home link https://sentinelprotocol.io/
센티넬 프로토콜은 보안 지능형 플랫폼입니다. 합의 알고리즘과 인센티브 보상 시스템이 적용된 블록체인 위에 크라우드 소스 기반 위협 정보 데이터베이스를 구축하는 것을 목표로 합니다. 화이트 해커로 이루어진 센티넬의 보안 전문가들은 현재 사이버 공간을 보안 위협으로부터 안전한 공간으로 만드는 것을 목표로하고 있습니다.
Founder & CEO
Head of Operations
Head of Business
Sentinel Protocol Announces...
Singapore, 7 August, 2019 — We are excited to announce that Sentinel Protocol has a new strategic partnership with Hexlant, a leading Korean blockchain technology, and service laboratory.Hexlant provides a blockchain wallet service that supports the largest variety of blockchain nodes in Korea through its self-developed modular cryptocurrency node.Sentinel Protocol and Hexlant’s collaboration aims to develop new solutions through the integration of Sentinel Protocol’s crypto Anti Money-Laundering/ Combating the Financing of Terrorism (AML/CFT) technology into the Hexlant Node, including the Threat Reputation Database (TRDB), Crypto Analysis Transaction Visualization (CATV) and Crypto Analysis Risk Assessment (CARA)*. Together, Sentinel Protocol and Hexlant will cooperate in expanding the crypto-security market for businesses based on their strategic partnership agreement.“We are pleased to co-establish Sentinel Protocol’s security enhancement service on the Hexlant Node. Hexlant has already established 12 nodes and succeeded in commercializing them in the South Korea market through the subscription-based business model,” said Koo Min-woo, Country Manager of Sentinel Protocol, Korea. He also mentioned: “We plan to provide cooperative security solutions service to 15 existing customers of Hexlant first and continue to expand cooperation between our two companies in the financial business.”“The most important part of blockchain finance is the security of corporate crypto wallets, which will be applied not only to companies but also to investors in the future. We believe that the introduction of Sentinel Protocol`s anti-money laundering technology will enhance transparency in the market, including monitoring suspicious transactions and managing blacklist accounts, said Park In-soo, Chief Security Officer of Hexlant.*Crypto Analysis Risk Assessment (CARA)* CARA is an intuitive solution to classify a crypto address risk level using machine learning algorithms that continuously learn behaviors exhibited by known malicious wallets and normal wallets. This solution complies with a Risk-Based Approach (RBA) recommended by the FATF, and it can help users to proactively determine which transactions are suspected of money laundering and terrorist financing.About Sentinel ProtocolSentinel Protocol (https://sentinelprotocol.io/) is the world’s first crowd-sourced threat intelligence platform utilizing the advantages of decentralization to protect cyberspace with blockchain security. It aims to equip individuals and organizations with cybersecurity solutions that help protect their valuable cryptocurrency assets from malicious threats, attacks, and fraudulent transactions. Sentinel Protocol is headquartered in Singapore and has offices in Seoul, South Korea, and Tokyo, Japan. Follow Sentinel Protocol on Telegram, LinkedIn, Twitter, Facebook, and Medium.About HexlantHexlant (https://www.hexlant.com/) is the most experienced Korean blockchain laboratory. A former Samsung server and security architect, operation developer, and service designer together established Hexlant. Hexlant has been running a blockchain platform with around 50,000 members since it was founded in February 2018. Hexlant also has since supported more than 30 teams all around the world. Just within six months of its launch, Hexlant’s service ‘Tokenbank’ reached 15 billion won of fundraising, storing more than 120 billion won worth of EOS tokens through its airdrop service. Also, Hexlant provides blockchain education to famous Korean institutions and companies such as FastCampus and SK Planet, along with publishing Blockchain research reports on Bithumb, one of Korea’s best-known cryptocurrency exchanges.Sentinel Protocol Announces a Strategic Partnership with Hexlant was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 08. 07
How Decentralized Cybersecu...
How Decentralized Cybersecurity Can Support Governments in Fight Against Terrorism and Money LaunderingThings have been getting heated in the cryptocurrency space lately. On the week of July 16, U.S. Treasury Secretary Steven Mnuchin called Facebook’s planned cryptocurrency, Libra, a “national security issue”, thinking that it can be used to facilitate illegal activities such as drug dealing and terrorism.However, we don’t believe cryptocurrencies are doomed and that cooler heads will eventually prevail. First, let’s take a look at how cryptocurrencies are being used by criminals, and how anti-money laundering (AML) and counter-terrorism financing (CTF) laws have been expanded to include digital currencies. Then, we’ll discuss how blockchain’s traceability and decentralization can actually help combat (rather than facilitate) illegal activity.How Money Launderers and Terrorists Use Digital CurrenciesCriminals use mixers and tumblers to split up, scramble, and reassemble their crypto funds into different wallets and exchanges, where they repeatedly trade with several altcoins. They do this to obfuscate the origin of their digital funds and cover their tracks.Many cryptocurrency exchanges are unregulated without any KYC, making cryptocurrencies attractive to criminals. Some of these unregulated exchanges in jurisdictions with lax KYC/AML laws can be used even without mixers or tumblers. In fact, these unregulated exchanges receive 36 times more Bitcoin from money launderers than regulated exchanges.However, many criminals don’t understand that blockchains and their immutability make it easy to trace the origin and destination of their digital funds. Some have already gotten caught by law enforcement agencies, who actively monitor darknets (e.g. Silk Road) and peer-to-peer markets (e.g. Local Bitcoins) to catch people breaking the law using crypto transactions.The Latest on AML and CTF RegulationsIndeed, governments around the world are increasingly cracking down on cryptocurrencies. Every country has reacted in a different manner. Some have outright banned crypto. Others have levied strict AML laws on any crypto exchanges or custodial services. Increasingly fewer jurisdictions remain lax.Some exchanges and custodial services recently realized they can’t battle governments forever on this. Last September, ShapeShift decided to begin KYC despite loud protests from its customer base. Even last month, Binance announced their decision to restrict service to U.S. customers, and to create a separate and fully regulated exchange for the U.S. market.On June 2019, the Financial Action Task Force (FATF) outlined new regulatory standards involving virtual assets saying that crypto payment providers must be subject to the same KYC/AML/CTF rules as conventional banks. The EU has also issued a directive requiring that crypto exchanges and custodial services be subject to the same identity verification and suspicious activity reporting requirements as traditional institutions.So where does blockchain come in? Blockchain actually possesses the one thing that regulators really want: the ability to trace funds to perpetrators of illegal activity.The Importance of Traceability to Fight Money LaunderingWhat many people, including both regulators and criminals, don’t realize is that blockchain can actually help catch money launderers more than it can facilitate them. Despite what privacy fanatics say, Bitcoin is not anonymous. It runs on a fully traceable distributed ledger that can be used as a publicly viewable verification system for financial transactions.Blockchain also provides the transparency that allows financial institutions and regulators to exchange information with each other in real-time on the same network. Under the traditional regulatory model, violations often go undiscovered. Blockchain, on the other hand, provides regulators with a huge database of potential violations regarding the financial activity.So what’s special about blockchain that allows anyone to trace funds across the digital space down to each perpetrator? The answer is decentralization.How Decentralization Enables Us to Trace Illegal ActivityUnder the traditional system, data is stored in fragmented silo-based systems where banks remain reticent to share information with others. In the case of KYC, the race is on to stay ahead of terrorism and financial crime. Therefore, the costs of compliance (and fines for noncompliance) continue to escalate under the traditional system.Adopting blockchain to fight money laundering on an international scale will require the cooperation of all governments and large financial institutions, but this is not as difficult as it sounds. Rather than facilitating money laundering, decentralization actually offers useful AML capabilities to law enforcement officials, who are starting to use blockchain-based tools to trace financial activity using cryptocurrencies back to their perpetrators.Having financial data and transactions on a single decentralized platform would reduce noncompliance risk due to delayed or inaccurate reporting. A software program can piece all the ledger’s data together to track the original sources of transactions. In fact, this is already available: Uppsala Security’s Sentinel Protocol platform offers the Crypto Analysis Transaction Visualization (CATV) tool based on a decentralized Threat Reputation Database (TRDB), designed to help law enforcement agencies track the origin and destination of digital funds.Using instantaneous exchange of information among financial institutions and regulators, suspicious activity can be flagged, allowing for proactive actions against money laundering thus saving the global economy trillions of dollars.How Decentralized Cybersecurity Can Support Governments in Fight Against Terrorism and Money… was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 08. 07
Sentinel Protocol Announces...
