Decentralized Security Suite

The World says "Yes!" to Block Shield! The first decentralized security software that has been designed and developed to reflect the unique nature of the security against all sorts of internet threats and charged by featured modules to secure all devices.

Token Presale
Starting Soon !

  • 00
    Days
  • 00
    Hr
  • 00
    Min
  • 00
    Sec

  • We accept BTC, ETH, LTC and Other


    1 USD = 10 BST

    (Blockshield Token)

Blockshield brings highest level of protection from cyber threats

About us

Blockshield is the world’s first decentralised cyber security suite. It’s a bundle of decentralised applications (a.k.a. DAPS) which protects all devices capable of connecting to the internet. It’s implementation is not limited to desktops, laptops, tables and phones; it protects all type of IoT devices too.
Blockshield is an open source product, designed and developed by the community with the help of funding received from all over the globe. As a result it will be available for no cost to everyone. The latest version of application can be downloaded from official sources for Windows, Mac-OS, iOS, Android and Linux to begin with.

Our Mission

Our mission is to make the internet a safer and secure place to surf and transect. To build an open source decentralized application created for the people by the people, which remains free for lifetime. To create a bundle of platform independent applications which are capable of protecting from internet worms, viruses, adware, spyware, malware, trojans, ransomware, scareware and more. Applications capable of protecting not only the today's PCs, Laptops, Phones, & tablets but the IoT devices which are fast growing in the world.

Need to understand cyber threats before fighting them


Cyber threats in all forms have been troublesome for decades. With the growth of Internet connecting Devices or IoTs (Internet of Things), the threat is not only growing in numbers but in its severity as well.

Most of us are aware of the term 'Ransomware'; lately, it became a very popular term. It is a method by which cybercriminals make money. They induce a malware to alter your computer system in such a way that you’re unable to get into it normally, which means you can not access your user account and your data inside. The malware then displays some kind of a screen that demands payment to give you access back to your computer. Access to your computer is literally ransomed by the cyber-criminal.

In the near future, the severity of this concern becomes very high when a hacker hacks into someones medical device like a pacemaker or a ventilator machine. The picture can be dirtier and cruel than we can imagine.
There are a lot of facts and reports available to prove the involvement of many existing Internet security companies in creating more threats to keep the business booming. The unethical hacking community is growing as well with our without the support of anti-social elements.

Read More

Types of Cyber Threats

Virus Attacks This term refers to the condition of a file after a virus, spyware, or malware has inserted malicious code into it.
Spyware/ Malware Short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software.
Trojans In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.
Ransomware Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Advanced Persistent Threats (APT) An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity.
Botnets A botnet is a number of Internet-connected devices, each of which is running one or more bots.Botnets can be used to perform distributed denial-of-service attack (DDoS attack).
Distributed Denial of Service (DDoS) DDoS attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
Wiper Attacks A wiper is a class of malware whose intention is to wipe the hard drive of the computer it infects.
Man in the Middle (MITM) In cryptography and computer security, a man-in-the-middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Intellectual Property Theft Intellectual property theft involves robbing people or companies of their ideas, inventions, and creative expressions—known as “intellectual property”—which can include everything from trade secrets and proprietary products and parts to movies, music, and software.
Identity Theft Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.
Theft of Digital Money Digital currency (digital money or electronic money or electronic currency) is a type of currency available only in digital form, not in physical (such as banknotes and coins).

Our Partners

Coindelite
House of Accounts LLC.
Quickdesk Solutions Ltd.
Cryptofame
Wecryptofy

Coming Soon!

Become a Partner

Coming Soon!

Become a Partner

Coming Soon!

Become a Partner

Token Distribution

Distribution to Community (70%)

Reserved Funding (15%)

Founders & Team (9%)

Advisors (3%)

Campaign (3%)

Cost of 1 Token BST : 0.10 USD
Total Token Supply : 72 Million BST
Softcap : 10 Million BST
Ways to purchase tokens : Bitcoin (BTC), Ethereum ( ETH), Fiat Currency

Join us right now and get 30% bonus Token!

We are in Media!

Token Sale Distributions

Pre ICO Sale

25-30%


Bonus Tokens

15-20%


Bonus Tokens

10%


Bonus Tokens

5%


Bonus Tokens

Timeline

FAAAQs

Frequently Ask And Answer Questions
Blockshield is the world’s first decentralised cyber security suite. It’s a bundle of decentralised applications (a.k.a. DAPS) which protects all devices capable of connecting to the internet. It’s implementation is not limited to desktops, laptops, tables and phones; it protects all type of IoT devices too.
The pre-sale starts on January 05 and ends on March 30. You can receive up to a 30% token bonus for purchases during this time period. If you need an exclusive offer please contact us: offers@blockshield.io
Supported payment methods are Bitcoin (BTC), Ethereum (ETH) and fiat currency. You need to register yourself on www.blockshield.io
Minimum token purchase amount during the token sale is just 100 BST tokens.
Do not send ETH directly from an exchange (e.g. Coinbase/Poloniex) or using the Jaxx wallet. We will not be responsible for ETH sent from an exchange or incompatible wallet.
During the Pre-Sale (until March 30, 2018) you can purchase BST with USD, GPB, EUR, BTC and ETH. During the crowdsale, BST can only be paid for with ETH.
During the token sale, 1 USD will be approximately equal to 10 BST (1 USD ≈ 10 BST).
24/7 Support
24/7 Support
Our expert support team is always ready to help you. You can use Live Chat or our Ticket system to resolve your issues.
Documentation
Documentation
Check out our detailed online documentation and useful video tutorials to find out more about Blockshield.
Forums
Whitepaper
Click here to download White.