ABOUT US


VECAP - Our story

Vecap’s story began when one of our founders’ home network was hacked and his private information ransomed. He turned off his gaming console and disconnected it from the internet. His data was gone but with that disappearance came a strangely disturbing thought:

How many more people had that hacker targeted with the same method?

READ MORE...


 

Next generation of Smart Home





Insufficient protection

Several devices from well-known companies and other vendors have serious breaches in their security systems: unsufficient encryption, weak authentication requirements (e.g. auto-login), possibility of external connections via VPN. All it takes is one unprotected device to compromise the security of your smart home. Hackers only need to find that one breaking point to bring down your whole network.

Fast break-in

It takes hackers less than a minute to get access to smart home devices, from phones and TV´s to routers and consoles, all these machines are connected to the internet. Huge numbers of devices with zero-day vulnerabilities will be hacked as soon as the breaches become known, before manufacturers will be able to update all vulnerable smart devices.

Short-term thinking compromised long-term security.

Plenty of entry points

An average smart home owner has several smart devices and a single unprotected one is enough to compromise an entire network.

READ MORE



Vecap starts revolution in IoT security

Don’t worry, our solution is as ambitious as it is simple. We’ll use smart contract transactions to secure all internal communications within your home system. Every action on the Vecap platform will be recorded on our blockchain, in an immutable database that is nearly impervious to corruption. A hacker would have to take control of 51% of such network just to control a specific device, rendering this effort impossible by every definition of the word.

By protecting the links between each device and uniting all smart homes in a decentralised network, Vecap safeguards all private information against malicious actors. We have reached a new privacy-protecting standard, one that does not rely on built-in security functions.

READ MORE

TEAM

 
 

TOKEN DISTRIBUTION & ROADMAP

 
 
Wir benutzen Cookies um die Nutzerfreundlichkeit der Webseite zu verbessen. Durch Deinen Besuch stimmst Du dem zu.