Bitcoin Forum
June 14, 2024, 09:39:56 PM *
News: Voting for pizza day contest
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 »
  Print  
Author Topic: [ANN] LevelNet : The First Distributed Cyber Security Platform  (Read 48565 times)
SillyCat
Full Member
***
Offline Offline

Activity: 490
Merit: 106


View Profile WWW
October 14, 2017, 05:35:51 PM
 #161

can you guys give me the link for new updates and blogs so i can moderate them in korean?
Yes you can : https://medium.com/@LevelNetwork

do i get stake for the new updates translation as well? I wish you guys can track down weekly so i am assured...
SillyCat
Full Member
***
Offline Offline

Activity: 490
Merit: 106


View Profile WWW
October 14, 2017, 05:42:29 PM
 #162

can you also detail out the stake for the translation bounty?
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 15, 2017, 01:33:31 AM
 #163

Notification
Bounty manager is resting on the weekend. I apologize. I collect all the questions and give it to him on the first working day.

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
xx63245613
Sr. Member
****
Offline Offline

Activity: 443
Merit: 250



View Profile
October 15, 2017, 01:38:02 AM
 #164

I'm sorry, the project is good, but do not need to create token, but do not need as high as 55M, which is running the project.

             ▄▄
          ▄▄████▄▄
       ▄▄████▀▀████▄▄
    ▄▄████▀      ▀████▄▄
 ▄▄████▀            ▀███▀
████▀                  ▀  ▄▄
███                      ▄██
███                      ███
███   ███▄        ▄███   ███
███   █████▄    ▄█████   ███
███   ███▀███▄▄███▀███   ███
███   ███  ▀████▀  ███   ███
███   ███    ▀▀    ███   ███
███▄  ███          ███  ▄███
 ▀███▄███          ███▄███▀
   ▀█████          █████▀
     ▀███          ███▀
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██


▄█████████████████████▄
███████████████████████
█████████████████▀▀▀███
███████████▀▀▀      ███
█████▀▀▀       ▄    ███
██▄         ▄█▀    ████
█████▄    ▄█▀      ████
████████▄█▀       █████
██████████  ▄     █████
██████████ ███▄  ██████
███████████████████████
███████████████████████
▀█████████████████████▀


▄█████████████████████▄
███████████████████████
██████████████▀▀▀██████
████ ▀███████     ▀▄███
████   ▀▀█▀▀      ▄████
█████              ████
██████             ████
███████▄          █████
███████▀        ▄██████
███▀▀        ▄▄████████
███████████████████████
███████████████████████
▀█████████████████████▀


▄█████████████████████▄
███████████████████████
████████████▀▀▀▀███████
██████████▀     ███████
██████████   ██████████
████████▀▀   ▀▀████████
████████       ████████
██████████   ██████████
██████████   ██████████
██████████   ██████████
██████████   ██████████
███████████████████████
▀█████████████████████▀


▄█████████████████████▄
█████▀▀         ▀▀█████
███    ▄▄▄▄▄▄▄▄▄    ███
██   ████▀▀▀▀▀██▀▀   ██
██  ███▀       ▀  █  ██
██  ██▀  █████  ▀██  ██
██  ██  ███████  ██  ██
██  ██▄  █████  ▄██  ██
██  ███▄       ▄███  ██
██   ████▄▄▄▄▄████   ██
███    ▀▀▀▀▀▀▀▀▀    ███
█████▄▄         ▄▄█████
▀█████████████████████▀


▄█████████████████████▄
██████████████▀████████
████████████▀ ▄ ▀  ▀███
███████████ ▄███▄  ▄███
███████████ ███████████
██▀  ▀█▀▀     ▀▀█▀  ▀██
██     ▄▄     ▄▄     ██
███▄  ████   ████  ▄███
████   ▀▀     ▀▀   ████
█████  ▀▄▄   ▄▄▀  █████
███████▄▄ ▀▀▀ ▄▄███████
███████████████████████
▀█████████████████████▀


▄█████████████████████████▄
███████████████████████████
████▀▀▀▀███████████████████
███      ██████████████████
████▄▄▄▄███████████████████
████    ██    █▀    ▀██████
████    ██            █████
████    ██    ▄███▄    ████
████    ██    █████    ████
████    ██    █████    ████
████    ██    █████    ████
████    ██    █████    ████
▀█████████████████████████▀
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 15, 2017, 01:45:09 AM
 #165

I'm sorry, the project is good, but do not need to create token, but do not need as high as 55M, which is running the project.


Hard cap 55 M are divided into cash funds, which are returned back to maintain liquidity. The project for development takes a small part of itself. Additionally there is a second phase of the ICO which offers equity.
If you spend more time on our project you will understand the full value of the project and its plans. For example, such as absorbing small antivirus companies to integrate LevelNet technology into them

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 15, 2017, 04:47:59 AM
 #166

Let's sum up some intermediate results. We gathered the most interesting questions and statements in our opinion. In addition to these answers, you can find the answers that interest you in our FAQ: https://levelnet.co/faq.html


1.Have you lost it and have no other ideas to launch ICO with it?? imagine now with this new thing cyber security on blockchain, what if a group of hackers find a way to defeat your system? then every body in the network is screwed. since this is the first time I see a project in this area we should wait and see the other competitors, this isn't about how many transactions are processed in a second and with so many coins doing more than Bitcoin we see it's dominance over them, this is about real threats and real time protection on wide network of users.

Answer:
Code:
Hi and stay calm =)
LevelNet technology is not built on the blockchain protocol. We have our own protocol.
If you are interested in the technical part, pay attention to the FAQ: in section About LevelNet: https://levelnet.co/faq.html
If you are interested in how it works from a deep technical point, you can read our patent document: https://levelnet.co/files/LevelNet%20Tech%20Patent.pdf
If you have any questions, do not hesitate, we are ready to answer and tell you more about our technology.

If you read more carefully our white paper, you will be able to understand the objectives of ICO. We propose the following exit strategy for LVL tokens holders issued by LevelNet.


We took into account interests of diverse user groups and contributors and provide
three exit strategies.

1. Short-term (up to one year)
The growth of the token in the price on the crypto currency exchanges due to the
provision of liquidity by a smart contract that performs the function of a buyback with
the help of funds from the Buyback Fund. Smart contract automatically redeems tokens
from the market by creating Market Order. Smart contract algorithms actually indicate
to market participants that they can always sell tokens at a market price without delays,
creating a demand for tokens. The buyback fund is formed at the expense of funds
received during the ITO and the buy-back runs till the funds are exhausted in the fund.

2. Long-term (one year and more)
Tokens owners who have not sold their tokens in a short-term strategy receive a
preemptive right to exchange a token for a stake in the fund whose purpose is to acquire
local cyber security companies with the subsequent integration of LevelNet technology
into their products. The Fund provides for a gradual decrease in the equity participation
of founders and transfer to participants, who invested in the following phases of ITO.
Owning a share in the fund opens the possibility of participating in the distribution of
profits.
Payout Structure A smart contract allows token owners to receive payment from
the Money Back and Buyback funds starting from the 60th day
after the offering.

3. Output in the product (year and more)
Tokens owners get access to using the LevelNet project software. Besides opens the
ability to exchange tokens for subscription to use the API and SDK for corporate users.
This, in turn, allows tokens owners to sell subscriptions to corporate and business users.

2. How can you attract many investors to this project because there are too many ICOs for this month.
Answer:
Code:
The attraction strategy: We create a unique mechanization with guaranteed liquidity. Today, all ICOs suffer from the fact that the increase in the value of the token is a problem. In our case, we decided it and did something that nobody previously did. You can read more here: https://medium.com/@LevelNetwork/exit-strategy-for-lvl-tokens-holders-issued-by-levelnet-2b22ae7946c3
Well, of course: marketing + PR + bounty.
We also sell our tokens via Ambisafe and have access to the investor database via Ambisafe exchange orderbook.io

3.Hey team, is there a specific target for this project? like the Korean market or US or for IT companies? I am curious who will be the main target for the use.
Answer
Code:
Hi,
From the point of product, there are 3 initial market strategies:
- The US market
- The Indian market
- Countries of Eastern Europe

From the point of ICO, we see 4 main markets:
- United States
- Canada
- Countries of Western Europe.
- Countries of the Persian Gulf

We are now preparing a series of videos from our CEO where it will be told about our plans and product. If the video will please the audience you we will release them on a regular basis. The description of the plan for the market strategy still is commercial in secret and we would not really like to publish it ahead of time. When we reach our ICO goals, we will work with our community and share our plans

4.I have a question, don't you think that an accent on the buyback mechanism sounds 'scammy'? You basically say "I don't think we could build a business that will support the price of the token on the initial level"
Sorry if that sounds aggressive, I'm not so good at my English.

