Bitcoin Forum
May 21, 2024, 04:20:17 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 2 3 4 5 6 7 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 »
  Print  
Author Topic: [ANN] LevelNet : The First Distributed Cyber Security Platform  (Read 48558 times)
shandi albert
Full Member
***
Offline Offline

Activity: 308
Merit: 101


FXPay.io


View Profile
October 17, 2017, 12:40:50 AM
 #181

This project is scam!

First, the organizer of the project, Pavel Shkliaev, made his capital on carding(banking fraud). He steals from people money from bank accounts with the help of malicious spyware. This already says for what purpose this ISO was created.

The idea of ​​the project is stupid and carries a number of unavoidable technical and legal problems:

1. The malicious file in this project is determined stupidly by the hash of the file. Any malware uses a cryptor, a morph or a packer, which makes each file unique, which means that each file has a different hash amount. For this reason, the project itself is meaningless.

2. It is impossible to check whether there was a real report on the infected file or this report is fake. Anyone can create a program that will send millions of false reports including for legitimate programs.

If they will check each file on the server with all possible antiviruses by analogy with virostotal.com, then there will not be enough computing resources for this. In addition, the detection will not be a few seconds as a demonstration, but a minimum of 10 minutes, provided that there are free computing resources. And this will only be a static analysis, which is easily handled by the simplest cryptor. For dynamic analysis, you need many times more time and resources. In addition, until now no one has implemented a stable dynamic analysis on the set of antiviruses, because there are many difficulties in this.

3. The reaction time is only on the video demo in a few seconds because there are only 4 virtual machines connected to the local network. And this does not verify the real report or not. In real-world conditions, the time costs for transmitting through a peer-to-peer will be at least a few minutes. And if you check the report with the file on the server, it will take an indefinite time. If all resources are very busy, then the report can be checked in a few days.

4. In order to use third-party antivirus programs both on the client and on the server, you must obtain legal permission from absolutely all anti-virus companies. This is impossible, because no antivirus company will help the competitive product.

5. The client without the user's consent will download files from his computer, which is a violation of confidentiality and may lead to the leakage of important information for the user. In addition, the executable file is stupidly pumped to the server completely, and its size can be hundreds of megabytes and even a few gigabytes.

6. Even if you completely download the executable file and try to perform a dynamic analysis on the server, it may simply not start due to the lack of necessary libraries.

7. Antiviruses and so quickly exchange antivirus databases between each other, so making such a proxy does not make sense.

8. This project will never replace a full-fledged antivirus, since this antivirus has heuristic analysis and proactive protection, which allows detecting suspicious threats or actions.

9. I am familiar with this project, as they tried to offer to various investors during 2016-2017 and no investor agreed to invest money in it, because it does not pass the audit by an independent technical auditor.

Based on all of the above, I'm 100% sure that this project is a scam!
Are you saying this is true Huh Angry Angry
For the project owner whether you can clarify clearly

LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 17, 2017, 12:44:32 AM
 #182

These are serious claims and seem to be a provocation.
As for the technical part. There is no question of any dynamic and static analysis of speech. Confirmation of a false request from the user
is also described in the algorithm for assigning the level of risk. Read carefully how the threat level is set.
Reputational base formation
A novel concept of weighting certain attributes for the determining the Risk Level of
potential software packages. This Risk Level is evaluated by the LevelNet system
automatically based on the value of a set of factors listed below in descending order of
importance:
● antivirus solutions reactions from end-point users.
● level of trust that its publisher has
● prevalence within the network
● the number of cases when this software was added to the list of exceptions
end-users
The number of antivirus solutions can be obtained both from users' devices
and from the internal servers of the LevelNet network. The process of monitoring
previously unknown software.

Also read about the database of trusted publishers, you most likely missed it or just did not know it.

