xatoxi.app Open in urlscan Pro
185.25.252.67  Public Scan

Submitted URL: https://citizenstar.network/
Effective URL: https://xatoxi.app/citizenstar/index.html?v=2.5.10&page=landingcitizenstar
Submission: On December 09 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Nodes
Basix
Projects
Tech
Blockchain 101
Quantum 101
About
Contact Us
Register
Language
SPANISH
ENGLISH
Launch App
Quantum Resistant Network™
Decentralized Exchange and Trading of Cryptocurrencies
Feeds
Blockchange - 32 m ago
Corruption in the case against Sam Bankman-Fried?
Quantum - 32 m ago
Quantum Computing Could Create Light-Controlled Memory Tech
Privacy - 32 m ago
Should you delete your Facebook? Here’s what a privacy expert thinks
Blockchange - 20 m ago
Corruption in the case against Sam Bankman-Fried?
Quantum - 10 m ago
Quantum Computing: Stabilizing qubits at room temperature
Privacy - 32 m ago
Should you delete your Facebook? Here’s what a privacy expert thinks
Statistics
Node - 1
Users - 2,456,786
Tx speed - 4.8ms
Block - 546.345
BTC - $42,567
ETH - $2,566
XATOXI
VERITI
CITIZENSTAR
XAPIEX
QACAO
Read More
Absolute privacy without anonimity
Tourist


Email address
Mobile number
Resident


Full name
Age
Facial verification
Citizen


Proof of address
Proof of ID
DECENTRALIZED EXCHANGE AND TRADING OF CRYPTOCURRENCIES
CUEDEXCommunity PoolSelf-GoverningLiquidity
What is it?

CUEDEX is an untraditional hybrid decentralized exchange dedicated to
quantum-resistant digital assets. Unlike traditional exchanges that decide what
assets are traded on a “pay to play” structure, XATOXI delegates all coin
offering decisions to the users.
 

What is it?

The peer-to-peer Community Pool-driven exchange empowers users to decide what is
allowed in their ecosystem. Periodically, the latest quantum coins are listed
for users to vote on, and the majority decision determines if the coin is added
to the exchange.
 

Benefits

This self-governing coin offering choice system allows high user engagement and
encourages users to research incoming coins to increase technology awareness.
Knowledgeable users are less inclined to speculate and are more willing to
contribute and invest in technologies they understand. By delegating decisions
to the users, the curation process favors coins with high interest and motivates
liquidity providers to supply liquidity pools.
 

User-Provided Liquidity

All the exchange's liquidity is provided by our members; therefore, it's
important to let users decide which currencies and currency pairings are of most
interest to them. A highly engaged and empowered audience is more likely to
contribute to the ecosystem, and we incentivize our users to help us build our
community.
 

Equal Access to Initial Liquidity

Once a coin is voted onto our trading platform, the initial liquidity will be
available for purchase equally among members. This ensures every member has the
opportunity to buy the same amount of every new coin when it's first listed,
avoiding mass buying and price manipulation at each coin's launch.
 

Remaining Liquidity

Any liquidity not purchased from the initial democratic “coin offering” becomes
available on a first-come, first-served basis at market price.
 

BASIX
QSTARQCHATQVAULTQBLOCKQASHQLAN
What is it?

Human Verification Process: All users must pass the QSTAR verification process
before being granted access to selective dApps. The verification process is
centralized but non-human (AI processed), to respect and augment the privacy of
each user/node. No anonymity is allowed. The Process of Human Verification
begins now!
 

Bronze Star (Basic Registration)

1. Email Address.
2. Mobile number.
 

Silver Star (Citizenstar members - Crypto 2 crypto)

1. Full name.
2. Age.
3. Facial verification.
 

Gold Star (Xatoxi Members- Fiat 2 crypto

1. Proof of address.
2. Proof of ID.
 

What is it?

Quantum Encrypted P2P Decentralized Communication Channel Between Users.
VERIFICATION: SILVER STAR (Citizenstar members)
 

Innovation

1. Initiate request to open communication channel between nodes/users and/or
multiple nodes/groups.
2. Each communication channel shards into an independent block controlled by the
nodes/users involved.
3. Each user controls each bit of data shared with other users/nodes.
4. Users can decide to delete any bit of data shared with other users in the
block, and with an unanimous vote, the block self-destroys.
5. Quantum Encrypted P2P Decentralized Communication.
 

What is it?

Quantum Encrypted P2P Decentralized File Sharing & Storage.
VERIFICATION: SILVER STAR (Citizenstar members)
 

Advantages

1. Store data in a Quantum Encrypted P2P Decentralized Vault.
2. Partitioned file sharing and storage on different network nodes.
3. Share files with other users/nodes, while keeping control of each bit shared.
4. Insure sensitive data in a hybrid centralized/decentralized Quantum Encrypted
Vault.
5. Quantum Encrypted P2P Decentralized File Sharing & Storage. Always available
24 hours a day, 365 days a year, safe and reliable. We believe in absolute
privacy, not anonymity.
 

What is it?

Block Explorer -Transaction Navigation System .
VERIFICATION: SILVER STAR (Citizenstar members)
 

Advantages

1. Navigate and search ALL transactions in real time.
2. Verify interactions between nodes/users.
3. Instant access with absolute transparency to all analytics.
4. UI/UX in 3D graphics.
5. Explorer - Instant access.
6. Navigate and search ALL in one hand. Be free always in real time.
7. Block Explorer for all register user that have completed the human
verification process. Always available 24 hours a day, 365 days a year, safe and
reliable, with true quantum resistance. We believe in absolute privacy, not
anonymity.
 

What is it?

Instant access to Approved quantum-resistant digital assets, FIAT, bank
accounts, and credit cards.
VERIFICATION: SILVER STAR (Citizenstar members)
 

Advantages

1. P2P Trade, Buy and Sell Quantum Resistant Digital Assets. (powered by
CUEDEX).
2. Send digital assets to users/nodes.
3. Manage quantum asset portafolio.
4. Manage bank accounts and credit cards to access ALL FIAT micro-services -
GOLD STAR (Xatoxi Members).
5. Instant access to Approved quantum-resistant digital assets.
6. FIAT, bank accounts, and credit cards.
7. All in one hand very easy and fast Your freedom and safety is our priority.
 

What is it?

Privacy Management (Coming Soon..). VERIFICATION:
STAR (Citizenstar members)
 

Advantages

1. Coming Soon…
2. Coming Soon…
3. Coming Soon…
4. Coming Soon…
5. PRIVACY MANAGEMENT…
6. Your data is yours and no one else is responsible for your security, your
freedom and the right to choose the safest method for you and those around you.

The freedom of privacy is an undeniable right without being anonymous you can be
totally privat
 

PROJECTS
BASIXVERITI.GLOBALCITIZENSTARXAPIEXQACAOQDAX
Xatoxi dApps - Quantum Safe Space

Quantum Safe Space with freedom of inclusion and free choice for all. The
freedom of privacy is an undeniable right. For all registered users much more.
 

DApps

1. QStar: Human verification process.
2. QChat: Quantum Encrypted P2P Decentralized Communication Channel Between
Users.
3. QVault: Quantum Encrypted P2P Decentralized File Sharing & Storage.
4. QBlock: Block Explorer.
5. Qash: Instant Access to Approved Quantum Resistant Digital Assets, FIAT,
Bank.
Accounts and Credit Cards.
6. Qlan: PRIVACY MANAGEMENT (COMING SOON…)
 

Truth is power - The truth is free

The truth will always make you free, free to choose, to think, to decide about
your future. freedom is for everyone equally we all have the right to express
ourselves freely and receive timely and clear information. The information must
be shared verified sincere and free of prejudices, it is your freedom to choose.
 

Advantages

1. Privacy.
2. Quantum.
3. BlockChain.
4. Defi.
5. Humanity.
6. Truth is power, the truth is free.
 

Quantum Privacy to the Core. (No Anonymity)

Be a member of this select group and enjoy its benefits. Your privacy is the
most important thing to us. Privacy is an undeniable right, you can be totally
private without being anonymous.
 

Advantages

1. Basix: Xatoxi dApps - Crypto to Crypto Only. (QStar, QChat, QVault, QBlock,
Qash, Qlan). 2. Verification: Silver Star.
3. Quantum Safe Space: Quantum Resistant (p2p) Network.
4. Governance: XAPIEX Constitution.
5. Tech: Cuetum Encryption Protocol.
6. Blockchain: Mobile Compatible Peer to Peer (p2p) Quantum Encrypted data
transfer and storage Quantum Privacy to the Core. (No Anonymity)
 

The Human Experience

The human experience of choosing to be free in its entirety is a 100%
decentralized government, where we are all part of its growth and development
equally. Freedom is your right that must be sacred, having the right to
participate directly in the decisions and works of government is your duty.
 

Advantages

1. The first Decentralized Constitution.
2. Increase the philosophy of Democracy and Freedom.
3. Focused on enhancing the human experience.
4. Full implementation of Decentralized Governance.
 

Quantum Gold Pegged Digital Asset

Feel the need to be free to trade in a unique transparent secure ecosystem with
quantum resistance, You will always be free to choose, the security of your data
is an absolute priority. Transparency in the transaction is the rule, the total
security of your transactions is your right and we will fulfill it.
 

Advantages

1. Coming Soon!
2. Coming Soon!
3. Coming Soon!
4. Coming Soon!
5. Quantum Gold Pegged Digital Asset!
 

Quantum Decentralized Asset Exchange

Owners of unique technologies to make your life freer more secure for a more
uncertain future, but with the security and transparency that we can offer you.
We are unique and special, a secure and reliable ecosystem, where user freedom
of decision is what matters.
 

Advantages

1. Quantum Decentralized Asset Exchange Protocol. (CUEDEX).
2. Quantum Encryption Protocol with ZKP layer (CUETUM).
3. 3D UI/UX (CUESPHERE).
4. Quantum InterChain Communication Protocol (CUEZERO).
 

TECH
CUEZEROCUENTUMCUEGRAPHCUESPHERECUEDROPCUEBLOCKCUEDEX
Quantum Interchain Comms Protocol

Truly decentralized communication exchange with quantum resistance and a huge
future ahead. compatible with light and mobile devices.

Fully secure, focused on quantum resistance protection, a matter with an
important future..
 

Advantages

1. Lightweight and mobile compatible.
2. 100% Ansi C.
3. P2P Protocol + Quantum Resistant Encryption (Cuetum).
4. Layer 0.
5. Quantum Interchain Comms Protocol
 

Proprietary Quantum Encryption Protocol

Owners of a unique futuristic and real protocol with dimensions of proven
quantum resistance, with 100% proprietary technology. With the highest standards
in development.
 

Advantages

1. Lightweight and mobile compatible.
2. 100% Ansi C.
3. Proprietary Quantum Resistant Key Generation. (ZKP + Private key+ Public
Key).
4. Proprietary Quantum Resistant Encryption (In development).
5. Compatible with PQ-Crystals-Kyber (kyber512, kyber768, kyber1024).
6. Compatible with BIKE: bikel1, bikel3, bikel5.
7. Compatible with FrodoKEM: frodo640aes, frodo640shake, frodo976aes,
frodo976shake,frodo1344aes, frodo1344shake.
8. Compatible with HQC: hqc128, hqc192, hqc25.
 

AI Graph Network - Quantum Resistant Network

Graphic network with artificial intelligence making your life easier and free to
choose of your own free will, light and compatible with all mobile phones, even
low-end.
With 100% proprietary technology, with the highest standards in development and
with quantum resistance encryption, it's really worth it.
 

Advantages

1. Lightweight and mobile compatible.
2. 100% Ansi C.
3. Graph running deep learning + P2P (CueZero) + Quantum Resistant Encryption
(Cuetum).
4. Quantum Resistant Decentralized Network.
 

3D Low level Graphics Engine

Very low level 3d graphic engine that allows modeling 3d structures with less
consumption of computer resources, light and compatible with all mobile phones,
even low-end, with 100% proprietary technology. With the highest standards in
development of the market.
 

Advantages

1. Lightweight and mobile compatible.
2. 100% Ansi C.
3. Web (WebGL) + Android (OpenGL).
4. UI/UX.
5. 3D Low level Graphics Engine.
 

Decentralized Block Sharding Data Storage

A drop of power in your hands to transfer share data safely and efficiently with
quantum resistance encryption. Efficient, light and compatible with all phones,
100% decentralized, secure and private without being anonymous.
 

Advantages

1. Lightweight and mobile compatible.
2. 100% Ansi C.
3. Block SHARDING + Quantum Resistant Encryption (Cuetum) + P2P (CueZero).
4. Distribution, De-Construction & Construction of Data Blocks.
5. Decentralized Block Sharding Data Storage
 

Block Creation Data Structure

A building block to create secure private data structures that are efficient and
easily accessible to users. An efficient untra secure block with quantum
resistance encryption.

Light and compatible with all, 100% decentralized, private without being
anonymous, creates a unique and efficient structure safe reliable with all the
freedom you.
 

Advantages

1. Lightweight and mobile compatible.
2. 100% Ansi C.
3. Quantum Resistant Encryption (Cuetum) + Block SHARDING (CueDrop).
4. HashBased Blocks Data Structure (Put / Get).
5. Block Creation Data Structure.
 

Quantum Decentralized Asset Exchange Protocol

The security of your data and transactions truly protected, only you and only
you have access to them, freedom is your right, choosing the best for your
security is your objective and our goal..
 

Advantages

1. Blind Order Books.
2. P2P Atomic Swaps.
3. Scheduled execution of partial trades.
4. Logarithmic partitioned orders.
5. Quantum Decentralized Asset Exchange Protocol.
6. Asset exchange in a 100% reliable secure protocol and ecosystem where you
have the power to decide.
 

BLOCKCHAIN 101
Blockchain FundamentalsCryptographyBlockchain TechnologyIntroduction to
CryptocurrenciesRisks and challenges
Blockchain Basics -Distributed Ledger Technology

Blockchains are a type of distributed DLT database

(Distributed Ledger Technology)

Designed to record, communicate, and transact information without the need for a
central authority. It is impossible to discuss modern encryption without diving
into the revolutionary technology of blockchain that emerged in 2009 with the
birth of Bitcoin. It is relevant to point out that there are 2.5 quintillion
bytes of data created each day at our current pace and 90% of the world’s data
was created in the last two years alone. This astronomically exponential growth
has called for constant innovation to secure, store, and diminish the input of
human manipulation. Blockchain eliminated the traditional method of data
storage, such as cloud and physical drives that are all vulnerable to
modification and errors, by eliminating the intermediary: thus, eradicating the
archaic human issue of trust. To grasp the vulnerability of the blockchain it is
imperative to understand the concepts it runs on.
The theories of blocks, nodes, and nodes owners (miners), consensus mechanisms,
and hashing all work together in the functionality of the system, and all
choices made to a specific blockchain must be taken to minimize security
breaches..
 



Blocks - A blockchain network’s

A blockchain network’s transactions are composed of sequential groups of data
that are packaged together into “blocks” strung together linearly. The first
block of any blockchain is referred to as a Genesis Block and is the only block
of the chain that does not hold any data on the previous block. Each block after
that replicates all the data from the previous block and records any recent
transactions or data change, blocks, and the information within them must be
verified by a network before new blocks can be created.

