Overview

The future of cyber threat detection powered by cyber security experts and the EOS Blockchain, putting businesses one step ahead of the hackers.

Project stage

Prototype

Detailed description

Uncloak is a unique and fully scalable blockchain powered technology that enables businesses to monitor, protect themselves against and eliminate cyber threats, staying one step ahead of the hacker.

Uncloak is an Artificial Intelligence (AI) based analytical tool for the intuitive, automated and seamless performance of security checks: giving users the ability to cut through the cyber jargon and understand, remediate and resolve cyber security issues. In the absence of innovation tools such as Uncloak, successfully evaluating a company’s computers and network infrastructure requires specialised, highly skilled labour, extensive setup time and significant costs. Uncloak seeks to make this level of cyber security available on a mass scale, at a lower cost and with simple end user interaction.

Problem

Computer hacking is one of the world’s major problems with new breaches of data and releases of ransomware occurring at an alarming rate. Cyber-crime is predicted to cost $6 trillion annually by 2021. There are no boundaries: from some of the world’s largest corporations; to critical national infrastructure; to small local enterprises and individuals. They have been hacked and trends suggest this will continue, particularly as evolving programs such as Internet of Things (IoT), smart cities and mass digitisation become the reality of life. 

Currently, there is a shortage of cyber security solutions that are proactive in identifying new threats and allowing end users to shut them out or close them down. Whilst some capabilities exist at a Governmental level, Uncloak provides a commercial tool that will close this gap and maintain significant revenues across the many sectors that are susceptible to cyber-crime.

Tackling cyber security threats requires more than antivirus protection, firewalls and intrusion detection systems. Currently cyber security solutions rely on an isolated and custom-made approach to cyber threat management with limited knowledge sharing between competitive security vendors. Most of the patterns and signatures that aid cyber security software in detecting a security vulnerability are freely available on the public internet thus allowing the hacker to have the same knowledge as a security vendor. The result is an endless game of cat and mouse, with a cyclical race to stay one step ahead, until the next breach is surfaced. The status-quo puts the advantage with the hacker.

Solution

Novel approach is to create a decentralised, scalable, blockchain powered cyber security management solution that places an emphasis upon the strength of the wider community to contribute to finding vulnerabilities through a blockchain based mechanism. Uncloak will harness knowledge and expertise, aggregate it into a platform and transform it into a service for end users to purchase. This capability in Uncloak does not currently exist in the commercial market.

Uncloak will build its own threat detection database by using advanced AI technology to crawl the public and private internet looking for the latest cyber security threats, which are converted into security signatures and added to the Uncloak threat detection system to check if the vulnerabilities exist across the subscribed client base networks and infrastructure. Where vulnerabilities exist, the end user will be notified immediately so that corrective action can be taken.

Uncloak is in the unique position to becoming a market leader in Cyber security threat detection because, it not only engages an active community of cyber security experts to find undiscovered security threats; but it also constantly updates itself using Artificial Intelligence technology to scan the internet looking for upcoming security vulnerabilities to add to its threat vulnerability database.

Features

The existing Uncloak application developed in-house that has the current features:

  • Automatically identify a client’s public internet footprint covering websites, email servers, applications and computers on the internet in readiness for a security scan greatly reducing the timescales around security scanning setup. 
  • Easy to understand dashboard to check progress of scans and reports, request external IT consultancy and set up schedule scanning jobs 
  • Black Hat mode – Uncloak Software is able to simulate a live hack attempt against an email server and also check a client’s antivirus protection.
Show details

