Pages:
Author

Topic: [ANN] LevelNet : The First Distributed Cyber Security Platform - page 29. (Read 48655 times)

newbie
Activity: 14
Merit: 0
The scam accusations was slightly worrying, thanks for addressing that LevelNet!

This project is a scam. It is impossible to protect the system from malicious software only by comparing the hash sum of the file. Especially they want to collect 1.5-55 million dollars, but the project is too simple to spend such amounts on implementation.
newbie
Activity: 56
Merit: 0
The scam accusations was slightly worrying, thanks for addressing that LevelNet!
newbie
Activity: 1
Merit: 0
Hi guys!
Im Alex, CTO at LevelNet.
Feel free to ask me if you have any technical questions!

My contacts listed below. Also you can use PM.
https://www.linkedin.com/in/alexander-bodiagin-9275b9124/
[email protected]
sr. member
Activity: 588
Merit: 252
This project look similar to Rivert correct me If I'm wrong here because I haven't have time to study the project in details also can't find the softcap for the ICO
full member
Activity: 308
Merit: 100
LevelNet Official
Hey.

Can you let me know why I haven't been updated for the signature bounty here on the 13th?

https://docs.google.com/spreadsheets/d/1eqoKACNr61qRMspz4hipHCGpSbjwY-fK2feb_H3tfkA/edit#gid=2010394730

Hi, for all bounty-related questions please join our dedicated bounty channel: https://t.me/levelnetbounty
full member
Activity: 308
Merit: 100
LevelNet Official
Hey guys, I just found out about this project. I really like the idea. I am planning to read the whitepaper today. Is the a prototype available?

Thank you! We do have a demonstrative video for our prototype: https://www.youtube.com/watch?v=fDLfvA9EqNU
newbie
Activity: 2
Merit: 0
Already there are software products such as a complimentary Comodo firewall. It controls not only the launch of programs as in levelnet, but also network connections, access to the registry, to autostarting, access to memory and much more. It also has a security policy based on the reactions end-point of the users and the trust of the publisher.

It's really not enough to compare the hash sum of the file. I agree with the arguments of Angel117. Malicious programs have a unique hash amount, so the antivirus response to a file on another computer can not be attributed to a malicious file on another. In this case, the any antivirus is easily recognized due to heuristic analysis. It turns out that reports of reactions any antivirus does not make sense, because this information can not be used and displayed to another user.

And do you have confirmation from antivirus companies that they allow you to use the work of their product for commercial purposes? You need to make a request to each antivirus company and publish their responses on the project website.
newbie
Activity: 14
Merit: 0
Hi guys.

Here’s our assessment of this situation:

Our hunch is that Angel117 is an aggressive former employee, who was removed from the project some time ago. While it would be easiest to discredit this attempt at harming our project as being mere trolling, we don’t want to leave any of our followers in doubt as to our projects merits, or the sincerity of our intentions.

Regarding his accusations towards the project  and the CEO, we believe his main motivation is for revenge (towards the project, the leader and individual people employed in the project). We believe that anything he would say will be aimed at discrediting us.

However, we feel it is important to provide the community with our answers and clarity on the project.

Regarding his statement that it is impossible to implement some functionality in the project means that a person does not have knowledge in the field of development management. We are not aiming to do everything at once, but move gradually from MVP to RTM.

Once again, here are our answers:

