When we enable our credibility generation and trustworthy prediction service, we collect the information we need. Typically, this includes the generic data of a user that we have to analyze which generally comes whenever a user logins using various social media platforms like Facebook, Twitter, Linkedin and more; additional information on a user/candidate is collected in form of their publicly available and permissible data. For example, if we are generating credibility and predicting trustworthiness of an individual, we will collect a copy of their relevant information during their login. Use those credentials to compute and generate their credibility, then use those parameters to search for user’s publicly available and permissible data to predict their trustworthiness. Everything is anonymized from the point of getting the information to the point of delivery of results. Similarly, if we are checking a user’s criminal history, we will collect criminal history information from the appropriate authorities, where authorized. This information collection is further detailed in the CNTC.
Platforms are the businesses that have integrated our APIs and request us to deduce credibility and trustworthiness of its users. They frequently provide us with the relevant information of the users, but at other times, the platform or business provides us with all the information we need to provide our credibility generation and trustworthy prediction. Once we have run the user identity through our system or run a particular check, we report the results to the Credible Ninja dashboard that we provide platform with to receive realtime results so it can take necessary actions quickly when a user is ﬂagged by our system. Platform then decides what to do with the user with low credibility score and less trustworthiness.
With Credible Ninja’s credibility generation and trustworthiness prediction we want to make it safe for people to have productive and meaningful interaction. Over past few years, traditional and institutional trust has been on decline and with no mechanism to develop a trust in the middle, it is becoming harder for people to make connections. Internet has brought us close but at the same time has made it harder to have intimate connections with people.
If we ﬁnd cases where user does not pass our checks and have low credibility and low trustworthiness, we recommend platforms to proceed with caution or take some additional steps to monitor the user. We help them setup a protocol in cases like these.
These cases can also occur if Credible Ninja isn’t able to get enough data on the user. We personally look into cases like these and have a human eye do the job. We believe a hybrid model of human + machine is the way future should be built.
Further, we are constantly training our AI to recognize such cases. It is a hard problem to solve and Credible Ninja is on the front to build a better system to organize and recognize such cases in realtime.
Under CNTC, our system maintains a private ledger to store details of users with bad character, users reported on diﬀerent platforms, people under cyber crime investigation, authorities looking for people who are involved in cyber crime and more. This democratic approach helps everyone and makes internet safe for everyone.
We perform our credibility generation and trustworthiness prediction on behalf of business, partners and platforms for a variety of diﬀerent purposes, as identiﬁed by our business, partners and platforms, and we rely on our business, partners and platforms to tell us when they no longer require us to store the information we’ve collected on their behalf. Once instructed, either through our agreement with the business, partners and platforms or through an ad hoc request, we delete the information we have collected about users when performing the requested credibility generation and trustworthiness prediction.
We may also store information for longer than described above where we have a legitimate legal reason for so doing, for example, where we are under a binding legal order not to destroy information.
Credible Ninja uses SHA 256, is one of the successor hash functions to SHA-1 (collectively referred to as SHA-2), and is one of the strongest hash functions available. SHA-256 is not much more complex to code than SHA-1, and has not yet been compromised in any way. The 256-bit key makes it a good partner-function for AES. It is deﬁned in the NIST (National Institute of Standards and Technology) standard ‘FIPS 180-4’. NIST also provide a number of test vectors to verify correctness of implementation.
If you think you have identiﬁed a security vulnerability or bug in our services, please report it to the Credible Ninja's security team at email@example.com
If you would like more information about how Credible Ninja collects and uses information or if you would like to contact the Credible Ninja for data protection issue, please feel free to contact us at firstname.lastname@example.org