Enigma is a crypto platform that’s trying to solve the problem of privacy on the blockchain by giving them access to much-needed storage, privacy, and scalability. Enigma wants to extend Ethereum Smart Contracts by introducing secret contracts, a brand of smart contract that gives users an element of privacy that’s not intrinsic to current blockchain protocols. These contracts operate off-chain, meaning the execution of the Smart Contract doesn’t occur on the Ethereum blockchain itself. This is how the Enigma protocol works: it breaks up the Smart Contract and any related data into pieces, encrypts those pieces, and distributes them redundantly among Enigma nodes. Enigma has a protocol level. The Enigma privacy protocol allows for decentralized computation of sensitive data. It has a platform layer too. On this protocol, dozens of platforms such as data marketplaces and AI exchanges can be built. In its application layer, it enables thousands of truly decentralized apps that require private computation and secure data.Its first application is catalyst. Catalyst is the first application to be built on the Enigma protocol, already active with tens of thousands of users. Catalyst is a revolutionary platform for data-driven cryptoasset investing and research, built for professional crypto traders. Enigma has a team of MIT graduates, and they’ve been working diligently to ensure Enigma’s success. Guy Zyskind, Enigma’s CEO and cofounder, helped start the project while he was still a student at MIT. He has more than a decade of software development experience with an M.S. from MIT. Sandy Pentland, a well known MIT data scientist who gained fame for his work in data-mining social interactions, is Zyskind and Nathan’s adviser on Enigma. With other advisors such as Alex Pentland, who sits on the Advisory Boards for Google and Nissan, CEO of Abra, Bill Barhydt and director of MIT media lab, Prof. Alex Pentland, it is hard to difficult a fault in the team.
ProximaX is an advanced extension of the Blockchain and Distributed Ledger Technology (DLT) with utility-rich services and protocols. Businesses, enterprises, and innovators can avoid costly and failure prone centralized architecture by utilizing an all-in-one sustainable platform which provides augmented secured services, content delivery, storage, and media streaming. The ProximaX protocol aims to offer DApp developers cost-efficient fault tolerant, multilayer, P2P cloud services including, but not limited to, blockchain-powered P2P storage and bandwidth. A fault-tolerant system is designed to ensure a system remains fully functional even when part of it is ‘down’ or unavailable. ProximaX will build a P2P cloud storage architecture with fault tolerance and a distributed database by removing the central entity and connecting all the servers (or nodes) in a mesh configuration. Failure of any single component of the mesh will have minimal effect upon the overall performance of the system. ProximaX protocol will ensure confidentiality and integrity of the data passing through a myriad of nodes. The use of distributed databases (DHT) ensures consistency and integrity throughout the network. ProximaX distributed file management system (DFMS) interfaces with NEM blockchain and works in four scenarios: 1. ProximaX Public DFMS with NEM Public chain 2. ProximaX Private DFMS with NEM Public Chain 3. ProximaX Public DFMS with NEM Private Chain 4. ProximaX Private DFMS with NEM Private Chain ProximaX will provide DApp developers with an easy-to-use SDK that abstracts the ProximaX protocol layer into a dynamic second layer on top of the NEM blockchain layer that can carry different unique DApp protocols. This will ensure that the DApp developers can build great P2P applications with the best possible security protocols without relying on points of central authority. It will empower developers to build apps and monetise in the ways they want without any unnecessary compliance pressure. This solution makes use of the NEM blockchain for value and hash transaction and the NEM cryptography framework to gain access to the ProximaX DFMS and work in a tightly integrated environment based on the above four scenarios.