Singapore, 25 July 2019 — Sentinel Protocol, a crowdsourced threat intelligence platform built on blockchain technology, announces a new reseller agreement with CyberSSS, a leader in vulnerability management, web application scanning, and mobile application testing.With a common goal of providing accessible cybersecurity protection to individuals and entities worldwide, both Sentinel Protocol and CyberSSS are committed to offering joint cybersecurity solutions through shared expertise and vision.CyberSSS has agreed to appoint Sentinel Protocol as a direct and official reseller of the software; and under the terms of the agreement, Sentinel Protocol will market and resell CyberSSS products in selected territories,Sentinel Protocol’s crypto protection product suite is aligned with traditional industry standards of security solutions. The benefits of crowdsourced threat intelligence have proven to be critical in markets around the world as hackers have become more increasingly sophisticated with their cyberattacks. These products are aimed to protect digital assets belonging to organizations and end-users from malicious threats, money laundering, and involvement with terrorist financing.“We are most pleased to welcome CyberSSS as our Strategic Partner as there are significant synergies in partnering with CyberSSS, and we are delighted to offer our users a solid portfolio of security solutions with significant value-add,” said John Kirch, Senior Vice President WW Sales at Sentinel Protocol. “The backbone of our products, the Threat Reputation Database (TRDB), was built on a crowdsourced structure: combined effort, valuing each report and indicator that was entrusted to us. As we are aware of the impact that joining forces can have, we are very happy to strengthen our capabilities for providing our users with high-quality cyber solutions.”“First of all, we would like to thank Sentinel Protocol for their support and trust” said Sunisa Srinual, President at CyberSSS. “We value every one of our partnerships and Sentinel will certainly open new doors in the market with our combined capabilities and expertise”. CyberSSS Platform has been designed from the ground up to make it easier for companies like Sentinel to extend their product and service offerings to their clients.”.About Cyber SSSCyberSSS is a leader in vulnerability management, web application scanning, and mobile application testing, transforming how organizations manage vulnerabilities. The company was founded in 2016 by government cyber intelligence experts in Canada and Asia and is recognized today as one of the most innovative and exciting cybersecurity companies in the industry. Having its headquarters in Bangkok, Thailand, CyberSSS also provides a cognitive, on-demand, automated platform that integrates best-of-class scanners and security tools.About Sentinel ProtocolSentinel Protocol is the world’s first crowd-sourced threat intelligence platform utilizing the advantages of decentralization to protect cyberspace with blockchain security. It aims to equip individuals and organizations with cybersecurity solutions that help protect their valuable cryptocurrency assets from malicious threats, attacks, and fraudulent transactions. Sentinel Protocol is headquartered in Singapore and has offices in Seoul, South Korea, and Tokyo, Japan. Follow Sentinel Protocol on Telegram, LinkedIn, Twitter, Facebook, and Medium.Sentinel Protocol Announces a Strategic Partnership with CyberSSS was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 07. 25
Kyber Network and Sentinel ...
Singapore, 24 July 2019 — We are happy to announce that Sentinel Protocol is now accessible through KyberSwap, as well as any other platform tapping into Kyber’s on-chain liquidity protocol such as Enjin, MyEtherWallet, imToken, and many more.Aside from the listing, Kyber Network and Sentinel Protocol are teaming up to bring security awareness to the crypto user community. Now available on KyberSwap, users can download Sentinel Protocol’s browser extension solution, UPPward Network Protection, a search engine for secure cryptocurrency transactions and safer Internet browsing, providing real-time alerts upon surfing a malicious website. The plugin, available for free on Chrome and Firefox, is also a platform to report security incidents and any suspicious network activity to Sentinel Protocol’s security experts. This reporting tool, which sits on the Sentinel Portal, allows UPPward users to play an active role in protecting the community by reporting malicious activity and checking on the verification process on their case submissions.The UPP/ETH and UPP/ ERC20 trading pairs are now live. Trading is available here: https://kyberswap.com/swap/eth-uppAbout Kyber NetworkKyber Network is an on-chain liquidity protocol that allows decentralized token swaps to be integrated into any application, enabling value exchange to be performed seamlessly between all parties in the ecosystem.About KyberSwapKyberSwap, Kyber’s in-house swapping service, is one of the fastest and easiest ways to buy and sell tokens in a fully decentralized manner. On both web and mobile platforms, users can swap tokens through a simple process that requires no deposits, order books, or wrapping.About Sentinel ProtocolSentinel Protocol is the world’s first crowdsourced threat intelligence platform built on the blockchain. It collects and analyzes real-time hacks, scams, and fraud for improved security of digital assets. The ecosystem discourages malicious behavior by preventing the use of stolen digital assets. Sentinel Protocol aims to equip individuals and organizations with cybersecurity solutions that help protect their valuable cryptocurrency holdings from malicious threats, attacks, and fraudulent activity.Kyber Network and Sentinel Protocol Partners to Protect the Crypto Community was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 07. 24
Why Smart Cities Need Decen...
Author: Lynnette Chow, Head of MarketingSmart Cities are getting smarter. But are they getting more secure?At the Smart Nation Summit 2019, Singapore’s Prime Minister Lee Hsien Loong said the Smart Nation Initiative is integral to Singapore’s next phase of nation building.This initiative was first launched in 2014, with the goal to digitize Singapore’s policy processes and urban environment. It has already seen enormous success, having given rise to administrative reorganization and increased state-citizen engagement.And this isn’t just happening in Singapore.Smart Cities around the globe are on the rise, as people and objects become increasingly interconnected. Such trends bring out higher productivity, economic improvements, lower costs, and improved lifestyle changes for many people.However, hidden dangers lurk.The Dangers of HyperconnectivityIn a world where everything is digitally connected, unbeknownst to us, our data floats in the cloud between the Internet we are familiar with and the hidden dark web.In fact, data privacy has been among the hottest topics since huge data security breaches impacted Facebook and Google users, as well as in the healthcare and financial industries. These repetitive data breaches reflect the lack of technical cybersecurity, companies’ lack of regard for their users’ data, and the increasing sophistication of hackers.In the last 3–5 years, we have witnessed an alarming increase of hacks and fraudulent activities occurring in Asia as well as worldwide. Apart from increasing attractiveness to hackers for exploitation, this can be partly attributed to the sudden proliferation of cloud computing infrastructure.The Best Weapon Against Security Threats to Smart CitiesThe key to combating security threats to Smart Cities is innovation. We need to innovate to identify key cybersecurity vulnerabilities and how our opponents are exploiting them. This can only work if we can stay ahead of the hackers, and one way to do that is to lower barriers to sharing intel on cybersecurity threats. Many companies are hesitant or even reticent to share security data, and it will take work in overcoming those objections.This is where crowdsourced threat intelligence comes in. Imagine a world where companies and individuals freely report and share the latest security threats. Because of access to that information anytime from anywhere, everyone would be able to counteract those threats before their identities, digital assets, and even smart cities get compromised by bad actors.The need for such a go-to threat intelligence database and reporting platform for fraud victims is higher as it’s ever been, due to security threats becoming increasingly sophisticated amid a severe shortage of cybersecurity professionals.“Across the science and technology field, there is an urgent need to produce and attract high quality tech talents into the thriving ASEAN tech scene. This talent gap is in line with the observed shortage of skilled cybersecurity professionals,” said Lee Hsien Loong, the Prime Minister of Singapore at the 2019 Smart Nation Summit.Staying Connected While Maintaining Digital SecurityWith a growing population connected to social media and online banking, retaining privacy becomes key. Any online activity has a security layer that is always invisible to consumers. That security layer must remain boundless and there must be no single point of failure for sophisticated hackers to exploit.All online activity should be traceable as to deter bad actors, and blockchain technology is one of the strongest solutions. A blockchain ledger would allow any transaction to be stored in a way that it can neither be altered nor tampered with. This allows any transaction to be traced by anyone, with the knowledge that all data stored on the blockchain are accurate.Data integrity and traceability is especially important for the following use cases if the Smart City digital economy is to thrive and be reproduced around the world:Cross border paymentsExchange digital trade documentationReduce inefficiencies, operating costs, and fraudExperimenting with digital banksBeyond these points, blockchain technology can be used to crowdsource security intelligence and safely share threat data with both companies and individuals. Immediate access to the latest crowdsourced data via a blockchain-based platform enables everyone to stay up to date on the latest threats, further deterring malicious activity.Key TakeawaysAs our cities and countries lurch forward into the digitization age, it is up to us to beware the risks that hyperconnectivity may bring and also take responsibility for our own online security.However, it also pays to listen to how tech is evolving. We could keep an eye on how technology is advancing, but that doesn’t mean we should stop the continuing innovation of our modern digital society. In fact, innovation — along with decentralization — is one of our best weapons against security threats that constantly evolve by the day. We need to attract high-caliber tech talent into cybersecurity and allocate a budget for threat intelligence.The greater the incentive is to crowdsource security intelligence onto an accessible blockchain-based platform; the more eager companies will be to join forces into something bigger than ourselves in terms of digital security. On the individual level, consumers would feel safer while making digital transactions, further re-establishing trust in businesses within our digital economy.Why Smart Cities Need Decentralized Security was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 07. 22
Libra Coin: 페이스북 암호화폐는 과연 얼...