All the blocks are linked using cryptographic technique and possess a hash code
of the previous block, a timestamp, and a record of all previously confirmed
transactions. Simply, a blockchain is an invented way to structure data in a
decentralized manner, just like physically pages in a ledger, in this digital
ledge each page can be considered as a block. The blockchain ledger is
autonomous and is powered using a P2P (peer-to-peer) making it a decentralized
transparent data flow mechanism that relies on a group instead of the
individual. Each block has a block header and block body. The block is more
straight forward and consists of all the number of transactions, or data, that
have been confirmed and validated within the block. On the other hand, the
header contains six components that are all mandatory to the authentication, or
validation, of every block.

- Block version: a number that indicates which protocol to follow.
- Parents Block Hash a 256-bit hash of the previous block header.
- Timestamp: An unchangeable tracking of the time the block as created and
updated; the time is given in seconds since 1.1.1970.
- Markle Tree Root Hash: All transactions contained in a block can be aggregated
in a hash resulting in a unique fingerprint that can prove one block is valid
without having to know all previous blocks.
- N-Bits: Also known as the target threshold, it indicates how small the new
hash must be to claim validity. Every hash has a size in bits and the smaller
that value the harder it is to find a matching hash.
- Nonce: a 32-bit number that a miner must alter to correctly solve the
computational puzzle for the current block.
 

Nodes -the backbone of blockchain

Nodes are the backbone of every blockchain are reason this technology is
decentralized. The future of data security lies in ability to delegate
responsibility and trust in order to dilute power and minimize the possibility
of human input. It empowers the output of a conglomeration of systems, known as
nodes, by democratizing authentication process and delegating the power to "the
group", or network. The blocks of data are stored on all the interconnected
servers, better known as nodes, that allow the existence of a blockchain. Nodes
come in all shapes and forms, they can be computers, servers, laptops and are
continuously exchanging the latest blockchain data and contributing to the
blockchain infrastructure. Every blockchain has its own minimum requirements to
join its network by storing, sending, and preserving the blockchain data and
thus becoming a partial stakeholder of the system.

A full node must contain a full copy of the transaction history of the
blockchain and are responsible for the reliability of the stored data and
together they evaluate and validate every block before it is added to the
blockchain.

The quest to design and implements an effective decentralized network governance
system that balances decentralization and security depends on the purpose and
strategic priorities of a particular blockchain. Although there are many less
popular consensuses mechanisms, it is only relevant to discuss the two main
algorithms as they are the most used in today’s blockchain community: symmetric
and asymmetric encryption.
 

Encryption Protocol

As of today, 95% of the world’s data is protected by either asymmetric
encryption, better known, as public key cryptography, or by its predecessor: the
symmetric encryption. Thus far, these encryption methods have allowed for our
modern infrastructures to not only function but also thrive in today’s
continuously data thriving economy. However, as the numbers of cyber-crimes only
exponentially increase over the years, the user’s trust in companies to withhold
information has not declined accordingly. The blind trust users misplace in the
hands of oblivious and irresponsible companies that are not interested in
investing resources in reassessing their digital safety guidelines to shield
their client from the approaching threat of quantum is a colossal hazard to the
pillars of modern society. It’s imperative that we examine alternatives to the
currently used public key cryptographic primitives when assessing the extend of
the vulnerability of our data especially since encryption evolved from a
mathematical curiosity to an indispensable part of our IT infrastructure
survival.

Key Differences. (Symmetric Encryption vs Asymmetric Encryption)
1) Number of keys

Symmetric Encryption - uses a single key for encryption and decryption.
Asymmetric Encryption - uses two keys for encryption and decryption.

2) Size of cipher text

Symmetric Encryption - Smaller cipher text compares to original plain text file.
Asymmetric Encryption - Larger cipher text compares to original plain text file.

3) Data size

Symmetric Encryption - Used to transmit big data. Asymmetric Encryption - Used
to transmit small data.

4) Resource Utilization

Symmetric key encryption works on low usage of resources. Asymmetric encryption
requires high consumption of resources.

5) Security

Symmetric Encryption - Less secured due to use a single key for encryption.
Asymmetric Encryption -Much safer as two keys are involved in encryption and
decryption.

6) Key Lengths

Symmetric Encryption - 128 or 256-bit key size
Asymmetric Encryption - RSA 2048-bit or higher key size.

7) Confidentiality

Symmetric Encryption - A single key for encryption and decryption has chances of
key compromised. Asymmetric Encryption - Two keys separately made for encryption
and decryption that removes the need to share a key.

8) Speed

Symmetric encryption is fast technique.
Asymmetric encryption is slower in terms of speed.
9) Algorithms

Symmetric encryption - RC4, AES, DES, 3DES, QUAD
Asymmetric encryption - RSA, Diffie-Hellman, ECC algorithms

If you compare symmetric-key encryption with public-key encryption, you will
find that public-key encryption requires more calculations. Therefore,
public-key encryption is not always appropriate for large amounts of data.
However, it is possible to use public-key encryption to send a symmetric key,
which you can then use to encrypt additional data.
 

Symmetrical vs Asymmetrical

Asymmetric encryption is also known as public key cryptography, which is a
relatively new method, compared to symmetric encryption. Asymmetric encryption
uses two keys to encrypt a plain text. Secret keys are exchanged over the
Internet or a large network. It ensures that malicious persons do not misuse the
keys. It is important to note that anyone with a secret key can decrypt the
message and this is why asymmetric encryption uses two related keys to boosting
security. A public key is made freely available to anyone who might want to send
you a message. The second private key is kept a secret so that you can only
know.

A message that is encrypted using a public key can only be decrypted using a
private key, while also, a message encrypted using a private key can be
decrypted using a public key. Security of the public key is not required because
it is publicly available and can be passed over the internet. Asymmetric key has
a far better power in ensuring the security of information transmitted during
communication.

Asymmetric encryption is mostly used in day-to-day communication channels,
especially over the Internet. Popular asymmetric key encryption algorithm
includes EIGamal, RSA, DSA, Elliptic curve techniques, PKCS. This means today’s
public-key encryption protocols, like Secure Socket Layer (SSL) and Transport
Layer Security (TLS), are sufficiently secure against most modern technology.
But that won’t last. Quantum computers running Shor’s algorithm will be able to
break those math- based encryption systems rapidly.

The safest method of encryption is called asymmetrical cryptography; this
requires two cryptographic keys — pieces of information, usually very large
numbers — to work properly, one public and one private. The mathematics here are
complex, but in essence, you can use the public key to encrypt the data but need
the private. Think of the public key as information about the location of a
locked mailbox with a slot on the front, and the private key as the key that
unlocks the mailbox. Anyone who knows where the mailbox is can put a message in
it; but for anyone else to read it, they need the private key.

Because asymmetrical cryptography involves these difficult mathematical
problems, it takes a lot of computing resources, so much so that if you used it
to encrypt all the information in a communications session, your computer and
connection would grind to a halt. TLS gets around this problem by only using
asymmetrical cryptography at the very beginning of a communications session to
encrypt the conversation the server and client have to agree on a single session
key that they'll both use to encrypt their packets from that point forward.
Encryption using a shared key is called symmetrical cryptography, and it's much
less computationally intensive than asymmetric cryptography. Because that
session key was established using asymmetrical cryptography, the communication
session as a whole is much more secure than it otherwise would be.

Both the RSA and Elliptic Curve Diffie-Hellman asymmetric algorithms which set
up the TLS exchange will succumb to Shor’s algorithm on a sufficiently large
quantum computer. While a quantum computer of that size and stability may be 5
to 15 years off, cryptographers from around the world are already working to
identify new, quantum-safe algorithms.
 

