About NuLink Airdrop
NuLink Airdrop provides privacy-preserving technology for decentralized applications via APIs. We enable and make it easy for developers, startups, small businesses and enterprises to build their own applications with all the best security and privacy practices
NuLink network is a decentralized solution for privacy-preserving applications developers to implement best practices and best of breed security and privacy. The NuLink network provides endpoint encryption and cryptographic access control.
NuLink Airdrop is airdropping free NLK tokens to users who complete simple testnet actions. Visit their testnet page, complete testnet actions and submit your details to the feedback form to be eligible to receive free NLK tokens.
Basic | Details |
---|---|
Token Name | NuLink Airdrop |
Platform | Own chain |
Token Per Claim | 3,000 NLK |
Airdrop End | 2022-11-20 |
KYC | KYC Is Not Requirement |
Whitepaper | Click Here To View |
Max. Participants | Unlimited |
Collect Airdrop | Click Here To Collect Free Airdrop |
Step-by-Step Guide:
- Visit the NuLink testnet page.
- Connect your Metamask wallet.
- You will be asked to change the network to “Nulink TestNet”.
- Visit the “Faucet” section and get some testnet BNB and testnet NLK tokens.
- Now visit the “Staking” section and stake NLK tokens.
- Submit your details to this feedback form.
- Eligible users will get 3,000 NLK from this testnet phase.
- There will be additional phases in the future to earn more NLK.
- For a step-by-step testnet guide, see this Medium article.
- For more information regarding the airdrop, see this page.
Who should hold the key to sensitive data?
NuLink Airdrop believe the owners of sensitive data should be the ones controlling access to it regardless of where it is stored. Whether it is your health records or NFTs, they enable you to encrypt data and easily share access to it.
Technologies
By integrating best in class technologies we are building a strong technology foundation. The technical solutions provided by NuLink cover three main categories.
- To ensure the availability of data in ciphertext form. The crypto techniques used here mainly include Zero Knowledge Proof.
- Privacy-preserving data sharing. The general method is to encrypt data and let the data owner control access to it. The technologies include decentralized encrypted storage, proxy re-encryption, identity-based encryption and attribute-based encryption, etc.
- Privacy-preserving data computing, which involves the integration of certain privacy computing capabilities into smart contracts. The technologies used include multi-party secure computing, homomorphic encryption and so on.
NuLink focus and value
Out of the box
NuLink Airdrop are creating an out-of-the-box solution that makes it easy for developers to implement best practices encryption.
Endpoint encryption
Encrypt data immediately at the endpoint and decentralize its storage. Not even you – as the creator of the decentralized application – will be able to access users’ sensitive data.
Access control
With NuLink Airdrop you can implement access control through cryptographic technologies such as PRE/ABE. Access can be granted with limited time, different authentication methods, policies, and so on.
Data Availability
As a platform focused on data privacy, the first thing we need to solve is the problem of data availability. This problem is often divided into two parts: the first is how consumers can determine that the seller has the data they need before purchasing, and the second is how to verify that the data in the ciphertext state is true.
In the NuLink Airdrop network, these two problems can be solved by Zero-Knowledge Proof technology: the data owner needs to provide Zero-Knowledge Proof before data authorization. In fact, the method of proof in the ciphertext data state is consistent with that in the plaintext state, which is independent of the encryption scheme used. This provides higher flexibility for NuLink networks.
Data Sharing
The data sharing functionality of NuLink is realized by bridging the proxy re-encryption technology to the blockchain system. This is a feature that NuLink will deploy first, and IBE and ABE will be added to this solution later. This solution can be applied in many scenarios.
First, Alice calls the Application Layer through APP on the IOT device, selects the proxy re-encryption service and authorizes. On Alice’s NuLink Airdrop side, after receiving the authorization, the Application Layer invokes the Blockchain Layer to initiate and verify the transaction, and transfers data to the Cryptograph Layer.
The Cryptograph Layer interacts with the Storage Layer to perform encryption operations and upload the encrypted data. The encrypted data obtained at this step can only be decrypted by Alice. In order to convert it into ciphertext that can be decrypted by Bob, they implement proxy re-encryption through Ursula nodes deployed by NuCypher. After re-encryption, the encrypted data will be sent to the Cryptograph Layer in Bob’s NuLink side and can be decrypted directly.