by Guest Post
Did you know that 81 percent of hacks happen due to stolen or weak passwords?
It takes just ten minutes to crack a six-character, lowercase password.
That’s why REMME aims to provide next-gen access protection by making passwords obsolete. It relies on distributed Public Key Infrastructure protocol and a set of DApps on top of it. Rather than creating a password, each user has a specific SSL/TLS certificate – managed on the blockchain – for each device.
Three of REMME’s client companies are locking out hackers for good.
Cyber criminals love to target hospitals due to their vast amounts of patient data, including names, birth dates, insurance numbers, diagnosis codes, and billing information – all more valuable than a credit card.
Black marketeers can use this information to create fake IDs to purchase drugs or file fake insurance claims.
In this environment, Constitutional Health uses patient input and larger health sets to customize individual health plans using a digital model. Because it relies heavily on patient information, Constitutional Health has collected thick files of patient data for which it guarantees protection and 100 percent confidentiality.
A US-based operator of an Artificial Intelligence-infused health information database, Constitutional Health implemented the REMME solution as a module on its WordPress-based website and as an add-on for its SSL certificate technology.
REMME’s distributed blockchain technology replaced a central database and added two-factor authorization as an additional layer of security. Data no longer sits on the server. Instead, it is stored in the certificate, and the data container is signed with the master key of the master administrator.
Ukraine-based Hotmine develops products that use cgminer chips such as the 16 nm found in the microminer project. For cgminer to connect with mining pools, it uses the Stratum protocol which is the de-facto mining communication protocol used by blockchain-based cryptocurrency systems that enables miners to reliably and eﬃciently fetch jobs from mining pool servers.
The lack of cryptographic protection of communications makes this protocol vulnerable. Hotmine, therefore, integrated REMME’s solution to improve the Stratum protocol.
After Stratum replaced the getwork protocol, it became the most popular protocol used by the miners. In the Stratum protocol, the miners solve the parts of the puzzle given to them (jobs) and send the intermediate results of the mining (shares) to the server. Then the pool compensates the work that has been done by miners according to the complexity of the work and the amount of shares sent to the server.
A hacker can steal the computing resources of the miner and even earn a profit from it by substituting traffic. Although it would be simple to arrange an encrypted channel between the miner and the pool, this solution increases workload and reduces speed, creating orphan blocks.
To solve these problems and improve the Stratum protocol, REMME created a new StratumRM protocol. In this protocol, the connection with the pool is divided into two different connections. One connection uses TCP + TLS while the second uses UDP. The TCP + TLS connection manages a low-speed connection which is used for the miner’s authorization on the server and to get statistics of the delivered packets. The high-speed UDP transmits the miner’s work results.
By 2020, Internet of Things (IoTs) devices are expected to explode. Figures from Gartner estimates that 5.5 million new things get connected every day while the BI Intelligence’s IoT Ecosystem Research Report puts it that there will be 34 billion devices connected to the internet by 2020.
This explosion, though exciting, presents criminals with a great opportunity for holding connected devices for ransom. Cyber attackers pose risks to personal safety by attacking such devices as internet-connected cars.
Infopulse, part of Nordic IT group EVRY A/S, is an international vendor of services in the areas of Software R&D, Application Management, IT Operations, and Information Security to SMEs and Fortune 100 companies across the globe.
Infopulse has adopted and provided R&D within Blockchain and other technologies, such as IoT, Big Data, AI, VR/AR for automotive, banking, finance, telecom, and other industries.
It faces several cybersecurity challenges, including payment-safe systems at everyday locations, managing difference access zones of a car, trustworthy client feedback about POIs, safe and encrypted usage of other cars’ sensors’ information, and an organization of mesh-network between cars with the help of Blockchain.
REMME used the Rootstock system (open-source) as a basis for Infopulse’s blockchain system. Naturally, the company made modifications such as relying on federative nodes with master power in the system, eliminating the need for mining processes, using multi-signature federative nodes to create a checkpoint, and have every block signed by a predefined minimal number of federative nodes.
This technology allows the car owner to securely control the car from anywhere through a certificate in a hardware key which could be used to create mesh connection to control the car remotely through SSL/TLS in the event of a zero-day exploits.
With these successes underpinning the company, REMME’s next goal is to develop inter-blockchain token migration for the protocol’s next release. This will allow the REM token, which is currently released on the Ethereum platform, to be used on their custom REMME blockchain.
This is a paid press release. BTCManager does not endorse and is not responsible for or liable for any content, accuracy, quality, advertising, products or other materials on this page. Readers should do their own research before taking any actions related to the company. BTCManager is not responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in the press release.