General Concerns post-quantum cryptography

While TLS is secure against today’s classical computers, the asymmetric
cryptography in TLS is unfortunately vulnerable to future attacks from quantum
computers. Given the importance of TLS, preparing for the transition to post-
quantum cryptography needs to start now. Asymmetric cryptography in TLS is
vulnerable in two places:

Key exchange: the server and client exchange cryptographic messages use
asymmetric key exchange algorithms (such as RSA and ECDH) to derive a symmetric
key. The symmetric key then encrypts the rest of the session. This 256- bit key
is what turns plaintext into unreadable ciphertext. For a third party to decrypt
the ciphertext using brute force, turning it back to plaintext, they would need
to figure out 2×256 ( 4 Billion x 4 Billion x 4 Billion x 4 Billion x 4 Billion
x 4 Billion x 4 Billion x 4 Billion) different number combinations. Currently,
it would take the world’s strongest supercomputer millions of years to crack
that key and break encryption. A powerful quantum computer could reduce this
time significantly. A recent study from MIT showed that a 2048-bit RSA key—
another widely used encryption key — could potentially be broken by a powerful
quantum computer in 8 hours. While both the integer factorization problem and
the general discrete logarithm problem are believed to be hard in classical
computation models, it has been shown that neither problem is hard in the
quantum computation model. So even data that is secure today isn’t safe from
being stolen today and decrypted tomorrow when quantum computing is accessible.
 

Distributed Ledger Technology (DLT)

For a decentralized network to function properly, most of the interconnected
nodes powering the system must agree on what is true and democratically apply
the rules. This consensus mechanism delegates the decision-making process to the
group and is a self-governing alternative to centralized authority. However, for
this system to function correctly, the nodes must be online at regular intervals
to communicate and cast their vote to verify all the data processed through the
network. Unfortunately, nodes are not infallible, and it is expected for them to
sometimes break, malfunction, or just not agree with the general consensus. This
flaw is a liability for the system and is referred to as the Byzantine Fault.
This failure mode has been identified, named, and studied since 1982 and has
been needed in airplane engine systems, nuclear power plants and pretty much any
system whose actions depend on the results of many sensors.

In response to new and innovating distributed ledger technologies, there is a
need for consensus mechanisms that can provide high transaction throughput and
security, despite varying network quality. Functionality, stability, and
security are imperative criteria to consider but scalability must not be
overseen. In 2008 Nakamoto solved the Byzantine Fault problem using a
Proof-of-Work mechanism in conjunction with a specific set of rules that govern
the network. This combination allows for Bitcoin to prevent any malicious user
from devaluating the currency by creating false transactions or swaying the
general consensus. Although highly secure, this consensus method does face some
issues that hinders its scalability and ability to grow after a certain point.

- Requires powerful hardware
- Every node must be operational and always synchronized (approx. 400 GB)
- High operational costs - High energy consumption and high energy waste
- Prone to 51% attack:

In decentralized networks like Bitcoin every node maintains heartbeats with
every other node; a periodic message sent to a central monitoring server or
other servers in the system to show that it is alive and functioning. When a
node is down, it simply stops sending out heartbeats, and all other connected
nodes understand immediately. This method of constant communication between all
nodes and all times is an expensive operation in any sizable cluster. Since
then, more recent protocols have addressed this issue to facilitate scalability
without compromising the security of the network.

The Asynchronous Byzantine Fault Tolerance (ABFT) consensus algorithm does not
bundle data into blocks or use miners to validate transaction which allows it to
run at a much faster pace and operate on lower costs. It uses the
gossip-to-gossip protocol nodes periodically exchanging information about
themselves and other nodes they know about. Every second, nodes send out this
information to member of their cluster (clusters are assigned by programmable
factors) and one other random node. This means that any new event eventually
propagates through the system, and all nodes quickly learn about all other nodes
in a cluster without the need to have all nodes communication with each other.
This protocol drastically decreases the amount of energy required, runs on
lighter GB power, and lowers the requirements to join the network. Broadening
the accessibility is key in scalability because it allows everyone, including
the less tech savvy individuals and less sophisticated devices, to contribute
and expand the network. By simplifying the process of communication between
nodes by implementing more innovative consensus algorithms, the blockchain
technology is mutating into a more accessible and inclusive technology. As for
today, the ABFT is the gold standard of protocols.

Innovative projects like Neo, Hedera and fantom are catalysts in this movement
towards more regulated decentralized environments. The need for more
transparency, privacy, must not come at the detriment of online safety.
 

Consensus -The choice of algorithm

The choice of consensus algorithm is a crucial component of a blockchain
integrity, scalability, appeal, and above all security. The Proof-of-Work
algorithm is the most used mechanism in the blockchain community, for many
obvious reasons. Its main entice is its aptitude to promote honesty within a
transparent and decentralized ecosystem. It works by sending out a complex
mathematical equation that requires a large computational power to solve and
lets the nod owners compete for the reward. The first miner to find the answer,
known as a hash, must first be validated by most of the network before being
authorized to add the new block to the blockchain and thus claim the reward. As
more blocks are added to the chain, the network growth becomes directly
proportional to the difficulty level of the mathematical puzzle. The algorithms
require more and more hash power to solve, and members of the network are
encouraged to provide more power to the network but also have their nodes up and
constantly running, to be competitive in the race for the prize. Fundamentally
this authenticating system eliminates the need of a third party, individuals or
organizations who can tamper with the database, by using computing capabilities
as an alternative. However, this algorithm does come with major flaws when faced
with the opportunity of scalability. As the network grows the need for more
computing power is required, which is not only expensive but also resource
consuming. All the nodes connected require maintenance, effective heat
management or cooling systems to remain operational. The process of rewarding
only the fastest hashing node means all other computing power used in the race
for the reward is wasted. The cost associated with running and maintaining
powerful computer systems jeopardizes the core concept of decentralization as
only the wealthier have strategic advantage and the resource intensive need for
this consensus to function are significant disadvantages of this mechanism.
Scalability and energy consumption/waste are significant variables to consider
when designing large blockchain networks.

Although proof of stake has its own challenges, sustainability is not one of
them. This process does not involve resource-intensive mining, but instead
relies on users “staking” their coins which requires placing coins as
collateral. Instead of being incentivized for computing power, members of the
network are compensated with a transactional fee and penalized when promoting an
invalid transaction. These “validators” are chosen at random from the pool of
members staking their coins although your chances do increase depending on the
size of your collateral. This allows for a lower environmental impact, a faster
transactional speed, and a more ethical decentralization.

Proof of Work (POW)

Advantages
- Prevents double-spending attempts.
- Considered of the most secure consensus mechanisms.
- POW networks usually have more mining power: therefore, are more secure.

Disadvantages
- Mining requires extremely powerful hardware.
- High operational costs so not affordable for everyone.
- Energy consumption, high energy waste, not environmentally friendly.
- The majority of mining pools are controlled by single entities.
- PoW model is prone to 51% attacks.

Proof of Stake (POS).

Advantages
- Safe from 51% of attacks. - Does not need expensive hardware for processing. -
Transactions are faster and cheaper. - Does not any energy - Stakes act as a
financial motivator.
Disadvantages
- Still not widely implemented.
- Control of the network is easy as it depends on capital.
- Centralized threats like double-spending are possible.
- Governance hierarchy since users with more tokens have more weight in deciding
the rules of the network
 

The key are the RSA and the ECC

It is agreed that the asymmetric protocol is the safest protocol up to date.
Although it requires more resources, is significantly slower, and is only
convenient for small data transmission, the involvement of two keys instead of
one makes this encryption method ideal for everyday use. The major algorithms
used to generate the key are the RSA and the ECC, which use complex mathematical
concepts that are currently unable to be reverse engineered by the current
processing power of a computer. This protocol relies on the prime factorization
equation to achieve a one-way encryption by taking two large random prime
numbers and multiplying them to create a public key. On the other hand, the ECC
algorithm relies on the algebraic structure of elliptic curves over finite
fields, since there is no known solution to the mathematical problem given by
the equation producing the elliptical curve in a graph, the current computing
abilities cannot solve this equation either.

These two concepts are only valid since a conventional computer would need about
300 trillion years to crack communications protected with a 2,048-bit digital
key, but a quantum computer powered by 4,099 qubits would need just 10 seconds

Security (In Bits)
RSA Key Length Required (In Bits)
ECC Key Length Required (In Bits)

BITS - 80
RSA - 1024
ECC - 160-223

BITS - 112
RSA - 2048
ECC- 224-255

BITS - 128
RSA - 3072
ECC - 256-383

BITS - 192
RSA - 7680
ECC - 384-511

BITS - 256
RSA - 15360
ECC - 512

 

Crypto-Currency vs Traditional Banking

The evolution of money during our lifetime has been stable up until the
introduction of digital currencies with Bitcoin in 2008. Whether withholding
money is in the form of precious metals, bank notes, paper bills, or digitally,
there must be a general agreement of value for a form of payment to be
acceptable.

- Non-consumable — cannot be consumed for purposes other than an exchange of
value. - Portable — can be easily carried around. - Divisible — can be turned
into smaller pieces for certain uses like paying a specific amount or
micro-payments. - Durable — does not wear away or depreciate through time or in
certain conditions. - Secure — cannot be counterfeited. - Easily transferable. -
Scarce — cannot be replicated without end. - Fungible — each piece has the same
value as its equivalent. - Recognizable — it is recognized and accepted as a
means of transaction.

The main difference between Bitcoin and traditional banking systems is the
decentralization and peer-to-peer functionality of the currency which provides
the currency holder full control over their asset. It relies on the combined
computing power of the network participants bypassing all centralized
intermediaries, in this case banks. Not only does no one have influence over
your money and transactions you send or receive, but the transactional cost is
also significantly lowered. In contrast, fiat currencies rely on centralized
entities like central banks, commercial banks, governments, payment processors
like VISA/MASTERCARD and other intermediaries. Any of those organizations have
an authority to decide whether to approve your transaction, whether you can send
money to certain people or organizations, or if the money you’re using is legal
or not.

The digital revolution did not spare the financial world, as the blockchain
technology introduced a new modern way of holding currency. The possibility of a
digital currency, or coin/token, solved the consumers’ need for more financial
transparency, lower transactional costs, faster transactional processing time,
and more importantly to bypass inflation. The first cryptocurrency to see light
of day was Bitcoin in 2008, followed by another handful of other
cryptocurrencies by 2010. Although new digital currencies entered the market at
that time, and their prices rose and fell; the volatility, novelty, and lack of
government regulation associated with them slowed down their popularity and
democratization. As history shows, the undeniable advantages this technology
offered eventually prevailed and allowed it to mature quickly from the ground
up, from just a handful of digital coins in 2013 to reportedly 10,000 as of
2022.
 

Exchanges marketplaces

As digital trading becomes more convenient and accessible through crypto
platforms, exchange marketplaces witnessed historical and unprecedented growth
since 2010. In 2021, global trading revenue generated by cryptocurrency
exchanges on centralized platforms reported $24.3 billion which for the first
time it exceeded traditional exchanges like the New York Stock Exchange and the
Nasdaq. This market increased seven times from the $3.4 billion in sales
recorded in 2020 and was 60% higher than the roughly $15.2 billion brought in by
traditional securities exchanges. The main players in of this industry,
Coinbase, Binance, FTX take up most of the market by transaction volume, all
competing for the record $1 trillion market capitulation reached in 2021.

These platforms continue to update their services by offering new coins, better
leverage trading options, and lower fees to compete in this volatile, maturing,
and highly dynamic market. With their innovation comes a renewed concern for
investor protection that needs to be addressed. The power delegated to these
powerful centralized platforms makes them highly susceptible to abusive
practices involving self-serving market manipulation tactics that impact
investors and markets. The CEX access to the hot wallets and their ability to
modify orders books grants them the power to use the following deceptive tactics
to increase their profits
 

Spoofing/wash trading

CEX platforms can create the illusion of pessimism or optimism in the market by
placing big buy/sell orders without the intention of filling them.

Since the order books are public domain, this gives the illusion of volume,
consensus, and a thriving or declining market to guide the market toward or away
from a specific set of prices.

The manipulated market movement in the books is all smoke and mirrors and has
the purpose to solely manipulate the market perception of a specific coin to
increase or decrease its value by influencing the platform users to sell coins
cheap or buy coins high.
 

Pump & Dump - the public perception

When the public perception of a currency becomes tainted with manipulative
tactics, such as the infamous "pump and dump" scheme’. Where centralized
exchanges (CEX) sell their coins at exaggerated prices to unsuspecting
customers, the result is a significant loss for these customers who are left
holding the artificially inflated assets.

To alleviate the impact, the individuals who now own these assets have limited
options: they can either retain the currency and hope for its recovery or sell
it, inevitably accepting a loss.
 

Cross Trading not posting large orders

This tactic involves not posting large orders to avoid any changes in the market
price of currency.

We understand the importance of maintaining stability and avoiding unnecessary
disturbances in the market. In order to minimize potential changes in the market
price of currency.

We recomend a policy of not posting large orders. This approach ensures that our
actions do not create significant fluctuations that could disrupt the balance of
supply and demand. By strategically managing our orders and carefully
considering market conditions, we aim to promote a fair and stable environment
for our clients and the overall market.

Our commitment to responsible trading practices safeguards against any
unintended consequences and helps maintain a harmonious marketplace for all
participants.
 

Stable Coins - a type of cryptocurrency

A stable coin is a type of cryptocurrency that relies on a more stable asset as
a basis for its value. Since crypto currencies have always been associated with
volatility and speculation in 2014, Tether came out with the first stable coin;
a simple concept for creating a crypto asset that maintains a stable price.
Nowadays, this concept is widely integrated in all crypto exchange platforms,
and each stable coin is pegged to one of the following assets.

- Fiat-backed: Coins that are collateralized 1:1 with a specific fiat currency.
- Crypto backed: Coins backed with a specific cryptocurrency.
- Algorithmic driven: Coins that rely on complex algorithms to match the price
of the cryptocurrency to that of a specific fiat currency
- Commodity- backed: Cryptocurrencies backed by precious commodities like gold,
platinum, and real estate The application use of these coins in both centralized
and decentralized systems have increased their popularity and allowed them to
become essential players in both types of platforms. In centralized systems,
traditional fiat currencies are reliant on banks and the bureaucracy associated
with them makes them highly inconvenient and slow to use. For this reason,
stable coins are favored since this digital option has the backing of
traditional money without the hassle of fiat currencies. They allow users to
“cash out” their crypto currencies without having to go through traditional
banking bureaucracy, so their assets are always ready to use while being safe
from the daily fluctuations of the markets.
- Faster: Stable coins have a 24/7 availability since they do not rely on the
banking 9-5 operating hours.
- Cheaper: Unlike all credit card companies that impose high processing fees (2-
5%) per transaction, stable coins bypass these costs
- Cross-Border: In third world countries where inflation is a main issue not
everyone is able to move their money to more stable fiat currencies. Stable
coins gives the opportunity to anyone, anywhere in the world, to protect their
assets with these currency or commodities backed digital coins.
- Transparent: Transactions on the blockchain can be viewed from a blockchain
explorer by anyone with internet access. Additionally, stable coins can offer
full transparency into the process by which they are backed by agreeing to full
audits.
- Customizable: Stable coins are programmable and allow for custom features to
be built in. This allows a tailored experience depending on customer needs,
unlike “one size fits all” type of currency offered by traditional currencies.
- Entry-point to decentralized exchanges: Since decentralized ecosystems do not
intersect with traditional banking institutions and traditional currencies, it
provides a stable “exit” for users who no longer want to hold their asset in
traditional crypto currencies. This allows decentralized platforms to have the
safety or stability associated with centralized platforms.