페이스북 사용자 여러분, 참고하십시오! 페이스북이 리브라재단(Libra Foundation)을 통해 개발하고 있는 지불 준비금 연동 방식의 스테이블코인인 암호화폐 Libra (이하 리브라)가 성공적으로 사용자들을 끌어 모은다면 글로벌 금융시스템에 지대한 영향을 미치게 되고 개인의 결제 방법에도 큰 영향을 끼칠 것으로 보인다. 비자카드, 마스터카드, 페이팔, 이베이, 스포티파이 등 강력한 투자자들이 후원하는 이 새로운 암호화폐는 미국 달러나 유로화 같은 안정적인 기축통화가 될 가능성이 높다. 2020년 출시 예정인 페이스북의 자회사인 Calibra (이하 칼리브라)는 리브라 코인을 중심으로, 칼리브라 암호화폐 지갑을 포함해 여러 제품과 서비스를 개발할 것이다. 사람들은 국경을 넘어 최소한의 수수료로 즉각적으로 환전을 하고, 칼리브라의 지갑을 통해 온라인으로 상품과 서비스를 구매할 수 있을 것이다.리브라는 컨소시엄의 지원으로 허가된 블록체인에서 운영될 것이다. 리브라의 컨소시엄 구성원들이 블록체인 원장을 통제함으로써 리브라 금융 시스템이 지속적으로 Facebook과 밀접하게 연계될 수 있는 것이다. 하지만 이것이 전통적인 블록체인세계가 갖고 있는 분권화의 어려움을 해결해주는 것은 아니다.글로벌 금융시스템에 미칠 잠재적 영향리브라가 금융 시스템에 미치는 영향은 이 프로젝트의 후원자들이 리브라에 대해 언급한 것만큼 클 것이라고 해도 무방하다. 때문에 금융 감독당국, 은행, 그리고 정부 관계자들은 이 새로운 개발에 대해 주의 깊게 지켜보고 있고 비트코인을 포함한 다른 어떠한 암호화폐도 페이스북 리브라의 발표만큼 그들에게 큰 영향을 주지는 못한 것이 사실이다. 누구와 대화를 나누느냐에 따라 사람들이 리브라에 대해 흥분하거나 우려하는 이유는 페이스북이 전세계에 24억 명의 사용자를 가지고 있다는 점 때문일 것이다. 사용자 중 17억 명이 은행 계좌를 가지고 있지 않기 때문에, 리브라는 송금을 하는데 매력적인 수단이 된다. 하지만 해외송금이 즉각적이고 송금수수료가 거의 무료가 될지라도, 여전히 이 토큰들을 명목화폐(fiat)로 바꾸고자 하는 필요는 존재한다. 은행들은 이처럼 리브라를 현금으로 변환하는데 수수료를 부과할 수 있고, 실제로도 그렇게 할 것이다. 이것은 엄격한 고객신원확인(KYC) 및 자금세탁방지(AML) 규정준수로 알려진 전통적인 은행 시스템이 제공하는 보안 단계를 필요로 하게 된다. 그렇다 하더라도, 규제 불확실성을 이유로 많은 은행들은 리브라에 대해 조심스럽게 접근하고 있다. KYC/AML에 관한 규제와 테러자금조달차단(CFT)에 대한 대응은 은행 및 정부 관계자들에게 가장 우선사항이기 때문이다.Facebook 개인 정보 추적 기록을 안전하게 사용한다는 것에 대한 보장이 없다리브라는 막대한 투자자들의 지지를 받고 있지만, 사용의 안정성에 대해서는 장담할 수 없는데, 이는 지금까지의 어떠한 암호화폐 프로젝트도 마찬가지다. 리브라에 대해 가장 먼저 이해해야 할 것은 리브라는 운영측면에서 비트코인 처럼 분권화되어 있지 않다는 점이다. 위에서 언급한 바와 같이, 리브라는 수십 명의 회원들로 구성된 컨소시엄이 관리하는 허가된 블록체인에서 운영되며, 그 중 하나는 페이스북이다. 두번째로 이해해야 할 것은 리브라가 중앙 금융 당국의 규제하에 있다는 점에서 대중의 불신이 생길 수 있다는 것이다. 프라이버시 이슈가 있는 페이스북의 추적 기록은 이러한 불신을 악화시킬 뿐이다. 칼리브라의 디지털 지갑은 페이스북에 내장될 것인데, 이는 사용자들이 리브라를 사용하는 한 페이스북을 반드시 신뢰해야 한다는 것을 의미한다. 하지만 현재 91%의 사용자들이 자신의 디지털 자산을 취급하는 페이스북을 신뢰하지 않는다고 응답한 바 있다. 그렇다 해도, 여기서 중요한 질문은 다음과 같다. 사용자의 어떤 정보를 투자자나 이해당사자에게 공유할 것인가? 이러한 측면은 무시되어서는 안되며, 가입하기 전 사용자에게 명확히 공지할 필요가 있다.모든 디지털 자산을 다룰 때 사이버 보안을 우선순위로 논해야 하는 이유마침내 Libra가 출시되었을 때, 우리 모두가 스스로에게 물어야 할 질문은 다음과 같다. “우리의 자산을 페이스북에 맡기는 것을 신뢰할 수 있는가?” 이 글을 작성하는 현재 시점으로부터 불과 1년이 채 되지 않은 2018년 9월 25일, 페이스북은 적어도 5천만개의 사용자 계정이 해킹을 당하는 심각한 피해를 입었다. 사용자 데이터 보호에 대한 낮은 보안상태를 고려해 봤을 때, 그다지 긍정적으로 보이진 않는다. 따라서, 이는 해킹, 사기, 돈세탁으로부터 개인을 보호하기 위한 강력한 사이버 보안이 필수적이라는 것을 역설한다. 칼리브라는 최초 가입시, 정부가 발급하는 사진 ID를 요구하는 KYC 부정행위 방지 절차를 이용자에게 안내하고, 해킹을 당해 코인을 탈취당할 경우 환불하겠다고 약속하지만, 칼리브라는 사용자의 개인키를 모두 관리하게 될 것이다. 하지만 우리가 지난 2년 동안 여러 번 언급했듯, 디지털 자산을 안전하게 보호하는 가장 좋은 방법은 키를 직접 관리하는 것이다.페이스북은 오픈 소스이기 때문에 개발자들로 하여금 리브라를 중심으로 자체 앱을 만들 수 있도록 허용한다. 하지만 이는 음지의 프로그래머들이 사용자의 개인 정보를 훔쳐내, 어렵게 번 디지털 자산을 사기칠 수 있도록 기회를 주는 것과 같다.또한, 블록체인의 특성에서 알 수 있듯, 어떤 거래도 돌이킬 수 없다. 칼리브라는 우리에게 해킹 당하거나 탈취당한 토큰에 대해 보상을 제공하겠다고 안심시키지만, 그보다는 어떠한 악의적인 행위도 애초에 일어나지 않도록 막는 것이 주안점이 되어야 한다. 그것이 바로 사이버 보안 솔루션이 도입되어야 하는 지점이며, 이는 단순히 사람들의 디지털 자산을 보호하는 것뿐만 아니라 사용자의 신뢰를 강화시킨다.결론: ICF와 통합될 수 있는 Libra Wallet리브라 프로젝트가 성공하기 위해서는 해킹 방지 안전장치와 적절한 KYC 프로세스가 마련되어야 한다. 사람들이 리브라와 같은 디지털 화폐를 안전하게 사용할 때, 페이스북은 신뢰를 회복할 수 있고, 또한 블록체인 기술 뿐 아니라 더 많은 암호화폐의 채택으로 이어질 수 있다. 전세계적으로 사용되는 칼리브라 지갑과 같은 제품은 국제적으로 표준화된 사이버 보안 프레임워크와 결합하여 사용자의 디지털 자산에 대한 보호를 강화해야 하는데, Sentinel Protocol의 ICF API 2.0이 바로 그 역할을 수행할 수 있다. ICF API는 혐의 거래에 대한 위협을 사전에 판별함으로써 사기와 스캠을 사전에 방지할 수 있으며, 어떤 암호화폐 지갑과도 결합·호환이 가능하다. 또한 설사 자금 도난이 일어나더라도, Libra Foundation은 해당 탈취를 되돌릴 수 있고, 모든 사용자에게 잃어버린 자금을 보상을 할 수 있을 것이다.Libra Coin: 페이스북 암호화폐는 과연 얼마나 안전할 것인가? was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 07. 16
Libra Coin: How Secure Will...