1. File Hashing is used to quickly search for KNOWN objects. This is the key to the speed of the algorithm that excludes trusted software from the need of any additional analysis. Detection of the same harmful objects, including those modified with the help of "morphers, cryptors and packers", is carried out through white lists.
2. Reports about malicious objects from LevelNet client applications are not sufficient for making these objects into the category of malware. This decision is made on the intermediate super nodes, the messages from which, in turn, are signed with a security key.
3. The author does not fully understand the principle of the work of LevelNet algorithms on super nodes. Dynamic analysis is not performed either because of the impossibility of automating such a process, or because it is not necessary. In this case, the white list is responsible for filtering.
4. In the speed and efficiency of information dissemination within p2p networks, each user can be convinced by the example of p2p file clients (ala bittorent), allowing to exchange huge amounts of data. The competence of the author in this matter raises special suspicions, in particular, at the expense of unsupported "report can be checked in a few days".
5. LevelNet does not use antivirus software, but only analyzes the reactions of its users.
6. For the functioning of the LevelNet network, there is absolutely no need to collect any personal data. All objects are represented exclusively by their hash-sums, according to which, as is known, it is impossible to restore the contents of the object or its belonging.
7. First, antivirus products do not exchange databases with their competitors. Secondly, the speed of updating the anti-virus database is estimated in hours; they use client-server connection protocols in which client devices do not contact each other, especially client devices with different antivirus products.
8. LevelNet does not perform heuristic analysis and preactive protection for one reason - no need. It is worth reminding the author that LevelNet is not yet another antivirus with all its inherent flaws, such as inefficiency of malware detection algorithms, slowdown of the device, serious resource consumption, etc.


Conclusion: Due to the fact that we are aware of the motive of his messages, we will ignore future communication with him.We adhere to the rule "Do not feed the troll". We ask the audience to pay attention to the character and emotional tone of his posts where accusations and discreditations are going on in each post. We will be grateful to all who can help us back our claims about this user.


We have also compiled a list of additional resources that help support the authenticity of our project:

1.1 We are registered in the jurisdiction of the United States. (https://businesssearch.sos.ca.gov/) in the search field, specify levelnet. Corporate number: C4046746
1.2 We have a registered trademark (https://www.uspto.gov/trademarks-application-process/search-trademark-database) in the search field, specify levelnet. Serial Number:87092110
1.3 We have a registered patent. (https://levelnet.co/files/Provisional%20patent%20confirmation.pdf)
1.4 We are on TechCrunch in SF (https://medium.com/@LevelNetwork/levelnet-techcrunch-disrupt-2017-report-c4b66dea9a69)
1.5 We go through Howey Test to fulfill the requirements of the securities regulator (https://drive.google.com/file/d/0B6khJNq3_ly5dVY2NzlFUkFKLU0/view) Registration is required. It is done so that other ICOs do not copy
1.6 We publish an information memorandum. (https://drive.google.com/file/d/0B9Qwnd-nTBzTMUllUDJyWXdKTlU/view)
1.7 On our advisor board are respected people from the industry from of the valley (levelnet.co)
1.8 We are on Blockchain UA 2017 in Kiev (https://medium.com/@LevelNetwork/blockchain-ua-2017-kiev-cecce7882de9)

We do not hide behind fictitious names, you can meet with us personally. All project participants are public people. If it is necessary to give more evidence we will provide them to the audience.

LevelNet

Yes, I am a former employee. And I have a lot about Pavel Shiklaev and project. In the first after a very long work, he deceived me for a large sum of money. I strongly relied on this money, because it would very much help me buy an apartment. But Pavel deceived me. He has no conscience. From the former employees with him no one is working anymore because he deceives people. All employees represented on the site have long worked in other companies. He does not have a team.

I want to warn people not to deal with this scoundrel!


At the expense of the arguments for the project. My arguments are logical and there is no connection with whether I want to take revenge or not. Any expert who values ​​his reputation will confirm my words!

1. Malicious software uses a morph or cryptor. This means that the sum of the file on each system is different. This means that the database will be empty for all malicious programs. And there is no sense in the fact that this malicious program was detected on another computer, because the client will not be able to recognize it and identify the threat reports.

2. No super nodes and so on can not weed out fake reports. Since everything that the client makes is left can be repeated automatically. His statements about super nodes and signatures are fraudulent, to give at least some sort of response to an unsolvable problem.

3. I made the assumption that you will check the reports on the server using anti-virus software, because you said this earlier, but you generally do not want to check them and it makes it very easy to manipulate statistics from the outside.

4. I said that in a few days, then if you checked the files on the server. Connections of the peer-to-peer do not provide a second reaction. BitTorrent is arranged differently, it has a central user directory. However, data transfer by peer-to-peer means transferring data between the CHARGE of nodes, and not directly. It says that Pavel do not even own the technologies that he claiming.

