CryptoPotato
CryptoPotato
  • Crypto News
  • Margin Trading
  • Guides
    • Bitcoin & Crypto Guides 101
    • Bitcoin For Beginners
    • Editorials
  • DeFi & NFT
  • Buy
  • Language
    • Spanish
    • Turkish
    • German
    • Bulgarian
  • Crypto News
  • Bitcoin For Beginners
  • Cryptocurrency Guides 101
  • Editorials
  • Bitcoin & Crypto Margin Trading
  • DeFi & NFT News
  • Bitcoin Price Analysis
  • Ethereum (ETH) Price Analysis
  • Ripple (XRP) Price Analysis
  • Market Updates
  • Interviews
  • Buy Bitcoin with Card
  • CryptoPotato Spanish
  • CryptoPotato Turkey
  • CryptoPotato Germany
  • CryptoPotato Bulgaria
  • Market Updates
  • BTC Analysis
  • ETH Analysis
  • XRP Analysis
  • Interviews
CryptoPotato
CryptoPotato
  • Crypto News
  • Margin Trading
  • Guides
    • Bitcoin & Crypto Guides 101
    • Bitcoin For Beginners
    • Editorials
  • DeFi & NFT
  • Buy
  • Language
    • Spanish
    • Turkish
    • German
    • Bulgarian
  • Crypto News
  • Bitcoin For Beginners
  • Cryptocurrency Guides 101
  • Editorials
  • Bitcoin & Crypto Margin Trading
  • DeFi & NFT News
  • Bitcoin Price Analysis
  • Ethereum (ETH) Price Analysis
  • Ripple (XRP) Price Analysis
  • Market Updates
  • Interviews
  • Buy Bitcoin with Card
  • CryptoPotato Spanish
  • CryptoPotato Turkey
  • CryptoPotato Germany
  • CryptoPotato Bulgaria
sp
Home » Projects » What is PolySwarm (NCT)? Decentralized Cybersecurity

What is PolySwarm (NCT)? Decentralized Cybersecurity

Author: Michiel Mulders

Last Updated Nov 17, 2021 @ 15:28
Getting your audio player ready...

[Featured]

The world is becoming more interconnected and digital. Cybersecurity is still an underrated aspect. Many nations are not aware of the major threats of this interconnected world or are just neglecting it. Even our coffee machine is connected to the internet. It is not uncommon to hear stories about companies being hacked through their coffee machine. One of the possible reasons for this cybersecurity gap is the lack of skilled cybersecurity professionals.

PolySwarm wants to create a decentralized threat intelligence market based on Ethereum smart contracts and blockchain technology. Today’s enterprises rely on an ad-hoc mixture of anti-virus subscriptions, threat intelligence feeds, and assorted dynamic analysis engines to defend against evolving adversarial cyber activity.

But even with all these subscriptions, it’s hard to defend yourself as a company because the human aspect is the weak connection. Nowadays, people bring their own devices to work (smartphone, tablet, laptop, etc.). It’s possible that an employee uses these devices for private use and accidently downloads a virus. When that employee connects to the company network, the virus gets the chance to infiltrate the company’s’ network.

Let’s take the example of ransomware. When your computer gets infected with this specific type of malware, it encrypts your data making it unusable. The attacker demands a ransom from the victim, promising to restore access to the data. CryptoLocker was the first version of this kind of ransomware back in 2013. Since then, a lot of derived and way more advanced ransomware types, like WannaCry, were developed as it became the number one threat. This shows you how easy it is to create new malware and how hard it is for cybersecurity professionals to keep up-to-date with all new threats as they are developing at a crazy speed.

PolySwarm’s Background

The idea of creating a decentralized threat intelligence market originated when PolySwarm CEO Steve Bassi noticed that talented cybersecurity experts are often tempted by the economic rewards of Black Hat (illegal) activity, rather than White Hat (legal) activity. The threat is also exacerbated by a protection environment that is notoriously “backward” rather than “emerging threat” focused. The result? A global marketplace where bad behavior is frequently more lucrative than good. To make White Hat activity more attractive, PolySwarm incentivizes good (White Hat) behavior.

In addition, PolySwarm grew out of frustration. The team had developed all these cool tools that had narrow, but, deep applications for cyber threat detection and mitigation but didn’t have a way to get them looking at real stuff the enterprise was facing. That’s why they made PolySwarm as they were one of the few security tool shops and it’s hard to get access to all of these tools through one interface. That’s also where PolySwarm comes in: it serves as one big umbrella built from a collection of the best security expertise.

Token Sale and Usage

PolySwarm’s Nectar (“NCT”) tokens form the basis of a new market that introduces novel instruments for satisfying demand for timely and accurate assertions regarding the malintent of files, network traffic, and URLs, collectively referred to as Artifacts.

Nectar’s main selling point is being able to obtain threat detection services from security professionals. The Nectar token forms the link between experts and enterprises.

The Nectar token can also be used by “Ambassadors” on the platform. An ambassador is able to post bounties for determining the maliciousness of a file, URL or other artifact.

At last, Nectar can be used by security professionals to stake their predictions against artifacts. If they are pretty sure of their findings, they can stake a lot of Nectar.

