Nothing is more powerful than a community driven that determined to defend against hacks, scams and frauds. Together we stand to overcome the decentralization disparity and reveolutionze it into advantage for security.

Sentinel Protocol Diagram Sentinel Protocol Diagram

Report

Users can report suspicious incidents pertaining to malware, hacks, scams and frauds.

Verification

All reported data from the Sentinel Portal would be review and validate by Sentinels, and our security experts.

Release

The validated data release onto the blockchain in the TRDB so that users can have real-time access to crowdsourced information on the latest security threats.

Rewards

Rewards for their valuable contributions on the reports of threat intelligence data.

Sentinel Protocol
Whitepaper

From identifying the problems in current security and blockchain industries to desigining the Sentinel eco-system and incentive scheme, the whitepaper explains the entire focus of the Uppsala Security.