For example schema of peer-to-peer network:
https://i.imgur.com/BqYC1XL.jpg

5. No antivirus company will allow you to use their software for commercial purposes, even on the client side. If you think otherwise, you could write a letter at least to one of the antivirus companies with this issue and officially publish the answer on the site. You did not, so you already know that you are prohibited from using their software in this way.

6. ---

7/8. Antivirus companies sell each other's bases is a well-known fact. And the antivirus is able to recognize the threat through algorithms that have been developed for many years. Strong proactive defense systems are developed. But you seriously argue that this is not necessary and for security it is enough just to compare the hash sum of the file Huh

The fact that the company is officially registered does not deny that this is a scam. They will simply launder money for example through non-existent salaries. In Russia, this is a common practice for paper wages is one, but the employee is paid several times less.
hero member
Activity: 1274
Merit: 646
Hi guys.

Here’s our assessment of this situation:

Our hunch is that Angel117 is an aggressive former employee, who was removed from the project some time ago. While it would be easiest to discredit this attempt at harming our project as being mere trolling, we don’t want to leave any of our followers in doubt as to our projects merits, or the sincerity of our intentions.

Regarding his accusations towards the project  and the CEO, we believe his main motivation is for revenge (towards the project, the leader and individual people employed in the project). We believe that anything he would say will be aimed at discrediting us.

However, we feel it is important to provide the community with our answers and clarity on the project.

Regarding his statement that it is impossible to implement some functionality in the project means that a person does not have knowledge in the field of development management. We are not aiming to do everything at once, but move gradually from MVP to RTM.

Once again, here are our answers:

1. File Hashing is used to quickly search for KNOWN objects. This is the key to the speed of the algorithm that excludes trusted software from the need of any additional analysis. Detection of the same harmful objects, including those modified with the help of "morphers, cryptors and packers", is carried out through white lists.
2. Reports about malicious objects from LevelNet client applications are not sufficient for making these objects into the category of malware. This decision is made on the intermediate super nodes, the messages from which, in turn, are signed with a security key.
3. The author does not fully understand the principle of the work of LevelNet algorithms on super nodes. Dynamic analysis is not performed either because of the impossibility of automating such a process, or because it is not necessary. In this case, the white list is responsible for filtering.
4. In the speed and efficiency of information dissemination within p2p networks, each user can be convinced by the example of p2p file clients (ala bittorent), allowing to exchange huge amounts of data. The competence of the author in this matter raises special suspicions, in particular, at the expense of unsupported "report can be checked in a few days".
5. LevelNet does not use antivirus software, but only analyzes the reactions of its users.
6. For the functioning of the LevelNet network, there is absolutely no need to collect any personal data. All objects are represented exclusively by their hash-sums, according to which, as is known, it is impossible to restore the contents of the object or its belonging.
7. First, antivirus products do not exchange databases with their competitors. Secondly, the speed of updating the anti-virus database is estimated in hours; they use client-server connection protocols in which client devices do not contact each other, especially client devices with different antivirus products.
8. LevelNet does not perform heuristic analysis and preactive protection for one reason - no need. It is worth reminding the author that LevelNet is not yet another antivirus with all its inherent flaws, such as inefficiency of malware detection algorithms, slowdown of the device, serious resource consumption, etc.


Conclusion: Due to the fact that we are aware of the motive of his messages, we will ignore future communication with him.We adhere to the rule "Do not feed the troll". We ask the audience to pay attention to the character and emotional tone of his posts where accusations and discreditations are going on in each post. We will be grateful to all who can help us back our claims about this user.


