Select Page

Decentralize The World's Data

Check out our FAQ
Github RepoLinkedIn

“Cipher Protocol is a high performance blockchain specializing in decentralized identity and data.”

Cross-chain DeFi Platform

 

Cipher Protocol will consist of a DeFi platform dedicated to the digital asset lending market, supporting cross-chain collaboration between various DeFi products. This platform is currently being built out. Cipher Protocol’s decentralized governance model and risk control mechanism intends to promote an equally beneficial relationship between borrowers, creditors, and guarantors. In addition, this platform will display a truly innovative credit evaluation module as an example of credit-based DeFi.

A New Standard

 

Facilitating Mass Adoption

 

Cipher Protocol is built with multiple blockchains and systems to support use with all business types.

In order to meet the needs of different industries, the flexible design structure is modularized, pluggable, and easily expandable.

CipherProxy applies blockchain technology to all business types, providing blockchains, smart contracts, distributed verification management, data exchange, and other protocols and APIs. Users can easily develop distributed services through Cipher Protocol without having previous knowledge of distributed networks.

 

Video Teaser

 

 

Did you know?

CipherProxy was originally an advanced digital marketing company.

Due to increasing concerns brought on by Big Tech, we shifted our efforts to build a decentralized system that could facilitate P2P data transfer, instead.

 

Key Features

 

Cipher Protocol is a high performance, public blockchain built with Substrate specializing in decentralized identity and data. Cipher Protocol’s next-gen infrastructure supports versatile cross-chain collaboration and layer-2 scalability, offering businesses the flexibility to design a blockchain that fits their specific needs. With an assortment of decentralized identity and data sharing protocols to enhance speed, security, and trust, Cipher Protocol’s features include Cipher ID, a mobile digital ID application and Decentralized digital identity (DID) used throughout the ecosystem, and DDXP, a decentralized data exchange and collaboration protocol.

Cipher DDXP

 

DDXP (Decentralized Data Exchange Protocol) is a decentralized data exchange and collaboration protocol. DDXP allows for the tokenization of data, data traceability, and cross-system data processing.

Cipher DAO

 

CipherDAO is a credit-based, cross-chain DeFi lending platform. It’s decentralized governance model and risk control mechanism aim to promote a mutually beneficial relationship between borrowers, creditors, and guarantors. 

Cipher Wallet

 

Cipher Wallet, CipherProxy’s self-sovereign data wallet, is a one-stop mobile application for the management of your digital identity, data, and assets, giving users the power to control the value of their data.

Cipher ODM

 

Cipher Open Data Marketplace is designed to allow individuals and organizations to monetize and acquire data in a trusted, standardized, and cost-effective way.

Cipher ID

 

Decentralized identity protocol that helps users manage their own data and enables blockchain-based multi-dimensional authentication provided by global verifiers.

Documents

 

 

Did you know?

Cipher Protocol will leverage the best of Polkadot.

Polkadot enables forkless upgrades, allowing blockchains to evolve and adapt easily as better technology becomes available. Its unique design gives projects more possibilities for innovation and flexible iteration than was ever possible in previous networks.

 

Vision Paper: Adtech & Martech

Lite Paper: Cipher Protocol (Coming Soon)

White Paper: Cipher Protocol (Coming Soon)

Enterprise Use Cases

 

Cipher’s Layer-1 cross-chain compatibility with networks like Binance Smart Chain, Polkadot, Cosmos, Ethereum, and others bring Cipher in a unique position to bridge the biggest enterprise companies with the fastest-growing decentralized ecosystems.

Finance & Banking

 

Cipher Protocol allows for any kind of asset to be collateralized for lending and trading within DeFi. In traditional markets, anything of value that can be re-sold is accepted as collateral by pawnbrokers for lending, with the lending limit depending on a collaterals’ fair market value, liquidity, and price volatility. In the event of liquidation, pawnbrokers agree to collect the ownership of collaterals if the borrower does not repay the loan.

Cipher Protocol will feature a lending pool that will act as the pawnbroker, accepting traditional assets as collateral for lending, while keeping vital DeFi features including decentralization, trust, and cost-efficiency.

 

Retail & Consumer Goods

 

At the start of the pandemic, retailers faced challenges such as keeping products on shelves, supply chains moving, stores open and employees safe. As the world cautiously steps toward reopening, retail sales are increasing. Now is a decisive moment for the retail industry to use blockchain in addressing all the challenges of the new normal.

Quality, reliability, authenticity and product safety can be better assured, while supply chain partners can know for certain where products are in seconds. With Cipher Protocol, an always-up-to-date performance history would become the basis for your reputation and everyone else’s in your retail network.

Supply Chains & Energy

 

Supply chain data is not always visible, available or trusted. Cipher Protocol helps supply chain partners share trusted data through permissioned blockchain solutions.

