SlideShare a Scribd company logo
1 of 14
Distributed authentication for
businesses, users and devices
Hackers' Top 10
▪ 123456
▪ Password
▪ 12345678
▪ qwerty
▪ abc123
▪ 121212
▪ 111111
▪ 1234567
▪ 123123
▪ admin
2
$6tn/year
Will cost the world crime
damages by 2021
>$150 mln
The average cost of data
breach in 2020
Cyber Security Facts
76%
of all data breaches were
enabled by weak
credentialing and user
authentication
7/10
Cyber attacks could be
prevented with simple IT
security measures
3
Enterprises Automotive
(mainly autonomous
vehicles)
CryptoCritical
Infrastructure
Areas Vulnerable to Hack Attacks
5
Existing Problems
Centralized
Server
Weak
Protection
Human
Factor
Common Hack Attacks
▪ Phishing
▪ Brute
Force
▪ Bucket
Brigade
▪ Keylogging
▪ Server Access
Hacking
▪ Password Reuse
Attack
Security Access
Management Market
2016
$ 8,09 bln
2021
$ 14,82 bln
Browser/
GUI
Web,
Scada,
Any product
7
SSL
Certificate
(X.509)
Old PKI - CA
Single point
of failure
Nodes
REMME Core
Distributed Authentication Solution
8
WEBSITE
2 FA
(optional)
BROWSER
CERTIFICATE
Private
Key
BLOCKCHAIN
No more Passwords, no more PINs
9
Creation of
Certificate
Node
Functionality
Utility
REMME Token
REMME Facts
Clients and Partners
Working
MVP with 2FA on
Telegram
Microsoft and EY
winner in 2017
5
pilot projects
with corporate clients
4.500+
community
members in our
social channels
10
Token Sale terms
▪ Tokes sale starts on October 26, 2017
▪ Ethereum ERC20 token
▪ Unsold tokens will go back to the
company and will be locked for 1 year
11
$20 m
HARD CAP
12
Total Token supply: 100 million
13
Alex Momot
Founder & CEO
Taras Emelyanenko
CTO
Kate Pospelova
CMO
Anatolii Padenko
Junior Smart
Contract Engineer
Jan Keil
Business
Development
Zoya Danilina
Social Media
Specialist
Roman Kravchenko
CEO 482.solutions
Eugene
Babichenko
DApp Architect/
Engineer
Andrey Zamovskiy
Adviser, Ethereum Guru
Matjaž Slak
Enterprise B2B Sales Adviser,
cofound.it Lead Mentor
Daniel Zakrisson
Investments Adviser
Nick Bilogorskiy
Security Adviser
Our Team
Advisers
Gordon Einstein
Founder,
ADAPTIVESKY
Contact us
Alex Momot
am@remme.io
+380 (67) 220-12-20
@AMomot
email:
phone:
Telegram:
remme.io
@remme.io
website:
facebook:

More Related Content

What's hot

Blockchain technology and innovation in the insurance sector
Blockchain technology and innovation in the insurance sectorBlockchain technology and innovation in the insurance sector
Blockchain technology and innovation in the insurance sectorBlockchain Council
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyClickSSL
 
5 blockchain implementation strategy for business
5 blockchain implementation strategy for business5 blockchain implementation strategy for business
5 blockchain implementation strategy for businessBlockchain Council
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
Blockchaininnovationsv2
Blockchaininnovationsv2Blockchaininnovationsv2
Blockchaininnovationsv2MecklerMedia
 
What Is The Blockchain kyc solutions
What Is The Blockchain kyc solutions What Is The Blockchain kyc solutions
What Is The Blockchain kyc solutions Blockchain Council
 

What's hot (6)

Blockchain technology and innovation in the insurance sector
Blockchain technology and innovation in the insurance sectorBlockchain technology and innovation in the insurance sector
Blockchain technology and innovation in the insurance sector
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption Strategy
 
5 blockchain implementation strategy for business
5 blockchain implementation strategy for business5 blockchain implementation strategy for business
5 blockchain implementation strategy for business
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Blockchaininnovationsv2
Blockchaininnovationsv2Blockchaininnovationsv2
Blockchaininnovationsv2
 
What Is The Blockchain kyc solutions
What Is The Blockchain kyc solutions What Is The Blockchain kyc solutions
What Is The Blockchain kyc solutions
 

Similar to Александр Момот - На что обратить внимание при подготовке ICO: команда, метрики, инвесторы, роадшоу, техническая часть

100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017CASCouncil
 
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate ThemThe Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate ThemCapital Numbers
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseJim Porell
 
