Peer Mountain

Peer Mountain

[Canceled]
Created using Figma
Peer Mountain is the first distributed system for mobile. This allows cryptographic protocols to allow people and institutions to create and possess reliable records including digital identities, trust relationships, activity certificates. System members own and control data. They decide who can access because the information is inaccessible and will not be made available to third parties at any time.
Jul, 2018
Aug, 2018
100% completed
Raised funds - no Data
past
Sale
Jan 30, 2018
Feb 28, 2018
100% completed
Raised funds - no Data
past
Token Details
Ticker
PMT
Accepted Currencies
ETH
Company Details
Registered Country
British Virgin Islands
Additional Details
MVP/Prototype
Yes
Platform
Ethereum
Whitelist
Yes , from Feb 12, 2018 till Mar 2, 2018
KYC
Yes
Categories
Platform, Cryptocurrency, Legal, Business services, Software

About Peer Mountain

The recent string of high-profile data breaches highlights the dire shortcomings of current data protection and storage methods. In summer 2017, cybercriminals breached Equifax’s secure servers and stole the sensitive personal information of 146 million Americans1. That information - Social Security Numbers, credit card details, dates of birth - could potentially be sold the dark web, putting the identities and financial security of millions of hard-working people at risk. In response to this crisis, governments and regulators are passing legislation that requires businesses to collect and store sensitive data more securely and to test existing methods of storage and manipulation of data and documentation - see, for example, the EU’s General Data Protection Regulation.

Events like these demand that we make radical and fundamental changes to how we store and guard our identities. The problem is not only that data storage and protection procedures of enterprises like Equifax aren’t broad or rigorous enough. The issue lies in the overall method in which these companies store, guard, and transmit data.

Every time a person transacts with a bank, credit agency, government, or online retailer, that organization generates and stores a copy of that person’s information following a number of rules and regulations according to the specifics of the interaction. The result is a world of enormous digital fortresses, each holding a duplicate of the identity of anyone who has ever been a customer. These fortresses - the centralized servers that hold all our information - are rich, obvious targets for cybercriminals. No matter how many digital moats, archers, and catapults the defenders build and deploy, the attackers will keep coming. And a single breach of any one of these fortresses can result in the loss of millions of identities.

Developers can harness blockchain technology to give individuals further ownership of their personal information, and enable them to store that information in a distributed ledger, thus helping effectively mitigate the risk of identity theft. To achieve this goal, many organizations have launched blockchain-based platforms over the past year; several of them have also had successful coin offerings. Peer Mountain goes beyond providing users with further ownership and control over their cryptographically secure identities, offering an end-to-end application ecosystem designed to facilitate the commerce and exchange of digital and physical services. It facilitates trust and the secure sharing of information with multiple independent parties across broad networks while preserving traceability and compliance at every end of the transference of data.

Peer Mountain is the first decentralized peer-to-peer trust marketplace that connects self- sovereign identity owners with regulatory-compliant service providers, and opens a new paradigm for how and where individuals and organizations conduct business.

Features

Individuals and organizations can share information using any application in Peer Mountain’s ecosystem of trust. By linking sovereign identities and organizations, Peer Mountain is creating a marketplace across disparate entities operating in the global economy.

Peer Mountain Roadmap

  • 2005

  • Research on distributed hash tables (Kademlia) with personal realm based security (Kerberos) sparks the idea to design a system of trust management that works for the human scale.
  • 2006

  • Discovery of the NSA paper “How to Make a Mint”, which was first published in 1996.
  • 2010

  • Blockchain technology makes the possibility of a human scale trust system feasible and the year in which Jed’s “identity” was stolen for the first time.
  • 2014/06

  • Founding of KYC3 begins the journey into compliance and regulatory trust.
  • Read More
  • 2015/05

  • Office of Personnel Management informs Jed that his security clearance file has been stolen from their systems.
  • 2015/10

  • KYC3 inducted into Fintech Fusion.
  • 2015/11

  • First Peer Mountain tech spec filed as iDepot 68499 at the Benelux Office of Intellectual Property.
  • 2016/04

  • KYC3 selected for L’Atelier by BNP Paribas.
  • 2016/10

  • KYC3 completes Fintech Fusion.
  • 2016/12

  • KYC3 secures capital increase for March 2017.
  • 2017/03

  • Peer Mountain project is born, KYC3 leads and will be a service provider to the platform.
  • 2017/04

  • Major Swiss financial services provider agrees to co-build Peer Mountain for 3 million users and signs Letter of Intent to do so.
  • 2017/05

