Nothing is more powerful than a community driven that determined to defend against hacks, scams and frauds. Together we stand to overcome the decentralization disparity and reveolutionze it into advantage for security.

Sentinel Protocol Diagram Sentinel Protocol Diagram


Users can report suspicious incidents pertaining to malware, hacks, scams and frauds.


All reported data from the Sentinel Portal would be review and validate by Sentinels, and our security experts.


The validated data release onto the blockchain in the TRDB so that users can have real-time access to crowdsourced information on the latest security threats.


Rewards for their valuable contributions on the reports of threat intelligence data.

Sentinel Protocol

From identifying the problems in current security and blockchain industries to desigining the Sentinel eco-system and incentive scheme, the whitepaper explains the entire focus of the Uppsala Security.