Using the advantages of decentralization to protect cyberspace with blockchain security
Watch Video

Sentinel Protocol is building a crowdsourced threat intelligence database on the blockchain by leveraging its consensus and incentive system.

The Sentinels
Security experts making cyberspace safer

The Sentinels are a group of white-hat security experts and organizations who are rewarded for their security contributions.

Protecting Individual Users

We have your back. Sentinel Protocol offers proactive security solutions and a community readily available to investigate each incident.

Protecting Individual Users

We have your back. Sentinel Protocol offers proactive security solutions and a community readily available to investigate each incident.

uppward screenshot
uppward screenshot

Securing Crypto

Sentinel Protocol is working with exchanges to make it difficult for hackers to trade, spend, or convert stolen cryptocurrencies to fiat.

Security Professionals At Work

Ethical white-hat hackers and cybersecurity experts are helping our communities while receiving social recognition from their peers.

uppward screenshot

How Sentinel Protocol Improves Security

The backbone of Sentinel Protocol is the Threat Reputation Database (TRDB). The TRDB collects threat data from distributed sources including cryptocurrency exchanges, wallets, payment services, as well as IT and security companies. The blockchain-based TRDB not only guarantees data integrity, but also crowdsources threat data procured by collective intelligence. With proper incentives in place, the Sentinels will propel the TRDB into becoming a global threat reputation database.

How Sentinel Protocol
Improves Security

compare with the conventional security solutions
Security 1

Collective Intelligence

All cybersecurity threat information made transparently accessible to individuals, blockchain companies, security firms, governments, and more.

Security 2

Dellegated Proof Of Stake

The Sentinels, delegated by the Uppsala Foundation, are a group of individuals and institutions with strong cybersecurity qualifications and expertise.

Security 3

Artificial Intelligence

The Sentinel Wallet client software will use machine learning technology to create model behaviors that help the Sentinels detect fraudulent action.

  • 01
  • 02
  • 03
CASE STUDY 01

Individual Crypto Users

usecase-01

Sentinel Portal

  • User interface to report hacking incidents
  • Post-hack guidance and support
  • Shows reputation and case handling history of each sentinel
  • Check latest threat data before making any transactions

UPPward

  • Can activate machine learning and distributed sandboxing
  • Advanced security features are subscription-only
  • Can participate as distributed sandboxing nodes
CASE STUDY 02

Crypto Payments and Exchanges

usecase-02

Emergency Response Team

  • Case handling experts
  • Anti-theft system
  • Malformed transaction prevention
  • Fraud detection system

Global Alliance as Sentinels

  • Exchange of threat information
  • Real-time alert service
  • Sentinel point rewards for data contribution

Safeguard Cryptocurrency

  • Hacker/Scam address filtering
  • Extra layer of end-user protection
  • Brand protection and reputation management
CASE STUDY 03

IT Companies and Security Companies

usecase-03

Emergency Response Team

  • Detection log management
  • Preliminary data analysis

Less Reliance on Signature Updates

  • Automatic data exchange with the TRDB
  • Real-time data update

Sentinel Global Alliance

  • Exchange of threat intelligence
  • Sentinel point rewards for contributions

Start connecting with us today!

Follow us on our *NEW* Official Telegram Announcement Channel, Twitter and Facebook