Answer:
Code:
No problem.This is a good statement. And here is our answer.
No business can be successful right away. Business needs time to develop, market, capture the market, etc.

To support the cost of the token can 2 things:

- Underwriter
- Market Maker

This is a standard practice for stock exchanges and for IPOs.If the underwriter on classic exchanges did not have the mechanisms similar to ours, then no stock growth would be ensured.
For example, the task of a market maker is to create liquidity in creating buy and sell orders.

The current situation with the various ICOs looks deplorable:
Projects collected money from investors. The majority of investors need a quick income (Exit Strategy Short) due to speculation deals with tokens.
Tokens after listing on stock exchanges are falling in price as there is no product, no news, no volotility.
Investors are upset and lose faith.
The projects did not think about liquidity at the beginning of the creation of the ICO and did not answer the main question: Why the token will grow in value as long as the project develops.

Regards

5.As in, you place a buy order at the ICO price on an exchange?
Answer:
Code:
Yes correct. Smart contract places a market order (buy) for purchase volume on the exchange

6.Just to summarize some of the cool stuff in the whitepaper.    Special thanks to user: Darkoth89

Code:
- Tokens are multipurpose.  They can be used to pay for premium subscriptions (Home and enterprise) as well as dividends and voting rights.
- There we be both Free and Paid versions of the product.
- Any detection on the network, will be shared to all other endpoints in realtime
- Total number of tokens is 70,000,000, with any unsold ones being destroyed when the ICO ends.
- Funding requirement: Soft Cap $1.5M, Hard Cap approx $55M
- A smart contract has been created that will use the funds from the "Return Fund," to regularly buy back tokens from the market an algorithm.
- Contract address: https://etherscan.io/address/0x5d78d89d4a90b7db17821d36599de1c78c7bda28#code
- Contract source: https://github.com/Ambisafe/etoken2

7. And what if a user from an already infected device connects to the system?

Answer:
Code:
Functions will be available in the second version of LevelNet. the treatment of active infection is highly dependent on malware.
At the first stage of development, the main goal that faces LevelNet is a preventive measure, that is, Do not allow the device to be infected.

Option 1:
Your system is infected with malware with a function (kernel level rootkit / self-defense module). antivirus or our solutions removed malware objects
are installed by the malware protection module after uninstallation.

Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Our solution proposes to install an antivirus package of the company that can heal the device. It installs it in a silent mode then
initializes the function of treating infected objects or deleting them.

Option 2:
Your system is infected with a malicious program without a rootkit or a user-level rootkit.
Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Similar to option 1

Option 3 *: Your system is infected with a malicious program that is executed in memory, i.e. Does not have objects on the disk and it is launched through
shell code of exploit.
Solution: suspend and kill processes, reboot the device.

* In fact, this threat is not removed by any antivirus package and they are all silent about this fact, or they kill the process in which there is
malicious code. This is due to the fact that the projected code in memory is hard to update by signature.

8.Did you have a working demo? it looks very promising
Answer :
Code:
Now we are at the stage of a functional prototype. During the year we tested various functionalities using Google Cloud and MS Azure. We can make you a private demonstration, because. the product is not ready for scaling. Watch the video so we will show it to you: https://www.youtube.com/watch?v=fDLfvA9EqNU
When watching a video, imagine that each virtual machine is users in different parts of the world

9. Cyber security is a huge threat on the other side of the coin, it could a billion dollar market. I read about rivetz and many platform trying to find a solutions to issue of security online! What special advantage does your token has over others.
Answer:
Code:
Hey.
In addition to the fact that the token gives us the use of our services for life and for free, we did the following:

Advantages that we do not see in other tokens.

1. Token has guaranteed liquidity and is provided with a smart contract that automatically and regularly buys tokens from the market at the expense of "BayBack" Fond, thereby performing the functions of a market maker.
2. In order to increase investor interest, we created a smart contract that provides an opportunity to receive a reward for participation in the LevelNet project. Depending on the amount of money, the money is in the form of money, the smart contract algorithm automatically calculates and sends a one-time payment to the investor from the "Money Back" Guarantee Fund
2. As described in the Business model overview, LevelNet's API and SDK for corporate clients, LevelNet provides not only the free distribution of an endpoint security application, additionally.
Similar subscriptions are estimated at $ 50k per year. LevelNet will allow for token owners to exchange the tokens during the Token Offering for a subscription plan, which then can be used by the owner or sold to others.
3. LVL the first phase token can be exchanged for the second-phase LVLS token.
LVLS is a financial instrument, which in Phase 2 offers the following:
● Access to the fund's profits;
● Access to the register of fund shareholders;
● The opportunity to nominate a representative to the Board of Directors;
● The right to call an extraordinary board meeting.

The second phase of the ICO is the opportunity for the participants to become a full-fledged owner of the fund. The purpose of the fund is to absorb small regional
antivirus companies and integration of LevelNet technologies into their products.

It will also be useful to read :Exit strategy for LVL tokens holders issued by LevelNet: https://medium.com/@LevelNetwork/exit-strategy-for-lvl-tokens-holders-issued-by-levelnet-2b22ae7946c3

Regards,LevelNet

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
georgeandy
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500



View Profile
October 15, 2017, 04:56:01 AM
 #167

 I would like to ask if you would be having a twitter campaign for your ICO. I would like to join and participate.
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 15, 2017, 04:57:56 AM
 #168

I would like to ask if you would be having a twitter campaign for your ICO. I would like to join and participate.
You can register ----> https://medium.com/@LevelNetwork/levelnet-bounty-campaign-afefc57009ff

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
Darkoth89
Hero Member
*****
Offline Offline

Activity: 1274
Merit: 646


View Profile
October 15, 2017, 05:53:38 PM
 #169

Let's sum up some intermediate results. We gathered the most interesting questions and statements in our opinion. In addition to these answers, you can find the answers that interest you in our FAQ: https://levelnet.co/faq.html


1.Have you lost it and have no other ideas to launch ICO with it?? imagine now with this new thing cyber security on blockchain, what if a group of hackers find a way to defeat your system? then every body in the network is screwed. since this is the first time I see a project in this area we should wait and see the other competitors, this isn't about how many transactions are processed in a second and with so many coins doing more than Bitcoin we see it's dominance over them, this is about real threats and real time protection on wide network of users.

Answer:
Code:
Hi and stay calm =)
LevelNet technology is not built on the blockchain protocol. We have our own protocol.
If you are interested in the technical part, pay attention to the FAQ: in section About LevelNet: https://levelnet.co/faq.html
If you are interested in how it works from a deep technical point, you can read our patent document: https://levelnet.co/files/LevelNet%20Tech%20Patent.pdf
If you have any questions, do not hesitate, we are ready to answer and tell you more about our technology.

If you read more carefully our white paper, you will be able to understand the objectives of ICO. We propose the following exit strategy for LVL tokens holders issued by LevelNet.


We took into account interests of diverse user groups and contributors and provide
three exit strategies.

1. Short-term (up to one year)
The growth of the token in the price on the crypto currency exchanges due to the
provision of liquidity by a smart contract that performs the function of a buyback with
the help of funds from the Buyback Fund. Smart contract automatically redeems tokens
from the market by creating Market Order. Smart contract algorithms actually indicate
to market participants that they can always sell tokens at a market price without delays,
creating a demand for tokens. The buyback fund is formed at the expense of funds
received during the ITO and the buy-back runs till the funds are exhausted in the fund.

2. Long-term (one year and more)
Tokens owners who have not sold their tokens in a short-term strategy receive a
preemptive right to exchange a token for a stake in the fund whose purpose is to acquire
local cyber security companies with the subsequent integration of LevelNet technology
into their products. The Fund provides for a gradual decrease in the equity participation
of founders and transfer to participants, who invested in the following phases of ITO.
Owning a share in the fund opens the possibility of participating in the distribution of
profits.
Payout Structure A smart contract allows token owners to receive payment from
the Money Back and Buyback funds starting from the 60th day
after the offering.

3. Output in the product (year and more)
Tokens owners get access to using the LevelNet project software. Besides opens the
ability to exchange tokens for subscription to use the API and SDK for corporate users.
This, in turn, allows tokens owners to sell subscriptions to corporate and business users.

2. How can you attract many investors to this project because there are too many ICOs for this month.
Answer:
Code:
The attraction strategy: We create a unique mechanization with guaranteed liquidity. Today, all ICOs suffer from the fact that the increase in the value of the token is a problem. In our case, we decided it and did something that nobody previously did. You can read more here: https://medium.com/@LevelNetwork/exit-strategy-for-lvl-tokens-holders-issued-by-levelnet-2b22ae7946c3
Well, of course: marketing + PR + bounty.
We also sell our tokens via Ambisafe and have access to the investor database via Ambisafe exchange orderbook.io

3.Hey team, is there a specific target for this project? like the Korean market or US or for IT companies? I am curious who will be the main target for the use.
Answer
Code:
Hi,
From the point of product, there are 3 initial market strategies:
- The US market
- The Indian market
- Countries of Eastern Europe

From the point of ICO, we see 4 main markets:
- United States
- Canada
- Countries of Western Europe.
- Countries of the Persian Gulf

We are now preparing a series of videos from our CEO where it will be told about our plans and product. If the video will please the audience you we will release them on a regular basis. The description of the plan for the market strategy still is commercial in secret and we would not really like to publish it ahead of time. When we reach our ICO goals, we will work with our community and share our plans

4.I have a question, don't you think that an accent on the buyback mechanism sounds 'scammy'? You basically say "I don't think we could build a business that will support the price of the token on the initial level"
Sorry if that sounds aggressive, I'm not so good at my English.

Answer:
Code:
No problem.This is a good statement. And here is our answer.
No business can be successful right away. Business needs time to develop, market, capture the market, etc.

To support the cost of the token can 2 things:

- Underwriter
- Market Maker

This is a standard practice for stock exchanges and for IPOs.If the underwriter on classic exchanges did not have the mechanisms similar to ours, then no stock growth would be ensured.
For example, the task of a market maker is to create liquidity in creating buy and sell orders.

The current situation with the various ICOs looks deplorable:
Projects collected money from investors. The majority of investors need a quick income (Exit Strategy Short) due to speculation deals with tokens.
Tokens after listing on stock exchanges are falling in price as there is no product, no news, no volotility.
Investors are upset and lose faith.
The projects did not think about liquidity at the beginning of the creation of the ICO and did not answer the main question: Why the token will grow in value as long as the project develops.

Regards

5.As in, you place a buy order at the ICO price on an exchange?
Answer:
Code:
Yes correct. Smart contract places a market order (buy) for purchase volume on the exchange

6.Just to summarize some of the cool stuff in the whitepaper.    Special thanks to user: Darkoth89

Code:
- Tokens are multipurpose.  They can be used to pay for premium subscriptions (Home and enterprise) as well as dividends and voting rights.
- There we be both Free and Paid versions of the product.
- Any detection on the network, will be shared to all other endpoints in realtime
- Total number of tokens is 70,000,000, with any unsold ones being destroyed when the ICO ends.
- Funding requirement: Soft Cap $1.5M, Hard Cap approx $55M
- A smart contract has been created that will use the funds from the "Return Fund," to regularly buy back tokens from the market an algorithm.
- Contract address: https://etherscan.io/address/0x5d78d89d4a90b7db17821d36599de1c78c7bda28#code
- Contract source: https://github.com/Ambisafe/etoken2

7. And what if a user from an already infected device connects to the system?

Answer:
Code:
Functions will be available in the second version of LevelNet. the treatment of active infection is highly dependent on malware.
At the first stage of development, the main goal that faces LevelNet is a preventive measure, that is, Do not allow the device to be infected.

Option 1:
Your system is infected with malware with a function (kernel level rootkit / self-defense module). antivirus or our solutions removed malware objects
are installed by the malware protection module after uninstallation.

Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Our solution proposes to install an antivirus package of the company that can heal the device. It installs it in a silent mode then
initializes the function of treating infected objects or deleting them.

Option 2:
Your system is infected with a malicious program without a rootkit or a user-level rootkit.
Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Similar to option 1

Option 3 *: Your system is infected with a malicious program that is executed in memory, i.e. Does not have objects on the disk and it is launched through
shell code of exploit.
Solution: suspend and kill processes, reboot the device.

* In fact, this threat is not removed by any antivirus package and they are all silent about this fact, or they kill the process in which there is
malicious code. This is due to the fact that the projected code in memory is hard to update by signature.

8.Did you have a working demo? it looks very promising
Answer :
Code:
Now we are at the stage of a functional prototype. During the year we tested various functionalities using Google Cloud and MS Azure. We can make you a private demonstration, because. the product is not ready for scaling. Watch the video so we will show it to you: https://www.youtube.com/watch?v=fDLfvA9EqNU
When watching a video, imagine that each virtual machine is users in different parts of the world

9. Cyber security is a huge threat on the other side of the coin, it could a billion dollar market. I read about rivetz and many platform trying to find a solutions to issue of security online! What special advantage does your token has over others.
Answer:
Code:
Hey.
In addition to the fact that the token gives us the use of our services for life and for free, we did the following:

Advantages that we do not see in other tokens.

1. Token has guaranteed liquidity and is provided with a smart contract that automatically and regularly buys tokens from the market at the expense of "BayBack" Fond, thereby performing the functions of a market maker.
2. In order to increase investor interest, we created a smart contract that provides an opportunity to receive a reward for participation in the LevelNet project. Depending on the amount of money, the money is in the form of money, the smart contract algorithm automatically calculates and sends a one-time payment to the investor from the "Money Back" Guarantee Fund
2. As described in the Business model overview, LevelNet's API and SDK for corporate clients, LevelNet provides not only the free distribution of an endpoint security application, additionally.
Similar subscriptions are estimated at $ 50k per year. LevelNet will allow for token owners to exchange the tokens during the Token Offering for a subscription plan, which then can be used by the owner or sold to others.
3. LVL the first phase token can be exchanged for the second-phase LVLS token.
LVLS is a financial instrument, which in Phase 2 offers the following:
● Access to the fund's profits;
● Access to the register of fund shareholders;
● The opportunity to nominate a representative to the Board of Directors;
● The right to call an extraordinary board meeting.

The second phase of the ICO is the opportunity for the participants to become a full-fledged owner of the fund. The purpose of the fund is to absorb small regional
antivirus companies and integration of LevelNet technologies into their products.

It will also be useful to read :Exit strategy for LVL tokens holders issued by LevelNet: https://medium.com/@LevelNetwork/exit-strategy-for-lvl-tokens-holders-issued-by-levelnet-2b22ae7946c3

Regards,LevelNet

Great post guys!  Good to see you answering questions people are asking
salary123
Member
**
Offline Offline

Activity: 104
Merit: 10


View Profile
October 15, 2017, 05:55:06 PM
 #170

I think it's a good idea to be able to segment the market. What's the progress of the project at the moment?
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 15, 2017, 09:48:24 PM
Last edit: October 15, 2017, 11:25:11 PM by LevelNet
 #171

I think it's a good idea to be able to segment the market. What's the progress of the project at the moment?


Now the project is in the stage of raising capital, all the forces and means are directed at this.

On the current day:

- The requirements are collected.
- The network protocol has been designed and modeled.
- Written load simulation programs on the network.
- Three backend platforms have been tested (Amazon, Azure, Google). We chose Azure.
- Completed all prototyping and testing of the client part.
- Written 2 services for Windows. (network and integrity control)
- Partially written driver for Windows to work with AB. (Support 5 products)
- The driver of the mode of intercepting certain functions and file operations.
- Describes the mechanism for synchronizing databases. (client-server)
- The team is selected for the backend development.
- Prepared project documentation for the development backend.
- The project documentation for working with publishers and their verification is prepared.
- Fentional prototypes for 3 platforms (Win, OSx, Linux)
- Created a grocery site.
All the work to be closed can be found in the document described in detail - the tab development plan: https: //levelnet.co/files/Financial%20Model%20LevelNet.xlsx

The current site is under renovation

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
Mulavad
Member
**
Offline Offline

Activity: 73
Merit: 10


View Profile
October 15, 2017, 10:05:20 PM
 #172

I think that this coin is good, but I like more Deeponion with TOR integration.

