ITC is designed to solve the severe safety problems of present IoT. ITC applies a combination of asymmetric encryption of cryptography, semi-homomorphic-encryption ciphertext computing technology and distributed architecture without data center. Therefore, ITC can not only protect the users’ devices from being attacked by hackers, ensuring its control. but also defend users and their devices’ data safety sovereignty and privacy security.
15min | 1h | 6h | 24h | 7d | 1m | 3m | 6m |
– | – | – | – | – | – | – | – |
ITC is designed to solve the severe safety problems of present IoT. ITC applies a combination of asymmetric encryption of cryptography, semi-homomorphic-encryption ciphertext computing technology and distributed architecture without data center. Therefore, ITC can not only protect the users’ devices from being attacked by hackers, ensuring its control. but also defend users and their devices’ data safety sovereignty and privacy security.
Volatility index: 266.66
Deals Per Day: 146
ATH: 9.2194 (2606 days ago, -6,848,761.19%)
EMA5 | 0.00032180 | sell |
EMA10 | 0.00034970 | sell |
EMA20 | 0.00036280 | sell |
EMA50 | 0.00067502 | sell |
EMA100 | 0.0050811 | sell |
EMA200 | 0.0099483 | sell |
Price | Description |
---|---|
0.012214 | Maximum price support level based on 30 days movements |
Price | Date of formation |
---|
Market | Pairs | Price | Volume (24h) Vol24h | Volume (%) Vol (%) |
---|
Exchange | Pair | Volume (24h)Vol24h | Chg Vol | Price | Chg Price | Share |
---|
Date | Low | High | Avg | Volume | Capitalization |
---|