IAME Explained: Data Minimisation

IAME
1 min readAug 2, 2018

--

If you are transferring documents, Sharding and Document Molding is the best protection against interception attacks. However if a third party requires to read your information wholly, we need to turn to better information protection methodologies, with IAME, we make use of a data protection strategy called Data Minimisation.

Any Questions?

If you have any other questions feel free to contact us on any of the channels below or by email at info@iame.io

Website | Telegram Channel | Linkedin | Facebook | Twitter

--

--

IAME

Identification Framework for Crypto Based Transaction