Debunking Myths about Malicious Bots / 악성 봇의 허상과 실상
Debunking Myths about Malicious Bots / 악성 봇의 허상과 실상Debunking Myths about Malicious Bots / 악성 봇의 허상과 실상
Debunking Myths about Malicious Bots / 악성 봇의 허상과 실상Jean Ryu
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMMundo Contact
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido AllianceCOMPUTEX TAIPEI
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooAlex Stamos
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CloudIDSummit
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101Cloudflare
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough? Zscaler
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
The Future of Secure Digital Transactions: QTMaaS
The Future of Secure Digital Transactions: QTMaaSThe Future of Secure Digital Transactions: QTMaaS
The Future of Secure Digital Transactions: QTMaaSSteve Downer
 
How to Meet MFA Mandates in Air Gap Networks
How to Meet MFA Mandates in Air Gap NetworksHow to Meet MFA Mandates in Air Gap Networks
How to Meet MFA Mandates in Air Gap NetworksSecret Double Octopus
 
Keyloggers A Malicious Attack
Keyloggers A Malicious AttackKeyloggers A Malicious Attack
Keyloggers A Malicious Attackijtsrd
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareCloudflare
 

Similar to Александр Момот - На что обратить внимание при подготовке ICO: команда, метрики, инвесторы, роадшоу, техническая часть (20)

100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
 
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate ThemThe Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
Debunking Myths about Malicious Bots / 악성 봇의 허상과 실상
Debunking Myths about Malicious Bots / 악성 봇의 허상과 실상Debunking Myths about Malicious Bots / 악성 봇의 허상과 실상
Debunking Myths about Malicious Bots / 악성 봇의 허상과 실상
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance
 
Security at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at YahooSecurity at Scale - Lessons from Six Months at Yahoo
Security at Scale - Lessons from Six Months at Yahoo
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
The Future of Secure Digital Transactions: QTMaaS
The Future of Secure Digital Transactions: QTMaaSThe Future of Secure Digital Transactions: QTMaaS
The Future of Secure Digital Transactions: QTMaaS
 
How to Meet MFA Mandates in Air Gap Networks
How to Meet MFA Mandates in Air Gap NetworksHow to Meet MFA Mandates in Air Gap Networks
How to Meet MFA Mandates in Air Gap Networks
 
Keyloggers A Malicious Attack
Keyloggers A Malicious AttackKeyloggers A Malicious Attack
Keyloggers A Malicious Attack
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 

More from Timetogrowup

Розробка стратегії з нуля
Розробка стратегії з нуляРозробка стратегії з нуля
Розробка стратегії з нуляTimetogrowup
 
Володимир Коваль
Володимир КовальВолодимир Коваль
Володимир КовальTimetogrowup
 
Олена Григорчук
Олена ГригорчукОлена Григорчук
Олена ГригорчукTimetogrowup
 
Уляна Країнська
Уляна КраїнськаУляна Країнська
Уляна КраїнськаTimetogrowup
 
Роман Дерега
Роман ДерегаРоман Дерега
Роман ДерегаTimetogrowup
 
Андрій Чорний
Андрій ЧорнийАндрій Чорний
Андрій ЧорнийTimetogrowup
 
Kind geek ultimate-sales-guide-2018
Kind geek ultimate-sales-guide-2018Kind geek ultimate-sales-guide-2018
Kind geek ultimate-sales-guide-2018Timetogrowup
 
Ваче Давтян - Убийцы продаж
Ваче Давтян - Убийцы продажВаче Давтян - Убийцы продаж
Ваче Давтян - Убийцы продажTimetogrowup
 
Андрей Чекмарёв - Сприяння та перешкоди у професії продажів
Андрей Чекмарёв - Сприяння та перешкоди у професії продажівАндрей Чекмарёв - Сприяння та перешкоди у професії продажів
Андрей Чекмарёв - Сприяння та перешкоди у професії продажівTimetogrowup
 
Артем Биковець - Agile at scale: Сhallenges & Fails
Артем Биковець - Agile at scale: Сhallenges & FailsАртем Биковець - Agile at scale: Сhallenges & Fails
Артем Биковець - Agile at scale: Сhallenges & FailsTimetogrowup
 
Константин Коптелов - Objective and Key Results Framework
Константин Коптелов - Objective and Key Results FrameworkКонстантин Коптелов - Objective and Key Results Framework
Константин Коптелов - Objective and Key Results FrameworkTimetogrowup
 
Максим Вишневський - Team scale
Максим Вишневський - Team scaleМаксим Вишневський - Team scale
Максим Вишневський - Team scaleTimetogrowup
 
