xatoxi.app
Open in
urlscan Pro
185.25.252.67
Public Scan
Submitted URL: https://citizenstar.network/
Effective URL: https://xatoxi.app/citizenstar/index.html?v=2.5.10&page=landingcitizenstar
Submission: On December 09 via automatic, source certstream-suspicious — Scanned from DE
Effective URL: https://xatoxi.app/citizenstar/index.html?v=2.5.10&page=landingcitizenstar
Submission: On December 09 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Nodes Basix Projects Tech Blockchain 101 Quantum 101 About Contact Us Register Language SPANISH ENGLISH Launch App Quantum Resistant Network™ Decentralized Exchange and Trading of Cryptocurrencies Feeds Blockchange - 32 m ago Corruption in the case against Sam Bankman-Fried? Quantum - 32 m ago Quantum Computing Could Create Light-Controlled Memory Tech Privacy - 32 m ago Should you delete your Facebook? Here’s what a privacy expert thinks Blockchange - 20 m ago Corruption in the case against Sam Bankman-Fried? Quantum - 10 m ago Quantum Computing: Stabilizing qubits at room temperature Privacy - 32 m ago Should you delete your Facebook? Here’s what a privacy expert thinks Statistics Node - 1 Users - 2,456,786 Tx speed - 4.8ms Block - 546.345 BTC - $42,567 ETH - $2,566 XATOXI VERITI CITIZENSTAR XAPIEX QACAO Read More Absolute privacy without anonimity Tourist Email address Mobile number Resident Full name Age Facial verification Citizen Proof of address Proof of ID DECENTRALIZED EXCHANGE AND TRADING OF CRYPTOCURRENCIES CUEDEXCommunity PoolSelf-GoverningLiquidity What is it? CUEDEX is an untraditional hybrid decentralized exchange dedicated to quantum-resistant digital assets. Unlike traditional exchanges that decide what assets are traded on a “pay to play” structure, XATOXI delegates all coin offering decisions to the users. What is it? The peer-to-peer Community Pool-driven exchange empowers users to decide what is allowed in their ecosystem. Periodically, the latest quantum coins are listed for users to vote on, and the majority decision determines if the coin is added to the exchange. Benefits This self-governing coin offering choice system allows high user engagement and encourages users to research incoming coins to increase technology awareness. Knowledgeable users are less inclined to speculate and are more willing to contribute and invest in technologies they understand. By delegating decisions to the users, the curation process favors coins with high interest and motivates liquidity providers to supply liquidity pools. User-Provided Liquidity All the exchange's liquidity is provided by our members; therefore, it's important to let users decide which currencies and currency pairings are of most interest to them. A highly engaged and empowered audience is more likely to contribute to the ecosystem, and we incentivize our users to help us build our community. Equal Access to Initial Liquidity Once a coin is voted onto our trading platform, the initial liquidity will be available for purchase equally among members. This ensures every member has the opportunity to buy the same amount of every new coin when it's first listed, avoiding mass buying and price manipulation at each coin's launch. Remaining Liquidity Any liquidity not purchased from the initial democratic “coin offering” becomes available on a first-come, first-served basis at market price. BASIX QSTARQCHATQVAULTQBLOCKQASHQLAN What is it? Human Verification Process: All users must pass the QSTAR verification process before being granted access to selective dApps. The verification process is centralized but non-human (AI processed), to respect and augment the privacy of each user/node. No anonymity is allowed. The Process of Human Verification begins now! Bronze Star (Basic Registration) 1. Email Address. 2. Mobile number. Silver Star (Citizenstar members - Crypto 2 crypto) 1. Full name. 2. Age. 3. Facial verification. Gold Star (Xatoxi Members- Fiat 2 crypto 1. Proof of address. 2. Proof of ID. What is it? Quantum Encrypted P2P Decentralized Communication Channel Between Users. VERIFICATION: SILVER STAR (Citizenstar members) Innovation 1. Initiate request to open communication channel between nodes/users and/or multiple nodes/groups. 2. Each communication channel shards into an independent block controlled by the nodes/users involved. 3. Each user controls each bit of data shared with other users/nodes. 4. Users can decide to delete any bit of data shared with other users in the block, and with an unanimous vote, the block self-destroys. 5. Quantum Encrypted P2P Decentralized Communication. What is it? Quantum Encrypted P2P Decentralized File Sharing & Storage. VERIFICATION: SILVER STAR (Citizenstar members) Advantages 1. Store data in a Quantum Encrypted P2P Decentralized Vault. 2. Partitioned file sharing and storage on different network nodes. 3. Share files with other users/nodes, while keeping control of each bit shared. 4. Insure sensitive data in a hybrid centralized/decentralized Quantum Encrypted Vault. 5. Quantum Encrypted P2P Decentralized File Sharing & Storage. Always available 24 hours a day, 365 days a year, safe and reliable. We believe in absolute privacy, not anonymity. What is it? Block Explorer -Transaction Navigation System . VERIFICATION: SILVER STAR (Citizenstar members) Advantages 1. Navigate and search ALL transactions in real time. 2. Verify interactions between nodes/users. 3. Instant access with absolute transparency to all analytics. 4. UI/UX in 3D graphics. 5. Explorer - Instant access. 6. Navigate and search ALL in one hand. Be free always in real time. 7. Block Explorer for all register user that have completed the human verification process. Always available 24 hours a day, 365 days a year, safe and reliable, with true quantum resistance. We believe in absolute privacy, not anonymity. What is it? Instant access to Approved quantum-resistant digital assets, FIAT, bank accounts, and credit cards. VERIFICATION: SILVER STAR (Citizenstar members) Advantages 1. P2P Trade, Buy and Sell Quantum Resistant Digital Assets. (powered by CUEDEX). 2. Send digital assets to users/nodes. 3. Manage quantum asset portafolio. 4. Manage bank accounts and credit cards to access ALL FIAT micro-services - GOLD STAR (Xatoxi Members). 5. Instant access to Approved quantum-resistant digital assets. 6. FIAT, bank accounts, and credit cards. 7. All in one hand very easy and fast Your freedom and safety is our priority. What is it? Privacy Management (Coming Soon..). VERIFICATION: STAR (Citizenstar members) Advantages 1. Coming Soon… 2. Coming Soon… 3. Coming Soon… 4. Coming Soon… 5. PRIVACY MANAGEMENT… 6. Your data is yours and no one else is responsible for your security, your freedom and the right to choose the safest method for you and those around you. The freedom of privacy is an undeniable right without being anonymous you can be totally privat PROJECTS BASIXVERITI.GLOBALCITIZENSTARXAPIEXQACAOQDAX Xatoxi dApps - Quantum Safe Space Quantum Safe Space with freedom of inclusion and free choice for all. The freedom of privacy is an undeniable right. For all registered users much more. DApps 1. QStar: Human verification process. 2. QChat: Quantum Encrypted P2P Decentralized Communication Channel Between Users. 3. QVault: Quantum Encrypted P2P Decentralized File Sharing & Storage. 4. QBlock: Block Explorer. 5. Qash: Instant Access to Approved Quantum Resistant Digital Assets, FIAT, Bank. Accounts and Credit Cards. 6. Qlan: PRIVACY MANAGEMENT (COMING SOON…) Truth is power - The truth is free The truth will always make you free, free to choose, to think, to decide about your future. freedom is for everyone equally we all have the right to express ourselves freely and receive timely and clear information. The information must be shared verified sincere and free of prejudices, it is your freedom to choose. Advantages 1. Privacy. 2. Quantum. 3. BlockChain. 4. Defi. 5. Humanity. 6. Truth is power, the truth is free. Quantum Privacy to the Core. (No Anonymity) Be a member of this select group and enjoy its benefits. Your privacy is the most important thing to us. Privacy is an undeniable right, you can be totally private without being anonymous. Advantages 1. Basix: Xatoxi dApps - Crypto to Crypto Only. (QStar, QChat, QVault, QBlock, Qash, Qlan). 2. Verification: Silver Star. 3. Quantum Safe Space: Quantum Resistant (p2p) Network. 4. Governance: XAPIEX Constitution. 5. Tech: Cuetum Encryption Protocol. 6. Blockchain: Mobile Compatible Peer to Peer (p2p) Quantum Encrypted data transfer and storage Quantum Privacy to the Core. (No Anonymity) The Human Experience The human experience of choosing to be free in its entirety is a 100% decentralized government, where we are all part of its growth and development equally. Freedom is your right that must be sacred, having the right to participate directly in the decisions and works of government is your duty. Advantages 1. The first Decentralized Constitution. 2. Increase the philosophy of Democracy and Freedom. 3. Focused on enhancing the human experience. 