KYC passing required Yes | Whitelist Yes | Restriction for countries No
|Tokens for sale||100,000,000,000|
|Token distribution in ICO||
|Price||1 ETH = 100,000 XYO|
|Price in PreICO||1 ETH = 200,000 XYO|
|Bonus in ICO||During the Token Sale, there is a tiered pricing structure. The sale price starts at 1 ETH: 100,000 XYO and maxes out at 1 ETH: 33,333 XYO.|
XYO Network search trends in Google
Thus the following problem exists:
both certainty and accuracy of the location
are negatively impacted by the lack of a trustless, decentralized location oracle.
Platforms such as Ethereum and EOS have been used extensively for their power to mediate
interactions securely online with the primary use cases involving escrows for fundraising
escrows in the form of ICOs. However, up to this point, every platform has focused entirely
on the online world and not on the physical world due to noisy, corruptible data integrity
of current information channels.
The XYO Network has been working towards the concept of enabling developers, such as
those writing smart contracts for blockchain platforms, to interact with the physical world
as if it were an API. The XYO Network is the world’s ﬁrst oracle protocol that makes
it possible for two entities to transact in the real world without a centralized third party.
Our abstractions allow us to make location veriﬁcation trustless for developers, creating a <...
weakness. If you could require some type of specialized hardware device that has
anti-tamper tech such that the private key is destroyed when one attempts to open
it or change the ﬁrmware on it then you could possibly have greater security, but
at the same time, it’s not like it’s impossible to spoof GPS signals either. A
proper implementation of this requires so much fallback and so many diﬀerent
data sources to have any assurance of accuracy, it would have to be very well
—Matt Di Ferrante, Developer, Ethereum Foundation
2.2 Proof of Location: Shortcomings
In summary, Proof of Location can be understood as leveraging blockchain’s powerful prop-
erties, such as time-stamping and decentralization, and combining them with oﬀ-chain,
location-aware device(s) that are
resistant to spooﬁng. We refer to the realm of
cryptographic location technology as “
.” Moreover, similar to how the weak-
transactions, called “
,” in order to retrieve a piece of location data on any blockchain
platform possessing smart contract functionality.
Aggregators from the XYO Network then
listen to these queries issued to the contract and fetch the answers that have the highest
accuracy from a decentralized set of devices that relay cryptographic proofs back up to these
aggregators. These aggregators then feed these answers back into the smart contract after
reaching a consensus on the answer with the best score. This network of components makes
it possible to determine if an object is at a speciﬁc XY-coordinate at a given time, with the
most provable, trustless certainty possible.
The XYO Network has four primary components:
(The Data Gatherers),
(The Data Relayers),
(The Data Storers), and
Aggregators). Sentinels gather location information via sensors, radios, and other ...
Bridges are location data transcribers. They securely relay location ledgers from Sentinels
to Archivists. The most important aspect of a Bridge is that an Archivist can be sure that
the heuristic ledgers that are received from a Bridge have not been altered in any way. The
second most important aspect of a Bridge is that they add an additional Proof of Origin.
Given that the XYO Network is a trustless system, Bridges must be incentivized to provide
an honest relaying of heuristics. This is done by combining a reputation component with
a payment component. A Bridge is rewarded with XYO Network Tokens (XYO) when the
information that they have relayed is used to answer a query. To increase their odds of
being rewarded, they must create ledgers that are consistent with that of their peers and
provide Proof of Origin to identify themselves as the relay of the heuristic.
Archivists store location information from Bridges in a decentralized form with the goal
into the blockchain by pretending to be a Diviner. The smart contract can then verify the
integrity of this information by checking the payload’s signature list.
3.3 End-to-End Functionality
Now that the responsibilities of each component are detailed, here is an end-to-end example
of how the system will work:
Sentinels Gather Data
Sentinels gather real world location heuristics and prepare their own Proof of
Origin to be chained to nodes above them
Bridges Gather Data From Sentinels
Bridges gather necessary data from online Sentinels and append Proof of Origin to
their chain. Bridges then make themselves available to Archivists in the Network.
Archivists Index/Assemble Data from Bridges
Bridges constantly send information to Archivists that are then kept on decen-
tralized stores along with a location heuristic index.
