Crypto-Security Testnet Surpasses Key Milestones
Security and has been combined with micro-compucomputing are a combination which ascended to greatly relevant, both economically and financially, since the early days of commercial internet technology, the John McAfee associated era of anti-virus software, and fears of ‘millennium-bug’ (‘Y2K’)-induced societal meltdowns.
As a market player, ‘cybersecurity‘ is hailed for its continuedvalue and growth, with recent implementations advancing in tandem with technological development. With ‘blockchain’ having become a key buzzword in recent years, it comes as little surprise that digital security providers have been attempting to identify and provide protection against cryptocurrency related scams.
Examples of these include ‘malware‘ AKA ‘malicious software’. They are often created with the aim of illicitly subvert the processing power of the victim’s device for use towards the mining of cryptocurrencies, or lock and potentially delete highly sensitive data (such as Ransomware’).
Cybersecurity and Blockchain
Crypto attacks can affect almost any person or institution: from private wallets and exchanges, to cryptocurrency operators, and even sometimes unsuspecting users of internet browsers with no relation to blockchain based services.
In an article published at CCN in August 2018, I wrote about the large prolificity and news coverage of cyber-attacks carried out against cryptocurrency organisations: with a majority of them involving the theft of high-value quantities of tokens or sensitive data.
Key points raised in the piece include the identification of wallets and exchanges as high-value targets for potential thieves, as well as a discussion surrounding a study of over 1000 participants in which none of the top exchanges were “lauded for security”.
As cybersecurity has been exposed as a fatal flaw in the unauthorised access / theft access of finances and data, it has also drawn a spotlight on the various methods employed by the companies which suffer these attacks.
Middleware, Wear and Tear
Some teams attempt to protect their data and finances through the creation and implementation of their own proprietary cybersecurity solutions whilst others seek the tender of others,
‘Middleware’ is nothing new and has long been utilised as a means of implementing third-party solutions as a means of shifting professional a legislative liability regarding essential functions of a brand technology.
It’s a creation by third party product / service providers that sits between external and internal code in order to facilitate functions or protections.
Decentralized Security Testnet
REMME is a project harnessing blockchain technology to create a distributed cybersecurity solution for enterprises.
Its now-released testnet has already demonstrated the efficacy of storing hashed Public Key Infrastructure certificates on the blockchain, and with 300 pilot program participants signed up, REMME isn’t short of applicants eager to trial its distributed identity and access management solution.
‘Distributed Identity and Access management’ (IAMd) and ‘Public Key Infrastructure’ requests (PKId) count amongst two of the primary features of the proprietary REMChain testchain network infrastructure. Both claims of which have come from CEO Alex Momot, who additionally praised “The interoperability of the public blockchain and sidechains”.
Additional features include the ‘REMchain block explorer’ – ‘node monitoring’ (connected to five nodes worldwide) – REMME WebAuth demo application.
While a pilot program reportedly attracting over 300 global enterprise applicants, REMME feels confident about the future of their long terms plans: which include full integration existing enterprise systems (ERP, CRM, Accounting software etc.).
Featured image courtesy of Shutterstock.