Like this video

TREMISS

BlockChain Tremiss was Created for the Further Development

BlockChain Tremiss is the first platform with authentic digital user sovereignty, transactions and phenomenal speed! The BlockChain Tremiss design team relied on many years of experience and innovation in other developers' cryptographic systems. With BlockChain Tremiss, your digital assets and messages will be completely safe! Tremiss protects privacy through an anonymous protocol and BlockChain, which stores tokens, not transactions. In addition, it quickly achieves the end result by not using traditional signature-based payment processing in favor of hash-based authentication. This is achieved through a unique consensus mechanism, with integrity guarantees provided through verifiable evidence. With the help of the unique product NodeTr mining is simple, safe, does not require connection to third-party services! BlockChain Tremiss is unique in that it can scale for the first time to provide users worldwide with a high-performance payment and messaging solution that confirms and retains their right to digital sovereignty.

3.0
1 0 expert ratings
Benchy 3.0
KYC
Experts
-
-
-
Review: coming soon PRO
~$1,325
value of tokens sold in ICO
Trading
0.00 USD
From YoBit on 2019-08-20 23:41:39 UTC
Token
Type
Price in ICO
0.0191 USD
Country
Whitelist/KYC
None
preICO start
25th Feb 2019
preICO end
25th Apr 2019
ICO start
16th May 2019
ICO end
29th May 2019
Visit ICO website
Report
Changelly

About TREMISS

All connections in the Tremiss platform go through the “Xtre” protocol we developed. The “Xtre” protocol is an advanced SCTP (Stream Control Transmission Protocol) protocol, it uses multi-threading, cryptography,   the protocol uses mixed networks in conjunction with a distributed ledger to create a confidential block chain.

In the “Xtre” protocol, unlike the other BlockChain protocols, “NodeTr” (Wallets with full NodeTr) are deterministically organized in “TreSupervisor” and are temporary, they exist only for the time of the block for which they are responsible. «TreSupervisor» uses a negotiated protocol to verify and authenticate operations that anonymize each encrypted message, independently agree to process all messages before decryption, and then independently decrypt and process each message. After generating the block, “TreSupervisor” is dissolved, and “NodeTr” become available for placement in the new random “TreSupervisor”.  “TreSupervisor” allows you to send messages in both directions anonymously. All operations performed by “TreSupervisor” are accelerated by the use of preliminary calculations.

These preliminary calculations create a template that defines how “NodeTr” in “TreSupervisor” should process the information during block generation. Consequently, the template is completely defined before any message information arrives to generate a block. The use of preliminary calculations ensures confidentiality, at the same time dramatically increasing the speed of information processing to create a block. There are two stages in creating the Tremiss block. First, NodeTr performs intensive precomputation, as described above, creating a unique template that determines how information or messages will be processed. When messages arrive, “NodeTr” work together to process messages in real time according to this unique template, a process that takes less than 1/30 of the precomputation time.

«TreSupervisor» cannot influence the integrity of the consensus mechanism, since all aspects of the production of blocks are independently predetermined in a strict, verifiable and unchanging manner.

In addition, all «TreSupervisor» on the Tremiss platform, regardless of the evidence that was verified prior to final confirmation of the block. To ensure proper system functionality, «TreSupervisor» jointly and independently generates cryptographic evidence as “Comments” on the integrity of the packet before decryption. In case the “Comments” do not match, all the evidence presented by the nodes can be checked to identify the failure or illegality of the node. After detecting a malicious or faulty «TreSupervisor», the honest TreSupervisor refuses to make further contacts and passes evidence of a malfunction or fault in the rest of the network. If it is verified that “TreSupervisor” is malicious, it loses its share of tokens that are burned, and “TreSupervisor” is removed from the network. These and additional security mechanisms allow users to prove the correct processing of their transactions, while at the same time making them unable to falsely accuse “TreSupervisor” or “NodeTr”.

Add to bookmarks
ICO KYC Report
Not conducted yet
KYC procedure verifies selected/specific team members only. It does not guarantee ICO success nor is a call for investment.
Missing or incorrect data? Let us know.

ICOs that might interest you

4.9

Asure Network

Asure Network is a layer 2 scaling network that enables fast.

Starts in 101 days 23 hours
4.6

PointPay

PointPay is creating a new product that combines four services in a single closed-loop ...

151 days 23 hours left
4.1

Allforcrypto

Allforcrypto is the secure and trusted online marketplace that connects cryptocurrency ...

10 days 23 hours left
4.9

Tixl

Tixl is a new privacy coin that allows instant and zero-fee transactions.

7 days 21 hours left

Cookies help us deliver our services. By using our services, you agree to our use of cookies.

Learn more Got it