Hi guys.
Here’s our assessment of this situation:
Our hunch is that Angel117 is an aggressive former employee, who was removed from the project some time ago. While it would be easiest to discredit this attempt at harming our project as being mere trolling, we don’t want to leave any of our followers in doubt as to our projects merits, or the sincerity of our intentions.
Regarding his accusations towards the project and the CEO, we believe his main motivation is for revenge (towards the project, the leader and individual people employed in the project). We believe that anything he would say will be aimed at discrediting us.
However, we feel it is important to provide the community with our answers and clarity on the project.
Regarding his statement that it is impossible to implement some functionality in the project means that a person does not have knowledge in the field of development management. We are not aiming to do everything at once, but move gradually from MVP to RTM.
Once again, here are our answers:
1. File Hashing is used to quickly search for KNOWN objects. This is the key to the speed of the algorithm that excludes trusted software from the need of any additional analysis. Detection of the same harmful objects, including those modified with the help of "morphers, cryptors and packers", is carried out through white lists.
2. Reports about malicious objects from LevelNet client applications are not sufficient for making these objects into the category of malware. This decision is made on the intermediate super nodes, the messages from which, in turn, are signed with a security key.
3. The author does not fully understand the principle of the work of LevelNet algorithms on super nodes. Dynamic analysis is not performed either because of the impossibility of automating such a process, or because it is not necessary. In this case, the white list is responsible for filtering.
4. In the speed and efficiency of information dissemination within p2p networks, each user can be convinced by the example of p2p file clients (ala bittorent), allowing to exchange huge amounts of data. The competence of the author in this matter raises special suspicions, in particular, at the expense of unsupported "report can be checked in a few days".
5. LevelNet does not use antivirus software, but only analyzes the reactions of its users.
6. For the functioning of the LevelNet network, there is absolutely no need to collect any personal data. All objects are represented exclusively by their hash-sums, according to which, as is known, it is impossible to restore the contents of the object or its belonging.
7. First, antivirus products do not exchange databases with their competitors. Secondly, the speed of updating the anti-virus database is estimated in hours; they use client-server connection protocols in which client devices do not contact each other, especially client devices with different antivirus products.
8. LevelNet does not perform heuristic analysis and preactive protection for one reason - no need. It is worth reminding the author that LevelNet is not yet another antivirus with all its inherent flaws, such as inefficiency of malware detection algorithms, slowdown of the device, serious resource consumption, etc.
Conclusion: Due to the fact that we are aware of the motive of his messages, we will ignore future communication with him.We adhere to the rule "Do not feed the troll". We ask the audience to pay attention to the character and emotional tone of his posts where accusations and discreditations are going on in each post. We will be grateful to all who can help us back our claims about this user.
We have also compiled a list of additional resources that help support the authenticity of our project:
1.1 We are registered in the jurisdiction of the United States. (
https://businesssearch.sos.ca.gov/) in the search field, specify levelnet. Corporate number: C4046746
1.2 We have a registered trademark (
https://www.uspto.gov/trademarks-application-process/search-trademark-database) in the search field, specify levelnet. Serial Number:87092110
1.3 We have a registered patent. (
https://levelnet.co/files/Provisional%20patent%20confirmation.pdf)
1.4 We are on TechCrunch in SF (
https://medium.com/@LevelNetwork/levelnet-techcrunch-disrupt-2017-report-c4b66dea9a69)
1.5 We go through Howey Test to fulfill the requirements of the securities regulator (
https://drive.google.com/file/d/0B6khJNq3_ly5dVY2NzlFUkFKLU0/view) Registration is required. It is done so that other ICOs do not copy
1.6 We publish an information memorandum. (
https://drive.google.com/file/d/0B9Qwnd-nTBzTMUllUDJyWXdKTlU/view)
1.7 On our advisor board are respected people from the industry from of the valley (levelnet.co)
1.8 We are on Blockchain UA 2017 in Kiev (
https://medium.com/@LevelNetwork/blockchain-ua-2017-kiev-cecce7882de9)
We do not hide behind fictitious names, you can meet with us personally. All project participants are public people. If it is necessary to give more evidence we will provide them to the audience.
LevelNet