Buy NuCypher Whitelist

Posted on

Technical Details The main net will be launched before the ICO.

The target is Spring (March - May) 2018. Patents The team holds patents for: Background NuCypher is a blockchain privacy layer that provides proxy re-encryption as a service. Proxy re-encryption can be used to share encrypted data with multiple people that have different keys. This translates well to a KMS where granting and revoking access to encrypted data is the core functionality of the system. NuCypher’s Proxy re-encryption is built on a few technical concepts: Data Encapsulation This uses symmetric key encryption. One key is used for both encrypting and decrypting the data. Key Encapsulation This uses public key encryption. The key used to encrypt the data is then encrypted and stored with the encrypted data. This enables sharing the same symmetrically encrypted data with multiple parties. The data key can be encrypted separately for each recipient with their individual public keys. Public Key Encryption Public Key Encryption (PKE) is a foundation of most blockchain applications. Users have a public key (like a Bitcoin wallet address) and a private key (like the password to that wallet). A user can interact with other users on the network by sending them an encrypted message (like an amount of bitcoin). The sender uses the receiving party’s public key to encrypt that message. Only the receiving party, who controls the private key, can decrypt that message. NuCypher uses a form of PKE called Proxy Re-encryption, which uses a semi-trustless third-party called “the proxy” to transform encrypted data to another receiving party. The proxy, a service provider on NuCypher’s network, can do this without knowing what the original encrypted data was. This is known as Proxy Re-encryption (PRE). Software development makes use of software libraries to solve common problems. NuCypher intends to be the default solution for Key Management Systems for decentralised applications (dApps) by using PRE. It’s a distributed network that can perform re-encryption when access is granted to certain data. Proxy Re-Encryption There are two types of proxy re-encryption: interactive and non-interactive. An interactive re-encryption scheme means the re-encryption key is computed out of two secret keys. Non-interactive means you need the owner’s private key and the receiving party’s public key. NuCypher intends to use Umbral which is a non-interactive scheme. Interactive proxy re-encryption won’t be used on the network. NuCypher features access control for one to many. Proxy re-encryption is used to delegate decryption rights to others on the network, and also allows the owner of the data to revoke access. Alice encrypts the data that she wants to share with a symmetric key. The symmetric key is then encrypted with Alice’s public key. The encrypted data and encrypted key are then stored. The storage can either be a centralized system like S3 or dropbox, or a decentralized system like storj or IPFS. When Alice wants to share the encrypted file with Bob she creates the re-encryption key from her private key and Bob’s public key. The re-encryption key is split so that if a number of pieces greater than or equal to the threshold are presented then the re-encryption key can be reconstructed. The pieces of the re-encryption key are shared across multiple proxies. Bob downloads the encrypted data file and the encrypted key. Bob sends the encrypted symmetric key to the Ursula proxy nodes to be re-encrypted. Each Ursula node uses their portion of the re-encryption key to re-encrypt the encrypted symmetric key for Bob’s private key. Each fragment contains no information about the underlying key. If a piece was leaked there is no damage as each part is perfectly secret. The Ursula nodes return the re-encrypted symmetric key pieces to Bob. Bob reassembles the re-encrypted symmetric key. Bob uses his private key to decrypt the symmetric key. Bob is able to decrypt the encrypted data with the symmetric key. Governance There are several methods to govern protocols: Changes to the Bitcoin protocol are made by a foundation. This can result in political infighting, delaying changes or splitting the community when a fork is made to the protocol. Dash is a cryptocurrency that allows major nodes on the network to vote on changes. This leads to relatively quick actions based on what the majority of the stakeholders want. NuCypher has modelled their governance on ZepplinOs which allows nodes to vote on changes to the smart contract. The contents of a smart contract cannot be updated once it has been written to the blockchain. As requirements change over time, NuCypher’s functionality will need to be updated. If all of the functionality was in one smart contract then deploying an update would be writing a new smart contract to the blockchain. The dApps don’t have to point to new smart contracts. Only NuCypher miners will be affected by smart contract updates. NuCypher splits its functionality into three separate smart contracts. The image below shows how this appears before and after an update. Note that the Nodes don’t need to make any change either, as they still make the call to the same dispatcher contract. Economics To become a Provider, a computer must stake NU tokens. This bond gives the user the right to run a node that can do work to earn tokens. If a Provider is found to be attacking or manipulating the network, they forfeit the bond and lose the right to do work. Miners are paid for providing the re-encryption service and making themselves available to re-encrypt the data. Nu Cypher is an ICO project that’s been developed to enhance the security of decentralized applications. As of now, the project raised $4.3 million in its pre-fund. Its main purpose is to protect dapp developer’s data from third parties and hackers.

Buy NuCypher ICO Whitelist

  • Contain the functionality of NuCypher in its most up to date version

In fact, Nu Cypher is a Y-combinator alumnus that created a security platform for the Internet of Things, cloud, big data, and blockchain.

Based on this, users are able to not only protect their dapps but use others within the network to further encrypt it. Its main technology is the use of proxy re-encryption. This is a public key that allows for a third party to modify cipher texts to each other without learning the complete message behind it. This way, users can share their data without having to decrypt it or sharing the private key. This list demonstrates how NuCypher can keep your data safe. One of the largest issues in data sharing is protection. Even if you’re not making dapps, or anything blockchain related, your data is a target for hackers who are attempting to steal your information. While many large companies such as Amazon has created a Key Management System (KMS), they still forgot one thing. These offerings require users to place trust within these centralized systems but still get exposed to censorship, cybercrime, service rejection and even economic espionage. NuCypher uses blockchain technology to stop this issue. With features such as mobile device management, NuCypher uses a re-encryption token that would be created for certain devices. When the device is retired or lost, you can send out re-encryption tokens to prevent access. Thus, making NuCypher a good project due to its ability to keep your information and history completely safe. Disclaimer: All of our information is for educational purposes only. Don’t think of us as financial advice! Speak to an advisor and invest at your own risk. [Short general description]: NuCypher KMS is a decentralized key management system (KMS), encryption, and access control service. Native tokens will be used to incentivize network participants to perform key management and access delegation/revocation operations. Miners never see plaintext data, or anything which allows them to decrypt the data. They are solely responsible for storing re-encryption keys and applying re-encryption functions. Nucypher has encountered three risks: 1) collusion between a miner and a reader of the data - solution: pseudo-anonymity of re-encryption keys, splitkey proxy re-encryption, and a challenge protocol. 2) nodes malfunctioning - solution: challenge protocol. Other problems tacked: 1) pseudo-Anonymity - of re-encryption keys also enables nucypher to run a challenge protocol. 2) split-key re-encryption - Instead of one re-encryption key, m-of-m re-encryption keys can be used to produce “re-encryption shares.” These shares can be combined client-side. 3) challenge protocol - designing a challenge protocol is a complex problem related to “fair exchange” protocols. It requires careful design and testing, and Ethereum’s Proof-of-Stake (Casper) protocol is facing this complexity now. It may be possible to just check correctness on the level of the encryption algorithm. 4) hardware-enforced security -  if miners misbehave, they risk losing their collateral deposit. [Main contribution proposal]: Is based on functionality, NuCypher KMS can be interfaced from a traditional, centralized application. It is worth mentioning that in order to provide re-encryption services, a node needs to send its deposit to a smart contract (while specifying the lock time). After the time expires, the node can withdraw the stake from it. The objective is to have rewards minted to staking nodes if they correctly provide re-encryption services. For initial release NuCypher will ensure that the nodes are staying online and correctly re-encrypting the data without requiring anonymization. [Innovation]: Use cases. NuCypher KMS provides the infrastructure for a variety of applications that require sharing of sensitive data as a basic functionality. They are connected to Bluzelle, and the project is backed by a solid team. Bruce: But they have 2 years lock period. 