A Call to cyber experts; 5 things about Sentinel protocol

in cybersecurity •  6 years ago 

People matter; Both proponents and skeptics of the blockchain technology or any idea for that matter should continue to passionately make their cases, while acknowledging that one of the grounds we can all find commonality is that we can’t stop technological advancement. We can ignore or berate it, but it will continue to advance. Our best bet is to join in and shape it, we all have a stake and at this stage we can still join in as co-developers and help shape the future or we can sit on the sidelines and submit to others shaping our destiny. This acknowledgement of the need to bring people together is one of the four main things that stand out about Sentinel protocol project.
ByTirza van Dijk on Unsplash.jpg

Collaborative and connective intelligence focus; this project is coming out of the stalls asking for your input as the cyber-security community. The realization from the get go that a great idea is only an idea but there is no substitute for a collaborative community of experts around a vision hopefully puts a demand on a little bit of your attention and inspires you to lend it just a little bit of your intellect.

Connective intelligence; this bottom up approach to connect the cyber security community with the blockchain community (even if they are one in reality) is awesome. In that it is allowing our traditional cyber experts to get a head start on solving blockchain security in preparation for when it inevitably becomes more mainstream. This is a win-win scenario, Sentinel protocol provides an awesome NorthStar and yet also a collaborative bottom-up structure to tackle todays blockchain security that is causing a lot of financial and reputational damage that will soon be amplified exponentially with greater integration and adaptation.

sentPro1.JPG

Connecting data; the distributed ledger system is a great foundation whose advantages have been taken and used by criminals to defraud and hurt the blockchain community deeply. Taking the same data and connecting it in such a way that it exposes and stops the bad actors is the simple vision and use case scenario for Sentinel protocol for both the individual and the enterprise user.
Concepts application; the most complex mathematical equation is just another snippet without a conceptual application and relation to an already known concept, and with sentinel protocol, cyber experts will have a live laboratory to work with and solve real problems.
So please join in this project or at least give it a sniff test

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!