Heads up, Facebook users!Libra, a new reserve-backed cryptocurrency being developed by Facebook through the Libra Foundation, is going to have a profound impact on the global financial system down to how individuals use their money.Backed by powerful investors including Visa, MasterCard, PayPal, eBay, and Spotify, the new Facebook-backed cryptocurrency will be a stablecoin whose value will be pegged to stable currencies like the U.S. Dollar or the Euro. Slated for a 2020 launch, Facebook’s subsidiary, Calibra, will develop products and services around the Libra cryptocurrency, including the Calibra digital wallet.People would be able to use Libra to exchange money instantaneously with minimal fees, even across borders, and to buy products and services online by spending out of their Calibra wallet.Libra will run on a permissioned blockchain with a consortium of support. Members of the Libra consortium will be able to control the blockchain ledger, thus keeping the Libra financial system closely tied to Facebook. This doesn’t necessarily solve the decentralization challenge of the traditional blockchain space.Potential Impact on Global Financial SystemIt is probably safe to say that Libra’s impact on the Financial System would be as big as how the project’s backers had previously described. Therefore, financial regulators, banks, and government officials are alarmed about this new development. No other cryptocurrency, even Bitcoin, was able to have the kind of effect on them as Facebook’s Libra announcement has.The reason people are either excited or worried, depending on who you talk to, is that Facebook has 2.4 billion users worldwide. Out of their users, 1.7 billion don’t have bank accounts, making Libra extremely attractive for remittances. But even though international money transfers will be instant and almost free, there still will be a need to convert these tokens into fiat. Banks can, and probably will, impose fees upon these Libra-to-fiat conversions. This adds a layer of security offered by the traditional banking system known for strict Know Your Customer (KYC) and Anti-Money Laundering (AML) compliance.Even so, many banks are approaching Libra cautiously, citing regulatory uncertainty. Regulations around KYC/AML) and Countering the Financing of Terrorism (CFT) are on the forefront of the minds of bankers and government officials.No Guarantee on Safe Use With Facebook’s Track Record on PrivacyAlthough Libra is backed by huge investors, there is no guarantee that it will be safe to use, which is the case with any cryptocurrency project to date.The first thing to understand about Libra is that it is not decentralized like Bitcoin. As mentioned above, it runs on a permissioned blockchain managed by a consortium of a couple dozen members, one of whom is Facebook.The second thing to understand is there’s already plenty of public distrust to go around with central financial authorities. Facebook’s track record with privacy issues only exacerbates this distrust. Calibra’s digital wallet will be embedded in Facebook, meaning users will have to trust Facebook while using Libra — a hard sell today with 91% of users saying they do not trust Facebook to handle their digital money.Having said that, an important question to ask is: What user information will be shared with investors or stakeholders? This aspect should not be neglected, and needs to be made clear to users before they sign up.Why Cybersecurity Needs to be a Priority for All Digital AssetsWhen Libra finally does come out, the question we all need to be asking ourselves is:“Can we trust Facebook with our money?”As recently as less than a year ago at the time of writing, Facebook suffered a major hack resulting in at least 50 million accounts being compromised on September 25, 2018. Taking Facebook’s lack of user data protection into consideration, it’s not looking very good. This highlights the need for strong cybersecurity in terms of protecting yourselves against hacks, scams, and money laundering.Even though Calibra will take users through a KYC anti-fraud process requiring government-issued photo IDs when they first sign up, and they promise to refund them in case they get hacked and lose their coins, Calibra will manage all the private keys for their users. As we’ve said multiple times in the past two years, the best way to secure your digital assets is to manage the keys yourself.Facebook does allow developers to build their own apps around Libra since it is open source, but that opens the door for shady programmers to scam people out of their hard-earned digital cash along with stealing their personal information.Additionally, as we know from the blockchain space, any transaction is irreversible. Although Calibra reassures us that they will offer reimbursements for hacked or stolen tokens, the main focus should be preventing any malicious activity from happening in the first place. That is where cybersecurity solutions come in. Not only does this protect people’s digital assets, but also consolidates trust.Conclusion: Libra Wallets Can Be Integrated With the ICFFor the Libra project to succeed, there needs to be anti-hacking safeguards and proper KYC processes in place. When people feel secure in using digital currencies such as Libra, Facebook could regain their trust and also lead to higher adoption in cryptocurrencies as well as blockchain technology.Being used globally, products such as the Calibra digital wallet needs to integrate a standardized cybersecurity framework to increase protection of users’ digital assets, which is where the Sentinel Protocol ICF API 2.0 comes into play. The ICF API can be integrated with any cryptocurrency wallet in order to prevent fraudulent transactions, and even if an exploit somehow slips through, the Libra Foundation would be able to reverse the exploit and reimburse any user who lost their coins.Libra Coin: How Secure Will the Facebook Cryptocurrency Really Be? was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 07. 10
Crypto Exchange Meetup 2019...
Exploring Solutions to FATF Guidelines Impacting Virtual Asset Service ProvidersSouth Korea, July 3, 2019 — On June 24, FATF finally released its new regulatory framework for countries regulating cryptocurrency businesses operating in their jurisdictions. According to the new framework, countries within the developed world of finance are required to strictly regulate Virtual Asset Service Providers (VASPs). However, many are concerned about the FATF’s proposal for mandatory screening of all wire transfers against financial sanction lists, and are also wondering how their countries will react to these revisions. Sentinel Protocol, a blockchain-based global security solutions provider, will be present at that the Crypto Exchange Meetup 2019, which will take place with financial regulatory compliance firms. Sentinel Protocol is co-hosting the meetup with Octa solution and Norma under the theme of “FATF’s recommendation and crypto exchanges’ response strategies against the guidelines” at Workflex in Seoul, South Korea on July 4.Octa Solution launched its first cryptocurrency AML solution ‘crypto AML-PRISM’ for the exchanges at the RegTech — SupTech showcase of Korea Fintech Week 2019 hosted by the Financial Supervisory Service (FSS) of Korea last May. The AML-PRISM is a risk-based anti-money laundering solution supplied to traditional financial institutions. It detects and prevents transactions with suspected involvement of money laundering by integrating Sentinel Protocol’s crypto wallet tracking and analysis system and blacklisted wallet address data. Norma, a business leader in wireless and IoT security, plans to provide local exchanges with security consultancy services through its ISMS (Information Security Management System) certification consulting expertise. As one of Sentinel Protocol’s resellers, they also will supply Sentinel Protocol’s solutions including the Crypto Analysis Transaction Visualization (CATV) and Threat Reputation Database (TRDB) to take proactive action to comply with enhanced AML regulations.“By adding each firm’s specialty, based on our core technology — the Threat Reputation Database (TRDB) — we will continue to provide Crypto AML compliance solutions to VASPs, including cryptocurrency exchanges in Korea. We will ensure that their businesses operate in a safe and reliable manner while complying with FATF regulations,” said Min-woo Ku, Korea Country Manager of Sentinel Protocol.Park Man-sung, CEO of Octa Solution said, “We understand the local exchanges’ needs and concerns through recent consultations with them regarding the introduction of anti-money laundering solutions, and we will present the solution at the event.”“This meeting will be a place for security and regulatory compliance experts to explore and exchange solutions for FATF guidelines and have in-depth discussions about up-to-date security technologies,” said Jung Hyun-chul, CEO of Norma. Executives and employees from about 25 major local exchanges and blockchain-based enterprises will attend the event. After the event, discount promotions for Crypto AML solutions and free security consulting opportunities will be offered to those who responded to the survey during the event.About Norma Norma, a wireless network security solution company, was established in 2011 with the vision that “everyone should be able to use networks conveniently and safely.” It has since expanded its technical skills specializing in wireless network security to various IoT fields such as CCTV, Smart Home, connected cars, and healthcare. Norma has recently developed solutions that secure cryptocurrency transactions based on its technological prowess and is thus further expanding its business scope. Meanwhile, Norma’s technological prowess was verified through credible references centered on businesses and public organizations, including the Defense Ministry, the Korea Hydro & Nuclear Power Co., and the National Police Agency. About Octa Solution Octa Solution is a Regtech firm that specializes in financial compliance solutions such as risk-based money laundering prevention (RBA/AML) and multilateral financial information automatic exchange systems (FATCA/CRS). According to enhanced AML regulations expanded to fintech, lenders, and e-finance companies, Octa Solution has been supplying customized leg-tech solutions to businesses so they can respond to various financial regulations in a cost-effective manner.About Sentinel Protocol Sentinel Protocol is the world’s first crowd-sourced threat intelligence platform utilizing the advantages of decentralization to protect cyberspace with blockchain security. It aims to equip individuals and organizations with cybersecurity solutions that help protect their valuable cryptocurrency assets from malicious threats, attacks, and fraudulent transactions. Sentinel Protocol is headquartered in Singapore and has offices in Seoul, South Korea and Tokyo, Japan. Follow Sentinel Protocol on Telegram, LinkedIn, Twitter, Facebook and Medium.Crypto Exchange Meetup 2019 Co-hosted by Sentinel-Protocol, Norma, and Octa Solution was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 07. 04
A New Cybersecurity Strateg...