16-Apr: What are the candidates for very high interest: Bruce: NKN Andrey: NKN Sergey: DFINITY Alexey:NKN, DFINITY, HashGraph, NuCypher Ivan:NKN, Nucypher and Pchain Please read the disclaimer and risk warning. This offer is based on information provided solely by the offeror and other publicly available information. The token sale or exchange event is entirely unrelated to ICOholder and ICOholder has no involvement in it (including any technical support or promotion). Token sales listed from persons that ICOholder has no relationship with are shown only to help customers keep track of the activity taking place within the overall token sector. This information is not intended to amount to advice on which you should rely. You must obtain professional or specialist advice or carry out your own due diligence before taking, or refraining from, any action on the basis of the content on our site. NuCypher was in the Summer 2016 class of Y Combinator. Technologies like IPFS, Swarm and Ethereum are, by definition, public, and anyone can examine them. If somebody is building a decentralized application (dApp) that has to do with sensitive or private data, it presents an issue. Using a technology called proxy re-encryption, NuCypher, which is part of the core infrastructure stack for dApps, lets developers store, share and manage private data on public blockchains. Proxy re-encryption is a form of public-key encryption that lets a proxy entity transform ciphertexts from one public key to another, without finding out anything about the message underneath. It’s a method for John to share encrypted data with Christina, without sharing his private key or needing to decrypt the data first. NuCypher is using the proxy re-encryption technology to build a powerful and flexible cryptographic access control infrastructure for blockchain and decentralized apps. It solves the latency and performance issues besetting current methods. Image via the press release ICOreviewPRO is a website that examines the world of coin platforms, providing the users with all the information they need on this subject. If you’re not familiar with how these types of businesses work, the idea is that new crypto currency coins, which are then exchanged into a local currency. The platform uses the coins to achieve profits, while the user receives a monthly interest in return. To know about more upcoming ICO. Check our home page database. NuCypher is a data privacy layer for public blockchains and decentralized applications. It uses proxy re-encryption to provide decentralized key management and cryptographic access control services. It enables DApp developers to store, share, and manage private data on public blockchains. The NuCypher network is composed of nodes that provide re-encryption services. To operate a node and earn fees and mining rewards, you must stake the NuCypher token as collateral. This security deposit creates an economic incentive for nodes to behave appropriately and ensures correctness of computation. Also, the staked tokens are used to decentralize the network: one miner has only a fraction of the power to apply access policies, proportional to his stake. NuCypher is led by its two founders MacLane Wilkison and Dr. Michael Egorov.

