Change instantly * ads
Like this video


Securing access of digital identities

REMME is the Distributed Public Key Infrastructure protocol with a set of DApps for Access Management. 65% of confirmed data breaches involve weak, default, or stolen passwords and cybercrime costs the global economy around $400 billion annually. REMME is building the distributed Public Key Infrastructure (PKI) solution, which prevents phishing, server and password breach, and utilize SSL/TLS protocol to protect the entire channel from attack. The REM token powers all operations within the ecosystem including certificate generation, revocation, and rewarding of nodes which safeguard the network.

29 28 expert ratings
View rating distribution
value of tokens sold in ICO
Price in ICO
0.04 USD
preICO start
4th Dec 2017
preICO end
25th Dec 2017
ICO start
13th Feb 2018
ICO end
22nd Feb 2018


The primary means of accessing various local and network resources today is via password, a method that has proven itself as a way of identifying and securing users and resources. However, it has one serious drawback: in the event of a password being stolen, the attacker gains access to all of the account-holder’s data. Moreover, because users often deploy the same password for multiple services, the situation is exacerbated, while weak passwords can be a subject to vocabulary attack. Password databases from a variety of resources periodically fall into open access, exposing hundreds of millions of passwords to hackers.

Even where the affected user has the ability to change their password, their account is still vulnerable, since the user's mailboxes are usually protected by a password that is often the same as that used on other resources. Thus, passwords cannot serve as a sufficient instrument for protecting user data and guaranteeing the security of the user session.

REMME solves the following issues:

  1. Trusting the centralized certification authority (CA)
  2. CA keys being compromised
  3. Fake certificate issuance
  4. Issuance of "hidden" certificates, trying to intercept and redirect connections

This allows complete and transparent control and tracking of all issued certificates, no possibility for issuing "hidden" certificates, and eliminated attempts to intercept and redirect connections.

Various parties (including Google) have tried to solve those issues, but without success. Blockchain systems ensure the immutability of data stored within them, providing an effective and practical solution.

Associated agencies

Alphablockchain Solutions's logo
Alphablockchain Solutions

One-Stop Solution Provider for the ICO Industry

Ambisafe's logo

With Ambisafe you can issue any type of asset on the blockchain in minutes

ICO KYC Report
2 members invited
Alex Momot
Kate Pospelova
Missing or incorrect data? Let us know.

ICOs that might interest you


Decentralized Free Wifi Network Powered By Blockchain.

23 days 16 hours left


Smart Contract Powered Retirement Plans.

Starts in 4 days 6 hours

SafeCrypt is a cryptoexchange platform which is fail-safe by design.

Starts in 2 days 16 hours


VINchain is creating a worldwide blockchain database of used vehicle information that i...

23 days 6 hours left