Please, help us get better.
x

Privacy & Security

Active IDEA Banner Ads 1
Reset sorting
Project nameDescriptionRating
CryptoCash logo
CryptoCash (CIPHC)
Description
COMPLETE CIPHER TECHNOLOGY for Perfect Security, Perfect Safety which has succeeded FOR THE 1st TIME IN THE WORLD
Rating
6
TOXIC logo
TOXIC (TOX)
Description
New keyless encryption, new passwordless authentication and the highest level of security in communication and cryptocurrency finance. We will build a new level ...
Rating
5.4
BrandProtect logo
BrandProtect (BRAND)
Description
Our brand company embodied technologies of blockchain and cryptoprotaction in a real sector of the economy. We use the technology of blockchain to protect the a ...
Rating
6.3
HackenAI logo
HackenAI (HAI)
Description
HackenAI is the all-in-one continually developing personal cybersecurity application they developed to help keep the digital identity and online world safe.
Rating
7
Secured Ledger logo
Secured Ledger
Description
Secured Ledger aims to build a community governed platform that allows a public smart-contract auditing process to take place.
Rating
NA
LAOCON logo
LAOCON
Description
LAOCON is a cyber security blockchain platform.
Rating
4.4
Patentico logo
Patentico
Description
Patentico is a platform for intellectual property law.
Rating
5.5
Shyft Network logo
Shyft Network
Description
Shyft reduces the costs of compliance due diligence mandates [e.g. Know Your Customer (KYC); Business (KYB); Anti-Money Laundering (AML); Enhanced Due Diligence ...
Rating
6.5
BlockSafe Technologies logo
BlockSafe Technologies
Description

CryptoDefender for the desktop has the following features - Keystroke Encryption, Clipboard copy protection, Anti-screen capture and Anti-Clickjacking. Crypt ...

Rating
6.5
Eso logo
Eso
Description
Eso is a groundbreaking new app giving the user their own private decentralised space, secured with a private key. Every section within Eso is protected with en ...
Rating
6.7
CryptoWorkPlace logo
CryptoWorkPlace
Description
CryptoWorkPlace's mission is to design the devices and systems to protect personal data and the client’s finances all around the World.
Rating
6
NOVAM logo
NOVAM
Description

Using machine learning, probabilistic mathematics and additional methods, NOVAM's system will act without prior knowledge of the threat, to monitor, identity ...