Buy NuCypher ICO Allocation

  • Foundation (Representative democracy)
  • Node voting (Democracy)
  • Private company (Dictator)

MacLane has extensive experience in both software development and the financial services industry.

Michael is former LinkedIn engineer and a former physicist and scientist from the Moscow Institute of Physics and Technology. MediBloc will provide the following services: Partners: Huray Positive ( - Android developer active since 2014. Their current app portfolio contains 8 apps. Syntekabio ( - Korean biotech firm, developing a personal genome map to facilitiate a personalized medical service. Nucypher ( - A proxy re-encryption and security platform for distributed systems like big data, blockchain, cloud, and the internet of things (IoT). Coinplug ( - platform for bitcoin exchange, wallet, okBitcard and payment processor services targeting Korea and the Asian market. CoinRail ( - Korean Cryptocurrency exchange platform. BITTHAI ( - Thai cryptocurrency exchange platform. Advisors: Sang Min Park ( — advisor. Chief professor in the Family medicine department at Seoul National University Hospital, Seoul National University College of Medicine. Main specialization — Oncology.Hyun Wook Han ( — Advisor.Simon Seojoon Kim ( — Advisor. Chief product officer, co-founder at Knowre (approx. 6 years), product manager in Mozzet (1 year), programming engineer, product manager at Webcash (about 2 years).Yiseul Cho ( — Advisor. Blockchain Specialist in HSBC (1 year), founder, organizer of Hyperledger London Meetup (1.5 years), developer of Blockchain (2 years).Mai Fujimoto ( — Advisor. CEO at Gracone.KJ Eee (n/a) — Advisor.Jeong Ho Seo ( — advisor. Attracted investments: n/a The co-founders of MediBloc are advisors to the Korea Blockchain Forum, hosted by the Korean Government. There are experienced healthcare professionals behind this project. The advertising campaign is very active, and the team is attracting the attention of the blockchain industry. They also will organize functionality according to the possibility for patients to sell their medical data to research companies. According to Statista, in 2015 global revenue from advertising on mobile applications amounted to US$40.5 billion, and is expected to exceed US$117 billion by 2020. The increase will be 57% per annum. According to the white paper: Comment: Market analysis in the white paper does not fully address the stated business model. Postings on Medium and project press releases offer more details on target market analysis and business model. In the course of the study, we identified the following competitors: The white paper highlights: blue button connector, apple’s mobile health application and Samsung’s mobile health application as competition. Resume:  Compared to competitors, MediBloc has a broad functionality. In addition, the possibilities for obtaining statistics on certain diseases and placing advertisements on the platform are distinctive features. An open-source platform built on blockchain using the EVM (Ethereum Virtual Machine) based on smart contracts. It will be possible to create new services using the API. A software development kit (SDK) will enable exchange of data. The core has a backup system. For building a decentralized data system, the IPFS (Inter Planetary File System) will be used. Technology description MediBloc is a system that can contain all patient data. Users can manage their own documents via smartphone, and set conditions that control the use of their data; doctors have access to patient data, and scientists have access to statistics. Comments:  Two mobile applications will be developed (for users and scientists) and EHR. A fairly detailed strategy for developing mobile applications and platforms is also provided in the white paper. We have analyzed the website and documentation of the MediBloc project for sufficiency and consistency for making an investment decision. The documentation includes the white paper, which is available in English, Japanese, Korean and Chinese. In the presented document, MediBloc as a platform is described in sufficient detail. The website provides information about the project, the public ICO, the team and the answers to the most frequently asked questions. MediBloc’s Medium blog contains information on use cases, partnerships, and a go-to-market strategy. The website is available in English, Japanese, Korean and Chinese. Resume: The documentation, website, and blog provide a thorough insight into the project. However, instead of updating its official resources (white paper and website), the project’s team does this via its Medium blog. Research and medical companies can directly purchase medical research data from individual patients. The token can be used to pay commissions for trading, data storage and advertising. Token issue limit:  10 000 000 000 Advantages of the tokenholders: limited-quantity tokens, tokens are functional, allowing you to use the platform services or sell them. Scheme of interest distribution by program  :  The project has reserved 2,000,000 MED for each bounty campaign, except Bitcointalk signature (7,000,000 MED). The program is open in the following areas: Bitcointalk Signature Campaign Resume:  The project has an extensive bounty program. The terms and conditions of the program are specified on the project site, and you can register for the program on the site as well. Tokens and capital are distributed according to the following scheme: Tokens and capital distribution scheme Resume:  Tokens do not affect the distribution of shares in the company. The reward system is set up so that it is more profitable to buy tokens earlier on. From the roadmap we would expect an alpha version in July and full version in December 2018. However, there are no project development plans (marketing activities, access to certain markets, etc). Resume:  There is a description of the marketing strategy and market entry strategy on a Medium posting, but not in the white paper or project website. When we enquired about these issues the project team said that they are targeting South Korea, and later they plan to enter markets for other Asian countries. The team consists of 9 people, as well as 9 advisors. Information on the principal participants of the team (LinkedIn): Dr. Allen Wookyun Kho Co ( -Founder, CEO. Doctor of Dentistry. An experienced application developer (more than three years in Samsung) worked for Medicen as a dentist and technical director.Dr. Eunsol Lee ( - Co-Founder, System Architect. A therapist with three years of experience, previously worked in the field of radiology.Chaeho Shin ( - Director of Business Development. FX and Derivatives Sales at Citi Bank, economist at the Bank of Korea.Saehan Park ( — Full Stack Developer, Cryptography specialist. An experienced programming engineer, specialized in blockchain encryption and cryptography (Penta Security Systems, Inc.) and web/app-developer.

