SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Komodo’s
Blockchain
Security Service
Security is the foundation of every single blockchain.
Without adequate security, a blockchain project cannot thrive. Any
project built atop an unsturdy foundation can be brought to collapse
at any moment.
Fortunately, there is an easy solution. Komodo’s Blockchain Security
Service protects every integrated blockchain with the power of the
Bitcoin network, for a tiny fraction of the cost.
https://komodoplatform.com/
A Brief History of 51% Attacks
Until the beginning of 2018, the notion of a 51% attack was merely a
theoretical problem.
While Satoshi Nakamoto noted in the original Bitcoin white paper
that a Proof of Work (PoW) blockchain is only reliable “as long as
honest nodes control the network,” not a single 51% attack had been
successfully executed.
All of that changed in the spring of 2018. A wave of successful attacks
over the last 12 months has proved that the threat is very real.
Below is an overview of all the 51% attacks that have occurred in the
blockchain space since April 2018.
Project Date Loss
Verge (XVG) 			 April 4, 2018		 ~$1.1 Million
Monacoin (MONA) 			 May 14, 2018		 ~$90,000
Verge (XVG) 				 May 22, 2018		 ~$1.75 Million
Bitcoin Gold (BTG)				 May 29, 2018		 ~$18 Million
ZenCash (ZEN)				 June 2, 2018		 ~$550,000
That’s 10 successful 51% attacks for a total of more than $23 Million in
losses, with an average loss of $2.5 Million per attack.
Litecoin Cash (LCC) 			 June 4, 2018 		 Unknown
Flo Blockchain (FLO) 			 Sept 8, 2018		 ~$27,5000
Aurum Coin (AU) 			 Nov 8, 2018		 ~$500,000
Vertcoin (VTC)				 Dec 2, 2018		 ~$100,000
Ethereum Classic (ETC) 			 Jan 7, 2019		 ~$1.1 Million
Blockchain Vulnerability
10 successful 51% attacks
caused more than
$23 Million
in losses to blockchain projects.
The unfortunate reality is that many blockchains are extremely
vulnerable. With hash power rental sites like NiceHash, attackers
don’t even need to make a costly investment in hardware to carry
out a 51% attack. Sufficient hash power can be rented anonymously
online.
To make matters worse, the cost of renting adequate hashpower to
execute a 51% attack is staggeringly low. Dozens of projects can be
attacked for just a few hundred dollars an hour.
For these reasons, blockchain attacks are becoming more and more
common. Since April 2018, there have been 10 confirmed 51% attacks.
The average financial loss from one attack is more than $2.5 Million—
and that only accounts for the value of the stolen coins.
In addition to direct financial losses, a successful 51% attack causes a
number of other immeasurable losses an attack causes, such as:
•	 being delisted from exchanges
•	 a surge of negative press coverage
•	 reduced confidence in the blockchain
•	 a substantial reduction in the price of the currency
•	 decreased likelihood of future investment
A successful attack is a catastrophic event for any blockchain project.
Komodo’s Blockchain Security Service
Mitigate The Risk Of 51% Attacks
51% attacks are becoming more and more common. In 2018 alone, 10 separate attacks led
to more than $23 Million in losses. It’s crucial to protect your blockchain and your investors.
Outsource Security & Focus On Development
The constant threat of a 51% attack can be a major distraction for many blockchain startups.
Outsource your security to Komodo so you can focus on development.
Recycle The Power Of The Bitcoin Network
Komodo’s delayed Proof of Work (dPoW) mechanism recycles the hash rate of the Bitcoin
network, protecting every integrated chain with BTC-level security for a fraction of the price.
An Industry-Wide Security Solution
Komodo’sBlockchainSecurityServiceisavailabletoanyUTXO-basedblockchain,regardless
of the consensus mechanism and hashing algorithm. It’s an industry-wide solution.
Get
Bitcoin-level security
with Komodo’s
Blockchain Security Service.
Six blockchain projects have already adopted Komodo’s
Blockchain Security Service.
A Growing Security Alliance
Einsteinium network experienced a real 51% attack.
Komodo dPoW, that we implemented in our code
recently, kicked in and protected the chain. We are
very pleased that this solution worked well and that
Einsteinium chain is protected from any attacks in the
future.
-- Einsteinium Foundation
“ “
In addition, CoinBene, one of the world’s biggest digital
asset exchanges, officially endorses Komodo’s Blockchain
Security Service as the industry’s leading security solution.
Komodo’s Blockchain Security Service is powered by the innovative delayed
Proof of Work (dPoW) security mechanism. A global network of 64 dedicated
Notary Nodes perform a series of cross-chain notarizations to protect every
integrated blockchain with the power of the Bitcoin hash rate.
Your blockchain’s network still determines the truth of your blockchain.
Komodo’s Blockchain Security Service simply makes that truth immutable.
An Extra Layer Of Security
After the notarization from your blockchain to KMD is complete, you receive an added
layer of security. Attackers cannot re-org any blocks that were mined prior to the
notarization, uinless they first overpower the KMD network and alter the block hash
that was notarized onto the KMD ledger.
Notarization From Your Chain To KMD
The block hash of a block in your blockchain is saved onto the KMD chain by executing
a transaction and using the OP_RETURN command. This occurs every 10 minutes.
Notarization from KMD To BTC
The block hash of a block in the KMD blockchain is notarized onto the BTC ledger. This
also occurrs roughly every ten minutes.
Bitcoin-Level Security For All
Once a notarization to the Bitcoin ledger is complete, all blocks and transactions that
occurred prior to the most recently-notarized block receive Bitcoin-level security. To
succesfully execute a 51% attack, a hacker would need to overpower your blockchain’s
native network, the KMD network, and the BTC network— all at the same time.
Constant Protection
Since this series of cross-chain notarizations takes place every 10 minutes, your
blockchain is constantly protected. There is never an opportunity for an attack.
A Decentralized Security Solution
Komodo’s Blockchain Security Service uses a global, publicly-elected network of 64
Notary Nodes. Each of these dedicated servers runs a full node of your blockchain,
increasing the hash rate and decentralization of your network. At the same time,
Notary Nodes have no special powers or control of your blockchain. They simply take
the verified history of your blockchain’s ledger and make it completely immutable.
Delayed Proof of Work (dPoW) Security
https://komodoplatform.com/
Secure Your Blockchain
With Komodo’s
Blockchain
Security Service.
Ifyou’dliketoprotectyourblockchainwiththe
power of the BTC network, get integrated to
Komodo’s Blockchain Security Service today.
Contact marketing@komodoplatform.com to
begin the process.
Outsourcesecuritysoyoucanfocusonmaking
your project a success.

