HAPI - Core of Decentralized Cybersecurity
HAPI is an autonomous, and decentralized standard that assumes the role of ungoverned equivalent of centralized solutions that are absent from the contemporary blockchain sphere. Specifically targeting the most controversial points and comments on blockchain technologies and decentralized applications lacking in reliant measures against money laundering, high risk-exposing investment in unreliable ventures, and general apprehension around the vulnerability of the applications built on various blockchains. The cascading expansion of the digital currency market, as well as incessant growth of adoption in the coming years, evince the need for a non-governmental but trustworthy institution of analogous security solution that in the event of unexpected malicious activity is able to actively react and mitigate, alleviate or completely preclude from happening the loss of funds.
General Framework of HAPI
The solution HAPI presents is of paramount importance for two reasons: lack of openly distributed SaaS security measures in crypto, and decentralized community-dependent voting system that defines the axis of governance, and provisions of the database. The database is crucial for HAPI protocol and its long-term growth because it will allow HAPI to be constantly front-running fraudulent activity and notify those in the system about potential dangers. Anyone can submit an illicit address into the database thus contributing to the overall “secureness” of the space. This formula is further incentivized by rewarding participants with respective native tokens of the HAPI Protocol. Practically, HAPI emboldens and encourages even uninitiated but affected people to take part in preserving a certain level of security and cybersecurity-proofness of the digital asset medium. In essence, the “collaboration of everyone” will theoretically not only create a safer environment but also will become a tremendous catalyst of awareness about cybersecurity in general. This concept is buttressed by our vision of simplifying the way people report malfeasance and malicious activity. We aspire to design a straightforward and credence-backed consortium that will be open for those willing to partake and vote in the democracy-driven modus operandi.
We also realize the obstacles in our way to creating an efficacious cybersecurity protocol whilst retaining the decentralization and non-custodial nature intact. In order to achieve that, we need to abstain from directly exposing the identity of a perpetrator even if it means, in some regards, non-compliance to regulations. The glaring issue of the centralized attempts at apprehending and halting unsanctioned or malicious fund turnover is the palpable focus on deanonymization. On the basis of deanonymization being a critical detriment to decentralization, it would be morally reproachable for a project built on these tenets to disregard them. Therefore, HAPI aims at retaining these crucial components and staying truthful to the anonymity and identity insulation by solely incurring negative consequences on the addresses and not individuals. Deanonymization is not taken under purview by HAPI Protocol therefore we do not intend to intrude into the private sector of individuals or demarcate specificities of use. Each network participant of the HAPI protocol is at the liberty of their own deliberations. HAPI Protocol itself doesn’t segregate, which in essence makes it publicly and freely distributable and accessible, into groups neither the usage of the protocol nor the users. Since HAPI Protocol is first and foremost focused on the B2B (Business to Business) area of influence, we are merely a provider of services that can be utilized indifferently to the betterment of the aforementioned “user” or “business”. HAPI Protocol is autonomous and is not a regulatory body that can enforce or impose any restrictions by itself but instead is driven by a voting system of governance.
Because of the essence of HAPI focusing on the B2B sector and, if HAPI’s use is to become extensive enough, it can be reasonably assumed that the frequency and severity of hacks can be significantly curtailed because of the fewer or no options to withdraw illicitly controlled funds.
HAPI will also be a crucial aggregator of illicit addresses and publicly distribute them across a number of CEXes and DEXes in a timely manner. This will help DEX and CEX to blacklist certain addresses from laundering money on the platform. CEX and DEX will automatically receive notifications about the address that has been flagged as risky which will create an overarching, unified system that will ensure automated up-to-dateness on fraudulence across all exchanges.