DATS Project is a blockchain company that produces automated vulnerability scanning and cybersecurity solutions with high computing power for Blockchain and WEB3 security.
DATS Project will ensure that the cyber security services it develops operate at unmatched performance with high computing power. In this way, it will help build WEB3 much more securely, with far more resources than cybercriminals have.
Participants download the DATS Project Desktop application. Participants dedicate their system resources such as CPU, GPU, and internet bandwidth to the project. Through those system resources, the needed computing power of DATS Project services is ensured.
Customers can use the cybersecurity services they need through our decentralized computing power marketplace. The defined tasks are shared among the participants and completed as quickly as possible.
At the end of the service purchased, the customer has a detailed report and 70% of the revenue is shared with the participants.
Emergence of DATS Project Website Publishing
Core Team Creation Preparation of Project Documents Design Work of DATS Warriors Application
Pre-Seed Funding Opened Team Enlargement DATS Vision Design White Paper Publishing DATS Warriors Beta (Testnet)
DDOS TEST Service DDOS Certification Service DATS Warriors V.1.0 Staking Platform
Cyber Security Survey Service DATS Warriors V.2.0
Decentralized Vulnerability Search Engine First Installation of DAO Mode DATS Warriors V.3.0 DATS Marketplace Opened
Super Computer Blockchain Security
ESCROW
RISK: LOW
RISK: LOW
Participants will be able to dedicate their internet services to DDOS TEST services as much as they like. In this way eliminating the need of gray services usage when purchasing cyber security services.
If WEB3 and information systems are successful in the security tests, they will have a certificate of success with NFT.
The cybersecurity research service is quite comprehensive.
1) Scanning the devices connected to the Internet in a very short time and detecting their vulnerabilities.
2) Unique pentest experience thanks to tens of thousands of participants. (CEX, DEX, Dapp, App and Server)
3) The vulnerability feeds the search engine.
You can find more in the technical documentation.
Tens of thousands of contributors dedicating their CPU Cores will form the decentralizedsupercomputer and by this formation, many companies, corporations, academicians and students willing to improve themselves will be able to access the supercomputer by authorized boards.
The Vulnerability Search Engine is fed by the cyber security research service and detects the vulnerabilities of all internet-connected devices in the world, like their open ports, services listening to these open ports, etc. This service makes these information available to review.
Resources used in supercomputer formation can also be used in PoW based systems as %51 Attack Suppression Services and balancer in POS based systems validator intensities. All blockchain systems that are PoW and PoS based can benefit from this service. As soon as they get an attack or an intensity increment, they can activate this service by paying and placing it beside the nodes they are using. Technological requirements of this service are currently still being researched by the team. After DATS Team surveys end, Blockchain Security service developments will get started as well.
Cryptoland will be released on the basis of Ethereum platform and fully comply with ERC20* standard.
Support of this standard guarantees the compatibility of the token with third-party services (wallets, exchanges, listings, etc.), and provides easy integration.
Total token supply - 250.000.000
Participants dedicate system resources to create distributed computing power. Participants earn income from service sales in proportion to the system resources they dedicate to the DATS Project.
Thanks to the DATS DDOS Test service, customers’ dependence on GRAY services is eliminated, especially in high-dimensional DDOS test services.
When performing penetration tests, the source requests a whitelist from the target’s security product. However, cybercriminals attack with hundreds or even thousands of resources they command and can successfully bypass the targeted security product. DATS Project Pentest Service is done over tens of thousands of sources. This is much more than just a resource in the hands of cybercriminals. In this way, thanks to the methodology and computing power of cybercriminals, you can detect your security vulnerabilities much earlier than they do and take precautions.
With DATS Project Cyber Security Service and computing power, we can scan all internet-connected devices in the world in a very short time. If you register your IP addresses to the Cyber Security Service, you can instantly be informed about our detected vulnerabilities. Scanning will be done periodically. In this way, you have the chance to be one step ahead of cybercriminals.
DATS Project’s high computing power is created by the system resources that the participants dedicate. In this way, you can experience cyber security services with high computing power with pay-as-you-use method without high investment, maintenance and operating costs.
All system resources dedicated by the participants are recorded on the blockchain, allowing us to present the proof. Our customers, on the other hand, purchase computing power as they wish, by viewing the data on the blockchain, and this allows us to offer transparency.
The computing power we have created thanks to the participants allows us to develop services in different business areas. In this way, we can ensure that the participants and the DATS Project generate more income.