Contenu connexe

Tendances

Transaction speed
Transaction speedTransaction speed
Transaction speedOliviaJune1
 
How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional? How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional? 101 Blockchains
 
Blockchain Fundamentals for Beginners - 101 Blockchains
Blockchain Fundamentals for Beginners - 101 BlockchainsBlockchain Fundamentals for Beginners - 101 Blockchains
Blockchain Fundamentals for Beginners - 101 Blockchains101 Blockchains Academy
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity gppcpa
 
Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?ITU
 
Smart Contracts Basics - Silicon Valley Insurance Accelerator Blockchain Boot...
Smart Contracts Basics - Silicon Valley Insurance Accelerator Blockchain Boot...Smart Contracts Basics - Silicon Valley Insurance Accelerator Blockchain Boot...
Smart Contracts Basics - Silicon Valley Insurance Accelerator Blockchain Boot...🔗Audrey Chaing
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsDr. Nikolaus Lipusch
 
The Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityThe Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityKevin Cedeño, CISM, CISA
 
The Blockchain, Bitcoin and other Cryptocurrencies
The Blockchain, Bitcoin and other CryptocurrenciesThe Blockchain, Bitcoin and other Cryptocurrencies
The Blockchain, Bitcoin and other CryptocurrenciesApondi Kevin Omondi
 
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...Edureka!
 
What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?101 Blockchains
 
Blockchain Tokenization
Blockchain TokenizationBlockchain Tokenization
Blockchain TokenizationBellaj Badr
 
Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017🔗Audrey Chaing
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018🔗Audrey Chaing
 

Tendances (20)

Transaction speed
Transaction speedTransaction speed
Transaction speed
 
How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional? How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional?
 
