Inscription Method for Cyber Security System

19th Sequence
2 min readDec 28, 2023

--

Right now, someone might be trying to steal our data and use it for malicious activities. What can we do? Maybe just make a clarification that our data has been leaked and declare that any actions done in our name are a scam. But what about the data? The fact that our data is still out there and exposed doesnt change.

You want to sign up for a crypto exchange market and they ask you to upload your ID card capture and your face record. Nowadays, institutions monitor and ensure that they protect our data well with various regulations.

Do u realize that its other people who are protecting our own data and we have no control over our own data. We didnt know what those people do with our data. Where do they store our data, how do they use it, do they send our data to other places? we dont know.

The question is, how do we prevent it? how do we find or track our data?

<a href=”https://www.vectorstock.com/royalty-free-vector/box-with-text-boxes-and-the-inscription-tokens-vector-46565943">Vector image by VectorStock / Heorhii</a>

Inscription

Simply, inscription is a method where u can attach something like text, picture or video inside a coin by giving the coin a serial numbers and make it inseparable. Whatever and whenever people do with our coin, other people can see our inscription. We can also track it cause its decentralized.

Now u know what inscriptions is like. Then how about every time we upload a file on the internet, we do inscription. Back again, when you want to upload your ID Card, you input some text like “This ID Card is for signing up for a crypto exchange market” and this memo will attach and cannot be separated from your ID card picture. Then when the company sends your data to the database, u can track it. When the company uploads your data to somewhere else, u can track it too.

Inscription and Centralization

Inscription method is currently available in the crypto realm, which is decentralized where anyone can access our file and see the history. What if we apply this inscription method in centralized system, so we can add limitations like who can see our data, or maybe cut off the access of other people who have our file.

In this way, we can prevent our data from being stolen by providing a memo so that other people know what this data is intended for (Inscription method). Even if piracy still occurs, we can overcome it by cutting off that person’s access (Centralization).

It sounds very great, but we still need more regulation where the original user cant selfishly cut the access of their file in certain situation (perhaps something appertain to company or institution) and running all of this system is not easy, indeed.

--

--