THOR PROTOCOL
Thor Protocol in action:
Thor Protocol allows Web3 apps to externalize Private Encryption Keys storage on the blockchain, providing users with ease of use.
In the event an application does not offer certain functionalities for key management, the Thor protocol enables users to always bypass the App in order to delete or revoke their keys and tokens. This prevents further access to user content by the application.
Users may still prefer to use a Web 2.0 interoperable protocol with a third party client. Our protocol allows applications to use tokens as passwords, substituting the need to request a signature on a web2.0 client. In this case the trusted application itself will be responsible for decryption or credential/key recovery.
Introducing Thor Protocol:
Thor Protocol v 0.1
Thor Protocol v0.1 has been launched and we are currently testing with some partners.
The objective of the protocol at its current stage is to externalize the storage of encryption keys on the blockchain, with the follwing assumptions:
Applications implementing the protocol are following our best practices and recommendations listed in our specs
there is some level of trust between users and the applications implementing the protocol
In future versions of the protocol we may / may not be able to completely do encryption and decryption on the smart contracts themselves removing the need for Private Key and permission management.
Our Beta will be released soon.