PolySwarm in 60 Seconds. Polyswarm is a decentralized threat intelligence market made possible by Ethereum smart contracts and blockchain technology. Polyswarm incentivizes rapid innovation in the $8.5B/yr anti-virus and automated cyber threat intelligence space with precise economic incentives that reward timely and accurate threat intelligence concerning the malintent of files, network traffic and URLs. PolySwarm defines a real-time threat detection ecosystem involving enterprises, consumers, vendors and geographically-diverse security experts. Experts develop and hone competing “micro-engines” that autonomously investigate the latest threats, attempting to outperform their competition. PolySwarm’s “Proof of Work” is threat detection accuracy: the market rewards experts who are best able to defend enterprises and end users. Relative to today’s ad hoc market, PolySwarm will lower the barier to entry, provide broader coverage options, discourage duplicative effort and ensure interoperability among products and threat intelligence feeds. Economically, PolySwarm functions as a skill-required twist on a prediction market2 with thousands of micro-engines (“workers”) investigating the latest in malware evolution at machine speed - no human in the loop. PolySwarm will be developed by Swarm Technologies, Inc. (“Swarm Technologies”) with funding derived from the sale of ERC20-compatible Nectar (“NCT”) utility tokens. As a utility token, PolySwarm economically disincentivizes Nectar speculation by rewarding honest market participation through the collection and distribution of Fees (details on page 6) to valueadding, active participants.
Ivy is a blockchain-based technology for FIAT & cryptocurrency business transactions which require extensive verification in the international monetary system. The Ivy network utilizes Ivy (IVY) tokens which carry KYC & KYT data points critical for Financial Institution validation. Advantages of Ivy Network over traditional payment networks: 1. Securely facilitate the transfer of cryptocurrency payments while associating KYC and KYT data via the trusted, distributed ivyKoin network 2. Securely store an immutable reference to supporting transaction data in a public blockchain 3. Embed more KYT & KYC information into the transfer than traditional payment methods 4. Able to be integrated into existing banking software 5. Offer easy integration into accounting software for bookkeeping efficiency 6. Provide revocable access to KYC/KYT data to financial institutions, accountants, company managers and others, depending on the information they require OVERVIEW OF ARCHITECTURE It is intended that the Ivy Network will function through the use of a dual network architecture, where senders of Tokens operate on a public network (Ivy Public Network), and parties that provide the financial settlement to fiat currency participate on a private network (Ivy Private Network). KYC/KYT/AML data supporting transactions will be captured in cryptographic containers that are generated from the Ivy Public Network interaction with the Ivy Network smart contracts and support the activities of the Ivy Private Network participants in facilitating transaction settlement. This data will be stored and accessible by the financial institution and governing regulators of the fiat balance recipients.