Максим Ткаченко - Ефективні техніки продажів
Максим Ткаченко - Ефективні техніки продажівМаксим Ткаченко - Ефективні техніки продажів
Максим Ткаченко - Ефективні техніки продажівTimetogrowup
 
Uliana Krainska - Lead Generation Channels and Pre-Sales Activities in IT Co...
Uliana Krainska - Lead Generation Channels  and Pre-Sales Activities in IT Co...Uliana Krainska - Lead Generation Channels  and Pre-Sales Activities in IT Co...
Uliana Krainska - Lead Generation Channels and Pre-Sales Activities in IT Co...Timetogrowup
 
Olena Grygorchuk - Refactor your understandings about Agile development
Olena Grygorchuk - Refactor your understandings about Agile developmentOlena Grygorchuk - Refactor your understandings about Agile development
Olena Grygorchuk - Refactor your understandings about Agile developmentTimetogrowup
 
Andriy Mudryy - Agile it All!
Andriy Mudryy - Agile it All!Andriy Mudryy - Agile it All!
Andriy Mudryy - Agile it All!Timetogrowup
 
IT Sales Kyiv - Дмитрий Моцьо
IT Sales Kyiv - Дмитрий МоцьоIT Sales Kyiv - Дмитрий Моцьо
IT Sales Kyiv - Дмитрий МоцьоTimetogrowup
 
IT Sales Kyiv - Антон Федулов
IT Sales Kyiv - Антон ФедуловIT Sales Kyiv - Антон Федулов
IT Sales Kyiv - Антон ФедуловTimetogrowup
 
Orysya Sklyar - Calls
Orysya Sklyar - CallsOrysya Sklyar - Calls
Orysya Sklyar - CallsTimetogrowup
 

More from Timetogrowup (20)

Розробка стратегії з нуля
Розробка стратегії з нуляРозробка стратегії з нуля
Розробка стратегії з нуля
 
Володимир Коваль
Володимир КовальВолодимир Коваль
Володимир Коваль
 
Олена Григорчук
Олена ГригорчукОлена Григорчук
Олена Григорчук
 
Уляна Країнська
Уляна КраїнськаУляна Країнська
Уляна Країнська
 
Роман Дерега
Роман ДерегаРоман Дерега
Роман Дерега
 
Андрій Чорний
Андрій ЧорнийАндрій Чорний
Андрій Чорний
 
Kind geek ultimate-sales-guide-2018
Kind geek ultimate-sales-guide-2018Kind geek ultimate-sales-guide-2018
Kind geek ultimate-sales-guide-2018
 
Oleksiy Davydenko
Oleksiy DavydenkoOleksiy Davydenko
Oleksiy Davydenko
 
Ваче Давтян - Убийцы продаж
Ваче Давтян - Убийцы продажВаче Давтян - Убийцы продаж
Ваче Давтян - Убийцы продаж
 
Андрей Чекмарёв - Сприяння та перешкоди у професії продажів
Андрей Чекмарёв - Сприяння та перешкоди у професії продажівАндрей Чекмарёв - Сприяння та перешкоди у професії продажів
Андрей Чекмарёв - Сприяння та перешкоди у професії продажів
 
Артем Биковець - Agile at scale: Сhallenges & Fails
Артем Биковець - Agile at scale: Сhallenges & FailsАртем Биковець - Agile at scale: Сhallenges & Fails
Артем Биковець - Agile at scale: Сhallenges & Fails
 
Константин Коптелов - Objective and Key Results Framework
Константин Коптелов - Objective and Key Results FrameworkКонстантин Коптелов - Objective and Key Results Framework
Константин Коптелов - Objective and Key Results Framework
 
Максим Вишневський - Team scale
Максим Вишневський - Team scaleМаксим Вишневський - Team scale
Максим Вишневський - Team scale
 
Максим Ткаченко - Ефективні техніки продажів
Максим Ткаченко - Ефективні техніки продажівМаксим Ткаченко - Ефективні техніки продажів
Максим Ткаченко - Ефективні техніки продажів
 
Uliana Krainska - Lead Generation Channels and Pre-Sales Activities in IT Co...
Uliana Krainska - Lead Generation Channels  and Pre-Sales Activities in IT Co...Uliana Krainska - Lead Generation Channels  and Pre-Sales Activities in IT Co...
Uliana Krainska - Lead Generation Channels and Pre-Sales Activities in IT Co...
 
