What is Remme intended for?

in #remme6 years ago

☑️ WEBSITE
☑️ TWITTER
☑️ FACEBOOK
☑️ YOUTUBE
☑️ TELEGRAM
☑️ STEEMIT
☑️ MEDIUM
☑️ GITHUB
☑️ WHITEPAPER
☑️ ANN THREAD BTT
☑️ BOUNTY THREAD BTT   

▶️ Passwords are not secure – it is a common fact. The Remme project is going to address the issue through the utilization of a distributed public key infrastructure, involving blockchain and dApps technologies. In the end, it will provide users with momentary access to online services. However, Remme is looking for the support of businesses and state corporations. The project has nothing about improving users experience and protecting personal information, but it aims to ensure the security of corporate systems in case of terrorist attacks and cybercrime. How is Remme going to help in your niche?

🔹 Cryptocurrency exchange  🔹

▶️ Cryptocurrency transactions are operated automatically and have no authority to control, block and reverse payments in case of fraud. The fact makes cryptocurrency exchange a favorite spot for cybercriminals. The history saw enormous amounts of Bitcoin stolen, worth millions of dollars. One case happened to Bitfinex, once the biggest exchanging platform. Perhaps, it is one of the most famous cases of phishing, as hackers’ transactions were signed off by the security provider, bypassing full security practices. $72 million would be saved, if the service used a protected authorization platform, based on well-known blockchain technology and user-friendly two-factor authentication, REMME is going to implement.

🔹 Infrastructure objects  🔹

▶️ Crucial infrastructure points are becoming more integrated. The usage of interconnections with previous ignorance of cyber security matters makes infrastructure more vulnerable to cyber attacks. While earlier it was only a work of fiction, in 2015 the first cyber attack on power grid was a success in Ukraine. The actual victims were end consumers, but that is not the case when a control over nuclear power plant would be seized. Even though the security measures for protecting infrastructure may seem to be an expensive thing, Remme offers a cost-efficient way, eligible to work with existent SCADA software. It eliminates any opportunities for phishing and common cybercrimes.

🔹 Internet of things  🔹

▶️ The most problematic niche is self-piloted cars and embedded computer systems. While device-to-device interactions cannot be protected by at least password, access for a device is approved by even less secure IDs and similar authorization. That is how literally any car provides an opportunity to be hacked and used for terrorist attacks.

▶️ The inappropriate security measures prevent computer systems from implementing new technologies, like automatic payments for charging or filling up a car, identification of a driver and creating accounts with limitations for car sharing. The implementation of Remme decentralized PKI guarantees not only the previously unreachable level of security but the opportunity of further integration of onboard and smart-city systems.

🔹 Medical services  🔹

▶️ It is a good enough idea to have access to medical records online through a dedicated medical service. It is convenient both for patients, wanting to know the results of a health survey, as for example, and medical staff, able to know all the patient’s circumstances without reading pages of handwriting. However, we are still afraid of one more cyberattack and our information being stolen – medical records are far intimate data. On the other hand, the number of users (potentially, every citizen) demands a cost-effective and technically easy way to protect personal data. That is what RemmeC project has to offer.

🔹 Let us go even further  🔹

▶️ Internet banking, authority and corporate systems, which are supposed to have the unconditional protection of data are advised to take part in the pilot program. Remme project was created not only for the matters of usability, but for prevention of serious crimes, thefts, terrorist attacks, and much more. The authentication platform was made to be easy for implementation by different services and software. As examples show, even the most simple ways to get unauthorized access was successful in cases of big enterprises. 

❇️  ❇️  ❇️  ❇️  ❇️  ❇️  ❇️  ❇️  ❇️  ❇️
https://bitcointalk.org/index.php?action=profile;u=1330528
0x4Edb0b4fDb1B69D4e60537AEEf5BA145ac25b2db