   ⚡⚡ PRiVCY ⚡⚡   ▂▃▅▆█ ✅ PRiVCY (PRIV) is a new PoW/PoS revolutionary privacy project ● ☞ ✅ Best privacy crypto-market! ● █▆▅▃▂
    Own Your Privacy! ─────────────────║ WebsiteGithub  |  Bitcointalk  |  Twitter  |  Discord  |  Explorer ║─────────────────
   ✯✯✯✯✯                 ✈✈✈[Free Airdrop - Starts 9th June]✅[Tor]✈✈✈ ║───────────║ Wallet ➢ ✓ Windows  |  ✓ macOS  |  ✓ Linux
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 16, 2017, 12:47:57 AM
 #173

Hello everyone!

We have published today a new blog post about LevelNet ICO. Interview with the founder and CEO LevelNet.

Read more about it on Medium: https://medium.com/@LevelNetwork/text-interview-with-the-founder-and-ceo-levelnet-992cb1cebb5f

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 16, 2017, 04:19:47 AM
 #174

Hi guys. We created a special group only for the participants of our bounty program. You can quickly contact the bounty manager and find out all the questions without mediator =)

Telegram Group



▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
Darkoth89
Hero Member
*****
Offline Offline

Activity: 1274
Merit: 646


View Profile
October 16, 2017, 06:57:56 AM
 #175

I think that this coin is good, but I like more Deeponion with TOR integration.

That is a completely different project.  This isn't a copy-paste anonymous coin, have you read the whitepaper?
Victorio
Full Member
***
Offline Offline

Activity: 281
Merit: 100



View Profile
October 16, 2017, 10:59:37 AM
 #176

Hello! Let me reserve the translation of the bitcointalk Russian thread/site/whitepaper.

Hello! Great, we would appreciate your help with Russian translation for the thread. We will publish the Translation Campaign terms soon. Stay tuned
Translating the thread into Russian for a Russian project? Seriously?

JoePhoenix
Sr. Member
****
Offline Offline

Activity: 420
Merit: 250


Proof-of-Asset Protocol


View Profile
October 16, 2017, 11:05:04 AM
 #177

This projects looks very promising and I might consider joining the bounty once I am done with the current bounty campaign that I'm in right now.

More Power LevelNet!

|
 
 
50
|
 




                       ▄
           ▄▄▄▄▄▄███████
▄▄▄▄█████  █████████████
█████████  █████████████
█████████  █████████████
█████████  █████████████
█████████  █████████████
█████████  █████████████

█████████  █████████████
█████████  █████████████
█████████  █████████████
█████████  █████████████
█████████  █████████████
▀▀▀▀█████  █████████████
           ▀▀▀▀▀▀███████
                       ▀
|
 
 
$1,5 M
|



        ▄▄▄█████████▄▄▄
      ▄█████▀▀███▀▀█████▄
    ▄███▀     ███     ▀███▄
   ████       ███       ████
  ███▀                   ▀███
 ███▀                     ▀███
▄██▀       █████████       ▀██▄
███                         ███
███        █████████        ███
███                         ███
▀██▄       █████████       ▄██▀
 ███▄                     ▄███
  ███▄                   ▄███
   ████       ███       ████
    ▀███▄     ███     ▄███▀
      ▀█████▄▄███▄▄█████▀
        ▀▀▀█████████▀▀▀
|
 
|
 
<>
<>
<>
<>
 
GITHUB
TWITTER
YOUTUBE
FACEBOOK
angel117
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
October 16, 2017, 03:43:08 PM
 #178

This project is scam!

First, the organizer of the project, Pavel Shkliaev, made his capital on carding(banking fraud). He steals from people money from bank accounts with the help of malicious spyware. This already says for what purpose this ISO was created.

The idea of ​​the project is stupid and carries a number of unavoidable technical and legal problems:

1. The malicious file in this project is determined stupidly by the hash of the file. Any malware uses a cryptor, a morph or a packer, which makes each file unique, which means that each file has a different hash amount. For this reason, the project itself is meaningless.

2. It is impossible to check whether there was a real report on the infected file or this report is fake. Anyone can create a program that will send millions of false reports including for legitimate programs.

If they will check each file on the server with all possible antiviruses by analogy with virostotal.com, then there will not be enough computing resources for this. In addition, the detection will not be a few seconds as a demonstration, but a minimum of 10 minutes, provided that there are free computing resources. And this will only be a static analysis, which is easily handled by the simplest cryptor. For dynamic analysis, you need many times more time and resources. In addition, until now no one has implemented a stable dynamic analysis on the set of antiviruses, because there are many difficulties in this.

