© vinci technologies ltd 2019. all rights reservedvinci is a blockchain-based ecosystem of software...
TRANSCRIPT
© VINCI Technologies LTD 2019. All rights reserved
Contents:
1. CONCEPT
2. HIGH-END BLOCKCHAIN
2.1 Bespoke security
2.2 Fault tolerance
2.3 Cost efficiency
2.4 Global presence
2.5 Applicability
3. BROAD FUNCTIONALITY
3.1 Freedom of development
3.2 Adoption speed
3.3 SDK – Software Development Kit
3.4 Service Ecosystem
4. ARCHITECTURE AND TECHNOLOGY
4.1 Scalability and consensus
4.2 CBFT technical
4.3 Speed
5. SALE STRUCTURE
5.1 SALE OVERVIEW
5.2 FUNDS DISTRIBUTION
5.3 PURPOSE AND USAGE OF COINS
5.4 RISKS
5.5 PRIVACY POLICY
5.6 COOKIES
5.7 USES MADE OF THE INFORMATION
5.8 DISCLOSURE OF YOUR INFORMATION
6. ROADMAP
DISCLAIMER
REFERENCES
.........................................................................................................................................................
............................................................................................................................
..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
..........................................................................................................................................
.................................................................................................................................................
.............................................................................................................................
............................................................................................................................
............................................................................................................................................
...............................................................................................................
.......................................................................................................................................
.......................................................................................................
............................................................................................................................
.............................................................................................................................................
...........................................................................................................................................................
.........................................................................................................................................
............................................................................................................................................
..................................................................................................................................
................................................................................................................
............................................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................................
.............................................................................................................
.......................................................................................................
.......................................................................................................................................................
......................................................................................................................................................
.....................................................................................................................................................
SUMMARY
4
5
5
5
6
6
6
7
7
8
8
8-9
10
10
10-12
12
13
13
13
14-15
15
15-16
16
16-17
17-18
19
20-21
22
1. CONCEPT
2. HIGH-END BLOCKCHAIN
2.1 Bespoke security
2.2 Fault tolerance
2.3 Cost efficiency
2.4 Global presence
2.5 Applicability
3. BROAD FUNCTIONALITY
3.1 Freedom of development
3.2 Adoption speed
3.3 SDK – Software Development Kit
3.4 Service Ecosystem
4. ARCHITECTURE AND TECHNOLOGY
4.1 Scalability and consensus
4.2 CBFT technical
4.3 Speed
5. SALE STRUCTURE
5.1 SALE OVERVIEW
5.2 FUNDS DISTRIBUTION
5.3 PURPOSE AND USAGE OF COINS
5.4 RISKS
5.5 PRIVACY POLICY
5.6 COOKIES
5.7 USES MADE OF THE INFORMATION
5.8 DISCLOSURE OF YOUR INFORMATION
6. ROADMAP
DISCLAIMER
REFERENCES
Summary
VINCI TECHNOLOGIES presents a new vision of how blockchain technology can be used by the members
of community or small and medium-sized enterprises (SMEs). Within this perspective, the platform should be
the foundational technology for an entirely new ecosystem of different software services.
Vinci is a blockchain-based ecosystem of software services. A number of innovative solutions, including
blockchain-based services and flexible consensus mechanism have all given Vinci great many advantages
compared to other blockchains.
Vinci offers a wide-ranging suite of instruments and services available to users of the ecosystem:
from decentralized data storage and computing capabilities to bespoke security and Python-written
smart contract services. On top of that, third-party developers are welcome to build their own services
within the Vinci Ecosystem, as well as integrate their own encryption protocols and digital signatures.
Priority is given to information security: the ecosystem employs special algorithms to protect against
most common blockchain threats like Sibylla, Eclipse Attack, 51% Attack, etc. A special focus is placed
on the system’s ability to integrate third party blockchain solutions into the Vinci Ecosystem: it is done via an open
API of Vinci and a set of gateway interfaces enabling users to transact in all types of cryptocurrency.
Vinci Technologies strongly supports continued development of the operating Vinci Ecosystem
by operating an in-house technical center and encouraging third party developers to contribute by creating
their own, in-platform software services.
.........................................................................................................................................................
............................................................................................................................
..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
..........................................................................................................................................
.................................................................................................................................................
.............................................................................................................................
............................................................................................................................
............................................................................................................................................
...............................................................................................................
.......................................................................................................................................
.......................................................................................................
............................................................................................................................
.............................................................................................................................................
...........................................................................................................................................................
.........................................................................................................................................
............................................................................................................................................
..................................................................................................................................
................................................................................................................
............................................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................................
.............................................................................................................
.......................................................................................................
.......................................................................................................................................................
......................................................................................................................................................
.....................................................................................................................................................