Rating
7.9
CYBR logo
CYBR
Description
The CYBR Ecosystem is a holistic, cyber security solution for the blockchain which ensures secure smart transactions by providing countermeasures & safeguar ...
Rating
6.6
DapCash logo
DapCash
Description
DapCash is the resistant to quantum computers crypto currencies platform with different coins, rapid, secure and full anonymous transactions.
Rating
6.4
Smilo logo
Smilo
Description
Smilo is the hybrid blockchain platform that warrants transparency whilst protecting individual's personal data.
Rating
8.4
Magnify logo
Magnify
Description
The Magnify project provides an opportunity to increase the security of the funds to the highest possible level. MAGNIFY WALLET stores the crypto currency and a ...
Rating
5.3
Your Data Safe logo
Your Data Safe
Description
Your Data Safe is a Blockchain based Data Management & Rewards Platform, GDPR compliance & awareness training, data storage & virtual DPO Services.
Rating
6.3
Cloudbric logo
Cloudbric (CLB)
Description
Cloudbric is a decentralized universal security platform featuring enterprise-grade website, mobile device and crypto asset security, as well as access to a com ...
Rating
9.5
Uncloak IEO logo
Uncloak IEO
Description
Uncloak is a unique and fully scalable blockchain powered technology that enables businesses to monitor, protect themselves against and eliminate cyber threats, ...
Rating
8.5
Promether logo
Promether
Description
Promether is a decentralized privacy network that implements all the networking, security, and anonymity code that applications and platforms need to protect th ...
Rating
4.7
Infinite 8 logo
Infinite 8
Description
Infinite 8 is a disruptive software technology in the data protection market segment. Infinite 8 has 4 types of tokens: INF-8, INF8X, INF8V and INF8S.
Rating
NA
StarkWare logo
StarkWare
Description
StarkWare will improve scalability and privacy in blockchains using STARK technology, providing cryptographic proofs that are zero-knowledge, succinct, transpar ...
Rating
2.7
VeriToken logo
VeriToken
Description
VeriToken is a platform, backed by blockchain, that enables users to verify, sell, and completely control their data.
Rating
NA
Shakedown0x logo
Shakedown0x
Description
Shakedown0x is a decentralized, Ethereum based platform for sleuthing and coercion missions.
Rating
NA
Aceso logo
Aceso (ASO)
Description
The aim of ACESO is to decrease the expenses of protecting a computer from malware to a minimum, where users will no longer have to pay for software, but for a ...
Rating
8.6
SharkGate logo
SharkGate
Description
SharkGate provides security for any website using a cloud-based protective layer that repels malicious hackers from exploiting website vulnerabilities.
Rating
7.9
BeefLedger logo
BeefLedger (BEEF)
Description
BeefLedger is an integrated provenance, blockchain security and payments platform for the beef supply chain.
Rating
NA
Phantom logo
Phantom (PHM)
Description
Phantom enables new and existing private systems to seamlessly integrate and leverage the immutable & transparent dynamics of a public blockchain to enhance ...
Rating
NA
Capital Technologies & Research logo
Capital Technologies & Research
Description
Capital Technologies & Research is a decentralized private communication system.
Rating
8.3
Registry Blocks logo
Registry Blocks (REG)
Description
Registry Blocks (REG) is a fraud prevention platform, based on blockchain technology for decentralized registration of items and documents. Registry Blocks tec ...
Rating
8
MARAChain logo
MARAChain (MARA)
Description
MARAChain is a Secure Exchange of Digital Documents with GDPR Strict Compliant and Official Time Stamping, for legal and secure certification of the moment of s ...
Rating
7.7
Buglab logo
Buglab (BGL)
Description
Buglab is an Ethereum-based platform that connects companies with a global network of expert cybersecurity researchers. At the center of ecosystem, there are tw ...
Rating
8.2
BitFence logo
BitFence (HNY)
Description
BitFence Detects, deflects, and counteracts attempts at unauthorized use of information systems and gives your security team an unfair advantage over hackers.
Rating
7.8
V-ID logo
V-ID (VIDT)
Description
V-ID is a service that uses blockchain technology to make fraud with digital files impossible.
Rating
8.8
Zonafide logo
Zonafide (TOG)
Description
Zonafde® is the world's frst Digital Wallet for Securing Activities (“Zonafde Wallet”). It enables people to become self sovereign and central to their own ...
Rating
5.5
Safeguard logo
Safeguard (SGT)
Description
The Safeguard Protocol is an ecosystem that combines Machine Learning and data input sources to predict various types of workplace accidents and hazardous situ ...
Rating
7.3
Coin Governance System logo
Coin Governance System (CGS)
Description
An on-chain insurance mechanism to protect ICO investors from scams and bad practices
Rating
6.6
Eagle Project logo
Eagle Project (EGL)
Description
Eagle Project provides a decentralizing public, private and personal security through the implementation of an integrated GPS network system with a mobile appli ...
Rating
5.2
CryptoSecure logo
CryptoSecure (SECURE)
Description
CryptoSecure aims to overcome the threat facing the cryptoverse - stolen coins.
Rating
7
Tenzorum logo
Tenzorum (TENZ)
Description
Tenzorum is a key management protocol for the decentralized web. It provides the infrastructure to allow every user to interact with decentralized applications ...
Rating
4.5
Zamanat logo
Zamanat (ZMT)
Description
Zamanat is a ride-hailing and personal safety app that protects user's privacy.
Rating
6.7
XAIN logo
XAIN (XAIN)
Description
XAIN is an embedded & end-to-end secure access control platform for machine and vehicle networks.
Rating
NA
Sentinel Protocol logo
Sentinel Protocol (UPP)
Description
Sentinel Protocol is a crowdsourced threat platform to protect people against hacks, scams, or frauds.
Rating
5.4
Kryptonium logo
Kryptonium (KRYP)
Description
Kryptonium is a cryptocurrency based on Cryptonote, it has a blockchain which will provide privacy through features such as Ring CTs, I2P, Ghost and will facili ...
Rating
5.7
Pryvate logo
Pryvate (PVC)
Description
Pryvate is the app that provides duality of a cold storage and hot wallet all from one device, with a multi-purpose, online dashboard to utilize; Dapps, secure ...
Rating
5.5
ROMAD logo
ROMAD (RDT)
Description
ROMAD Endpoint Defence is a functional antivirus that is using patented approach to chase the malware.
Rating
8.4
Cove Identity logo
Cove Identity (SHEL)
Description
With Cove user can create a wallet on the phone to store digitally-verified copies, as well as the original, of the important documents, allowing to verify the ...
Rating
6.6
Hacken logo
Hacken (HKN)
Description
Hacken (HKN) is a decentralized token for cybersecurity professionals. It is based on Ethereum platform. Hacken is the first custom-tailored decentralized token ...
Rating
7.8
ProKareX logo
ProKareX (PKX)
Description
ProKareX aims to biuld the decentralized ProKareX Intelligent Home System.
Rating
4.7
Bidipass logo
Bidipass (BPD)
Description
Bidipass is a digital identity authentication platform.
Rating
8