Spanish version

From Safe Haven
Revision as of 18:10, 2 December 2017 by Jschouppe (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Translation in progress. Bienvenido a la página wiki de safehaven, el lugar para descubrir cómo hacemos para que sus activos sean heredables


Resúmen ejecutivo

Este documento pretende simplificar la comprensión de lo que es SafeHaven.io. Este documento es un documento técnico que establece los desarrollos actuales y futuros del proyecto Safe Haven. Este documento es solo para fines informativos y no es una declaración de intenciones futuras. A menos que se especifique expresamente lo contrario, los productos e innovaciones establecidos en este documento se encuentran actualmente en desarrollo y actualmente no se están implementando. No ofrecemos garantías ni representaciones con respecto al desarrollo o la implementación exitosa de tales tecnologías e innovaciones, ni al logro de ninguna otra actividad mencionada en el documento, y rechazamos cualquier garantía implícita por ley o de otro modo, en la medida permitida por la ley. Ninguna persona tiene derecho a confiar en el contenido de este documento ni en ninguna inferencia derivada de él, incluso en relación con cualquier interacción con Safe Haven o las tecnologías mencionadas en este documento. Safe Haven se exime de toda responsabilidad por cualquier pérdida o daño de cualquier tipo tipo (ya sea previsible o no) que pueda surgir de cualquier persona que actúe sobre cualquier información y opinión relacionada con Safe Haven, la Plataforma Safe Haven o el Ecosistema Safe Haven contenida en este documento o cualquier información que esté disponible en relación con cualquier otra consulta , a pesar de cualquier negligencia, incumplimiento o falta de cuidado.

Introducción

Pocas personas saben, pero las criptomonedas surgieron como un producto secundario de otra invención. Satoshi Nakamoto, el inventor desconocido de Bitcoin, la primera y más importante moneda de cifrado, nunca tuvo la intención de inventar una moneda. En su anuncio de Bitcoin a finales de 2008, Satoshi dijo que desarrolló "Un sistema de efectivo electrónico punto a punto". " Su objetivo era inventar algo; muchas personas no pudieron crear antes del efectivo digital. La parte más importante de la invención de Satoshi fue que encontró la manera de construir un sistema de efectivo digital descentralizado. En la década de los noventa, hubo muchos intentos de crear dinero digital, pero todos fracasaron. Después de ver que todos los intentos centralizados fallaban, Satoshi intentó construir un sistema de efectivo digital sin una entidad central. Como una red punto a punto para compartir archivos. Esta decisión se convirtió en el nacimiento de la moneda crypto. Son la pieza faltante que Satoshi encontró para realizar efectivo digital. La razón por la cual es un poco técnica y compleja, pero si la obtiene, sabrá más acerca de las monedas criptográficas que la mayoría de las personas. Por lo tanto, intentemos hacerlo lo más fácil posible: Para realizar efectivo digital necesita una red de pago con cuentas, saldos y transacciones. Eso es fácil de entender. Uno de los principales problemas que debe resolver cada red de pago es evitar el llamado doble gasto: evitar que una entidad gaste la misma cantidad dos veces. Por lo general, esto lo realiza un servidor central que lleva un registro de los saldos. En una red descentralizada, no tienes este servidor. Entonces necesita que cada entidad de la red haga este trabajo. Todos los pares en la red deben tener una lista con todas las transacciones para verificar si las transacciones futuras son válidas o un intento de duplicar el gasto. Pero, ¿cómo pueden estas entidades mantener un consenso sobre estos registros? Si los pares de la red están en desacuerdo sobre un solo saldo menor, todo se rompe. Necesitan un consenso absoluto. Usualmente, usted toma, nuevamente, una autoridad central para declarar el estado correcto de saldos. Pero, ¿cómo se puede lograr el consenso sin una autoridad central? Nadie lo supo hasta que Satoshi surgió de la nada. De hecho, nadie creía que fuera posible. Satoshi demostró que era. Su principal innovación fue lograr el consenso sin una autoridad central. Las monedas Crypto son parte de esta solución, la parte que hizo que la solución sea emocionante, fascinante y la ayudó a extenderse por el mundo. Ya que está leyendo nuestro documento técnico, invirtió o está a punto de invertir en este mercado desafiante.

Preocupaciones

¿Alguna vez pensaste en el día en que podría pasarte algo o ya pensaste en el día de tu muerte? ¿Alguna vez pensaste en el día en que tu familia debe enfrentar la vida sin ti? ¿Qué pasa con sus inversiones en moneda cifrada? ¿Qué hay de esos mercados difíciles con cientos de llaves privadas, intercambios y billeteras? ¿Alguna vez podrán recuperar esa inversión sin ti? ¿Podrían confiar en alguien que los ayudaría sin el temor de que algo salga mal? ¡Sí pueden! ¡Safe Haven proporciona la solución! Estamos construyendo una plataforma / Eco-System en las cadenas de bloques más populares y seguras, para que pueda dejar de preocuparse por su legado.

Solución

Con el fin de proteger sus activos digitales, en Safe Haven le damos la oportunidad de hacerlo sin encerrarse, gracias a nuestro Protocolo de custodia de claves de distribución de acciones de TFC y al programa Trust Alliance, las semillas / claves privadas / frases de contraseña se pueden compartir entre los interesados ​​o los niños de una manera transparente y segura. Nuestro protocolo distribuye las acciones de tal manera que el iniciador mantiene a toda costa el poder sobre sus activos. El desafortunado día en que debe fallecer, un miembro registrado de Trust Alliance Platform (notary) puede recuperar su parte restante en el blockchain para transmitir su legado a sus hijos / interesados. ¡Hacemos sus activos heredables! ¿Cómo logramos eso? Consulte la guía paso a paso, que incluye solo 3 pasos, y las técnicas utilizadas que se describen más adelante en este documento.

Paso a paso

Img2.png

Paso 1

El usuario decide proteger su legado (activos criptográficos) y planea distribuir sus semillas / claves privadas o frases clave utilizando soluciones seguras y transparentes de blockchain entre sus 3 hijos. El iniciador del proceso va a un miembro registrado de nuestro programa Trust Alliance, este es un grupo de entidades legales que tienen una relación de confianza con Safe Haven para procesar los pasos de validación necesarios.

Paso 2

La entidad legal, que está en el protocolo de refugios seguros, el validador, divide los datos para proteger y distribuir (ver el Protocolo de distribución de acciones de TFC) las acciones obtenidas a los niños utilizando la aplicación de refugios seguros especialmente desarrollada para ese uso. El software utilizado para esto no mantendrá ningún dato en la memoria ni en las bases de datos locales ni en las centralizadas. Solo los validadores compartidos (ver el proceso de intercambio de validadores) serán enviados a la cadena de bloques. El algoritmo de seguridad para cifrar y descifrar el recurso compartido antes de ser implementado a través de un contrato inteligente no será revelado por razones de seguridad obvias. Safe Haven solo contará con un tipo de mapeo para identificar el ID de los validadores y el contrato Smart, el mapeo se implementará en una base de datos descentralizada de blockchain. Este también será el caso para los validadores de respaldo (vea Posibilidad de Validación Múltiple y Compartimiento a Prueba de Falla TFC).

Img4.png

Paso 3

Las acciones distribuidas a los niños son atemperadas por el notario en forma de certificado legal. La acción para proteger, proveniente del padre / iniciador, será encriptada por la aplicación Safe Haven (solo accesible por los miembros de Trust Alliance) y enviada a blockchain en la forma de un contrato inteligente.

Img5.png


Las partes de los hijos se pueden compartir a través de la creación de un certificado y / o mediante la integración de un libro mayor de hardware en nuestro protocolo. Actualmente estamos trabajando en los detalles para lograr esto, en base a nuestros propios libros de contabilidad de hardware. Los detalles aún no se hacen públicos ya que todavía estamos en la fase ICO de nuestro proyecto.


Paso 4

En el caso de una muerte súbita o en el caso de que el iniciador ya no pueda manejar sus activos por sí mismo, los niños o las partes interesadas pueden obtener la parte faltante mediante la presentación de los documentos legales necesarios a su notario. Lo hará, una vez que Safe Haven lo verifique, podrá recuperar la parte faltante de la cadena de bloques. Nuestro protocolo maneja la compartición a prueba de fallas y la posibilidad de tener un validador de respaldo. Para obtener más detalles, consulte nuestras secciones de Compartimentos a prueba de fallas de TFC y Posibilidad de validación múltiple que se describen más adelante en este documento.

Img6.png

Principios básicos

Blockchain

The Blockchain es una innovación de software para establecer confianza digital entre los usuarios Facilitar transacciones de valor a través de una red. El blockchain permite que la confianza se distribuya a través de una red, sin la necesidad de un intermediario central para rastrear, verificar y aprobar el intercambio digital de valor. La noción de autorizar la confianza de un intermediario central actualmente apuntala las estructuras institucionales privadas y gubernamentales, sin embargo, esto resulta ser costoso, lento y también vulnerable a los ataques. El blockchain soluciona estos problemas operando como una base de datos distribuida descentralizada, manteniendo una lista en constante crecimiento de registros llamados bloques.

Contrato Inteligente - Smart contract

El código informático en cadena o los contratos inteligentes son protocolos informáticos que facilitan, verifican o hacen cumplir la ejecución de un contrato y hacen innecesaria una cláusula contractual. Los contratos inteligentes a menudo emulan la lógica de las cláusulas contractuales. Los contratos inteligentes pueden intercambiar dinero, propiedades, acciones o cualquier cosa de valor de una manera transparente, sin conflictos, mientras se evitan los servicios de un intermediario. Normalmente, un proceso requeriría el pago a un intermediario, agencia gubernamental, banco, abogado o un notario, y luego un tiempo de procesamiento antes de la recepción de bienes o servicios. Sin embargo, con la tecnología de contrato inteligente, todo se puede automatizar. La tecnología de contrato inteligente se puede comparar con la de una máquina expendedora automatizada. Con una máquina expendedora, el dinero se deposita en la máquina expendedora y el artículo deseado cae para su recolección, siempre que se deposite la cantidad correcta. Comparable a eso, con un contrato inteligente, el dinero se deposita en custodia en la cadena de bloque para recibir una transferencia de un token (por ejemplo, un certificado digital de título para una casa), que se transfiere instantáneamente al control de una contraparte una vez que las condiciones son reunió. Los contratos inteligentes no solo definen los términos y condiciones en torno a un acuerdo de la misma forma que lo hace un contrato tradicional, sino que también hacen cumplir esas obligaciones.


Techniques & Conceptual mathematics

Polynomial interpolation

Polynomials can be used to approximate complicated curves, for example, the shapes of letters in typography given a few points. A relevant application is the evaluation of the natural logarithm and trigonometric functions: pick a few known data points, create a lookup table, and interpolate between those data points. This results in significantly faster computations.

Img7.png

Key escrow

We are not eternal and it would be a pity that with us disappear access to a digital heritage.

The sudden loss of a shareholder could be a problem in order to reestablish the complete passphrase, in this document we will continue to use the example of a family circle or friends in order to highlight the different case scenarios. One answer to this problem is what is called the key escrow, which allows a third party "under certain conditions" to access these shares. But what third, under what conditions, and how to give it our moral but also technical confidence? The escrow authority must be able to securely guarantee the confidentiality of the escrow keys. First of all we should encrypt the data to protect, this can be a private key or a seed with a secure encryption algorithm like SHA265-512 and by using a passphrase. This passphrase could then be divided into shares and distributed by our TFC SD Protocol.

Secret Sharing

In cryptography, a secret sharing scheme is a method for distributing a secret amongst a group of participants, each of which is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together; individual shares are of no use on their own. More formally, in a secret sharing scheme there is one dealer and more players. The dealer gives a secret to the players, but only when specific conditions are fulfilled. The dealer accomplishes this by giving each player a share in such a way that any group of t (for threshold) or more players can together reconstruct the secret but no group of less than t players can. Such a system is called a (t, n)-threshold scheme. in a (t ,n) scheme one can prove that it makes no difference whether an attacker has t-1 valid shares at his disposal or none at all; as long as he has less than t shares, there is no better option than guessing to find out the secret. Some use cases of secret sharing: (See SHA Protection Plans ) • Good passwords are hard to memorize. A clever user could use a secret sharing scheme to generate a set of shares for a given password and store one share in his address book, one in his bank deposit safe, leave one share with a friend, etc. If one day he forgets his password, he can reconstruct it easily. Of course, writing passwords directly into the address book would pose a security risk, as it could be stolen by an "enemy". If a secret sharing scheme is used, the attacker has to steal many shares from different places. A typical application of this scenario is the secure implementation of an encrypted backup system. Assuming that data recoveries are needed rarely, backup data can be public key encrypted -- this can be done automatically and without user interaction -- while the private recovery key is protected via secret sharing. • "A dealer could send t shares, all of which are necessary to recover the original secret, to a single recipient, using t different channels. An attacker would have to intercept all t shares to recover the secret, a task which may be more difficult than intercepting a single message". • The director of a bank could generate shares for the bank's vault unlocking code and hand them out to his employees. Even if the director is not available, the vault can be opened, but only, when a certain number of employees do it together. Here secret sharing schemes allow the employment of not fully trusted people.

Img8.png

Two men’s rule

This rule (two-man rule) is used in sensitive areas such as command to send nuclear missiles to prevent accidental or malicious skidding. In cryptography, Americans use the phrase "two-person integrity" (TPI) when it comes to preventing a single person from having access to cryptographic keys for secure communications (COMSEC).

So here is an interesting concept that would help us to resolve these issues of trust and security with the escrow authority. By requiring that two individuals collaborate to reveal the data in escrow, we shelter ourselves from an isolated malicious act. Let's divide the pass phrase of the escrow key and give the pieces to a group of trusted people that we call the family circle (TFC) How to break up this pass phrase? Simply distributing N pieces between the N members of the TFC forces them to meet together to use the private key escrow, but if one of them is unavailable or is precisely the missing shareholder of the TFC whose sesames we want to recover. Two points are enough to define a line, three to define a parabola, four for a cubic, and so on. If now we want to share a secret, say the value 1234, between six individuals and three of them are needed to find the secret, we will randomly choose a parabola among those passing through the point (0, 1234) and we will give the coordinates of six of his points to these six individuals (see Figure9).

Img9.png

If only two of them, nos. 2 and 4, came to share their coordinates, they could not find the original parabola and therefore the value of the secret point in x = 0 (see Figure10).

Img10.png

It is therefore necessary that a third individual agrees to share his / her coordinates in order to define one and only one parable and to reveal the secret value 1234 (see Figure11).

Img11.png


TFC shares distribution Protocol

The family circle is for safe haven a context of members belonging to a group, this group can include family members, a company’s group of stake holders of trust or simply a circle of friends. The TFC SDP is a protocol developed by Safe Haven in order to establish a circle of trust in our eco-system. If we consider our above described techniques, we have a dealer (the person that wants to protect his legacy) and n players (his children and the validator [notaries]). The dealer gives a secret to the players, but only when specific conditions are fulfilled. The dealer accomplishes this by giving each player a share in such a way that any group of t (for threshold) or more players can together reconstruct the secret but no group of less than t players can. Such a system is called a (t,n)-threshold scheme.

Img12.png

TFC SD Protocol base rules: • The secure secret to split in shares can be maximum 1024 bit. • If you want to protect a secret larger than 1024 bits, a hybrid technique has to be applied, the secret has to be encrypted with a block cipher and then we apply only the secret sharing to the key (openssl and gpg are valid tools). • The secret security level can imply an upper bound for the length as short secrets/seeds/keys will be padded with some salt bits. • We can use hexadecimal digits in place of ASCII characters for I/O, so binary data can be protected/split into shares, also. • While splitting or combining the shared secret, the Protocol locks its virtual address space into RAM or privacy reasons. • The number of distributed share entities is technical spoken limited to 99, we limit this even further to 15, while each entity can have more than 15 but < 99. • The validator y has always -1 share less than the n (players/children). • We need at the least 1 player n and 1 validator y in order to establish a complete network of trust in safe havens eco-system. • Multiple validators can be added.

TFCSD Case 1: 1 child and 1 validator

Uc1.png

TFCSD Case 2: 3 children and 1 validator

Uc2.png

TFCSD Case 2: 3 children + fail-safe and 1 validator

Uc3.png

TFCSD Case 3: 3 children and 2 validators

Uc4.png

TFC Fail-Safe Share(s)

Img13.png

TFC SD Fail-safe Protocol: • The remaining shares will be used a sort of fail-safe share • This can be useful in the case that of one of the n (players/children) lost his share, becomes unable to act rightful or dies. • Our protocol provides a separate “backup” smart contract on the blockchain with different conditions written in. • The fail-safe shares can’t be given at any circumstances to one of the n (players/children) as this would jeopardize the complete operation setup by the dealer (parent), as in use case 2 (3 children + 1 validator) the children can’t recompile the secret share without the validators share (trough blockchain Smart Contract query) but when you give the backup shares, they will be able to do so. • The only case where we don’t have a fail-save share is when we need a consensus of 100% of the stakeholder, for instance the use case 1 (1 child + 1 validator).