Team

PolySwarm has a very strong team starting with their founder Steve Bassi who serves clients ranging from DARPA to Fortune 500. His co-founder Paul Makowski is an expert on vulnerability research and cryptography with extensive blockchain experience. We want to add Ben Schmidt to this list. He is the director of product security as he has uncovered hundreds of vulnerabilities in widely-used products.

Challenges for PolySwarm

Security experts develop micro-engines capable of autonomously investigating and analyzing the latest threats, while attempting to outperform their competition. These engines will be used as the “proof of work” for PolySwarm as they are measuring the engine historic detection accuracy. It will be a  Scaling this and making sure the market is slick and safe for participants is the biggest challenge.

Another challenge will be to connect all the security experts and make them aware of the benefits blockchain has to offer. As security experts are highly technical people, it should be a small hurdle.

PolySwarm’s Roadmap

PolySwarm defined 5 versions of the platform in their roadmap.

V0.1 Alpha

This version includes the deployment of basic bounty smart contracts on the test network.

V0.2 Beta

The beta version will include the offering of smart contracts which will be used by security experts to offer their services. They want to implement Raiden-style channels to achieve a higher throughput and more efficient settlement for each transaction. They call these ‘Offer Channels’ which use a single channel to broadcast multiple ‘Offers’.

V0.3 Gamma

The gamma version includes a distributed, searchable registry of Workers and their capabilities. In addition, they want to provide matchmaking features between ambassadors, experts, and Arbiters (reputable threat intelligence vendors who will help to enhance the platform).

V1.0 Stable

The stable version will focus on eliminating bugs and migrate from the testnet to the main network.

Future (v2.0)

Offer a wider range of Offers and Bounties to handle more artifact types.

Pros

  • Incentivize security experts for White Hat work.
  • Combine a lot of micro-engines to create some kind of swarm intelligence.
  • Prevent security experts from doing Black Hat work.
  • One platform for offering security services and getting in touch with enterprises.

Cons

  • It will be a tough challenge to create one reliable platform which integrates all micro-engines.
  • Performance of the platform, although the Raiden-style solution will help increase performance through channels.

In conclusion

There is a growing need for security experts as our world gets more connected. By incentivizing these experts properly, many will avoid black hat activities. Their primary reason for creating PolySwarm and Nectar is to decentralize the process, allowing for greater security for everyone. The PolySwarm platform also helps security experts to get connected with large firms who are in need of professionals. The key will be for PolySwarm to develop a properly functioning platform which integrates all micro-engines developed by the security experts to get proper assessments for each security threat.

SPECIAL OFFER (Sponsored)
Binance Free $600 (CryptoPotato Exclusive): Use this link to register a new account and receive $600 exclusive welcome offer on Binance (full details).

LIMITED OFFER for CryptoPotato readers at Bybit: Use this link to register and open a $500 FREE position on any coin!

Enjoy reading? Share with your friends
Facebook Twitter LinkedIn Telegram

About The Author

Michiel Mulders
More posts by this author

Developer advocate and tech writer with a passion for blockchain, marketing, user experience, and endurance sports. A software engineer who likes Node.js and Go. If I'm not writing, I'm drinking a Belgian beer!. Contact Michiel: LinkedIn

Join Our Community

FacebookX YouTubeTelegram


Editorials
5 Best Meme Coin Presales to Watch in May 2025

5 Best Meme Coin Presales to Watch in May 2025

Toobit Review 2025: Is Toobit a Safe Crypto Exchange?

Toobit Review 2025: Is Toobit a Safe Crypto Exchange?

Hyperliquid Bridge: How to Bridge USDC to Hyperliquid

Hyperliquid Bridge: How to Bridge USDC to Hyperliquid

11 Best Crypto Presales to Consider in May 2025

11 Best Crypto Presales to Consider in May 2025

Need for Speed – Only Ultra-Fast Blockchains Will Win the Adoption Race (Opinion)

Need for Speed – Only Ultra-Fast Blockchains Will Win the Adoption Race (Opinion)

The 5 Best Bitcoin Mining Pools in 2025: Complete Guide

The 5 Best Bitcoin Mining Pools in 2025: Complete Guide

The 5 Best Crypto Staking Platforms in 2025: Everything You Need to Know

The 5 Best Crypto Staking Platforms in 2025: Everything You Need to Know

Join Our Newsletter
Become a CryptoPotato VIP
One Weekly Email Can Change Your Crypto Life.
Sign-up FREE to receive our extended weekly market update and coin analysis report
We NEVER send spam. You can unsubscribe at any time.
Invalid email address
Thanks for subscribing!
Footer Logo
About
Advertise on CryptoPotato
About Us | Contact Us | Careers
Editorial Policy
Terms of service | Privacy Policy | GDPR
More Sections
IEO List | Evaluations
Airdrops
Scholarship
Disclaimer
Disclaimer: Information found on CryptoPotato is those of writers quoted. It does not represent the opinions of CryptoPotato on whether to buy, sell, or hold any investments. You are advised to conduct your own research before making any investment decisions. Use provided information at your own risk. Full disclaimer
© Copyright CryptoPotato 2016 - 2025
Scroll to top
One Daily Email Can Change Your Crypto Life.

Sign-up FREE to receive our extended daily market update and coin analysis report

We never send SPAM. You can unsubscribe at any moment
Invalid email address
Thanks for subscribing!