Blockchain Fundamentals for Beginners - 101 Blockchains
Blockchain Fundamentals for Beginners - 101 BlockchainsBlockchain Fundamentals for Beginners - 101 Blockchains
Blockchain Fundamentals for Beginners - 101 Blockchains
 
Basic blockchain
Basic blockchainBasic blockchain
Basic blockchain
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?Blockchain and Security : A Virtuous Circle?
Blockchain and Security : A Virtuous Circle?
 
1. ibm blockchain explained
1. ibm blockchain explained1. ibm blockchain explained
1. ibm blockchain explained
 
Smart Contracts Basics - Silicon Valley Insurance Accelerator Blockchain Boot...
Smart Contracts Basics - Silicon Valley Insurance Accelerator Blockchain Boot...Smart Contracts Basics - Silicon Valley Insurance Accelerator Blockchain Boot...
Smart Contracts Basics - Silicon Valley Insurance Accelerator Blockchain Boot...
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
 
The Blockchain and the Future of Cybersecurity
The Blockchain and the Future of CybersecurityThe Blockchain and the Future of Cybersecurity
The Blockchain and the Future of Cybersecurity
 
The Blockchain, Bitcoin and other Cryptocurrencies
The Blockchain, Bitcoin and other CryptocurrenciesThe Blockchain, Bitcoin and other Cryptocurrencies
The Blockchain, Bitcoin and other Cryptocurrencies
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?
 
Blockchain Tokenization
Blockchain TokenizationBlockchain Tokenization
Blockchain Tokenization
 
Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
Blockchain Projects - Core Pillars of Shipping Product, Feb 2018
 

Similaire à Komodo Blockchain Security Service Brochure

Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationDr. Mohamed Torky
 
2019 blockchain economy
2019 blockchain economy2019 blockchain economy
2019 blockchain economyHeung-No Lee
 
Komodo 2018-year-end-report-final
Komodo 2018-year-end-report-finalKomodo 2018-year-end-report-final
Komodo 2018-year-end-report-finalJean-Phi N✅
 
Is quantum computing an existential threat to blockchain technology
Is quantum computing an existential threat to blockchain technology Is quantum computing an existential threat to blockchain technology
Is quantum computing an existential threat to blockchain technology Blockchain Council
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET Journal
 
Blockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBlockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBogdan Fiedur
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & EthereumBlockchainHub Graz
 
Is Your Blockchain Secure?
Is Your Blockchain Secure?Is Your Blockchain Secure?
Is Your Blockchain Secure?InvestingTips
 
Cybersecurity Challenges in Blockchain Technology By Azgari Lipshy
Cybersecurity Challenges in Blockchain Technology By Azgari LipshyCybersecurity Challenges in Blockchain Technology By Azgari Lipshy
Cybersecurity Challenges in Blockchain Technology By Azgari LipshyAzgari Lipshy
 
Blockchain an introduction_n_li
Blockchain an introduction_n_liBlockchain an introduction_n_li
Blockchain an introduction_n_linikinew1
 
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. ParisGLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Pariseraser Juan José Calderón
 
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFDEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFGokul Alex
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyhellygeorge
 
CLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKS
CLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKSCLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKS
CLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKSSteven Rhyner
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?Blockchain Council
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computingkumar641
 
BITCOIN STARTUP BLOCKCHAIN RELEASES CODE FOR ‘THUNDER’ PAYMENT CHANNEL TECH
BITCOIN STARTUP BLOCKCHAIN RELEASES CODE FOR ‘THUNDER’ PAYMENT CHANNEL TECHBITCOIN STARTUP BLOCKCHAIN RELEASES CODE FOR ‘THUNDER’ PAYMENT CHANNEL TECH
BITCOIN STARTUP BLOCKCHAIN RELEASES CODE FOR ‘THUNDER’ PAYMENT CHANNEL TECHSteven Rhyner
 

Similaire à Komodo Blockchain Security Service Brochure (20)

Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
 
2019 blockchain economy
2019 blockchain economy2019 blockchain economy
2019 blockchain economy
 
Blockchaintech
BlockchaintechBlockchaintech
Blockchaintech
 
Komodo 2018-year-end-report-final
Komodo 2018-year-end-report-finalKomodo 2018-year-end-report-final
Komodo 2018-year-end-report-final
 
Is quantum computing an existential threat to blockchain technology
Is quantum computing an existential threat to blockchain technology Is quantum computing an existential threat to blockchain technology
Is quantum computing an existential threat to blockchain technology
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
 
Blockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOsBlockchain, bitcoin, ethereum and ICOs
Blockchain, bitcoin, ethereum and ICOs
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & Ethereum
 
Is Your Blockchain Secure?
Is Your Blockchain Secure?Is Your Blockchain Secure?
Is Your Blockchain Secure?
 
