Alternatives to PlatON

Compare PlatON alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to PlatON in 2024. Compare features, ratings, user reviews, pricing, and more from PlatON competitors and alternatives in order to make an informed decision for your business.

  • 1
    Findora

    Findora

    Findora

    Deploy financial infrastructures with privacy-preserving transparency. Findora enables assets of any nature - dollar, bitcoin, equity, debt and derivatives. Its mission is to address the challenges necessary to support this broad class of assets and diverse financial use cases, providing confidentiality while retaining the transparency of other blockchains. Findora uses zero-knowledge proofs and secure multi-party computation to support many privacy-preserving features. Specialized zero-knowledge proofs allow Findora to be publicly audited, while data remains confidential. Findora features a high-throughput ledger design, and reduces storage requirements through cryptographic accumulators. Findora breaks open data silos for easy interoperability between the main- and side-ledgers. Findora provides you with the tools, documentation, and support to help you build your applications. Develop privacy-preserving applications on the Findora testnet today.
  • 2
    Horizen

    Horizen

    Horizen

    Horizen is powered by the most robust and secure public infrastructure enhanced with multiple security layers. Horizen’s distributed node system ensures the scalability, reliability, security and speed of its network. Horizen is also secured by an improved consensus with enhanced protection against 51% attacks. Horizen’s cross-chain protocol, Zendoo, is designed for developers to build blockchains and applications that solve today’s real-world problems with the flexibility to capture tomorrow’s opportunities. Powered by the Horizen blockchain to leverage the security of a robust PoW public blockchain with the largest distributed node network ensuring maximum reliability and resilience. Zero-knowledge enabled cross-chain protocol allowing auditable and privacy-preserving blockchains - bridging a major gap for real-world adoption.
  • 3
    DERO

    DERO

    DERO

    DERO is a general-purpose, private, and scalable decentralized application platform that allows developers to deploy powerful and unstoppable applications, while users retain total control over their assets with complete privacy. Account balances and data are never decrypted by the blockchain. Only account owners can decrypt and access their data. Welcome to a new data privacy paradigm. DERO has been developed from scratch in Golang and is being actively developed by the original developers. It is not a fork of any other coin. DERO is a homomorphically encrypted protocol that can serve individuals and businesses worldwide, with fast and anonymous transactions, smart contracts, and service models. The DERO Project has created a platform for developers to deploy secure, open, scalable, and privacy-preserving decentralized applications. DERO is unique because we value security and privacy above all else.
  • 4
    Cwtch

    Cwtch

    Open Privacy Research Society

    Cwtch (/kʊtʃ/ - a Welsh word roughly translating to “a hug that creates a safe place”) is a decentralized, privacy-preserving, multi-party messaging protocol that can be used to build metadata resistant applications. Decentralized and Open Participants in Cwtch can host their own safe spaces, or lend their infrastructure to others seeking a safe space. There is no “Cwtch service” or “Cwtch network”. The Cwtch protocol is open, and anyone is free to build bots, services and user interfaces and integrate and interact with Cwtch. All communication in Cwtch is end-to-end encrypted and takes place over Tor v3 onion services. Cwtch has been designed such that no information is exchanged or available to anyone without their explicit consent, including on-the-wire messages and protocol metadata.
    Starting Price: Free
  • 5
    Litentry

    Litentry

    Litentry

    The Litentry IdentityHub allows you to aggregate your personal data from blockchains and platforms to manage granular access to DApps. Our incorruptible hardware infrastructure allows you to stay anonymous when you need to and reveal yourself when you don't. Take back what is yours with tamper-proof digital data containers that only you own. Respect the privacy of your perfect user and learn how to effectively reach your target audience without violating their trust. Litentry's protocol and front-end products are used for any type of identity data generation, computation, and transfer where security and privacy are important. Our products allow you to manage your digital identity data scattered across Web2 and Web3 platforms, and generate and manage a verifiable identity with the help of privacy-preserving computation.
  • 6
    Dusk Network

    Dusk Network

    Dusk Network

    Dusk Network is a technology for securities. An open-source and secure blockchain (DLT) infrastructure that businesses use to tokenize financial instruments and automate costly processes. A distributed Financial Market Infrastructure (dFMI) should provide a clear and final settlement of transactions. Moreover, the settlement of transactions should be instant or near-instant (<15s). The popular proof-of-work consensus mechanism used by Bitcoin and Ethereum does not address these requirements. Therefore, we designed a more performant consensus called Succinct Attestation agreement that enables instant settlement of transactions within 15 seconds. Powered by zero-knowledge technology, organizations use the dusk networks to issue tokens that are governed by privacy-preserving smart contracts. Harnessing the power of DLT while respecting confidentiality agreements, and data protection legislation.
  • 7
    Optable

