[Short general description]: Sentinel Protocol overcomes the disadvantage of decentralization by turning it into an advantage for security. By utilizing a collective intelligence system created through harnessing the power of decentralization, Sentinel Protocol combines cryptographic functions and intelligence-based threat analysis algorithms to create a secure, innovative ecosystem.
According to Sentinel, everyone acting individually will not be a long term solution, but instead we should utilise our collective intelligence to act together in our mutual self-interest through a decentralized cyber security ecosystem.
[Main problems tackled]: Sentinel recognises three main security issues that can affect the average cryptocurrency user:
1) exposure to hacks
2) difficulty to identify attackers
3) the damage such attackers inflict upon crypto users becomes their own responsibility.
The key to various hacks is that they occur because victims are easy to target due to the open nature of the internet. The ideology of decentralization is central to both cryptocurrency and the internet, but it is impossible to say that blockchain implements perfect autonomy.
[Main contribution proposal]:
1) building a Security Intelligence Platform (SIPB) for Blockchain
2) providing collective security intelligence solutions based on the decentralized and distributed nature of blockchain technology.
3) harnessing a group of security experts who may be widely distributed, yet collaboratively working on the same mission — preventing hacks, scams, or frauds against crypto assets
1) blockchain as a security enabler
2) cryptographic functions and intelligence-based threat analysis algorithms to create a secure, innovative ecosystem.
3) security experts and vendors will be encouraged to contribute to building the threat database under the consensus mechanism and feedback from participants, or Delegated Proof of Stake (DPOS)
4) through collective intelligence, the platform can most efficiently and effectively collect hacker’s wallet address, malicious URI, phishing address, malware hashes