Complete control of your activity. Made possible by opt-in peer relationships and opt-in transaction models.
Modern cryptography and distributed records create a tamper-proof activity log.
Single-party, counterparty and multi-party transactions, all supported by one dynamic architecture.
Share sensitive data explicity, only with counterparties, and not with anyone else.
Our unique transaction model is the “secret sauce” that outperforms every blockchain.
The advantages of asymmetric cryptography, with minimum complexity. Flexible multisign is available to power users...