3
4
1 Concept
Vinci is a new step in the evolution of cloud technology and cloud computing. Despite a large number
of cloud platforms being available on the market and service prices dropping year-on-year,
all of those still remain centrally managed. Naturally, centralization raises a number of issues:
data privacy, data security and the dependence on service provider, the latter putting at risk
the level of freedom of any business.
Vinci is a blockchain-based ecosystem designed to provide decentralized services and broad cloud
computing capabilities. The technological solutions can be utilized to the fullest advantage
by any user. Vinci’s innovative decentralized architecture offers users a breakthrough corporate
cloud experience, taking scalability and data security to new heights.
The Vinci Platform gives direct access to an array of cloud computing capabilities, customized
products and services which can handle a range of tasks facing users around the world: analysis
and processing of large amounts of data, internal and external corporate communications,
creation of business applications and etc.
2.1 BESPOKE SECURITY
Handling business-critical data places utmost importance on security and confidentiality. A user must be
sure that their data will not be transferred to third parties or otherwise disposed of without their knowledge.
If the data is stored centrally at a single owner’s end, then it becomes a target for industrial spies, hackers
and even may capture the attention of pro-government organizations.
Blockchain, like any other online information system, is a popular target for hackers. In addition to DDoS
being the most widespread type of attack, we know of multiple new methods conceived specifically
to influence blockchain platforms: Sibylla, Eclipse Attack, 51% Attack and many others. Having analyzed
all those threats and the current deficiencies that expose the existing blockchain architectures to hacks,
Vinci has been able to equip its subsystems with the most effective and proactive remedies.
Given potential threats, Vinci comes armed with the most advanced and proven cryptographic
data protection technologies: secp256k1 и BLAKE 512, however, the ecosystem has a strong potential
for further development considering the implementation of ED25519 with X25519 keys, SHA256,
Keccak 512. Besides, the algorithms offered by Vinci ensure broad flexibility allowing users to create
encryption protocols, digital signatures and, if needed, run post-quantum cryptography algorithms.
2.2 FAULT TOLERANCE
Thanks to its decentralized architecture, Vinci provides distributed computing resources with a close-to-zero failure
probability at growth.
The application of decentralization principles within the Vinci platform guarantees a high level of fault
tolerance of the entire system: even in cases of a complete or a partial outage of individual nodes,
the system itself remains operational. Experiments have been conducted and the results indicate
that even 30% of Vinci’s key nodes failing will not affect the speed of building new blocks,
the consensus mechanism and any other key features of blockchain.
5
2 High-End Blockchain
6
2.3 COST EFFICIENCY
The Vinci platform is created under the umbrella of Vinci Technologies, a non-profit organization that promotes
the development and support of the free blockchain developer community. All services developed by Vinci
are accessible to the public. There will be a minimum commission fee for the use of some services
in order to ensure Vincis’ infrastructure development and maintenance, paid in Vinci coins.
We also provide opportunities for all those wishing to create their own commercial and non-commercial
services based on Vinci.
Third-party developers contributing new services to the Vinci platform may independently determine financial
policies and set fees for their use. All services and applications use Vinci coins or a Vinci-based token as a means
of payment. The Vinci project team reserves the right to establish individual fees for the operation of commercial
services within the platform.
2.4 GLOBAL PRESENCE
The distributed decentralized architecture enables Vinci’s presence in every part of the world. No other
cloud service provider can match Vinci by the level of resources and capabilities to deploy their data centers
around the world. When creating new services or using existing ones, a developer or an end user can choose
the necessary resources for data processing, a certain region of presence and in which geographical area their
data should be stored.
2.5 APPLICABILITY
The Vinci platform imposes no limits on developers with regards to the tools they use and application fields they
explore with the in-platform services being created. The fields in which blockchain technology and smart contracts
can be applied are endless: finance, logistics, medicine, elections and thousands of other spheres where strict
requirements to data security and authenticity are a must.
7
Vinci Technologies creates a pioneering structure, the Vinci Ecosystem. Due to open design and development
principles, as well as the core technologies used, all services in the Vinci system have huge potential for use.
This ecosystem consists of a set of services, already operational or currently in development, and it will also include
a huge number of third party developed services with the assistance by Vinci Technologies. Vinci Ecosystem offers
great opportunities for IT and blockchain market players to build their own decentralized solutions using Root
Service and smart contracts, written on Python. The flexible architecture of the ecosystem simplifies integration
or building new software services makes it more attractive to third party developer teams. Those teams
and their services may use, by default, all the current features of the current ecosystem, such as decentralized
data storage or cloud computing.
The system understands various programming languages and algorithms. Big data handling, distributed neural
networks, data backup and storage systems, high-performance computing are only a small part of what Vinci can
offer a user as possible software services in ecosystem. While each service adopted by Vinci becomes its integral
part, it exchanges data with other in-platform services, thus transforming Vinci into a fully-fledged distributed cloud
ecosystem unleashing new great possibilities.