Buy NuCypher ICO Account

  • A personal healthcare information management application for patients.
  • An Electronic Health Record (EHR) for medical practitioners and institutions.
  • A data retrieval program for researchers.

There are 5 other people in the team.

Comments:  The entire core team indicates its affiliation with the project. Resume:  Only 8 people identify their affiliation with the project on LinkedIn. The team is mainly from Korea. The team also has the following experts: Director of business development, full-stack developer, project manager, marketing director, China market manager, community manager. Information about the project is available on Facebook, Twitter, Bitcointalk, Medium, Telegram, Brunch. The team is communicating with users on social media and in forums. There is a Bounty program. The project is active on social media. News is regularly updated on Twitter, Facebook, Medium. The format of articles on the project suggests that they are primarily written to order. Comment: Interest in the project is strong mainly in Korea. The team is continuing to raise interest of the blockchain community; however, interest is supported mostly by advertising. According to the project, it has made a number of commercial publications: 167 article publications in Cointelegraph, ZyCrypto, 4 Chinese media, 1 Brazilian media (Portaldobitcoin), and 23 Korean media. The main marketing campaign is conducted via Google, Telegram, Medium, Kakaotalk, and Facebook. Analysis of website traffic based on data shows the following: Comment:  39.13% — direct link traffic, 36.36% — clickthrough traffic, 10.68% — search traffic, 12.37% via social media. Traffic through search:  22.44%. The team is active on social media, maintains blogs, and communicates with users via Telegram. The developers may be contacted using the links below. According to the project The information contained in the document is for informational purposes only. Our goal is to increase the transparency and reliability of the young ICO market and to minimize the risk of fraud. We appreciate feedback with constructive comments, suggestions and ideas on how to make the analysis more comprehensive and informative. The use of the blockchain initially promised greater privacy and data security, primarily in the implementation of transactions in tokens. However, the potential of blockchain technologies quickly moved beyond the financial sphere. One of the most promising areas of the blockchain application is the transfer, processing, storage and protection of data. The NuCypher project is a service that deals with such tasks. What is NuCypher ICO, its working principle and how promising are the project’s tokens for investments? NuCypher ( is a service that allows data owners to encrypt information and provide access to it only to the right users. Or simply provide it with secure storage. Information security is provided by proxy encryption, as well as by decentralized system. The mechanism is as follows: It is not possible to obtain physical access to the data due to the use of a decentralized system. This is one of the main advantages of the service in comparison with classic centralized systems. Those that have powerful cybersecurity, but with servers located in a specific location. NuCypher Mining (more precisely, the opportunity to receive rewards for transaction confirmation) will work in PoS mode. NuCypher already exists for more than a year as a full-fledged company with several working products. The most interesting of them is MediBloc. This is a decentralized system for storing patients’ data on health care facilities (in other words, medical records). The MediBloc user can provide his or her medical data to any clinic where he plans to get treatment through a private key. In addition, he can transfer the data to the laboratory for research, or even sold to a specialized research center. In addition, NuCypher supports Wolk and Datum projects. The first service allows users to privately send information to advertisers for marketing research, the second service is a decentralized database store using NuCypher KMS. By the way, Keep Network project’s features also can be used in improving modern blockchain-related troubles. Now they didn’t yet staffed the project team, and it includes only a dozen specialists. The “Team” tab contains a link to vacancies on the ICO NuCypher website. Two co-founders: MacLane Wilkison (CEO) and Michael Egorov (CTO) head the project. MacLane is a software engineer who previously worked for the investment department at Morgan Stanley. He was responsible for the technical side of providing financial services to large enterprises, and is familiar with working with confidential data. Michael is a graduate physicist, winner of the 2003 International Physics Olympiad, and an employee of the Moscow Institute of Physics and Technology. Project advisers are the following specialists: The project team successfully held a presale in the autumn of 2017, collecting about $ 4.7 million and selling 30% of the tokens. Apparently, the raised funds are still enough to work on the platform. And the creators of NuCypher take it slow to announce the ICO. According to preliminary forecasts, it should take place in the first half of 2018. Before the release of the most complete version of the NuCypher platform. Those wishing to purchase the token of the project on the ICO at face value should think about getting into the whitelist now. To do this, first, you need to join the project communities in social networks and subscribe to the newsletter. And not just to keep yourself up-to-date of the latest NuCypher ICO news. As practice shows, the open sale of project tokens, popular with investors, tends to become closed, accessible only to users from the white list. NuCypher is another project, quite popular and actual, to ensure a successful ICO before its announcement. The fact that developers are not trying to attract more investment than required number to continue development, causes even more confidence in the project. This, plus the current idea and the availability of already implemented products make ICO NuCypher interesting and promising project. And make tokens an asset with the potential for growth in the first days of release on the stock exchange. The project is inspired by the re-encryption of Proxy for distributed systems. NuCypher aims to protect confidential data from being eavesdropped on symmetric and asymmetric cryptography. At the moment, this is a rather new idea in the decentralized Blockchain technology. Token Sale: Private sale took place at the end of 2017 and raised $4.3 million.