    Optable

    Optable

    End-to-end data clean room platform, integrated for activation. Publishers and advertisers use Optable data clean room technology to securely plan, activate and measure advertising campaigns. A new generation of privacy-preserving data collaboration software. Optable customers can collaborate with their customers and partners, including those who aren't Optable customers themselves. This can be done using the platform's Flash Nodes, allowing to invite other parties into a secure environment. Optable offers a decentralized identity infrastructure, allowing to build of private identity graphs. The infrastructure provides means for creating purpose-limited, permission data clean rooms that minimize data movement. Interoperability with data warehouses and other data clean rooms is key. The use of our open-source software allows third-party platforms to match data with Optable customers, as well as implement secure clean room functions for their own use.
  • 8
    Secret Network

    Secret Network

    Secret Network

    Secret Network is the first blockchain with data privacy by default, allowing you to build and use applications that are both permissionless and privacy-preserving. This unique functionality protects users, secures applications, and unlocks hundreds of never-before-possible use cases for Web3. Whether you’re a developer, an artist, an entrepreneur, or a dreamer, you can become a Secret Agent and contribute to Secret Network. Check out the many contributors, collaborators, applications, and backers that make up the Secret Network ecosystem. With blockchain technology, we have the potential to create a more empowering and inclusive internet, what is often referred to as Web3. But current blockchains are public by default, exposing all data to everyone and putting users at risk. In order to enable meaningful use cases and achieve global adoption, users and organizations need control over how their data is used and shared, a concept we call programmable privacy.
  • 9
    Render Network

    Render Network

    Render Network

    The Render Network is the first decentralized GPU rendering platform, empowering artists to scale GPU rendering work on-demand to high-performance GPU nodes around the world. Through a blockchain marketplace for idle GPU computing, the network provides artists the ability to scale next-generation rendering work at fractions of the cost and at orders of magnitude increases in speed when compared to the centralized GPU cloud. Launched in 2017, the Render Network is built to provide a platform for a wide array of computation tasks, from basic rendering to artificial intelligence, which are facilitated swiftly and efficiently in a blockchain-based peer-to-peer network, free from error or delay, while ensuring secure property rights. Making next-generation 3D rendering widely accessible for the content demands of immersive media requires exponential increases in computing scale that is only possible through a decentralized global network.
  • 10
    Efinity

    Efinity

    Efinity

    Next-generation Blockchain for NFTs. Scalable, decentralized, cross-chain network designed to bring non-fungible tokens to everyone. Enjin is developing Efinity, a next-generation blockchain for digital assets, built on Polkadot. Businesses and developers seriously need a platform that can deliver a modern, mainstream and developer-friendly NFT experience. Since the release of Ethereum, there have been attempts to build infrastructure and tokenization around this general-purpose computing blockchain, but there’s an ever-growing thirst for a better solution. Creators are forced to work with crippling fees, inflexible smart contracts and disjointed interoperability. Adoption of today’s NFTs is still limited to die-hard crypto enthusiasts. The blockchains that non-fungible tokens live on give actual users no incentives (other than the prices rising), because miners are given the full share of generated tokens.
  • 11
    Sahara AI

    Sahara AI

    Sahara AI

    Build Sahara knowledge agents as custom on-premise AI solutions that save costs, drive growth, and enable new business opportunities. Elevate productivity through workflow automation, predictive analytics, personalized experiences, resource optimization, and supply chain enhancement. Participate in Sahara data, a trustless, permissionless, and privacy-preserving platform for high-value datasets and data services to train AI. The business extends far beyond conversational capabilities, autonomously analyzing both external and internal proprietary data to offer reliable decision-making tailored to specific needs. The platform, decentralized or on-premise, offers an intelligent AI-centered, human-in-the-loop, and privacy-preserving approach to deliver high-value data for your AI.
  • 12
    Veres One

    Veres One

    Veres One

    Veres One is a secure, privacy-preserving, and cost-effective way for you to control and manage your identity on the web. Ledgers enable us to reduce identifier management costs through shared common infrastructure. Veres One is optimized for identity, which further reduces costs. As a result, network operating costs and fees are a fraction of those of general-purpose ledgers like Bitcoin and Ethereum. Unlike many other networks, Veres One does not use a scarce network token. This removes price volatility and regulatory risks associated with speculative token networks. Veres One charges low, stable fees that decrease as the network scales. Distributed systems enable competitors to cooperate on common infrastructure. These systems naturally resist centralization, surveillance, and censorship, which are threats to identity. Veres One utilizes decentralized technology and governance to protect your identifiers.
  • 13
    LiveRamp

    LiveRamp

    LiveRamp

    Everything we do centers on making data safe and easy for businesses to use. Our Safe Haven platform powers customer intelligence, engages customers at scale, and creates breakthrough opportunities for business growth. Our platform offers the modern enterprise full control of how data can be accessed and used with industry leading software solutions for identity, activation, and data collaboration. Build access to data, develop valuable business insights and drive revenue while maintaining full control over access and use of data at all times. Accurately address your specific audiences at scale across any channel, platform, publisher or network and safely translate data between identity spaces to improve results. Protect your customer data with leading privacy-preserving technologies and advanced techniques to minimize data movement while still enabling insight generation.
  • 14
    Hermez

    Hermez

    Hermez

    Hermez is an open-source ZK-Rollup optimized for secure, low-cost and usable token transfers on the wings of Ethereum. Hermez seamlessly integrates into the fabric of the Ethereum ecosystem and enables low-cost token transfers for an inclusive economy. Cost-efficient token transfers and swaps with high throughput. Decentralized and open-source architecture. Computational integrity for secure transactions. By using zero-knowledge technology, transfer costs are significantly reduced, allowing more accessible financial services for mainstream adoption. Computational integrity and on-chain data availability are guaranteed by zero-knowledge-proof technology while preserving the public blockchain properties of Ethereum. Hermez's mission is to create an inclusive, resilient and highly efficient payment network for the next generation of digital currencies to ensure everyone has the freedom to transact.
  • 15
    Aleph Zero

    Aleph Zero

    Aleph Zero

    Privacy-enhancing public blockchain with instant finality. Aleph Zero is built for enterprise, Web 3.0, and DeFi use-cases. Aleph Zero is a proof-of-stake public blockchain. We combined an original, aBFT consensus protocol with a customized substrate stack. Currently, we’re working on enhancing the platform with a privacy framework based on Zero-knowledge Proofs (ZKPs) and secure Multi-Party Computation (sMPC) to empower developers with a unique approach to private smart contracts. During a laboratory test, Aleph Zero’s peer-reviewed consensus protocol (AlephBFT) achieved 89,600 tx/s with a 416 ms confirmation time in a decentralized test setting of 112 AWS nodes spread across five continents. Aleph Zero’s real-world performance, especially under heavy l network load, is yet to be determined. The Aleph Zero Consensus Protocol has been officially peer-reviewed and accepted for publication in the conference proceedings of advances in financial technology 2019.
  • 16
    NuCypher

    NuCypher

    NuCypher

    Manage secrets such as IAM tokens, database and SSH credentials, and signing/encryption keys across dynamic environments. Conditionally grant and revoke access to sensitive data to arbitrary numbers of recipients. Process encrypted data while preserving the confidentiality of the inputs and results. NuCypher's PRE network provides cryptographic access controls for distributed apps and protocols. NuCypher's NuFHE library enables secure, private computation on encrypted data by outsourced nodes. Fully Homomorphic Encryption (FHE) is a form of encryption that allows arbitrary, secure computation on encrypted data (meaning encrypted data can be processed without needing to decrypt it first). Operations on the encrypted data are applied as if being performed on the plaintext data.
  • 17
    Liink

    Liink

    JPMorgan Chase

    Unleash the power of the world’s first bank-led, peer-to-peer network for secure, privacy-preserving information exchange. Liink has the potential to enable participants to build applications1 that leverage shared information, making it possible to solve common industry challenges. Network participants exchange data privately while maintaining control over who they connect with, how the data is shared, and who can use it. Organizations can leverage Liink to establish new business models and unlock new commercial opportunities.
  • 18
    Nitromia

    Nitromia

    Nitromia

    Unlocking the power of fully homomorphic encryption for financial institutions. Imagine a world where you can extract insights from your data and perform advanced analytics without worrying about data leakage, attacks and compliance. With Nitromia’s fully homomorphic cryptography, companies perform advanced data science and computations at minimum risk with zero exposure for data at rest and in transit. The Platform. Based on cutting edge fully homomorphic technology, Nitromia’s enablement platform empowers data scientists to run artificial intelligence and machine learning analytics directly on encrypted data. With Nitromia, business insights are extracted and sensitive data is analyzed, all while remaining hidden and secure. Built on the pillars of security, privacy and compliance, the revolutionary platform enables complex calculations and predictive analytics in real time. With Nitromia, financial institutions can finally fully utilize their data with zero risk.
  • 19
    Ocean Protocol

