Subscribe to whitelist

Subscribe
  • Progress - Nextgen antivirus solution using blockchain technology
    Read about the first
    decentralized antivirus
    built with blockchain technology
    Subscribe:
 
  • What is Progress?

    Progress Antivirus - is the world's first decentralized antivirus based on blockchain technology
    and using of PoEW Consensus!

    PoEW
    Consensus
    8
    Proof of Execution
    Work Consensus
    PRU Token
    7
    One token
    for all platform abilities
    Smart
    Whitelisting
    6
    Metahashes
    are placed
    on blockchain
    Light
    client
    5
    All operations
    processed on backend
    Progression
    Network
    4
    Network of nodes
    to process checks and mining
    Static
    and dynamic analysis
    3
    File checks are processed
    on nodes
    with static and dynamic analysis
    ML & AI algoritms
    2
    Machine learning
    and Artificial Intelligence algorithm
    Progress
    Blockchain
    1
    Datachain and
    transactions chain DB

    Concept

    The principle of its operation is based on keeping the hashlists of safe and malicious files (whitelist, blacklist) in the blockchain. When a user runs an executable file on their computer, Progress instead of antivirus runs the file against our white and blacklists. Thus, it may block or allow the launch. Progress uses a distributed network of nodes, where files are analysed and classified using neural networks, machine learning with elements of artificial intelligence, scanning for malicious behaviour.

    whitelist | blacklist PROGRESS BLOCKCHAIN CLIENTS CLIENTS NODES SUPERNODES HONEYPOTS QUEUESMANAGER ANALYZING &VERIFICATION SANDBOXED EXECUTION

    Progress's concept is based on a new generation of protection which is based on distributed cloud computing, crypto-economic properties based on blockchain, white-hashing, machine learning, AI, BigData, and network reputation effect.
    This model, combining the above mentioned technologies, will allow Progress to provide extremely effective protection and respond to new emerging threats by forming a qualitatively new paradigm in which users will become the part of the network.

    Our Mission:

    Our Mission is to make the digital world safer with Progress Antivirus.

Competitors' problems

Progress' solutions

The outdated model of using signatures

Time delay ranging from four hours to a day for creating a new signature databases lessens the protection of users' computers and increases the risk of infection

Revolutionary White-hashing in the blockchain

Progress does not use the model of classical signature databases, and the delivery of information from the blockchain is carried out in real time

Excessive load on a PC's performance

Other instead of local anti-virus detection mechanisms consume too much resources. They affect the speed of efficiency of other programs to run slower

Transfer loading to external nodes

Paradigm - to run only files which are verified by the network. The network uses AI and neural networks, thus, it reduces the infection threshold from new viruses by 85-90%

Low detection rate

Traditional antiviruses block only 19%* of new malicious attacks. They can not prevent most of attacks beforehand, they can just catch them once their database is updated

High detection rate

The combination of new and traditional detection principles, along with the high capacities of decentralized networks and AI, will increase the reliability of protection by 40%-60%

Vulnerabilities in local emulation

Mechanisms of local emulation of current antiviruses are very limited. These mechanisms are subject to various vulnerabilities which affect the detection result

Sandboxing on the nodes

Scanning and processing of malicious files is offloaded to the network node, where full emulation is used. This reduces the load on the user's PC by 70-80%

High percentage of false positives

Today's antivirus solutions use detection techniques which produce a lot of false positives for legal software due to decrese loading of a PC's performance

Low percentage of false positives

Thousands of nodes scan files to create a more accurate result in identifying viruses and verifying legitimate files. This allows a reduction in false positives




Progress Entities

Advanced & Housewife Interface

The Progress antivirus allows a user to select the usage mode in accordance with his/her knowledge level

Node Intelligent Checker Engine

The specialized software called NICE is used for analysis in the secure virtualized runtime environment

Intelligent Snapshot Analyzing

The technology that uses advanced techniques of analysis and classification according to scores of EMS

Whitelist & Blacklist

The lists which are located in the blockchain, containing meta-information about safe and malicious files checked by the network

PoEW Consensus

The model of consensus PoEW means Proof of Execution Work

Progress Wallet

The wallet with the opportunity of making transactions within the network will be integrated into the antivirus interface

Supernodes

Supernodes are verifiers in the process of achieving PoEW consensus and act as a queue manager for network-verified and pending files

Nodes

Nodes as a pipeline check incoming files to the network, receive a fee for verification and participate in the implementation of transactions within the network

Progress Blockchain

The distributed database which consists of whitelist, blacklist hashes and other meta-information that can not be changed, added unauthorizedly or deleted

Core security architecture

PSV - The module which allocates and hashes distribution vectors and delivery paths of malicious software. The meta information of the software is added to the blockchain

PVIP - The module which monitors the massive change of binary files and blocks such parasitic actions

PRP - The module which monitors the massive change of users' files and blocks such parasitic actions

APM - The module which acts as an additional level of system protection from applications which have been exposed to minor changes (they are defined by fuzzy hashes). This module protects critical system nodes such as launching drivers, accessing to the system processes, attempts to access to system files, etc.

APNW - The module which allows a user to create white and black lists of applications that the user trusts to log on to the network. Also using local cryptographic signatures a user has the ability to customize access rules for applications from the white list

PBW - The System which creates meta-hashes of secure files and keeps the data in the datachain of the Progress

PEPP - The module which prevents the exploitation of potential application vulnerabilities. The module allows to protect applications from vulnerabilities such as Heap Spray, Stack Spray, Stack pivot, LoadLibrary, Memory protection guard, Memory allocation guard, EAF protection, Code flow simulation protection, Caller check



NICE Analyzer structure






Meet The Team

Philip Pristupa

Philip Pristupa

Co-Founder & CEO, Lead Developer Ukraine, Kiev

He has 5 years of operational and management experience, as well as strategic planning and project development. More than 4 years he participated in creating the architecture of various projects and writing low-level code. He was engaged in the development of network projects with a decentralized architecture to solve the problems of traffic monetizing in the IronSource company.

Stanislav Nasirov

Stanislav Nasirov

Co-Founder & CTO, Ideas Generator Russia, Moscow

Experienced software developer
(4 years in IT security), CTO and
the co-founder of Progress.
Skilled in programming of high-load administration systems (2 years).
He was engaged in engineering and implementation of solutions in information security companies.



Pavel Konyaev

Pavel Konyaev

Head of Marketing Russia, Moscow

Curator of the course "ICO-marketing" at the British Higher School of Design. He has worked in marketing and has the experience in network international agencies, state corporations, the media and IT-holdings. Among his customers are Intel, AMD, Panasonic, Gigabyte, RusHydro, WWF.








Maxim Rybas

Maxim Rybas

Full Stack Developer Russia, Rostov-on-Don

Software Engineer experienced in cross-platform application development, UI/UX development and trading solutions improvement. Experienced in Qt/QML/С++, Qt/Android, Python, Ruby.

Robin Lindén

Robin Lindén

Cryptography Specialist Europe, Örebro, Sweden

Software developer specialising in distributed systems and cryptography. Holds a scuba licence and works in the field of robotics. Loves coffee and low-level programming. Tox core developer and contributor.

Said Raianov

Said Raianov

Network & Blockchain Architect Russia, Moscow

Experienced in p2p and network architecture development. More then 5 year of researching & developing blockchain projects.
7 years of low level С / ASM development experience.






Sardor Akhmedov

Sardor Akhmedov

Experienced QA software tester USA, NewYork

He has several years of testing automation experience. He specializes in performance, load and stress testing. Also he was engaged in UI & compatibility testing.

Roman Volovik

Roman Volovik

Backend developer Russia, Sevastopol

Roman is a huge tech enthusiast and a back-end developer. He has expert programming skills in PHP. He has 4 years of experience in web development and highload projects.

Bakhtiyar Nuratdinov

Bakhtiyar Nuratdinov

Backend Developer Uzbekistan, Tashkent

Certified Java programmer. More than 3 years in C / C ++ programming. He participated in the development of projects on information security and the creation of highly loaded systems.






Kirill Kornienkov

Kirill Kornienkov

Frontend Dev, Web Designer Kazakhstan, Almaty‎

He has the experience in designing and developing Internet services with adoption for desktop and mobile devices, and implementation of JavaScript logic. Experienced of layout in Photoshop and Sketch.

Olga Cheredova

Olga Cheredova

Graphic designer, illustrator Europe, Bulgaria

Over 5 years of professional design and illustrations experience. The University of Design and Technology education. Specification is graphic design, company branding and commercial illustrations.





Advisors of our project

advisor

Future advisor

We are looking for advisors for our project. Feel free to contact us.

advisor

Future advisor

We are looking for advisors for our project. Feel free to contact us.

advisor

Future advisors

We are looking for advisors for our project. Feel free to contact us.

Soft Cap:
$9,900,000
Hard cap:
$17,100,000

Progress Utility Token. Limited supply. All unsold tokens will be burned. 65% of tokens held by token sale contributors

Maximum amount of tokens: 1 000 000 000

Amount of tokens available for sale:  650 000 000

More information will be added soon.

Soon information about how to participate in Progress Token Sale will be available here and on https://tokensale.progression.network.

ETH and BTC will be accepted as cryptocurrencies of contribution during Progress Token Sale.

FAQ

Progression Network

Progression Network connect user's PC, Nodes, supernodes with blockchain.

Nodes

Nodes analyze incoming files, decompose them into metadata, analyze metadata and send to the "metadata - result" pool in the drive.

Supernodes

Supernodes are verifiers in the process of achieving PoEW consensus and act as a queue manager for network-verified and pending files.
Supernodes recheck metadata, write to the database (DB) the correct result and additionally add the flag CHECKED_BY_SUPERNODE. After the flag is set, the Progress network lowers the reputation of all nodes that send results which are different from those which are in the database with CHECKED_BY_SUPERNODE flag. Supernodes are controlled by Progress company.

The Conflictor

This is a conditional function block on the supernode side. It keeps track of whether there is an existing "metadata-result" record in the database:
- If there is no record, the entry is added directly;
- If there is a record and the result is the same as in the pool, then the reputation counter is simply increased;
- If there is a metadata record, but the result is different, than the conflictor sends the metadata for rechecking to the supernode.

Proof Of Execution Work Consensus (PoEW)

The Progression Network will have a hybrid PoEW + PoS system.

Results Validation

Results verification is a part of PoEW consensus, validated by supernodes into Progression Network.

Progress Blockchain

As a matter of fact, blockchain of the Progress is a distributed database - datachain. Datachain is a chain of data blocks consisting of whitelist hashes, blacklist hashes and other meta information, distributed among all nodes and stored as a merkle tree. Any attempts to modify it bypassing the verification by the PoEW model will be rejected by the network. Data in the datachain can not be changed, added unauthorizedly, or deleted due to its distribution.

DAG (Directed Acyclic graph)

The DAG (Directed Acyclic graph) is responsible for the storage and validation of transactions in the Progression Network. The DAG is an oriented di-graph that uses security mechanisms and incentives of blockchain, but without such disadvantages as high commissions,limitation of scaling and low transaction speed.

Transactions

In order to confirm transactions the DAG technology uses a mechanism, in which each new transaction confirms one or more previous transactions (parents), signing their hashes and including them into their composition.

Blochain Size

10 million records will occupy: 0,12 * 10000 ≈ 1,17 GB.
Please check whitepaper to see calculations of blockchain size.

Whitelist & Blacklist of hashes

There is no model of classical signature bases in Progress and there is no need for regular updates. Owing to the distributed cloud network, delivery of service and reputation information is carried out almost instantaneously, and the data from white and black lists is taken from the blockchain in real time.

Legal & finances

Will be updated soon.

Terms & Conditions

Will be updated soon.

Token sale

During the token-sale, the entire mass of tokens will be emitted on the Ethereum platform. After the implementation of the Progress blockchain, all holders of PRU tokens will have the option for transferring tokens from the Ethereum blockchain to the Progress blockchain with subsequent burning of tokens based on the ERC20.

The purpose of the basic emission is to collect sufficient funds to ensure a full cycle of development, public testing and promotion of the product in the market. The duration of the token-sale: 1 months. The minimum required funds: 9.9 million USD. A full amount of necessary funds for the deployment of all functionality: 17.1 million USD.

What are PRU tokens and what are they used for?

PRU - Progress Utility Token.
The main internal currency unit will be PRU. All operations within the system will be performed in PRU token. The PRU is the main and the only unit of operations in the Progress network and it is intended for internal settlements between the participants of the Progress ecosystem. The Progress network token is the ERC20 token that runs on the Ethereum platform and is supported by all its wallets, including Ethereum Wallet, Parity and others. Tokens allow to organize effective execution of tasks assigned to all participants of the Progress.

PRU functions:
1. The measure of value. All digital goods inside the system will be nominated in PRU tokens. The cost of the goods, expressed in PRU, is called the price.
2. PRU is the mean of circulation inside the system
3. Means of accumulation and saving.
4. Payment instrument

Cases of using PRU tokens:
1. Purchase and renewal of licenses of Progress products;
2. Purchase of additional modules of Progress products;
3. Implementation of microtransactions within the system;
4. Ensuring the functioning of the Progress infrastructure;
5. Payment and purchase of secure applications in the marketplace;

How to participate in the Pre-Sale/Token-Sale?

To take part in the token offering, you should simply send ETH to the token offering address. Your tokens will be sent to your sending address automatically.


* Transactions must be made from your Ethereum Wallet. DO NOT send from an Exchange Wallet.
* You can send transaction via MyEtherWallet, Metamask, Parity, Mist, Jaxx or Ledger (hardware wallet).
* To check transaction status your can use http://etherscan.io website.
* ERC20 tokens will be distributed immediately after transaction is submitted.

ATTANTION: SCAM ALERT!
WE DO NOT SEND ADDRESSES OVER EMAILS, TELEGRAM CHANNELS OR PRIVATE MESSAGES. ONLY TRUST THE ADDRESS ON OUR OFFICIAL WEBSITE PROGRESSION.NETWORK.

What is the allocation of PRU tokens?

Token sale - 50,00%
Nodes’ payment fund - 22,00%
Founders, Team, Advisors and early contributors - 10,00%
Community grants, Partnership & Bounty - 9,00%
Presale round - 8,00%
General Public beta testing - 1,00%

What is the funds distribution?

Development and general testing - 59,00%
Marketing and market providing - 21,00%
Community grants, Partnership & Bounty - 5,00%
Jurists, legal support - 5,00%
Reverse funds - 10,00%

What happens if hard cap is reached before the token sale end date?

If the hard cap is reached before the end of token sale will automatically stop, and we will end receiving contribution payments.

Can I get PRU tokens for free?

You can get PRU tokens for free by taking part in our Bounty program.

Roadmap



Detailed Roadmap



Future Evolution Vision

<