  • KYC3 achieves 2016 revenue level
  • 2017/06

  • Peer Mountain development begins.
  • 2017/06

  • Peer Mountain development begins.
  • 2017/07

  • German Corporation expresses intent to deploy Peer Mountain when ready with 9 million users.
  • 2017/08

  • Peer Mountain prototyping.
  • 2017/10

  • German Corporation contracts Peer Mountain technology for early deployment.
  • 2017/10

  • Peer Mountain exits stealth mode.
  • 2017/12

  • Peer Mountain v1 deployment.
  • 2018/05

  • Peer Mountain production deployment by Swiss financial services partner.
  • 2018/09

  • Peer Mountain deployment to 3 million end users in Switzerland.
  • 2018/12

  • Peer Mountain deployment by German corporation to 9 million end users.

Peer Mountain Team

Verified 5%

Attention. There is a risk that unverified members are not actually members of the team

Jed Grant
MBA CEO, Lead Architec & Visionary
unverified
Markus Forster
Data Scientist
unverified

2 ICO

$15 660 106

Federico Cardoso
Blockchain Architect
unverified
Ignacio Althabe
Blockchain Developer
unverified
Gabriel Pineda
Backend Developer
unverified
Luis Giunta
Software Engineer
unverified
Florian Lagouche
Blockchain DevOps Engineer
unverified
Mark Rogers
Mobile Lead
unverified
Stefan Vartolomeev
Mobile Architect
unverified
Pavel Pavlov
Mobile Architect
unverified
Antonia Cherkrachiev...
Mobile Developer
unverified
Jaime Prieto
Compliance Officer
unverified
Katie Olver
Press & Communications
unverified
Marc Garriga
Digital Marketing
unverified
Patrick Seguin
Content Manager
unverified
Sean Medcalf
Content & Strategy
unverified
Ekaterina Semeshina
UI/UX Design
unverified
Anna Krol
Community Manager
unverified
Dominique Rademacher
Web Developer
unverified
Kari Elise Community
Engagement Manager
verified

Advisors

Verified 0%

Attention. There is a risk that unverified members are not actually members of the team

Jorge Sanz
Advisor
unverified
Jos Van Bommel
Advisor
unverified
Thomas Ankenbrand
Advisor
unverified
Thomas Engel
Advisor
unverified

9 ICO

$66 480 861

Jeremy Epstein
Advisor
unverified
Marcelo Garcia Casil
Advisor
unverified

4 ICO

$7 904 000

Marco Houwen
Advisor
unverified
Laurent Leloup
Advisor
unverified
Javier Tamashiro
Advisor
unverified
Jan Reinhart
Advisor
unverified
Bertrand Manhe
Advisor
unverified
Guillaume Dubray
Advisor
unverified
Max Wolter
Advisor
unverified
Christophe Bach
Advisor
unverified

Peer Mountain Interviews

Kari Elise Community
As a team member, сan you tell us about your role in the project? What do you think about idea? Thank you!)
Community Engagement Manager
Social media and community engagement expert, accomplished at growing active online communities.

Peer Mountain Last News

3.60
stable
5.0 12
ICO Profile Vision Activity Potential Product Team

Peer Mountain Reviews

thetechinsider.org
reviews

Positives
Safe Transactions: Peer Mountain organizations and individuals and can share information securely using any application that’s used in Peer Mountain’s ecosystem. Via sharing sovereign organizations and identities, Peer Mountain makes an efficient and safe marketplace in better entities that operate in the global economy.
High Scalability: Due to their consensus mechanism, blockchains need a higher data throughput. With Peer Mountain, organizations can deploy services that require a high volume of on a Peer Mountain block.
Efficient Clear Transactions: Every Peer Mountain operation works on PeerChain that uses every auditor, service supplier, shopper cluster, etc. Because of this, it makes everyone conduct instantaneous on Ethereum’s blockchain.
Negatives
Trusted Users Issue: We believe that Peer Mountain might be hard for users to protect their assets in the event fully they become hacked.

Read More
  • Due to potential time differences in information updates, please verify the accuracy of each ICO project through its official website or other official communication channels.
  • This information is not intended as a recommendation or suggestion for ICO investment. Please conduct thorough research on the relevant information and make your own informed decision regarding ICO participation.
  • If you identify any issues or errors in this content, or if you wish to submit your own ICO project for listing, please contact us via email at info@icoholder.com.
Please read the disclaimer and risk warning. Show disclaimer and risk warning.