In times of disruption, this matters more than ever. Businesses and consumers want brands to guarantee product authenticity, while supply chain participants demand responsible sourcing and better visibility to minimize disputes. Blockchain for supply chain solutions help supply chain leaders use data to handle the disruptions of today and build resiliency for the future.

Media & Entertainment

 

Digital media has changed the world for consumers, artists and brands – yet major business problems persist. The U.S. economy loses billions of USD in total output each year from online music theft. Fraud rates for digital tickets are twice those for printed ones. And online advertising fraud costs companies at least $19 billion USD annually.

Cipher Protocol brings complete transparency to digital transactions with immutable, distributed ledgers delivering newfound trust to media, entertainment and advertising – while reducing costs, eliminating intermediaries and unleashing new value across supply chains.

Meet the Team

 

 

Laying the foundation for a better web

The internet is too important to billions of people for it to be at the mercy of a few powerful companies.

We are developing the technology to disrupt centralized online services and enable institutional innovation.

What if we no longer had to route our interactions through centralized services? What if data breaches were a remnant of an old flawed infrastructure? Each piece of CipherProxy’s technology is a step towards a society run on peer-to-peer networks instead of by a handful of corporations.

James Harbeck

Founder

 Sebastian Pedrosa

Co-Founder

Daniel McCoy

Co-Founder

Marc Roman

Lawyer &

CISO

Cipher Technology

 

Cipher Protocol leverages a hub-and-spoke architecture where public and private chains alike are connected to the Cipher Layer-1 as the central nervous system of the network.

Layer-1 Technology

 

 CipherProxy’s blockchain is built from scratch using Substrate with a key focus on interoperability and enterprise accessibility. It aims to become a Polkadot Parachain to leverage the security and scalability of the Polkadot chain. Other mainstream blockchains will also be fully interoperable with this network.

Layer-2 Technology

CipherProxy employs a series of interconnected Substrate side-chains with specific business logic to increase the network’s scalability, functionality, and versatility. These chains can be private or public, use various consensus protocols, and sync with other side-chains and blockchain ecosystems.

Layer-3 Technology

Enhanced customization and usability can easily be applied to the CipherProxy network using Wasm based cross-chain smart contracts that hold highly specific business logic. This will allow developers to create DApps with a standard of interoperability. Moreover, this layer also holds the smart contracts for oracles and off-chain workers.

Interoperability

Cross-chain Compatibility (Substrate)

Achieving cross-chain asset transfers with all public networks by using Substrate runtime components and cross-chain smart contracts.

Horizontal Scalability

Heterogeneous sharding within Cipher Layer-1 blockchain and beyond (Polkadot, Cosmos, Binance, Ethereum, etc).

Polkadot Parachain

CipherProxy’s future parachain leverages on additional security and integrations provided by Polkadot’s relay chain and ecosystem.

In Summary

The crypto economy is a puzzle with many pieces, with a growing number of highly interconnected enterprise use cases. For example, with data marketplaces, they often source data from IoT devices, which are widely used in supply chain tracing and the exchange data streams using smart contracts. Whenever these data feeds are not corporate-sensitive, third parties might want to pay money for reusing them, offering cryptocurrency in return. For traditional enterprises, this requires an efficient exchange method between fiat and crypto for banking use cases. Smart contracts on the other hand often require the importation of external data for their internal logic, which can then be achieved with the help of data marketplaces. This interconnectedness emphasizes the breadth of use cases for organization adoption. Ultimately, the single biggest reason why the number of enterprises using blockchain technology is still relatively low is because blockchain is still in its infancy. CipherProxy is here to accelerate adoption levels with our suite of solutions.

Frequently Asked Questions

 

Disclaimer

Cipher Protocol is at this stage work in progress.

This FAQ is continuously updated according to its developments. The structures and technologies to be included at genesis are not finalized and are liable to change with continued research.

Technology

What does "interoperability" mean?

Interoperability refers to the basic ability of different computerized products or systems to readily connect and exchange information with one another, in either implementation or access, without restriction.

What is Substrate?

Substrate is a modular framework that enables you to create purpose-built blockchains by composing custom or pre-built components. Learn more from their official website.

What is Cipher Protocol?

Cipher Protocol is part of the consortium of projects from Polkadot and Cosmos, united by the vision of cross-chain interoperability (cross communications) between blockchain networks and serve the purpose of a trustless, and scalable global decentralized ecosystem for all businesses and consumers.

Cipher Protocol offers a new approach to cloud computing with its Decentralized Data Exchange Protocol (DDXP) optimized for P2P data collaboration and security. This DDXP allows stakeholders to own and manage their data with full custody, making it one of the first platforms that gives them 100% control over any data use or deployment. Enterprise now have the opportunity to easily plug-in their existing data ecosystems in real time to increase value streams, privacy, security, and efficiency. Cipher makes data directly accessible in near real-time by all business units, partners/vendors, IoT devices, and machine-learning processes… etc.

What is Cipher Protocol's Decentralized Data Exchange Protocol?

Cipher Protocol’s DDXP is a decentralized data exchange and collaboration protocol. DDXP allows for the tokenization of data, data traceability, and cross-system data processing. The DDXP leverages Cipher Protocol’s layer-1 public blockchain and will be complaint with data regulations. (GDPR)

Why does Cipher Protocol need a blockchain and what is it used for?

Blockchain application brings trust, accountability, and transparency to digital transactions. The technology creates and maintains cryptographically secure, shared, and distributed ledger for transactions.

What applications does the Cipher Protocol DDXP feature?

It provides a series of methods and interfaces to meet the requirements of trust and data interoperability across multiple systems, which serves multiple business requirements and scenarios, especially the data exchange scenarios.

Peer-to-Peer Data Transmission

The data exchange system uses blockchain to support accurate search and transmission of data between two parties without having a centralized database.

Data Authorization Mechanisms

Data privacy protection and leakage prevention are always assured whilst giving the user full control of their data; each data transfer must receive authorization from all parties.

Copyright Protection of Data

Cipher stores, manages, and attests data throughout its life cycle. A digital identity is created for each copy of data from registration, request, authorization, to exchange. Copyright protection is also recorded to each copy on the blockchain.

Distributed Data Storage

A distributed data storage layer supports decentralized storage for different types of data

How does Cipher Protocol support the evolution of NFTs?

Cipher Protocol will be supporting NFT’s (non-fungible tokens) that can represent unique or fractionalized ownership of real-world or digital assets for business and applications. The DDXP offers a set of plug-and-play utilities that can be extended to any other NFT compatible network as well.

Cipher Protocol uniquely captures the critical event data relating to the issuance, transfers, and access of such tokens, ensuring that the state changes of the NFT are captured both on-chain and in the DDXP, both going through network consensus at the same time. This allows for fully automated verifications and value-transfer via smart contracts and workflow software to capture much more information and utility.

How does Cipher Protocol benefit DeFi?

The Decentralized Finance (DeFi) industry today consists mainly of the decentralized exchange of digital assets as well as the over-collateralization of digital assets to provide lending services. However, compared to mainstream financial services, it is evident that due to the lack of credit mechanisms, there are still limitations in the allocation of resources to users, and that mainstream financial service mechanisms are difficult to implement. Credit-based DeFi proposes the concept of integrating credit elements into decentralized finance. These elements can be used for credit-based lending or new asset digitization, further expanding the service model and scope of decentralized finance. It also gives DeFi greater potential to provide mainstream financial services.

Based on this concept, CipherProxy will build a decentralized autonomous organization (DAO) initiative called the CipherDAO for decentralized financial services that integrates credit elements. CipherDAO can support the construction of decentralized financial products that combine collateral value and credit evaluation, as well as further decentralized social governance and autonomy. Cipher Protocol will have cross-chain integration with other mainstream blockchain networks and will use the digital assets from these networks, as well as from its own network to build collateral pools. Additionally, Cipher Protocol’s decentralized identity data protocol supports the authentication of various kinds of assets, ranging from simple to complex, to NFT digital assets to lay a solid foundation for the addition of new types of collateral.

Credit-Based DeFi refers to DeFi products that integrate credit elements into decentralized financial services and enhance DeFi products in the following
ways:

• Credit lending: Introduces credit assessment into lending products, gradually reducing or even cancelling collateralization requirements, and realizing the application of real resource allocation.

• Asset digitization: The digitization of certain types of assets requires on-chain confirmation of a series of credit elements related to those assets,
such as ownership/asset attributes/legitimacy, etc.

• Regulatory compliance: If DeFi expands the service scope and category of the service group, compliance will become an important requirement, which will involve considering the needs of relevant assets or the credit element review of relevant users.

How does the Data Marketplace work?

Cipher Protocol’s ODM is powered by a complete data interaction protocol based on Cipher Protocol’s Layer-1 core. The process of data valuation, profit sharing, data security and privacy protection is fully decentralized.

What is the Data Marketplace used for?

With Cipher Protocol’s Open Data Marketplace, individuals and companies can monetize raw data, data processing service and insights, while still having full control over their data leveraging the unique features of public blockchain.

Companies that complete the KYB (know your business) verification with Cipher Protocols ODM are authorized to purchase any kind of data. The ODM ensures that each company acquire necessary and quality data in full compliance with regulations, especially when requesting data from individuals. Multiple secure data analysis and processing service will be available here as well.

What is "heterogenous sharding" and why does it matter?