The validators share process

Img14.png

• The validators share process consist of a pool of legal entity validators, which are members of our Alliance Program. • The validator does not stock , own or see anything of the shares meant to be send to the blockchain, there role is transparent in terms of secret shares deployment. • They distribute the shares to the n (players/children/stake holders) in a formal way by delivering a legal certificate to n and validate the transaction towards the blockchain in a transparent way. • The validators share is actually the share of the person that initiated the process to begin with, he safeguards it in the blockchain via a validator in order to keep full right of the complete secret share , and so his assets as long as he lives. • The validator(s) is/are the only one(s) that can retrieve the share previous send to the blockchain if the following conditions are met. o The total number of shares of the n (players/children/stake holders) has to be present, if not and if needed, the fail-safe share can be retrieved also by the validator if the backup Smart contract conditions are fulfilled. o In the case that the initiator (parent/dealer) dies the validator has to validate the rightful medical forms in order to initiate the retrieve process of the share stocked in the blockchain. • The initiator/ parents share is also transferable to another legitimate person when needed.

Multiple Validators Possibility

Img15.png

TFC SD Multiple validator’s possibility: • No one is eternal, neither are the legal entities participating in our Alliance program. That’s why we provide the opportunity to establish a network of trust containing more than 1 validator. • When you chose to have several validators involved, we push a backup smart contract in the blockchain that holds the necessary shares, n (players/children) -1, that can be used by a second validator. • By doing this we offer an eco-system of trust which is completely redundant in terms of share distribution and validation.

SH-Alliance Program

Img16.png

The Safe Havens Alliance Program is a group of legal entities which have been screened by safe haven in order to perform all the necessary steps to accomplish our goal, starting the future of trust by securing your assets and by doing that reassuring your relatives, stake holders and your legacy. In the case you are a legal entity whiling to join our Alliance, please send an inquiry to [email protected] and we will get in touch with you as soon as we worked out our legal platform. We will be launching a dedicated trust Alliance portal very soon in order to answer all the legal questions. As soon as our portal will be launched, legal entities, will be able to subtribe themselves, of course legal certification documents will be asked which will help the screening process. The members will be asked to pay an annual fee in order to obtain a subscription to our services.

SHA Protection Plans

Img18.png

The Family Circle Plan (TFC)

The family circle plan is for those that want to reassure their relatives, that want’s, the day they pass away, there children can access the assets acquired by the Parent. The possibilities are almost endless, shares can be divided in flexible way, while safekeeping the secret in a secure and a transparent way. The fact we add validators in our process keep the process familiar for important matters like the ones that we want to help securing. We add the wonderful world of block chaining in our process which keeps the share decentralized. The decentralized database validator–smart contract mapping adds an extra security feature combined with a state of the art, still simplistic, secret sharing protocol.

The Business Continuity plan (BCP)

The Business Continuity plan is quite similar to the TFC, the main difference is that we speak about stake holders instead of children and that the validation process is different in terms of share unlocking. In a BCP the notary does not need medical rustication documents in order to obtain the missing share through our services, but rather notarial acts prepared by himself. This process plan is currently being developed internally and will come available for use from the moment the Trust Alliance portal is online. BCP can be useful for the distribution of shared secret of multi sig wallets, exchanges, or simple for safekeeping of import passwords/passphrases. Once again the possibilities are endless.


The Investment Circle

The Investment Circle is for those willing to create a fund amongst friends, family members or business stakeholders. Let’s say that 5 friends wants to invest in crypto, and buy each for 1000 $ worth of crypto currency. What are their options? Creating a multi-sig wallet (with all the flaws that were discovered lately) even when it’s completely secure, you will always need trust within the group... ok, How are we going to manage this? Simple! trough Safe Haven Share Distribution protocol. You encrypt the private key and we split the passphrase into shares, the stakeholders will receive equally the same amount of shares. If we consider the formula without a fail-safe mechanism, we have T=(y.n-1)+(X.n) , T = (2 -1) + (2.5) = 1 + 10 = 11 shares to distribute where 1 will be stocked on the blockchain via the validator (legal entity) The conditions, in order to liberate this share, can be anything from price thresholds to milestones to simply having a 100 % consensus to do so. Again the possibilities are endless.


Safe Haven Vault

Good passwords are hard to memorize and can’t be transferred, not in a legal manner anyway, from you to your relatives. This password can be anything, from Facebook, Gmail or any other important account. If you want that ensure yourself that your digital legacy doesn’t die with you, that your relatives can access those accounts even when you are not there anymore, store them through Safe Haven on the blockchain using one of our Share distribution protocols.

Conclusion

Investing in Cryptocurrency and Bitcoin today takes a lot of time and is very challenging, on the other side it will bring massive profits over the years. Securing those assets and be able to protect them against any treat from the outside is something all traders and long term investors have been asking for since a very long time. We are all in this business for the same reason, be financial independent and build a safe and secure future for our relatives. That is why we will develop our decentralized platform and provide our solution worldwide. The Safe Haven Company will make a difference in securing and storing your digital keys or seeds. Building a solution like Safe Haven will bring piece in mind for the investor and relatives. We hope that you are convinced about our platform and different solutions and we can welcome you as one of our investors!

Market

Cryptocurrencies are digital assets that use cryptography, an encryption technique, for security. Cryptocurrencies are primarily used to buy and sell goods and services, though some newer cryptocurrencies also function to provide a set of rules or obligations for its holders. They possess no intrinsic value in that they are not redeemable for another commodity, such as gold. Unlike traditional currency, they are not issued by a central authority and are not considered legal tender. At this point, use of cryptocurrencies is largely limited to “early adopters.” For scale, there are around 10 million Bitcoin holders worldwide, with around half holding Bitcoin purely for investment purposes. Objectively, cryptocurrencies are not necessary because government-backed currencies function adequately. For most adopters, the advantages of cryptocurrencies are theoretical. Therefore, mainstream adoption will only come when there is a significant tangible benefit of using a cryptocurrency. So what are the advantages to using them? Cryptocurrency Exchanges Cryptocurrency exchanges are websites where individuals can buy, sell, or exchange cryptocurrencies for other digital currency or traditional currency. The exchanges can convert cryptocurrencies into major government-backed currencies, and can convert cryptocurrencies into other cryptocurrencies. Some of the largest exchanges include Poloniex, Bitfinex, Kraken, and GDAX, which can trade more than $100 million (equivalent) per day. Almost every exchange is subject to government anti-money laundering regulations, and customers are required to provide proof of identity when opening an account.

Instead of exchanges, people sometimes use peer-to-peer transactions via sites like LocalBitcoins, which allow traders to avoid disclosing personal information. In a peer-to-peer transaction, participants trade cryptocurrencies in transactions via software without the involvement of any other intermediary. Cryptocurrency Wallets Cryptocurrency wallets are necessary for users to send and receive digital currency and monitor their balance. Wallets can be either hardware or software, though hardware wallets are considered more secure. For example, the Ledger wallet looks like a USB thumb drive, and connects to a computer’s USB port. While the transactions and balances for a bitcoin account is recorded on the blockchain itself, the private key used to sign new transactions is saved inside the Ledger wallet. When you try to create a new transaction, your computer asks the wallet to sign it and then broadcasts it to the blockchain. Since the private key never leaves the hardware wallet, your bitcoins are safe, even if your computer is hacked. Still, unless backed up, losing the wallet would result in the loss of the holder’s assets. In contrast, a software wallet such as the Coin base wallet is virtual. This type of software device can place the holder’s funds online in the possession of the wallet provider, which has added risk. With more people and more money flowing into the cryptocurrencies market, more people have to open exchanges or wallets and get private keys. Safe Haven is building the perfect solution. Basically every person that opens a wallet, buys a cryptocurrency can be a Safe Haven client. Our potential to grow in this market is huge! We are confident that Safe Haven will make a difference.

Token

The SHAT-token is an ERC20 token built on top of Ethereum. ERC20 standard was introduced on the Ethereum blockchain in order to allow developers to design decentralized apps (Dapps) to work with tokens out of the box without the need to reinvent the wheel every time a new token system is introduced. Therefore, with ERC20, anyone with an idea can deploy a product on the blockchain without having to undergo the whole process of designing the platform. With ERC20, we are able to define a common set of rules for the Ethereum-based SHAT to adhere to. We are able to know in advance how the token will behave based on the standard. The SHAT token is developed to heal the broken market we described in this whitepaper. The first phase of development concerns the amount of tokens we are creating. The SHAT token will be used as a gas in the process. ==