The 2016 economic report “On the Value of Virtual Currencies” commissioned by the Bank of Canada, found three contributing components dictating a cryptocurrency’s exchange rate: The actual use of virtual currency to execute real payments. The decision of forward-looking investors to buy virtual currency (thereby effectively regulating its supply). The elements that jointly drive future consumer adoption and merchant acceptance of virtual currency. XAC Attention Addresses Attention Addresses are linked to AMARK consumer data and have specific rules enforced by the XAC protocol. There are two key functions of attention addresses: XAC-LOCK XAC-Lock is a feature that encourages continued consumer engagement with AMARK. The XAC sent to Attention Addresses is initially locked and becomes available after a maturation period. The XAC attention awards paid to consumers continually matures into availability as new XAC is earned from ongoing attention marketing. This process encourages engagement with AMARK as attention wallets will rarely have a zero XAC balance, giving consumers a consistent flow of value to spend within the ecosystem. XAC-BURN XAC-Burn is enforced at the protocol level. All transfers to Attention Addresses require 5% of the XAC transferred to be burned. The XAC -Burn feature is designed to align interests between merchants and consumers in the AMARK ecosystem. Anytime merchants use the AMARK platform for marketing, they are supporting the value of the XAC currency as protocol rules enforces a 5% burn. As such, merchants are effectively scaling the supply of XAC to match the demand from the ecosystem. This supply-side scaling mechanism will offset new coins introduced through block rewards and pressure the price of XAC to an equilibrium reflective of demand from the ecosystem.
PolySwarm in 60 Seconds. Polyswarm is a decentralized threat intelligence market made possible by Ethereum smart contracts and blockchain technology. Polyswarm incentivizes rapid innovation in the $8.5B/yr anti-virus and automated cyber threat intelligence space with precise economic incentives that reward timely and accurate threat intelligence concerning the malintent of files, network traffic and URLs. PolySwarm defines a real-time threat detection ecosystem involving enterprises, consumers, vendors and geographically-diverse security experts. Experts develop and hone competing “micro-engines” that autonomously investigate the latest threats, attempting to outperform their competition. PolySwarm’s “Proof of Work” is threat detection accuracy: the market rewards experts who are best able to defend enterprises and end users. Relative to today’s ad hoc market, PolySwarm will lower the barier to entry, provide broader coverage options, discourage duplicative effort and ensure interoperability among products and threat intelligence feeds. Economically, PolySwarm functions as a skill-required twist on a prediction market2 with thousands of micro-engines (“workers”) investigating the latest in malware evolution at machine speed - no human in the loop. PolySwarm will be developed by Swarm Technologies, Inc. (“Swarm Technologies”) with funding derived from the sale of ERC20-compatible Nectar (“NCT”) utility tokens. As a utility token, PolySwarm economically disincentivizes Nectar speculation by rewarding honest market participation through the collection and distribution of Fees (details on page 6) to valueadding, active participants.