THE FUTURE BELONGS TO IMMEDIATE COMPLIANT TRANSFERS OF DIGITISED ASSETS FREE OF INTERMEDIARIES.
Here we invite business and thought leaders to explore what this means and why current crypto, including BITCOIN and Facebook's LIBRA, are unsuitable for commercial transactions...
AND THE EXTRAORDINARY OPPORTUNITIES THAT COME WITH COMPLIANT CRYPTO
Every asset will be digitized, so organizations and machines can instantly execute compliant transfers, free of intermediaries and registries.
Learn MoreEvery business will eventually issue their own inherently compliant, crypto-tokens to influence, reward and measure internal and external behaviour.
Learn MoreRegulations address many issues, e.g. Money Laundering, Privacy, Securities Transactions, etc. and typically regulations have been harbingers of inefficiency, but with solutions to crypto-compliance, we will experience greater privacy and security as well as extraordinary business and regulatory transformation.
Learn MoreHow we will all enjoy new found privacy through encrypted credentials that will enable selective sharing and revocation of personal data.
Learn MoreTransfer of stolen anonymous crypto is instant, undermining the trust required for asset security.
Learn MorePublic pseudo-anonymous networks, like Bitcoin and Libra are vulnerable to forensic analysis. There are few businesses that will risk sharing confidential business data with competitors.
Learn MoreBuilding compliant commercial applications on anonymous crypto platforms, results in costly complex, isolated centralized services.
Learn MoreThe lack of commerical adoption stems from the lack of suitability for business applications. Businesses applications demand confidence in identity anchored customer data in order to compliantly transfer value, customer accounting and manage incentive programs
Learn MoreALL compliant value transfer services, e.g. exchanges, remittances, securities, etc. result in isolated services, eliminating any possibility of a network effect that results from a common base of users.
Learn MoreBecause discreet onchain value transfers between an AML-compliant token and its anonymous crypto counterpart would counter compliance integrity, compliant value transfer services have no impact on demand for the underlying anonymous currency.
Learn MoreRequired: IDENTIFIED CONFIDENTIAL USE Vs Anonymous crypto that is unsuitable for commercial use, as organizations need to know that their customers are who they purport to be.
Learn MoreRequired: ENCRYPTED CONFIDENTIAL TRANSACTIONS Vs Transparent (pseudo anonymous) transactions that risk exposing confidential business and personal data.
Learn MoreRequired: (BLOCK)CHAIN LEVEL AML-COMPLIANCE Vs Anonymous crypto that relies on vulnerable, centrally governed regulated services, that leave open exits to unregulated anonymity.
Learn MoreThe most demanding challenge is how to reconcile regulatory inspection with user privacy
Learn MoreIt's critical that chain oversight has no points of centralised adminstration, as these points would leave the chain and individuals open to coercion.
Learn MoreRegulators must be assured of the quality of chain level AML-Compliancel, in the absence of legal leverage.
Learn MoreBy shifting compliance from the service to the (block) chain, means any business large or small can use crypto to engage their customers in transactions, gaining material income and insight into customer behaviour, free of burdensome AML-Compliance
Learn MoreBy addressing the need for identity and confidentiality, plus the benefits of device integration and digitised programmable assets, the door is open to begin transitioning conventional applications to crypto-technology
Learn MoreBorn from a common base of shared users, service providers can plug in compliant services, free of compliance and identity administration, resulting in a adoption driving multi-sided network effect.
Learn MoreBy lifting the burden of compliance off the shoulders of commerce, and offering regulators chain level oversight, regulators enjoy cost effective compliance and global commerce is relieved of the trillions of dollars wasted on unproductive compliance.
Learn MoreBy enabling crypto credentials, aka self sovereign credentials, users can feel safe in accumulating all relevant personal data in one place, encrypted and under their control.
Learn MoreNetworks rooted in factual identity, enabling political expression but denying unfettered corrupt conversations.
Learn MoreBy gathering a common base of uniquely identified users, the roadblock to instant polling is eliminated, giving birth to dynamic (digital) democracy, where views can keep pace with change.
Learn MoreWhy aren't P2P commercial applications driving usage of crypto networks and demand for cryptocurrencies?
Will businesses risk exposure of confidential customer data and transactions to benefit from crypto efficiencies
Without extreme protest, will users trust governments with keys to their confidential data and transactions
Platform governance must reflect inclusivity and democratization that cannot be seen as vulnerable to corruption by potential participants
Confidential transaction data cannot be vulnerable to forensic inspection and centralized dependencies