BITFENCE ICO 2
Every day, the information resources of sets of corporations and organizations suffer less from hacking. Risk at the level of zero day. Typically, this type of attack is performed when a vulnerability in the functioning of hardware or software is identified, but this vulnerability has not yet been resolved. As a rule, such attacks are rather latent.
According to the Ponemon Report of 2015, there is a claim that on average this type of intrusion is not immediately apparent, and usually after a lapse of 256 days. But then it may be too late - the money sphere has suffered losses, and the reputation is already spoiled, and private data is already on the outside.
The methods of hacker groupings are quite similar. Who is familiar with the term proactive protection, better understands what is happening.
BitFence Cyber
Security is a massive defense against cyber attacks. The level of its reliability and functionality is significantly higher than that of software products manufactured by various companies.
Here we have a very interesting solution, which saves not only from zero-day attacks, but also has "bookmarks" in its composition, when an attacker is sure to light up his signatures, and artificial intelligence systems will be able to analyze them for subsequent identification.
Such protection is intended for all users. Those. if there was an attack on any one company, the defense methods will be extrapolated to other project participants in a few seconds.
BitFence includes such components:
a network of sensors on the entire perimeter of the decentralized network. The network is called Distributed HoneyPot. BitFence has also motivational mechanisms in the form of HNY coins for working with the system and running the corresponding software. Also there are solutions for mining, designed for a wide class of equipment. The software identifies atypical behavior of software or hardware and generates a report and with signaling.
Atypical behavior from mining tranches is transferred to the functions of artificial intelligence systems. These systems process and take the necessary measures.
as soon as the system detects an intrusion into the work, information about the type of intrusion and other related parameters is distributed throughout the perimeter of the protection. For consumers this is extremely important.
The following are the most typical examples.
Variation 1.
Suppose we have a certain firm "Alpha", which specializes in the production of children's toys and independently sells its products online. So, the online store will naturally be exposed to intruders. Here we have traditional sniffing, flud-attack, code modification, SQL injections. All this carries a potential threat to the site as a whole, but still remember to save copies.
For such variants BitFence already has an elegant and inexpensive solution. Well, we will diminish the dignity of similar products, they are there and function perfectly, that's only the cost starts from five thousand US dollars per month of use. It is doubtful that the broad strata of the population will be able to acquire this with one easy gesture of the hand. The algorithm is that BitFence introduces high-risk nodes and their IP into the stop list. Such blocking is performed by lightning-fast artificial intelligence subsystems.
Variation 2.
Suppose that we have a company (we call it "Beta") that sells consulting services and consumes disk space based on cloud technologies. Typically, it will be well-known services such as Microsoft Azure, IBM Cloud (in general, many options). The risk of an attack by an attacker or from a group can even lead to a loss of intellectual property rights. And its value can at times exceed the cost of hardware and software.
The system uses proactive mechanisms and algorithms. Accordingly, the more we have Commercial-Off-The-Shelf, the easier it is to implement malware - malware. But from the opposite point of view, it is easier to make a lock. You can easily buy data about malicious nodes of the network, only the relevance is not high, and there is not much point in this. It is unlikely that the attacker will re-use the same IP address.
BitFence is ready to share the latest vulnerability data, and this information will not be obsolete due to the miners.
Variation 3.
Here, too, is an interesting solution. You can also use microcomputers, such as Raspberry Pi, BeagleBoard. These bookmarks form an environment that can not be of no interest to hacker groups. In the attack, there are electronic traces, which are then analyzed in automatic mode.
The environment of the tabs in the form of mining farms is called Honeynet or HoneyFarm. For their participation, the miners receive honorariums in the HNY's demonet, later the exchange for the preferred currency is available.
Specifications.
Standard: ERC20
Total number of tokens: 100,000000 pcs.
Sent to the crowdsdale: 50%
Soft Cap: One Million US Dollars
Hard cap: fifty million US dollars
Pre-sale period: 01/04/2018-01-05-2018
Wide realization of coins: 01.05.2018 - 01.07.2018
Minimum amount of purchases: undefined, missing
Discounts: 10 ETH - 10%, then similar. The figure shows the dynamics of the course.
Distribution.
50% - ICO
20% buffer for miners
15% - fees to the staff
10% - marketing costs
3% - consulting fees
2% bounty
The result.
Two modes are available to the user: protection from an attacker and mining. If users are supportive and the system will be trusted, then development will follow, the participants of the system will be able to receive income through the provision of protection services against harmful effects.
Link to the website - https://bitfence.io
Group in Telegram - https://t.me/bitfence
Official Facebook - https://www.facebook.com
Official Twitter - https://twitter.com/BitFence_
Whitepaper - https://bitfence.io/data/BitFenceWP-EN-1.6b.pdf
The theme of the project on the forum is - https://bitcointalk.org/index.php?topic=3252856.0