They hold all the benefits of stability in a highly volatile industry without
the bureaucratic ties that come with traditional banking systems and traditional
currencies. They have continued to thrive and outpace the rest of the market as
volatility continues to reign in the crypto industry. The market capitalization
is nearing the $200 as of April 2022 up 112% from $85 billion from the previous
year. Additionally, since 2019 the economic, political, and social were a
catalyst for the global need for stable digital assets resulting in a striking
495% growth between Oct 2020 and Oct 2021. While the largest stablecoin, by
market valuation, tether (USDT) swelled by 3% during the last 30 days to $82
billion, terrausd (UST) has increased by 15.4% to $16.7 billion.

They are embedded in the nearly $200B worth crypto market and share the market
with the current 200 stablecoins in circulation. They are key contributors in
overcoming the public perception that crypto is insecure investment and overall
skepticism around the long-term viability of digital assets.

Due to sever political instability in key geo-political countries and unexpected
consequences of a long-term pandemic, even secure assets and currencies have
experiences high than usual volatility and inflation. Although the pegged assets
linked to the stablecoins are protected from the speculation and volatility of
crypto currency markets, they still must be thoroughly assessed to determine the
reliability and viability in their claim of being stable.
 

Vulnerabilities CEX

As user become more aware of the vulnerabilities associated with centralized
platforms, they are no longer willing to trade their privacy and need for
financial transparency for convenience. This threatens the potential growth
associated with the centralized markets and suggest the growth we are witnessing
in decentralized environment is its infancy. As user trust is manipulated and
abused with the “middle-man” on trading platforms, user are and will continue to
deviate to more decentralized options where financial transparency is granted,
their privacy is upheld, and their assets are in their custody. This progressive
transition explains why decentralized finance tokens have been experiencing
rapid growth and now make up 4.6% of the $1 trillion market. They are booming in
third world environment because they bypass the tedious onboarding scrutiny and
welcome the unbanked to participate and invest. Since decentralized platforms do
not rely on traditional data to verify identity, they do not alienate and
discriminate this huge demographic from using their services.

Relying on traditional data to verify identity doesn’t just alienate the modern
digital consumer, it also leads to huge demographics being unable to access the
services. World Bank’s latest report states nearly 1.7 billion people are
currently unbanked globally, which is close to one fourth of the world
population. The standards of privacy and inclusiveness previously used to label
decentralized platforms as “sketchy” are ironically the main reasons behind the
current migration towards these platforms. It offers people within communities
that are underserved by the broader financial system the opportunity to
participate in international financial markets which was previously denied to
them due by archaic bureaucratic. Together, these entry points for the unbanked
along with the growing user need to safeguard their privacy, control assets, and
full financial transparency are a catalyst for the migration from centralized to
decentralized platforms. The total cap in 2020 was a little over $2 billion and
it is now reported at $43 billion as of beginning of 2021 and $120 billion at
the end of that same year.
 

Obsolete Encryption

Quantum computer will soon render current encryption standards obsolete. This
technologic threat will affect all financial institutions, insurance companies,
and data protection services. Most crypto currencies will be vulnerable to this
new computing phenomenon.

Quantum computers have the potential to revolutionize the world of technology.
Their immense computational power allows them to process information at an
unprecedented speed, dwarfing even the most advanced supercomputers. However,
this progress comes with a catch: the current encryption standards that protect
our sensitive data may soon become obsolete.

Quantum algorithms have the ability to crack traditional encryption methods,
rendering them vulnerable to attacks. As quantum computers continue to advance,
it is imperative that we develop new cryptographic techniques that can withstand
their power. The race is on to create quantum-resistant encryption protocols to
ensure the security of our digital world in this rapidly evolving technological
landscape.
 

Distrust in the Crypto market

During the last decade, the new asset class of crypto currency has multiplied
the opportunity to scam and take advantage of the investing user through
deceitful pyramid schemes. The vulnerable demographic affected by these frauds
is the middle/lower class in third world countries with political instability
and weak monetary and fiscal policies. The outcome is the debasement of the
local currency and eradication of generations of savings.

The lack of regulation in this new asset class has led to massive market
manipulation. The handful of exchange platforms that control the market
encourage high risk trading by enticing users with appealing and irresponsible
leverage options. This “get rich overnight” dream has led to major losses and is
a key role in the current distrust in the crypto market.

Unfortunately, technology does not always guarantee fairness, and the most
vulnerable end up being the less fortunate. When markets and economies crashed
in the past, before the introduction of the digital era, the small investors and
lower income individuals have suffered the largest losses. Large institutions
are privileged enough to be bailed out of crisis situations and are salvaged
from the consequences of economical predicaments while most of the smaller
investors are left unprotected.

Fortunately, decentralization offer a solution for this defenseless silent
majority, especially third world and emerging countries where technology is
their only exposure to first world investments opportunities and assets beyond
their borders. It is important to highlight that even if these modern
technologies allow citizens to bypass the corruption and economical failures
that results in hyper-devaluation, digital assets are reliant on the ethical and
moral standards of the investment platforms.

Like traditional markets, we witness market manipulation and rug pulls in
emerging digital platforms as well, and again, consequences affect mostly small
investors. The infamous ONE-COIN Ponzi scheme orchestrated by Dr.Ruja, aka
Crypto Queen, who told investors OneCoin could be mined and had actual value,
but in fact, it did not exist on a blockchain and its value was manipulated by
the automatic generation of new coins.

Most of the investment came from low-income individuals from third world
countries who were promised a better future and high returns. A more recent
example is the overnight collapse of the stable coin LUNA, from TerraLabs in
Singapore. The coin lost 30 billion dollars’ worth of investment money, everyone
involved with the coin saw their life savings wiped out.

These market manipulations are only possible because of the power large coin
holders, known as whales, have within the current trading platforms. The power
of few has control over the fate of all in today’s digital investment spaces.
 

QUANTUM 101
Basic ConceptsQuantum TechnologiesQuantum Cryptography
Why Quantum? - The digital revolution

The digital revolution of the 1980s marked the end of industrialization but also
Man’s first step into the digital world. Technology has only exponentially
advanced ever since, leaving behind the world of analog by introducing mankind
to the convenience and revolution of the Informational Era.

The discovery of the transistor in the late 1940s triggered a sequential of
events that allowed for the invention of the computer and subsequently the World
Wide Web.

Although the mass adaptation of the internet started later at the beginning of
the 1990s, companies seized the opportunity to decrease operational costs by
digitalizing their data, which started the digital reformatting transition and
eventually led to the born- digital era. The permanent elimination of the analog
records gave birth to the necessity for digital preservation, data custody, and
introduced, the now significant, term of “user data”.

Companies no longer held their client’s data in physically safeguarded locations
and their quest to find a secure means to store and transfer data online
propelled encryption technology into the forefront of the digital postmodern
privacy world.

Our reliance on complex means of digital security only became clearer as the
advancement of the computer continued to excel and the user’s awareness of data
privacy surged along with it.

Critical sectors our modern society, such as but not limited to, logistics,
energy, financial systems, and healthcare withhold sensitive and confidential
information to run their core business and the solution they provide to ensure
the data is safe brings enormous opportunities but also raises the question of
what will happen when we reach the climax of data vulnerability once encryption
technology is surpassed by computing power.

The 21st century has seen the manufacturing industry embrace the digital
revolution with the emergence of new technologies such as cloud computing and
the Internet of Things. These digital services are now part of our everyday
life, they have brought down barriers, enabling industries to grow and advance
like never before but also exposed the growing opportunities of cyber threats.

As the computing advancement steadily advance, it is important for encryption to
evolve alongside with it, otherwise it will expose the fragility of our current
infrastructure and open the door to the frightening idea that our data security
protocols can be rendered obsolete.

The “Quantum Apocalypse” is a theoretical term that only ten years ago was a
distant and elusive computing fantasy, yet today’s promising advancements are
opening the door to the devastating consequences this achievement can unleash on
the foundation of our infrastructure, hence the importance of XATOXI’s mission
to develop a scalable solution to combat the arrival of quantum computing and
shield are current infrastructures from the threat that will come with it.
 