Cybersecurity Challenges in Blockchain Technology By Azgari Lipshy
Cybersecurity Challenges in Blockchain Technology By Azgari LipshyCybersecurity Challenges in Blockchain Technology By Azgari Lipshy
Cybersecurity Challenges in Blockchain Technology By Azgari Lipshy
 
Blockchain an introduction_n_li
Blockchain an introduction_n_liBlockchain an introduction_n_li
Blockchain an introduction_n_li
 
An Introduction to Blockchains
An Introduction to BlockchainsAn Introduction to Blockchains
An Introduction to Blockchains
 
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. ParisGLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
GLOSSARY. Blockchain : practices and perspectives. 17 Mayo. Paris
 
Blockchain
BlockchainBlockchain
Blockchain
 
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFDEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
CLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKS
CLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKSCLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKS
CLOUD MINING VS TRADITIONAL MINING: HOW TO MINIMIZE RISKS
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computing
 
BITCOIN STARTUP BLOCKCHAIN RELEASES CODE FOR ‘THUNDER’ PAYMENT CHANNEL TECH
BITCOIN STARTUP BLOCKCHAIN RELEASES CODE FOR ‘THUNDER’ PAYMENT CHANNEL TECHBITCOIN STARTUP BLOCKCHAIN RELEASES CODE FOR ‘THUNDER’ PAYMENT CHANNEL TECH
BITCOIN STARTUP BLOCKCHAIN RELEASES CODE FOR ‘THUNDER’ PAYMENT CHANNEL TECH
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Komodo Blockchain Security Service Brochure

