'Remme is an ecosystem of Identity and Access Management products with a digital key at its heart. Founded in 2015, Remme is building the decentralized Public Key Infrastructure protocol and PKI-enabled apps to address the challenges of Web 3.0. Remme Protocol aims to become the next-generation blockchain-based PKI alternative. It is open-source and customizable to suit business needs. Remme Protocol provides a basis for establishing self-sovereign and authority-issued identities, with a host of use cases. Remme Auth is a 2-click authentication solution that allows users to securely access a website without passwords. Instead, the solution uses Web Cryptography API and blockchain technology. With the Protocol being built on EOSIO codebase, REMChain is an independent blockchain fueled by the REM token. REM is an ERC-20 token on Ethereum with the permanent possibility to swap it to REMChain native tokens in both directions.'
DERO is a new, experimental blockchain technology written in Golang with a focus on enhanced Privacy and Smart Contracts while maintaining the transparency and security of the blockchain. The goal is to create a unique state of the art blockchain technology with enhanced Reliability, Privacy, Security, Usability, and Portability by bringing together some of the best proven technologies like CryptoNote Protocol and Smart Contracts, thereby allowing for the creation of Private Smart Contracts. The Dero Project has written a unique new blockchain technology that is based on the CryptoNote protocol. Dero's goal is to create a unique state of the art blockchain technology with enhanced reliability, privacy, security, usability, and portability by bringing together some of the best proven technologies like the CryptoNote protocol and smart contracts, thereby allowing for the creation of truly private smart contracts. The Dero development team has implemented complete SSL across the Dero network which is a first on any blockchain. This encrypts the entirety of our network traffic, which greatly reduces our attack surface, while simultaneously preventing ISPs or other users from analyzing Dero’s network traffic.