THOR PROTOCOL

Key & Reputation Management on the Blockchain

Thor Protocol in action:

Private Key Management on the Blockchain

Thor Protocol allows Web3 apps to externalize Private Encryption Keys storage on the blockchain, providing users with ease of use.

Full User control over Private Keys

In the event an application does not offer certain functionalities for key management, the Thor protocol enables users to always bypass the App in order to delete or revoke their keys and tokens. This prevents further access to user content by the application.

Use Tokens as Passwords

Users may still prefer to use a Web 2.0 interoperable protocol with a third party client. Our protocol allows applications to use tokens as passwords, substituting the need to request a signature on a web2.0 client. In this case the trusted application itself will be responsible for decryption or credential/key recovery.

Introducing Thor Protocol:

ROADMAP

01

Thor Protocol v.0,1

status:

Launched

02

Web Page

status:

Published

03

Thor Protocol v.1

status:

In Progress

04

Reputation protocol v.1

status:

Not Started

Thor Protocol v 0.1

Thor Protocol v0.1 has been launched and we are currently testing with some partners.

The objective of the protocol at its current stage is to externalize the storage of encryption keys on the blockchain, with the follwing assumptions:

Applications implementing the protocol are following our best practices and recommendations listed in our specs

there is some level of trust between users and the applications implementing the protocol

In future versions of the protocol we may / may not be able to completely do encryption and decryption on the smart contracts themselves removing the need for Private Key and permission management.

Our Beta will be released soon.

Technical Specifications

Coming soon