Home » Marketplace » Protect

Protect

Toolkit for Privacy-Preserving Data Storage on Ledgers

This toolkit is meant for data storage is a ledger-oriented solution for bridging data re-siding on a blockchain with those stored in an off-chain database. It is responsible for coordinating interaction between the backend ledger, storage, and the cryptographic library of an API service.

This toolkit was produced by National Infrastructures for Research and Technology for Greece and is available here.

Toolkit for Zero-knowledge Proofs for Ledgers

This toolkit, with the nickname SNARKY, is a Rust implementation of the Snarky Ceremonies protocol over the BLS12- 381 elliptic curve. It is the first experimental version of a production-grade library for running the protocol in real-life applications. 

This toolkit was produced by National Infrastructures for Research and Technology for Greece and The University of Edinburgh and is available here.

Toolkit for Secure Multi-Party Computation on Ledgers

This toolkit allows  libraries for two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections. The toolkit consists of two parts: 1) the first module generically allows libraries from two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections; 2) the second module is an upgrade of MPyC to add the possibility of verifying computations.

Toolkit for Mir-BFT: High-throughput Consensus for Hyperledger Fabric

This toolkit introduces an efficient consensus algorithm to Hyperledger Fabric to accommodate high-throughput applications.

This toolkit was produced by IBM and is available here.

Toolkit for Post-Quantum Secure Protocols

This enables authentication and integrity protection based on hash functions which are believed to be resilient against quantum attacks. Hash function based time-stamping can also indemnify transactions authenticated with current technology against future quantum attacks.

This toolkit was produced by Guardtime and is partially available here.

Toolikit for Anonymous Authentication for Hyperledger Fabric

This toolkit allows users to anonymously authenticate their Hyperledger Fabric transactions while supporting revocation and audit functionalities.

This toolkit was produced by IBM Research and is available here.

Sentry

The Sentry is a service that is designed to detect targeted attacks. When a targeted attack successfully breaches an organization, it is extremely important to be able to detect it is quickly as possible and thus prevent greater damage. The service includes the Sentry software installed on workstations, which finds targeted attacks and more traditional bulk malware.

USBguard

The USBguard is a service designed to protect against threats related to USB storage devices. The service provides you with USBguard devices that have four main functions for interacting with USB storage devices: file listing, scanning (Antivirus and BadUSB), file copying and secure formatting.

USBguard devices automatically fetch antivirus updates and software updates when they are connected to the internet.

The USBguard service is based on a yearly license that includes:

Quantimatter Cybertesting on-demand for SMB

Quantimatter provides a Cybersecurity testing “as-a-Service” platform using Robotic Process Automation to assess Cybersecurity maturity and mitigate exploits  in days, instead of weeks. We help Small Medium Businesses build digital resilience through vulnerability testing and automated pen testing for online infrastructures.

Catalog of TRINITY Demonstrators and Modules

TRINITY Robitcs DIHs Demonstrators and Modules

Catalogue available here.

 

Use case 1: Collaborative assembly with vision-based safety system

LEARN MORE

Pages

News

The pandemic has shown the importance of international supply chains and how dependent we are. Attacks in the virtual space may have an increasing impact on supplies in our analogue world.