We have also compiled a list of additional resources that help support the authenticity of our project:

1.1 We are registered in the jurisdiction of the United States. (https://businesssearch.sos.ca.gov/) in the search field, specify levelnet. Corporate number: C4046746
1.2 We have a registered trademark (https://www.uspto.gov/trademarks-application-process/search-trademark-database) in the search field, specify levelnet. Serial Number:87092110
1.3 We have a registered patent. (https://levelnet.co/files/Provisional%20patent%20confirmation.pdf)
1.4 We are on TechCrunch in SF (https://medium.com/@LevelNetwork/levelnet-techcrunch-disrupt-2017-report-c4b66dea9a69)
1.5 We go through Howey Test to fulfill the requirements of the securities regulator (https://drive.google.com/file/d/0B6khJNq3_ly5dVY2NzlFUkFKLU0/view) Registration is required. It is done so that other ICOs do not copy
1.6 We publish an information memorandum. (https://drive.google.com/file/d/0B9Qwnd-nTBzTMUllUDJyWXdKTlU/view)
1.7 On our advisor board are respected people from the industry from of the valley (levelnet.co)
1.8 We are on Blockchain UA 2017 in Kiev (https://medium.com/@LevelNetwork/blockchain-ua-2017-kiev-cecce7882de9)

We do not hide behind fictitious names, you can meet with us personally. All project participants are public people. If it is necessary to give more evidence we will provide them to the audience.

LevelNet

Thanks for that guys!
full member
Activity: 378
Merit: 100
Hey.

Can you let me know why I haven't been updated for the signature bounty here on the 13th?

https://docs.google.com/spreadsheets/d/1eqoKACNr61qRMspz4hipHCGpSbjwY-fK2feb_H3tfkA/edit#gid=2010394730
full member
Activity: 378
Merit: 100
Hi guys.

Here’s our assessment of this situation:

Our hunch is that Angel117 is an aggressive former employee, who was removed from the project some time ago. While it would be easiest to discredit this attempt at harming our project as being mere trolling, we don’t want to leave any of our followers in doubt as to our projects merits, or the sincerity of our intentions.

Regarding his accusations towards the project  and the CEO, we believe his main motivation is for revenge (towards the project, the leader and individual people employed in the project). We believe that anything he would say will be aimed at discrediting us.

However, we feel it is important to provide the community with our answers and clarity on the project.

Regarding his statement that it is impossible to implement some functionality in the project means that a person does not have knowledge in the field of development management. We are not aiming to do everything at once, but move gradually from MVP to RTM.

Once again, here are our answers:

1. File Hashing is used to quickly search for KNOWN objects. This is the key to the speed of the algorithm that excludes trusted software from the need of any additional analysis. Detection of the same harmful objects, including those modified with the help of "morphers, cryptors and packers", is carried out through white lists.
2. Reports about malicious objects from LevelNet client applications are not sufficient for making these objects into the category of malware. This decision is made on the intermediate super nodes, the messages from which, in turn, are signed with a security key.
3. The author does not fully understand the principle of the work of LevelNet algorithms on super nodes. Dynamic analysis is not performed either because of the impossibility of automating such a process, or because it is not necessary. In this case, the white list is responsible for filtering.
4. In the speed and efficiency of information dissemination within p2p networks, each user can be convinced by the example of p2p file clients (ala bittorent), allowing to exchange huge amounts of data. The competence of the author in this matter raises special suspicions, in particular, at the expense of unsupported "report can be checked in a few days".
5. LevelNet does not use antivirus software, but only analyzes the reactions of its users.
6. For the functioning of the LevelNet network, there is absolutely no need to collect any personal data. All objects are represented exclusively by their hash-sums, according to which, as is known, it is impossible to restore the contents of the object or its belonging.
7. First, antivirus products do not exchange databases with their competitors. Secondly, the speed of updating the anti-virus database is estimated in hours; they use client-server connection protocols in which client devices do not contact each other, especially client devices with different antivirus products.
8. LevelNet does not perform heuristic analysis and preactive protection for one reason - no need. It is worth reminding the author that LevelNet is not yet another antivirus with all its inherent flaws, such as inefficiency of malware detection algorithms, slowdown of the device, serious resource consumption, etc.