Buy NuCypher ICO Email Subscription

NuCypher announced that it will not hold the Public presale.

The fund conducted in the Public presale had been used to build the network before the main sale took place. Currently, NuCypher has not announced the time of the main sale, but readers can register at the website to receive information email about whitelist and KYC. Hardcap: Updating Softcap: $4.3 million The project is inspired by the re-encryption of Proxy for distributed systems. Proxy is an Internet server that transfers information and controls to create security for the Internet access of clients called Internet service users. The station proxy setting is called proxy server. Proxy or proxy server has an IP address and a fixed access port. Proxy is valuable because it can not only do the task of a filtering information but also create the security for its clients. The Proxy firewall effectively blocks the penetration of unwanted objects into the clients’ computers. Proxy store the information that the clients need in its memory, which reduces the retrieval time and makes the use of bandwidth efficiency. The proxy server is like a security guard preventing troubles on the Internet. Users will not be able to access unauthorized websites (prohibited). Proxy servers protect the internal network from being identified by the outside objects by giving the network two identifiers: one for internal and one for external. This creates an “alias” in the outside world and makes it difficult for the reckless users or hackers to directly penetrate a computer. * NuCypher’s functions: - Securing decentralized applications: demo is available. NuCypher KMS: Decentralized key management system: The decentralized key management system helps developers of decentralized applications secure their data on the blockchain by re-encrypting the proxy as a service. NuCypher’s decentralized key management system promotes the potential of re-encrypting proxy and then brings private data to public blockchains. + The place containing shared data NuCypher allows sharing sensitive data continuously and securely between organizations. Whether sharing with partners, suppliers, customers or managers, NuCypher provides the data owner with total control. Without sharing private keys, you still can control sophisticated access, authorize and revoke access on demand, and get all other functions. + Enable Cloud NuCypher allows businesses to use secure cloud service providers. Under the BYOK (bring your own key), personal keys are never separated from the business. It provides powerful security control and ensures that data cannot be accessed without permission in any situation. Case studies using NuCypher - Datum using NuCypher: - MediBloc applies NuCypher KMS as a leverage for Qtum’s Blockchain Healthcare Information System. NuCypher’s proxy re-encode is integrated as follows: Users encrypt data on the client side using their own encryption. Then they upload their encrypted records to IPFS for storage. The network uses the encryption key to convert the ciphertext in the IPFS to the recipient, at that time the receiver can decrypt the record with their own key. If a patient switches healthcare providers or wants to revoke access for any reason, they will request to cancel NuCypher KMS and the related encryption key will be deleted. If the recipient tries to access the data in IPFS after revoking, they can not decode the data. He has a Certified Information Systems Security Professional (CISSP), Chartered Financial Analyst (CFA), and certified Financial Risk Manager. - Michael Egorov: Founder and Chief Technology Officer of NuCypher, and the advisor to theDtum project. He used to be a Senior Software Engineer at LinkedIn, Ph.D. in Ultracold Atomic Physics. Michael is a physicist and scientist at the Institute of Physics and Technology of Mexico. As a bronze medalist at the 2003 International Physics Olympiad, he studied