4. Full implementation of Decentralized Governance. Quantum Gold Pegged Digital Asset Feel the need to be free to trade in a unique transparent secure ecosystem with quantum resistance, You will always be free to choose, the security of your data is an absolute priority. Transparency in the transaction is the rule, the total security of your transactions is your right and we will fulfill it. Advantages 1. Coming Soon! 2. Coming Soon! 3. Coming Soon! 4. Coming Soon! 5. Quantum Gold Pegged Digital Asset! Quantum Decentralized Asset Exchange Owners of unique technologies to make your life freer more secure for a more uncertain future, but with the security and transparency that we can offer you. We are unique and special, a secure and reliable ecosystem, where user freedom of decision is what matters. Advantages 1. Quantum Decentralized Asset Exchange Protocol. (CUEDEX). 2. Quantum Encryption Protocol with ZKP layer (CUETUM). 3. 3D UI/UX (CUESPHERE). 4. Quantum InterChain Communication Protocol (CUEZERO). TECH CUEZEROCUENTUMCUEGRAPHCUESPHERECUEDROPCUEBLOCKCUEDEX Quantum Interchain Comms Protocol Truly decentralized communication exchange with quantum resistance and a huge future ahead. compatible with light and mobile devices. Fully secure, focused on quantum resistance protection, a matter with an important future.. Advantages 1. Lightweight and mobile compatible. 2. 100% Ansi C. 3. P2P Protocol + Quantum Resistant Encryption (Cuetum). 4. Layer 0. 5. Quantum Interchain Comms Protocol Proprietary Quantum Encryption Protocol Owners of a unique futuristic and real protocol with dimensions of proven quantum resistance, with 100% proprietary technology. With the highest standards in development. Advantages 1. Lightweight and mobile compatible. 2. 100% Ansi C. 3. Proprietary Quantum Resistant Key Generation. (ZKP + Private key+ Public Key). 4. Proprietary Quantum Resistant Encryption (In development). 5. Compatible with PQ-Crystals-Kyber (kyber512, kyber768, kyber1024). 6. Compatible with BIKE: bikel1, bikel3, bikel5. 7. Compatible with FrodoKEM: frodo640aes, frodo640shake, frodo976aes, frodo976shake,frodo1344aes, frodo1344shake. 8. Compatible with HQC: hqc128, hqc192, hqc25. AI Graph Network - Quantum Resistant Network Graphic network with artificial intelligence making your life easier and free to choose of your own free will, light and compatible with all mobile phones, even low-end. With 100% proprietary technology, with the highest standards in development and with quantum resistance encryption, it's really worth it. Advantages 1. Lightweight and mobile compatible. 2. 100% Ansi C. 3. Graph running deep learning + P2P (CueZero) + Quantum Resistant Encryption (Cuetum). 4. Quantum Resistant Decentralized Network. 3D Low level Graphics Engine Very low level 3d graphic engine that allows modeling 3d structures with less consumption of computer resources, light and compatible with all mobile phones, even low-end, with 100% proprietary technology. With the highest standards in development of the market. Advantages 1. Lightweight and mobile compatible. 2. 100% Ansi C. 3. Web (WebGL) + Android (OpenGL). 4. UI/UX. 5. 3D Low level Graphics Engine. Decentralized Block Sharding Data Storage A drop of power in your hands to transfer share data safely and efficiently with quantum resistance encryption. Efficient, light and compatible with all phones, 100% decentralized, secure and private without being anonymous. Advantages 1. Lightweight and mobile compatible. 2. 100% Ansi C. 3. Block SHARDING + Quantum Resistant Encryption (Cuetum) + P2P (CueZero). 4. Distribution, De-Construction & Construction of Data Blocks. 5. Decentralized Block Sharding Data Storage Block Creation Data Structure A building block to create secure private data structures that are efficient and easily accessible to users. An efficient untra secure block with quantum resistance encryption. Light and compatible with all, 100% decentralized, private without being anonymous, creates a unique and efficient structure safe reliable with all the freedom you. Advantages 1. Lightweight and mobile compatible. 2. 100% Ansi C. 3. Quantum Resistant Encryption (Cuetum) + Block SHARDING (CueDrop). 4. HashBased Blocks Data Structure (Put / Get). 5. Block Creation Data Structure. Quantum Decentralized Asset Exchange Protocol The security of your data and transactions truly protected, only you and only you have access to them, freedom is your right, choosing the best for your security is your objective and our goal.. Advantages 1. Blind Order Books. 2. P2P Atomic Swaps. 3. Scheduled execution of partial trades. 4. Logarithmic partitioned orders. 5. Quantum Decentralized Asset Exchange Protocol. 6. Asset exchange in a 100% reliable secure protocol and ecosystem where you have the power to decide. BLOCKCHAIN 101 Blockchain FundamentalsCryptographyBlockchain TechnologyIntroduction to CryptocurrenciesRisks and challenges Blockchain Basics -Distributed Ledger Technology Blockchains are a type of distributed DLT database (Distributed Ledger Technology) Designed to record, communicate, and transact information without the need for a central authority. It is impossible to discuss modern encryption without diving into the revolutionary technology of blockchain that emerged in 2009 with the birth of Bitcoin. It is relevant to point out that there are 2.5 quintillion bytes of data created each day at our current pace and 90% of the world’s data was created in the last two years alone. This astronomically exponential growth has called for constant innovation to secure, store, and diminish the input of human manipulation. Blockchain eliminated the traditional method of data storage, such as cloud and physical drives that are all vulnerable to modification and errors, by eliminating the intermediary: thus, eradicating the archaic human issue of trust. To grasp the vulnerability of the blockchain it is imperative to understand the concepts it runs on. The theories of blocks, nodes, and nodes owners (miners), consensus mechanisms, and hashing all work together in the functionality of the system, and all choices made to a specific blockchain must be taken to minimize security breaches.. Blocks - A blockchain network’s A blockchain network’s transactions are composed of sequential groups of data that are packaged together into “blocks” strung together linearly. The first block of any blockchain is referred to as a Genesis Block and is the only block of the chain that does not hold any data on the previous block. Each block after that replicates all the data from the previous block and records any recent transactions or data change, blocks, and the information within them must be verified by a network before new blocks can be created. All the blocks are linked using cryptographic technique and possess a hash code of the previous block, a timestamp, and a record of all previously confirmed transactions. Simply, a blockchain is an invented way to structure data in a decentralized manner, just like physically pages in a ledger, in this digital ledge each page can be considered as a block. The blockchain ledger is autonomous and is powered using a P2P (peer-to-peer) making it a decentralized transparent data flow mechanism that relies on a group instead of the individual. Each block has a block header and block body. The block is more straight forward and consists of all the number of transactions, or data, that have been confirmed and validated within the block. On the other hand, the header contains six components that are all mandatory to the authentication, or validation, of every block. - Block version: a number that indicates which protocol to follow. - Parents Block Hash a 256-bit hash of the previous block header. - Timestamp: An unchangeable tracking of the time the block as created and updated; the time is given in seconds since 1.1.1970. - Markle Tree Root Hash: All transactions contained in a block can be aggregated in a hash resulting in a unique fingerprint that can prove one block is valid without having to know all previous blocks. - N-Bits: Also known as the target threshold, it indicates how small the new hash must be to claim validity. Every hash has a size in bits and the smaller that value the harder it is to find a matching hash. - Nonce: a 32-bit number that a miner must alter to correctly solve the computational puzzle for the current block. Nodes -the backbone of blockchain Nodes are the backbone of every blockchain are reason this technology is decentralized. The future of data security lies in ability to delegate responsibility and trust in order to dilute power and minimize the possibility of human input. It empowers the output of a conglomeration of systems, known as nodes, by democratizing authentication process and delegating the power to "the group", or network. The blocks of data are stored on all the interconnected servers, better known as nodes, that allow the existence of a blockchain. Nodes come in all shapes and forms, they can be computers, servers, laptops and are continuously exchanging the latest blockchain data and contributing to the blockchain infrastructure. Every blockchain has its own minimum requirements to join its network by storing, sending, and preserving the blockchain data and thus becoming a partial stakeholder of the system. A full node must contain a full copy of the transaction history of the blockchain and are responsible for the reliability of the stored data and together they evaluate and validate every