CREDIT THE WORLD

Return data ownership to individuals

FEATURES

Built for finance

Specifically designed for the financial world, its consensus layer, distributed ledger and smart contract environment together support a distributed trusted financial ecosystem.

Built for data processing

As a distributed computing platform, Detrust includes a big data processing engine and a distributed Ai protocol.

Built for security

Sensitive data is stored offline or handled using our secure private data storage and retrieval protocol.

Built for humanity

Detrust is designed to be accessible to everyone. It a financial ecosystem that meets people’s needs.

Design Principles

01 Decentralization

At its core, it is through data redundancy and encryption to store the records of data and transaction in a untrusted environment. This makes data tampering extremely difficult.

01

Decentralization

At its core, it is through data redundancy and encryption to store the records of data and transaction in a untrusted environment. This makes data tampering extremely difficult.

02 Security

Detrust should provide different encryption algorithms with varying security level according to the sensitivity of the data and transaction information.

02

Security

Detrust should provide different encryption algorithms with varying security level according to the sensitivity of the data and transaction information.

03 Accessibility

All systems should be easy to access, and people who have basic Internet experiences can use this system without difficulty.

03

Accessibility

All systems should be easy to access, and people who have basic Internet experiences can use this system without difficulty.

04 Occam’s razor principle

The code should be simple and effective enough to reduce unpredictable risks due to the complexity of the code

04

Occam's razor principle

The code should be simple and effective enough to reduce unpredictable risks due to the complexity of the code

05 Privacy

Personal behavior data should have a privacy protection level as high as the distributed file system, and transaction data should have privacy protection level no lower than Bitcoin. Achieving complete opacity is optimal

05

Privacy

Personal behavior data should have a privacy protection level as high as the distributed file system, and transaction data should have privacy protection level no lower than Bitcoin. Achieving complete opacity is optimal

06 Open Source

For developers and program users, all software related to Detrust should be open, able to be censored and callable.

06

Open Source

For developers and program users, all software related to Detrust should be open, able to be censored and callable.

Detrust Protocol

The Detrust Protocol is built upon the principles of equality, inclusiveness, and fairness.

Distributed ledger Sorry, your browser does not support inline SVG. Secure Multi-Party Computation Sorry, your browser does not support inline SVG. Smart Contract Support Sorry, your browser does not support inline SVG.
Distributed Identity Assess and Management Sorry, your browser does not support inline SVG. Distributed Artificial Intelligence Sorry, your browser does not support inline SVG.
Private Information Storage and Retrieval Sorry, your browser does not support inline SVG. Cross-chain protocol Sorry, your browser does not support inline SVG.
Distributed ledger Sorry, your browser does not support inline SVG.
Distributed Identity Assess and Management Sorry, your browser does not support inline SVG.
Secure Multi-Party Computation Sorry, your browser does not support inline SVG.
Private Information Storage and Retrieval Sorry, your browser does not support inline SVG.
Distributed ledger Sorry, your browser does not support inline SVG.
Cross-chain protocol Sorry, your browser does not support inline SVG.
Smart Contract Support Sorry, your browser does not support inline SVG.

Detrust Ecosystem

Value Layer

Individual values can be quantified and transferred across time and space with high efficiency and equity based on Detrust protocol.

Application Layer

Developers can build various applications (as shown in the figure below) based on the rich personal financial AI model in Detrust’s application ecosystem.

Model Layer

Based on distributed machine learning, Detrust provides with rich data models for personal data while ensuring data privacy and security.

Data Layer

Individuals can firmly control data ownership in their own hands by Detrust protocol.

Value Layer

Individual values can be quantified and transferred across time and space with high efficiency and equity based on Detrust protocol.

Application Layer

Developers can build various applications (as shown in the figure below) based on the rich personal financial AI model in Detrust’s application ecosystem.

Model Layer

Based on distributed machine learning, Detrust provides with rich data models for personal data while ensuring data privacy and security.

Data Layer

Individuals can firmly control data ownership in their own hands by Detrust protocol.

PARTNERS