If the object (the new hash) does not satisfy the conditions, then it is considered dangerous, thus all manipulations with the cryptor and morphing are reduced to zero due to the fact that the object
previously did not meet with users and there are no trusted publishers in the database.
The algorithm is specified in the answer number 1. In addition to this algorithm, the number of requests from the user is checked. In reality, if the user
sends many requests, it is blocked due to the fact that this is not a real behavior. Because sending a lot of requests from the user in reality does not happen.
2.1 We do not check each file, we use the algorithm specified in item 1. The source of information is user devices and the database of trusted publishers and their files.
We do not use dynamic anti-virus scanning on our side.
3. It's not the number of devices, but the speed of delivery of verified information. The data transfer rate is very high today. There's really no verification on the video
on the reliability of the request received from the device on which an antivirus is installed, which is able to cope with the threat. Validation test
A request from a user for an identified threat does not take much time. We do not analyze the set of anti-virus engines in our
in the cloud, but we operate the information with information obtained from other users and sources of re-checking the information.
Verification of the request is not based on either dynamic or static analysis, which you specified in paragraphs 1-8.

On the legal side:
- All results of anti-virus software on the user's device are the property of the user under license agreements.
Number 9 Are you sure of this? If so, I ask you to provide evidence that we have not undergone any independent technical audit.

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
angel117
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
October 17, 2017, 07:41:23 AM
 #183

These are serious claims and seem to be a provocation.
As for the technical part. There is no question of any dynamic and static analysis of speech. Confirmation of a false request from the user
is also described in the algorithm for assigning the level of risk. Read carefully how the threat level is set.
Reputational base formation
A novel concept of weighting certain attributes for the determining the Risk Level of
potential software packages. This Risk Level is evaluated by the LevelNet system
automatically based on the value of a set of factors listed below in descending order of
importance:
● antivirus solutions reactions from end-point users.
● level of trust that its publisher has
● prevalence within the network
● the number of cases when this software was added to the list of exceptions
end-users
The number of antivirus solutions can be obtained both from users' devices
and from the internal servers of the LevelNet network. The process of monitoring
previously unknown software.

Also read about the database of trusted publishers, you most likely missed it or just did not know it.

If the object (the new hash) does not satisfy the conditions, then it is considered dangerous, thus all manipulations with the cryptor and morphing are reduced to zero due to the fact that the object
previously did not meet with users and there are no trusted publishers in the database.
The algorithm is specified in the answer number 1. In addition to this algorithm, the number of requests from the user is checked. In reality, if the user
sends many requests, it is blocked due to the fact that this is not a real behavior. Because sending a lot of requests from the user in reality does not happen.
2.1 We do not check each file, we use the algorithm specified in item 1. The source of information is user devices and the database of trusted publishers and their files.
We do not use dynamic anti-virus scanning on our side.
3. It's not the number of devices, but the speed of delivery of verified information. The data transfer rate is very high today. There's really no verification on the video
on the reliability of the request received from the device on which an antivirus is installed, which is able to cope with the threat. Validation test
A request from a user for an identified threat does not take much time. We do not analyze the set of anti-virus engines in our
in the cloud, but we operate the information with information obtained from other users and sources of re-checking the information.
Verification of the request is not based on either dynamic or static analysis, which you specified in paragraphs 1-8.

On the legal side:
- All results of anti-virus software on the user's device are the property of the user under license agreements.
Number 9 Are you sure of this? If so, I ask you to provide evidence that we have not undergone any independent technical audit.

It is not a problem to buy thousands of proxy servers and send false reports from each IP address, thereby manipulating statistics in the database of levelnet. How can you check the real report or not?

Statistics can be manipulated from the outside, and so there is no point in such a project.

You are going to use the result of the work of third-party antivirus software for your own commercial purposes. No antivirus company will allow this. The user's license for the anti-virus only entitles the user to use the software product for the intended purpose. This does not entitle you to use the output of a third-party product. You just sue and the project will be closed legally!

Your project is not an antivirus or firewall. It just blocks the launch of the program based on statistics, which is easy to manipulate from the outside. It is not able to protect against the implementation of the shell code through vulnerabilities. Can not recognize web exploits. This is absolutely useless software product.

You have not created a single successful project in your life. Your past project failed in a shame. All ordinary developers listed on the official site levelnet.co have long worked in other companies and will not be dismissed for the sake of your suspicious project. Why did you decide that you can do at least something like that?

LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 17, 2017, 10:47:42 AM
Last edit: October 17, 2017, 11:01:50 AM by LevelNet
 #184

Thank you for your correct questions, we see that you have become better understood:

1.Reports about malicious objects from LevelNet client applications are not sufficient to place these objects in the malicious category in the database. This decision is made on the intermediate super nodes, the messages from which, in turn, are signed with a security key. Thus, false reports will be filtered at this stage.
2.Practically in all cases, the execution of the shell code entails loading onto the disk and the subsequent launch of the malicious executable module, which will be immediately detected and blocked by the LevelNet client. Due to the limitations of bytecode execution in RAM, no serious actions can be performed without saving to disk.

About the legal aspect. How can you say so if there are examples, for example, virostotal and others? They were closed? Or you can know some legal subtleties that we do not know, then the sound of the position on the basis of which our project will be closed. You are considerably behind in understanding the project and its movement.


▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
CryptoBeefy
Full Member
***
Offline Offline

Activity: 378
Merit: 100


View Profile
October 17, 2017, 11:18:45 AM
 #185

The fraud claim here is pretty worrying  Undecided
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 17, 2017, 11:36:43 AM
 #186

The fraud claim here is pretty worrying  Undecided
Nothing unusual. Revenge

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
Darkoth89
Hero Member
*****
Offline Offline

Activity: 1274
Merit: 646


View Profile
October 17, 2017, 11:41:39 AM
 #187

The fraud claim here is pretty worrying  Undecided
Nothing unusual. Revenge

New account registered yesterday and didn't provide any proof either.
angel117
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
October 17, 2017, 12:57:40 PM
 #188

Thank you for your correct questions, we see that you have become better understood:

1.Reports about malicious objects from LevelNet client applications are not sufficient to place these objects in the malicious category in the database. This decision is made on the intermediate super nodes, the messages from which, in turn, are signed with a security key. Thus, false reports will be filtered at this stage.
2.Practically in all cases, the execution of the shell code entails loading onto the disk and the subsequent launch of the malicious executable module, which will be immediately detected and blocked by the LevelNet client. Due to the limitations of bytecode execution in RAM, no serious actions can be performed without saving to disk.

About the legal aspect. How can you say so if there are examples, for example, virostotal and others? They were closed? Or you can know some legal subtleties that we do not know, then the sound of the position on the basis of which our project will be closed. You are considerably behind in understanding the project and its movement.



1. If the reports are signed with a security key, then it must be sewn into the client program. It follows that it can be extracted and used to sign fake reports. The problem with the management of statistics from the outside is not solved by you.

2. You introduce yourself as a great specialist in cyber security. However, say such nonsense that the execution of the code in memory carries no threat? This shows that you are not competent in matters of cyber security. Through the shellcode, you can run the simplest backdoor and execute commands in the system. In addition, you can download any malicious program and execute it in memory without saving to disk.

3. The company virustotal.com antivirus companies independently apply and enter into a legal agreement, and provide them with api interface for their software product. They benefit from this, as they receive information that users upload. However, no company will cooperate with you, because there is no benefit in this. And legally you will not be allowed to use the antivirus product for commercial purposes.
angel117
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
October 17, 2017, 01:12:48 PM
 #189


New account registered yesterday and didn't provide any proof either.

The date of registration of my account does not apply to irrefutable arguments that your project is scam.
Darkoth89
Hero Member
*****
Offline Offline

Activity: 1274
Merit: 646


View Profile
October 17, 2017, 01:47:48 PM
 #190


New account registered yesterday and didn't provide any proof either.

The date of registration of my account does not apply to irrefutable arguments that your project is scam.

That was me that posted that - Not them haha  I am open to all points if sufficient evidence is provided to me!
SillyCat
Full Member
***
Offline Offline

Activity: 490
Merit: 106


View Profile WWW
October 17, 2017, 02:06:36 PM
 #191

Oh man, hopefully I can get to Jr.member asap so I can join this signature bounty Cheesy

good luck bro
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 17, 2017, 04:57:05 PM
 #192

Hi All!

We have updated our Bounty Campaigns with exciting ways to win LevelNet tokens. We hope you enjoy.