Additional links

  • Token details

    • Token symbol ? Token symbol — a shorten token name. It is used during an ICO and after the coin listing at the cryptocurrency exchanges. : UNC
    • Fundrasing target ? Fundraising target — the maximum amount of funds to be raised during an ICO. When it is reached, the developers stop selling the tokens because they do not need to raise more money for the project development. : 21,000,000 USD
    • Token type ? Token type — a platform for a startup launch that influences the stability of blockchain operation, the speed of transactions and the fees. :Ethereum (ERC20)
    • Soft cap ? Soft cap — the minimum amount of funds to be raised for the project development. Sometimes when the soft cap has not been reached, the money is returned to the participants. :6,000,000 USD
    • Role of token ? Role of Token — type of token depending on the opportunities it offers to its owner. Utility tokens give their owners a right to use the project services, security tokens are aimed at bringing profit, and currency tokens are a money substitute. :Utility token
    • Total supply ? Total supply — a total amount of tokens that will be released by the developers. :4,200,000,000 UNC
    • Escrow agent ? Escrow agent — a qualified agent who has the right of signature in a multisig wallet. An escrow agent participates in an ICO, monitors the financial operations of the developers and confirms their fairness. :No
    • Tokens for sale ? Tokens for sale — the number of tokens offered to the participants of an ICO. :2,100,000,000 UNC
    • Whitelist ? Whitelist — a list of participants, who get an opportunity to buy tokens. To be whitelisted, you need to register on time because the number of participants and the registration period are usually limited. :Whitelist Open
    • Additional emission ? Additional emission — an additional release of tokens. It can be done once after the crowd sale or on an ongoing basis. In the projects with a limited emission there is no additional emission. :No
    • Exchange listing ? Exchange listing — an assumed date when the token will be listed at a cryptocurrency exchange. The developers usually indicate it in a roadmap and a white paper. :NA
    • Accepting currencies ? Accepting currencies — cryptocurrencies and fiat currencies that can be used for buying the project tokens. :ETH,
    • Can't participate ? Can't participate — the countries where it is prohibited to buy tokens. These can be countries where ICOs are prohibited altogether, or countries that have the requirements that a particular project does not meet. :China, Crimea, Cuba, Iran, Kuwait, North Korea, Singapore, South Korea, Syria, USA,
    • Know Your Customer (KYC) ? Know Your Customer — a verification procedure for ICO participants, during which the developers can ask for personal data, a photo and a scanned copy of a passport of a potential investor. :Yes
    Get details
  • Token and Funds Distribution

    Token distribution date

    Within 6 weeks

    Unsold tokens

    All unsold tokens will be burned.

      • Token Distribution

          Vesting notes

          • Founding Team: 18 months lockup

    Sale schedule

    Round Token Price Bonus Min / Max Purchase Soft Cap Hard Cap
    Public sale — Ended
    25 Sep 00:00 UTC
    03 Oct 00:00 UTC
    0.01 USD 10% 100 USD - 100000 USD 6,000,000 USD 21,000,000 USD
    Pre-sale — Ended
    25 May 08:00 UTC
    25 Sep 00:00 UTC
    0.01 USD 10% - 15% 2000 USD - 100000 USD Uncapped Uncapped
    Pre-sale

    2000-80000 USD - 10% Bonus

    80000-100000 USD - 15%

    Read more about vesting and bonus
    • Team

      • Tayo Dada photo
        Tayo Dada
        Founder, CEO & Cyber Security Expert
      • Phil Jackson photo
        Phil Jackson
        CTO & Cyber Security Expert
      • Nicholas Topham photo
        Nicholas Topham
        COO & CFO
      • Nick Banks photo
        Nick Banks
        Commercial Director & Cyber Security Expert
      • Steve Bardouille photo
        Steve Bardouille
        Program Manager
      • Toby Abel photo
        Toby Abel
        AI Expert
      • Brendan Sturm photo
        Brendan Sturm
        Blockchain Developer
      • Jae Chung photo
        Jae Chung
        Senior EOS Developer
      • Dean Jackson photo
        Dean Jackson
        Senior Software Developer
      • Vincent O’Neill photo
        Vincent O’Neill
        Senior Cyber Security Consultant
      • Claire Mclaughlin photo
        Claire Mclaughlin
        Head Of Marketing & Content
      • Nicola Sadler photo
        Nicola Sadler
        Marketing Manager
      • Lena Bhogaita photo
        Lena Bhogaita
        Head of Operations
      • Greg Leffel photo
        Greg Leffel
        Business Development
      • Ola Dada photo
        Ola Dada
        Community Manager
      • Atif Khokhar photo
        Atif Khokhar
        Senior Software Engineer
    • Advisors

      • Hugh Chambers
        Cyber Security Advisor
      • Asad Mahmood
        AL & Blockchain Advisor
      • Steve Godman
        AL Strategic Advisor
      • Mark Kreitzman
        Strategic Business Advisor
      • Sven Radavics
        Cyber Security Advisor
      • Tan Tran
        Strategic Investment Advisor

    Roadmap

    • Q4 2016

      Development of CSaaS - “Cyber security as a service” application for customers to perform their own security checks

    • Q1 2017

      Strategic Partnership formed with Adecco, the world's largest human resources firm to provide cyber security consultancy to public/private sector clients

    • Q4 2017

      CSaaS renamed to Uncloak

    • Q1 2018
      • Strategic alliance formed with world leading artificial intelligence software developers
      • Released whitepaper
      • Building community and strategic relationships
    • Q2 2018
      • Uncloak™ UNC token crowd sale
      • Development of cyber threat
        detection AI engine (beta)
    • Q3 2018
      • Development of bug bounty alpha
      • based on EOS
      • Launch of Uncloak channel partner model
      • Launch of Bug Bounty community
    • Q4 2018
      • Launch of Uncloak™ bug bounty alpha on EOS testnet
      • Alpha launch of Uncloak AI engine
      • Uncloak general public platform release

    Activity