Hackers have always stayed one step ahead of us. No matter which security measures we use, they always find a way through and wreak havoc.Every time there’s a new attack, we plug it with a software patch, and rinse repeat. This results in a never-ending whack-a-mole game where hackers always have the advantage. The problem with this is that it’s purely reactive. It hasn’t worked.We need a more proactive strategy.Only recently do we have a line of products that enable us to proactively crowdsource and use threat intelligence to finally defeat the hackers for once and all. Most importantly, the foundation that underpins this new strategy is decentralization.How Does Cybersecurity Benefit From Decentralization?Decentralization boosts cybersecurity in three ways:Elimination of single points of failureDecentralization of data storageTraceability of unalterable recordsElimination of Single Points of FailureCentralized databases suffer from one critical vulnerability: being a single point of failure. If a hacker successfully attacks a centralized database, it can be rendered inaccessible. Regardless of any security measures, a centralized entity remains a single point of failure that can be compromised anytime.Using distributed ledger technologies, namely blockchain, eliminates these single points of failure. By having copies of a database in different places, a malicious actor can neither take it down using a DDoS attack or alter any data on the blockchain.This has huge implications for IoT security. IoT devices are most vulnerable when they exchange data amongst themselves. Blockchain can protect data exchanges between IoT devices, while decentralization allows them to make their own security decisions without relying on a central authority.Decentralization of Data StorageThe value of data has been increasing over time. Therefore, it is critical to protect sensitive data to maintain a competitive edge and to comply with privacy laws like the GDPR.By storing repositories of data in different places instead of just one place, decentralized data storage makes it difficult for hackers to conduct successful attacks. By granting permission to third-parties to access this data using cryptography, companies can protect their intellectual property and the privacy of their own customers.Easier to Trace Digital ActivityPlacing immutable, timestamped, and digitally signed data on the blockchain makes it easy to trace all transactions and associated digital activity. While personal information can and should be kept off the blockchain, any digital activity recorded on the blockchain can be traced back to its originators with the assurance that the data is authentic and tamper-proof.The ability to trace transactions on the blockchain gave birth to products such as the CATV tool that supports investigations on crypto exchange hacks, money laundering, and terrorist financing using digital funds.Decentralization: A Challenge For Cybersecurity Solutions?Although there have been huge collateral losses due to exchange hacks and phishing scams targeted towards crypto users, we are confident that decentralization will ultimately strengthen the cybersecurity ecosystem in the long term.The important thing to understand about “decentralization” is that there is a spectrum between total centralization and pure decentralization. Many factors determine whether a platform is truly decentralized or, more likely, lies somewhere in between. These include validation, governance, and consensus algorithms, among other things.The future is slowly tilting in favor of decentralization via crowdsourcing and real-time transparent solutions. At Sentinel Protocol, we have begun to move in that direction with the creation of the Threat Reputation Database (TRDB), the backbone of our cybersecurity solutions.Centralized vs. Decentralized Exchanges: Which Is Safer to Use and Why?This is debatable. Both have their pros and cons. Obviously centralized exchanges are vulnerable to getting their hot wallets hacked, resulting in enormous losses. The biggest known hack occurred on Mt. Gox where over 850,000 BTC was lost. In 2019, centralized exchanges are under increasing pressure from governments around the world to comply with KYC/AML laws.Decentralized exchanges (DEX) eliminates all single points of failure and is more censorship resistant. However, this does not make centralization obsolete. There are still scenarios where centralization provides advantages: such as speed, lower costs, and KYC/AML compliance. Plus, DEX are not perfect when it comes to security. As with Bancor, smart contracts can be vulnerable to underflows, overflows, and reentrancy attacks and therefore need auditing.DEX also have not proven themselves yet. We are still a long way from achieving the liquidity, scalability, and functionality needed for mass adoption of DEX. Another show-stopper for many crypto users is that there are no fiat gateways on DEX. Fiat conversions require KYC, which also requires centralization. Even though a DEX cannot be hacked, its individual users are still at risk of being hacked or transacting (whether intentionally or unintentionally) with illegally-obtained funds due to the absence of KYC procedures. This is where products like the UPPward Network Protection come into play.ConclusionDespite numerous security challenges in the cryptocurrency space, the future is bright for the cybersecurity industry with the increasing use of blockchain.Sentinel Protocol is leading the way into a more secure future with a new cybersecurity product line including the TRDB, CATV for regulatory bodies, ICF API for businesses, and UPPward Network Protection for individual Internet users.People would thus be able to transact more safely without getting into legal trouble or losing their digital assets.A New Cybersecurity Strategy to Beat Hackers at their Own Game: Decentralization was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 06. 19
Development of a Tracker So...
Development of a Tracker Solution for Cryptocurrencies — It all happened when I was tracking down an Ethereum thief!Interview with Patrick Kim, CEO, and Founder of Uppsala Security (Sentinel Protocol) by Park, Geun-Mo, Coindesk Korea reporter.This is an English translation of the original article published in Coindesk Korea, which can be found here: https://www.coindeskkorea.com/tracingstolenetherendsinsolution/Cisco, Palo Alto Networks, Fortinet, F5 Networks, and Darktrace… the world’s leading network security companies everyone is familiar with. What should I do to work for these firms? The general answer is that you need to study very hard in high school, go to a prestigious university, study hard, learn English, major in computer engineering, get a degree, and acquire related IT certifications.Well, this is not the case for Patrick. He is a high school graduate. He studied on his own. He worked as an architectural engineer at the Cisco Singapore branch. Since then, he worked in various global security companies. He spent a decade as a security expert outside of South Korea. The is the story of Patrick Kim, CEO, and Founder of Uppsala Security, who established Sentinel Protocol, a blockchain-based security platform. Prior to founding Uppsala Security last year, Patrick Kim was a security expert working abroad for 11 years, starting at Cisco in 2007.Patrick Kim, CEO of Uppsala Security. Interviewed by Park Geun-MoUnlike other articles, this one does not start with a modifier such as “the world’s best security expert”, which is not the case with Patrick. I’ve gotten my currency wallet hacked, and to think I’m a security expert! Gosh! That’s when Patrick realized the need for a professional security company in the field of blockchain. He dived straight in.Patrick Kim, whom I met at the Uppsala Security office in Samseong-dong, Gangnam-gu, Seoul on March 13, was compassionate and full of determination. Upon his first look at me, Patrick said: “Let me tell you the goal of Uppsala Security.” And then…!“SAVE THE WORLD.”That was what he suggested, which stunned me. What is this? The Avengers? Why?Patrick Kim said a bit shyly, but with confidence: “I have been working as a security expert for over a decade outside of South Korea. As I was looking into the latest IT tech, I ran into the world of blockchain around November 2012. I mined Bitcoin and Ethereum. I also traded on numerous exchanges. Then it happened. I, a security expert, was hacked! I lost 7,218 ether in May 2016. The hacker went after the little known vulnerability within Ethereum. I informed the Ethereum Foundation, but I was ignored. I was told to disregard it as a minor issue. The birth of Uppsala Security was because I did not want this to happen to others who use blockchain and cryptocurrencies.”Patrick Kim’s website — Security 7218, focused on analyzing the cause of his hack.The process was not simple. Patrick Kim created a website called ‘Security 7218’, named after the amount of tokens he lost. Security 7218 found two security vulnerabilities in Ethereum. It was explained in great detail through articles and even a demonstration video. Still, he did not get any help from the Ethereum Foundation, neither did he manage to recover his lost ETH.From then on, he decided to pursue the hackers — resulting in the development of the Crypto Analysis Transaction Visualization (CATV) tool, a cryptocurrency tracker solution that supports ERC20 and ETH. This is an independent technology created by Sentinel Protocol.“Back then, I used an Ethereum explorer called ‘etherscan’ to track the paths of cryptocurrencies. Nonetheless, the hacker repeatedly split and merged the cryptocurrencies using numerous wallets to keep them from getting tracked. This is what we call ‘mixing with tumblers’. After snatching my ETH, the hacker split and merged the ether more than 1,000 times. Eventually, parts of the stolen ether were confirmed to have been liquidated in a foreign exchange. I sent a protest against it, but of course, I wasn’t compensated.”Patrick Kim tracking his stolen Ethereum using CATV, by Sentinel ProtocolAfter leaving Patrick’s wallet, the ETH was ‘mixed and tumbled’ 1177 times for over two years and three months (from May 12, 2016, to August 28, 2018). The stolen ether entered the wallets owned by exchanges, namely Poloniex, Bittrex, BTC-e, Quadriga, and ShapeShift. The deal was done, however, there was absolutely no way to find out whether they were liquidated or hidden somewhere else.It was such a toil to manually track on etherscan! Feeling the pain, he focused on the development of a tracker solution. This is how CATV was born. Through this system, one wallet’s address was all it took to visualize all the links connected to that particular wallet.Patrick soon turned to something else. He explained that the process for hackers to liquidate their loot is getting more complicated as of recently. Regulatory authorities are demanding reinforced personal identification procedures (Know Your Customer) while enforcing anti-money laundering and anti-coin laundering laws worldwide. However, hackers are still able to bypass these restrictions. More liquidation is taking place at anonymous exchanges such as ShapeShift or decentralized exchanges (DEX), where peer-to-peer trades occur. As such, tracking has become more difficult.Let’s take a closer look.The security solutions of Sentinel Protocol are divided into four major categories:· Threat Reputation Database (TRDB)· UPPward (Network Protection)· Interactive Cooperation Framework (ICF)· Crypto Analysis Transaction Visualization (CATV)Sentinel Protocol’s Threat Reputation Database (TRDB).Experts Verify Upon Any Report Submission: TRDBThe TRDB is the core function of Sentinel Protocol. It collects and manages all kinds of security threat information (including URLs, domains, IDs, wallet addresses, e-mails, Twitter addresses, etc.). The TRDB basically consists of blacklists and whitelists. Access is blocked when something is blacklisted and whitelisted only after it has been verified to be safe.The TRDB is currently being recorded on the EOS blockchain for management. CEO Patrick Kim explained that, since security threat information is necessary for anyone, the optimal platform for management is the EOS blockchain. He added that he was also satisfied because the collected information could not be modified at random, thus making the information more reliable.