Conclusion: Due to the fact that we are aware of the motive of his messages, we will ignore future communication with him.We adhere to the rule "Do not feed the troll". We ask the audience to pay attention to the character and emotional tone of his posts where accusations and discreditations are going on in each post. We will be grateful to all who can help us back our claims about this user.


We have also compiled a list of additional resources that help support the authenticity of our project:

1.1 We are registered in the jurisdiction of the United States. (https://businesssearch.sos.ca.gov/) in the search field, specify levelnet. Corporate number: C4046746
1.2 We have a registered trademark (https://www.uspto.gov/trademarks-application-process/search-trademark-database) in the search field, specify levelnet. Serial Number:87092110
1.3 We have a registered patent. (https://levelnet.co/files/Provisional%20patent%20confirmation.pdf)
1.4 We are on TechCrunch in SF (https://medium.com/@LevelNetwork/levelnet-techcrunch-disrupt-2017-report-c4b66dea9a69)
1.5 We go through Howey Test to fulfill the requirements of the securities regulator (https://drive.google.com/file/d/0B6khJNq3_ly5dVY2NzlFUkFKLU0/view) Registration is required. It is done so that other ICOs do not copy
1.6 We publish an information memorandum. (https://drive.google.com/file/d/0B9Qwnd-nTBzTMUllUDJyWXdKTlU/view)
1.7 On our advisor board are respected people from the industry from of the valley (levelnet.co)
1.8 We are on Blockchain UA 2017 in Kiev (https://medium.com/@LevelNetwork/blockchain-ua-2017-kiev-cecce7882de9)

We do not hide behind fictitious names, you can meet with us personally. All project participants are public people. If it is necessary to give more evidence we will provide them to the audience.

LevelNet

Thank you for the response, much appreciated.
full member
Activity: 308
Merit: 100
LevelNet Official
i see hard cap is 55$m . So is the bonus include? If not this coin will have market cap about 70-100$m

The $55 Mln includes all bonuses and discounts.
member
Activity: 92
Merit: 10
i see hard cap is 55$m . So is the bonus include? If not this coin will have market cap about 70-100$m
full member
Activity: 308
Merit: 100
LevelNet Official
Hi guys.

Here’s our assessment of this situation:

Our hunch is that Angel117 is an aggressive former employee, who was removed from the project some time ago. While it would be easiest to discredit this attempt at harming our project as being mere trolling, we don’t want to leave any of our followers in doubt as to our projects merits, or the sincerity of our intentions.

Regarding his accusations towards the project  and the CEO, we believe his main motivation is for revenge (towards the project, the leader and individual people employed in the project). We believe that anything he would say will be aimed at discrediting us.

However, we feel it is important to provide the community with our answers and clarity on the project.

Regarding his statement that it is impossible to implement some functionality in the project means that a person does not have knowledge in the field of development management. We are not aiming to do everything at once, but move gradually from MVP to RTM.

Once again, here are our answers:

1. File Hashing is used to quickly search for KNOWN objects. This is the key to the speed of the algorithm that excludes trusted software from the need of any additional analysis. Detection of the same harmful objects, including those modified with the help of "morphers, cryptors and packers", is carried out through white lists.
2. Reports about malicious objects from LevelNet client applications are not sufficient for making these objects into the category of malware. This decision is made on the intermediate super nodes, the messages from which, in turn, are signed with a security key.
3. The author does not fully understand the principle of the work of LevelNet algorithms on super nodes. Dynamic analysis is not performed either because of the impossibility of automating such a process, or because it is not necessary. In this case, the white list is responsible for filtering.
4. In the speed and efficiency of information dissemination within p2p networks, each user can be convinced by the example of p2p file clients (ala bittorent), allowing to exchange huge amounts of data. The competence of the author in this matter raises special suspicions, in particular, at the expense of unsupported "report can be checked in a few days".
5. LevelNet does not use antivirus software, but only analyzes the reactions of its users.
6. For the functioning of the LevelNet network, there is absolutely no need to collect any personal data. All objects are represented exclusively by their hash-sums, according to which, as is known, it is impossible to restore the contents of the object or its belonging.
7. First, antivirus products do not exchange databases with their competitors. Secondly, the speed of updating the anti-virus database is estimated in hours; they use client-server connection protocols in which client devices do not contact each other, especially client devices with different antivirus products.
8. LevelNet does not perform heuristic analysis and preactive protection for one reason - no need. It is worth reminding the author that LevelNet is not yet another antivirus with all its inherent flaws, such as inefficiency of malware detection algorithms, slowdown of the device, serious resource consumption, etc.


Conclusion: Due to the fact that we are aware of the motive of his messages, we will ignore future communication with him.We adhere to the rule "Do not feed the troll". We ask the audience to pay attention to the character and emotional tone of his posts where accusations and discreditations are going on in each post. We will be grateful to all who can help us back our claims about this user.


We have also compiled a list of additional resources that help support the authenticity of our project:

1.1 We are registered in the jurisdiction of the United States. (https://businesssearch.sos.ca.gov/) in the search field, specify levelnet. Corporate number: C4046746
1.2 We have a registered trademark (https://www.uspto.gov/trademarks-application-process/search-trademark-database) in the search field, specify levelnet. Serial Number:87092110
1.3 We have a registered patent. (https://levelnet.co/files/Provisional%20patent%20confirmation.pdf)
1.4 We are on TechCrunch in SF (https://medium.com/@LevelNetwork/levelnet-techcrunch-disrupt-2017-report-c4b66dea9a69)
1.5 We go through Howey Test to fulfill the requirements of the securities regulator (https://drive.google.com/file/d/0B6khJNq3_ly5dVY2NzlFUkFKLU0/view) Registration is required. It is done so that other ICOs do not copy
1.6 We publish an information memorandum. (https://drive.google.com/file/d/0B9Qwnd-nTBzTMUllUDJyWXdKTlU/view)
1.7 On our advisor board are respected people from the industry from of the valley (levelnet.co)
1.8 We are on Blockchain UA 2017 in Kiev (https://medium.com/@LevelNetwork/blockchain-ua-2017-kiev-cecce7882de9)

We do not hide behind fictitious names, you can meet with us personally. All project participants are public people. If it is necessary to give more evidence we will provide them to the audience.

LevelNet
newbie
Activity: 14
Merit: 0
Hey guys, I just found out about this project. I really like the idea. I am planning to read the whitepaper today. Is the a prototype available?

The idea at first glance may seem interesting, but any security expert will prove to you that this project is meaningless. This project not give any real protection. I gave my arguments above and the managers can not answer them. But they still continue to collect money, which means that this project is a scam.
hero member
Activity: 1274
Merit: 646
LevelNet, I think you have to answer the allegations of fraud. Just completely ignoring does not look good!

yes, answering a question related to a fraud might give a good response to this project. the team who make this project must prove that the project they created is not a fraud. if the campaign manager can answer all about the fraud charges for sure this project will succeed and attract all investors to participate in this project.

Yeah, might be wise to post an official response, might help get people with the campaigns etc.
full member
Activity: 731
Merit: 100
LevelNet, I think you have to answer the allegations of fraud. Just completely ignoring does not look good!

yes, answering a question related to a fraud might give a good response to this project. the team who make this project must prove that the project they created is not a fraud. if the campaign manager can answer all about the fraud charges for sure this project will succeed and attract all investors to participate in this project.
full member
Activity: 378
Merit: 100
LevelNet, I think you have to answer the allegations of fraud. Just completely ignoring does not look good!
full member
Activity: 308
Merit: 100
LevelNet Official
Did you know?

LevelNet provides synergistic protection solutions for consumer and also for corporate sectors.

Learn more on our blog: https://medium.com/@LevelNetwork/the-opportunity-levelnet-conquering-a-fragmented-global-cybersecurity-market-acc6f0479dbe
full member
Activity: 308
Merit: 100
LevelNet Official
I like this project idea very much. I found that this video to be a good place to start learning more about it:https://www.youtube.com/watch?v=t_u2mc7SFBk


Thank you, and yes, you're right it is our most recent one actually!
Pages:
Jump to: