REMME REM

Securing access of digital identities

Sale is LIVE, you can purchase whilst tokens are still available. Purchase REMME
Token sale starts on: Tuesday, February 13, 2018 - 20:00
Token sale ends on: Tuesday, March 13, 2018 - 20:00

Rating

9.10
9.10
Learn how our ratings work (coming soon)

Insight data

Assess the external factors

ICO Bench rating

4.3
4.3

Majestic SEO

Trust Flow
0
Citation Flow
Links
Ref. Domains
Category
Topic Trust

Monitor this ICO

Login to be able to monitor ICOs

Insight data is gathered to assist your decision making process, and should not be used as financial advice. Ratings are liable to change as we churn data. Check back often for data updates.

ICO sale is LIVE, you can purchase whilst tokens are available. Purchase REMME

Asset

REM

Type

ERC-20

Hard Cap

20,000,000 USD (including $3M pre-sale)

Soft Cap

480,000 USD (pre-sale)

REMME cryptocurrency token sale

Token: REM
Token Type: ERC-20
Raised: 0
Market Soft Cap: 480,000 USD (pre-sale)
Market Hard Cap: 20,000,000 USD (including $3M pre-sale)

Read the REMME whitepaper

Whitepapers outline all key information so you can understand how it works.


View whitepaper

About REMME ICO

REMME is the Distributed Public Key Infrastructure protocol with a set of DApps for Access Management. 65% of confirmed data breaches involve weak, default, or stolen passwords and cybercrime costs the global economy around $400 billion annually. REMME is building the distributed Public Key Infrastructure (PKI) solution, which prevents phishing, server and password breach, and utilize SSL/TLS protocol to protect the entire channel from attack. The REM token powers all operations within the ecosystem including certificate generation, revocation, and rewarding of nodes which safeguard the network. The primary means of accessing various local and network resources today is via password, a method that has proven itself as a way of identifying and securing users and resources. However, it has one serious drawback: in the event of a password being stolen, the attacker gains access to all of the account-holder’s data. Moreover, because users often deploy the same password for multiple services, the situation is exacerbated, while weak passwords can be a subject to vocabulary attack. Password databases from a variety of resources periodically fall into open access, exposing hundreds of millions of passwords to hackers. Even where the affected user has the ability to change their password, their account is still vulnerable, since the user's mailboxes are usually protected by a password that is often the same as that used on other resources. Thus, passwords cannot serve as a sufficient instrument for protecting user data and guaranteeing the security of the user session. REMME solves the following issues: Trusting the centralized certification authority (CA) CA keys being compromised Fake certificate issuance Issuance of "hidden" certificates, trying to intercept and redirect connections This allows complete and transparent control and tracking of all issued certificates, no possibility for issuing "hidden" certificates, and eliminated attempts to intercept and redirect connections. Various parties (including Google) have tried to solve those issues, but without success. Blockchain systems ensure the immutability of data stored within them, providing an effective and practical solution.

Social Media

You are here

Register as a member for free to monitor ICOs and personalise your experience Join us