ultra-cold atoms as a post-Doc. - John Pacific: He is a Code Engineer who builds a decentralized key management system for Proxy Threshold Re-encode. - Justin Myles Holmes There are also 2 other software engineers and the team is still intending to recruit more. - John Bantleman: businessman with more than 30 years of experience in managing software development companies. - Tony Bishop: Vice President at Equinix, which connects technology companies around the world, with a scale of 5000-10000 staffs. Founder of the Next Generation Data Center. Web design is simple and has not optimized in terms of content and user interface. The demo should be on the website so that users can directly check. There is no information on token sale on the website. However, when being asked to submit a demo on the website, they have immediately sent the demo via email and scheduled a demo. The demo explains in detail the coding steps done by John Pacific, one of the team’s programming engineers. Continue follow to update the latest information of this project and other ICO projects. *Note: All the information (on bigcoinvietnam) including tokens sales, “interest level”, ROI rate, hype rate, risk rate are our subjective opinion and only for informational and educational purposes. The information Bigcoinvietnam provides is not an investment advice. HYPE: is defined as the level of concern over a project and its FOMO. RISK: the risk rate of the project. Based on this score, you can find more spam warnings of the project. More specifically, RISK is about the transparency of the project, its idea, members of the development team, roadmap and whitepaper. (RISK is rated regardless ROI rate of the project). ROI: (Return on Investment): the rate of profit a project can bring to investors (ROI is considered separately from RISK. ROI can be rated High and RISK can be rated High as well). TERM: this factor reveals the length of time you should hold token or coin of a project. The period of time can be Short, Medium or Long. ICOGENS’ SCORE: this score can be decided by scores of four other scores or it will reflect the level of interest ICOGENS’ team has in the project. This score is separated from ROI score. It just shows how much Icogens core team concern the project. Get Weekly ICO Updates Sign up for our newsletter and receive insider ICO news Hello, i found myself supremely interested in nucypher - I cant find any information about future ico? Do you have any? According to a report from CoinJournal, NuCypher, a platform that offers security and encryption services for distributed systems, has pulled in $4.3 million. This brings the company’s total funding to just over $5 million. The funds come from a token pre-sale from 13 cryptofunds and venture capital firms. Leading the VC portion of the round was Polychain Capital.

Buy NuCypher ICO Airdrop

Michael Novogratz’s Galaxy Digital Assets Fund, FBG Capital, Compound VC, Satoshi Fund, and Blockchain Korea Partners, and others also participated.

Founded in 2016, NuCypher works to secure and encrypt big data, the blockchain, the cloud, and the internet of things (IoT). The San Francisco-based company differentiates its technology with the ability to transfer data from one public key to another without either party gaining visibility to the contents of the message. The company is planning to hold its public ICO in early 2018. The token of the ICO will be used to ensure computations are correct. The company said that a year from now it will power many decentralized applications, from data exchanges and marketplaces to end-to-end encrypted databases to healthcare apps. Earlier this summer, NuCypher introduced its decentralized key management system, NuCypher KMS. In May, the company earned finalist spots in Citi Tech’s Tech for Integrity Challenge and in TechCrunch Disrupt NY 2017’s Startup Battlefield. NuCypher also bears the honor of being a Y Combinator alum.