“Generally, every major security vendor collects threat information for their own consumption. The collected threat information reflects the vendor’s security level. Hence, the collected threat information is often not shared with other companies. As a company, we strongly feel that security threat information, especially related to cryptocurrencies, should be available to the community so this information provides real security value. In addition, the most important thing in the security domain is data reliability. If any threat information record is forged arbitrarily by anyone, then there is no trust in the entire database as well as the information itself. So, I combined the TRDB with blockchain.”Sentinel Protocol explains the TRDB mechanism.Threat information collected by Sentinel Protocol over the past year amounted to 1,316,762 cases. It is clear that threats are increasing by the day. Sentinel Protocol’s TRDB allows anyone and everyone to submit suspicious activity or incidents. A group of about 20 external security experts, called The Sentinels, and about 30 internal security experts all verify the submitted report and record the case as threat information. It is an autonomous method of participation. Patrick described it as “crowdsourcing.”“Once submitted, the case is registered into the TRDB for security experts to verify it. The reward system, which is still in the beta phase, aims to compensate both informers and verifiers. We plan to introduce this during the third quarter of this year.”Installation of UPPward is available at the Google Chrome and Mozilla Firefox web stores.UPPward — Network Protection for Individual UsersUPPward, developed by Sentinel Protocol, is a cryptocurrency scam and fraud protection solution for individual users. It is simple to use. The solution can be installed as a browser extension for Chrome and Firefox. When transacting cryptocurrencies using the browser, the wallet address is cross-checked with information archived in the TRDB. If the address is registered as a scam wallet or as a wallet previously involved in suspicious activity, the user receives a warning message. Phishing websites or malicious social accounts on Twitter are also registered as threats.For example, the TRDB blacklist has over 60 social accounts impersonating Vitalik Buterin. When the user encounters any social or wallet address on the blacklist, UPPward sounds an alarm.Collected social account information by Sentinel Protocol purporting to be Vitalik Buterin.Interactive Cooperation Framework (ICF) is for enterprise users. ICF interconnects the TRDB with the CATV using APIs so external users can use these functions for free.“Information in the TRDB is useful for finance companies, cryptocurrency exchanges, wallet developers, and payment solution developers. By leveraging the TRDB, it is possible to prevent users from transferring their cryptocurrencies to scam addresses or phishing websites from exchange wallets. The same goes for wallet developers and payment solution developers. Finance companies are also becoming interested. Since cryptocurrency exchanges are businesses, they are bound to make transactions with financial institutions. In this process, financial companies should confirm that their trading counterparts are transacting safely to comply with anti-money laundering regulations. The ICF allows all stakeholders to use the TRDB, CATV, and other Sentinel Protocol solutions.”Crypto Analysis Transaction Visualization (CATV) tool as shown by Sentinel Protocol.Tada! All coin transfer paths starting with a single wallet address…… and the CATV. In his most powerful, self-confident voice, Patrick explained as he demonstrates the solution, “we are the only place with these technological features.” It was absolutely amazing. The CATV allows you to see, at a glance, all wallets and transactions connected to a single wallet address.Image shows the Ethereum raised by PureBit transferred to other exchanges.Let’s take a look at the PureBit’s hack case in the CATV tool. On November 5, 2018, PureBit was at the center of a dine-and-dash controversy for its KRW 2.6 billion investment towards building a mining exchange. PureBit’s Ethereum wallet address used for fundraising was ‘0x7DF1BD58e8Fd49803E43987787adFecB4A0A086C’. Upon entering the address in the CATV tool, all transactions around this wallet address popped up on a graph. There was a total of 231 transactions. About 615 ETH had been moved to Upbit’s wallet six times in a little over one month (from November 5 to December 9). Likewise, transfers to Gate.io and Cashierest also occurred. The 7070 BTC stolen from the Binance hack on May 5 was also trackable.CATV tracking 7070 BTC stolen from the crypto exchange, Binance.“With the CATV, you can see wallet addresses or transactions that were previously difficult to track. Hackers, in particular, have recently been ‘mixing with Tumblers’ — a technique used to wash stolen coins thousands of times to avoid getting tracked by the judicial authorities. Tracking became impossible. But the CATV tracks even those and shows all these transactions graphically. At present, however, only tokens based on Ethereum such as ERC-20 are trackable. We are preparing to support Bitcoin, EOS, Ripple, and Litecoin this year.”The CATV does not just track your wallet address. It is a vain attempt when you don’t know whom the wallet belongs to. To counter this, Sentinel Protocol analyzes wallet addresses of all domestic and foreign cryptocurrency exchanges. Sentinel Protocol explained that it has identified more than 1 million wallet addresses of domestic exchanges and more than 18 million wallet addresses of foreign exchanges.“This is what I did not understand while developing CATV. Exchanges won’t give any hint as to their wallet information. The hot wallet’s wallet address, as much as it is open to the public, has not been granted upon request due to security matters. So, we found each and everyone on our own. Later on, of course, we also developed a technique to automatically identify exchange wallets and collect their information.”Patrick Kim explained that the wallet information collected from the CATV is also being recorded on the EOS blockchain. In particular, as with the TRDB, information on the exchange wallet was created by the Structured Threat Information eXpression (STIX), an industry security standard. It is easy to utilize the collected information.Seeing all these mesmerizing solutions, I wondered what Uppsala Security’s profit model was. What do you get for all of this? The look on Patrick’s face clouded a bit.“I actually have a lot of worries about the revenue model. There are already a couple of other cryptocurrency trackers around. Of course, they don’t have what we have: the easy and graphically comprehensible technologies. There is a tracker company called Chainalysis. But the solution they provided there is pricey and difficult to use. Only the giants can use them, not individuals.I think this kind of solution should be made available for individuals as well. Nobody takes responsibility for hacks, whether it’s blockchain or cryptocurrency. The solutions we provide are free for individuals with no limits. UPPward is an extension for web browsers and available for installation free of charge. Instead, I am thinking B2B will be our main model for profit. Our B2B customers are currency exchanges, wallet developers, financial institutions, and government agencies.”Industry officials say that the Chainalysis tracker solution, most widely used in and outside Korea, costs about KRW 100 million annually.With Patrick’s mention of government agencies, one thing came to my mind: a request from the Supreme Prosecutors’ Office to cooperate with the development of the cryptocurrency address inquiry system was publicly disclosed last March. With Sentinel Protocol’s TRDB and CATV, this can be used immediately without further development.“I met the FSS staff earlier this year. They told me there is an increasing number of cyber crimes involving cryptocurrencies. The existing tracker systems are inconvenient and do not work properly. So, we showed the CATV tool we developed. They were amazed and asked why a solution like this came out so late. The wallet address inquiry system, as requested by the Supreme Prosecutors’ Office to the Korea Blockchain Association, is similar in function to the CATV we developed. We are ready to cooperate with law enforcers anytime.”Uppsala Security team members from the Singapore HQUppsala Security, the operator of Sentinel Protocol, provides a strong feeling of security. The organizational structure naturally makes it so. Most of the team members, including CEO, Patrick Kim, Head of Operations Narong Chong (Palo Alto Networks, F5 Networks), Head of Business Brian Yang (Dell EMC), Chief Evangelist John Kirch (DarkTrace), and Head of Security Officer Nobel Tan (FireEye, F5 Networks) are experts who spent most of their careers in security companies.“Like me, our team comprises members are from global security companies. So, our products and operations are exactly the same as those from existing security companies. It’s why we can keep chanting the slogan, ‘save the world’. We will continue to do our best to develop the best security solutions by bringing the best security experts together. Save the world!”Development of a Tracker Solution for Cryptocurrencies — It all happened when I was tracking down… was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 06. 05
The new ‘Crypto-AML Solutio...
The new ‘Crypto-AML Solution’ has been launched via collaboration between Sentinel Protocol and OCTA SolutionSouth Korea, 4 June 2019 —A new and unprecedented Anti Money Laundering (AML) solution was announced at the RegTech — SupTech showcase of Korea Fintech Week 2019 hosted by the Financial Supervisory Service (FSS) of Korea. This solution was developed as a result of a collaboration between Sentinel Protocol, the security leader in the cryptocurrency market, and OCTA Solution, a professional financial regulatory service provider.In the current market, where South Korean financial regulators request much stricter compliance at domestic crypto exchanges equivalent to existing AML policies at banks due to the Financial Action Task Force (FATF) mutual evaluations for the upcoming month of July, the launch of this new ‘Crypto-AML solution’ aimed for these exchanges is timely and relevant.Based in Seoul, South Korea, OCTA Solution specializes in providing financial compliance solutions including Reg-Tech, Sup-Tech, and Fintech. The company dominates about 30% — 40% of the AML market in South Korea’s financial sector. A local crypto exchange, Coin One, is also one of their clients.In their collaboration with Sentinel Protocol, OCTA Solution took their solution one step further by integrating Sentinel Protocol’s core security technologies including the Interactive Cooperation Framework (ICF) API 2.0 and Crypto Analysis Transaction Visualization (CATV) tool.Crypto exchanges using this ’Crypto-AML solution’ will be able to experience innovative AML features beyond KYC checks and TMS, a transaction monitoring system in AML, including the following:1. ICF API — Provides users with a way to search for blacklisted crypto wallet addresses and to alert them of suspicious transactions from wallet addresses that have been verified to be malicious. However, if users continue to transact with blacklisted addresses, their addresses will also be classified as suspicious accounts. The system tracks past transactions by these user accounts and if they also frequently transact with blacklisted accounts, it automatically reports them to the Korea Financial Intelligence Unit (KoFIU).2. CATV — Makes it possible to trace and analyze suspected digital asset (crypto) transactions. By using a visual flow representation of transactions to and from a particular crypto wallet address, investigations concerning stolen assets or laundered funds can be accelerated. The ability to speed up such investigations and to take appropriate action quickly helps thwart malicious actors from taking possession of stolen assets or utilizing laundered funds.Through these key functions, transactions involving money laundering can be accurately verified and reported, thus dramatically improving crypto transaction safety.“We started our project to protect victims of hacks, cyber scams, and fraud in crypto transactions. Now, we are able to provide more enhanced AML solutions by integrating with existing financial compliance Reg-Tech solutions. We are planning to keep developing and introducing customized solutions that fit the Korean market situation,” said Patrick Kim, CEO, and Founder of Sentinel Protocol.Watch the video clip of the announcement made by Man Sung Park, CEO of OCTA Solution, during his presentation at Korea Fintech Week 2019. https://www.youtube.com/watch?v=A2zqF7GX9jQThe new ‘Crypto-AML Solution’ has been launched via collaboration between Sentinel Protocol and… was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 06. 04
Sentinel Protocol Signs Res...