Introduction to Quantum

Quantum computing is fundamentally different from the classical computers in
circulation today. As we know, traditional computing is based on a bit, a binary
state represented by 0 or 1, it must be one or the other. On the other hand,
quantum computing is based on quantum state of a QBIT, that rather than being
determined using a binary output, it calculates all possible positions and
scenarios of an event while it still in its in-between state, or superposition
state. The state of undefined outcome in quantum physics allows for computing
power to drastically increase, as the binary possibility now becomes practically
endless. Only once the event has occurred, or been observed, does the quantum
state concludes and a binary outcome can be then noted.

All the possibilities within the 3-dimensional sphere occurring before the
binary observation is what the future of computing is relying on to develop the
fifth generation of computers.

The quantum computing’s exponentially large processing power gives it, or will
be able to give it, the ability to solve complex factoring large numbers and
solving discrete logarithms on which all internet security relies on. Quantum
computing relevance to encryption was made possible by Peter Shor, who in 1994
discovered a polynomial time algorithm for finding prime factors of large
numbers on a quantum computer. Shor's algorithm is viewed as important because
the difficulty of finding prime factors of large numbers (RSA algorithm) is
relied upon for most cryptography systems of today.

The second significant quantum algorithm is Grover’s algorithm which was brought
forth by Lov Grover in 1996 in which superposition and phase interference are
used to search through unstructured data. The physical concept applied to a qbit
computing mechanism has the power to calculate the ECC algorithm. Together the
Grover and Shor theoretical algorithm running on a qbit processing power can
effectively render our current encryption schemes obsolete and compromise our
infrastructures.

Given how vital public key trust models are to the security architecture of
today’ Internet, it is imperative that we examine alternatives to the currently
used public key cryptographic primitives. Since its invention, public key
cryptography has evolved from a mathematical curiosity to an indispensable part
of our IT infrastructure
 

Quantum computers - unprecedented innovation

Quantum computers have the potential to bring about unprecedented innovation
across various fields, from pharmaceuticals research to the automobile industry.
However, once quantum computing does become more widespread, it’s likely to
undermine what we consider to the foundation of all infrastructure. Some have
dubbed this the “Quantum Apocalypse”. This Apocalypse is set to change
cryptography and render all our data protection encryption obsolete. The use of
pulses of electricity to represent by 1s and 0s enables the computing power to
exponentially increase. Quantum computing’s ability to solve two types of math
problems: factoring large numbers and solving discrete logarithms (essentially
solving the problem bx = a for x). Pretty much all internet security relies on
this math to encrypt information or authenticate users in protocols such as
Transport Layer Security. The possibility of quantum computation became relevant
to cryptography in 1994, when Shor demonstrated efficient quantum algorithms for
factoring and the computation of discrete logarithms, this introduction
compromises the world's current encryption infrastructure. NIST launched a
competition in 2016 to develop new standards for cryptography that will be more
quantum-proof. The race is long, with the winners set to be announced in later
this year in 2022, where the new standards of encryption will be set and
announced to the community
 

Quantum Key Distribution

Quantum Key Distribution, or QKD, is the best-known example of quantum
cryptography today. By transferring data using photons of light instead of bits,
companies can take advantage of photons’ no-change and no-cloning attributes.
Quantum encryption takes advantage of fundamental laws of physics such as the
observer effect, which states that it is impossible to identify the location of
a particle without changing that particle. Post-quantum cryptography is all
about preparing for the era of quantum computing by updating existing
mathematical- based algorithms and standards. While quantum cryptography
describes using quantum phenomena at the core of a security strategy,
post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe
or quantum-resistant) refers to cryptographic algorithms (usually public-key
algorithms) that are thought to be secure against an attack by a quantum
computer.

A quantum computer would render all widely used public key cryptography insecure
cryptographic algorithms whose security relies on the intractability of the
integer factorization problem, or the general discrete logarithm problem could
be broken using quantum computers.
 

Quantum Players - revolution in technology

The quantum market is still in its infancy, but it's already sparking a
revolution in technology. We are witnessing exciting and unprecedented growth in
this market with a growing media interest and peak in quantum tech startups in
2021. By 2025, the market size is expected to grow from about $3.5 billion to
$10 billion. Then Between 2025 and 2030, that estimate increases to $25 billion
to $65 billion expectation. The range of compound annual growth rate, CAGR, of
the total market is between 70%- 80% from 2021 to 2025 and, from 2025 to 2030,
as the market matures, CAGR is predicted to be between 39% to 45%. With these
enticing numbers and a financial and strategic advantage gain at the end of
this, big tech companies such as Google, Microsoft, Amazon, IBM, and Intel are
heavily invested in building their own quantum computers and developing
applications around enterprise use cases.

The current geopolitical and health circumstances have only positively impacted
this market and revealed our rising dependence upon digital computing solutions.
The emergence of a vis and the potential of a World War accelerated our need to
adopt and develop a more efficient work-from-home infrastructure. Rapid
digitization and the adoption of advanced software may boost the adoption of the
product. Furthermore, the rising adoption of e-commerce is expected to support
industrial progress during the pandemic.

Players Profiled in the Quantum Computing Market Report

- IBM Corporation (New York, U.S.)
- D-Wave Systems Inc. (Burnaby, Canada)
- Cambridge Quantum Computing Ltd. (Cambridge, U.K.)
- Intel Corporation (California, U.S.)
- Rigetti & Co, Inc. (California, U.S.)
- Google LLC (California, U.S.)
- Quantica Computacao (Tamil Nadu, India)
- Zapata Computing (Massachusetts, U.S.)
- XANADU (Toronto, Canada)
- Accenture Plc. (Dublin, Ireland)
 

Post Quantum Encryption Standards

The National Institute of Standards and Technology is a physical sciences
laboratory and non-regulatory agency of the United States Department of
Commerce. NIST's mission is to promote U.S. innovation and industrial
competitiveness by advancing measurement science, standards, and technology in
ways that enhance economic security and improve our quality of life. On a yearly
basis it evaluates and updates the standards for both regular and quantum
resistant public-key cryptographic algorithms. They are currently finalizing the
new standard release expected to be announced to the public later this year of
2022. XATOXI intends to apply these new standards to all encryption levels of
the ecosystem to be up to date with all the quantum regulations and standards.

Digital signatures RSA, DSA, and ECDSA rely on the hardness of factoring
integers and computing discrete logarithms, respectively. However, it is unclear
how long these complex computational problems will remain unsolvable. In fact,
it has been shown by Shor that quantum computers can solve them in polynomial
time.

Alternative practical signature schemes that deliver maximum security against
quantum computers must be able to resist increased computing power, also
referred as post-quantum signature schemes. The hash-based signature scheme XMSS
(eXtended Merkle Signature Scheme) is based on the Merkle Signature Scheme and
it an efficient post-quantum signature scheme with minimal security assumptions.
This cryptographic digital signature method is based on hash functions instead
of mathematical problems. This significant difference makes this method
resistant to the Shor algorithm because hashing functions goes one way and is
non reversable.
 

New Encryption Protocols

The National Institute of Standards and Technology is a physical sciences
laboratory and non-regulatory agency of the United States Department of
Commerce. NIST's mission is to promote U.S. innovation and industrial
competitiveness by advancing measurement science, standards, and technology in
ways that enhance economic security and improve our quality of life. On a yearly
basis it evaluates and updates the standards for both regular and quantum
resistant public-key cryptographic algorithms.

Digital signatures RSA, DSA, and ECDSA rely on the hardness of factoring
integers and computing discrete logarithms, respectively. However, it is unclear
how long these complex computational problems will remain unsolvable. In fact,
it has been shown by Shor that quantum computers can solve them in polynomial
time.

