Hi guys.
Here’s our assessment of this situation:
Our hunch is that Angel117 is an aggressive former employee, who was removed from the project some time ago. While it would be easiest to discredit this attempt at harming our project as being mere trolling, we don’t want to leave any of our followers in doubt as to our projects merits, or the sincerity of our intentions.
Regarding his accusations towards the project and the CEO, we believe his main motivation is for revenge (towards the project, the leader and individual people employed in the project). We believe that anything he would say will be aimed at discrediting us.
However, we feel it is important to provide the community with our answers and clarity on the project.
Regarding his statement that it is impossible to implement some functionality in the project means that a person does not have knowledge in the field of development management. We are not aiming to do everything at once, but move gradually from MVP to RTM.
Once again, here are our answers:
1. File Hashing is used to quickly search for KNOWN objects. This is the key to the speed of the algorithm that excludes trusted software from the need of any additional analysis. Detection of the same harmful objects, including those modified with the help of "morphers, cryptors and packers", is carried out through white lists.
2. Reports about malicious objects from LevelNet client applications are not sufficient for making these objects into the category of malware. This decision is made on the intermediate super nodes, the messages from which, in turn, are signed with a security key.
3. The author does not fully understand the principle of the work of LevelNet algorithms on super nodes. Dynamic analysis is not performed either because of the impossibility of automating such a process, or because it is not necessary. In this case, the white list is responsible for filtering.
4. In the speed and efficiency of information dissemination within p2p networks, each user can be convinced by the example of p2p file clients (ala bittorent), allowing to exchange huge amounts of data. The competence of the author in this matter raises special suspicions, in particular, at the expense of unsupported "report can be checked in a few days".
5. LevelNet does not use antivirus software, but only analyzes the reactions of its users.
6. For the functioning of the LevelNet network, there is absolutely no need to collect any personal data. All objects are represented exclusively by their hash-sums, according to which, as is known, it is impossible to restore the contents of the object or its belonging.
7. First, antivirus products do not exchange databases with their competitors. Secondly, the speed of updating the anti-virus database is estimated in hours; they use client-server connection protocols in which client devices do not contact each other, especially client devices with different antivirus products.
8. LevelNet does not perform heuristic analysis and preactive protection for one reason - no need. It is worth reminding the author that LevelNet is not yet another antivirus with all its inherent flaws, such as inefficiency of malware detection algorithms, slowdown of the device, serious resource consumption, etc.
Conclusion: Due to the fact that we are aware of the motive of his messages, we will ignore future communication with him.We adhere to the rule "Do not feed the troll". We ask the audience to pay attention to the character and emotional tone of his posts where accusations and discreditations are going on in each post. We will be grateful to all who can help us back our claims about this user.
We have also compiled a list of additional resources that help support the authenticity of our project:
1.1 We are registered in the jurisdiction of the United States. (
https://businesssearch.sos.ca.gov/) in the search field, specify levelnet. Corporate number: C4046746
1.2 We have a registered trademark (
https://www.uspto.gov/trademarks-application-process/search-trademark-database) in the search field, specify levelnet. Serial Number:87092110
1.3 We have a registered patent. (
https://levelnet.co/files/Provisional%20patent%20confirmation.pdf)
1.4 We are on TechCrunch in SF (
https://medium.com/@LevelNetwork/levelnet-techcrunch-disrupt-2017-report-c4b66dea9a69)
1.5 We go through Howey Test to fulfill the requirements of the securities regulator (
https://drive.google.com/file/d/0B6khJNq3_ly5dVY2NzlFUkFKLU0/view) Registration is required. It is done so that other ICOs do not copy
1.6 We publish an information memorandum. (
https://drive.google.com/file/d/0B9Qwnd-nTBzTMUllUDJyWXdKTlU/view)
1.7 On our advisor board are respected people from the industry from of the valley (levelnet.co)
1.8 We are on Blockchain UA 2017 in Kiev (
https://medium.com/@LevelNetwork/blockchain-ua-2017-kiev-cecce7882de9)
We do not hide behind fictitious names, you can meet with us personally. All project participants are public people. If it is necessary to give more evidence we will provide them to the audience.
LevelNet
Yes, I am a former employee. And I have a lot about Pavel Shiklaev and project. In the first after a very long work, he deceived me for a large sum of money. I strongly relied on this money, because it would very much help me buy an apartment. But Pavel deceived me. He has no conscience. From the former employees with him no one is working anymore because he deceives people. All employees represented on the site have long worked in other companies. He does not have a team.
I want to warn people not to deal with this scoundrel!
At the expense of the arguments for the project. My arguments are logical and there is no connection with whether I want to take revenge or not.
Any expert who values his reputation will confirm my words!1. Malicious software uses a morph or cryptor. This means that the sum of the file on each system is different. This means that the database will be empty for all malicious programs. And there is no sense in the fact that this malicious program was detected on another computer, because the client will not be able to recognize it and identify the threat reports.
2. No super nodes and so on can not weed out fake reports. Since everything that the client makes is left can be repeated automatically. His statements about super nodes and signatures are fraudulent, to give at least some sort of response to an unsolvable problem.
3. I made the assumption that you will check the reports on the server using anti-virus software, because you said this earlier, but you generally do not want to check them and it makes it very easy to manipulate statistics from the outside.
4. I said that in a few days, then if you checked the files on the server. Connections of the peer-to-peer do not provide a second reaction. BitTorrent is arranged differently, it has a central user directory. However, data transfer by peer-to-peer means transferring data between the CHARGE of nodes, and not directly. It says that Pavel do not even own the technologies that he claiming.
For example schema of peer-to-peer network:
https://i.imgur.com/BqYC1XL.jpg5. No antivirus company will allow you to use their software for commercial purposes, even on the client side. If you think otherwise, you could write a letter at least to one of the antivirus companies with this issue and officially publish the answer on the site. You did not, so you already know that you are prohibited from using their software in this way.
6. ---
7/8. Antivirus companies sell each other's bases is a well-known fact. And the antivirus is able to recognize the threat through algorithms that have been developed for many years. Strong proactive defense systems are developed. But you seriously argue that this is not necessary and for security it is enough just to compare the hash sum of the file
The fact that the company is officially registered does not deny that this is a scam. They will simply launder money for example through non-existent salaries. In Russia, this is a common practice for paper wages is one, but the employee is paid several times less.