GoPlus, which has repeatedly received institutional investment and targets C-end users, wants to be the "360 security guard" of the Web3 world?

robot
Abstract generation in progress

Congratulations to GoPlus, which has just announced the successful financing of $10 million shortly after announcing the construction of a modular user security layer. This profoundly confirms one thing: the crypto market urgently needs a leading C-end security service solution to appear. Just as 360 Security Guard has elevated the security level of the Internet, ordinary users earnestly hope that the security protection of web3 after GoPlus can also be upgraded.

  1. The way GoPlus enters the web3 security field has always been inclined towards C-end services. It has developed Token security detection API services, launched the personal security service platform SecWare system for risk detection and investigation, and now it has launched the GoPlus modular user security network aiming to seamlessly integrate with other complex public chain environments, providing strong protection for individual users throughout the entire transaction lifecycle.

For example: spreading false links in batches for signature phishing; impersonating customer service for social engineering scams; developing false games to implant Trojans and steal assets; designing false airdrops or gifting NFTs for scams, etc. Hackers take advantage of the cognitive gap and the mentality of seeking cheap deals that inevitably exist among C-end users, and have designed a dazzling array of attack methods. The security threat environment in the C-end market is more complex than that in the B-end, and the challenges are more daunting.

  1. On the whole, the security problems of C-end users are in the embarrassing stage of “making up for the dead”. The recent browser plug-in hijacking incident not only made the exchanges’ risk control department “helpless”, but also made the majority of security practitioners have a “sense of powerlessness”.

Because hackers hiding in the shadows can carry out high-end live attacks on ordinary users, such as social worker attacks, upstream supply chain attacks, and Trojan fish farming attacks, which longest ordinary users are not aware of. The weak “attack surface” exposed by the C-end user market is very large, and it is not like a pure B-end smart contracts, and it is enough to sweep away code vulnerabilities. The weak point of the C-end is precisely in everyone’s network security awareness and interactive behavior habits, and it is necessary to systematically strengthen the “security layer” from the bottom of the product and service side in order to play an effective role;

**I think this is the fundamental reason why GoPlus builds an open, no-need, user-driven web3 modular user security layer, which is seamlessly integrated into major public chain infrastructures through SecNet (secure RPC) and SecHub (on-chain personal security center), so that security detection and risk investigation occur in the whole life cycle of user “imperceptible” interaction. Only in this way can we truly improve the security level of the C-end user market, and there will be real security guards in the web3 world. **

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin