Уважаемые пользователи Голос!
Сайт доступен в режиме «чтение» до сентября 2020 года. Операции с токенами Golos, Cyber можно проводить, используя альтернативные клиенты или через эксплорер Cyberway. Подробности здесь: https://golos.io/@goloscore/operacii-s-tokenami-golos-cyber-1594822432061
С уважением, команда “Голос”
GOLOS
RU
EN
UA
deuitt8
6 лет назад

BITFENCE ICO 2

Every day, the information resources of sets of corporations and organizations suffer less from hacking. Risk at the level of zero day. Typically,  this type of attack is performed when a vulnerability in the  functioning of hardware or software is identified, but this  vulnerability has not yet been resolved. As a rule, such attacks are rather latent. 

According  to the Ponemon Report of 2015, there is a claim that on average this  type of intrusion is not immediately apparent, and usually after a lapse  of 256 days. But  then it may be too late - the money sphere has suffered losses, and the  reputation is already spoiled, and private data is already on the  outside. 

The methods of hacker groupings are quite similar. Who is familiar with the term proactive protection, better understands what is happening.

BitFence Cyber

Security is a massive defense against cyber attacks. The  level of its reliability and functionality is significantly higher than  that of software products manufactured by various companies. 

Here  we have a very interesting solution, which saves not only from zero-day  attacks, but also has "bookmarks" in its composition, when an attacker  is sure to light up his signatures, and artificial intelligence systems  will be able to analyze them for subsequent identification. 

Such protection is intended for all users. Those. if  there was an attack on any one company, the defense methods will be  extrapolated to other project participants in a few seconds. 

 BitFence includes such components:

a network of sensors on the entire perimeter of the decentralized network. The network is called Distributed HoneyPot. BitFence  has also motivational mechanisms in the form of HNY coins for working  with the system and running the corresponding software. Also there are solutions for mining, designed for a wide class of equipment. The software identifies atypical behavior of software or hardware and generates a report and with signaling.

Atypical behavior from mining tranches is transferred to the functions of artificial intelligence systems. These systems process and take the necessary measures.

as  soon as the system detects an intrusion into the work, information  about the type of intrusion and other related parameters is distributed  throughout the perimeter of the protection. For consumers this is extremely important.

The following are the most typical examples.

Variation 1.

Suppose  we have a certain firm "Alpha", which specializes in the production of  children's toys and independently sells its products online. So, the online store will naturally be exposed to intruders. Here we have traditional sniffing, flud-attack, code modification, SQL injections. All this carries a potential threat to the site as a whole, but still remember to save copies.

For such variants BitFence already has an elegant and inexpensive solution. Well,  we will diminish the dignity of similar products, they are there and  function perfectly, that's only the cost starts from five thousand US  dollars per month of use. It is doubtful that the broad strata of the population will be able to acquire this with one easy gesture of the hand. The algorithm is that BitFence introduces high-risk nodes and their IP into the stop list. Such blocking is performed by lightning-fast artificial intelligence subsystems.

Variation 2.

Suppose  that we have a company (we call it "Beta") that sells consulting  services and consumes disk space based on cloud technologies. Typically, it will be well-known services such as Microsoft Azure, IBM Cloud (in general, many options). The risk of an attack by an attacker or from a group can even lead to a loss of intellectual property rights. And its value can at times exceed the cost of hardware and software.

The system uses proactive mechanisms and algorithms. Accordingly, the more we have Commercial-Off-The-Shelf, the easier it is to implement malware - malware. But from the opposite point of view, it is easier to make a lock. You  can easily buy data about malicious nodes of the network, only the  relevance is not high, and there is not much point in this. It is unlikely that the attacker will re-use the same IP address.

BitFence is ready to share the latest vulnerability data, and this information will not be obsolete due to the miners. 

 Variation 3.

Here, too, is an interesting solution. You can also use microcomputers, such as Raspberry Pi, BeagleBoard. These bookmarks form an environment that can not be of no interest to hacker groups. In the attack, there are electronic traces, which are then analyzed in automatic mode. 

The environment of the tabs in the form of mining farms is called Honeynet or HoneyFarm. For  their participation, the miners receive honorariums in the HNY's  demonet, later the exchange for the preferred currency is available.

Specifications.

Standard: ERC20

Total number of tokens: 100,000000 pcs.

Sent to the crowdsdale: 50%

Soft Cap: One Million US Dollars

Hard cap: fifty million US dollars

Pre-sale period: 01/04/2018-01-05-2018

Wide realization of coins: 01.05.2018 - 01.07.2018

Minimum amount of purchases: undefined, missing

Discounts: 10 ETH - 10%, then similar. The figure shows the dynamics of the course.

Distribution.

50% - ICO

20% buffer for miners

15% - fees to the staff

10% - marketing costs

3% - consulting fees

2% bounty 

The result.

Two modes are available to the user: protection from an attacker and mining. If  users are supportive and the system will be trusted, then development  will follow, the participants of the system will be able to receive  income through the provision of protection services against harmful  effects.

Link to the website - https://bitfence.io
Group in Telegram - https://t.me/bitfence
Official Facebook - https://www.facebook.com
Official Twitter - https://twitter.com/BitFence_
Whitepaper - https://bitfence.io/data/BitFenceWP-EN-1.6b.pdf
The theme of the project on the forum is - https://bitcointalk.org/index.php?topic=3252856.0




0
0.000 GOLOS
На Golos с May 2018
Комментарии (1)
Сортировать по:
Сначала старые