POFID anonymous transactions, personal information protection is the problem that DeFi must face.

POFID-DAO
4 min readJul 21, 2021

The status quo of information protection from a global perspective

On July 4, the online information office issued a notice to remove the “didi travel” app, marking a further attack on the network platform involving illegal collection and use of personal information. In recent years, personal information is the focus of network information security protection in various countries. As early as 2013, Snowden’s exposure of the “prism incident” let everyone know that the intelligence departments of the United States and Britain are conducting almost unlimited monitoring on their own citizens without the knowledge of the public or even Congress, arousing people’s awareness of self privacy protection.

Similarly, privacy protection is a key issue in the current defi ecosystem. All transactions in the defi system are currently absolutely public information. Although the user identity of each public address is not easy to obtain, it is feasible to identify users and their related addresses through data analysis and data mining. Anyone can mine the identity or location of the wallet address. In this case, if users can’t choose traceless transaction, they can’t realize the protection of personal privacy and property.

Pofid is such a platform dedicated to privacy and Q asset protection of defi. It can truly realize the practical value of defi through privacy protection and cross chain. As early as April this year, pofid has completed the cross chain deployment based on BSC, successfully filling the gap of privacy protection in the current defi field, and at the same time connecting the head public chain. Pofid Dao, as the world’s first defi project with compatibility of all mainstream digital assets and high TPS, will have a huge impact on the whole industry. With the increasing demand for privacy protection, pofid will promote the new prosperity of the defi market.

Intrinsic value and technical logic of pofid

First of all, the foundation of pfoid is the construction of the underlying public chain facilities in the blockchain and the layer2 technology based on technologies such as atom exchange and tee trusted execution environment. The essence of both is based on decentralized accounting network, which changes the business logic of traditional network from server to client, and provides a way for users to interact directly without central server or third-party agent.

In this way, the ownership and control of the data are returned to the user, and the user can anonymously carry out network activities, which can effectively avoid the situation that the service subject or the exchange sells personal privacy data, and also avoid the possibility of private data leakage caused by hackers attacking the central server, and effectively avoid the network trust crisis.

In addition, pofid has made great achievements in cross chain. The cross chain technology adopted by pofid before has considerable security and connectivity, and the cross chain compatibility is very high, covering Ethereum, BSC and many well-known public chains. In other words, after the implementation of pofid Dao cross chain plan, the top exchange public chain has been opened up, including all assets, data, including anonymous privacy, lending Machine gun pool and other functions can be quickly and easily transferred to each other on the public chain of various exchanges.

How pofid solves the privacy problem of defi

Pofid has a perfect and phased repeater mode based on layer2, and ultimately realizes the boundless layer1 network through layer2 for better decentralized governance. In a decentralized Metro world like layer 2, privacy protection is more important.

Pofid’s OCA low-level public chain technology is based on zero knowledge proof privacy protection, supports Turing complete intelligent contract, and uses technology to practice privacy protection. It’s like wearing a mask for everyone who gets on the subway. At the same time, each real asset is mapped into a quantifiable digital asset on the chain, and supports both homogeneous assets and heterogeneous assets at the same time. It can also be used as a guarantee to generate other digital assets with different financial attributes. The transaction or payment information sent between accounts can’t be found publicly either. Only with the private key or query key of both accounts can we know the content of the transaction. In addition, in terms of the input and output privacy of smart contracts, smart contracts, including PSC (currency management contract), can selectively process the input and output assets or other conditional data for privacy protection.

Prospect of Web 3.0

From the Web1.0 era when the first search engine appeared in 1995, to the Web3.0 era with decentralized thinking proposed by Dr. Gavin wood, the co-founder of Ethereum and the founder of poca. Web3.0 should be a decentralized network, and everyone can control their (digital) identity, assets and data, and then control their own destiny. In the era of capital monopoly of user privacy data, it is necessary for us to fight against every move of our own. It is necessary to turn off the location-based service in the mobile phone function at any time, or to use “anonymous” method to complete every cryptocurrency asset transaction. That’s what pofid has been doing.

--

--

POFID-DAO

POFID DAO is a technology and governance framework based on Blockchain technology for the issuance and management of stable cryptographic and stable currencies.