}

First Distributed Cyber Security Platform

Security of one is security of all

Until Sale

RAISED NOW
HARD CAP 12M
SOFT CAP 1.5M

REGISTER IN LEVELNET WHITELIST AND TAKE PART IN ICO

  • First off the contributors wishing to participate in the Whitelist must register here on the site.
  • Contributors with small payments will be executed first.
  • We’ve done legal opinion from Singapore and the USA is that LevelNet is a technical (utility) token.
  • LevelNet are Approved for sale to citizens of all countries; including the USA, China, and Singapore.
  • KYC (Know Your Customer requires identification of contributors; including name, address and official document) for contributors of 20 ETH or more.
  • It is not necessary to provide detailed verification if your contribution is less than 20 ETH.
  • For contributors it is necessary to provide the Ethereum account you are going to pay from. If your Ethereum address is not provided, it will be blocked by smart contract and you can’t participate in ICO.
To participate in the ICO in Feb 01st 2018 please complete a small form and send a request for Whitelist. We’ll reserve tokens for you.

ABOUT
LEVELNET

Today’s cybersecurity solutions are limited. As one of the main providers finds a threat, it will often take significant time for that knowledge to be distributed. New malware takes advantage of this window of time to infect the greatest number of devices. LevelNet creates an integrate, global, and immediately responsive system to stop more malware and earlier than heretofore possible.

As new cyber-security systems emerge they seamlessly integrate into the LevelNet network to further enhance overall protection.

If you have ever contemplated the inner workings of Cyber Security or you are a fan of new revolutionary technologies, take a look at our White Paper!

PROBLEM

The threat of malware has existed since the dawn of the computer age. As technology has advanced, so has the sophistication of the viruses, exploits, and other attacks meant to harm our personal data. Unfortunately, traditional anti-virus software has failed to progress in tandem. In many cases, such software is no longer able to sufficiently keep up with the constant influx of new malicious software that plague that digital world.

Different anti-virus services discover issues as diverse times, meaning not everyone is protected at the same rate. The process by which updates are provided to guard against these new threats is complicated, and leads to many users being left unprotected for extended periods. Programs must first be informed of new threats to quarantine. Then, the developers create an update for the customers, so that their software will be able to look for the updated library of attacks. Customers must accept the update before their computer can be protected.

This ever-repeating timeline of events has made it nearly impossible to provide up-to-date protection to individual consumers on a global scale.

SOLUTION

LevelNet provides a simple and elegant solution.

It is clear that there is a need for an effective, real-time cybersecurity solution using all relevant data available from multiple cybersecurity platforms and anti-virus software applications.

Our platform is able to integrate any current cyber-protection solution for enhanced protection. Rapidly detect time-sensitive cyber threats while on our Network. Disrupt current threats while enhancing security measures against future ones. Protection of one is protection for all.

While you're reading this, attackers are persistently working to infect your device.

HOW IT WORKS

LevelNet is an informational security network where connected users exchange information about IT security incidents (viruses and any other computer threats) detected on their device. Information exchange happens in real time with other members connected to the network to prevent further attacks of malicious software.

Device threat detection is done by monitoring the response of alien protection systems installed on the user device. Protection system response is analyzed by the client program and other means of analysis, located both on the users device and outside, on other nodes in the Network.

KEY FEATURES

  • Block Viruses and Hackers in real-time

  • Works with existing software to enhance your protection

  • As a single user detects a threat, the entire antivirus Network updates within a matter a minutes

  • Information exchanges between users allows for real time threat detection and protection for everyone.

  • Protect your private data

  • Risk Assessment

ICO
DETAILS

  • TOKEN NAME

    LVL

  • Phase 1

    Non-investment

  • Description/Rights

    Token owners will be able to use LevelNet services, the LevelNet ecosystem, and all its products, in addition to receiving use of intellectual property rights. Possession of the token gives access to the Buyback Fund and MoneyBack funds secured by a smart contract based on Ethereum. It will be possible to exchange tokens for crypto shares in the second phase of the project.

  • Payout Structure

    A smart contract allows token owners to receive payment from the Money Back and Buyback funds starting from the 60th day after the offering.

  • Quantity of tokens issued

    15 000 000

  • Nominal Value of single token

    $1.00 USD

  • Conditions

    Tokens not sold during the TOKEN OFFERING are destroyed. All tokens are pre-mined.

