ACESO will give $50 million for Community

$50 million for our community

ACESO Network is beneficial to everyone involved, both regular users and cybersecurity specialists. For regular users, it’s cheap but effective security, for specialists — a way to earn substantial income by helping malware-infected users. It may be confusing at first as to how researchers and malware analysts earn tokens, and how much income will they actually get, but this report should make everything much clearer.

It is important to note that while certain skills are required, essentially anyone could become part of ACESO. The role of a researcher will be to provide malware samples, which he/she may encounter while browsing the Internet or purposely looking for them. Malware analysts, on the other hand, will provide fixes for malware issues. Analysts are required to have knowledge and experience in the field as otherwise they will not be able to help. However, ACESO will provide guidelines and resources for those interested in gaining knowledge in cybersecurity. So what exactly are the roles of researchers and malware analysts, and how will they earn money?

Researchers

Some users hunt for malware samples for fun or for work, some encounter malware regularly because of their risky browsing habits. Whatever the case may be, we want to use that to create a significant database of malware, and in exchange for their help, reward contributors.

Researchers will upload potential malware samples or infected system screenshots to the ACESO database. The submitted samples will be analysed, and it will be determined whether they are malware. When a submitted malware sample is used by a malware analyst to develop a fix, the researcher who provided it will get 30% of the rewards offered for that fix. This means that not all submitted samples are rewarded, only those that match a fix request.

A special platform will be created for ACESO researchers to upload samples and system screenshots to. Researchers will be able to scan their computers with special software when they notice unusual computer behaviour. The information acquired from the scan would be uploaded onto the ACESO Market. The information would then be analysed for signs of malware.

The method of uploading samples or system screenshots would be made as simple and quick as possible, as would the reward distribution. The easier the process is, the more people will likely join our community, which will make it bigger and more profitable for all.

We should note, however, that we do not encourage purposely infecting computers for inexperienced users as it could result in serious damage.

Malware Analysts

A lot of skilful cybersecurity experts help out in various forums for free. They spend their valuable time helping infected users deal with malware infections but often do not even get a ‘thank you’ in return. Their skills are invaluable and we want to provide experts the opportunity to put those skills to good use and earn money.

Malware analysts are one of the most integral parts of ACESO as they are the ones who provide fixes for users. Thus, it makes sense that they are the ones who will benefit the most. For one fix, they will get 60% of all offered rewards. Because malware analysts will create fixes for malware, they do need to have special skills and knowledge. But as we’ve mentioned before, less experienced users will have the option of using ACESO provided instructions and guidelines to help them gain more skill and learn how everything is done.

Malware analysts will have the option of picking up requests from users. Infected users will even be able to pick particular analysts to fix their computers. Once a request is taken, the analyst is tasked to create a working fix. How they do it is up to them. They receive information from the infection computer, and may use samples provided by researchers, or they may find them themselves. When they develop a working fix, they get rewarded 60% of the offered reward.

How much money will researchers and analysts actually earn?

What makes ACESO different from other cybersecurity vendors is that we give back to the community and only keep small percentages of revenue. Most companies earn a lot of money and keep their profits to themselves. For example, Kaspersky earned almost $700 million in revenue in 2017, while Symantec had a revenue of $4 billion. However, what we want to do is different. We want to reward cybersecurity specialists for their hard work, while at the same time making cybersecurity cheaper for regular computer users.

One fix costs $1, so 30% or 60% of a dollar is not exactly great money. However, generally, when malware strikes, it’s not just one person that ends up infected. There are usually thousands of computers corrupted with the same malware. If those thousands of users use ACESO, they would all have to pay $1 in order to get the fix. If the same fix applies to all of them, all their payments would be put into a pot and then distributed to those who contributed to developing that fix. Researchers get 30%, malware analysts get 60% and ACESO takes only 10%.

We have estimated that in the first year, the overall income earned by malware researchers and analysts (community earnings) will be approximately $2.1 million. In year two, we expect that the sum will reach $3.5 million and will steadily increase over the years, with $7.3 million in year three, $14.8 million in year four, and $25.2 million in year five. All together it should be more than $50 million in 5 years!

If you become part of our community, whether as a researcher or a malware analyst, your skills will not go to waste. They will not only be appreciated but also rewarded. ACESO aims to create a safer cyber world, and you could be part of that. If you want to find out more about ACESO Network and how you could join, you can visit our website to access resources or read the whitepaper for a more detailed explanation.

Token vs Coin: How do they differ

Token vs Coin: How do they differ

When first getting into cryptocurrencies, you may become confused about the difference between a coin and a token. These two terms are used all the time when talking about cryptocurrencies, and many people either mix them up or refer to them as the same. They are different, however, and if you are considering getting into cryptocurrencies, you will need to understand that difference. This guide will explore what coins and token are, how they differ and what their uses are. Continue reading “Token vs Coin: How do they differ”

What is an ICO whitepaper?

What is an ICO whitepaper?

An ICO white paper is the main document that consists all main points behind a blockchain project.

In today’s cryptoworld, ICOs are so common, anyone with the littlest interest in the field will have heard of them. They allow blockchain projects to raise funds for development in a matter of days. However, not all are successful. As a matter of fact, a large percentage of them ultimately fail to raise their desired sums. However, this article is not about that. This is dedicated to one of the most important elements of any ICO. The whitepaper. Continue reading “What is an ICO whitepaper?”

PolySwarm vs ACESO Internet Security

PolySwarm vs ACESO Internet Security

PolySwarm vs ACESO Internet Security Overview

PolySwarm aims to create a decentralized marketplace where cybersecurity experts could build anti-malware engines and compete against each other to protect users. Security experts would create competing micro-engines that would “autonomously investigate the latest threats, attempting to outperform their competition”. Because this could make detecting malware threats a much faster process as experts will be concerned with being the quickest, widespread malware attacks may be stopped before they have a chance to do significant damage. Continue reading “PolySwarm vs ACESO Internet Security”

Hacken.io vs ACESO Internet Security

Hacken.io vs ACESO Internet Security

Hacken.io vs ACESO Internet Security Overview

Hacken is essentially a marketplace where white hat hackers can earn money by finding security vulnerabilities and bugs. Hacken ecosystem is comprised of 5 different parts: HackenProof, Unreported Zero-day Remuneration Platform, Cybersecurity Analytics Center, Hacken Accelerator and HackIT Conference. In short, Hacken will provide vulnerability detection services, as well as corporate cybersecurity research, and support zero-day research. In addition, it will help employees in the Hacken ecosystem with developing their own business ideas, as well as organize an annual cybersecurity conference. Hacken aims to create an effective cyber defence system that would find and repair vulnerabilities, possibly preventing major cyber disasters. Continue reading “Hacken.io vs ACESO Internet Security”

Bitcoin Wallet Hacking

Bitcoin Wallet Hacking

What you need to know about Bitcoin wallet hacking 2018

Can your Bitcoin wallet be hacked? The answer to that is without a doubt yes. However, you may be surprised to know that in a lot of cases hackers don’t need elaborate techniques to hack someone. Usually, Bitcoin wallets are hacked due to the carelessness of their owners. Here are 9 ways your Bitcoin wallet could be hacked. Continue reading “Bitcoin Wallet Hacking”

Levelnet vs ACESO Internet Security

 Levelnet vs ACESO Internet Security Overview

The team behind LevelNet aim to change the cybersecurity industry and lessen the cost of keeping a computer malware-free. LevelNet wants to combine all anti-virus technologies into one application. If successful, LevelNet would allow users to share information about malware globally in real-time, possibly preventing malware from spreading further. If a LevelNet user got a malicious file, before it can be opened, LevelNet would inform him/her about it being infected, and display all the anti-virus companies that detect it. Continue reading “Levelnet vs ACESO Internet Security”

Cryptocurrency Hackers Stealing from ICO

Cryptocurrency Hackers Stealing from ICO

Cyber criminals are stealing millions in cryptocurrency during ICOs

ICOs (Initial Coin Offerings) have become one of the most popular ways to get funding for projects, generally those working with blockchain. It is a type of crowdfunding using cryptocurrency. An ICO itself is frowned upon by many, but for start-ups that need the initial capital, it is particularly important. This is why so many start-ups have chosen to host an ICO event in hopes that they will raise enough money to develop their product. However, lack of proper regulations and lax security make them highly susceptible to hacking. Continue reading “Cryptocurrency Hackers Stealing from ICO”