The primary means of accessing various local and network resources today is via password, a method that has proven itself as a way of identifying and securing users and resources. However, it has one serious drawback: in the event of a password being stolen, the attacker gains access to all of the account-holder’s data. Moreover, because users often deploy the same password for multiple services, the situation is exacerbated, while weak passwords can be a subject to vocabulary attack. Password databases from a variety of resources periodically fall into open access, exposing hundreds of millions of passwords to hackers.
Even where the affected user has the ability to change their password, their account is still vulnerable, since the user's mailboxes are usually protected by a password that is often the same as that used on other resources. Thus, passwords cannot serve as a sufficient instrument for protecting user data and guaranteeing the security of the user session.
REMME solves the following issues:
This allows complete and transparent control and tracking of all issued certificates, no possibility for issuing "hidden" certificates, and eliminated attempts to intercept and redirect connections.
Various parties (including Google) have tried to solve those issues, but without success. Blockchain systems ensure the immutability of data stored within them, providing an effective and practical solution.
- Powered by Blockchain. A distributed database is safe from hack attacks.
- No certificate center.
- Blockchains and Sidechains. The REMME system can be used with a number of different blockchains and sidechains. It is possible to choose the most convenient combination for company.
- Control the identity.
- Smooth User Experience. Users can forget about filling out forms, or long sophisticated passwords. From now on, authentication with just one click is as easy, as it is secure.
- Instant registration. User personal information will be put on blockchain instantly.
- 2FA Based on the app a user already has. REMME uses bots developed for the most popular messenger apps. Instead of traditional text messages and OTP codes, users get an authentication token sent via the messenger app of their choice.
- Multiple accounts. One user can register with an unlimited number of accounts, that is have numerous SSL-certificates. Anytime during login, they can choose which account to use.
Idea growth and concept validation
Q4, 2015
MVP #1
2016
MVP #2
Q2 2017
Public Pre-sale
Q3 2017
Public Sale
Q4 2017
REMME Core public alpha
Q1, 2018
Releasing DApps on top of REMME Core
Q2, 2018
Public Testing
Q3, 2018
Public beta release
Q4, 2018
Q1, 2019
Verified 0%
Attention. There is a risk that unverified members are not actually members of the team
Verified 0%
Attention. There is a risk that unverified members are not actually members of the team
REMME wants to use blockchain technology to create a secure, password-free future. The company’s crowdsale for REM tokens is underway throughout Q1 2018.
This offer is based solely on information provided by the offeror and other publicly available sources.
The token sale or exchange event is completely independent of ICOholder. ICOholder is not involved in any way, including technical support or promotion.
We list token sales from entities with which we have no relationship to help users track overall activity within the token sector. This information is not intended as advice, and you should seek professional or specialist guidance or conduct your own due diligence before making any decisions based on our content.
Any terms and conditions regarding token acquisition are solely between contributors and the token issuer. ICOholder is not the seller of these tokens.
ICOholder is not legally responsible for any representations made by third parties about any token sale. Any claims for breach of contract must be directed against the listed token issuing entity.
If you have concerns about the nature, legality, or propriety of a token sale or the involved individuals, please contact info@icoholder.com with detailed information.