No more passwords with Remme


Remme is the newest Ukrainian project, working on the Blockchain technologies. The developers promise to bring the protection of user data to a whole new level.

According to the latest data, the number of active Internet of Things (IoT) devices reached 20 billion this year. This makes constant contact with the network an integral part of everyday human life. Due to the fact that the authentication system in our progressive time is still based on the "login-password" bundle, each account can be susceptible to hacking. Hackers improve their skills and tools as quickly as defense systems develop. A fundamentally new model for protecting user data is offered by specialists from Remme company.

Remme’s new solutions for user data protection

To ensure the maximum level of data protection, the developers used latest blockchain technology achievements. 

Within the framework, provided to users, every device is assigned its own SSL certificate. The unique certificates data is stored in a common database, running on the basis of the blockchain distributed network technology. The automatic authentication system checks all certificates, which eliminates the possibility of a digital signature forgery.

In other words, this decision deprives hackers of potential victims. The decentralized system excludes the possibility of losing user data. Hackers will need to access all the data cells simultaneously, and this is impossible because of the distribution of information over the blockchain network.

The Remme project’s main advantages

With the introduction of a unique digital signature system that can be used to create password-free access to your devices and accounts, Remme offers new possibilities for controlling your data.

The main directions for using the Remme system are:

  1. Full data confidentiality provided a fundamentally new approach to the preservation of the user data. You no longer need to think out and remember passwords — all you need is an Remme account, equipped with all the digital signatures necessary for the authentication process.
  2. Free integration with application management services. The effective configuration of two-factor authentication.
  3. The common interface of the system allows you to control and manage the release or assignment of security certificates.

The threats that the Remme system fights effectively

Thanks to its multifunctionality and free integration with many platforms and application interfaces, Remme can save users from a lot of problems with the security of personal data and optimize the authentication process for multiple accounts simultaneously.

Among the threats that are eliminated with the integration of the Remme system are the following:

  • Fishing attacks. It should be noted,  that 90% of modern user account hacking is the result of fishing attacks. Thanks to the distributed database and reliable operation of the algorithm of digital certificate generation, phishing attacks are absolutely inconclusive for Remme users.
  • Hacking using the overload of incoming traffic, the so-called "brute force". Due to automatic and consistent verification of digital signatures, hacking user accounts by the usual selection of combinations of logins and passwords is not possible.
  • Direct hacking of the application interface or devices. The database takes into account only genuine digital signatures, therefore it will not work with other requisites or using any "workarounds".
  • The selection of keys or passwords is also impossible since the automatic system takes into account not only the login-password bundle but also the unique digital signature and the SSL certificate.
  • Direct server hacking is also unavailable since all information is stored in a distributed database. In order to gain access to the account, attackers will have to access at once to several blocks of data simultaneously.
  • Hacking via re-using the recovery of personal access keys.

If the target device is lost, recovery is possible using two-factor authentication through another device connected via the same Remme system. In this case, the lost device is completely blocked in order to stop attempts of breaking.

Prospects for the future development of the project

Given all the advantages of the platform, Remme provides users with the highest level of data security. Thanks to the revolutionary verification system and the automatic assignment of personal certificates, the Remme authentication system can be freely integrated into personal devices and applications, ensuring complete confidentiality of the stored data. Digital SSL certificates, effective work of the PKI protocol, convenient and fast registration process guarantee flexibility of use and quite fast growth of the audience.

Links to the project below:

Site - https://remme.io/
Twitter - https://twitter.com/remme_io
Facebook - https://www.facebook.com/remme.io/
Telegram - https://t.me/remme
ANN BitcoinTalk - https://bitcointalk.org/index.php?topic=2060387.0
Bounty BitcoinTalk - https://bitcointalk.org/index.php?topic=3611368.0
WhitePaper - https://drive.google.com/file/d/0B1jTRGmj_3khUV9RTERnYzNvaE0/view 

The article was written - ligerti
https://bitcointalk.org/index.php?action=profile;u=1334883
0x1f572e8Afbe379f57356ABA64A9d0D85E367B222   

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now
Logo
Center