    Ocean Protocol

    Ocean Protocol Foundation

    Ocean Protocol unlocks the value of data. Data owners and consumers use Ocean Market app to publish, discover, and consume data in a secure, privacy-preserving fashion. Holders stake liquidity to data pools. Developers use Ocean libraries to build their own data wallets, data marketplaces, and more. Ocean data tokens wrap data services as industry-standard ERC20 tokens. This enables data wallets, data exchanges, and data co-ops by leveraging crypto wallets, exchanges, and other decentralized finance (DeFi) tools. Ocean makes it easy to publish data services (deploy and mint ERC20 data tokens), and to consume data services (spend data tokens). Crypto wallets, exchanges, and DAOs become data wallets, exchanges, and DAOs. Data tokens are the interface to connect data assets with blockchain and DeFi tools. Crypto wallets become data wallets, crypto exchanges become data marketplaces, DAOs for data co-ops, and more via DeFi composability.
  • 20
    Finema

    Finema

    Finema

    We provide a holistic solution to all your credential ownership and management. Not only applicable to a wide range of scenarios, it is secure, convenient and fully owned by you. You can check whether the information presented is a real human, real transcript, authentic brand-name bag, or malevolent fraudster from barely revealing any data, thanks to our cryptographic technique. Our platform provides secure, privacy-preserving and cost-effective — the way to help people manage their identity on the internet.
  • 21
    aelf

    aelf

    aelf

    aelf is the most advanced and secure blockchain cloud infrastructure with segregate, unlimitedly scalable cloud computing networks, leading the decentralized future. Innovative cross-chain interoperability, elegant multi-level main-side chains structure; unlimited scalability, leading in Blockchain 3.0 era with unique cross-chain technology. Based on this public beta testnet, you can try the core functions of the aelf main network, node building and election, mining rewards, sidechain configuration, cross-chain interaction, DApp deployment, and more. A complete suite of application development tools for underlying decentralized blockchain layers to suit a wide range of developer needs. aelf community members participate in building aelf ecosystem, achieving progressive development through different governance methods such as the aelf DAO, Node Election, Resource Purchase, and Proposals.
  • 22
    Crypto APIs

    Crypto APIs

    Crypto APIs

    Crypto APIs is a trusted Web 3 infrastructure provider for crypto applications & dApps. It is the easiest way to interact with blockchains. The company's product suite includes Blockchain Data, Blockchain Events, Blockchain Automations, Blockchain Tools, Non-Custodial Wallets and Market Data. Interoperability is one of the main benefits of Crypto APIs, as it supports multiple blockchains, tokens, and standards. Developers can use the product suite on both testnets and mainnets. The unified REST API endpoints guarantee easy access to different blockchains. SDK libraries make it easy for developers to build solutions using Crypto APIs endpoints. With a seamless one-time integration and advanced cryptographic security, Crypto APIs offers a perfect infrastructure layer for Web 3. It is ISO/IEC 27001:2013 certified – a testament to the company’s dedication to privacy and security.
    Starting Price: $129 per month
  • 23
    Cartesi

    Cartesi

    Cartesi

    Build smart contracts with mainstream software stacks. Take a productive leap from Solidity to the vast universe of software components supported by Linux. Enable million-fold computational scalability, data availability of large files and low transaction costs. All while preserving the strong security guarantees of Ethereum. From games where players conceal their data to Enterprise applications that run on sensitive data, preserve privacy on your DApps. Descartes executes massive computational tasks off-chain, on a Linux virtual machine fully specified by a smart contract. The results of the computations are fully verifiable and enforceable on-chain by honest Descartes node runners, preserving the strong security guarantees of the underlying blockchain. Defeat the scalability limits of Ethereum, with million-fold computational gains, while preserving the strong security guarantees of the blockchain.
  • 24
    ContentBox

    ContentBox

    ContentBox

    Empowering a decentralized digital content ecosystem. Global blockchain platform for the digital content industry—17 million users and growing. A fast and secure blockchain to carry out multi-party contingent payments. A blockchain-based identity and attribution service across multiple applications. A turn-key solution for small and medium-sized partners to set up a content platform easily and quickly. Backed by 108 of the world's top crypto funds. Blockchain-based infrastructure for the decentralized digital content industry.
  • 25
    Wanchain

    Wanchain

    Wanchain

    Blockchain technology is rapidly changing the world as we know it, but public and private blockchain networks are still operating in isolation. Open Finance must be connected. Open finance is enabling financial freedom, empowerment, and connectedness that we’ve never experienced in history. We seek to accelerate this change through global connectivity. Wanchain is the world’s most advanced blockchain interoperability platform. Wanchain is connecting all isolated public and private blockchains to allow flow of the world’s digital assets and data. Lock tokens on original blockchain using decentralized, non-custodial mechanism. Use proxy tokens in DAPPs throughout Wanchain’s crosschain ecosystem. Burn the proxy tokens and unlock the original tokens. Wanchain provides the economic infrastructure for developers to build super financial applications that span multiple blockchains and communities.
  • 26
    Muon Network

    Muon Network

    Muon Network

    Redefine what you thought possible with blockchain, then build it. Decentralized cloud computing, cross-chain bridge interfacing and secure oracles for gaming, DeFi and dApps. Decentralized computation, storage, and hosting, and a proprietary oracle for play-to-earn economies. Decentralized cloud services and white label liquidity bootstrappers including farms, bridges, and staking, along with the first 10 ms frequency oracle. Putting the decentralized in dApps: remove centralized points of cloud failures, node networks, and data security. Muon is a decentralized node-network, with limitless scalability. As it is not a chain and does not permanently store data it is free from the restrictions of 'preservation of state'. With Muon, any web3 application can make use of external data, with confidence in its validity, security, and near-instantaneous response times. Muon's decentralized autonomous nodes operate like a VPS.
  • 27
    Keep Network
    Stake on Ethereum’s first private computer and earn. Staking with Keep is the best way to back a truly decentralized network and the future of DeFi. Privacy-focused infrastructure for the public blockchain. The Keep network allows private data to be used on public protocols without sacrificing confidentiality. Keep is the only protocol that is truly decentralized. “Keeps” are off-chain containers that allow contracts to use private data without exposing the data to the public blockchain. The Keep network stores data with the highest level of encryption. Keep and tBTC have been audited by the strongest firms in the ecosystem. Learn more about staking on the Keep network to earn rewards and secure the network. Keep is a privacy layer that enables private data to be leveraged on public blockchains without compromising security or confidentiality. Keep is the network behind tBTC, the first secure and decentralized tokenized bitcoin on Ethereum.
  • 28
    Bittensor

    Bittensor

    Bittensor

    Bittensor is an open-source protocol that powers a decentralized, blockchain-based machine-learning network. Machine learning models train collaboratively and are rewarded in TAO according to the informational value they offer the collective. TAO also grants external access, allowing users to extract information from the network while tuning its activities to their needs. Ultimately, our vision is to create a pure market for artificial intelligence, an incentivized arena in which consumers and producers of this valuable commodity can interact in a trustless, open, and transparent context. A novel, optimized strategy for the development and distribution of artificial intelligence technology by leveraging the possibilities of a distributed ledger. specifically, its facilitation of open access/ownership, decentralized governance, and the ability to harness globally-distributed resources of computing power and innovation within an incentivized framework.
    Starting Price: Free
  • 29
    Theta

    Theta

    Theta Network

    Next generation video and entertainment blockchain powered by you. The Theta blockchain is the only end-to-end infrastructure for decentralized video streaming and delivery that provides both technical and economic solutions. This is one of the most exciting new blockchain ventures I have heard about. Decentralized peer-to-peer video delivery. A new native blockchain. Powered by users. For sharing excess bandwidth and resources, viewers are now rewarded to participate in the network. A decentralized peer-to-peer network delivers streams efficiently globally. Video platforms no longer need to build expensive infrastructure, means more innovation and unique business models. Open to all developers and partners to build on the Theta network. Video platforms and content providers can build specialized Dapps for their audience. From esports, music, TV and movies to distance learning and peer to peer live streaming. Power the next generation entertainment.
  • 30
    Neo

    Neo

    Neo Team

    The blockchain development platform. Neo provides a full stack of features out of the box, but doesn't keep you boxed in. Native functionality provides all the infrastructure you need to build complete decentralized applications, while advanced interoperability allows you to harness the power of the global blockchain ecosystem. Neo has a unique dual token model that separates governance from utility. NEO token holders are the owners of the network and are able to participate in governance. NEO holders also receive passive distribution of the network utility token, GAS - No staking required. GAS rewards are increased for voting participation. GAS is used to pay for network fees, smart contract deployments, and in dApp purchases.
  • 31
    Coreum

    Coreum

    Coreum

    A 3rd generation Blockchain built to serve as a core infrastructure for future decentralized applications. With the ability to process up to 7000 transactions per second with a federated group of 16 rotating validators, Coreum is the fastest blockchain in the world. Using the well-established Tendermint Consensus Engine and Cosmos SDK, Coreum brings a low-latency proof-of-stake blockchain. Applications can be written in many languages and compiled into the modern turing-complete Web Assembly (WASM) before processing. With hundreds of Blockchains currently being used, Coreum deploys a bridge functionality to interoperate with various chains through collateralized wrapping.
  • 32
    Bitfount

    Bitfount

    Bitfount

    Bitfount is a platform for distributed data science. We power deep data collaborations without data sharing. Distributed data science sends algorithms to data, instead of the other way around. Set up a federated privacy-preserving analytics and machine learning network in minutes, and let your team focus on insights and innovation instead of bureaucracy. Your data team has the skills to solve your biggest challenges and innovate, but they are held back by barriers to data access. Is complex data pipeline infrastructure messing with your plans? Are compliance processes taking too long? Bitfount has a better way to unleash your data experts. Connect siloed and multi-cloud datasets while preserving privacy and respecting commercial sensitivity. No expensive, time-consuming data lift-and-shift. Usage-based access controls to ensure teams only perform the analysis you want, on the data you want. Transfer management of access controls to the teams who control the data.
  • 33
    BeeKeeperAI

    BeeKeeperAI

    BeeKeeperAI

    BeeKeeperAI™ uses privacy-preserving analytics on multi-institutional sources of protected data in a confidential computing environment including end-to-end encryption, secure computing enclaves, and Intel’s latest SGX enabled processors to comprehensively protect the data and the algorithm IP. The data never leaves the organization’s protected cloud storage, eliminating the loss of control and “resharing” risk. Uses primary data - from the original source - rather than synthetic or de-identified data. The data is always encrypted. Healthcare-specific powerful BeeKeeperAI™ tools and workflows support data set creation, labeling, segmentation, and annotation activities. The BeeKeeperAI™ secure enclaves eliminate the risk of data exfiltration and interrogation of the algorithm IP from insiders and third parties. BeeKeeperAI™ acts as the middleman & matchmaker between data stewards and algorithm developers, reducing time, effort, and costs of data projects by over 50%.
  • 34
    Plat.AI

    Plat.AI

    Plat.AI

    Plat.AI is a real-time decision-making engine, offering buildable and maintainable AI for any platform or system–regardless of your experience level. Our model builder delivers fast results and decisions – no coding experience is required. Plat.AI offers data intelligence without you needing to write a single line of code. In fact, it may take as little as five minutes to create and deploy an automated custom model. Our self-service platform is designed to use your data to create real-time decisions and can adapt to your platform or system of choice. You can have your model up and running in as little as one month. After that, you can enjoy real-time predictive analytics. The best analytics software will give you transparency. While deep learning or a black box option is available for those who need it, we want to show you what’s happening under the hood. We offer one-on-one support while building, deploying, and maintaining your model.
  • 35
    Sepior

    Sepior

    Sepior

    Multiparty Computation (MPC) generates and uses keys in the form of distributed key shares – eliminating the existence of a complete key on any single device to eliminate single points of failure. Sepior provides next-generation key management technology that allows businesses to transact online with institutional-grade cryptocurrency wallets, private blockchains, and SaaS applications. Sepior is pioneering the industry transition to threshold cryptography, using multiparty computation (MPC) to address the need for data confidentiality, integrity, and availability of new and emerging online services. For cryptocurrency exchange providers and other institutional traders, Sepior solves the problem of securing the private keys associated with cryptocurrency stored in wallets, facilitating institutional-grade of wallet security for service providers and their customers. Sepior’s approach also dramatically reduces mining workloads and the complexity of on-chain operations.
  • 36
    pTokens

    pTokens

    pTokens

    pTokens can teleport any token to a different blockchain, without frictions. Liquidity unchained! Every pToken is transparently pegged to its respective token. It is a trustless 2-way peg. Build tools without barriers: cross-chain composability is made possible by pTokens. They were made for DeFi. A decentralized process makes everything trasparent. Anyone can peg-in/peg-out via the pTokens DApp. A network of secure sandboxes verifies the amount of underlying asset locked and these jointly trigger (via a Multi-Party Computation) pTokens minting mechanism. Newly minted pTokens are then available for the user to play with. All pTokens are fully-backed and their underlying asset can be redeemed at any time.
  • 37
    XinFin

    XinFin

    XinFin

    eXchange inFinite (XinFin), is a Delegated Proof of Stake Consensus network (XDPoS), enabling hybrid relay bridges, instant block finality and interoperability with ISO20022 messaging standards, making XinFin's hybrid architecture developer-friendly. Interoperable blockchain network for global trade & finance which enables digitization, tokenization, and instant settlement of trade transactions, increases efficiency, and reduces reliance on complex FX infrastructures, allowing for increased flexibility in liquidity management for financial institutions. Delegated Proof of Stake (XDPoS) leverages the power of stakeholder approval voting to resolve consensus issues in a fair and democratic way. Higher interoperability with legacy systems and other blockchain platforms makes XinFin Protocol (XDC) the language of core banking systems, ERP systems and SWIFT systems, and many more.
  • 38
    Odsy Network
    A secure, programmable, and trustless access control layer to all of Web3. Odsy Network is a security-first blockchain of dWallets. Odsy Network brings real-world use cases to crypto in a fully decentralized way, by acting as a universal layer of access control to all of Web3. A dWallet is decentralized, programmable, and transferable, and can sign transactions on any other blockchain. With multiple layers of security, including MPC and TEEs, Odsy Network’s #1 priority is keeping dWallets secure. Odsy is the first network to implement dWallets, utilizing a novel approach to secure multi-party computation. Odsy Builders will create protocols and solutions on top of the Odsy Network to solve real-world problems with dWallets. Extraordinary teams and individuals, Odsy Builders, will be able to connect crypto to the real world with new and innovative protocols, solutions, and companies built on top of the Odsy Network.
  • 39
    Xtendr

    Xtendr

    Xtendr

    XtendR unhides detailed, privacy-preserving insights across multiple independent data sources. XtendR enables access to thus far inaccessible data, and protects you during your entire data lifecycle, giving you confidence in complete privacy and regulatory compliance. XtendR is more than anonymity, it’s the critical missing piece for multi-party data sharing with true privacy protection - it is cryptography on duty so you can reach your full potential. The most advanced privacy-enhancing data collaboration technology. Xtendr solved the decades-long cryptography challenge of data sharing between mutually mistrustful parties. Take your business further with an enterprise-grade data protection offering that allows individual organizations to form data partnerships while protecting sensitive data. Data is the currency of our digital age. Some argue that it is replacing oil as the world's most valuable resource and there is no doubt about its growing importance.
  • 40
    Chain Cloud
    Chain Cloud is a decentralized infrastructure protocol designed for developers to access blockchain networks on-demand. Permissionless infrastructure is designed for you to retain control of your funds and keys. Designed to deploy your requested blockchain node without any technical knowledge. Join a network of computing resources for Chain Protocol and earn XCN. Using Chain Cloud, developers can access public blockchain networks to easily build their applications and projects with RPC API endpoints and complete automated nodes. Focus on shipping and scaling your product instead of building and maintaining ledger infrastructure. Ledgers do not require code changes, even if you add new features, transaction types, and even products to your ledger. Architected for the enterprise, Chain scales as your business does. Get unmatched insights into your business with fine-grain tracking and powerful analytics with Archive Node capabilities.
    Starting Price: Free
  • 41
    KILT

    KILT

    KILT Protocol

    Experiment with our KILT Demo Client and request play money from the Mashnet Faucet. See how easy it is to build your own blockchain apps using our KILT SDK. Check out our running KILT blockchain nodes and look at live transactions happening on the KILT Blockchain right now! KILT is a decentralized identity blockchain network, with decisions made by the community of KILT Coin holders using a sophisticated system of governance. The vast amount of users on one service automatically generates a monopoly. Better services coming up have little chance of being recognized, and the monopoly service will not evolve as fast as it could because it does not fear competition. The amount of data collected by only a few services gives these services an unfair advantage in the age of artificial intelligence.
  • 42
    Bitkern

    Bitkern

    Bitkern

    Bitkern is a company that operates a data center for Bitcoin mining. They claim to be one of the most efficient in the world, and offer collaboration with international network partners. Bitkern is a public company founded in 2017 that specializes in crypto, cryptomining, energy supply, hosting services, artificial intelligence, blockchain technology, Bitcoin, high performance computing (HPC), and joint venture.
  • 43
    akaChain

    akaChain

    akaChain

    The blockchain-backed enterprise platform for Digital ID. akaChain, the blockchain-backed enterprise platform, offers scalable, secure, and transparent Digital ID to enterprise that wish to overcome the hurdle of proof of identity. akaChain, is an end-to-end, permissioned, multi-chain network based on the Hyperledger Fabric. The Privacy Preserved Bridge Protocol cryptographically stores private data to ensure transparency and security with a focus on empowering business innovations and creating a fair and objective network environment. Low redemption, balance sheet liability, and human errors are the past. Transform your loyalty with blockchain. Don’t let your customers be credit invisible. Explore how blockchain powers credit scoring. The modern supply chain is broken. Put your customers’ mind at ease with the transparency. Business across industries has transformed with akaChain.
  • 44
    iExec

    iExec

    iExec

    A decentralized network giving applications access to trusted off-chain computation and data. An innovative market network where everyone can monetize their applications, servers and data-sets. As a developer, you can use iExec to overcome blockchain limitations, by executing your computations on a new distributed infrastructure. As a provider, you can rent out your machine’s computing power, monetizing it by executing tasks for applications. As a token holder, you can get into the world of crypto-economy by trading your RLC tokens whenever you want. iExec introduces a new paradigm for cloud computing. Cloud resources can now be traded on a global market, just like any other commodity. Instant access to a large capacity of computing power from the provider offering the best rate. iExec offers CLI and JS libraries for developers. Execute ‘off-chain’ computations through the iExec decentralized cloud and overcome Ethereum scalability issues.
  • 45
    Aurora

    Aurora

    Aurora Chain

    Aurora is a decentralized application platform based on third-generation blockchain technology dedicated to providing mature blockchain technology solutions for the entire industry. Blockchain Integration Development IDE supporting multiple development languages. Multi-party construction, smart user portrait, accurate distribution. Accelerating the flow of value assets between the traditional economy and the crypto economy. Aurora Eco's underlying public chain network provides a commercial-grade technology platform for a range of industries. Achieve advanced security and superior processing power with a focus on maximum fairness. Automatically upgrade the chain pending the outcome of the community vote results on suggested upgrades. Open parallel chain network compatible with multiple consensus systems.
  • 46
    BrainBox AI

    BrainBox AI

    BrainBox AI

    BrainBox AI utilizes self-adapting artificial intelligence technology to proactively optimize one of the world’s largest energy consumers and GHG emitters: buildings. It is often unperceived that one of the leading contributors of this energy usage comes from buildings’ Heating, Ventilation, and Air Conditioning (HVAC) systems. In fact, 45% of commercial buildings’ energy consumption comes from HVAC, of which 30% is usually wasted. Using deep learning, cloud-based computing, and our proprietary process, our AI engine autonomously and granularly optimizes existing HVAC systems in real-time for maximum impact on energy consumption, carbon footprint and building operations. Commercial buildings produce a large portion of global GHGs. Our technology can help halve these emissions. BrainBox AI's game-changing technology uses deep learning, cloud computing, and custom algorithms to proactively optimize the energy consumption of one of the largest climate change contributors.
  • 47
    WhyLabs

    WhyLabs

    WhyLabs

    Enable observability to detect data and ML issues faster, deliver continuous improvements, and avoid costly incidents. Start with reliable data. Continuously monitor any data-in-motion for data quality issues. Pinpoint data and model drift. Identify training-serving skew and proactively retrain. Detect model accuracy degradation by continuously monitoring key performance metrics. Identify risky behavior in generative AI applications and prevent data leakage. Protect your generative AI applications are safe from malicious actions. Improve AI applications through user feedback, monitoring, and cross-team collaboration. Integrate in minutes with purpose-built agents that analyze raw data without moving or duplicating it, ensuring privacy and security. Onboard the WhyLabs SaaS Platform for any use cases using the proprietary privacy-preserving integration. Security approved for healthcare and banks.
  • 48
    IAP Network

    IAP Network

    Information Assurance Platform

    The IAP’s innovative combination of blockchain technology, zero-knowledge proofs and meta-consensus protocols allow for any of these parties to cryptographically prove the existence of evidence, states or activities to any interested party. Moreover, they allow for complete transparency without sacrificing the privacy of sensitive data. Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event. Third parties, such as auditors or consumers, can independently verify this proof without impinging upon the privacy or confidentiality of the original data.
  • 49
    ProximaX

    ProximaX

    ProximaX

    A developer-friendly and enterprise-ready stack of distributed and decentralized technologies. The ProximaX Sirius platform consists of multiple servers distributed in a network. It follows a “hub and spoke” design where the core component is the blockchain, or the “hub,” and the other components are service layers, or “spokes”. The service layers consist of P2P and distributed storage, streaming, database, and supercontract where all storage, messaging, and transactions are encrypted. Streaming includes text, video, and voice data. Additional service layers can be added to ProximaX Sirius to offer more functionalities. These layers may be anything from specialized services such as artificial intelligence to distributed computing for genome sequencing. With the expansion of service layers, however, the performance of individual layers remains unaffected. This is similar to multiple sets of network server nodes running in parallel and held together by the blockchain at the core.
  • 50
    Oasis Parcel

    Oasis Parcel

    Oasis Labs

    Build a more trusted product with the latest in data security and governance technology. The privacy-first data governance SDK designed to put your most sensitive data to use while keeping it secure and private. The Parcel SDK comes with a built-in dispatcher, which makes it easy to spin up an isolated environment for privacy preserving computation. With access to cutting edge secure-enclave technology, data can remain confidential and protected at every stage of the lifecycle. From web apps to infrastructure stacks, the Parcel SDK can be integrated with a broad range of services and technologies. With support for Typescript, the Parcel SDK can easily be added into your development flow, no custom languages or complex systems to learn. Powered by a decentralized ledger, Parcel provides an immutable record of all actions taken, so you can ensure your data is being used in a compliant and responsible way.