It's sorta like GPS, minus the government monopoly.

The company behind XYO Network is called XY. Since 2012, we've been quietly developing world-class location protocols necessary to achieve our mission of building a decentralized location network. The XYO Network makes this possible through an ecosystem of crypto-location protocols.

icon

WE'RE BUILDING THE TOOLS THAT WILL POWER THE NEXT GENERATION OF BLOCKCHAIN APPLICATIONS: GEO DAPPS

Icon

Open Source

Connecting blockchain to the real world has never been done before. As a result, we've needed to develop fundamental tools that all blockchain developers will eventually need. We're committed to open sourcing every single byte of this technology.

Icon

Open Protocols

Turning your blockchain dApp into a Geo dApp is as simple as dropping in one of our SDKs (the XYO dApp SDK or the XYO Mining SDK). This enables developers to give end-users an alternative method to paying for your dApp besides advertisements.

Icon

Open SDKs

Turning your blockchain dApp into a Geo dApp is as simple as dropping in one of our SDKs (the XYO dApp SDK or the XYO Mining SDK). This enables developers to give end-users an alternative method to paying for your dApp besides advertisements.

NETWORK
COMPONENTS
The XYO Network has four primary components, Sentinels, Bridges, Archivists, and Diviners. These four components enable geo-focused, consensus-building and trustless verification of location data. This means that when you write a smart contract that specifies for an object to appear at a specific XY-coordinate, if it appears there, you will know that it was at that location with absolute certainty. This is all done without risk of spoofing the location signaling device(s) verified by thousands of Sentinels in the XY Oracle Network with the longest Proof of Origin chain (thus yielding greater confidence in the heuristics).

1. SENTINELS

Sentinel components are heuristic witnesses. They observe heuristics and vouch for the certainty and accuracy of the heuristic by producing temporal ledgers. The most important aspect of a Sentinel is that it produces ledgers that Diviners can be certain came from the same source by adding Proof of Origin to them.

2. BRIDGES

Bridges are heuristic transcribers. They securely relay heuristic ledgers from Sentinels to Diviners. The most important aspect of a Bridge is that a Diviner can be sure that the heuristic ledgers that are received from a Bridge has not been altered in any way. The second most important aspect of a Bridge is that they add an additional Proof of Origin.

3. ARCHIVISTS

Archivist components store heuristics in a decentralized form with the goal of having all historical ledgers stored, but without that requirement. Even if some data is lost or becomes temporarily unavailable, the system continues to function, but just with reduced accuracy. Archivists also index ledgers so that they can return a string of ledger data if needed. Archivists store raw data only and get paid only for retrieval of the data. Storage is always free.

4. DIVINERS

A Diviner answers a given question by analyzing historical data that has been stored by the XYO Network. To accomplish this, heuristics stored in the XYO Network must have a high level of Proof of Origin to measure the validity and accuracy of the heuristic by judging the witness based on its Proof of Origin. Given that the XYO Network is a trustless system, Diviners must be incentivized to provide honest analysis of heuristics. Unlike Sentinels and Bridges, Diviners use Proof of Work to add answers to the blockchain.

Proof of Origin

In a trustless system, data may be lost, damaged, tampered with, or otherwise corrupted. Traditional Proof of Origin in a trustless system relies on a private key for signing transactions or contracts in a system. This works very well with the assumption that the node on the network that signs the data in question is physically and virtually secure. If the private key is compromised, then the ability to prove origin falters. Proof of Origin (Proof of Origin) is the key to verifying that ledgers flowing into the XYO Network are valid. A unique ID for source of data is not practical since it can be spoofed. private key signing is not practical since most parts of the XYO Network are difficult or impossible to physically secure, so the ability for a bad actor to steal a private key is too feasible. To solve this, XYO Network uses Transient Key Chaining. The benefit of this is that it is impossible to falsify the chain of origin for data.

Bound Witness

In a trustless system, a witness node can either (through defect or corruption) produce false data. Invalid data can be detected and removed simply if it falls outside the allowed range for that heuristic. Valid but incorrect data (i.e. false data) is much more difficult to detect. Given that an untrusted source of data used to resolve a digital contract (an oracle) is not useful, we can substantially increase the certainty of the data provided by first establishing the existence of a bidirectional proof of location. The primary bidirectional location heuristic is proximity, since both parties can validate the occurrence and range of an interaction by cosigning the interaction. This allows for a zero-knowledge proof that the two nodes were in proximity of each other. This novel concept is called 'Bound Witness,' and the XYO Network introduces this possibility, for the first time ever, to the world. The implications of this will change a multitude of industries and the way we trade in the world.

BUILT TO SUPPORT THE BLOCKCHAIN PLATFORMS OF TOMORROW

The XYO Network works natively with the following contract platforms, as well as other blockchain platforms with Turing-complete functionality.

  • Blockchain
  • Blockchain
  • Blockchain
  • Blockchain
  • Blockchain
  • Blockchain
  • Blockchain
  • Blockchain
  • Blockchain
  • Blockchain
SEC DISCLAIMER AND FORWARD-LOOKING STATEMENTS:

Please keep in mind that XY Tokens do NOT represent an equity but are utility tokens for the XYO Location Network, which are necessary if one intends to use the XY Oracle Network in their Ethereum Smart Contracts.

YOU SHOULD READ THE OFFERING CIRCULAR BEFORE MAKING ANY INVESTMENT.

OFFERING DOCUMENTATION CAN BE FOUND AT www.xy.company/offering

IF YOU ARE INTERESTED IN PURCHASING TOKENS IN THE XYO NETWORK, PLEASE USE THE LINKS ON THIS PAGE.