block before it is added to the blockchain. The quest to design and implements an effective decentralized network governance system that balances decentralization and security depends on the purpose and strategic priorities of a particular blockchain. Although there are many less popular consensuses mechanisms, it is only relevant to discuss the two main algorithms as they are the most used in today’s blockchain community: symmetric and asymmetric encryption. Encryption Protocol As of today, 95% of the world’s data is protected by either asymmetric encryption, better known, as public key cryptography, or by its predecessor: the symmetric encryption. Thus far, these encryption methods have allowed for our modern infrastructures to not only function but also thrive in today’s continuously data thriving economy. However, as the numbers of cyber-crimes only exponentially increase over the years, the user’s trust in companies to withhold information has not declined accordingly. The blind trust users misplace in the hands of oblivious and irresponsible companies that are not interested in investing resources in reassessing their digital safety guidelines to shield their client from the approaching threat of quantum is a colossal hazard to the pillars of modern society. It’s imperative that we examine alternatives to the currently used public key cryptographic primitives when assessing the extend of the vulnerability of our data especially since encryption evolved from a mathematical curiosity to an indispensable part of our IT infrastructure survival. Key Differences. (Symmetric Encryption vs Asymmetric Encryption) 1) Number of keys Symmetric Encryption - uses a single key for encryption and decryption. Asymmetric Encryption - uses two keys for encryption and decryption. 2) Size of cipher text Symmetric Encryption - Smaller cipher text compares to original plain text file. Asymmetric Encryption - Larger cipher text compares to original plain text file. 3) Data size Symmetric Encryption - Used to transmit big data. Asymmetric Encryption - Used to transmit small data. 4) Resource Utilization Symmetric key encryption works on low usage of resources. Asymmetric encryption requires high consumption of resources. 5) Security Symmetric Encryption - Less secured due to use a single key for encryption. Asymmetric Encryption -Much safer as two keys are involved in encryption and decryption. 6) Key Lengths Symmetric Encryption - 128 or 256-bit key size Asymmetric Encryption - RSA 2048-bit or higher key size. 7) Confidentiality Symmetric Encryption - A single key for encryption and decryption has chances of key compromised. Asymmetric Encryption - Two keys separately made for encryption and decryption that removes the need to share a key. 8) Speed Symmetric encryption is fast technique. Asymmetric encryption is slower in terms of speed. 9) Algorithms Symmetric encryption - RC4, AES, DES, 3DES, QUAD Asymmetric encryption - RSA, Diffie-Hellman, ECC algorithms If you compare symmetric-key encryption with public-key encryption, you will find that public-key encryption requires more calculations. Therefore, public-key encryption is not always appropriate for large amounts of data. However, it is possible to use public-key encryption to send a symmetric key, which you can then use to encrypt additional data. Symmetrical vs Asymmetrical Asymmetric encryption is also known as public key cryptography, which is a relatively new method, compared to symmetric encryption. Asymmetric encryption uses two keys to encrypt a plain text. Secret keys are exchanged over the Internet or a large network. It ensures that malicious persons do not misuse the keys. It is important to note that anyone with a secret key can decrypt the message and this is why asymmetric encryption uses two related keys to boosting security. A public key is made freely available to anyone who might want to send you a message. The second private key is kept a secret so that you can only know. A message that is encrypted using a public key can only be decrypted using a private key, while also, a message encrypted using a private key can be decrypted using a public key. Security of the public key is not required because it is publicly available and can be passed over the internet. Asymmetric key has a far better power in ensuring the security of information transmitted during communication. Asymmetric encryption is mostly used in day-to-day communication channels, especially over the Internet. Popular asymmetric key encryption algorithm includes EIGamal, RSA, DSA, Elliptic curve techniques, PKCS. This means today’s public-key encryption protocols, like Secure Socket Layer (SSL) and Transport Layer Security (TLS), are sufficiently secure against most modern technology. But that won’t last. Quantum computers running Shor’s algorithm will be able to break those math- based encryption systems rapidly. The safest method of encryption is called asymmetrical cryptography; this requires two cryptographic keys — pieces of information, usually very large numbers — to work properly, one public and one private. The mathematics here are complex, but in essence, you can use the public key to encrypt the data but need the private. Think of the public key as information about the location of a locked mailbox with a slot on the front, and the private key as the key that unlocks the mailbox. Anyone who knows where the mailbox is can put a message in it; but for anyone else to read it, they need the private key. Because asymmetrical cryptography involves these difficult mathematical problems, it takes a lot of computing resources, so much so that if you used it to encrypt all the information in a communications session, your computer and connection would grind to a halt. TLS gets around this problem by only using asymmetrical cryptography at the very beginning of a communications session to encrypt the conversation the server and client have to agree on a single session key that they'll both use to encrypt their packets from that point forward. Encryption using a shared key is called symmetrical cryptography, and it's much less computationally intensive than asymmetric cryptography. Because that session key was established using asymmetrical cryptography, the communication session as a whole is much more secure than it otherwise would be. Both the RSA and Elliptic Curve Diffie-Hellman asymmetric algorithms which set up the TLS exchange will succumb to Shor’s algorithm on a sufficiently large quantum computer. While a quantum computer of that size and stability may be 5 to 15 years off, cryptographers from around the world are already working to identify new, quantum-safe algorithms. General Concerns post-quantum cryptography While TLS is secure against today’s classical computers, the asymmetric cryptography in TLS is unfortunately vulnerable to future attacks from quantum computers. Given the importance of TLS, preparing for the transition to post- quantum cryptography needs to start now. Asymmetric cryptography in TLS is vulnerable in two places: Key exchange: the server and client exchange cryptographic messages use asymmetric key exchange algorithms (such as RSA and ECDH) to derive a symmetric key. The symmetric key then encrypts the rest of the session. This 256- bit key is what turns plaintext into unreadable ciphertext. For a third party to decrypt the ciphertext using brute force, turning it back to plaintext, they would need to figure out 2×256 ( 4 Billion x 4 Billion x 4 Billion x 4 Billion x 4 Billion x 4 Billion x 4 Billion x 4 Billion) different number combinations. Currently, it would take the world’s strongest supercomputer millions of years to crack that key and break encryption. A powerful quantum computer could reduce this time significantly. A recent study from MIT showed that a 2048-bit RSA key— another widely used encryption key — could potentially be broken by a powerful quantum computer in 8 hours. While both the integer factorization problem and the general discrete logarithm problem are believed to be hard in classical computation models, it has been shown that neither problem is hard in the quantum computation model. So even data that is secure today isn’t safe from being stolen today and decrypted tomorrow when quantum computing is accessible. Distributed Ledger Technology (DLT) For a decentralized network to function properly, most of the interconnected nodes powering the system must agree on what is true and democratically apply the rules. This consensus mechanism delegates the decision-making process to the group and is a self-governing alternative to centralized authority. However, for this system to function correctly, the nodes must be online at regular intervals to communicate and cast their vote to verify all the data processed through the network. Unfortunately, nodes are not infallible, and it is expected for them to sometimes break, malfunction, or just not agree with the general consensus. This flaw is a liability for the system and is referred to as the Byzantine Fault. This failure mode has been identified, named, and studied since 1982 and has been needed in airplane engine systems, nuclear power plants and pretty much any system whose actions depend on the results of many sensors. In response to new and innovating distributed ledger technologies, there is a need for consensus mechanisms that can provide high transaction throughput and security, despite varying network quality. Functionality, stability, and security are imperative criteria to consider but scalability must not be overseen. In 2008 Nakamoto solved the Byzantine Fault problem using a Proof-of-Work mechanism in conjunction with a specific set of rules that govern the network. This combination allows for Bitcoin to prevent any malicious user from devaluating the currency by creating false transactions or swaying the general consensus. Although highly secure, this consensus method does face some issues that hinders its scalability and ability to grow after a certain point. - Requires powerful hardware - Every node must be operational and always synchronized (approx. 