jellyspace.io Open in urlscan Pro
213.133.104.86  Public Scan

URL: https://jellyspace.io/
Submission: On June 11 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * Home
 * Team
 * Blog
   Jobs
    * AI Developer/Data Scientist
    * Blockchain Application Developer
    * Fullstack Developer

 * Access Portal


SPACE TECHNOLOGY MADE ACCESSIBLE

Suppliers
Startups
Integrators
Manufacturers
IOT/Satellites
SMEs

 1. 
 2. 
 3. 
 4. 
 5. 
 6. 


Previous Next


WE ARE A STARTUP BUILDING A PLATFORM (PAAS | AIAAS) BASED ON DISTRIBUTED LEDGER
TECHNOLOGY (DLT) TO PROVIDE SUPPLY CHAIN MANAGEMENT TOOLS AND DIGITAL
ACQUISITIONS PORTAL FOR THE SPACE | AEROSPACE INDUSTRY.


OUR FUTURE MARKETPLACE

Satellite Manufacturing, Ground Equipment

New Space/Aerospace Network

New Launch Systems

Satellite Servicing

Meteorology and SmallSats

EO Constellations

Components and Subsystems for SmallSats

Manufacturing in Microgravity and Space

Services: IoT, Media and Internet for All

Geoinformation, Data and Services

Positioning, Navigation and Timing

Test & Measurement

Space Resource Mining

Energy from Space
(Mining, Process and Assembly)

Space Habitats, Humans to Mars
(Manned | Robotic)

ISS Servicing, Space Tourism

Programming & Tech

TO GET AN EARLY BIRD ACCESS AND OFFER

Contact


CHOOSE THE BEST OF BOTH CLOUD SERVICES AND
WEB3 - DECENTRALIZATION

JELLYSPACE understands the complexity of security and discretion required in the
Space and Aerospace industry for the Intellectual property (IP) management,
i.e., whether it be your designs, catalogues or even conversations.




Our cloud SaaS portal already has you covered with


 * CMMC 2.0
 * NIST 800-171

We are currently working on bringing ENISA, CMMC 3.0 & FedRAMP Compliance.
Moreover, for the EU-Region we are fully GDPR compliant.

What does it mean to get involved and move along with the evolution of
Blockchain and its Cybersecurity mechanisms?
Decentralized architectures offer essential data integrity benefits including
wide distribution across geographies for innovative disaster resilience, as well
as resistance to ransomware and bit rot. An edge-based security model combined
with delegated proof of stake authorization provides flexible and secure access
management capabilities—meaning only you and those you designate have access to
your data.



With our Blockchain based security mechanisms and workflow:

 * Only End-to-End Encrypted users have access to data.
 * Separately encrypted path between sender and recipient is maintained through
   out.
 * Encrypted Metadata & File segments, allow you alone to know what is stored.
   Even JELLYSPACE will not know about your data & files.
 * Encrypted distributed file segments stored and retrieved from multiple
   geographic locations, avoid Single Point of Failure (SPOF).
 * Complete ownership of Encryption keys and data.
 * GDPR Compliant Blockchain for EU users



Thus, you can choose to take advantage of either or both the Cloud and Web-3
Technologies based state-of-the-art infrastructure that we are currently
developing. We use the latest research based cutting-edge mechanisms from both
these worlds. You can further read our blog on our partnership with Lisk
Blockchain here.




JELLYSPACE TOUCH BASE WITH LISK

Blockchain technologies are evolving and JELLYSPACE intends to leverage and be a
catalyst in this process by bringing it to the New Space and Aerospace Industry.
Living beings occupy and control a specific time and space, they cannot be
blended or averaged as they are part of a biological ledger inscribed through
time in their DNA codes which cannot be reversed by outside power. Our
properties and transactions compose an immutable ledger bound in time with every
entry in the cryptocosmic ledger getting timestamped. Similarly, Intellectual
Property (IP) is the DNA of an organization, and its security cannot be
retrofitted, patched, or improvised by external structures other than the owner
and its parties involved.

As Gilder’s laws of Cryptocosm state that secure positions are decentralized
ones just as human minds and DNA code are decentralized. [1] Asymmetric codes in
decentralization reproduce the biological asymmetry i.e., data coded by a public
key can be decrypted only by a private key, but the private key cannot be
calculated from the public key. Innovatively asymmetric codes that are
prohibitively difficult to break but easy to verify keep the power in the hands
of the IP owner rather than outside entities. Private keys are secure, and they
cannot be blended or changed just like our DNA that cannot be changed or
blended. They can be held by individuals and enforce property rights and
identities. Through digital signatures utilizing private and public keys to
encrypt and decrypt data a high level of safety is achieved. This also ensures
that a human interpreter is present on both the ends of a transaction and thus
making security meaningful. The owner of a Private Key (ID) can always respond
to a challenge by proving ownership of the identity of a blockchain and its
contents. Thus, in response to any government claims and charges, the owner of
the Private Key can prove his/her work and record. The owner of the IP can
always prove title to an item of property defined by a public key on a digital
ledger.

What does this all mean?
Simply your data and files are yours and the power to share it with another
entity or organization remains in your hands. There is an easy way of
determining proof of theft or crime through digital signatures and footprints.
Any other organization cannot claim your intellectual property and data to be
theirs.

MEET OUR TEAM ↗


References:
[1] Life After Google: The Fall of Big Data and the Rise of the Blockchain
Economy - George Gilder


TEAM

ALI MUSAB

Chief Executive Officer


THOMAS NEUBERT

Chief Operating Officer


ADVISORY BOARD

ROMAIN FONTEYNE



PEDRO LOPEZ SELA

© Copyright 2023 | JELLYSPACE | All Rights Reserved | Terms & Conditions |
Privacy Policy | Imprint