South Korea, 31 May 2019 — Sentinel Protocol, a crowdsourced threat intelligence platform built on blockchain technology, announced an agreement with Norma, a South Korean company that specializes in wireless networks and IoT security.Together, their business capabilities will cover the wireless and IoT security fields, as well as the crypto wallet and exchange security businesses. Norma plans to supply Sentinel Protocol’s blockchain-based security solutions to domestic crypto exchanges and blockchain enterprises in South Korea.By establishing compliance through Norma’s ISMS certification consulting expertise and introducing Sentinel Protocol’s cybersecurity solutions, local crypto exchanges will be able to proactively respond to various security threats they face daily.Sentinel Protocol’s crypto protection solution suite encompassing the Threat Reputation Database (TRDB) and Crypto Analysis Transaction Visualization (CATV) aims to protect crypto assets belonging to organizations and end users from malicious threats. The crypto protection suite also currently supplies their cybersecurity solutions to exchanges and wallet companies while cooperating with financial regulators and law enforcement agencies.“We have been conducting security checks and certification consulting services for exchanges where hacks happen due to weak security,” said Jung Hyun-chul, CEO of Norma. “With this reseller partnership, we expect a great synergy effect by adding Norma’s security know-how to Sentinel Protocol’s security technology. In the long run, we hope it can safely contribute to the healthy growth of the blockchain ecosystem.”Additionally, Koo Min-woo, Sentinel Protocol’s Country Manager of Korea said, “since establishing our local office, we have been forthcoming in our efforts to ride the latest blockchain trends by working with the top few cryptocurrency exchanges and wallet providers in the local market. I look forward to our partnership with Norma, as it brings exciting times ahead. We strive to deliver blockchain-based solutions to a wider audience so we can effectively fight security threats.”About NormaNorma, a wireless network security solution company, was established in 2011 with the vision that “everyone should be able to use networks conveniently and safely.” It has since expanded its technical skills specializing in wireless network security to various IoT fields such as CCTV, Smart Home, connected cars, and healthcare. Norma has recently developed solutions that secure cryptocurrency transactions based on its technological prowess and is thus further expanding its business scope. Meanwhile, Norma’s technological prowess was verified through credible references centered on businesses and public organizations, including the Defense Ministry, the Korea Hydro & Nuclear Power Co., and the National Police Agency.About Sentinel ProtocolSentinel Protocol is the world’s first crowd-sourced threat intelligence platform utilizing the advantages of decentralization to protect cyberspace with blockchain security. It aims to equip individuals and organizations with cybersecurity solutions that help protect their valuable cryptocurrency assets from malicious threats, attacks, and fraudulent transactions. Sentinel Protocol is headquartered in Singapore and has offices in Seoul, South Korea and Tokyo, Japan. Follow Sentinel Protocol on Telegram, LinkedIn, Twitter, Facebook and Medium.Sentinel Protocol Signs Reseller Agreement with Norma was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 05. 31
센티넬프로토콜, 노르마와 리셀러 파트너십 계약 체결
한국, 2019년 5월 30일 — 무선 네트워크 및 IoT 보안 전문 기업 노르마(대표 정현철)는 블록체인 기반 글로벌 보안솔루션 전문업체인 센티넬프로토콜과 리셀러 파트너 계약을 맺었다고 밝혔다.노르마가 보유한 무선 및 IoT보안분야의 비지니스 역량과 전자지갑 개발과 거래소 보안 사업 경험을 바탕으로 국내 가상화폐 거래소 및 블록체인 기반 사업을 추진하는 엔터프라이즈에게 센티넬프로토콜의 블록체인 기반 보안솔루션들을 공급할 계획이다.노르마의 ISMS(정보보호관리체계) 인증/컨설팅 전문역량을 통해 컴플라이언스를 수립하고, 센티넬프로토콜의 암호화폐 관련 해킹/스캠/피싱 사기 방지 보안 솔루션을 추가 도입함으로써 국내 가상화폐 거래소들이 매 순간 겪고 있는 다양한 보안위협들에 대한 선제 대응이 가능해질 전망이다.센티넬프로토콜은 가상화폐 거래 시 발생 가능한 보안위협요소를 사전차단 및 사후 대응할 수 있도록 위협평판데이터베이스 (TRDB)와 가상화폐 분석/추적 가시성 대시보드 Crypto Analysis Transaction Visualization (CATV) 와 같은 솔루션들을 보유하고 있으며, 현재 국내외 가상화폐 거래소, 지갑회사, 금융감독 및 사법기관들에 관련 솔루션을 공급 및 공조하고 있는 글로벌 보안 플랫폼 사업자이다.노르마의 정현철 대표는 “거래소 보안이 취약하고 실제로도 해킹 사고가 빈번하게 발생해 거래소를 대상으로 보안 점검 및 인증 컨설팅 서비스를 수행하고 있다”며 “이번 계약을 통해 노르마의 보안 노하우에 센티넬 프로토콜의 솔루션이 더해져 거래소를 안전하게 이용할 수 있게 되고, 나아가 블록체인 생태계의 건강한 성장에도 기여할 수 있게 되길 바란다”고 밝혔다.더불어, 센티넬프로토콜의 구민우 한국지사장은 “국내 지사 설립 후 1년여의 시간 동안 블록체인 산업을 둘러싼 한국 내 다양한 기류를 감지하고 이를 국내 사업전략에 활용하기 위한 노력을 해 왔다. 이를 통해 얻은 경험과 노르마의 전통적 보안사업의 깊은 이해를 기반으로 블록체인 기반의 생경한 보안위협에 대한 대응 솔루션을 대중 화할 계획이다.”라고 언급했다.노르마(Norma) 정보무선 네트워크 보안 솔루션 기업 노르마는 ‘모두가 네트워크를 편리하고 안전하게 사용할 수 있어야 한다’는 이념 아래 2011년 설립됐다. 무선 네트워크 보안 전문 기술력을 CCTV, 스마트홈, 커넥티드카, 헬스케어 등 다양한 IoT 분야로 넓혔고 최근에는 그 동안의 기술력을 바탕으로 암호화폐 거래를 보안하는 솔루션을 개발, 비즈니스 범위를 더욱 확대하고 있다. 한편 노르마의 기술력은 국방부, 한국수력원자력, 경찰청 등 기업 및 공공기관 중심의 공신력 있는 레퍼런스를 통해 검증되었다.센티넬프로토콜 (Sentinel Protocol) 정보Sentinel Protocol은 분권화 및 집단 지성의 장점을 활용한 세계 최초의 블록체인 기반의 보안위협 정보 공유 플랫폼이다. 개인과 조직에 대한 악의적인 위협, 공격 및 사기로부터 소중한 암호화폐 자산을 보호하는 사이버 보안 솔루션을 제공하는 것을 목표로 하고 있다. 센티넬프로토콜의 본사는 싱가폴에 위치하고 있으며, 한국의 서울과 일본 도쿄에도 오피스를 두고 있다. Telegram, LinkedIn, Twitter, Facebook 그리고 Medium 에서 센티넬프로토콜을 팔로우 해주세요.센티넬프로토콜, 노르마와 리셀러 파트너십 계약 체결 was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 05. 30
Cybersecurity Crucial to Bl...