400 GB) - High operational costs - High energy consumption and high energy waste - Prone to 51% attack: In decentralized networks like Bitcoin every node maintains heartbeats with every other node; a periodic message sent to a central monitoring server or other servers in the system to show that it is alive and functioning. When a node is down, it simply stops sending out heartbeats, and all other connected nodes understand immediately. This method of constant communication between all nodes and all times is an expensive operation in any sizable cluster. Since then, more recent protocols have addressed this issue to facilitate scalability without compromising the security of the network. The Asynchronous Byzantine Fault Tolerance (ABFT) consensus algorithm does not bundle data into blocks or use miners to validate transaction which allows it to run at a much faster pace and operate on lower costs. It uses the gossip-to-gossip protocol nodes periodically exchanging information about themselves and other nodes they know about. Every second, nodes send out this information to member of their cluster (clusters are assigned by programmable factors) and one other random node. This means that any new event eventually propagates through the system, and all nodes quickly learn about all other nodes in a cluster without the need to have all nodes communication with each other. This protocol drastically decreases the amount of energy required, runs on lighter GB power, and lowers the requirements to join the network. Broadening the accessibility is key in scalability because it allows everyone, including the less tech savvy individuals and less sophisticated devices, to contribute and expand the network. By simplifying the process of communication between nodes by implementing more innovative consensus algorithms, the blockchain technology is mutating into a more accessible and inclusive technology. As for today, the ABFT is the gold standard of protocols. Innovative projects like Neo, Hedera and fantom are catalysts in this movement towards more regulated decentralized environments. The need for more transparency, privacy, must not come at the detriment of online safety. Consensus -The choice of algorithm The choice of consensus algorithm is a crucial component of a blockchain integrity, scalability, appeal, and above all security. The Proof-of-Work algorithm is the most used mechanism in the blockchain community, for many obvious reasons. Its main entice is its aptitude to promote honesty within a transparent and decentralized ecosystem. It works by sending out a complex mathematical equation that requires a large computational power to solve and lets the nod owners compete for the reward. The first miner to find the answer, known as a hash, must first be validated by most of the network before being authorized to add the new block to the blockchain and thus claim the reward. As more blocks are added to the chain, the network growth becomes directly proportional to the difficulty level of the mathematical puzzle. The algorithms require more and more hash power to solve, and members of the network are encouraged to provide more power to the network but also have their nodes up and constantly running, to be competitive in the race for the prize. Fundamentally this authenticating system eliminates the need of a third party, individuals or organizations who can tamper with the database, by using computing capabilities as an alternative. However, this algorithm does come with major flaws when faced with the opportunity of scalability. As the network grows the need for more computing power is required, which is not only expensive but also resource consuming. All the nodes connected require maintenance, effective heat management or cooling systems to remain operational. The process of rewarding only the fastest hashing node means all other computing power used in the race for the reward is wasted. The cost associated with running and maintaining powerful computer systems jeopardizes the core concept of decentralization as only the wealthier have strategic advantage and the resource intensive need for this consensus to function are significant disadvantages of this mechanism. Scalability and energy consumption/waste are significant variables to consider when designing large blockchain networks. Although proof of stake has its own challenges, sustainability is not one of them. This process does not involve resource-intensive mining, but instead relies on users “staking” their coins which requires placing coins as collateral. Instead of being incentivized for computing power, members of the network are compensated with a transactional fee and penalized when promoting an invalid transaction. These “validators” are chosen at random from the pool of members staking their coins although your chances do increase depending on the size of your collateral. This allows for a lower environmental impact, a faster transactional speed, and a more ethical decentralization. Proof of Work (POW) Advantages - Prevents double-spending attempts. - Considered of the most secure consensus mechanisms. - POW networks usually have more mining power: therefore, are more secure. Disadvantages - Mining requires extremely powerful hardware. - High operational costs so not affordable for everyone. - Energy consumption, high energy waste, not environmentally friendly. - The majority of mining pools are controlled by single entities. - PoW model is prone to 51% attacks. Proof of Stake (POS). Advantages - Safe from 51% of attacks. - Does not need expensive hardware for processing. - Transactions are faster and cheaper. - Does not any energy - Stakes act as a financial motivator. Disadvantages - Still not widely implemented. - Control of the network is easy as it depends on capital. - Centralized threats like double-spending are possible. - Governance hierarchy since users with more tokens have more weight in deciding the rules of the network The key are the RSA and the ECC It is agreed that the asymmetric protocol is the safest protocol up to date. Although it requires more resources, is significantly slower, and is only convenient for small data transmission, the involvement of two keys instead of one makes this encryption method ideal for everyday use. The major algorithms used to generate the key are the RSA and the ECC, which use complex mathematical concepts that are currently unable to be reverse engineered by the current processing power of a computer. This protocol relies on the prime factorization equation to achieve a one-way encryption by taking two large random prime numbers and multiplying them to create a public key. On the other hand, the ECC algorithm relies on the algebraic structure of elliptic curves over finite fields, since there is no known solution to the mathematical problem given by the equation producing the elliptical curve in a graph, the current computing abilities cannot solve this equation either. These two concepts are only valid since a conventional computer would need about 300 trillion years to crack communications protected with a 2,048-bit digital key, but a quantum computer powered by 4,099 qubits would need just 10 seconds Security (In Bits) RSA Key Length Required (In Bits) ECC Key Length Required (In Bits) BITS - 80 RSA - 1024 ECC - 160-223 BITS - 112 RSA - 2048 ECC- 224-255 BITS - 128 RSA - 3072 ECC - 256-383 BITS - 192 RSA - 7680 ECC - 384-511 BITS - 256 RSA - 15360 ECC - 512 Crypto-Currency vs Traditional Banking The evolution of money during our lifetime has been stable up until the introduction of digital currencies with Bitcoin in 2008. Whether withholding money is in the form of precious metals, bank notes, paper bills, or digitally, there must be a general agreement of value for a form of payment to be acceptable. - Non-consumable — cannot be consumed for purposes other than an exchange of value. - Portable — can be easily carried around. - Divisible — can be turned into smaller pieces for certain uses like paying a specific amount or micro-payments. - Durable — does not wear away or depreciate through time or in certain conditions. - Secure — cannot be counterfeited. - Easily transferable. - Scarce — cannot be replicated without end. - Fungible — each piece has the same value as its equivalent. - Recognizable — it is recognized and accepted as a means of transaction. The main difference between