Q&A (Part 2): REMME usage

Remme
Remme
Jul 25, 2017 · 3 min read

In this second part of the REMME community series of Q&A posts that will provide basic information about all aspects of the project, our focus is on the REMME technology’s usage


Q: I would like to set up your service on my website. How can I do this?

A: At this moment, we are working hard on a pilot of the project with beta testers. You can find information about pilot with detailed description of the solution from our blog. There will be more info about it soon. The final product will be available for sale in the beginning of 2018.

Q: How can I use REMME on my cell phone?

A: REMME is a solution for organizations. This means that you can only use the service on your cell phone if and when a company (web service provider, employer, etc) that serves you integrates the REMME technology. Our main focus is to help companies especially those that operate on central servers to avoid a major reason that grant cybercriminals access to personal data such as names, passwords and telephone numbers. As it was the case for Yahoo, more than half a million users of the web-based email service provided had their personal data compromised because it operates central servers which could be easily hacked.

Q: How does REMME work for multiple users with the same device/account? Would the only thing that will help identify each user be the 2FA code sent to their device?

A: You can use as many SSL certificates (accounts) as you wish on the same device. Though it is quite an unusual situation — it is better to create few users for desktop OS, so each user will have its own account with specific permissions. A 2FA activation is needed if one device is used by multiple users.

Q: I’ve read that 2FA activation is optional. So does that mean that as many users that log into a device will be granted access as long as the certificate is in the device and its 2FA is not activated?

A: Yes, without the 2FA option, anyone could have access to your account if sitting near your computer. So we highly recommend that you use 2FA. We also recommend that you turn off our inbuilt 2FA method only for using other 2FA solutions.

Q: What would happen if I need to access X service but I’m not on my computer? Would I have to download the certificate, install it, access my account and then uninstall the certificate?

A: It is one of the possible options but it is better to use special one-time certificates for that purpose. We are planning to develop such options after we are done with the main functionality.


Read Q&A (Part 1): Market and Competitors here

Have a question? Ask in Twitter, or send it to kate@remme.io

Remme Protocol

Remme

Written by

Remme

Distributed Public Key Infrastructure protocol and PKI-enabled apps to address the challenges of the Web 3.0. ⚡️Powered by blockchain⚡️

Remme Protocol

Deep dive into a blockchain-based Public Key Infrastructure

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade