ATRONOCOM MATRIX

ADRACHA 2002/22-8347-39357.12 -00211

NEW AGE

When the Internet was developed in the 1960s and 70s, a process was set in motion that would change our lives forever. Originally, the network was developed for the internal communication of the military as well as the dialogue between scientists in order to transmit secret information and to enable simple forms of digital exchange of messages in smaller working groups.

In the 1980s, the development began towards what became the World Wide Web in the early 1990s. The beginnings of Google, Alibaba and Amazon lie at this time, Soon after the online world stormed into its first major digital crisis with the “dot com bubble”.
Clouds and the Internet of Things (IOT) represent the third and fourth stages of development in this binary coded world and marked the beginning of another new era.

As early as 1996, PGP had created the basis for the first commercially used crypto projects and developed solutions for payment on the Internet, such as “DigitCash”, “CyberCash” and “First Virtual”. These were the predecessors of today’s successful PayPal concept. 12 years later, Bitcoin began its triumphal march as the first cryptocurrency in Internet history.

In October that year, a white paper that explained the technology and functionality of this digital currency was published under the pseudonym of Satoshi Nakamoto. This contained a list of cleverly combined logical links as well as partly already existing technical achievements from the 90s, which had not been able to assert themselves until then for various reasons. In 2011 the first experiments were started by the members of the Atronocom team in order to build use cases for banks and financial institutions.

Today, ADRACHA is our answer to the challenges of a modern and up-to-the-minute version of a Blockchain, even though this ledger is far more than a simple Blockchain.




AT THIS VIDEO EDUARDO DOES GIVE THE AUDIENCE DETAILS OF THE ADRACHA BLOCKCHAIN AND HOW THE SYSTEM WORKS!

PLEASE UNDERSTAND THAT WE CUT THE SENSITIVE INFORMATION OF THE VIDEO
IN ORDER TO PROTECT OUR SYSTEM AGAINST ANY KIND OF CYBER ATTACKS !




ADRACHA 2002/22-8347-39357.12 -00211

ADRACHA

ATRONOCOM DPOS DYNAMIC RADIUS CYCLIC-HASHING ALGORITHM

ADRACHA is the foundation for a real-time economy that gives millions of companies and networks the ability to interact without scaling issues and to connect these microworlds to a new order in the network!

 

 

classified
cross-app



SHA-3 2002/22-8347-39357.12 -00211

SHA-3

Secure Hash Algorithm 3

SHA-3 is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like structure of SHA-1 and SHA-2.
SHA-3 is a subset of the broader cryptographic primitive family Keccak designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche, building upon RadioGatún. Keccak’s authors have proposed additional uses for the function, not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a “tree” hashing scheme for faster hashing on certain architectures, and AEAD ciphers Keyak and Ketje.

cross-app sha-256




DAPP 2002/22-8347-39357.12 -00211

PROCESS

The security of the system is one of the main components of the ATRONOCOM network. For the security of the ATROM COIN, elliptical curve cryptography and cryptographic hashing are used. The cryptographically secure key pairs are generated using elliptic curve cryptography and consist of private and public keys. During block creation, delegates add a fixed transaction number to the Block as a payload and are signed by the delegate.

Signing is done with the delegate secret key and the header is hashed with SHA-256. Nodes on the network use Remote Procedure Calls (RPC) and events to communicate for block and transaction forwarding. The RPCs and events are also transmitted as JSON objects with additional fields, to process the transmitted object and to effectively transmit the JSON object, the network also uses the Web Socket.

For communication mode with other networks, the system header is used to identify the nodes and obtain basic information about the node. The blocks are generated decentralized in the system and sent back to other nodes. For block propagation, block creation selects a group of nodes in the network and sends the transaction arbitrarily. Those who have received the block will append the block to their ledger and send it to some other random nodes.

All transactions from the nodes are first collected in a transaction pool and serve as a storage pool until they are added to the block. The transaction must be moved and transferred from one node to all other nodes so that it can be included in blocks and the broadcast queue for transactions works by creating a certain number of transactions from the transaction pool and checking these transactions.




DAPP 2002/22-8347-39357.12 -00211

A STEP AHEAD

TRANSACTIONS PER MINUTE

One of the stated aims of the crypto movement was to shorten the waiting time for transactions. Unfortunately, this problem has not been satisfactorily solved by the big cryptocurrencies. With ADRACHA, a new path has been taken which due to the individual private blockchain operating on the main ledger allows handling a volume of several million transactions at the same time and makes this ledger infinitely scalable.

ATROM
0.027 sec
XRP
3 sec
ETH
2 min
DASH
15 min
LTC
17 min
BCH
58 min
BTC
66 min



DAPP 2002/22-8347-39357.12 -00211

ALWAYS CONNECTED

KYC CRYPTO ID PROTOCOL

Individual and personal keys are created for this data to enable customers to access the applications and use them privately. The data itself cannot be accessed or viewed by third parties and is the basis for the users own Blockchain which runs on the Masterledger for accounting and safe communication purpose.

cross-app




DNA 2002/22-8347-39357.12 -00211

DNA

USERS GENESIS BLOCK ON THE ECOSYSTEM

The users individual private ID is in combination with the signature of the Foundation’s individual and private key the basis for the Genesis Block created on the user’s private ledger. All and every single transaction is from that point on recorded and cannot be changed or altered in any way and under no circumstances.

cross-app




RSA

RSA is a cryptosystem for public-key encryption and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet. RSA was first described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology.
Public-key cryptography, also known as asymmetric cryptography, uses two different but mathematically linked keys, one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret. In RSA cryptography, both the public and the private keys can encrypt a message; the opposite key from the one used to encrypt a message is used to decrypt it. This attribute is one reason why RSA has become the most widely used asymmetric algorithm: It provides a method of assuring the confidentiality, integrity, authenticity, and non-reputability of electronic communications and data storage.

RSA derives its security from the difficulty of factoring large integers that are the product of two large prime numbers. Multiplying these two numbers is easy, but determining the original prime numbers from the total, that’s factoring, is considered infeasible due to the time it would take even using today’s supercomputers.
The RSA algorithm involves four steps: key generation, key distribution, encryption, and decryption. The public and the private key-generation algorithm is the most complex part of RSA cryptography and falls beyond the scope of this post. You may find an example on Tech Target.

cross-app rsa




DAPP 2002/22-8347-39357.12 -00211

ALWAYS CONNECTED

DPOS - WE BUY YOUR PROCESSING POWER

ATRONCOM`S ECOSYSTEMS ADRACHA uses- A “Delegated Proof of Stake” (DPoS) as the consensus protocol, whereby the “Staking” function is provided for mobile and smartphones. The Blockchain network is generated by the delegates elected by the stakeholders. Each smartphone represents a node and has full participation in the incentive of the renting process in proportion to its process power sold to the Foundation.

Stakeholders can vote on the delegates, and the weight of each vote depends on the level of stakeholder participation. Stakeholder voting is added to the network as a “voting transaction”. A delegate can register a delegate transaction and generate, validate that transaction.

The delegate successfully generated and accepted by the system block wins the reward and the reward is shared between the stakeholders to secure the network. In other words, we buy the processing power of your node to the ratio and weight of Coins involved.

cross-app




CDN

content delivery network

A content delivery network (CDN) refers to a geographically distributed group of servers which work together to provide fast delivery of Internet content. A CDN allows to transfer assets needed for loading Internet content including HTML pages, javascript files, stylesheets, images, and videos very quickly. The CDN services are becoming more popular, and today the majority of web traffic is served through CDNs, including traffic from such major sites like Facebook, Netflix, and Amazon.

What are the benefits of using a CDN?
The most important benefits can be divided into 4 components:

– Improving website load times. By distributing content closer to website visitors by using a nearby CDN server, users load pages faster which increase a number of visitors who stay on this website.

– Reducing bandwidth costs. Bandwidth consumption costs for website hosting is a primary expense for websites. CDNs reduce the amount of data, reducing costs for website owners.

– Increasing content availability and redundancy. Large amounts of traffic or hardware failures can interrupt normal website function.

– Improving website security. A CDN may improve security by providing DDoS mitigation, improvements to security certificates, and other optimizations.

A properly configured CDN may also help protect websites against some common malicious attacks, such as Distributed Denial of Service (DDOS) attacks. That is the main reason why we are using CDN on the ATRONOCOM platform.