  • 1. Komodo’s Blockchain Security Service Security is the foundation of every single blockchain. Without adequate security, a blockchain project cannot thrive. Any project built atop an unsturdy foundation can be brought to collapse at any moment. Fortunately, there is an easy solution. Komodo’s Blockchain Security Service protects every integrated blockchain with the power of the Bitcoin network, for a tiny fraction of the cost. https://komodoplatform.com/
  • 2. A Brief History of 51% Attacks Until the beginning of 2018, the notion of a 51% attack was merely a theoretical problem. While Satoshi Nakamoto noted in the original Bitcoin white paper that a Proof of Work (PoW) blockchain is only reliable “as long as honest nodes control the network,” not a single 51% attack had been successfully executed. All of that changed in the spring of 2018. A wave of successful attacks over the last 12 months has proved that the threat is very real. Below is an overview of all the 51% attacks that have occurred in the blockchain space since April 2018. Project Date Loss Verge (XVG) April 4, 2018 ~$1.1 Million Monacoin (MONA) May 14, 2018 ~$90,000 Verge (XVG) May 22, 2018 ~$1.75 Million Bitcoin Gold (BTG) May 29, 2018 ~$18 Million ZenCash (ZEN) June 2, 2018 ~$550,000 That’s 10 successful 51% attacks for a total of more than $23 Million in losses, with an average loss of $2.5 Million per attack. Litecoin Cash (LCC) June 4, 2018 Unknown Flo Blockchain (FLO) Sept 8, 2018 ~$27,5000 Aurum Coin (AU) Nov 8, 2018 ~$500,000 Vertcoin (VTC) Dec 2, 2018 ~$100,000 Ethereum Classic (ETC) Jan 7, 2019 ~$1.1 Million
  • 3. Blockchain Vulnerability 10 successful 51% attacks caused more than $23 Million in losses to blockchain projects. The unfortunate reality is that many blockchains are extremely vulnerable. With hash power rental sites like NiceHash, attackers don’t even need to make a costly investment in hardware to carry out a 51% attack. Sufficient hash power can be rented anonymously online. To make matters worse, the cost of renting adequate hashpower to execute a 51% attack is staggeringly low. Dozens of projects can be attacked for just a few hundred dollars an hour. For these reasons, blockchain attacks are becoming more and more common. Since April 2018, there have been 10 confirmed 51% attacks. The average financial loss from one attack is more than $2.5 Million— and that only accounts for the value of the stolen coins. In addition to direct financial losses, a successful 51% attack causes a number of other immeasurable losses an attack causes, such as: • being delisted from exchanges • a surge of negative press coverage • reduced confidence in the blockchain • a substantial reduction in the price of the currency • decreased likelihood of future investment A successful attack is a catastrophic event for any blockchain project.
  • 4. Komodo’s Blockchain Security Service Mitigate The Risk Of 51% Attacks 51% attacks are becoming more and more common. In 2018 alone, 10 separate attacks led to more than $23 Million in losses. It’s crucial to protect your blockchain and your investors. Outsource Security & Focus On Development The constant threat of a 51% attack can be a major distraction for many blockchain startups. Outsource your security to Komodo so you can focus on development. Recycle The Power Of The Bitcoin Network Komodo’s delayed Proof of Work (dPoW) mechanism recycles the hash rate of the Bitcoin network, protecting every integrated chain with BTC-level security for a fraction of the price. An Industry-Wide Security Solution Komodo’sBlockchainSecurityServiceisavailabletoanyUTXO-basedblockchain,regardless of the consensus mechanism and hashing algorithm. It’s an industry-wide solution. Get Bitcoin-level security with Komodo’s Blockchain Security Service.
  • 5. Six blockchain projects have already adopted Komodo’s Blockchain Security Service. A Growing Security Alliance Einsteinium network experienced a real 51% attack. Komodo dPoW, that we implemented in our code recently, kicked in and protected the chain. We are very pleased that this solution worked well and that Einsteinium chain is protected from any attacks in the future. -- Einsteinium Foundation “ “ In addition, CoinBene, one of the world’s biggest digital asset exchanges, officially endorses Komodo’s Blockchain Security Service as the industry’s leading security solution.
  • 6. Komodo’s Blockchain Security Service is powered by the innovative delayed Proof of Work (dPoW) security mechanism. A global network of 64 dedicated Notary Nodes perform a series of cross-chain notarizations to protect every integrated blockchain with the power of the Bitcoin hash rate. Your blockchain’s network still determines the truth of your blockchain. Komodo’s Blockchain Security Service simply makes that truth immutable. An Extra Layer Of Security After the notarization from your blockchain to KMD is complete, you receive an added layer of security. Attackers cannot re-org any blocks that were mined prior to the notarization, uinless they first overpower the KMD network and alter the block hash that was notarized onto the KMD ledger. Notarization From Your Chain To KMD The block hash of a block in your blockchain is saved onto the KMD chain by executing a transaction and using the OP_RETURN command. This occurs every 10 minutes. Notarization from KMD To BTC The block hash of a block in the KMD blockchain is notarized onto the BTC ledger. This also occurrs roughly every ten minutes. Bitcoin-Level Security For All Once a notarization to the Bitcoin ledger is complete, all blocks and transactions that occurred prior to the most recently-notarized block receive Bitcoin-level security. To succesfully execute a 51% attack, a hacker would need to overpower your blockchain’s native network, the KMD network, and the BTC network— all at the same time. Constant Protection Since this series of cross-chain notarizations takes place every 10 minutes, your blockchain is constantly protected. There is never an opportunity for an attack. A Decentralized Security Solution Komodo’s Blockchain Security Service uses a global, publicly-elected network of 64 Notary Nodes. Each of these dedicated servers runs a full node of your blockchain, increasing the hash rate and decentralization of your network. At the same time, Notary Nodes have no special powers or control of your blockchain. They simply take the verified history of your blockchain’s ledger and make it completely immutable. Delayed Proof of Work (dPoW) Security
  • 7. https://komodoplatform.com/ Secure Your Blockchain With Komodo’s Blockchain Security Service. Ifyou’dliketoprotectyourblockchainwiththe power of the BTC network, get integrated to Komodo’s Blockchain Security Service today. Contact marketing@komodoplatform.com to begin the process. Outsourcesecuritysoyoucanfocusonmaking your project a success.