Like this video

REMME

Securing access of digital identities

REMME is the Distributed Public Key Infrastructure protocol with a set of DApps for Access Management. 65% of confirmed data breaches involve weak, default, or stolen passwords and cybercrime costs the global economy around $400 billion annually. REMME is building the distributed Public Key Infrastructure (PKI) solution, which prevents phishing, server and password breach, and utilize SSL/TLS protocol to protect the entire channel from attack. The REM token powers all operations within the ecosystem including certificate generation, revocation, and rewarding of nodes which safeguard the network.

4.4
30 29 expert ratings
Benchy 4.1
Experts
4.5
4.5
4.2
View rating distribution
~$20,000,000
value of tokens sold in ICO
Ended
Token
REM
Price in ICO
0.04 USD
preICO start
4th Dec 2017
preICO end
25th Dec 2017
ICO start
13th Feb 2018
ICO end
22nd Feb 2018
Report

About REMME

The primary means of accessing various local and network resources today is via password, a method that has proven itself as a way of identifying and securing users and resources. However, it has one serious drawback: in the event of a password being stolen, the attacker gains access to all of the account-holder’s data. Moreover, because users often deploy the same password for multiple services, the situation is exacerbated, while weak passwords can be a subject to vocabulary attack. Password databases from a variety of resources periodically fall into open access, exposing hundreds of millions of passwords to hackers.

Even where the affected user has the ability to change their password, their account is still vulnerable, since the user's mailboxes are usually protected by a password that is often the same as that used on other resources. Thus, passwords cannot serve as a sufficient instrument for protecting user data and guaranteeing the security of the user session.

REMME solves the following issues:

  1. Trusting the centralized certification authority (CA)
  2. CA keys being compromised
  3. Fake certificate issuance
  4. Issuance of "hidden" certificates, trying to intercept and redirect connections

This allows complete and transparent control and tracking of all issued certificates, no possibility for issuing "hidden" certificates, and eliminated attempts to intercept and redirect connections.

Various parties (including Google) have tried to solve those issues, but without success. Blockchain systems ensure the immutability of data stored within them, providing an effective and practical solution.

Associated agencies

Alphablockchain Solutions's logo
Alphablockchain Solutions

One-Stop Solution Provider for the ICO Industry

Ambisafe's logo
Ambisafe

With Ambisafe you can issue any type of asset on the blockchain in minutes

MaZee Community Management's logo
MaZee Community Management

MaZee, your team of experienced ICO community managers and marketing experts.

Weraise's logo
Weraise

Mature marketing solutions in a wild, wild blockchain world

Bookmark
ICO KYC Report
2 members invited
Alex Momot
Passed
Kate Pospelova
Passed
Missing or incorrect data? Let us know.

ICOs that might interest you

DateCoin

Highly liquid utility token with price rise mechanics implemented, secured by the growi...

9 days 13 hours left

Verasity

Verasity is a next-generation video sharing platform designed to liberate creators and ...

Starts in 14 hours

Marginless

Marginless is revolutionizing betting platform. Face to face betting, industry-leading ...

10 days 23 hours left

MoneyToken

With MoneyToken, there’s no reason to sell your BTC when you need cash or stable curr...

16 days 13 hours left