Author

Topic: ICO Dashboard | Convinient and Safe Solution for Your TokenSale (Read 178 times)

brand new
Activity: 0
Merit: 0
Can you tell us what experience your team has, what projects did you complete successfully? Now do you have any projects?

You can find out more about our projects in "Portfolio" section of merklion.com
OK snx
newbie
Activity: 82
Merit: 0
Oh, it looks like I know about you, did you help Arbidex?

You're right. Arbidex is one of the recent projects.
They scored a HardCap, worthy.
full member
Activity: 334
Merit: 102
Can you tell us what experience your team has, what projects did you complete successfully? Now do you have any projects?

You can find out more about our projects in "Portfolio" section of merklion.com
full member
Activity: 334
Merit: 102
Oh, it looks like I know about you, did you help Arbidex?

You're right. Arbidex is one of the recent projects.
full member
Activity: 334
Merit: 102
It would be cool if you had a link to your website in main post.

Thanks for the comment, now it's okay  Wink
newbie
Activity: 10
Merit: 0
Oh, it looks like I know about you, did you help Arbidex?
newbie
Activity: 116
Merit: 0
It would be cool if you had a link to your website in main post.
full member
Activity: 334
Merit: 102
full member
Activity: 334
Merit: 102




Outstanding Security | Full encryption of transferred and stored data to keep it safe.

High-load Proof | We know that your ICO is going to be big & we are ready to handle it.

Pay As You Go | Flexible subscription options to fit your needs & budget.

Stunning UI/UX | Well-thought design that is incredibly user friendly & comfortable.

Platform Stability | We are make sure that not a single lead or payment gets lost.

Multicurrency Support | Accept payments in various currencies so more people get involved.





• The ERC20 smart contract for your task.

• Registration forms & whitelists.

• Reception of documents and storage in encrypted form / KYC.

• Multicurrency wallet.

• Admin Panel.

• Filtering access options by countries.

• A customizable system with optional microservices.

• A modular server architecture based on Amazon Web Services.





We care about your security over all three directions: data storage, data transfer & business logic.





The system data is stored in several subsystems:

Object storage. Used to store user data that is downloadable.

For example: photos, scans of documents. Each file is encrypted with a documents. Each file is encrypted with a cryptographic key (AES, 128/256 bits).

Database (DBMS). Used to store application data and registration user data.

For example: the user profile. Encryption is implemented at the level Encryption is implemented at the level of the disk subsystem of the operating of the disk subsystem of the operating system.



Network segmentation. Used to manage network availability between system nodes and traffic filtering. Thus, we seal the critical subsystems from the whole world.

For instance, an intruder can not attack For instance, an intruder can not attack the Internet database server as the the Internet database server as the particular server itself does not have particular server itself does not have an Internet connection and is an Internet connection and is accessible only to servers with the accessible only to servers with the application installed.

CDN (Content Delivery Network). Used for the following tasks: parasitic traffic filtration, DDoS attacks such as «SYN floods» and «UDP reflection».

Caches responses from the Caches responses from the applications and distributing static applications and distributing static application files. This dramatically application files. This dramatically increases the requirements for the increases the requirements for the intensity of DDoS attacks.
 
WAF (Web Application Firewall). Implemented to filter the HTTP traffic to the application. Using a database of rules and templates, WAF cuts off all requests containing malicious code.

For instance, an intruder tries to find a For instance, an intruder tries to find a vulnerability such as «SQL injection», vulnerability such as «SQL injection», the WAF detects a SQL code in the WAF detects a SQL code in the HTTP request and blocks it.

Traffic encryption (TLS). Used between all nodes of the system during the data exchange.

For instance: web applications, For instance: web applications, network storage, DBMS.





At the application level, a variety of IS practices are used,including the following:

CSRF tokens for protecting web forms

Data sanitization and validation (XSS protection)

CAPTCHA for protection against automatic registration by robots

Brute-force password attacks protection

MFA via SMS / Telegram

One-time links for logging in

Security HTTP headers

Password Policies


Serverless

The approach allows to avoid long-term lease of expensive servers and to maintain the peak loads. For example, in such a microservice a user registration form can be issued, this will help to deal with occasional burst loads. Serverless applications have three main benefits.

No server management

Flexible scaling

Automated high availability


Application Cluster Mode

By running several instances of the application and configuring an automatic balancing of requests, we get a fault-tolerant and scalable installation of the system in the result. In this way, denial-of-service attacks are partially closed. Also, the number of nodes in the system can be increased any time to serve the increased load and a DDoS attack.  





•Telegram: @ilyakrupin | E-mail: [email protected]
Jump to: