NEST® ENCRYPTED

WHAT-PAPER

A proud member of the Decentralized Identity Foundation [DIF], NEST® ecosystems function on ES6 and W3C protocols to permit reusable, on-chain AML/KYC credentials alongside the more customized forms of reusable compliance authority attributions in Self-Sovereign Distributed IDs. No personal user information is stored on-chain. The NEST® SSDID private key pairs are defined and held at all times with the user, for messaging specifically, this feature differentiates our services from even such solutions as WhatsApp and Telegram.

The NEST® SSDID may be used for encryption of private data, access-control of stored data, confidential signing of all transactions or exchanges with party-specific recall or decryption abilities, signing into other decentralized applications as well as authentication and provenance control across varied forms of selected functions.

NEST® leverages multiple, quickly evolving Web3 solutions, is natively multichain while also operating a bespoke layer-zero-to-one Proof of Authority blockchain network consisting of over 40 active primary nodes. The NEST® network has further device-as-a-node and encrypted content delivery network storage features which permit the first truly decentralized, failsafe blockchain network of its kind. Utilizing advanced tunneling built on ZKP and ZTA encryption, NEST® is able to act as a middleware in distributed ledger lightweight contribution authenticators device side nodes.

Device-side encryption and operations thereby ensure non-custodial blockchain wallets throughout the ecosystem, with no limitation for user’s key-pair importation and single-source control point, through the NEST® application and/or ecosystem. Initial phases focus on click-to-create blockchain transactions and device-side operations extend also into the preparation of ERC721 or ERC1155 contract and asset standards.

+

DLT X ESPORTS

The esports and video gaming industries are about to go through a big change. Distributed Ledger Technology (DLT) is ready to transform how identity and content ownership work, giving users and developers more control than ever…

Read more >
NATURALLY ENCRYPTED SECURE TECH