Olena Grygorchuk - Refactor your understandings about Agile development
Olena Grygorchuk - Refactor your understandings about Agile developmentOlena Grygorchuk - Refactor your understandings about Agile development
Olena Grygorchuk - Refactor your understandings about Agile development
 
Andriy Mudryy - Agile it All!
Andriy Mudryy - Agile it All!Andriy Mudryy - Agile it All!
Andriy Mudryy - Agile it All!
 
IT Sales Kyiv - Дмитрий Моцьо
IT Sales Kyiv - Дмитрий МоцьоIT Sales Kyiv - Дмитрий Моцьо
IT Sales Kyiv - Дмитрий Моцьо
 
IT Sales Kyiv - Антон Федулов
IT Sales Kyiv - Антон ФедуловIT Sales Kyiv - Антон Федулов
IT Sales Kyiv - Антон Федулов
 
Orysya Sklyar - Calls
Orysya Sklyar - CallsOrysya Sklyar - Calls
Orysya Sklyar - Calls
 

Recently uploaded

Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 

Recently uploaded (20)

Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 

Александр Момот - На что обратить внимание при подготовке ICO: команда, метрики, инвесторы, роадшоу, техническая часть

Editor's Notes

  1. Thank you very much for having me here today. Let me first please render the problem, so that we are all on the same page. Interacting at a distance brings the first problem: how do you know the real identity of that distance party? Let’s imagine that this problem is in the process of being solved and workable solutions are already out there. What not has been effectively solved: you may be who you say you are but what access does that entitle you to? Perhaps more importantly what are you not entitled to access and how do we manage the evolution of your access entitlements over time? Like Blockchain helped resolve identity now REMME leverages the power of Blockchain to finally solve ACCESS. May I ask you to raise hands whom of you have never forgot his password.
  2. Hopefully not because of using such kind? Anyway, stats show that 75% of users use 3 to 4 passwords across all of their accounts.
  3. An enormous number, $ 6 trillion per year spend on cyber crime damages… $ 150 mln in average, the costs of each data breach… the reputation lost not to mention 76% are enabled by weak passwords… Do you remember EQUIFAX - 1 of 3 major US credit reporting agencies (handling also identity) “hacked” and 143 million people compromising. Why? Because of using “admin/admin” for one of their databases. So in return, 7 of 10 attacks could be prevented with simple IT security solution, like REMME.
  4. We see that enterprises are hacked, We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance, We see the automotive sector getting more and more attraction And of course the crypto market is of high interest among attackers
  5. The main security problem that is common for all these areas is centralized point of access, namely the server. Not to forget weak protection itself and the human factor. Speaking about passwords, the weak side, each company has to be prepared to such attacks as: Phishing Keylogging Brute Force Server access hacking Bucket brigade Password reuse attack
  6. Short view on the market we are talking about – a big on. Rising from $ 8.8 bln in 2016 to $ 14.82 bln in 2021 – nearly double
  7. Finally here. What is it all about? We are enhancing the Bitcoin network protocol as so to render it PKI enabled. Earlier the certificate was validated through the help of the centralized authentication structure, involving companies like Verisign. But no more! In future the web server or any product will check the certificate through the REMME distributed and decentralized network. With REMME we are mainly using 2 technologies, disassemble them, to put them together in a new way: one is the SSL X.509 standard, where we keep SSL, as a container and to assure the state of a certificate, we are leveraging the Bitcoin Blockchain, and so maintain whether a certificate is still valid or was revoked
  8. REMME is more, I promised you we solve authentication without the need of passwords or PINs, a distributed, 3-layer access management security solution. With the help of SSL and Blockchain, we have checked that a certificate is valid. On top of this, we have a 2nd factor authentication, again without a pin, that is checking that it is you, personally, who is accessing the “service layer”. Telegram or Messenger asking “Is it you who is opening mybanking.com?”, the only thing you have to do is to press “Yes” or “No” And the magic will happen. The 3th layer is actually the build in biometrics, that allows you to access the messenger only after you have identified yourself.
  9. REMME tokens are utilities, they are needed to create a certificate and to became a node (Proof-of-Stake), authorized to create certificates, revoke or verify the validity
  10. We have a working MVP, that we will showcase at our demo zone, 5 pilot projects, 4.500+ members in our community. We have won the Microsoft Blockchain Intensive. One of big 4 audit companies will audit our project in the meaning of the business model, token model and further more.
  11. Our hard cap are $20m that we will raise within 3 rounds starting at the same time, but with the possibility to be postponed. On top we are running a so called Panzer Round to collect anything from $20m to $100m, to prepare for the war ;) we are changing the access layer world ;)
  12. Please see details of our token distribution and the allocation of raise
  13. A few words about our team, as it is hard to realize even a brilliant idea without a strong team.