locations (IP addresses) of 32 RAIDA clusters (Detection Agents). Each of the 32 RAIDA clusters is designed to handle one or more of the "shards." There are a total of 800 RAIDA Shards and 25 RAIDA Sentinels per RAIDAnetwork.

The Sentinel clusters hide behind Content Management Systems. The Sentinel IP addresses are hidden, and only the Content Management Systems know their IPs. The Sentinels each hold a directory of all the IP addresses of the detection agents in their crypt. Only the Sentinels see the IP addresses of the detection agents, so the detection agents’ locations are obscured.

RAIDA Sentinels around the world

Independent Detection Agents

A different organization controls each RAIDA cloud and its supporting Guardian(s). Each RAIDA administrator is tasked to simply keep their RAIDA working. RAIDA Admins may make money by recovering lost coins (coins that have not been used for over five years) or by receiving payments for data storage directly from users or donations.

RAIDA Admins are world-class System Administrators. The goal of the RAIDA is that there is no governance needed. This means that no decisions need to be made. The RAIDA Admins are there for life and can pass their RAIDA down generations-as long as they maintain their assigned RAIDA.

The replacement of RAIDA Admins may occur yearly, when the organization determines the feasibility of updates and determines the efficacy of its administrators.

Independence

RAIDA Clouds operate under different controllers and are not beholden to each other; rather, operating as peers (equals). They can use whatever technologies they like–such as Linux, Windows, PHP, C#, Java, Apache, Tomcat, IIS, MySQL, etc.

Redundancy

In theory, all the RAIDA clouds could go down, yet as long as one still works, no one can damage the data on the RAIDA network.

Distributed

With few exceptions, RAIDA Clouds are located in different countries around the world. This guards RAIDA against the actions of governments. The RAIDA suffers no performance issues, because the speed of electricity can circle the globe in milliseconds.

Fixability

It is assumed that RAIDA Clouds will go down completely and have all their data hacked. That is why it is possible to discard RAIDA Clouds and rebuild new ones somewhere else.

Data Supremacy

Data Supremacy is a term coined by RAIDAtech's founder, Sean Worthington. Sean noticed that blockchain technology was unique, because it had no owner. It could not be altered or made unavailable by tech giants, governments, hackers, and even the administrators who manage the servers (miners).

Worthington looked for other databases in the world that had Data Supremacy but could only find one: The Root DNS Servers. He designed RAIDA to be fault tolerant by removing all systemic risks of failure and by making everything redundant.

He also designed RAIDA so that it could be used to reach the goal of a theoretical perfect currency. Such a currency would have no fees, could trade instantaneously, provide 100% privacy, and even be recovered if lost. RAIDA-based currencies are so good that it is not possible to do better.

RAIDA Authenticity Detection Protocol

The RAIDA protocol is a light protocol that requires only milliseconds to execute because it sends and receives only a few hundred bytes of data. Clients send authenticity requests in parallel to 25 RAIDA clouds. It takes just milliseconds for signals to travel to the other side of the planet and back. Clients send authenticity requests in parallel to 25 RAIDA clouds. Each RAIDA cloud responds with either "pass" or "fail." The RAIDA protocol requires no sessions or cookies. The conditional GET method is used to reduce unnecessary network traffic.

Talk to us today, start driving your business forward tomorrow

Contact us