Presentation is loading. Please wait.

Presentation is loading. Please wait.

Токен-экономика в проекте по кибербезопасности на блокчейне

Similar presentations


Presentation on theme: "Токен-экономика в проекте по кибербезопасности на блокчейне"— Presentation transcript:

1 Токен-экономика в проекте по кибербезопасности на блокчейне
Токен-экономика в проекте по кибербезопасности на блокчейне. Бизнес-кейс, алгоритм консенсуса, dApps vs protocol Thank you very much for having me here today. Let me first please render the problem, so that we are all on the same page. Interacting at a distance brings the first problem: how do you know the real identity of that distance party? Let’s imagine that this problem is in the process of being solved and workable solutions are already out there. What not has been effectively solved: you may be who you say you are but what access does that entitle you to? Perhaps more importantly what are you not entitled to access and how do we manage the evolution of your access entitlements over time? Like Blockchain helped resolve identity now REMME leverages the power of Blockchain to finally solve ACCESS. May I ask you to raise hands whom of you have never forgot his password.

2 Hackers' Top 10 123456 Password 12345678 qwerty abc123 121212 111111
123123 admin Hopefully not because of using such kind? Anyway, stats show that 75% of users use 3 to 4 passwords across all of their accounts.

3 Existing Problems Common Hack Attacks
Phishing Keylogging Centralized Server Weak Protection Brute Force Server Access Hacking Bucket Brigade Password Reuse Attack The main security problem that is common for all these areas is centralized point of access, namely the server. Not to forget weak protection itself and the human factor. Speaking about passwords, the weak side, each company has to be prepared to such attacks as: Phishing Keylogging Brute Force Server access hacking Bucket brigade Password reuse attack Human Factor

4 Biggest cybersecurity problem
HUMAN FACTOR Short view on the market we are talking about – a big on. Rising from $ 8.8 bln in 2016 to $ bln in 2021 – nearly double

5 Cyber Security Facts $6tn/year >$150 mln 76% 7/10
Will cost the world crime damages by 2021 The average cost of data breach in 2020 of all data breaches were enabled by weak credentialing and user authentication Cyber attacks could be prevented with simple IT security measures An enormous number, $ 6 trillion per year spend on cyber crime damages… $ 150 mln in average, the costs of each data breach… the reputation lost not to mention 76% are enabled by weak passwords… Do you remember EQUIFAX - 1 of 3 major US credit reporting agencies (handling also identity) “hacked” and 143 million people compromising. Why? Because of using “admin/admin” for one of their databases. So in return, 7 of 10 attacks could be prevented with simple IT security solution, like REMME.

6 Security Access Management Market
2016 $ 8,09 bln 2021 $ 14,82 bln Short view on the market we are talking about – a big on. Rising from $ 8.8 bln in 2016 to $ bln in 2021 – nearly double

7 3 factors for successful adoption
Simplicity Short view on the market we are talking about – a big on. Rising from $ 8.8 bln in 2016 to $ bln in 2021 – nearly double Security Business value

8 No more Passwords, no more PINs
2 FA (optional) BROWSER CERTIFICATE Private Key BLOCKCHAIN WEBSITE REMME is more, I promised you we solve authentication without the need of passwords or PINs, a distributed, 3-layer access management security solution. With the help of SSL and Blockchain, we have checked that a certificate is valid. On top of this, we have a 2nd factor authentication, again without a pin, that is checking that it is you, personally, who is accessing the “service layer”. Telegram or Messenger asking “Is it you who is opening mybanking.com?”, the only thing you have to do is to press “Yes” or “No” And the magic will happen. The 3th layer is actually the build in biometrics, that allows you to access the messenger only after you have identified yourself.

9 Distributed Authentication Solution
Old PKI - CA Single point of failure Web, Scada, Any product Nodes REMME Core SSL Browser/ GUI Finally here. What is it all about? We are enhancing the Bitcoin network protocol as so to render it PKI enabled. Earlier the certificate was validated through the help of the centralized authentication structure, involving companies like Verisign. But no more! In future the web server or any product will check the certificate through the REMME distributed and decentralized network. With REMME we are mainly using 2 technologies, disassemble them, to put them together in a new way: one is the SSL X.509 standard, where we keep SSL, as a container and to assure the state of a certificate, we are leveraging the Bitcoin Blockchain, and so maintain whether a certificate is still valid or was revoked Certificate (X.509)

10 Creation of Certificate
REMME Token REMME tokens are utilities, they are needed to create a certificate and to became a node (Proof-of-Stake), authorized to create certificates, revoke or verify the validity Creation of Certificate Utility Node Functionality

11 ERC-20 token Using the benefits of Ethereum ecosystem
We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

12 Why not Ethereum? Throughput – 30,000 tps
Additional storage and customization Risk management Reliability Pricing policy Finally here. What is it all about? We are enhancing the Bitcoin network protocol as so to render it PKI enabled. Earlier the certificate was validated through the help of the centralized authentication structure, involving companies like Verisign. But no more! In future the web server or any product will check the certificate through the REMME distributed and decentralized network. With REMME we are mainly using 2 technologies, disassemble them, to put them together in a new way: one is the SSL X.509 standard, where we keep SSL, as a container and to assure the state of a certificate, we are leveraging the Bitcoin Blockchain, and so maintain whether a certificate is still valid or was revoked

13 Interblockchain migration mechanism
Atomic swap Why 2 blockchains? We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

14 2 approaches for token economics
Crypto vs Enterprise We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

15 Ethereum – perfect tokenomics?
We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

16 But it is most successful ecosystem
No. But it is most successful ecosystem We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

17 Main Eth usecase - ICO We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

18 dApps – dOCSP, Universal certificate
We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

19 REMME Tech Landscape REMChain REMgate REMCore Masternode1 MasternodeK
... REMgate We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

20 Node reward Proof of Service – Virtual Proof of work
90% nodes, 10% REMME 45% available, 45% lockup Reputation and Stake gives unlock bonus Reputation is more important We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

21 Business / Customer Development / Go-to market
B2C B2B Open Source </> We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers Passwordless Auth IAM / PKI-(d)

22 We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers

23 Contact us Alex Momot Founder and CEO email:
website: remme.io Telegram: @AMomot facebook: @remme.io


Download ppt "Токен-экономика в проекте по кибербезопасности на блокчейне"

Similar presentations


Ads by Google