  • Funding Requirements
    Soft cap
    Hard cap


    $1.5M
    12M

ICO
STRUCTURE

FUND DISTRIBUTION

The establishment of these funds depends on the the amount of issued tokens that are sold.

    Funds % of total raised

    • Money back guarantee Fund -
    • Buyback Fund -
    • Development & implementation Fund -
    • Operations Fund -
    • Reserve Fund -

    TOKEN DISTRIBUTION

    • 85%
    • 5%
    • 5%
    • 3%
    • 2%
    • 85%Investors
    • 5%Advisors
    • 5%Options pool
    • 3%Wings
    • 2%Bounties

    BOUNTIES See conditions

    • Facebook
      15%

      Likes & reposts

    • Twitter
      10%

      Retweets & follows

    • Bitcointalk
      35%

      Signatures & translations

    • Blogging
      30%

      Writing articles

    • Reddit
      10%

      Upvotes

    ESCROW

    • Oleksii Matiiasevych
    • Pending
    • Pending

    ICO and PRODUCT ROADMAP

    May-June 2016

    Idea born

    February 2017

    Friend and Family Round

    April 2017

    Prototyping backend
    on Google Cloud platform

    May 2017

    Second prototype. Choice of a contractor for back-end development.

    January 2018

    Initial Token Offering

    November 2017

    Pre-sale TOKEN OFFERING

    June 2017

    First public announcement (tech white paper, presentation, etc.)

    June 2017

    Begin preparation for crowdfunding

    February 2018

    LVL Token Listing Starts

    February 2018

    Start of Payouts

    July 2018

    Close of Alpha Version

    August 2018

    Start of LVL Token Exchange

    September 2018

    Open beta version

    September 2018

    End of LVL token exchange period

    August 2018

    LVLS Token Listing in Exchange 2

    August 2018

    LVLS Token Listing in Exchange 1

    September 2018

    Election of board members from among LVLS token owners

    October 2018

    Release candidate Version

    December 2018

    RTM

     

     

    OUR
    TEAM

    MANAGEMENT & ADMINISTRATION

    • Pavel Shkliaev
      CEO/Founder
      Security design & analyze
      Security software architect
      Multiple tech start-ups in US and RU EntrepreneurX2
    • Alex Bodiagin
      CTO/Founder
      Networking & driver development Security software architect
      System programming
    • Anton Aksenov
      COO
      Successful entrepreneur
      MBA
      International operations
    • Arthur Eolyan
      CLO
      Tax Law
      Corporate Law
      International Law

    TECH

    • Ivan Krivonos
      Software engineer
      Linux System Developer
      Security design
      Osx system developer
      Gypervisor Achitect
    • Alexey Kudryavtsev
      Software Engineer
      Windows low level developer
      Malware researcher
      Security software architect
    • Alexander Volkov
      Software engineer
      Windows Low level developer
      Authoring 0day exploits
      Malware researcher
    • Andrey Baranovich
      Security Engineer
      Binary hacker
      Security researcher
      Linux system developer
    • Goshko Stanislav
      Security Engineer
      Security researcher
      Strong assembler developer
      Binary hacker
    • Boris Solovyev
      Software Engineer
      System developer
      Malware research
      Automatization
    • Anton Leshchenko
      Software Engineer
      Linux system developer
      Networking & drive dev
      Embedded systems
    • Ivan Novikov
      Traffic and Data analysis
      SEO
      Google Analytics
      Advertising

    ADVISORS

    • Dave Anderson
      Former Director
      Solutions Marketing
      McAfee, Voltage Security
    • Nick Bilogorskiy
      Sr. Director,
      Threat Operations at Cyphort, ex. Chief Malware Expert @ Facebook
    • Kris aka myschh
      Security Expert
      Senior Reverse
      Engineer McAfee,
      Check Point
      Software Technologies
      R.I.P.
    • Andrey Zamovskiy
      Chief Blockchain Architect
      Ethereum Architect, CEO, Ambisafe, Inc
    • Tatiana Abgarian
      Corporate Counsel
      Productive, versatile attorney with more than 10 years of international business experience.
    • Daniel Fadeev
      Marketing / data analyst
      Successful entrepreneur
      International communications

    FEATURED PRESS

    Referal program