Alternative practical signature schemes that deliver maximum security against
quantum computers must be able to resist increased computing power, also
referred as post-quantum signature schemes. The hash-based signature scheme XMSS
(eXtended Merkle Signature Scheme) is based on the Merkle Signature Scheme and
it an efficient post-quantum signature scheme with minimal security assumptions.
This cryptographic digital signature method is based on hash functions instead
of mathematical problems. This significant difference makes this method
resistant to the Shor algorithm because hashing functions goes one way and is
non reversible.

Cryptography based on the hardness of lattice problems is seen as a very
promising replacement of traditional cryptography after the eventual coming of
quantum computers. This method uses the difficulty of lattice problems over the
module lattices used in earlier encryption standards. Indeed, if you look at the
entrants to the “post-quantum” international competition run by the US National
Institute for Standards in Technology, which is focused on standardizing new
post- quantum secure cryptography, you will notice that the largest family of
submissions consist of lattice-based schemes including the few cited above. The
dilithium is one of these digital signatures that bypasses the use of complex
mathematical equation. Basically, any regular space grid of points stretching
out to infinity is a lattice and they are well understood and widely studied by
mathematicians going back at least as far as the early 1800s. Lattice problems
are proving to be incredibly versatile in terms of the types of cryptographic
schemes they allow us to build. In fact, not only are we able to replace
essentially all our currently endangered schemes, but lattice problems even
allow for entirely new classes of quantum proof cryptographic which is not based
on factoring or any other hard mathematical problems.
 

Lattice Based Cryptography

Cryptography based on the hardness of lattice problems is seen as a very
promising replacement of traditional cryptography after the eventual coming of
quantum computers. This method uses the difficulty of lattice problems over the
module lattices used in earlier encryption standards.

Indeed, if you look at the entrants to the “post-quantum” international
competition run by the US National Institute for Standards in Technology, which
is focused on standardizing new post- quantum secure cryptography, you will
notice that the largest family of submissions consist of lattice-based schemes
including the few cited above. The delithium is one of these digital signatures
that bypasses the use of complex mathematical equation.

Basically, any regular space grid of points stretching out to infinity is a
lattice and they are well understood and widely studied by mathematicians going
back at least as far as the early 1800s. This encryption uses large lattices to
calculate vectors positions which immensely increases the amount of operating
space required to run the algorithm.

Although highly secure, and relatively quick compared XMSS algorithm. The
Delithium requires high processing power and cannot be used on smaller devices
which limits its scalability.

Lattice problems are proving to be incredibly versatile in terms of the types of
cryptographic schemes they allow us to build. In fact, not only are we able to
replace essentially all our currently endangered schemes, but lattice problems
even allow for entirely new classes of quantum proof cryptographic. Another
lattice-based encryption candidate submitted to the NSIT is the Falcon
encryption which tackled the scalability and resource consumption problem
encountered by the Delithium algorithm.

The Falcon encryption is based on NTRU lattice problems which smaller lattices
with more limited vector points.



This allows for a more compact encryption that requires significantly lower
processing power to run on. A lighter encryption uses less RAM (30KB) and is
compatible with small, memory limited devices. At the detriment of smaller keys,
this encryption resolves the scalability limitation usually posed by quantum
proof cryptography
 

ABOUTUS
About usPrivacy and transparency
About us

Founded in 2010 with a simple concept: to offer a private ecosystem with
complete privacy, security and transparency.

After a decade of research and experimentation, advances in the philosophy and
technique of decentralization, blockchain, and privacy, revolutionized and
deepened the meaning of our thoughts and concepts. Constant advances in quantum
computing threaten the security that protect the fabric of the internet, putting
at risk every bit of data shared and stored by humanity, paving the way to
beginning of cyberwarfare.

Once a dream, now a reality, our innovation will be available to every human on
earth, irrespective of their origins.

We are committed to protecting people's data, simply by not collecting it. We
offer a diverse portfolio of services and allow the user to make a personalized
selection according to their interest. We eradicate the idea of a "one for all"
platform, we believe in empowering the user by giving them the option to
customize the platform according to the services they need and the information
they would like to share.

Our team is specialized in low level languages, to maximize memory and CPU. Our
platform can run on all kinds of phones, even affordable options, while
maintaining strong encryption and low battery consumption. All of our code is
100% proprietary, and launching our first release in April 2021 for financial
microservices gave us a positive proof of concept with 40,000 users and over
500,000 financial micro- transactions. We are now ready to launch the full
platform to introduce the world to the future of privacy.
 

Software development and blockchain

Our business models focus on a world where privacy is an option. Those who
choose to protect their data and identity will finally have an outlet to
explore. As part of our onboarding process, we showcase the proven benefits of
privacy and hope that any provider or end user will enjoy the benefits.

Our team of programmers dives into each service provider's architecture,
identifies data breaches, potential vulnerabilities and applies a fix by
developing or fixing the necessary software. If we see an ecosystem as weak as
its weakest element, then we must set a high standard and ensure that everyone
who interacts with XATOXI follows the same principles of transparency and
security
 

Our laboratory - the core

Our research and development core represents the best programmers and futurists
in our company. Currently expanding vision into uncharted waters, navigating to
solve and improve the technologies required for our future services to exist.

Blockchain is not only used for cryptocurrencies, as an independent technology
it offers unlimited possibilities that are not yet present in our daily lives.
If you want to be part of XATOXI's core research and development team, advanced
C programming and experience with encryption is the main skill required. Send a
message through the contact form and someone from our team will contact you.
 

The future of privacy

In recent decades, companies began to extract data from their users that
violated privacy agreements previously agreed between the user and the host.
Aggressive data collection for marketing purposes has jeopardized the consumer's
right to privacy and triggered deep mistrust in the application of technology.

By monetizing user data, tech companies have abandoned their thirst for
innovation to focus on a more profitable but misleading data collection scheme
that only exploits the consume
 

Contact
ReasonPersonal Accounts - Basic AccountPersonal Accounts - Basic AccountPersonal
Accounts - Pensioner AccountPersonal Accounts - Account On Your OwnPersonal
Accounts - Remittance AccountPersonal Accounts - PlatiniumBusiness Accounts -
Classic CorporateBusiness Accounts - Platinum CorporateBusiness Accounts -
Premiun CorporateBusiness Accounts - Firma PersonalCardsLoansCertificates of
DepositsOther...

AlemaniaArgentinaBélgicaBrasilBurkina FasoCanadaChileColombiaEcuadorEmiratos
Arabes UnidosEspañaEstados
UnidosFilipinasFinlandiaFranciaItaliaMéjicoPanamaPeruPuerto RicoRepública
DominicanaSueciaVenezuelaSelect Country of Residence
OK
Follow us
Instagram
Discord
X

In the dynamic and competitive landscape of business, one truism remains
unshakable: the paramount importance of serving and responding to all our
customers. Exceptional customer service is the foundation upon which successful
ventures are built and sustained.

Each customer interaction presents a golden opportunity to foster loyalty, build
long-term relationships, and amplify brand reputation. By taking the time to
genuinely listen to our customers' needs and concerns, promptly addressing their
queries, and providing personalized solutions, we demonstrate our commitment to
their satisfaction.

Furthermore, treating each customer interaction as a chance to delight and
exceed expectations serves as a potent differentiator in a crowded marketplace.
Ultimately, by prioritizing every customer, we not only secure their continued
support but also pave the way for a thriving, customer-centric organization

Stay Updated with XATOXI Solutions
Subscribe to our newsletter for the latest on quantum safe solutions.
Subcribe Now
By subscribing, you agree to our Terms and Conditions.
Become part of our growing community
Join to Citizen Discord
CitizenStar is by Invitation Only Invitation Code
OK
© Xatoxi LTD 2024, All Rights Reserved.
PRIVACY
VERITI GLOBAL
XATOXI