There are three key concepts related to heterogeneous sharding namely single chain, shards, and heterogenous sharding. What is a single chain? It is analogous to a single-lane highway. ETH 1.0, EOS, NEO, hyperledger, public chains, alliance chains, and so on are all single chains. As for sharding, it is like a multi-lane highway. The advantage of a multi-lane highway is that the time needed for a huge amount of traffic to pass through is lesser than that of passing through a single-lane highway.

At the same time, sharding can be based on the current traffic to dynamically adjust the number of lanes. If one has three lanes for now, when traffic increases, one can add one, or two, or three more lanes to expand the capacity to allow more traffic to pass through. One thing to note is that, for each lane, one needs to have identical lanes with identical specifications. Such constraint requires us to consider in the first place how wide the lane should be. What kind of materials should be used? Sandstone or granite? Should we plant any greens on both sides? All these specifications are needed during the design phase. After the design, every time when we add lanes, we follow this blueprint to add identical lanes.

In the area of sharding, ETH 2.0, Zilliqa, Harmony, Near are all good examples. If so, then what is heterogenous sharding? Heterogenous sharding, like sharding, has a multi-lane highway but each lane can be designed differently. As the highway in the previous examples requires the same width and the same materials and such, the heterogenous sharding highway allows each lane to be designed differently.

Business

How does Cipher Protocol achieve enterprise adoption?

Enterprise adoption and decentralized blockchain networks have been viewed as two opposing ideals, compounded by the scaling, decentralization, and security trilemma. Cipher Protocol resolves this paradox by way of a holistic and system-wide solution for scalability, interoperability, and seamless integration of the global app ecosystem into a decentralized economy powered by blockchain technology.

Cipher Protocol and its stakeholders are convinced that the pathway to mass adoption is through enterprise adoption. This will be realized by working with successful enterprises that already have millions of loyal users. The CipherProxy team designed an easy and straightforward SaaS solution to drive further adoption through traditional sales and marketing practices.

What is your roadmap for 2021?

Launch Testnet Q3 2021.

What is CipherProxy's business model?

In order to drive economic value for the Cipher utility token, +- 20% of all Cipher network fees will be used for network transactions, and another 20% will be allocated to the Cipher Open Data Marketplace to stimulate activity between enterprises and data engineers.

How is data custodianship governed?

Data custodianship on Cipher is governed by the following four principles:

 

  • Data Governance: The process of managing the availability, usability, integrity, and security of the data in enterprise systems, based on internal data standards and policies that also control data usage. Effective data governance protocols on Cipher ensure that data is consistent, trustworthy, and doesn’t get misused or compromised.
  • Data Ownership: Customer data stored on Cipher chains are fully encrypted through secure RSA encryption and partitioned per enterprise entity with a state-of-the-art identity management system. Application data is associated with anonymous, randomized IDs, non-identifiable personal information. Only users and entities with the associated private key can decrypt and deanonymize their own data.
  • Secure Collaboration: Cipher will natively implement multi-party computing techniques such as federated learning and differential privacy to allow decentralized collaboration without exposing privacy-regulated customer data to the party analyzing (part of) the data.
  • Data Compliance: Enterprises operating in regions with strict data privacy regulations such as GDPR and CCPA can leverage Cipher’s hybrid architecture to create a permissioned environment with blockchain-based authorization and audit capabilities defined by state transition functions, while still maintaining interoperability with the rest of the network.
How does Cipher comply with GDPR/CCPA regulations?

Cipher DDXP captures and stores individually encrypted customer interaction data, along with value transactions to each user’s individual ledger and individual tamper-proof and time-capsuled data structures in IPFS clusters. This allows enterprises to capture customer journeys in individual ledgers for more personalized data intelligence operations. This enables enterprises to share customer data on the Open Data Marketplaces, without exposing sensitive data.

With Cipher’s privacy tool, the Decentralized Data Explorer (DDE), enterprise apps can permit their users to look up all data collected in their tools. In this way, Cipher turns the traditional blockchain privacy issues into a win/win for both enterprises and customers.

With Cipher, customer data is guaranteed to be compliant with GDPR and CCPA privacy regulations, giving it a major competitive advantage over other CRM solutions offered in the market.

Community

How can I stay updated with progress?

Interoperability refers to the basic ability of different computerized products or systems to readily connect and exchange information with one another, in either implementation or access, without restriction.

How can I reach the team?

Visit our Linkedin, twitter or instagram! You can also send an email to james@cipherproxy.com

What is the Cipher Partner Network?

The Cipher Partner Network (CPN) has been established to create universal protocol standards for the enterprise DeFi space and improve communications between the enterprises and the DeFi ecosystem. The alliance will also conduct research on emerging DeFi protocols to help avoid future crises in the community.