At a GlanceSentinel Protocol can be described as security intelligence platform for blockchain (SIPB), this includes a wide variety of security features, from anti-theft, malformed transaction prevention, unknown threat prevention, transaction traceability etc. The protocol collects hacking reports, which are then delegated to "The Sentinels", a group of trusted security experts, who confirms the incident and registers the case information to the Threat Reputation Databse (TRDB). The Sentinels are rewarded for participation under the Delegated Proof of Stake (DPOS) model with Sentinel Points (SP), which can later be redeemed for its native currency UPP. Sentinel Protocol also introduces their own S-wallet, a secure wallet with built in machine learning AI, Fraud Detection System (FDS) and built-in security features such as filtering scam addresses and detecting abnormal behavior, leveraging TRDB for always up-to-date threat definitions. Sentinel Protocol utilizes the strength of decentralized and distributed computing, running extensive tests and simulations in their D-Sandbox (Distributed Malware Sandboxing) environment, effectively cutting cost down compared to the traditional expensive dedicated virtual machine environments. Sentinel Protocol can be integrated seamlessly to any client wallets and exchanges, leveraging its collective intelligence to protect users from malicious threats.
Key Security FeaturesThreat Reputation Database (TRDB)
Those who have used anti-virus softwares for the internet should be familiar with definition files, each commercial virus scanners maintain their own virus/threat database and end-users need to update on a periodic basis for the latest definition. These databases are not only centralized making them more vulnerable to manipulate but more importantly never complete as vendors lack any incentive to collaborate. Sentinel Protocol aims to create a global alliance for threat information exchange, with built-in incentives for each vendor to contribute to the TRDB.
Machine Learning Engine Integrated Security Wallet (S-Wallet)
Sentinel Protocol's secure wallet (S-wallet) is similar to an "antivirus enabled wallet", leveraging collective intelligence harvested by the community and security experts pooled in the TRDB. S-wallets can detect suspicious executions, these can be in the form of blacklisted wallet addresses, scam sites or fradulent activities detected by their Fraud Detection System(FDS), driven by their proprietary machine learning engine. S-wallet also analyzes the threat tendency and history to proactively respond to unknown threats (known as zero-day attacks) that traditional antivirus softwares can't do before the next software update. This is an AI driven engine, continuously learning from the client side Sentinel Wallet to create model behaviors.
Let's create a use case to see how this might work in real life. Say you're about to participate in an ICO, and ICOs these days come with scams by default. There's a telegram DM popped up on your phone, with a contribution address that will expire in 3 min, it's been a busy day that you're not keeping up with the latest update and you are about to FOMO in.
Now when you enter the contribution address into your S-wallet, ready to send the transaction, the send button suddenly turns red with (13 SCAMS REPORTED), you know S-wallet just saved your hard earned(?) ETH.
Distributed Malware Analysis Sandbox (D-Sandbox)
D-Sandbox is similar to traditional sandbox, a test environment (virtual machines) to run unverified programs. In D-Sandbox environment (decentralized nodes), potential threats are submitted and analyzed thoroughly via collective intelligence, at significantly lower costs of computing resources and infinitely scalable.
Real Hacks, Real SolutionsThe Sentinel Protocol team has written a wonderful article examining the recent NEM hack, or more precisely Coincheck exchange hack, a massive 523 million NEM coins compromised. The article can be found here So what is the solution to NEM hack and its kind?
'Security' is a big topic, let's examine a few high profile hacks to understand what Sentinel Protocol is capable of and what it isn't.
The Mt.Gox Hack
In 2011, some hacker breached into Mt. Gox auditor's computer and used it to transfer a huge amount of bitcoins to themselves, which were later sold on Mt. Gox itself. This created a huge strain on the market that caused a major crash.
If Fraud Detection System (FDS) was installed to monitor and detect abnormal behavior, it would've been initiated to notify the exchange to take immediate actions to mitigate the hack, eg. halting trades from this specific address to prevent further damages to the order book.
In 2014, Mt.Gox was robbed a whopping $473 million from transaction malleability attack. This protocol level vulnerability isn't something Sentinel Protocols can help prevent, it is more of a system level design security while Sentinels Protocol is an added layer of security.
There are other examples, like the DAO hack caused by recursive requests called on a poorly designed function, or multi-sig vulnerability hack in both Bitfinex and Parity. These type of 'security' issues can't be fixed or prevented by Sentinel Protocol, but during adnormal events, Sentinel Protocol can at the very least alert the affected parties.
TeamThe Sentinel Protocol team is stacked with cyber security talents, a connection was apparently made through the company Darktrace that several team members including the founder/CEO worked for. Darktrace is an AI company for cyber security with 620 employees in 32 offices, specializing in machine learning algorithms to detect and respond to cyber-threats across diverse digital environments. We can also see traces of other industry leading cyber security firms including Palo Alto Networks, F5 Networks and Penta Security Systems. The team has complete relevant work history, experiences, as well as established industry connections for the Sentinel Protocol project.
The name Uppsala is named after an old capital of Sweden, where the founder Patrick Kim and co-founder HM Park stayed and conducted some study over blockchain focusing on lightning consensus algorithm, the idea of Sentinel Protocol was also drafted there.
CompanyName: UPPSALA PTE. LTD.
Status: LIVE COMPANY
Address: 6 EU TONG SEN STREET #09-12 THE CENTRAL SINGAPORE 059817
TeamPatrick Kim (Founder and CEO) | LinkedIn Profile
HM Park (Co-founder / Head of Operations) | LinkedIn Profile
John Kirch (Chief Evangelist) | LinkedIn Profile
Dayeol Lee (Senior Researcher and Engineer) | LinkedIn Profile
Michael Zhou (Head of Threat Intelligence) | LinkedIn Profile
Narong Chong (Head of Security Operations) | LinkedIn Profile
Guo Feng (Core Development) | LinkedIn Profile
Minwoo Ku (Head of Product) | LinkedIn Profile
Karly Choi (Head of Marketing) | LinkedIn Profile
GithubDue to the security nature of this project, code will be published to certain extent only, repository not yet available.
Product & ServiceNot yet
Additional InfoToken Allocation
- 30.7% Early Contributor
- 29.3% Public
- 15% Upsala
- 15% Business
- 8% Reserved
- 2% Advisors
Use of Proceeds
- 15% of initial UPP will be reserved for Uppsala Foundation
- 15% of initial UPP will be reserved for business development, development funds, legal funds, advisory incentives, other organizational activities requiring funds, etc.
- 2% of initial UPP will be reserved for advisory incentives
- 8% of initial UPP will be reserved for any unforeseen business activities