"A total of 50.5 million tokens will be available
Post# of 82672
"The Company will issue its tokens (called BSAFE) on the Ethereum blockchain at a price of $1 each."
IF, and there are no guarantees, Blockchain Tech ICO goes as planned $50.5M could potentially be raised.
The following table represents the distribution of tokens -
Amount of BSAFEs
Total Supply 100 million (100 %)
Seed round 2 million (1.5 %)
Pre-ICO 15 million (15 %)
Bounties 3 million (3 %)
Team/ Advisers / Other contributors 20 million (20%)
ICO 50 million (50.5 %)
Reserve 10 million (10 %)
I would like to see how the seed round goes. That should indicate how Blocksafe Tech shoukd do moving forward.
I like that Blocksafe Tech will not just be MT, ProtectID and GID. It appears the sub. will be a full service security software company.
"Our solution involves two parts – (1) Blockchain Security Agent that is located between a dApp and a JSON-RPC client such as the Ethereum client, and (2) Blockchain Security Cloud Service.
Block Chain Security Agent
The Blockchain Security Agent performs number of functions –
● Blockchain Firewall - It acts as a blockchain firewall, shielding the clients on the blockchain network. It examines the traffic flowing between the dApp and the Ethereum network and allows messages that meet the policies of the organization.
● Authentication - It parses a JSON-RPC message and extracts the user’s account identifier and sends it to the Cloud software to authenticate the user. If the user successfully authenticates themselves, the JSON-RPC message is passed to the blockchain, otherwise it is blocked.
● Policy Enforcement - It acts as a Policy Enforcement Point and allows for granular access. It implements the access policies of the consortium or the enterprise. It enforces user roles and capabilities. The user roles and capabilities are defined in the Cloud software. For example, a user initiates a transaction that requires sending a message to a smart contract on the blockchain. The user is first authenticated then the user’s role is checked against the policy and if the user is allowed to send the message, it is forwarded to the blockchain, otherwise it is blocked.
● Load Balancer - It acts as a load balancer to spread the traffic among the Ethereum clients.
● DDoS mitigation – It mitigates DDoS attacks.
Blockchain Security Cloud Service
The Blockchain Security Cloud Service has the following capabilities –
● Two factor authentication – Multiple methods are supported including - Out-of- Band Phone Number, PIN, OTP, and/or Voice, OTP Delivery to Phone via SMS, Voice, Email, and/or Push, Out-of-Band Push – Accept/Deny, PIN, and/or Fingerprint, Hard Tokens – Key Fob, USB Key, and/or Wallet Cards, Mobile Tokens – iOS and Android, Desktop Tokens – Windows, OS X & MacOS, and/or Linux.
● Policy Server – The Policy Server stores the user access policies for the blockchain. It defines user roles and maps the roles to capabilities.
● Rules Engine – The Rules Engine stores rules that will be used by the Agent software to enforce access. For example, a rule might be to invoke two factor authentication if the transaction is over a certain amount.
We will sell this solution to enterprises, government and consortia that are implementing private blockchains. We expect that this market will grow significantly in the future and due to having a first mover advantage we will be positioned to be a major player in the blockchain security marketplace.
Wallet Security
Wallets are vulnerable to malware that can capture the user’s login credentials via keylogging and screen capture. Anti-Virus software tries to detect the malware using signatures and advanced heuristics. But as discussed earlier, they are oftenineffective.
Rather than trying to identify malware, we take a radical approach. We assume that malware exists on your device and prevent the malware from doing its job – keylogging, screen capture, clipboard spying, web cam spying, microphone spying, etc.
The solution suite comprises desktop software (PC/Mac) and a mobile app (iOS/Android). The desktop software and mobile app prevent the actions of malware.
