Александр Момот - “REMME — токен-экономика в проекте по кибер безопасности на блокчейне. Бизнес-кейс, алгоритм консенсуса, dApps vs protocol”
Blockchain Summit Kyiv 2018
William Mougayar's Keynote at the ICO Summit, Zurich 15 Sept 2017
Similar to Александр Момот - “REMME — токен-экономика в проекте по кибер безопасности на блокчейне. Бизнес-кейс, алгоритм консенсуса, dApps vs protocol”
Similar to Александр Момот - “REMME — токен-экономика в проекте по кибер безопасности на блокчейне. Бизнес-кейс, алгоритм консенсуса, dApps vs protocol” (20)
5. $6tn/year
Will cost the world crime
damages by 2021
>$150 mln
The average cost of data
breach in 2020
Cyber Security Facts
76%
of all data breaches were
enabled by weak
credentialing and user
authentication
7/10
Cyber attacks could be
prevented with simple IT
security measures
5
20. Node reward
Proof of Service – Virtual Proof of work
90% nodes, 10% REMME
45% available, 45% lockup
Reputation and Stake gives unlock bonus
Reputation is more important
21. Business / Customer Development / Go-to market
Passwordless Auth
B2C B2B
IAM / PKI-(d)
Open Source
</>
Thank you very much for having me here today.
Let me first please render the problem, so that we are all on the same page.
Interacting at a distance brings the first problem:
how do you know the real identity of that distance party?
Let’s imagine that this problem is in the process of being solved
and workable solutions are already out there.
What not has been effectively solved: you may be who you say you are but what access does that entitle you to?Perhaps more importantly what are you not entitled to access and how do we manage the evolution of your access entitlements over time?
Like Blockchain helped resolve identity now REMME leverages the power of Blockchain to finally solve ACCESS.
May I ask you to raise hands whom of you have never forgot his password.
Hopefully not because of using such kind?
Anyway, stats show that 75% of users use 3 to 4 passwords across all of their accounts.
The main security problem that is common for all these areas is centralized point of access, namely the server.
Not to forget weak protection itself and the human factor.
Speaking about passwords, the weak side, each company has to be prepared to such attacks as:
Phishing
Keylogging
Brute Force
Server access hacking
Bucket brigade
Password reuse attack
Short view on the market we are talking about – a big on.
Rising from $ 8.8 bln in 2016 to $ 14.82 bln in 2021 – nearly double
An enormous number, $ 6 trillion per year spend on cyber crime damages…
$ 150 mln in average, the costs of each data breach… the reputation lost not to mention
76% are enabled by weak passwords…
Do you remember EQUIFAX - 1 of 3 major US credit reporting agencies (handling also identity)
“hacked” and 143 million people compromising.
Why? Because of using “admin/admin” for one of their databases.
So in return, 7 of 10 attacks could be prevented with simple IT security solution, like REMME.
Short view on the market we are talking about – a big on.
Rising from $ 8.8 bln in 2016 to $ 14.82 bln in 2021 – nearly double
Short view on the market we are talking about – a big on.
Rising from $ 8.8 bln in 2016 to $ 14.82 bln in 2021 – nearly double
REMME is more, I promised you we solve authentication without the need of passwords or PINs,
a distributed, 3-layer access management security solution.
With the help of SSL and Blockchain, we have checked that a certificate is valid.
On top of this, we have a 2nd factor authentication, again without a pin, that is checking that it is you, personally, who is accessing the “service layer”.
Telegram or Messenger asking “Is it you who is opening mybanking.com?”,
the only thing you have to do is to press “Yes” or “No”
And the magic will happen.
The 3th layer is actually the build in biometrics, that allows you to access the messenger only after you have identified yourself.
Finally here. What is it all about?
We are enhancing the Bitcoin network protocol as so to render it PKI enabled.
Earlier the certificate was validated through the help of the centralized authentication structure, involving companies like Verisign.
But no more! In future the web server or any product will check the certificate through the REMME distributed and decentralized network.
With REMME we are mainly using 2 technologies, disassemble them, to put them together in a new way:
one is the SSL X.509 standard, where we keep SSL, as a container
and to assure the state of a certificate, we are leveraging the Bitcoin Blockchain, and so maintain whether a certificate is still valid or was revoked
REMME tokens are utilities,
they are needed to create a certificate and
to became a node (Proof-of-Stake), authorized to create certificates, revoke or verify the validity
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
Finally here. What is it all about?
We are enhancing the Bitcoin network protocol as so to render it PKI enabled.
Earlier the certificate was validated through the help of the centralized authentication structure, involving companies like Verisign.
But no more! In future the web server or any product will check the certificate through the REMME distributed and decentralized network.
With REMME we are mainly using 2 technologies, disassemble them, to put them together in a new way:
one is the SSL X.509 standard, where we keep SSL, as a container
and to assure the state of a certificate, we are leveraging the Bitcoin Blockchain, and so maintain whether a certificate is still valid or was revoked
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers
We see that enterprises are hacked,
We see that critical infrastructure are of interest, like Healthcare, Energy, Government, Information & Communication, Finance,
We see the automotive sector getting more and more attraction
And of course the crypto market is of high interest among attackers