Уважаемые пользователи Голос!
Сайт доступен в режиме «чтение» до сентября 2020 года. Операции с токенами Golos, Cyber можно проводить, используя альтернативные клиенты или через эксплорер Cyberway. Подробности здесь: https://golos.io/@goloscore/operacii-s-tokenami-golos-cyber-1594822432061
С уважением, команда “Голос”
GOLOS
RU
EN
UA
psalmyblinks
5 лет назад

VECAP: THE SMARTEST WAY TO PROTECT ALL SMART DEVICE IN YOUR SMART HOME

Imagine your home as the average smart home developer has conceptualized:

WHAT BROUGHT THESE CONCEPT

VECAP story began when one of our founders’ home network was hacked and his private information ransomed. He turned off his gaming console and disconnected it from the internet. His data was gone but with that disappearance came a strangely disturbing thought.

The Question is; How many more people had that hacker targeted with the same method?

BRIEF ON VECAP

VECAP is the future to home security and management. Imagine having access to your home in the application of your phone plus it is powered by the block chain technology. It is going to be very convenient.

Nowadays, the issue of information security is relevant not only for computers, household appliances and mobile gadgets. Today, this topic is also closely related to "smart homes". And although modern laptops and smartphones have a fairly good security system, in the case of systems for the computerization of the home, the situation is somewhat different.

VECAP project is a truly unique solution in the Internet of things market that will allow smart homes to realize their full potential.

THE BASIC MISSION AND VISION OF VECAP

VECAP mission and vision can be briefly summarized in 1 simple phrase:

We want to create the „Next generation of smart home and office“. VECAP will focus on making a home and office that think ahead come to life with just a click.

VECAP CHARACTERISTICS OF HACKERS

Listed below are what the hackers collated before hacking the house:

1. Fast break-in
Hackers need less than a minute to gain access to smart devices, from cell phones and TVs to routers and consoles, all devices connected to the Internet. A large number of devices with zero-day vulnerabilities will be hacked once the breach is known before the manufacturer can update any vulnerable smart devices. Short-term thinking about long-term safety is disturbed.

**2. Many entry points **

The average owner of a smart home has multiple smart devices, and one that is protected is not enough to compromise the entire network.

3. Insufficient Protection
Several devices from well-known companies and other vendors have serious breaches in their security systems: insufficient encryption, weak authentication requirements (e.g. auto-login), possibility of external connections via VPN. All it takes is one unprotected device to compromise the security of your smart home. Hackers only need to find that one breaking point to bring down your whole network

PROBLEMS

Every time we hear from media sources how convenient, practical and simplifies our lives, and also saves our time, do we think at the moment how safe it is? As it turned out, in pursuit of profit, the developers of IOT sensors missed one small detail, as the safety of the sensors themselves and the network formed by them.

This vulnerability has become an excellent ground for profit, such harmful and unpleasant people as hackers. It was they who hacked the poorly protected network of IOT sensors of one of the founders of today’s project and stole personal data without his knowledge. After the incident, this man asked himself the main question: “And how many more victims like himself?” As it turned out, there are many of them and no one can help them protect their devices. Moreover, with the growth and popularization of the IOT technology users are becoming more and more potential victims of scams too.

Therefore, in order not to bring the situation to a critical point, the team of specialists began to actively seek solutions, considering all the existing technologies and methods that allow people to protect their IOT sensors. So the project was born – VECAP.

SOLUTION

VECAP will manufacture adapters to connect certified third-party devices. The adapter allows tighter integration of smart objects at home through the Blockchain ecosystem, so all intelligent devices can work together.

VECAP will protects all home and smart office devices by integrating them into a distributed network. Transactions between IOT blockchain devices are stored in a smart contract. A hypothetical hacker owns more than 51% of the network to hack certain devices, and completing this task is nearly impossible: all data sets block the IOT duplicated on millions of devices in tens of thousands of smart homes and offices. VECAP certified devices are automatically added to the Blockchain ecosystem so that they can interact with each other directly or through the VECAP Smart Home and Smart Office Central modules.

PROJECT FEATURES

VECAP combines modern technologies of smart contracts and blockchains, on their basis to provide protection for all devices with loT sensors and Internet access, as well as to protect each person’s confidential data. The idea is not new, but this project has its own individual characteristics.

VECAP is inherently one of the few projects that came to the aid of people, ready to solve the existing problems. And in order to understand the essence of this system, I suggest considering a small example.

VECAP REVOLUTION IN IOT SECURITY

Don’t worry, VECAP solution is as ambitious as it is simple. We’ll use smart contract transactions to secure all internal communications within your home system. Every action on the VECAP platform will be recorded on our blockchain, in an immutable database that is nearly impervious to corruption. A hacker would have to take control of 51% of such network just to control a specific device, rendering this effort impossible by every definition of the word.

By protecting the links between each device and uniting all smart homes in a decentralize network, VECAP safeguards all private information against malicious actors. We have reached a new privacy-protecting standard, one that does not rely on built-in security functions.

THE DISTRIBUTION OF VECAP TOKEN

VECAP ICO DETAIL AND ECOSYSTEM

VECAP As you have already understood at any decentralized network there is a system of transactions and a way of payment of those or other services. Vecap will also use its internal token to perform all of its internal operations. For this purpose, the developers intend to release 1 billion coins. All in all, the founder’s team to launch and further develop their platform intend to assemble the Hard Cap in the amount of 72 million US dollar.

THE DISTRIBUTION OF VECAP TOKEN

The distribution of tokens is as follows:

IN CONCLUSION

The concept of the project is simple and does not cause any difficulties, so VECAP is a very ambitious project that, as smart houses spread, gets high chances to be the first and only means to protect them. Moreover, its presence there where there are IoT sensors is very important, because its main purpose is to protect any Internet device and your personal data associated with them. And due to the progressive growth in this industry, such tools are very much needed, so VECAP has every chance to become the number one in its segment.

For further inquiries learn all the necessary information on this project please follow the link listed:

DETAILED INFORMATION :

Website : https://en.vecap.io

Whitepaper : https://vecap.io/uploads/2019/01/VeCap_Whitepaper.pdf

ANN : https://bitcointalk.org/index.php?topic=5093270

Facebook : https://www.facebook.com/vecap.io

Twitter : https://twitter.com/Vecap_io

Medium : https://medium.com/vecap-next-generation-of-smart-home

Reddit : https://www.reddit.com/user/Vecap_io

Linkedin : https://www.linkedin.com/company/vecap-io/about

Telegram : https://t.me/vecap

Profile link: https://bitcointalk.org/index.php?action=profile;u=2522636

Ethereum Address: 0x8cdb3c1607847b16db3b9666518179b7f0465440

Bitcointalk username: psalmyblinks

0
0.241 GOLOS
На Golos с March 2019
Комментарии (0)
Сортировать по:
Сначала старые