Cryptocurrencies were originally conceived as an innovative new form of currency that would be digital, distributed and decentralized, offering privacy and anonymity to its users and to their transactions.
There are currently over 1500 different cryptocurrencies in existence. Established cryptocurrencies, such as Bitcoin and Ethereum, have gained considerable press, prevalence and participation in recent years. However, despite the cryptography of the blockchain technology that underpins them, no existing cryptocurrency offers the privacy, anonymity or security that its original innovators envisaged.
Given that today’s cryptocurrencies, smart contracts and blockchain
applications are, by their very nature, intrinsically public not private, and transparent not anonymous, the need for a secure blockchain is now self-evident.
Cryptocurrency in shadow warfare
Cryptocurrencies have become part and parcel of stealth cyber warfare and global intelligence operations, raising the prospect that any state agency who wins the arms race in developing a quantum-resistant cryptocurrency could secure an appreciable geopolitical edge for its country.
In July 2018, the Department of Justice (DoJ) charged twelve individuals from two units of Russia’s Main Intelligence Directorate (GRU) with using cryptocurrency to fuel efforts to hack into computer networks associated with the Democratic Party, Hillary Clinton’s presidential campaign, and U.S. elections-related state boards and technology firms.
That October, the DoJ charged seven GRU officers with crypto-funded global hacking and related disinformation operations.
Earlier this month, a leaked confidential report from the United Nations revealed that the U.N. Security Council North Korea sanctions committee believes that North Korean hackers have netted around $2 billion by hacking banks and cryptocurrency exchanges.
The committee claims that hackers form an essential part of the regime’s funding and allegedly raise funds for its WMD (weapons of mass destruction) programs, among other activities.
Self-sovereign Identity (SSI) blockchain would be the at risk of attack by Quantum computing and Artificial Intelligence because the data hold the keys to bank account hacking and and also it’s the target of data cloning.
Lions Gate has a very specific need to the end user and member, to protect the data from breach, to detect attacks and have counter-measures. The advantage that Lions Gate Club has is being open-source and in practice of Kaizen (constant improvement) to use cutting-edge Quantum-Resistant Cryptocurrency plus best practices to remain one step ahead of hackers.