Relictum Pro Solutins VS hackerโ€™s attaks.

Relictum Pro
3 min readMar 31, 2020

--

๐Ÿ“ Although developers constantly process incoming data and update software, this is not always enough to secure the blockchain network from targeted hacking. According to statistics, in most cases, the reason for the loss of funds is the negligence of users. Five popular ways to hack a blockchain network:
โ €โ €1. ๐—ง๐˜†๐—ฝ๐—ผ๐˜€๐—พ๐˜‚๐—ฎ๐˜๐˜๐—ถ๐—ป๐—ด โ€” The method consists in replacing a domain name close to the original one belonging to the existing exchange. Fraudsters not only gain full access to the wallets of mistaken users, but also earn on advertising displayed on the site.
โ €โ €2. ๐—ฆ๐˜†๐—ฏ๐—ถ๐—น ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ โ€” The reception is similar to the symptoms of the personality disorder disease: due to the action of the algorithms, the hacker fills the network with a huge number of fake nodes, causing a system crash. In this case, the attacker gains control over the operations carried out within the network.
โ €โ €3. ๐Ÿฑ๐Ÿญ% ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ โ€” as a result of hacker actions, control is obtained over more than 50% of the computing power of the blockchain network. This gives fraudsters the right to create controlled blocks, obtain coins and manage online activities.
โ €โ €4. ๐—ฅ๐—ผ๐˜‚๐˜๐—ถ๐—ป๐—ด ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ โ€” The user must remember that in the blockchain there are 3 nodes responsible for conducting financial transactions, and this is only 60% of transactions. Hackers are left to take over the remaining interest in order to gain access to the personal data of users.
โ €โ €5. ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ โ€” Suspicious links, spam in the mail, unverified sites and downloaded files โ€” this can lead to infection of the computer, after which the hacker gets access to the userโ€™s personal data.
โ €
โ €โ €๐—ฅ๐—ฒ๐—น๐—ถ๐—ฐ๐˜๐˜‚๐—บ ๐—ฃ๐—ฟ๐—ผ ๐—ฆ๐—ผ๐—น๐˜‚๐˜๐—ถ๐—ผ๐—ป๐˜€
โ €
๐Ÿ”— ๐—ฆ๐—ผ๐—น๐˜ƒ๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—ฝ๐—ฟ๐—ผ๐—ฏ๐—น๐—ฒ๐—บ ๐—ผ๐—ณ ๐Ÿฑ๐Ÿญ% ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐—ฎ๐—ป๐—ฑ ๐—ผ๐˜๐—ต๐—ฒ๐—ฟ ๐—ฎ๐—บ๐—ฏ๐—ถ๐—ด๐˜‚๐—ถ๐˜๐—ถ๐—ฒ๐˜€. After a single node makes a decision, the network is updated and another main node is selected โ€” dynamic change every second. This excludes various kinds of ambiguities โ€” collisions, double spending, and other things. There are no standard consensus principles. The more nodes are in the network, the better is the performance. This is achieved by the unique architecture of ๐—ฃ๐—ฟ๐—ผ๐—ผ๐—ณ ๐—ผ๐—ณ ๐—ง๐˜€๐—ฎ๐—ฟ and the organization of the virtual circuit switching network.
โ €
๐Ÿ”ต ๐—ฅ๐—ฒ๐—น๐—ถ๐—ฐ๐˜๐˜‚๐—บ ๐—ฃ๐—ฟ๐—ผ biometric facial recognition system
A personโ€™s hash is taken, in conjunction with SecureCall โ€” the confirmation of a transaction with a phone call. During a call, the user enters a password using a DTMF signal along with the following solutions:
โ–ช๏ธ After a successful transaction, the private key loses its relevance, and the client is inevitably obliged to generate a new key (or this is done automatically);
โ–ช๏ธ The public hash from the concatenation hash [Token + passphrase] or [Token + random text] in binary form is recorded in the smart contract chain.
โ–ช๏ธ It is possible to use 2 short keys with a sequential check, after checking the 1st key (regardless of the result of the check), it is proposed to enter the second key. The mechanism assumes, after the 1st check, to output a string that is the hash of the 2nd key, which means a hacker will need to pick up the 2nd key without knowing. To prevent hacking, it is possible to limit the number of attempts.

๐Ÿฎ Website: https://relictum.pro

โ €
#Blockchain #relictcoin #tech #relictumpro #fintech #Crypto #blockchain5 #technology #techno #relictum #relictumblockchain #DistributedLedgerTechnology #Blockchaintechnology #DLT #blockchainfifthgeneration #relictumcommunity #community

--

--

Relictum Pro
Relictum Pro

Written by Relictum Pro

Relictum Pro is a blockchain of the latest generation. #Blockchain 5.0

No responses yet