
REMME is the Distributed Public Key Infrastructure protocol with a set of DApps for Access Management. 65% of confirmed data breaches involve weak, default, or stolen passwords and cybercrime costs the global economy around $400 billion annually. REMME is building the distributed Public Key Infrastructure (PKI) solution, which prevents phishing, server and password breach, and utilize SSL/TLS protocol to protect the entire channel from attack. The REM token powers all operations within the ecosystem including certificate generation, revocation, and rewarding of nodes which safeguard the network.
- ABOUT
- TEAM
- MILESTONE
About REMME
The primary means of accessing various local and network resources today is via password, a method that has proven itself as a way of identifying and securing users and resources. However, it has one serious drawback: in the event of a password being stolen, the attacker gains access to all of the account-holder’s data. Moreover, because users often deploy the same password for multiple services, the situation is exacerbated, while weak passwords can be a subject to vocabulary attack. Password databases from a variety of resources periodically fall into open access, exposing hundreds of millions of passwords to hackers.
Even where the affected user has the ability to change their password, their account is still vulnerable, since the user's mailboxes are usually protected by a password that is often the same as that used on other resources. Thus, passwords cannot serve as a sufficient instrument for protecting user data and guaranteeing the security of the user session.
REMME solves the following issues:
- Trusting the centralized certification authority (CA)
- CA keys being compromised
- Fake certificate issuance
- Issuance of "hidden" certificates, trying to intercept and redirect connections
This allows complete and transparent control and tracking of all issued certificates, no possibility for issuing "hidden" certificates, and eliminated attempts to intercept and redirect connections.
Various parties (including Google) have tried to solve those issues, but without success. Blockchain systems ensure the immutability of data stored within them, providing an effective and practical solution.
ICO Date
Start Date (Pre)
End Date (Pre)
Start Date
13 Feb 2018
End Date
22 Feb 2018
Token Info
Country
Symbol
REM
Platform
Ethereum
Type
ERC-20
Price in ICO
1 REM = 0.04 USD
Bonus
"Pre-sale 20%
Public sale days 1-3 10%
Public sale days 4-7 5%"
Public sale days 1-3 10%
Public sale days 4-7 5%"
Tokens for sale
500,000,000 REM
MVP/Prototype
None
Bounty
None
KYC
None
Whitelist
None
Investment Info
Soft cap
480,000 USD (pre-sale)
Hard cap
20,000,000 USD (including $3M pre-sale)
Accepting
ETH, BTC
Distributed in ICO
50%

REMME is the Distributed Public Key Infrastructure protocol with a set of DApps for Access Management. 65% of confirmed data breaches involve weak, default, or stolen passwords and cybercrime costs the global economy around $400 billion annually. REMME is building the distributed Public Key Infrastructure (PKI) solution, which prevents phishing, server and password breach, and utilize SSL/TLS protocol to protect the entire channel from attack. The REM token powers all operations within the ecosystem including certificate generation, revocation, and rewarding of nodes which safeguard the network.
- ABOUT
- TEAM
- MILESTONE
About REMME
The primary means of accessing various local and network resources today is via password, a method that has proven itself as a way of identifying and securing users and resources. However, it has one serious drawback: in the event of a password being stolen, the attacker gains access to all of the account-holder’s data. Moreover, because users often deploy the same password for multiple services, the situation is exacerbated, while weak passwords can be a subject to vocabulary attack. Password databases from a variety of resources periodically fall into open access, exposing hundreds of millions of passwords to hackers.
Even where the affected user has the ability to change their password, their account is still vulnerable, since the user's mailboxes are usually protected by a password that is often the same as that used on other resources. Thus, passwords cannot serve as a sufficient instrument for protecting user data and guaranteeing the security of the user session.
REMME solves the following issues:
- Trusting the centralized certification authority (CA)
- CA keys being compromised
- Fake certificate issuance
- Issuance of "hidden" certificates, trying to intercept and redirect connections
This allows complete and transparent control and tracking of all issued certificates, no possibility for issuing "hidden" certificates, and eliminated attempts to intercept and redirect connections.
Various parties (including Google) have tried to solve those issues, but without success. Blockchain systems ensure the immutability of data stored within them, providing an effective and practical solution.
ICO Date
Start Date (Pre)
End Date (Pre)
Start Date
13 Feb 2018
End Date
22 Feb 2018
Token Info
Country
Symbol
REM
Platform
Ethereum
Type
ERC-20
Price in ICO
1 REM = 0.04 USD
Bonus
"Pre-sale 20%
Public sale days 1-3 10%
Public sale days 4-7 5%"
Public sale days 1-3 10%
Public sale days 4-7 5%"
Tokens for sale
500,000,000 REM
MVP/Prototype
None
Bounty
None
KYC
None
Whitelist
None
Investment Info
Soft cap
480,000 USD (pre-sale)
Hard cap
20,000,000 USD (including $3M pre-sale)
Accepting
ETH, BTC
Distributed in ICO
50%