3. The reaction time is only on the video demo in a few seconds because there are only 4 virtual machines connected to the local network. And this does not verify the real report or not. In real-world conditions, the time costs for transmitting through a peer-to-peer will be at least a few minutes. And if you check the report with the file on the server, it will take an indefinite time. If all resources are very busy, then the report can be checked in a few days.

4. In order to use third-party antivirus programs both on the client and on the server, you must obtain legal permission from absolutely all anti-virus companies. This is impossible, because no antivirus company will help the competitive product.

5. The client without the user's consent will download files from his computer, which is a violation of confidentiality and may lead to the leakage of important information for the user. In addition, the executable file is stupidly pumped to the server completely, and its size can be hundreds of megabytes and even a few gigabytes.

6. Even if you completely download the executable file and try to perform a dynamic analysis on the server, it may simply not start due to the lack of necessary libraries.

7. Antiviruses and so quickly exchange antivirus databases between each other, so making such a proxy does not make sense.

8. This project will never replace a full-fledged antivirus, since this antivirus has heuristic analysis and proactive protection, which allows detecting suspicious threats or actions.

9. I am familiar with this project, as they tried to offer to various investors during 2016-2017 and no investor agreed to invest money in it, because it does not pass the audit by an independent technical auditor.

Based on all of the above, I'm 100% sure that this project is a scam!
Darkoth89
Hero Member
*****
Offline Offline

Activity: 1274
Merit: 646


View Profile
October 16, 2017, 04:45:13 PM
 #179

This project is scam!

First, the organizer of the project, Pavel Shkliaev, made his capital on carding(banking fraud). He steals from people money from bank accounts with the help of malicious spyware. This already says for what purpose this ISO was created.

The idea of ​​the project is stupid and carries a number of unavoidable technical and legal problems:

1. The malicious file in this project is determined stupidly by the hash of the file. Any malware uses a cryptor, a morph or a packer, which makes each file unique, which means that each file has a different hash amount. For this reason, the project itself is meaningless.

2. It is impossible to check whether there was a real report on the infected file or this report is fake. Anyone can create a program that will send millions of false reports including for legitimate programs.

If they will check each file on the server with all possible antiviruses by analogy with virostotal.com, then there will not be enough computing resources for this. In addition, the detection will not be a few seconds as a demonstration, but a minimum of 10 minutes, provided that there are free computing resources. And this will only be a static analysis, which is easily handled by the simplest cryptor. For dynamic analysis, you need many times more time and resources. In addition, until now no one has implemented a stable dynamic analysis on the set of antiviruses, because there are many difficulties in this.

3. The reaction time is only on the video demo in a few seconds because there are only 4 virtual machines connected to the local network. And this does not verify the real report or not. In real-world conditions, the time costs for transmitting through a peer-to-peer will be at least a few minutes. And if you check the report with the file on the server, it will take an indefinite time. If all resources are very busy, then the report can be checked in a few days.

4. In order to use third-party antivirus programs both on the client and on the server, you must obtain legal permission from absolutely all anti-virus companies. This is impossible, because no antivirus company will help the competitive product.

5. The client without the user's consent will download files from his computer, which is a violation of confidentiality and may lead to the leakage of important information for the user. In addition, the executable file is stupidly pumped to the server completely, and its size can be hundreds of megabytes and even a few gigabytes.

6. Even if you completely download the executable file and try to perform a dynamic analysis on the server, it may simply not start due to the lack of necessary libraries.

7. Antiviruses and so quickly exchange antivirus databases between each other, so making such a proxy does not make sense.

8. This project will never replace a full-fledged antivirus, since this antivirus has heuristic analysis and proactive protection, which allows detecting suspicious threats or actions.

9. I am familiar with this project, as they tried to offer to various investors during 2016-2017 and no investor agreed to invest money in it, because it does not pass the audit by an independent technical auditor.

Based on all of the above, I'm 100% sure that this project is a scam!

Those are some pretty big claims.  Do you have any evidence to back it up, especially the banking fraud claim?
angel117
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
October 16, 2017, 06:24:52 PM
 #180


Those are some pretty big claims.  Do you have any evidence to back it up, especially the banking fraud claim?

Yes. And it's not in your interests that I prove it. Better answer to my arguments about the project, if certainly able.
Pages: « 1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!