Bitcoin and traditional banking systems is the decentralization and peer-to-peer functionality of the currency which provides the currency holder full control over their asset. It relies on the combined computing power of the network participants bypassing all centralized intermediaries, in this case banks. Not only does no one have influence over your money and transactions you send or receive, but the transactional cost is also significantly lowered. In contrast, fiat currencies rely on centralized entities like central banks, commercial banks, governments, payment processors like VISA/MASTERCARD and other intermediaries. Any of those organizations have an authority to decide whether to approve your transaction, whether you can send money to certain people or organizations, or if the money you’re using is legal or not. The digital revolution did not spare the financial world, as the blockchain technology introduced a new modern way of holding currency. The possibility of a digital currency, or coin/token, solved the consumers’ need for more financial transparency, lower transactional costs, faster transactional processing time, and more importantly to bypass inflation. The first cryptocurrency to see light of day was Bitcoin in 2008, followed by another handful of other cryptocurrencies by 2010. Although new digital currencies entered the market at that time, and their prices rose and fell; the volatility, novelty, and lack of government regulation associated with them slowed down their popularity and democratization. As history shows, the undeniable advantages this technology offered eventually prevailed and allowed it to mature quickly from the ground up, from just a handful of digital coins in 2013 to reportedly 10,000 as of 2022. Exchanges marketplaces As digital trading becomes more convenient and accessible through crypto platforms, exchange marketplaces witnessed historical and unprecedented growth since 2010. In 2021, global trading revenue generated by cryptocurrency exchanges on centralized platforms reported $24.3 billion which for the first time it exceeded traditional exchanges like the New York Stock Exchange and the Nasdaq. This market increased seven times from the $3.4 billion in sales recorded in 2020 and was 60% higher than the roughly $15.2 billion brought in by traditional securities exchanges. The main players in of this industry, Coinbase, Binance, FTX take up most of the market by transaction volume, all competing for the record $1 trillion market capitulation reached in 2021. These platforms continue to update their services by offering new coins, better leverage trading options, and lower fees to compete in this volatile, maturing, and highly dynamic market. With their innovation comes a renewed concern for investor protection that needs to be addressed. The power delegated to these powerful centralized platforms makes them highly susceptible to abusive practices involving self-serving market manipulation tactics that impact investors and markets. The CEX access to the hot wallets and their ability to modify orders books grants them the power to use the following deceptive tactics to increase their profits Spoofing/wash trading CEX platforms can create the illusion of pessimism or optimism in the market by placing big buy/sell orders without the intention of filling them. Since the order books are public domain, this gives the illusion of volume, consensus, and a thriving or declining market to guide the market toward or away from a specific set of prices. The manipulated market movement in the books is all smoke and mirrors and has the purpose to solely manipulate the market perception of a specific coin to increase or decrease its value by influencing the platform users to sell coins cheap or buy coins high. Pump & Dump - the public perception When the public perception of a currency becomes tainted with manipulative tactics, such as the infamous "pump and dump" scheme’. Where centralized exchanges (CEX) sell their coins at exaggerated prices to unsuspecting customers, the result is a significant loss for these customers who are left holding the artificially inflated assets. To alleviate the impact, the individuals who now own these assets have limited options: they can either retain the currency and hope for its recovery or sell it, inevitably accepting a loss. Cross Trading not posting large orders This tactic involves not posting large orders to avoid any changes in the market price of currency. We understand the importance of maintaining stability and avoiding unnecessary disturbances in the market. In order to minimize potential changes in the market price of currency. We recomend a policy of not posting large orders. This approach ensures that our actions do not create significant fluctuations that could disrupt the balance of supply and demand. By strategically managing our orders and carefully considering market conditions, we aim to promote a fair and stable environment for our clients and the overall market. Our commitment to responsible trading practices safeguards against any unintended consequences and helps maintain a harmonious marketplace for all participants. Stable Coins - a type of cryptocurrency A stable coin is a type of cryptocurrency that relies on a more stable asset as a basis for its value. Since crypto currencies have always been associated with volatility and speculation in 2014, Tether came out with the first stable coin; a simple concept for creating a crypto asset that maintains a stable price. Nowadays, this concept is widely integrated in all crypto exchange platforms, and each stable coin is pegged to one of the following assets. - Fiat-backed: Coins that are collateralized 1:1 with a specific fiat currency. - Crypto backed: Coins backed with a specific cryptocurrency. - Algorithmic driven: Coins that rely on complex algorithms to match the price of the cryptocurrency to that of a specific fiat currency - Commodity- backed: Cryptocurrencies backed by precious commodities like gold, platinum, and real estate The application use of these coins in both centralized and decentralized systems have increased their popularity and allowed them to become essential players in both types of platforms. In centralized systems, traditional fiat currencies are reliant on banks and the bureaucracy associated with them makes them highly inconvenient and slow to use. For this reason, stable coins are favored since this digital option has the backing of traditional money without the hassle of fiat currencies. They allow users to “cash out” their crypto currencies without having to go through traditional banking bureaucracy, so their assets are always ready to use while being safe from the daily fluctuations of the markets. - Faster: Stable coins have a 24/7 availability since they do not rely on the banking 9-5 operating hours. - Cheaper: Unlike all credit card companies that impose high processing fees (2- 5%) per transaction, stable coins bypass these costs - Cross-Border: In third world countries where inflation is a main issue not everyone is able to move their money to more stable fiat currencies. Stable coins gives the opportunity to anyone, anywhere in the world, to protect their assets with these currency or commodities backed digital coins. - Transparent: Transactions on the blockchain can be viewed from a blockchain explorer by anyone with internet access. Additionally, stable coins can offer full transparency into the process by which they are backed by agreeing to full audits. - Customizable: Stable coins are programmable and allow for custom features to be built in. This allows a tailored experience depending on customer needs, unlike “one size fits all” type of currency offered by traditional currencies. - Entry-point to decentralized exchanges: Since decentralized ecosystems do not intersect with traditional banking institutions and traditional currencies, it provides a stable “exit” for users who no longer want to hold their asset in traditional crypto currencies. This allows decentralized platforms to have the safety or stability associated with centralized platforms. They hold all the benefits of stability in a highly volatile industry without the bureaucratic ties that come with traditional banking systems and traditional currencies. They have continued to thrive and outpace the rest of the market as volatility continues to reign in the crypto industry. The market capitalization is nearing the $200 as of April 2022 up 112% from $85 billion from the previous year. Additionally, since 2019 the economic, political, and social were a catalyst for the global need for stable digital assets resulting in a striking 495% growth between Oct 2020 and Oct 2021. While the largest stablecoin, by market valuation, tether (USDT) swelled by 3% during the last 30 days to $82 billion, terrausd (UST) has increased by 15.4% to $16.7 billion. They are embedded in the nearly $200B worth crypto market and share the market with the current 200 stablecoins in circulation. They are key contributors in overcoming the public perception that crypto is insecure investment and overall skepticism around the long-term viability of digital assets. Due to sever political instability in key geo-political countries and unexpected consequences of a long-term pandemic, even secure assets and currencies have experiences high than usual volatility and inflation. Although the pegged assets linked to the stablecoins are protected from the speculation and volatility of crypto currency markets, they still must be thoroughly assessed to determine the reliability and viability in their claim of being stable. Vulnerabilities CEX As user become more aware of the vulnerabilities associated with centralized platforms, they are no longer willing to trade their privacy and need for financial transparency for convenience. This threatens the potential growth associated with the centralized markets and suggest the growth we are witnessing in decentralized environment is its infancy. As user trust is manipulated and abused with the “middle-man” on trading platforms, user are and will continue to deviate to more decentralized options where financial transparency is granted, their privacy is upheld, and their assets are in their custody. This progressive transition explains why decentralized finance tokens have been experiencing rapid growth and now make up 4.6% of the $1 trillion market. They are booming in third world environment because they bypass the tedious onboarding scrutiny and welcome the unbanked to participate and invest. Since decentralized platforms do not rely on traditional data to verify identity, they do not alienate and discriminate this huge demographic from using their services. Relying on traditional data to verify identity doesn’t just alienate the modern digital consumer, it also leads to huge demographics being unable to access the services. World Bank’s latest report states nearly 1.7 billion people are currently unbanked globally, which is close to one fourth of the world population. The standards of privacy and inclusiveness previously used to label decentralized platforms as “sketchy” are ironically the main reasons behind the current migration towards these platforms. It offers people within communities that are underserved by the broader financial system the opportunity to participate in international financial markets which was previously denied to them due by archaic bureaucratic. Together, these entry points for the unbanked along with the growing user need to safeguard their privacy, control assets, and full financial transparency are a catalyst for the migration from centralized to decentralized platforms. The total cap in 2020 was a little over $2 billion and it is now reported at $43 billion as of beginning of 2021 and $120 billion at the end of that same year. Obsolete Encryption Quantum computer will soon render current encryption standards obsolete. This technologic threat will affect all financial institutions, insurance companies, and data protection services. Most crypto currencies will be vulnerable to this new computing phenomenon. Quantum computers have the potential to revolutionize the world of technology. Their immense computational power allows them to process information at an unprecedented speed, dwarfing even the most advanced supercomputers. However, this progress comes with a catch: the current encryption standards that protect our sensitive data may soon become obsolete. Quantum algorithms have the ability to crack traditional encryption methods, rendering them vulnerable to attacks. As quantum computers continue to advance, it is imperative that we develop new cryptographic techniques that can withstand their power. The race is on to create quantum-resistant encryption protocols to ensure the security of our digital world in this rapidly evolving technological landscape. Distrust in the Crypto market During the last decade, the new asset class of crypto currency has multiplied the opportunity to scam and take advantage of the investing user through deceitful pyramid schemes. The vulnerable demographic affected by these frauds is the middle/lower class in third world countries with political instability and weak monetary and fiscal policies. The outcome is the debasement of the local currency and eradication of generations of savings. The lack of regulation in this new asset class has led to massive market manipulation. The handful of exchange platforms that control the market encourage high risk trading by enticing users with appealing and irresponsible leverage options. This “get rich overnight” dream has led to major losses and is a key role in the current distrust in the crypto market. Unfortunately, technology does not always guarantee fairness, and the most vulnerable end up being the less fortunate. When markets and economies crashed in the past, before the introduction of the digital era, the small investors and lower income individuals have suffered the largest losses. Large institutions are privileged enough to be bailed out of crisis situations and are salvaged from the consequences of economical predicaments while most of the smaller investors are left unprotected. Fortunately, decentralization offer a solution for this defenseless silent majority, especially third world and emerging countries where technology is their only exposure to first world investments opportunities and assets beyond their borders. It is important to highlight that even if these modern technologies allow citizens to bypass the corruption and economical failures that results in hyper-devaluation, digital assets are reliant on the ethical and moral standards of the investment platforms. Like traditional markets, we witness market manipulation and rug pulls in emerging digital platforms as well, and again, consequences affect mostly small investors. The infamous ONE-COIN Ponzi scheme orchestrated by Dr.Ruja, aka Crypto Queen, who told investors OneCoin could be mined and had actual value, but in fact, it did not exist on a blockchain and its value was manipulated by the automatic generation of new coins. Most of the investment came from low-income individuals from third world countries who were promised a better future and high returns. A more recent example is the overnight collapse of the stable coin LUNA, from TerraLabs in Singapore. The coin lost 30 billion dollars’ worth of investment money, everyone involved with the coin saw their life savings wiped out. These market manipulations are only possible because of the power large coin holders, known as whales, have within the current trading platforms. The power of few has control over the fate of all in today’s digital investment spaces. QUANTUM 101 Basic ConceptsQuantum TechnologiesQuantum Cryptography Why Quantum? - The digital revolution The digital revolution of the 1980s marked the end of industrialization but also Man’s first step into the digital world. Technology has only exponentially advanced ever since, leaving behind the world of analog by introducing mankind to the convenience and revolution of the Informational Era. The discovery of the transistor in the late 1940s triggered a sequential of events that allowed for the invention of the computer and subsequently the World Wide Web. Although the mass adaptation of the internet started later at the beginning of the 1990s, companies seized the opportunity to decrease operational costs by digitalizing their data, which started the digital reformatting transition and eventually led to the born- digital era. The permanent elimination of the analog records gave birth to the necessity for digital preservation, data custody, and introduced, the now significant, term of “user data”. Companies no longer held their client’s data in physically safeguarded locations and their quest to find a secure means to store and transfer data online propelled encryption technology into the forefront of the digital postmodern privacy world. Our reliance on complex means of digital security only became clearer as the advancement of the computer continued to excel and the user’s awareness of data privacy surged along with it. Critical sectors our modern society, such as but not limited to, logistics, energy, financial systems, and healthcare withhold sensitive and confidential information to run their core business and the solution they provide to ensure the data is safe brings enormous opportunities but also raises the question of what will happen when we reach the climax of data vulnerability once encryption technology is surpassed by computing power. The 21st century has seen the manufacturing industry embrace the digital revolution with the emergence of new technologies such as cloud computing and the Internet of Things. These digital services are now part of our everyday life, they have brought down barriers, enabling industries to grow and advance like never before but also exposed the growing opportunities of cyber threats. As the computing advancement steadily advance, it is important for encryption to evolve alongside with it, otherwise it will expose the fragility of our current infrastructure and open the door to the frightening idea that our data security protocols can be rendered obsolete. The “Quantum Apocalypse” is a theoretical term that only ten years ago was a distant and elusive computing fantasy, yet today’s promising advancements are opening the door to the devastating consequences this achievement can unleash on the foundation of our infrastructure, hence the importance of XATOXI’s mission to develop a scalable solution to combat the arrival of quantum computing and shield are current infrastructures from the threat that will come with it. Introduction to Quantum Quantum computing is fundamentally different from the classical computers in circulation today. As we know, traditional computing is based on a bit, a binary state represented by 0 or 1, it must be one or the other. On the other hand, quantum computing is based on quantum state of a QBIT, that rather than being determined using a binary output, it calculates all possible positions and scenarios of an event while it still in its in-between state, or superposition state. The state of undefined outcome in quantum physics allows for computing power to drastically increase, as the binary possibility now becomes practically endless. Only once the event has occurred, or been observed, does the quantum state concludes and a binary outcome can be then noted. All the possibilities within the 3-dimensional sphere occurring before the binary observation is what the future of computing is relying on to develop the fifth generation of computers. The quantum computing’s exponentially large processing power gives it, or will be able to give it, the ability to solve complex factoring large numbers and solving discrete logarithms on which all internet security relies on. Quantum computing relevance to encryption was made possible by Peter Shor, who in 1994 discovered a polynomial time algorithm for finding prime factors of large numbers on a quantum computer. Shor's algorithm is viewed as important because the difficulty of finding prime factors of large numbers (RSA algorithm) is relied upon for most cryptography systems of today. The second significant quantum algorithm is Grover’s algorithm which was brought forth by Lov Grover in 1996 in which superposition and phase interference are used to search through unstructured data. The physical concept applied to a qbit computing mechanism has the power to calculate the ECC algorithm. Together the Grover and Shor theoretical algorithm running on a qbit processing power can effectively render our current encryption schemes obsolete and compromise our infrastructures. Given how vital public key trust models are to the security architecture of today’ Internet, it is imperative that we examine alternatives to the currently used public key cryptographic primitives. Since its invention, public key cryptography has evolved from a mathematical curiosity to an indispensable part of our IT infrastructure Quantum computers - unprecedented innovation Quantum computers have the potential to bring about unprecedented innovation across various fields, from pharmaceuticals research to the automobile industry. However, once quantum computing does become more widespread, it’s likely to undermine what we consider to the foundation of all infrastructure. Some have dubbed this the “Quantum Apocalypse”. This Apocalypse is set to change cryptography and render all our data protection encryption obsolete. The use of pulses of electricity to represent by 1s and 0s enables the computing power to exponentially increase. Quantum computing’s ability to solve two types of math problems: factoring large numbers and solving discrete logarithms (essentially solving the problem bx = a for x). Pretty much all internet security relies on this math to encrypt information or authenticate users in protocols such as Transport Layer Security. The possibility of quantum computation became relevant to cryptography in 1994, when Shor demonstrated efficient quantum algorithms for factoring and the computation of discrete logarithms, this introduction compromises the world's current encryption infrastructure. NIST launched a competition in 2016 to develop new standards for cryptography that will be more quantum-proof. The race is long, with the winners set to be announced in later this year in 2022, where the new standards of encryption will be set and announced to the community Quantum Key Distribution Quantum Key Distribution, or QKD, is the best-known example of quantum cryptography today. By transferring data using photons of light instead of bits, companies can take advantage of photons’ no-change and no-cloning attributes. Quantum encryption takes advantage of fundamental laws of physics such as the observer effect, which states that it is impossible to identify the location of a particle without changing that particle. Post-quantum cryptography is all about preparing for the era of quantum computing by updating existing mathematical- based algorithms and standards. While quantum cryptography describes using quantum phenomena at the core of a security strategy, post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. A quantum computer would render all widely used public key cryptography insecure cryptographic algorithms whose security relies on the intractability of the integer factorization problem, or the general discrete logarithm problem could be broken using quantum computers. Quantum Players - revolution in technology The quantum market is still in its infancy, but it's already sparking a revolution in technology. We are witnessing exciting and unprecedented growth in this market with a growing media interest and peak in quantum tech startups in 2021. By 2025, the market size is expected to grow from about $3.5 billion to $10 billion. Then Between 2025 and 2030, that estimate increases to $25 billion to $65 billion expectation. The range of compound annual growth rate, CAGR, of the total market is between 70%- 80% from 2021 to 2025 and, from 2025 to 2030, as the market matures, CAGR is predicted to be between 39% to 45%. With these enticing numbers and a financial and strategic advantage gain at the end of this, big tech companies such as Google, Microsoft, Amazon, IBM, and Intel are heavily invested in building their own quantum computers and developing applications around enterprise use cases. The current geopolitical and health circumstances have only positively impacted this market and revealed our rising dependence upon digital computing solutions. The emergence of a vis and the potential of a World War accelerated our need to adopt and develop a more efficient work-from-home infrastructure. Rapid digitization and the adoption of advanced software may boost the adoption of the product. Furthermore, the rising adoption of e-commerce is expected to support industrial progress during the pandemic. Players Profiled in the Quantum Computing Market Report - IBM Corporation (New York, U.S.) - D-Wave Systems Inc. (Burnaby, Canada) - Cambridge Quantum Computing Ltd. (Cambridge, U.K.) - Intel Corporation (California, U.S.) - Rigetti & Co, Inc. (California, U.S.) - Google LLC (California, U.S.) - Quantica Computacao (Tamil Nadu, India) - Zapata Computing (Massachusetts, U.S.) - XANADU (Toronto, Canada) - Accenture Plc. (Dublin, Ireland) Post Quantum Encryption Standards The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. On a yearly basis it evaluates and updates the standards for both regular and quantum resistant public-key cryptographic algorithms. They are currently finalizing the new standard release expected to be announced to the public later this year of 2022. XATOXI intends to apply these new standards to all encryption levels of the ecosystem to be up to date with all the quantum regulations and standards. Digital signatures RSA, DSA, and ECDSA rely on the hardness of factoring integers and computing discrete logarithms, respectively. However, it is unclear how long these complex computational problems will remain unsolvable. In fact, it has been shown by Shor that quantum computers can solve them in polynomial time. Alternative practical signature schemes that deliver maximum security against quantum computers must be able to resist increased computing power, also referred as post-quantum signature schemes. The hash-based signature scheme XMSS (eXtended Merkle Signature Scheme) is based on the Merkle Signature Scheme and it an efficient post-quantum signature scheme with minimal security assumptions. This cryptographic digital signature method is based on hash functions instead of mathematical problems. This significant difference makes this method resistant to the Shor algorithm because hashing functions goes one way and is non reversable. New Encryption Protocols The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. On a yearly basis it evaluates and updates the standards for both regular and quantum resistant public-key cryptographic algorithms. Digital signatures RSA, DSA, and ECDSA rely on the hardness of factoring integers and computing discrete logarithms, respectively. However, it is unclear how long these complex computational problems will remain unsolvable. In fact, it has been shown by Shor that quantum computers can solve them in polynomial time. Alternative practical signature schemes that deliver maximum security against quantum computers must be able to resist increased computing power, also referred as post-quantum signature schemes. The hash-based signature scheme XMSS (eXtended Merkle Signature Scheme) is based on the Merkle Signature Scheme and it an efficient