REMME is the basis of your security

in #cybersecurity6 years ago

What do you think about when heare word “Security?” Maybe you thinking about your family, maybe your house is coming on your mind or maybe you thinking about your protection during car drive - about safety belt. Also - someone thinking about himself/herself pocket or precious things. All this thing need to be in safe - this is true. But one kind of security is a special needed to be safe - protection of your identity, parol’s, protection of the key’s which give access for your’s private information. Just read this statistic:

In the past year 2 in 5 people
Receive a notice that their personal information had been compromised
Had an account hacked
Had a password stolen

Often, the reasone of this exident’s is that nearly 3 out of 4 consumers use duplicate passwords, many of which have not been changed in five years or more (It’s mean - people change password last time, when Obama’s Second Term Begins). Unsurprisingly, about 40 percent of those surveyed say they had “a security incident” in the past year, meaning they had an account hacked, password stolen, or were given notice that their personal information had been compromised.

Long time we were trying different methods for self protection. Some of them - ridiculous, some - to expensive, and some of them - lost their relevance. But one of the way of protection and secure is superlative, even - perfect (let me say this). REMember this five letter’s: REMME

What benefit’s of REMME?

  1. REMME do not give the chance for human error - because password’s no need. There is no centralized database of certificates and keys that could be compromised.
  2. There are no technology lockin and API limitations. Easy integration with
    existing systems.
  3. There are no additional fees for different certificates/credentials in
    different CA.
  4. There are no possibilities for collusion between software/hardware vendors and limited count of CAs.
  5. Fast and protected public key distribution process.
  6. Fast and protected certificate revocation process.
  7. Single point of trust for different systems: easy single-sign-on
    implementation, decentralized worldwide available authorization.
  8. There are no legal limitations and government cooperation issues.

A long time neathing is not changes in security sphere, but this time is come - REMME is come! REMME use an experience of past for creation future - which available right now. Why we need evolution in access way’s? Because hacker’s and cheater’s also do not stay at the one place - they create new and new mechanism for stoling your data and need to be say - they have a partial succsess. There is 5 method’s (not all possible) what they use:

  1. Email phishing. This is one of the oldest, and successful hacking techniques. Perpetrators send out mass emails that appear to be an authentic communication from a bank, subscription service or online payment site. The email tells the recipients to verify their account information by clicking on a special link. Once people click the link and supply their login information, the hackers are able to divert money away from the account.

  2. Buffer Overflow. Buffer overflow techniques are used by more sophisticated hackers who are able to gain access to customer data via online forms. The hacker navigates to an online form and proceeds to provide excessive data in a form field.

  3. Password Hacking. The use of overly simple passwords and/or not changing the password that came with your computer, modem or Wi-Fi router is one of the easiest ways you can prevent this type of hacking. There are websites that provide default usernames and passwords for various models of routers, so it’s simply a matter of trial and error for a motivated hacker to discover which router your company is using, and then type in the default password. Change all default passwords when you acquire new equipment and software, and train your team to change network passwords on a regular basis.

  4. Downloading Free Software

  5. Fault Injection

My advise: STOP the discovering of this hacker’s method’s and START use REMME. You don’t need care youself anymore - leave it for REMME.

For learning more about REMME:

visit official website https://remme.io/
read White paper: https://drive.google.com/file/d/0B1jTRGmj_3khUV9RTERnYzNvaE0/view

Join on social media:

Twitter: https://twitter.com/remme_io
Facebook: https://www.facebook.com/remme.io/
Telegram:
Reddit:
Medium:
LinkedIn:

Sort:  

@starship1, I gave you an upvote on your first post! Please give me a follow and I will give you a follow in return!

Please also take a moment to read this post regarding bad behavior on Steemit.

Congratulations @starship1! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 1 year!

You can view your badges on your Steem Board and compare to others on the Steem Ranking

Vote for @Steemitboard as a witness to get one more award and increased upvotes!

Coin Marketplace

STEEM 0.29
TRX 0.12
JST 0.033
BTC 63793.53
ETH 3193.21
USDT 1.00
SBD 3.92