Diviner Fetches a User’s Query
Diviners poll for queries sent to ...
XYO Network Components Get Rewarded for Their Work
The components along the Proof of Origin Chain get paid for their involvement
in fetching the answer to the query. Sentinels, Bridges, Archivists, and Diviners
are all rewarded for their work.
In the case that the same query is asked more than once, more than one answer may
be produced since the answer that is produced at a given moment is based on the available
heuristic the system can oﬀer at that time. Submitting an answer to the blockchain takes
two steps. First, an analysis must be done to determine the Best Answer to a query. If
multiple answers are generated by the system, then nodes will compare the answers and
always choose the better answer. An example of a simple query would be: “
Where was a
node on the network at a speciﬁc time in the past?
3.4 Blockchain As a Single Source of Truth
At their core, Diviners simply transform relative data into absolute data. They are able to
queries to our XYO smart contract and pay in XYO Tokens (ERC20). The nodes in our own
XYO Blockchain, called Diviners, would constantly be polling Ethereum for these queries
and be rewarded in the native currency of our own XYO Blockchain (also called XYO
Tokens). In the future, we will do a one-to-one conversion from holders of our ERC20 token
into our own blockchain’s native currency in order to provide our platforms with transaction
fees that support micropayment requirements necessary for scalable IoT use cases. In these
cases, we will allow users to issue queries directly to our blockchain instead of interacting
through a public smart contract.
4 Proof of Origin
With a physical network comprised of untrusted nodes it is possible to determine
the certainty of data that has been provided by edge nodes based on a zero-
knowledge proof that two or more pieces of data originated from the same
Using these data sets, combined with a number of similar data sets and the
diﬃcult to validate. A bidirectional heuristic is one where the measured element can report
its own measurement back to the other party, which makes validation possible. Location is a
rare heuristic in that it can be bidirectional, with two edge nodes reporting on each other.
real-world example of this would be two people who are near each other taking
a selﬁe, printing a copy for each party, and then both signing the selﬁe. This
process would give both parties Proof of Proximity. The only way for these two
people to have gotten this “data” would be from them having been together in
the same location.
Next, let us discuss network eﬀects: Imagine a system where every edge node is expected
to constantly produce these “selﬁes” as they travel around, and store them in a binder. They
are also expected to keep that binder in time-sequential order and are never allowed to delete
one. This establishes a proximity recorder for each edge node that can be cross referenced
with the ...
XYO Network Roadmap
Q4 2017 - XY’s Blockchain-Based Oracle Network Is Born
Development of moving the internal XY location network platform to an open blockchain implementation begins: the XY Oracle Network is born.
Q1 2018: XY Mints “XYO Tokens” to Be Used For Smart Contracts to Access the XYO Network
The XYO Token is created and represents the official currency to be used throughout the entire XYO Network.
Q! 2018 - Public Token Sale to Begin
The Public Token Sale is scheduled to launch on March 20, 2018 and to conclude on May 20, 2018.
Q2 2018 - XY to Complete XYO on Test Network (”XY TestNet”)
XY will complete the development of the XY Oracle Testnet and begin rolling out its location-focused blockchain protocol to its Sentinel devices.
Q3 2018 - XY to Launch XY Oracle Main Network (”XY MainNet”)
XY will issue a complete roll out of the XY Oracle Network to XY its Sentinel beacons and start tests with new Sentinel partners (specifically IoT companies and mobile app developers).
Q3/Q4 2018 - XY to Complete API for Smart Contract Developers to Interact With the XY Oracle Network
Q3/Q4 2018 - XY to Release XY Sticker-Based Trackers, Which Can Be Added to eCommerce Packages
Launch the low-cost XY Sticker product which enables eCommerce retailers to track every single one of their products in realtime.
2019 - XY to Grow Global Network of Diversified Location Sentinel Devices
Grow coverage of XY Sentinels (location data providers and verifiers) as well as other components of the XY Oracle Network (Bridges, Archivists, Diviners).
2019 - XY to Onboard Larger Businesses, Organizations and Retail Companies That Have Use-Cases for Location Verification
Formalize business partnerships with enterprises and larger entities, which can benefit from a decentralized, trustless location oracle (e.g. logistics systems, supply chain companies, auditors, eCommerce businesses and countless other niches).