-
Cryptocurrencies
-
Exchanges
-
Media
All languages
Cryptocurrencies
Exchanges
Media
Sentinel Protocol is the most effective platform to help the current cybersecurity ecosystem, especially the cryptocurrency security industry that lacks supervision. Machine learning has proven that preemptive responses to new attack vectors are effective. However, the ambiguity of probability-based threats remains a challenge.
Using the collective wisdom of blockchain, Sentinel Protocol’s blockchain security intelligence platform provides the most effective and reasonable solutions to solve cryptocurrency security problems. Furthermore, the cryptocurrency security industry, which is believed to have high barriers to entry, will soon become a carrier for many security vendors to enter, so the greater positive impact of this convergence is the legal system for many people who are not currently protected to work with cryptocurrency industries such as transactions, payments and wallet companies. “Sentinel Protocol” provides people with the right skills with the opportunity to participate in a new platform for blockchain decentralized security.
Anti-theft system
While more cryptocurrency applications are created every day, no system can verify the integrity of crypto assets. This means that even if the stolen crypto assets can be abused as payment for commercial services, as long as the hacker splits and transfers them. Just like card companies preventing the use of stolen credit/debit cards in the real world, Sentinel Protocol will track all stolen cryptocurrencies and share this information with any crypto service provider. From then on, the stolen cryptocurrency assets will not be used or converted into fiat currency. This protection scheme will put cryptocurrencies under regulatory restrictions.
Abnormal Trading Prevention
Due to the nature of the blockchain, the address registered as a scam and all derived addresses are shared in real time within the Sentinel Protocol community. As long as the Sentinel protocol is applied, further spread of damage can be prevented. One of the applicable uses is that during the ICO, thousands of people participate in a short period of time and the address may be tampered with. Even if a hacker changes the address, all users will automatically receive notifications about the original exception address and the newly changed address. This can revolutionize the security industry paradigm, as there was no solidified platform that could take such behavior before. There is no systematic way to prevent thousands of individual users from receiving attack notifications and prevent all losses that occur simultaneously.
Unknown Threat Protection (User Scenario)
Hacker Malloy uploads a software to a well-known online cryptocurrency community. He made the software undetectable through reputable threat checking sites like VirusTotal or antivirus programs. Dozens of community users, including Alice, have downloaded this seemingly different mining software. (Unfortunately, most users don't know how to check the integrity of the original file via md5, SHA, etc.). Once Guest Malloy notices that his miner (backdoor) is downloaded, he replaces it with a clean, normal file. By then, the first mining software (backdoor) user has been stolen, and all information has been collected by Malloy - the password of the wallet's private key and the credentials for the cryptocurrency exchange have been stolen. However, it is difficult to determine how the system was compromised, as Alice is just an ordinary user and does not have any necessary investigative skills or tools to investigate such cybercrime.
Meanwhile, Bob, a user in the same online community, uses Sentinel Protocol's secure wallet. Bob also downloads damaged mining software. However, the machine learning engine in S-Wallet detects that the file is highly suspicious. The engine blocks the execution even if the file is not marked as a known attack and has not been detected by any antivirus software so far. As long as the file execution is blocked, the corresponding information will be automatically submitted to Sentinel Protocol. Then, a trusted security expert group Sentinels analyzes the source of the threat. This analysis information is registered in the Threat Reputation Database (TRDB) and is reported to the online community where the file was initially discovered. By analyzing the timestamps and uploaders in more detail, Malloy was identified as a hacker. Meanwhile, he will realize that he cannot distribute his mining software elsewhere, as the real-time defense system of the Sentinel Protocol database is used anywhere.
Transaction Tracking (User Scenario)
Hacker Malloy owns a cryptocurrency wallet that has been stolen from many people. Before cashing out, he allocates currency on multiple sub-addresses to avoid tracking. This is possible due to the nature of the cryptocurrency wallet. Alice is one of the victims of Malloy. Once Alice finds her coins have been stolen, she reports them to Sentinel Protocol. Sentinels is a trusted group of security experts who confirm events and register case information into a Threat Reputation Database (TRDB). Sentinel Protocol will automatically track all sub-addresses derived from the registered original address and share them with all encryption services, including exchanges that integrate Sentinel Protocol.
If Malloy tries to trade, the already notified trading system will receive a high priority alert and will cut off any chance of hacker Malloy using theft of currency. Retrieving these cryptocurrencies is not easy for Alice, because if the current judicial system crosses national borders is in Europe and the cryptocurrency exchange is in the United States, it will not help her much. Alice began to actively promote his case and took advantage of Sentinel Protocol, hoping that Sentinel Protocol will have greater influence worldwide. One day, Sentinel Protocol became very influential to replace the complex documentation and legal identity verification needed by Interpol to report hacking.
Report
Users can report suspicious cyber incidents, including malware, hackers, phishing scams and fraud.
Verification
All data reported by the Sentinel portal will be reviewed and verified by our security experts, also known as Sentinels.
Release
Verified data will be published on the blockchain via TRDB, so users can access crowdsourcing information about the latest security threats in real time.
Reward
Reward valuable contributions by reporting threat intelligence data.