3. 3
Exonum is an extensible framework for blockchain projects
Exonumgivesyouabeneficialopportunitytobuilddecentralized,
secure and reliable applications. It is designed to allow you,
your company or your government to build a tailor-cut private
or permissioned blockchain that solves your challenges and
enjoys the unmatched security of the Bitcoin Blockchain.
Exonum brings all the advantages of a true blockchain —
auditability, transparency, and unparalleled security — and
combines them with privacy, efficiency and controllability.
Your next step to blockchain is here. And it is called Exonum.
4. 4
A blockchain is a database with a twist. It
is decentralized (isn’t stored in any single
location), meaning the records it keeps are
not falsifiable being at the same time easily
auditable by design.
It has a tamper-resistant and authorized
transaction history assured via
cryptography.
Blockchain can be public or private, the
differences can essentially be distilled
down to what are the default permissions
built into the network to allow new blocks
to be written to the chain.
Exonum can operate as either a private or
permissioned public blockchain.
blockchain
5. 5
Exonum uses a custom-built Byzantine
consensus algorithm that keeps your data
safe without needing to “mine” blocks, even
in the case of a situation where your nodes
malfunction or become susceptible to the
actions of bad actors.
This feature also makes it near impossible for
a bad actor to add incorrect data or change
the history in your Exonum Blockchain. In
case of many compromised nodes, your
Exonum Blockchain still maintains its
fundamental security properties, protecting
your data.
Your Exonum Blockchain also updates
immediately with the addition of every new
block. This consensus algorithm also allows
your Exonum Blockchain to handle up to
5,000 transactions per second (within a
global, distributed network) with a clearing
latency of 0.5 seconds, and can handle up to
15,000 TPS in custom cases.
consenus
6. 6
Anchoring is the process of saving a
fingerprint (a hash) of a system state to a
public source. Anchoring removes the need
to trust the administrator(s) of an Exonum
Blockchain unconditionally; at the same time,
it keeps sensitive data private.
Exonum has built-in anchoring on the Bitcoin
Blockchain, making costs of an attack on any
Exonum Blockchain comparable to that of
the entire Bitcoin network.
anchoring
8. 8
distributed time stamping
Exonum offers a new way to
prove document authenticity —
distributed trusted timestamping.
Each document will receive a
digital fingerprint that will be
stored in Exonum Blockchain to
enable verification of document
existence and integrity at a certain
point in time.
Notarial and other certificates,
prescriptions, coupons are a few of
use cases where Exonum platform
— protected from forgery and
backdating — can be of benefit.
9. 9
supply chain
In the modern reality where
different parties use different
internal systems to manage
their workflow understanding a
particular situation at a specific
moment in time may become an
obstacle.
In this case blockchain can act as
a single point of truth providing
relevant information to all
participants. Exonum framework
can manage any business logic
to establish a system where all
parties are sure they have all
relevant information
10. 10
digital rights management
Big publishing companies are
dictating their ways of rights
management and leave artists
a tiny part of their earnings
— just because of numerous
intermediaries.
Exonum can help to establish
an automatic platform that can
ensure all parties are taking
the rules into account. By using
powerful smart-contract system,
you can create a transparent and
robust money flow control system.
11. 11
p2p lending
Complicated KYC/AML
procedures, aggressive risk scoring
makes p2p lending a “high risk —
high gain” area to invest money in.
Blockchain can affect value
chain in a very positive way,
providing unprecedented level
of transparency and thus making
the investments and borrowings
protected by the technology.
Exonum allows performing audit
on a real-time basis.
12. 12
e-voting
Existing e-voting solutions are
not able to work without central
authority and guarantee vote
secrecy. Blockchain is a natural
way to solve these problems and
guarantee voting process integrity
to all participants.
Exonum modular architecture
allows easy integration of specific
cryptography tools to provide the
highest level of transparency while
also keeping sensitive data secure.
13. 13
e-auction
Existing auctions can abuse their
centralized nature and use the
power of system maintainer to
provide dishonest advantage to
some participants.
In this case, average users may
feel unprotected against malicious
parties trying to violate the rules.
Exonum smart-contact system
can enforce business logic usage
to guarantee process integrity and
data safety.
14. 14
government registry
Your Exonum Blockchain can be
used to create an entirely new
process for citizen-government
interactions.
It can keep records safe while also
offering a citizen true control of his
or her assets.
15. 15
what is the lightning network?
The Lightning Network is a second-
layer protocol, initially built on top
of the Bitcoin Blockchain. This layer
enables instant micropayments
and better performance for public
blockchains by creating off-chain
payment channels. By using these
payment channels, cryptocurrency
users can transact more efficiently with
lower costs and shorter wait times.
We believe the Lightning Network
will be the foundation of the next
generation of the digital economy,
facilitating global payment streams,
decentralized marketplaces and
efficient payment rails for the Internet
of Things.
16. 16
bottlenecks to adoption
The team behind LightningPeach
began working with the Lightning
Network in December 2015. Over time,
we became convinced of its enormous
potential for the digital economy. After
years of research and development for
the Lightning Network, we identified
three major challenges hindering its
adoption:
• Lack of incentives for early adopters
• Unclear peer discovery process
• Unpredictable user experience
17. 17
our proposed solution
We believe that implementation of
LightningPeach, governed and operated by
its community, will encourage adoption of the
Lightning Network by:
• Providing incentives for early adopters to use the
network and encourage node operators to run
Lightning Network infrastructure and incentivize
developers to contribute.
• Automating the discovery of payment channels
and the programming of payment agreements
for user satisfaction, such as bonding/escrow
arrangements.
• Delivering a seamless and predictable
experience to end-users by creating a reliable
reputational database that does not reveal the
private details of any participant.
18. 18
what is crystal?
INVESTIGATIVE ANALYTICS
FOR BLOCKCHAIN AND
CRYPTOCURRENCIES
Crystal is the all-in-one blockchain
investigative tool. Crystal provides
a comprehensive view of the public
blockchain ecosystem and uses
advanced analytics and data scraping
to map suspicious transactions and
related entities.
Whether it is tracking a bitcoin
transaction to a real-world entity,
determining relationships between
known criminal actors, or surveying
suspicious behaviour, Crystal can
help move your investigation forward.
Engineered by the Bitfury Group.
19. 19
government
SUSPECT IDENTIFICATION
Detect criminal activity and
suspicious financial connections in
cryptocurrencies to support new and
ongoing investigations.
CRIMINAL REVENUES
Investigate cryptocurrency connections
between victims and criminals to
identify estimated revenue and cash-
outs.
DATANETWORK
Leverage pattern recognition, machine
learning and open source references
to identify suspicious activity across
billions of cryptocurrency transactions.
20. 20
exchanges
REAL-TIME COMPLIANCE
Automate your AML compliance
processes by feeding your decision
engine with real time risk scores on your
cryptocurrency transactions.
GLOBAL STANDARDS
Join hundreds of exchanges, banks and
government agencies in co-creating
global cryptocurrency compliance
standards.
ENHANCED DUE DILIGENCE
Speed up customer reviews with
actionable risk scores, customer
dashboards and data exports for
suspicious activity reports.
21. 21
financial houses
ACTIVITY MONITORING REPORTS
Meet AML and KYC compliance
obligations by receiving reporting on
your customers’ cryptocurrency-related
activities.
ENHANCED DUE DILIGENCE TOOLS
Visualize and investigate the source
and destination of suspicious
transactions. Export results for
regulatory reporting.
CYBER THREAT INTEL
Detect suspicious activity and emerging
threats from the dark web. Investigate
the illegal sale of customer data and
ransomware cases in-house.