3.1 FREEDOM OF DEVELOPMENT
The currently available cloud service platforms are handicapped by a limited set of functional tools which often fall
short of meeting consumer requirements. The core of the Vinci system and all the services developed by the Vinci
Technologies are open and accessible to whoever wishes to study and use them.
Vinci’s further development is driven by the input from the free community to creating new decentralized services
and apps and, therefore, the platform sets no restrictions on developer toolkits. Decentralized services can be
created by the Root service, based on core Vinci blockchain technology. The newly created service will be
compatible with any platform - Linux, Unix, Microsoft Windows, MacOS and can be written in any programming
language - C, C++, Java, Python, JavaScript, Go, C# and others. This level of flexibility has been made possible
through by creating a full API for all core services within the Vinci Ecosystem. It means that external team services
in the future will be available and interactive at all levels: data, transactions, synchronization requests, etc.
3 Broad functionality
8
3.2 ADOPTION SPEED
The Vinci test network features an extended toolkit for testing services in the sandbox where it takes minimum
time to develop and adopt new functionality. The built-in service monitoring software, highly customizable
and easy to change, allows for monitoring system load and fault tolerance values.
One should bear in mind that the end user always chooses user-friendly solutions. To this effect,
Vinci has created VStore of DApps & Services - a portal to all platform-based solutions and
a medium that developers can use to promote and sell their applications and services.
3.3 SDK - SOFTWARE DEVELOPMENT KIT
The standards have been specially designed for Vinci architecture to simplify the development of services on it.
They are convenient and easy to access, including API building principles, service-to-service data interchange,
routing and others. With the wide variety of services at hand, the standards include common mechanisms for using
those services, thus ensuring accelerated adoption and operation. In order to give third-party developers some
pointers, the Vinci Open Knowledge Base will be created containing brief guidelines and system interaction
examples.
Among Vinci’s extra advantages over all existing cloud solutions is having a multi-function toolkit available for any
user to develop and implement new services. Each such service, upon being developed, becomes part of the
overall ecosystem expanding Vinci’s capabilities. All created services are not mere user applications; they are
implemented on cloud-based decentralized technology and enable developers to monetize their products by
providing services to end customers [for more details on the Service Ecosystem, see paragraph 3.5].
3.4 SERVICE ECOSYSTEM
Within the whole Ecosystem, Vinci’s developer community creates the basic business-critical services
based on the principles of decentralization and security. Their goal is to lay a solid basis on which
more complicated services will be able to run once they are developed by interested parties
(third party teams of developers, Vinci community, etc.).
The Ecosystem is an integrated scheme consisting of a set of decentralized services. Vinci Technologies
supports the synergy of ecosystem and provides a quick start for third party teams of developers.
Each component of the ecosystem is a single service that can function independently of the others
or vice versa in close relationship with other services.
9
1 VTM
(VINCI TRANSACTION MIXER)
Transaction anonymisation service applicable
to any confidential data.
2 VDAP
(VINCI DIRECTORY ACCESS PROTOCOL)
is a service offering LDAP functionality with strengthened
safety and fault tolerance parameters.
3 VNC
(VINCI NETWORK COMPUTING)
is a service that facilitates transfer and adaptation of existing
computing tasks and software to the Vinci system in order to us
distributed computing power.
4 VBS
(VINCI BACKUP SERVICE)
is a fast data backup service that can make the backup
and snapshot generation speed several times higher compared
to centralized services.
5 VP
(VINCI PYTHON)
is a virtual smart contract processing machine based
on a Python-like language.
10
Despite all their advantages over traditional centralized systems, decentralized blockchain technologies have a
number of weak points. Those primarily relate a comparatively low throughput capacity and limited scalability. Once
the said problems have been solved, blockchain systems will successfully compete with centralized platforms.
4.1 SCALABILITY AND CONSENSUS
Each created service has its own set of computing resources. Services are independent being able to exist on their
own and capable of exchanging data by dividing input data stream processing among themselves.
In order to accelerate data processing within each service, Vinci Technologies has developed a special consensus
algorithm - Convolutional BFT. Its core distinctive feature is the capability of efficient data convolution when an
information block is distributed among participants for consensus purposes. Each information block is not
transmitted in its original form, but in a convoluted form that occupies a relatively small volume and allows reducing
data transmission costs as compared with traditionally implemented blockchain consensuses.
4.2 CBFT TECHNICAL
The network architecture of consensus systems of the existing blockchain platforms is based on the principles
of stationarity of the system’s operating period and is built exclusively with the use of the Poisson flow of events.
The need to analyze the type of distribution law for the input data stream and the length of transition periods
is determined by the fact that the latter may constitute a considerable portion of the system’s operating period,
while the law of input stream distribution may have a substantial impact on statistical indicators of the system’s
output parameters. This is why optimization of the system’s operating characteristics in general is impossible
without due consideration for the nonstationarity period and the impact of the type of the law of distribution
of the input data stream.
The CBFT algorithm is based on 23 nodes consensus, where each node (except for the main one) is an entry point
into the system for external users. Each node is sending data to all other nodes. 23 nodes, by a vote, elect the main
node (a stem-node) which, by chance, elects a node-validator of the next block in a chain.
4 Architecture and Technology
11
The validator node forms the next block from incoming transactions and sends it to the other participants of CBFT
consensus. Each node verifies the block and votes with its digital signature. A time meter is used by the validator
node to summarize the voting results and, in case a consensus is reached, it sends this new block to the main node
(stem-node). The cycle repeats until the stem-nodes and all active nodes (participants of consensus) are changed
as a result of a new election in the blockchain platform.
While the CBFT algorithm uses the PoS principle, the proof of nodes’ reliability is their possession of Vinci coins.
The first election of trusted nodes by coin holders with a sufficient share of coins is a point at which
the blockchain platform starts to function and validator nodes are defined within the system.
Let’s consider that we have N node-candidates in our voting process and the algorithm is focused
on choosing 23 winners – M1, M2…M23 from N-pull candidates. Also we have W voters of tokenholders,
who might vote for any Mn candidate with their X tokens of whole Y amount of all tokens in VINCI.
Then, results R (in time t) of voting assignment as function may be defined as:
R (t) = f (X, Mn, W);
At that X > L, L – a minimum number of shares for voting.
Election M1…M23 of nodes in consensus is a result of maximization of R (t) function when X tokens
given by voters (W) and received by candidates (Mn).
At that X => 0.15*Y;
Current CBFT algorithm starts only with the main node (stem-node) and that’s why the next round is the election
of the stem-node. The same principle of maximum of votes is used in election of the main-node (stem-node)
Mo by 23 nodes in consensus; each of 23 validator nodes has only one vote. Then, results Rsn (in time t1)
of voting assignment as function may be defined as:
Rsn (t1) = f (Mo, M1…M23);
Voting for yourself is prohibited and each node has only one vote to cast in each round of an election.
Also, a tie-breaker algorithm is applied to avoid a tie.
In practice, the system input stream intensity is not a constant value, as it changes over time. These changes are
related to the period of mass mailing of the candidate block in the process of reaching consensus among
the system’s active participants and the duration of request processing in the system, namely, analysis
of the candidate block, which consists of a set of transactions of the current validation period.
The development of the CBFT consensus algorithm has generated some statistical information that reflects changes
in the intensity of the input data stream in the distribution system depending on the time of distribution of the
candidate block, its size and duration of processing. The collected statistical data are approximated using
interpolated cubic spline of a piecewise-polynomial form with prescribed boundary conditions, i.е. at each
sector numbered j approximating function takes a polynomial form
The boundary conditions lie in the periodicity condition, i.е. coincidence of the values of the first and second
derivatives on the boundaries of interval . Spline construction amounts to determination of a set
of coefficients by linear system solving. Interpolating spline is built in such a way as to meet
interpolation condition for tabulated function .
In order to determine the specific dependence of the input stream data intensity on at certain average
intensity the obtained spline should be multiplied by the average intensity and divided by the average
value of the spline itself :
where is the actual average intensity of the input stream.
The proposed input stream model implies that the time between arrivals of requests is a continuous random
value that can be distributed according to various distribution laws, such as the exponential law, the Poisson law,
the normal law or the uniform law.
The Poisson law governs the main consensus mechanism to input stream data into the system and analyze
the candidate block. Its functionality may be varied depending on the main factors: net activities, net load
and speed of inter-service interaction.
4.3 SPEED
Standard and generally accepted data transmission protocols are unable to cater to the needs of present-day
platforms. This is true not only for decentralized systems. Centralized platforms rely on wide-band data transmission
channels, while decentralized platforms are focused on new consensus algorithms. In both cases, development
is restricted, because these solutions can’t ensure long-time sustainability or meet increasing throughput
requirements.
Vinci Technologies has developed a conceptually new data transmission protocol combining efficiently TCP
and UDP protocols. This protocol is called UFT - UDP Flow Transmission. An elementary data transmission unit
in a blockchain is a transaction. UFT has been designed for the purposes of the technology of transmission
of transactions, or short information messages with a predetermined structure. In this way, the available
bandwidth can be used 100% with a guaranteed transmission.
λg ( t ) =λ
Sg ( t )Sg ( t )
Sg ( t ) =∑
NSg ( t )i
Ni =1
k – 1
Pj ( t ) =∑i = 0
a i( j )( t – t ) , k – 1 = 3j
i
[ t j ,t j + 1 ]
[T 1 ,T ] n
a i( j )
Sg (t ) = yi g (t )i i = 1, ...,N
12
13
5.1 SALE OVERVIEW
Blockchain has become one of the most important sectors for investing over the past few years. Via Vinci, investors
have the opportunity to invest in ground-breaking information technology that competes traditional financial
services. As payments and information become more and more mobile, it is likely that innovation in the Blockchain
sector will continue to increase, approximately mirroring the pace of the last few years.
An entire financial industry exists to take advantage of cryptocurrencies. From the creators of individual
cryptocurrencies, to folks who sell software apps such as wallets. There are companies that are attracting venture
capital for synergies involving the retail use of cryptocurrency and so there hedge funds that invest directly
in cryptocurrency. Vinci provides the opportunity to invest in early-stage blockchain developer that in the past has
tended to be available only to business angels. However, no cryptocurrency is likely to be successful until investors
can be persuaded to actively use their crypto, and not simply hold on to it and speculate that it goes up in value.
As regulatory scrutiny intensifies, many startups are finding it simply easier to raise money from funds, whose
interest in digital assets has also grown. This has made cryptocurrencies a little less like the Wild West and more
like traditional venture investing - a trend that, depending on who you ask, either means the business is growing up
or selling out.
Our Institutional Round was successfully finished in 2018. Vinci raised 25 500 ETH through strategic investors,
private equity and venture capital. Typically defined as a sale of coins to early investors that was not open to public.
Due to its sale model, Vinci provided itself with reliable partners. Vinci doesn’t require additional advertising and
has a wide audience of supporters and investors. Raised funds are used for further development of an existing
working blockchain service.
5.2 FUNDS DISTRIBUTION
5 SALE STRUCTURE
%
16,0
14,0
31,0
12,0
10,0
7,0
10,0
Vinci Foundation
Strategic partners
Accelerated program
Developers bonus
Vinci Team & Founders
Vinci Technologies Future development
Third-party ecosystem developers
31%
10%
12%
7%
10%
14%
16%
5.3 PURPOSE AND USAGE OF COINS
We draw your attention, that the Vinci Product Description (hereinafter – «PD») does not constitute any relations
between you (hereinafter – «you» or the «Buyer») and the Seller. Purchasing of Vinci coins is available only after
accepting the Terms and Conditions (hereinafter – «T&C») and Privacy Policy.
Vinci coins is to be provided in the Vinci Reserve for future distributions, performing Vinci DApps & Services
and providing inside-platform promotions.
Purchasing of Vinci coins does not present an exchange of cryptocurrencies or conventional currencies for any
form of ordinary shares of the Seller and the Buyer of Vinci coins is not entitled to any guaranteed form of dividend.
The Buyer is only entitled to certain rights within the T&C. Vinci coins are not intended to constitute securities
in any jurisdiction.
PD does not constitute a prospectus or offer document of any sort, and is not intended to constitute an offer
of securities or a solicitation for investments in securities in any jurisdiction. PD is posted for information purposes
only. The content of PD is not a financial promotion. Therefore, none of the content parts of PD should be
considered an invitation or inducement to engage in any sort of investment activity. The Buyer should carefully
consider and evaluate all risks associated with cryptocurrencies, operations with them and respective business
activities. Before purchase Vinci coins read carefully all the information set out in this Disclaimer, PD, T&C and
Privacy Policy and ensure that you are aware of all potential risks. The section «Risks» details all potential risks that
you should consider. We strongly recommend you to seek out independent financial and legal advice before
engaging in any sort of business endeavor.
Vinci is a cryptographic utility coin.
Vinci is an integral and indispensable part of the Vinci platform because in the absence of Vinci, there would be
no common unit of exchange for goods and services or the economic incentive to motivate users to contribute.
You understand and accept that:
– Vinci is not for speculative investment;
– Vinci is not any form of commercial paper or negotiable instrument;
– Vinci is not any form of the financial derivative;
– Vinci may only be utilised on the Vinci Ecosystem, is non-refundable and cannot be exchanged for cash
(or its equivalent value in any other virtual currency) or any payment obligation by any Group Entity;
– Vinci does not provide you with any ownership or other interest in any Group Entity;
– Vinci does not represent or confer on you any ownership right, shareholding, participation, right, the title,
or interest of any form with respect to any Group Entity or any other company, enterprise or undertaking,
or any of their revenues or assets, including without limitation any right to receive future revenue,
dividends, shares, ownership right or stake, share or security, any voting, distribution, redemption,
liquidation, proprietary (including all forms of intellectual property), or other financial or legal rights
or equivalent rights, or intellectual property rights or any other form of participation in or relating
to the Vinci , any Group Entity and/or any service provider of any Group Entity.14
PD or any part thereof, as well as any copies, must not be taken or transmitted to any country where distribution
or dissemination of such information is prohibited or restricted.
5.4 RISKS
YOU CLEARLY UNDERSTAND THAT BLOCKCHAIN AND VIRTUAL CURRENCIES / TOKENS, INCLUDING WITHOUT
LIMITATION ETHEREUM, BITCOIN, NEO AND VINCI, ARE NEW AND UNVERIFIED TECHNOLOGIES THAT ARE BEYOND
CONTROL OF ANY GROUP ENTITY. IN PARTICULAR, AND IN ADDITION TO TERMS OF THIS DOCUMENT, YOU BEAR
FULL RESPONSIBILITY FOR ANY RISKS DESIGNATED IN THE PROPOSED DOCUMENTATION. BY PURCHASING
(WHETHER THROUGH AN INTERMEDIARY OR OTHERWISE), HOLDING AND/OR USING VINCI, YOU EXPRESSLY
ACKNOWLEDGE AND ASSUME THE FOLLOWING RISKS:
The Coins could be deemed from time to time as a virtual commodity, a digital asset or even as money, securities
or currency in various jurisdictions and therefore could be prohibited from being sold, purchased, traded,
distributed or held in certain jurisdictions pursuant to local regulations.
5.5 PRIVACY POLICY
This policy together with any documents relating to the sale of our VINCI coins and any other documents referred
to in it sets out the basis on which any personal data we collect from you, or that you provide to us, will be
processed by us.
Please read the following carefully to understand our views and practices regarding your personal data and how
we will treat it. By visiting www.vinci.id you are accepting and consenting to the practices described in this policy.
INFORMATION WE COLLECT FROM YOU
We will collect and process the following data about you:
1. Information you give us. This includes any personal information that you give us by filling in forms on the Website
or by corresponding with us by phone, e-mail or otherwise. It also includes information you provide when you
register to use our Website, subscribe to our service, participate in discussion boards or other social media
functions on our site, enter a competition, promotion or survey and when you report a problem with our site. The
information you give us may include your name, address, e-mail address and phone number, date of birth, financial
information, personal description and photograph, crypto-wallets addresses and any other personal data provided
to us.
15
16
2. Information we collect about you. With regard to each of your visits to our site we will automatically collect the
following information:
2.1. Technical information, including the Internet protocol (IP) address used to connect your computer to the
Internet, your login information (if applicable), browser type and version, time zone setting, browser plug-in
types and versions, operating system and platform, information about your visit, including the full Uniform
Resource Locators (URL), clickstream to, through and from our site (including date and time), information you
viewed or searched for, page response times, download errors, length of visits to certain pages, page interaction
information (such as scrolling, clicks, and mouseovers), methods used to browse away from the page and any
information of yours related to contact our customer service team (e.g. phone number).
2.2. Information we receive from other sources. This is information we receive about you from public domain,
third parties or other websites we operate or the other services we provide. Third parties we work with include:
business partners, sub-contractors in technical, payment and delivery services, advertising networks, analytics
providers, search information providers and credit reference agencies).
5.6 COOKIES
Our website uses cookies. A cookie is a small file of letters and numbers that we put on your computer if you agree.
These cookies allow us to distinguish you from other users of our website, which helps us to provide you with a
good experience when you browse our website and also allows us to improve our site. The cookies we use are
session or time-based. However, if you wish you can change your cookie settings in your browser if you would like
to prevent any cookies being stored on your online enabled device, but be aware that this may severely impact the
functionality of the site.
Please note that third parties (including, for example, advertising networks and providers of external services like
web traffic analysis services) may also use cookies, over which we have no control. These cookies are likely to be
analytical/performance cookies or targeting cookies.
5.7 USES MADE OF THE INFORMATION
WE USE INFORMATION HELD ABOUT YOU IN THE FOLLOWING WAYS:
Information you give to us. We will use this information:
– To carry out our obligations arising from any contracts entered into between us and to provide you with the
information, products and services that you request from us;
– To provide you with information about other goods and services we offer that are similar to those that you have
already purchased or enquired about;
– To provide you, or permit selected third parties to provide you, with information about goods or services we feel
may interest you.
– To notify you about changes to our service;
– To ensure that content from our site is presented in the most effective manner for you and for your computer.
17
Information we collect about you. We will use this information:
– To administer our site and for internal operations, including troubleshooting, data analysis, testing, research,
statistical and survey purposes;
– To improve our site to ensure that content is presented in the most effective manner for you and for your
computer;
– To allow you to participate in interactive features of our service, when you choose to do so;
– As part of our efforts to keep our site safe and secure;
– To measure or understand the effectiveness of advertising we serve to you and others, and to deliver relevant
advertising to you;
– To make suggestions and recommendations to you and other users of our site about goods or services that
may interest you or them.
– Information we receive from other sources. We will combine this information with information you give to us
and information we collect about you and (depending on the types of information we receive) use it as described
above.
5.8 DISCLOSURE OF YOUR INFORMATION
You agree that we have the right to share your personal information with:
– Any member of our group, which means our subsidiaries, our ultimate holding company and its subsidiaries.
– Selected third parties including:
– Business partners, suppliers and sub-contractors for the performance of any contract we enter into with
them or you;
– Analytics and search engine providers that assist us in the improvement and optimisation of our site;
– Fraud and crime prevention agencies for the purpose of assessing the risk of crime, fraud and
money laundering and this is a condition of us entering into any contract with you.
We will disclose your personal information to third parties:
– As required by law.
– In the event that we sell or buy any business or assets, in which case we will disclose your personal data to the
prospective seller or buyer of such business or assets.
– If the Company, or substantially all of its assets are acquired by a third party, in which case personal data held by
it about its customers will be one of the transferred assets.
– If we are under a duty to disclose or share your personal data in order to comply with any legal obligation, or in
order to enforce or apply Vinci Sale Terms and Conditions and other agreements; or to protect the rights, property,
or safety of the Company, our customers, or others. This includes exchanging information with other companies and
organisations for the purposes of fraud protection money laundering prevention and credit risk reduction.
– To ensure that we can successfully seek to complete our Sale and to meet our legal and contractual obligations
to you related to the Sales.
– To avoid crime, money laundering and the risk of fraud.
– To ensure that we have relevant information on persons wishing to contribute to Vinci Sale.
– To ensure that the underlying network that will be developed pursuant to the Vinci Sale and/ or on which the
Coins are intended to be usable has sufficient and relevant information in order to support you and your use of
the Coins.
– In order to provide relevant information to regulators, government agencies and banks that may request
information on the Vinci Sales.
CHANGES TO OUR PRIVACY POLICY
Any changes we make to our privacy policy in the future will be posted on this page and, where appropriate,
notified to you by e-mail. Please check back frequently to see any updates or changes to our privacy policy.
CONTACT
Questions, comments and requests regarding this privacy policy are welcomed and should be addressed
18
19
This section describes various stages of development of the Vinci platform, as well as associated technologies
and the main services that will become the basis for generating new users and will expand their functionality.
Each development stage will result in a public presentation of the achieved progress using the developer’s
testnet open for everyone.
Due to involvement of the free developer community in the development, this roadmap is subject to adjustment
if any functions assume a priority importance at some point. All stages of the Vinci platform’s development will
be publicly available at our media channels.
– Blockchain problem research – Q2 2017
– Technology Overview Draft – Q4 2017
– Root Service – Q3 2018
– Vinci Core Functions – Q4 2018
– Vinci Testnet – Q4 2018
VINCI SERVICES – Q2 2019
– Launching the platform of Vinci in Main Net
– VP Service (Vinci Python)
– Documentation for Vinci Core Functions
VINCI SERVICES – Q4 2019
– VTM Service (Vinci Transaction Mixer)
– VBS Service (Vinci Backup Service)
VINCI SERVICES – Q1 2020
– VDAP (Vinci Directory Access Protocol)
– VStore: creating a store to give access to services created on the Vinci platform
VINCI SERVICES – Q3 2020
– VNC Service (Vinci Network Computing)
© VINCI Technologies LTD 2019. All rights reserved
6 ROADMAP
20
Please read the following notification properly. This notice applies to all persons who read this document. Please
note this notification may be changed or updated.
The purpose of this Vinci Product Description is to provide the persons, pursuant to a confidentiality deed (the
“Recipients” and each a “Recipient”) with general information concerning the business of Vinci Technologies
Limited (collectively referred to as “Vinci Technologies”) and to assist the Recipient in deciding whether to acquire
investment referred to in this Section as the “Transaction”. It is supplied to the Recipient on that basis and it is not
to be used for any other purpose, and is subject to strict confidentiality obligations.
This Information is supplied subject to the confidentiality restrictions contained in a confidentiality deed entered
into between the Recipient and Vinci Technologies (“Confidentiality Deed”). The Recipient acknowledges that the
terms of the Confidentiality Deed are incorporated into and form part of these conditions.
The information contained in this Product Description (“Information”) has been prepared in good faith by Vinci
Technologies and its advisers. This Information is intended as a guide only and does not purport to contain all
information the Recipient may require in an investigation of the Transaction. None of Vinci Technologies, their
directors, their shareholders nor their respective subsidiaries, jointly owned entities or associated companies or
their respective businesses, shareholders, directors, partners, officers, employees, agents or advisers (collectively,
the “Vinci Technologies”) make any representation or warranty, express or implied, as to the accuracy, reliability or
completeness of the Information or subsequently provided to the Recipient or its advisers by any of the Vinci
Technologies Affiliates including, without limitation, any historical financial information, any estimates and
projections and any other financial information derived there from, and nothing contained in this Information is, or
shall be relied upon as, a promise or representation, whether as to the past or the future.
Any projections as to future events or other forward looking statements contained in this presentation represent
best estimates only. These forward looking statements and the operations and performance of Vinci Technologies
are subject to risks, uncertainties and assumptions that could cause actual events or results to differ materially from
the estimates or expectations expressed or implied by such statements. The Recipient acknowledges that no
representation is made that any forecast or projection as to future events will be achieved and the Recipient should
make its own independent review of the relevant assumptions upon which the forecasts and projections are based.
Further, such statements are made as at the date of this presentation. The Recipient should not rely on any
projections as to future events or other forward looking statements as a statement, warranty or representation of
fact but should satisfy itself as to its correctness by such independent investigation, analysis or due diligence as it
or its advisers think fit.
DISCLAIMER
To the fullest extent permitted by law, Vinci Technologies and the Vinci Technologies Affiliates:
• do not accept responsibility for any interpretation that the Recipient or any other person may place on the
Information or for any opinion or conclusion that the Recipient or any other person may form as a result of
examining the Information;
• do not accept any liability, whether direct or indirect or consequential, for any loss, damage, cost, expense,
outgoing, interest, loss of profits or loss of any kind (“Losses”) suffered or incurred by any person (whether
foreseeable or not) as a result of or by reason of or in connection with the provision or use of the Information, or
of the Recipient or its representatives or advisers acting on or relying on any Information; and,
• disclaim any responsibility for the accuracy and completeness of any projections as to future events or other
forward looking statements and any responsibility to update any of them after the date of this presentation.
The Recipient acknowledges and agrees that:
• the Information may not be relied on in any way by the Recipient or any other person in assuming any
contractual or other obligations or liability;
• the Recipient is responsible for any interpretation, opinion or conclusion it forms as a result of examining the
Information;
• the Recipient will rely entirely upon its own assessment and advice in relation to the business, assets, financial
position and affairs in which any person would be or become directly or indirectly interested in relation to the
Transaction and in assuming any obligations or liabilities in relation to the Transaction; and,
• any opinions expressed in the Information are based on the knowledge and approach of the persons forming
the opinion at the date that the opinion was formed and may have ceased or may in the future cease to be
appropriate in the light of subsequent knowledge or attitudes.
Vinci Technologies may in its absolute discretion, but without being under any obligation to do so, correct,
update or supplement this Information. Any further information will be provided subject to these same Vinci
Product Description.
© VINCI Technologies LTD 2019. All rights reserved
21
22
REFERENCES
• Bitcoin-NG: A Scalable Blockchain Protocol, Italie Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert
Van Renesse, In Proceedings of the 13th Usenix Conference on Networked Systems Design and
Implementation (NSDI 2016).
• M. Castro and B. Liskov, “Practical Byzantine Fault Tolerance,” in Proceedings of the Third Systems
Symposium on Operating Systems Design and Implementation, ser. OSDI ’99. Berkeley, CA, USA:
USENIX Association, 1999, pp. 173–186.
• Chain Inc. Chain open standard: A secure blockchain protocol for high-scale financial networks.
http: //chain.com/os/, retrieved Sep. 2016
• CoSi: Keeping Authorities 'Honest or Bust' with Decentralized Witness Cosigning, Ewa Syta, Iulia Tamas,
Dylan Visher, and David Isaac Wolinsky and Philipp Jovanovic; Security and Privacy (SP 2016).
• Elastico: Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek Saxena,
ACM Conference on Computer and Communications Security (CCS 2016)
• A.Efe Gencer, R.van Renesse, E.Gun Sirer, “Service-Oriented Sharding for Blockchains” Initiative
for CryptoCurrencies and Contracts (IC3) Computer Science Department, Cornell University, 2016.
• L. Luu, V. Narayanan, K. Baweja, C. Zheng, S. Gilbert, and P. Saxena. A secure sharding protocol
for open blockchains. Security Conference, Vienna, Austria, 2016. ACM.
• PBFT: Practical Byzantine Fault Tolerance and Proactive Recovery, by Miguel Castro and Barbara Liskov,
ACM Transactions on Computer Systems (TOCS), vol. 20, no. 4, Nov. 2002, pp. 398-461.
• F. Amirjavid and H. Mcheick. Service Oriented Distributed Computing, IEE, San Juan, Puerto Rico,
October 3-5, 2010.
© VINCI Technologies LTD 2019. All rights reserved