post-quantum signature scheme with minimal security assumptions. This cryptographic digital signature method is based on hash functions instead of mathematical problems. This significant difference makes this method resistant to the Shor algorithm because hashing functions goes one way and is non reversible. Cryptography based on the hardness of lattice problems is seen as a very promising replacement of traditional cryptography after the eventual coming of quantum computers. This method uses the difficulty of lattice problems over the module lattices used in earlier encryption standards. Indeed, if you look at the entrants to the “post-quantum” international competition run by the US National Institute for Standards in Technology, which is focused on standardizing new post- quantum secure cryptography, you will notice that the largest family of submissions consist of lattice-based schemes including the few cited above. The dilithium is one of these digital signatures that bypasses the use of complex mathematical equation. Basically, any regular space grid of points stretching out to infinity is a lattice and they are well understood and widely studied by mathematicians going back at least as far as the early 1800s. Lattice problems are proving to be incredibly versatile in terms of the types of cryptographic schemes they allow us to build. In fact, not only are we able to replace essentially all our currently endangered schemes, but lattice problems even allow for entirely new classes of quantum proof cryptographic which is not based on factoring or any other hard mathematical problems. Lattice Based Cryptography Cryptography based on the hardness of lattice problems is seen as a very promising replacement of traditional cryptography after the eventual coming of quantum computers. This method uses the difficulty of lattice problems over the module lattices used in earlier encryption standards. Indeed, if you look at the entrants to the “post-quantum” international competition run by the US National Institute for Standards in Technology, which is focused on standardizing new post- quantum secure cryptography, you will notice that the largest family of submissions consist of lattice-based schemes including the few cited above. The delithium is one of these digital signatures that bypasses the use of complex mathematical equation. Basically, any regular space grid of points stretching out to infinity is a lattice and they are well understood and widely studied by mathematicians going back at least as far as the early 1800s. This encryption uses large lattices to calculate vectors positions which immensely increases the amount of operating space required to run the algorithm. Although highly secure, and relatively quick compared XMSS algorithm. The Delithium requires high processing power and cannot be used on smaller devices which limits its scalability. Lattice problems are proving to be incredibly versatile in terms of the types of cryptographic schemes they allow us to build. In fact, not only are we able to replace essentially all our currently endangered schemes, but lattice problems even allow for entirely new classes of quantum proof cryptographic. Another lattice-based encryption candidate submitted to the NSIT is the Falcon encryption which tackled the scalability and resource consumption problem encountered by the Delithium algorithm. The Falcon encryption is based on NTRU lattice problems which smaller lattices with more limited vector points. This allows for a more compact encryption that requires significantly lower processing power to run on. A lighter encryption uses less RAM (30KB) and is compatible with small, memory limited devices. At the detriment of smaller keys, this encryption resolves the scalability limitation usually posed by quantum proof cryptography ABOUTUS About usPrivacy and transparency About us Founded in 2010 with a simple concept: to offer a private ecosystem with complete privacy, security and transparency. After a decade of research and experimentation, advances in the philosophy and technique of decentralization, blockchain, and privacy, revolutionized and deepened the meaning of our thoughts and concepts. Constant advances in quantum computing threaten the security that protect the fabric of the internet, putting at risk every bit of data shared and stored by humanity, paving the way to beginning of cyberwarfare. Once a dream, now a reality, our innovation will be available to every human on earth, irrespective of their origins. We are committed to protecting people's data, simply by not collecting it. We offer a diverse portfolio of services and allow the user to make a personalized selection according to their interest. We eradicate the idea of a "one for all" platform, we believe in empowering the user by giving them the option to customize the platform according to the services they need and the information they would like to share. Our team is specialized in low level languages, to maximize memory and CPU. Our platform can run on all kinds of phones, even affordable options, while maintaining strong encryption and low battery consumption. All of our code is 100% proprietary, and launching our first release in April 2021 for financial microservices gave us a positive proof of concept with 40,000 users and over 500,000 financial micro- transactions. We are now ready to launch the full platform to introduce the world to the future of privacy. Software development and blockchain Our business models focus on a world where privacy is an option. Those who choose to protect their data and identity will finally have an outlet to explore. As part of our onboarding process, we showcase the proven benefits of privacy and hope that any provider or end user will enjoy the benefits. Our team of programmers dives into each service provider's architecture, identifies data breaches, potential vulnerabilities and applies a fix by developing or fixing the necessary software. If we see an ecosystem as weak as its weakest element, then we must set a high standard and ensure that everyone who interacts with XATOXI follows the same principles of transparency and security Our laboratory - the core Our research and development core represents the best programmers and futurists in our company. Currently expanding vision into uncharted waters, navigating to solve and improve the technologies required for our future services to exist. Blockchain is not only used for cryptocurrencies, as an independent technology it offers unlimited possibilities that are not yet present in our daily lives. If you want to be part of XATOXI's core research and development team, advanced C programming and experience with encryption is the main skill required. Send a message through the contact form and someone from our team will contact you. The future of privacy In recent decades, companies began to extract data from their users that violated privacy agreements previously agreed between the user and the host. Aggressive data collection for marketing purposes has jeopardized the consumer's right to privacy and triggered deep mistrust in the application of technology. By monetizing user data, tech companies have abandoned their thirst for innovation to focus on a more profitable but misleading data collection scheme that only exploits the consume Contact ReasonPersonal Accounts - Basic AccountPersonal Accounts - Basic AccountPersonal Accounts - Pensioner AccountPersonal Accounts - Account On Your OwnPersonal Accounts - Remittance AccountPersonal Accounts - PlatiniumBusiness Accounts - Classic CorporateBusiness Accounts - Platinum CorporateBusiness Accounts - Premiun CorporateBusiness Accounts - Firma PersonalCardsLoansCertificates of DepositsOther... AlemaniaArgentinaBélgicaBrasilBurkina FasoCanadaChileColombiaEcuadorEmiratos Arabes UnidosEspañaEstados UnidosFilipinasFinlandiaFranciaItaliaMéjicoPanamaPeruPuerto RicoRepública DominicanaSueciaVenezuelaSelect Country of Residence OK Follow us Instagram Discord X In the dynamic and competitive landscape of business, one truism remains unshakable: the paramount importance of serving and responding to all our customers. Exceptional customer service is the foundation upon which successful ventures are built and sustained. Each customer interaction presents a golden opportunity to foster loyalty, build long-term relationships, and amplify brand reputation. By taking the time to genuinely listen to our customers' needs and concerns, promptly addressing their queries, and providing personalized solutions, we demonstrate our commitment to their satisfaction. Furthermore, treating each customer interaction as a chance to delight and exceed expectations serves as a potent differentiator in a crowded marketplace. Ultimately, by prioritizing every customer, we not only secure their continued support but also pave the way for a thriving, customer-centric organization Stay Updated with XATOXI Solutions Subscribe to our newsletter for the latest on quantum safe solutions. Subcribe Now By subscribing, you agree to our Terms and Conditions. Become part of our growing community Join to Citizen Discord CitizenStar is by Invitation Only Invitation Code OK © Xatoxi LTD 2024, All Rights Reserved. PRIVACY VERITI GLOBAL XATOXI