View the full Bounty Campaign description here: https://medium.com/@LevelNetwork/levelnet-bounty-campaign-afefc57009ff

Some highlights of the campaign include:

Reddit Bounty Campaign
Facebook Bounty Campaign
Twitter Bounty Campaign
Signatures Campaign

As for the translation campaign, there is still time to participate with German & Spanish Translation.

We're looking forward to spreading the word about LevelNet Project on social media!

For all questions regarding Bounty, you can reach us on Telegram at https://t.me/levelnetbounty


▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
Reb_Tot
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
October 17, 2017, 10:45:45 PM
 #193

I really like this project, it looks solid to me. When does the ICO start?
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 17, 2017, 11:06:40 PM
 #194

I really like this project, it looks solid to me. When does the ICO start?

Thank you! Our ICO launches on November 15.

On November 1st we're launching our pre-sale with up to 40% discounts. For more details on how to participate please check our official website: https://levelnet.co/

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
Venonet
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
October 17, 2017, 11:44:16 PM
 #195

Are tokens going to be tradable on an exchange?
LevelNet
Full Member
***
Offline Offline

Activity: 308
Merit: 100


LevelNet Official


View Profile WWW
October 18, 2017, 01:28:09 AM
 #196

Are tokens going to be tradable on an exchange?

Currently, we are negotiating with 5 large exchanges. To date, arrangements have been reached with orderbook.io and LiveCoin.

▀▀▀▀  ▬▬▬▬▬▬▬▬▬▬▬▬  LEVELNET  ▬▬▬▬▬▬▬▬▬▬▬▬   ▀▀▀▀
▄▄▄▄               The World’s First Distributed Cyber Security Platform               ▄▄▄▄
FACEBOOK  ■  TWITTER  ■  MEDIUM  ■  REDDIT  ■  STEEMIT  ■  WEBSITE  ■  WHITEPAPER
Darkoth89
Hero Member
*****
Offline Offline

Activity: 1274
Merit: 646


View Profile
October 18, 2017, 06:53:05 AM
 #197

Hi All!

We have updated our Bounty Campaigns with exciting ways to win LevelNet tokens. We hope you enjoy.

View the full Bounty Campaign description here: https://medium.com/@LevelNetwork/levelnet-bounty-campaign-afefc57009ff

Some highlights of the campaign include:

Reddit Bounty Campaign
Facebook Bounty Campaign
Twitter Bounty Campaign
Signatures Campaign

As for the translation campaign, there is still time to participate with German & Spanish Translation.

We're looking forward to spreading the word about LevelNet Project on social media!

For all questions regarding Bounty, you can reach us on Telegram at https://t.me/levelnetbounty




Taking part in all but the facebook one Cheesy Still can't believe how few people are doing the signature! More shares for me haha
shandi albert
Full Member
***
Offline Offline

Activity: 308
Merit: 101


FXPay.io


View Profile
October 18, 2017, 04:32:24 PM
 #198

Hi All!

We have updated our Bounty Campaigns with exciting ways to win LevelNet tokens. We hope you enjoy.

View the full Bounty Campaign description here: https://medium.com/@LevelNetwork/levelnet-bounty-campaign-afefc57009ff

Some highlights of the campaign include:

Reddit Bounty Campaign
Facebook Bounty Campaign
Twitter Bounty Campaign
Signatures Campaign

As for the translation campaign, there is still time to participate with German & Spanish Translation.

We're looking forward to spreading the word about LevelNet Project on social media!

For all questions regarding Bounty, you can reach us on Telegram at https://t.me/levelnetbounty


Hello..
Is it true you changed the rules bounty
And what is your reason for doing that?

THANKS

BlackMercury
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
October 18, 2017, 06:29:02 PM
 #199

Should make Jr.Member next reset and I can finally join the LevelNet bounty Cheesy
angel117
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
October 18, 2017, 07:45:10 PM
 #200

Hello..
Is it true you changed the rules bounty
And what is your reason for doing that?

THANKS

Because this project is a scam. They are not going to work. Their motive is only to steal money.
Pages: « 1 2 3 4 5 6 7 8 9 [10] 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!