Could the platform be hacked?

Published on by in Social

I have been receiving connestions about investment opportunities and dating request, I am wondering the quality of persons we have on the platform and if members are safe.

2 Answers

  1. I received several. Quite disappointing coming across that here.  

    1 Comment

  2. Please report any inappropriate connection requests/investment opportunities so we can delete and block these members. 99.9% of our members are water professionals, 75% with an advanced degree.

    Unfortunately, since the network is now so large, we also attract spammers. Every article and question is moderated. We delete and block spammers twice a day. It is possible that some get missed. 

    We have chosen to keep the network open rather than approving each member, if the incidents like you report increase, we may revisit this and close the network to referrals only. Hopefully we will not need to resort to this.

    As far as hackers and overall security are concerned:

    Any digital platform can theoretically be targeted. The real question is how it is architected to prevent, detect, and contain threats.

    TheWaterNetwork is built with layered security — combining a hardened private infrastructure today with decentralized blockchain architecture for future tokenization. In 15 years we have never had a breach, lost user data or been hacked.

    TheWaterNetwork is built on the Symfony 2 framework , hosted in a private, secure data center environment — not on public cloud infrastructure.

    That means:

    • No shared cloud tenancy

    • No exposure to common cloud misconfigurations

    • Controlled physical and network access

    • Dedicated firewall and perimeter security

    • Strict server-level access controls

    By avoiding public cloud hosting, the platform reduces exposure to many large-scale automated attacks that typically target shared cloud environments.

    Secure Communications Layer

    Internal and user communications leverage  XMPP with secure encrypted messaging

    This provides:

    • End-to-end encrypted communications

    • Secure authentication

    • Reduced interception risk

    • Encrypted message transport

    Sensitive conversations and professional exchanges are therefore protected through established secure messaging standards rather than open messaging protocols.

    Members can only message members to whom they are connected to , or who have joined a private group chat.

    Future Token Infrastructure (Planned)

    For the planned water credit/token layer, infrastructure will run on:

    Internet Computer Protocol

    This adds a separate decentralized security layer :

    • No central database controlling token ownership

    • Cryptographic transaction validation

    • Immutable ledger architecture

    • No single administrator can alter ownership

    This means even if a web layer were compromised, token ownership records remain secured on-chain.

    How We Think About Security

    The platform is designed with:

    • Layered security architecture

    • Infrastructure isolation

    • Encrypted communications

    • Separation between application layer and token layer

    • Ongoing monitoring and access control

    In other words:

    Security is built in at the infrastructure, communication, and ledger levels — not added as an afterthought.

    I hope this answers your question. 

    Feel free to connect and message me personally if not.