Author

Topic: Uncloak: The Cybersecurity on the Blockchain (Read 112 times)

full member
Activity: 448
Merit: 137
Most decentralized platforms pride themselves in the apparent security of the blockchains and their impervious nature to hacking.

However, they do not give the same assurances to the exchanges and the clients that work with the blockchains, due to the centralized nature of these systems.



Is it possible to provide blockchain based solutions to identify and mitigate vulnerabilities on computer systems?

While many virus detection systems exist, there is little or no effort at all to use artificial intelligence and blockchains to provide a holistic security net for corporations.

Uncloak is the exception, and we need to dissect just how they are going about this.

How IoT increases internet vulnerabilities

Are our computers secure?
In fact, what are our computers now, and in the future?

To understand how essential the security of our systems in the future is, we need to understand several things.

The world is becoming one gigantic computer. This is being achieved by the power of the internet combined with the advanced capability to connect almost anything to the internet.

Add decentralized systems to that too.

We now have the emergence of smart cities, smart homes, etc. it is now possible for a car to tell a gate that it has arrived, and for the entrance to automatically open, only for the designated car.

Beds are telling electric kettles, toasters and microwaves to start with the breakfast now that you are awake, and autonomous cars automatically leave the garage and park outside once you lock the front door to go to work.

What can happen if all your devices are hacked? What if your car was driven off the road to a cliff by a cyber-criminal?

Are there clear safeguards out there?

The Current Situation

The main problems with security currently in the cyber world are not viruses.
They are hacking and ransomware.

Most people believe that with updated anti-virus software, enough firewalls and proper intrusion detection software, they are safe from internet-based attacks.

But hackers are crafty people. They have the same software, and they understand the architecture of threat identification and elimination.

So they run rings around security providers and stay miles ahead in the new technology ridden field, costing the world trillions of shillings in data leaks, lost revenues and mitigation costs.

And it is not only money that can be lost. Reputations are at stake too. Hackers have been known to infiltrate devices, acquire private photos or messages and propagate them where most damage will be caused.

The damage can either be immediate or ‘slow burn' due to customer drain and loss of personal or corporate image.

The Uncloak Solution

Vulnerability Scanning
Uncloak will come with the ability to enable clients allow the system to automatically identify their internet footprint, including websites, devices, databases and any other internet data facilities.
They will then scan the customer landscape for any threat that has been identified and mapped onto the blockchain, and where they are found, the community of ‘white hat’ hackers, IT expertsand engineers will work with the client to identify the best remedial actions to take.

This is vulnerability identification and not attack remediation.

It allows the system actually to avert future attacks.

The Bug Bounty Element
Uncloak will operate with a blockchain-unique token called UCC, which shall be availed to users of the platform.
The experts will perform an essential role in threat identification.

Through assessing the client’s systems and devices, the ‘hunters’ will identify threats and broadcast them for validation.

If validators confirm that there are no copies of the same threats on the blockchain, then the hunters will collect 10,000 UCC while the validators will each pocket 1,500 UCC. The UCC can be converted to tradable UNC tokens which can be sold for Eth on public exchanges.

The hunters will also be motivated to identify remedies to deal with imminent attacks.

AI-based Threat detection engine
Now, this is where things get interesting.
There is the internet we know, and then there are the ‘black hat' abodes where evil lurks. It is known as the dark web, and this is where the trade between those who know of various system vulnerabilities and those who need it happen. In exchange for the untraceable cryptocurrency.

What Uncloak will do is institute a listening system backed by their interaction with Krzana™ to build threat landscape reports and use them to occasion customer remedies.

Once threats have been identified, clients will be notified to initiate measures to prevent attacks.

How Uncloak is funded

The Uncloak team is comprised of 13 members and some extra advisers who are experts in two fields, business strategy, and blockchain development.
The CEO was a ‘white hacker’ from when he was 18 years old and is well versed with cyber security having worked in the industry for many years.

The team has bootstrapped most of the pioneering work, ensuring that they have created a test system.

However, they are conducting the UNC token presale from 25th May 2018 for a month.

The sale has a soft cap of $6 million and a hard cap of 21 million. The money thus acquired will assist in the development of the main net, the establishment of the hunting and validation system and the marketing of the system to potential corporate and individual users.

The UNC has a total availability of 4.2 billion, with an initial price of $0.01 and a minimum sale of 10,000 UNC. The massive availability has been explained as a strategy to ensure mass adoption and retention of utility properties without the token becoming a speculative token.

The Uncloak Roadmap.
With the test MVP (Minimum Viable Product) already released and the token sale underway, the platform is now in the later stages of the documented roadmap.
The main milestones that remain include their collaboration with Krzana™ and the launch of the community and strategic relationships.

Final Thoughts
So many technologies, devices and indeed, whole companies are now dependent on the internet and the ever increasing connectivity of devices.
The security of systems and data used to control these devices is of utmost importance to protect both resources and reputations of their owners.

Cybersecurity is not only achieved through the use of proper antivirus software but the capability of avoidance of hacking and such vices as ransomware.

Uncloak has identified distinct technologies to achieve this. Through their vulnerability scanning, bug bounty and threat detection, they are capable of listening to the dark web and alerting clients who have vulnerabilities before attacks can happen.

Their tech is unique in the sense that they will use existing ethical hackers and IT engineers to identify and notify clients of vulnerabilities before they happen.

And they have a test-ready Minimum Viable product, their token is affordable, and their software is easy to use!

Jump to: