scrollToTopIcon
logo
The MetaCert Protocol aims to decentralize trust and reputation for the Internet

Overview

We see a world where you feel safe opening a link. The MetaCert Protocol will relay trust and reputation information about Uniform Resource Identifiers (URIs) including domain names, applications, bots, crypto wallet addresses, Application Programming Interfaces (APIs), and content classification. Using the Blockchain, we will decentralize our centralized, categorized registry of URIs to democratize the submission, validation and dispute processes for URIs. To enable the growth, development and utility of the Protocol, we are launching the META token, which will be the foundation of a tokenized economy incentivizing users to behave appropriately while mitigating the risk of bad actors.

Project
underline

Establishing Trust Online

Who is the real owner of a domain? Is this app safe to download? Does this website contain JavaScript that will hijack my computing resources for crypto mining? Is this content safe for kids? Does this news article come from a reliable source? Has this crypto wallet address been verified? Is this a fake Twitter account? We have no single resource for answering any of the above questions that the world can trust. With the MetaCert Protocol, the trust and reputation of the Internet is placed back into the hands of people. It will be enabled through a system of checks and balances to ensure high quality participation and authentic behavior that is incentivized by a tokenized economy.

Decentralizing Trust & Reputation for URIs

It's impossible for a centralized company to scale validation of domain name ownership or reputation of Uniform Resource Identifiers (URIs) such as those referring to bots, apps, crypto wallet addresses and social media accounts. Even if they could, how do we know they can be trusted? The protocol enables economic rewards for participants to determine trust and reputation by consensus, at scale, in a way that existing crowdsourced volunteer efforts cannot.

Internet Stakeholders “Powered by MetaCert Protocol”

The Protocol’s registry is machine-readable and queryable for use by internet stakeholders including Internet Service Providers (ISPs), router vendors, crypto exchanges, Wi-Fi hotspot providers, email providers, mobile device OEMs, browser vendors, websites, and applications to help address cyber threats related to fraud, phishing, child safety and news credibility. The protocol makes it easy for stakeholders to either block Internet resources completely, or provide consumers with more information about their suitability or security level.

Product
underline

Anti-Phishing

A 2018 report by Ernst & Young found that in 2017 10% of all funds from ICOs or token sales had been stolen. The report cited phishing as the most widely used technique targeting crypto companies. MetaCert currently owns the world's largest curated list of crypto phishing websites. By integrating the MetaCert Protocol, internet stakeholders can provide better security against phishing to consumers.

Anti-Malware

Crypto Mining malware that hijacks Central Processing Unit (CPU) cycles has surged since 2017. Coinhive, one of the worst forms of new malware, positioned its code as a way for websites to make money without ads. The problem is that this code is being used without consent and there remains no robust solution to address this threat. The MetaCert Protocol will provide people who already maintain their own list, an option to participate in our decentralized solution while being rewarded with META Tokens for their work. The Protocol will enable internet stakeholders to offer consumers a choice between blocking or permitting access to these mining services.

Brand Protection

Secure Socket Layer (SSL) and Extended Validation (EV) Certificates are outdated solutions to brand protection. EV certificates are becoming easy to imitate and virtually impossible for consumers to tell the difference between a real and a fake website. MetaCert Protocol can move this verification process in a new direction, allowing Certificate Authorities and other companies to utilize better quality data. Through a social experiment comprised of over 50,000 users, MetaCert confirmed the possibility to build an entirely different solution for domain name and social media account ownership verification through a process that would reduce the risk of phishing by more than 95%. That solution is Cryptonite, a browser extension that provides users with 100% certainty of website and social media account ownership through verified URIs that we have personally vetted.

Crypto Wallet Reputation

The MetaCert Protocol can be used by internet stakeholders, including browser vendors, crypto exchanges and wallets, to combat fraud (i.e., impersonation accounts) on their platform by preventing specific wallet addresses from receiving funds. They can also provide consumers with a reputation score based on historical transaction data that is stored in the registry.

Child Safety & Corporate Content Filter

Pornography (XXX) sites generally lead to more malware infections than other type of website. MetaCert has built the world’s biggest database of classified XXX websites and user generated content across social media sites. By integrating with the MetaCert Protocol, parents, companies and Internet stakeholders can improve existing control systems or build new products that block XXX content.

News Credibility

Most consumers don't know the difference between real and fake news. This leads to society not being able to make better informed choices about who to vote for, or which news source to believe in. With some governments aiming to disrupt democracy, misinformation has become a security problem on a global scale. And brands, agencies and platforms don't want to risk their reputation by being associated with false content in their advertising. Thanks to the data provided by fact checkers and other contributors, MetaCert has curated the largest database of news reputation. We broke down our news reputation information into 'News,'Satire,' 'Far-left,' 'Far-right,' 'Alt-right' and 'Fake' categories. The Protocol can then be used by Platforms to help avoid placing ads on webpages that contain misinformation. The protocol can also be used to provide users with more information about news sources - so they can make better-informed choices about the type of content they consume.

Token
underline

Tokens for Submitters

Participants who submit URIs for classification will be awarded tokens when consensus is achieved and classification is validated. Participants will be able to submit URIs for Internet resources including domain names and URIs to bots, apps and social media accounts. Each URI is a unique submission with tokens awarded for each one.

More Than Web Security

Participants are encouraged to help with the classification of resources on the Internet, including URIs to non-security related categories. For example, participants will be awarded tokens for submitting websites that meet the criteria for 60 content category types, such as Sports, Media, Entertainment and Business.

Tokens for Validators

Participants who validate URIs that have been submitted by other participants will be awarded tokens when consensus is achieved and the classification is validated. Validators are a class of participants responsible for reviewing URI submissions before they are added to the Protocol. They are given the responsibility of validator if they have a high quality of accuracy in the categorization of submissions or are considered experts for a respective category.

Tokens for Successful Dispute

The system design includes a transparent challenger mechanism that will enable anyone to dispute any entry on the Protocol. Each successful challenge of an entry on the Protocol may result in the relevant validator and submitter losing reputation value along with token loss. A dispute may also be successful as a result of a change in classification type. For example, a website may have its classification changed as a result of a change in domain name ownership.

Tokens Rewarded Based on Work

Tokens are rewarded on a sliding scale based on the complexity and importance of the information being submitted and validated. For URIs that are more difficult and time consuming to detect, review and validate, such as a phishing website, users will earn more Tokens. Similarly, time consuming verification efforts such as verifying ownership of a resource like a domain name, bot, app, or API, will be rewarded with a greater amount of Tokens.

Domain Ownership Verification Re-Invented

Owners of Web resources such as domain names, bots, apps, crypto wallet addresses, APIs and social networks, will have the option to place Token bounty incentives so that verifiers are rewarded for their participation. This creates a signaling mechanism in which URI owners may request the scrutiny of the network’s validators for certain relevant checks. Diverse validations across ownership, domain names, and site content will begin with basic information, becoming comprehensive over time, possibly supplanting Extended Validation certificates in both usefulness and trustworthiness while extending verification beyond domain name ownership.

Pay for Services

Tokens can be used to pay for services that are provided by companies that integrate the MetaCert Protocol. For example, Rocket.Chat is a popular open source messaging platform that will build an open source security module by integrating the Protocol. Rocket.Chat customers will be able to pay for additional security services using Token amounts. They will also be incentivized and rewarded to participate in the submission and validation of URIs from inside their service.

Timeline
underline

NOTE: The key dates shown are just an estimate, and there is a reasonable chance that some or all of these milestones are delayed.
arrow
Spring 2018
Token Sale
40% of total supply for public sale
arrow
June 2018
ChainKit MVP Launch
Launch Scope: Participant Registration, authentication, URI submission, URI ledger
arrow
Late June 2018
Testnet Alpha Launch
Alpha launch scope: Seeded submitted links for validation, basic reputation rating, super validator assignment.
arrow
July 2018
Testnet Beta Launch
Beta launch scope: URI submission (via ChainKit), validator assignment, validation and token allocation for categories; Malware & Phishing, Crypto Phishing, Crypto Mining & Brand Identity
arrow
August 2018
Production Alpha Launch
Launch scope: URI submission (via ChainKit and API), random Validator assignment, ledger service, validation and token allocation for categories; Malware & Phishing, Crypto Phishing, Crypto Mining & Brand Identity.
arrow
September 2018
Production Beta Launch
Launch scope: URI submission (via ChainKit, API and SDK), SDK, random Validator assignment, ledger service, reputation service, validation and token allocation for categories; Malware & Phishing, Crypto Phishing, Crypto Mining & Brand Identity.
arrow
Late September 2018
Completed Documentation and Developer Tutorials
Scope: ChainKit User Manual, API service documentation, SDK tutorial & usage documentation
arrow
TBD
Internet Security Conference Roadshow
Events List Coming Soon

Team
underline

circularImage
Paul Walsh
CEO, Co-Founder
As the first Technical Accounts Manager and International Beta Coordinator hired by AOL outside the US, Paul was part of the team that helped to launch technologies such as AIM, X2 56K modem protocol, Internet Radio and Online Games during the 90's. He was one of the two people who co-initiated the creation of the Standard for URI Categorization at the W3C, the industry standards body for the World Wide Web, and holds a full patent for URI security inside an app WebView. He is one of the seven original founders of the W3C Mobile Web Initiative and was amongst the first invited experts to the Semantic web Education & Outreach Program. Paul is a named contributor to 8 W3C Technical Specifications. In 2003 Paul founded mobile testing and web accessibility compliance company Segala. Segala was the first test house to become an Associate Member of the GSMA, generating $2.2 million in revenue in year one. While living in the UK he was Chair of the British Interactive Media Association between 2006-2009. He co-founded Shanti Life with Sheetal Walsh (MetaCert Board member), the first international Microfinance charity to gain charity status in India - it also has charity status in the US, Canada and UK.
↓  Read More
circularImage
Ian Hayward
COO, Co-Founder
As one of the first 50 coin carrying community contributors for Mozilla, Ian sponsored engineering build and maintenance of SpreadFirefox.com (2005-2009). As Mozilla's lead community admin of that site he helped shepherd and grow Firefox's grassroots marketing community. In 2009 Ian co-founded AppCoast where he and his team built the official browser add-ons for digg, Delicious, Microsoft, Yahoo!, eBay, PayPal and Google. They also contributed to bug fixing for Firefox. Ian and his team built the first security add-on for Segala in 2005, which was formally endorsed by the W3C as one of the best implementations of the Semantic Web. He and Paul have been working together on many joint projects since then, before joining MetaCert in 2017.
↓  Read More
circularImage
Kamrul Hassan
Chief Architect, Co-Founder
As the only certified COBOL programmer in entire APEC region, Kamrul started out his career at Bank of Philippines Island (BPI) in 2000. He worked across some of Asia's largest fintech companies as a lead engineer and chief architect. He joined Segala in 2004 as a senior engineer where he was instrumental in helping some of the UK's biggest telco providers and digital agencies to build accessible websites and ads built in flash. He was also part of the compliance certification team that awarded compliant websites with the Segala Trustmark. After leaving Segala in 2011, he worked as startup CTO of Pandabed (Asian spin-off of Airbnb), which was acquired by Singtel. He also worked as technical consultant for Ayala Health arm during its foundation. Kamrul was the first Chief Architect for Compare Global Group, and creator of a financial comparison engine that powers more than a dozen financial comparison websites across the world today.
↓  Read More
circularImage
Alfonso Valdes
Sys Ops
Starting his career as a Linux Systems Administrator and Network Management analyst gaining CCNA Cisco and CEH qualifications Alfonso became a Security Specialist at Dextra Technologies working on projects for blue chip companies including Texas Instruments. Later becoming a Sr Linux Engineer for Telecommunications company Sprint Nextel where he spent 3 years optimizing infrastructure and services with: NGINX, Varnish, Memcached, APC, apache and mysql tuning, Akamai CDN, CloudFlare, Amazon CloudFront along with organizing system hardening and performing vulnerability assessments. For the past 6 years as CTO and Founder of his own specialist infrastructure company gaining valuable experience in the field of scalable architectures, distributed systems and building cloud-native applications for clients while gaining first hand of the value of entrepreneurial commitment.
↓  Read More
circularImage
Mario Alvarado
Engineer
Mario is a seasoned developer with over 10 years experience. In Costa Rica, Mario’s work with Lidersoft led to the development of Java applications for the banking sector. Prior to that he worked as a backend engineer for Citigroup and he developed drivers and product manuals for Hewlett Packard. Mario has extensive browser development experience having developed browser add-ons for eBay and PayPal. Mario previously worked with Mozilla, focusing on addon reviews and helping with bug fixes for the Firefox codebase.
↓  Read More
circularImage
Jon Orlin
Head of Content
Jon Orlin launched and ran TechCrunchTV, the video production unit for the TechCrunch blog. He also wrote more than 100 posts for TechCrunch about startups and major tech companies. Earlier, Jon founded Yahoo! Studios and oversaw the production of live shows and videos at Yahoo. He was also an Executive Producer at CNN. Jon recently built IsItFakeNews.com, a database of Fake News websites. Jon is a Board Member of the San Francisco Press Club.
↓  Read More
circularImage
Patrick Reilly
IP Attorney
Patrick is the founder of Intellectual Property Society San Francisco. He has a special commitment to encourage civic engagement with the evolution of intellectual property law, personal data rights and Internet identity. He is a graduate of the Defense Language Institute in Russian Language Studies, and has earned a BS in Sociology from the State University of New York, a BS in Electrical Engineering from the University of Toledo and a JD from Concord Law School. Patrick is a member of the U.S. Patent Bar and the California State Bar.
↓  Read More
circularImage
Satnam Narang
Director, Partner and Developer Relations
Satnam's career in the security industry spans over 10 years. Starting in 2006, at M86 Security (formerly 8e6 Technologies), he worked across a number of teams. His work included content classification, developing and quality testing signatures for their flagship product the R3000, securing data sharing agreements with third parties, researching threats on social media and managing the company's blog and security reports. In 2009, Satnam joined the Anti-Phishing Working Group (AWPG), raised attention to threats on social media, and contributed to a Social Networking guide created by the National Cyber Security Alliance (NCSA). In 2011, Satnam became a manager and threat analyst at Symantec as part of their Security Response organization. He went on to discover a Twitter spam botnet consisting of 750,000 fraudulent accounts and published a whitepaper on his findings. Satnam's research into social media scams and new, emerging threats on mobile apps helped him become a popular blogger and spokesperson. He has been quoted in print media and made expert appearances televised by Bloomberg West, Entertainment Tonight, NBC Nightly News and local broadcast networks in Los Angeles. Satnam was one of the first to identify impersonation accounts of notable cryptocurrency figures on Twitter and his work to research threats on social media continues.
↓  Read More
circularImage
Jeremy Nation
Chief Storyteller
Jeremy Nation is a writer living in Los Angeles. In 2017 he became a reporter at ETHNews and went on to produce over 460 articles. Working with a skilled team, his efforts helped ETHNews to gain recognition as a digital publication accredited for redistribution by Google News. Jeremy’s reporting focused on both the Ethereum blockchain and the cryptocurrency ecosystem as a whole. He has interviewed key industry figures and followed up on a wide range of subjects relating to cybersecurity, legislation, regulation, technological innovations, use-cases, possible scaling protocols, consensus mechanisms, international commerce, second layer solutions, and more. Jeremy’s personal interests include writing, reading, charity work, gaming, a love of cuisine, and spending time with his family.
↓  Read More

Advisors
underline

circularImage
Kieran Hannon
CMO, Belkin International
circularImage
Eyal Shaked
Owner, 888 Holdings Pvt. Ltd.
circularImage
Sheetal Walsh
Founder, ShantiLife / Dealmaker, UK International Trade, British Government
circularImage
Kumar Sripadam
Chair, TiE Angels
circularImage
Vaibhav Nadgauda
Managing Partner, Moneta Ventures
circularImage
Geir Rasmussen
CEO, Famous Four Media
circularImage
Daniel Applequist
Director of Web Advocacy & Open Source, Samsung Research
circularImage
Francey Hakes
Former U.S. National Coordinator for Child Exploitation Prevention and Interdiction, Founder, Francey Hakes Consulting, LLC
circularImage
Richard Titus
Managing Partner, Ark VC
circularImage
Ouriel Ohayon
Co-Founder, Codename Django and ISAI Gestion
circularImage
Kurt Kumar
Token Sales Orchestrator, MetaCert
circularImage
Ariel Jalali
Founder, Sensay

Partners
underline

circularImage
circularImage