Consensus 2019: Growing Number of People Now Own Bitcoin“2% of the world’s population owns a bitcoin address,” said Alex Gordon-Brander, the CEO of OmegaOne during a panel discussion at Consensus 2019. With a growing number of people owning Bitcoin, the future is bright for cryptocurrency and blockchain technology.At Consensus 2019, we had more influencers this year talking about integrating blockchain with finance, healthcare, national security, and economics.Cybersecurity, however, is still a major hurdle that we must overcome before we can scale blockchain technology.First, how do you know whether your favorite cryptocurrency exchange is secure? Harpal Sandhu, CEO of Mint Exchange, added to the aforementioned panel discussion: “to secure our digital assets, stability and reliability are key.”Increasing Reliability and Security Using Blockchain TechnologyAs we have seen with cryptocurrency exchanges such as the most recent hack on Binance, applications that run on blockchain technology are not necessarily secure.Banks are understandably hesitant to move to blockchain due to these vulnerabilities. However, blockchain technology itself is highly secure. The problem is we cannot apply and scale blockchain using traditional security practices such as firewalls and VPNs.We should demand better security practices from crypto exchanges. The future is bright for blockchain, but hacks continue to stain the reputation of cryptos. Whether you are a trader, or investor, it is up to you to challenge these exchanges to shore themselves up with a crypto security suite that reliably protects your digital assets.The good news is there’s a cybersecurity solution for blockchain-based applications. Sentinel Protocol created a Threat Reputation Database (TRDB) containing whitelists and blacklists of crowdsourced threat intelligence. Organizations can use the TRDB to plug security vulnerabilities in their applications. Individuals can access the TRDB through an UPPward browser extension to protect their digital assets.UPPward extension also offers the Crypto Address Highlight Feature, which highlights blacklisted crypto addresses in red.There is No Security in ObscurityMany companies assume that their networks would be secure if their vulnerabilities were kept a secret from the outside world. This security through obscurity.It may have worked for a little while, but not today. Hackers are more sophisticated and always ahead of the game. It’s not enough to hide vulnerabilities because they can brute force their way in or deduce certain vulnerabilities based on how systems are commonly structured.A better tactic would be to go on the offensive by collecting information about new attack vectors hackers use. With a go-to source of threat intel, anyone could stay ahead of cyber attacks by isolating their vulnerabilities and protect themselves from new threats.We can also standardize the global exchange of threat intelligence with cybersecurity companies, governments, and other businesses. The snowball effect of seamless threat information exchange can stop most threats in their tracks before they do any damage.According to a recent press release, that is the objective of the Interactive Cooperation Framework (ICF). The second version of the ICF API uses STIX, an internationally-recognized cybersecurity language and serialization format, which eliminates the need to check security regulations before acting on new threat intelligence.Security is Not StaticEmail phishing and links to malware is quite common and increasingly targeted towards company executives. If someone is not careful, they could allow a major hack to happen within their organization.According to a Business Times article, a study conducted by PwC showed that 42 percent of businesses surveyed were compromised by phishing attacks in 2017.With the advent of Industry 4.0 revolution, IoT makes security even more complex and consequently, more vulnerable. There are needs to be new technologies that create resilient security based on trust — and this is where the decentralization of blockchain comes in.Using a decentralized database containing the latest security threats, we can finally stay ahead of hackers. A new product, the Crypto Analysis Transaction Visualisation (CATV) tool, would be useful for companies transacting using blockchain. The CATV, which acts as a forensic tool, helps anyone “follow the money” to see where cryptocurrency transactions come from and are sent to, making it difficult for hackers to cover their tracks. This tool allows financial organizations, government bodies investigate security breaches, money laundering, and movements of stolen digital assets.The Way Forward: New Synergy Between Blockchain and CybersecurityBlockchain could potentially improve cybersecurity not only due to decentralization, but also its consensus mechanisms, prevention of data tampering, auditability, encryption, and elimination of single points of failure.This results in a synergistic effect where immutability provides assurance of data integrity, traceability (with the CATV tool), and operational resilience with no single points of failure.As per Deloitte’s Blockchain & Cyber Security report, “If an attacker is able to gain access to the blockchain network, they are more likely to gain access to the data, hence authentication and authorization controls need to be implemented, as is the case with other technologies.”Integrating cybersecurity with blockchain can and likely will result in stronger protection of intellectual property, personal information, health records, financial data, and digital assets.Interested to hear more from us? Follow us on social — Twitter, Telegram, LinkedIn, Facebook or join in the daily security chats on the Uppsala Security forum.Cybersecurity Crucial to Blockchain Adoption was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 05. 28
CATV를 이용한 기업의 자금세탁 방지 및 테러자...
Věra Jourová는 유럽연합집행위원회(European Commission)의 최근 언론 발표에서 “검은 돈(Dirty Money)은 조직 범죄와 테러의 생명줄”이라고 언급했다. Jourová는 유럽연합집행위원회의 소비자 및 양성평등 집행위원이다. 현재 전세계 많은 국가들이 돈세탁과 테러자금에 대항하는 문제를 중요한 외교정책 이슈로 꼽으며 끊임없이 투쟁하고 있다.혁신에는 언제나 단점이 있기 마련이다. 불이 항상 선의의 목적으로 사용되지 않았던 것처럼, 인터넷 역시 악의적인 활동의 수단으로 여전히 이용되고 있다. 블록체인이나 암호화폐와 같은 혁신적인 기술은 과거에는 경험하지 못한 숙제를 가져오기도 한다. 현금과는 달리 디지털 자산은 상대적으로 추적이 용이한 편이지만 동시에 맹점이 있다. 디지털 거래는 더 이상 개인들이 직접 집을 나서 그들의 현금을 물리적으로 타인에게 노출시킬 필요가 없다. 이처럼 디지털 자산은 물리적인 형태가 없기 때문에 신고되지 않은 체로 세관을 쉽게 통과할 수 있고 언제 어디서든 이체가 가능하여 ‘멈출 수 없는 돈’ (unstoppable money) 이라는 타이틀을 갖고 있다.Crypto Analysis Transaction Visualization (CATV) 툴은 Sentinel Protocol에 서 출시한 가장 최신의 보안 솔루션이다. 이제 이 새로운 CATV 툴의 기능이 암호화폐 규제 업계의 판도를 바꿀 것이다.1. 돈세탁 추적 현재 데이터 수집 측면에서 CATV 툴을 능가할 수 있는 제품은 없다. 이 툴은 Sentinel Protocol의 제품군의 핵심인 위협평판데이터베이스(TRDB)에 직접 접근할 수 있기 때문에, 기업, 조직 및 심지어 암호화폐를 취급하는 최종 사용자들로부터 사이버 범죄자나 돈세탁과 연루된 자금과 부주의하게 거래가 이루어지는 것을 방지할 수 있다. 2. 테러자금조달 차단 CATV툴은 특정 지갑이 어떻게 자금을 조달 받고 어디에 자금을 송금시키는지에 대해 확인 가능한, 모니터링 기능을 제공함으로써, 테러리스트 자금 수사건에 있어 핵심적인 조사 수단이 될 수 있다. 단순히 암호화폐 지갑 주소를 검색하는 것만으로, 전체 거래 내역을 한눈에 도식화한 그림으로 확인할 수 있다. 이 시각화 도구를 사용함으로써 이제 도난당한 자금을 단 몇 초 만에 자동 추적할 수 있고, 나아가 테러자금조달을 막을 수도 있는 것이다 . 이처럼 CATV의 사용은 국제 AML 규정 준수에 도움이 될 뿐 아니라, 실제 세상에 긍정적인 영향을 미친다. 지금 바로 CATV 베타버전에 등록하여, 얼리 어답터로서 스스로 암호화폐 거래추적을 시작해 보길 바란다.References: http://europa.eu/rapid/press-release_IP-19-781_en.htmCATV를 이용한 기업의 자금세탁 방지 및 테러자금 추적 was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 05. 09
센티넬 프로토콜, 업계표준(STIX) 지원하는 새...
한국, 2019년 5월 8일 — Sentinel Protocol 이 Interactive Cooperation Framework API (ICF API) 2.0의 출시를 발표했다.최근 IDC 보고서는 아시아/태평양 지역(일본 제외)의 블록체인 솔루션과 관련된 지출이 2022년까지 24억 달러에 이를 것이라고 밝혔다. ICF API 2.0은 이처럼 보안 솔루션에 대해 증가하는 다양한 조직의 수요를 반영하고 있다. 한층 강화된 프레임워크는 이제 사이버 보안 회사에 필수적인 업계표준을 제공할 수 있게 되었다. 가장 중요한 것은 세부 입력 변수가 검색 쿼리의 필터링을 가능하게 한다는 점이다. 쿼리 프로세스에 추가된 필터(최대 10개 필드)는 블랙리스트 주소, 암호 화폐 지갑주소, 위협 범주, 위협 하위 유형, 위협 ID 등에 대한 검색의 범위를 넓힌다.ICF API 2.0은 국제적으로 널리 인정받는 표준 형식인 STIX*를 사용한다. 이렇게 인증된 프레임워크를 사용하게 되면, 사이버 보안 기업, 정부 및 기타 사업체는 보안 규정에 대한 추가 점검을 하지 않아도 되는 이점을 가진다. 또한, 암호화폐 거래소와 기업 고객들은 API 1.0과 2.0두 가지 버전을 각 조직의 니즈에 맞게 선택하여 커스터마이징 할 수 있는 유연성을 갖게 되었다.Sentinel Protocol의 기술 책임자인 노벨 탄은 “ICF API 1.0버전은 주로 암호화폐 거래소를 대상으로 하여 지갑 주소의 악성 여부를 판별하는 것이 특징이었다면, ICF API 2.0은 전통적인 사이버 보안 업계의 주요 고객사인 일반 기업과 정부 기관이 사용하는데 최적화된, 업그레이드된 솔루션이라고 할 수 있다. ICA API 2.0의 표준화된 프레임워크를 통해 보안 규정에 대한 검사를 신속하게 수행할 수 있다”고 말했다.*STIX는 사이버 보안 언어로서, 사이버 보안 위협 정보를 교환하기 위해 고안된 일련의 정보의 집합체이다센티넬프로토콜 (Sentinel Protocol) 정보Sentinel Protocol은 세계 최초의 크라우드 소싱 위협정보 데이터베이스(TRDB) 플랫폼으로, 블록체인의 분권화 및 집단 지성을 활용한 보안기술을 통해 사이버세계를 보호하고 있습니다. 또한 개인과 조직에게 사이버 보안 솔루션을 제시함으로써 악의적인 위협과 공격 및 사기거래로부터 소중한 암호화폐자산을 보호하는 것을 목표로 합니다. Sentinel Protocol의 본사는 싱가폴에 위치하고 있으며, 한국의 서울과 일본 도쿄에도 오피스를 두고 있습니다. Telegram, LinkedIn, Twitter, Facebook 및 Medium에서 Sentinel Protocol 팔로우 해서 최신 소식을 확인해보세요.센티넬 프로토콜, 업계표준(STIX) 지원하는 새로운 ICF API 2.0 출시 was originally published in Sentinel Protocol on Medium, where people are continuing the conversation by highlighting and responding to this story.
19. 05. 08