VECAP - Our story
Vecap’s story began when one of our founders’ home network was hacked and his private information ransomed. He turned off his gaming console and disconnected it from the internet. His data was gone but with that disappearance came a strangely disturbing thought:
How many more people had that hacker targeted with the same method?
Next generation of Smart Home
Several devices from well-known companies and other vendors have serious breaches in their security systems: unsufficient encryption, weak authentication requirements (e.g. auto-login), possibility of external connections via VPN. All it takes is one unprotected device to compromise the security of your smart home. Hackers only need to find that one breaking point to bring down your whole network.
It takes hackers less than a minute to get access to smart home devices, from phones and TV´s to routers and consoles, all these machines are connected to the internet. Huge numbers of devices with zero-day vulnerabilities will be hacked as soon as the breaches become known, before manufacturers will be able to update all vulnerable smart devices.
Short-term thinking compromised long-term security.
Plenty of entry points
An average smart home owner has several smart devices and a single unprotected one is enough to compromise an entire network.
Vecap starts revolution in IoT security
Don’t worry, our solution is as ambitious as it is simple. We’ll use smart contract transactions to secure all internal communications within your home system. Every action on the Vecap platform will be recorded on our blockchain, in an immutable database that is nearly impervious to corruption. A hacker would have to take control of 51% of such network just to control a specific device, rendering this effort impossible by every definition of the word.
By protecting the links between each device and uniting all smart homes in a decentralised network, Vecap safeguards all private information against malicious actors. We have reached a new privacy-protecting standard, one that does not rely on built-in security functions.