Desktop software
The desktop software will have the following features –
Keystroke Protection – Traditional keystroke data flows through a series of steps before it appears on your monitor. Hidden in these steps is an area of vulnerability where cyber criminals try to take advantage using keylogging spyware. This feature bypasses the places keyloggers can reside, helping to eliminate your vulnerability to attack. A kernel component takes control of the keyboard at the lowest possible layer in the kernel. The keystrokes are then secured and sent to the application via an “Out-of-Band” channel bypassing the messaging queue.
Anti-Screen Capture – This feature prevents screen scraping malware from taking screenshots of your information surreptitiously.
Cryptographic Integrity monitoring – This feature constantly monitors the keyboard device driver stack to detect un-trusted drivers (which could potentially be keyloggers). If an un-trusted driver is discovered, it warns the user. It also checks if cryptographic services provided by the OS are operating properly.
Anti-Clickjacking - Clickjacking is a vulnerability that is exploited by hackers to load malware. Our desktop software prevents this from happening.
Trusted Platform Module (TPM) integration – The TPM chip is used to generate cryptographic keys.
All the above features currently exist. The planned enhancements are –
Mouse Capture Prevention - Malware monitors mouse clicks. We will prevent this from happening.
Clipboard Capture prevention - Malware monitors the clipboard to spy on copy and paste. We will prevent thisfrom happening.
Webcam Capture prevention - Malware monitors the webcam to spy on the user. We will prevent this from happening.
Microphone Capture prevention - Malware monitors the microphone to spy on the user. We will prevent this from happening.
The above four features are currently in development.
Defense against ransomware
Ransomware has been growing rapidly and is now one of the major threats. We are researching novel techniques to defend against this threat and expect to deploy our solution initially on the Windows platform.
Self-healing capability
This consists of ensuring memory and system integrity by periodically checking and removing malware changes automatically. This capability will initially be available on the Windows platform.
Mobile app
The mobile app will have the following features – Password Vault –
Strong Password Generator - This useful feature creates strong passwords based on user-defined preferences, and then stores the strong passwords in the password vault for future usage.
ProtectID® Soft Token - One-Time-Password (OTP) Generator for the industry leading ProtectID authentication platform. Features “one touch” user enrollment.
Support for other OATH compliant Soft Tokens – One-Time-Password Generator for third party OATH compliant soft tokens, such as the Google Authenticator. The provisioning is either manual or via a QR code.
Encrypted Database – Enables the storing of notes and other data in user defined fields in an encrypted database. This is accessible via the Password Vault which allows the user to create custom data fields.
Secure Keypad – Mobile OS’s such as iOS log keystrokes to help in auto-completion. These keystrokes are stored in databases that can be accessed by rogue applications.
The Password Vault enables the secure storage of user credentials
required to access websites or corporate networks. The credentials are stored in
encrypted form. The user can also launch the website into a Secure Browser protected
by a Secure Keyboard.
In addition, malware may be able to capture the keystrokes entered on the default soft keyboard.
The Secure Keypad is a custom keypad that provides secure input by encrypting keystrokes and preventing the mobile OS from logging the keystrokes.
Secure Browser – The Secure Browser is a custom secure locked-down browser that prevents the storage of cookies and other malware artifacts. The secure environment is reset for every browser session.
All the above features currently exist. The planned enhancements are – Screen capture protection for mobile devices
This capability is currently present on the Windows desktop version and we want to extend it to mobile devices.
The following figure shows our secure keyboard protecting mobile wallets – Wallet authentication"
I love the white paper. I will love, even more when they put everything together and show deals relating to this new way of doing business by getting in the drivers seat and becoming a full service software company.
I believe if Blocksafe Tech just gets $25-$30M, this will be enough to hire the staff required to market, implement and service new clients. Keeping in mind that Kay is not the CEO, and I can only hope that Chris Henry is aggressive on every front.
SFOR will have to, soon, disclose the lisencing agreement between the two companies. In this agreement, I personally would love to see Kay get upfront monies $3-$5M for R&D and support followed by royalties. This is crucial to see in my book to show that SFOR shareholders are being kept in mind.
I'm also waiting for ACS deals.
GLTA
IMO