Eniac Network [FROZEN]

Eniac Network [FROZEN]

Created using Figma

Last Update

Mar 28, 2018

A decentralized privacy coin based on blockchain technology.
ICO
Jul 10, 2018
Aug 10, 2018
100% completed
Raised funds - no Data
past
  • 1 ENC
    =
    0.1275 USD
PRE-ICO
Apr 21, 2018
May 21, 2018
100% completed
Raised funds - no Data
past
  • 1 ENC
    =
    0.1275 USD
Token Details
Ticker
ENC
Accepted Currencies
ETH
Company Details
Registered Country
Türkiye
Additional Details
Platform
Ethereum
Categories
Cryptocurrency

About Eniac Network [FROZEN]

Wallet Security: Albeit private keys are essentially secure, it’s the storing and activation of a private that can be left vulnerable to attacks from hackers and bugs. News about hacking cold storage wallets, operating systems and computer malware have been prevalent on the news recently. The solution we offer is the 2-stage blockchain-based private key system. The 1st stage of this system will incorporate passwords based on the 16-32 character  non relatable methodology, similar to that presently used by router manufacturers, this will be the catalyst to providing you with public and private keys. The Eniac Network Blockchain will not be seen to be unfamiliar to your average user.

Smart Contracts: Eniac will endeavour to develop a stable and secure smart contract free of the typical vulnerabilities and errors found in other cryptocurrencies. A dedicated team of coders will be tasked with this undertaking, the smart contract will then be tested vigorously to ensure zero faults during the token stage.

Privacy: We are aware that many cryptocurrencies work specifically on this issue, but as for the Eniac team, the subject of security is of the highest priority. The Eniac team promises to enroll a mobile wallet platform that is not only easy to use but will also be host to some of the strongest security features available, notably Eniac plans to use the Zk-Snarks technology to further improve encryption and ensuring your data is kept confidential.

Features

Wallet Security: Albeit private keys are essentially secure, it’s the storing and activation of a private that can be left vulnerable to attacks from hackers and bugs. News about hacking cold storage wallets, operating systems and computer malware have been prevalent on the news recently. The solution we offer is the 2-stage blockchain-based private key system. The 1st stage of this system will incorporate passwords based on the 16-32 character  non relatable methodology, similar to that presently used by router manufacturers, this will be the catalyst to providing you with public and private keys. The Eniac Network Blockchain will not be seen to be unfamiliar to your average user.

Smart Contracts: Eniac will endeavour to develop a stable and secure smart contract free of the typical vulnerabilities and errors found in other cryptocurrencies. A dedicated team of coders will be tasked with this undertaking, the smart contract will then be tested vigorously to ensure zero faults during the token stage.

Privacy: We are aware that many cryptocurrencies work specifically on this issue, but as for the Eniac team, the subject of security is of the highest priority. The Eniac team promises to enroll a mobile wallet platform that is not only easy to use but will also be host to some of the strongest security features available, notably Eniac plans to use the Zk-Snarks technology to further improve encryption and ensuring your data is kept confidential.

Technical Info

ENIAC PRIVACY SYSTEM

 

One of the principles that Eniac strives to utilise is the introduction of an internal biometric self authenticating security layer, coupled with a strengthened key generating system, this combination will ensure an accounts system and wallet with better digital security and certainty than any current model in place. Further data and code will be released to the Eniac GitHub to allow for a fully open source experience.

Below you will find the structuring and layout to our privacy systems;   

 

Key Generation

 

Through Eniac you’ll produce your own public and private key through a 16-32 character password based around non relatable words, this is due to many people having their preferred set of credentials that they like to use, whether it be the town you were born in and the year you were born ~ london1972 ~ or your pet’s name followed by your age ~ alfie27 ~ no matter your method, chances are you have related it to yourself in one way or another, and you probably use this password on multiple accounts, Eniac will attempt to break this poor opsec by using the 16-32 character system mentioned earlier, many may have experienced a similar protocol with their network router WiFi passcode, e.g:

 

House-Fog-Jump

 

The password is set up in a easy to remember 16 character setting, consisting of a 5 letter word, a 4 letter word, a 3 letter word and all separated by dashes (5+4+3+3=16) this method allows for a non relatable, secure and easy to remember password.

 

Biometric Signature

 

Biometrics is the science of identifying an individual based on inherent physical or behavioral traits closely associated with the person. Biometric systems utilise iris, hand geometry, palm print, face, fingerprints, gait, voice and keyboard typing patterns to determine the the identity of a person. For the time being Eniac plans to pursue face and fingerprints, and from these samples The Eniac Network will be able to safely verify and determine the identity of it’s users, in the case of facial biometrics a generic system will be used to capture and segment the image of a person's face to extract a feature set from the segmented image, with this set the system can compare it to the face/fingerprint template present on the coin to render a decision regarding the identity of a individual, in such the generic biometric data can be viewed as pattern recognition, similar to how Shazam use spectrogram data to verify songs through it’s app, each song, face or fingerprint has a unique and specific set of scores, and with these scores the biometric system can efficiently decide whether to accept or reject a users attempted access. Eniac research shows that fingerprints are 98.99% accurate and 99.89% respectively for faces.

 

What is the spectrogram?

 

The frequency spectrum of a signal is calculated and displayed in a time-frequency-oriented graph. In short, it can be simply described as a unique graphic or indicator system for any symptom.

 

With a system similar to the spectrogram structure, your personal information will be saved on the blockchain with zero security faults and a result-oriented system will be developed. Moreover, thanks to a few minor changes on our blockchain system, you do not have to use this system. With the help of a single private key, you will be able to perform transactions on your account. In short,whether using the two step verification system, or standard verification your account will be secure.

 

Please keep in mind that while all this is done Eniac codes will be posted on GitHub. One of Eniac’s main goals is to develop a universal and valid blockchain without any queries, and to present it in the best way possible.

 

zkSNARKS

 

The acronym zk-SNARK stands for “Zero-Knowledge Succinct Non-Interactive Argument of Knowledge,” and refers to a proof construction where one can prove possession of certain information, e.g. a secret key, without revealing that information, and without any interaction between the prover and verifier.

 

The possibilities of zkSNARKS is impressive to say the least, it allows for a system that can accurately verify the correctness of computations without the need of executing them and without informing the user of what task was executed, just whether or not it was correct. Anyone with prior experience with RSA will see the 2 systems are very much alike.

 

zkSNARKS can be defined to 4 major yet simple principles, in this section Eniac will aim to explain and show understanding of these principles.

 

  • Encoding as a polynomial problem: The program that is checked is compiled into a quadratic equation of polynomials: t(x) h((x) = w(x) v(x), where the equality holds if and only if the program is computed successfully. The prover wants to convince the verifier that this equality holds
  • Succinctness by random sampling: The verifier chooses private evaluation point (s) to reduce the problem from multiplying polynomials and verifying polynomial function equality to simple multiplication and equality check on numbers: t(s) h(s) = w(s) v(s) This reduces both the proof size and the verification time massively
  • Homomorphic encoding/encryption:  The encoding/encryption function E has some homomorphic properties, albeit not fully yet. This allows the prover to compute E(t(s)), E(h(s)), E(w(s)), E(v(s)) without knowing s, the system only know E(s) and other helpful encrypted values.
  • Zero Knowledge: Through hand-waving the prover permutes the values E(t(s)), E(h(s)), E(w(s)), E(v(s)) by multiplying with a number so that the verifier can still check their correct structure without knowing the actual encoded values.

Eniac Network [FROZEN] Roadmap

  • June 2017

  • BEGINNING OF THE IDEA .
  • February 2018

  • BEGINNING OF THE STUDIES FOR THE
    PRESENTATION.
  • March 20, 2018

  • ANNOUNCEMENT OF WHITEPAPER TO THE
    PUBLIC
    .
  • April 21, 2018

  • PRE-ICO STARTS.
  • Read More
  • May 21, 2018

  • PRE-ICO FINISHES.
  • July 10, 2018

  • ICO STARTS.
  • August 10, 2018

  • ICO FINISHES.
  • August 10-20, 2018

  • DISTRIBUTION OF THE TOKENS.
  • Q3 2018

  • RELEASE OF THE ALPHA VERSION.
  • Q1 2019

  • BETA VERSION PUBLISHING AND GATHERING THE BETA
    TESTERS.
  • Q2 2019

  • MIGRATING THE ENC TOKENS TO ENIAC BLOCKCHAIN.

Eniac Network [FROZEN] Team

Verified 50%

Attention. There is a risk that unverified members are not actually members of the team

Talat Kocaman
Marketing Director
verified
Yasin Senturk
Creative Director
unverified
Kieran Hancock
Community Manager
unverified
Deniz Sare
Full Stack Developer
verified

Former members

Shaun Hoong
MANAGING DIRECTOR
Steve Springett
CREATIVE DIRECTOR
Yan Chua
GRAPHIC DESIGNER
Graphic Designer
GRAPHIC DESIGNER
Lai Xiao
MARKETING

Eniac Network [FROZEN] Interviews

Talat Kocaman
As a team member, сan you tell us about your role in the ICO project? What do you think about idea?
I'm the Marketing Director of ENIAC.
Deniz Sare
As a team member, сan you tell us about your role in the ICO project? What do you think about idea?
I'm the full stack developer of ENIAC.

Eniac Network [FROZEN] Last News

  • Due to potential time differences in information updates, please verify the accuracy of each ICO project through its official website or other official communication channels.
  • This information is not intended as a recommendation or suggestion for ICO investment. Please conduct thorough research on the relevant information and make your own informed decision regarding ICO participation.
  • If you identify any issues or errors in this content, or if you wish to submit your own ICO project for listing, please contact us via email at info@icoholder.com.
Please read the disclaimer and risk warning. Show disclaimer and risk warning.