Professional Documents
Culture Documents
Certain of the information contained in this Whitepaper may contain “forward-looking information”. Forward-
looking information statements may include, among others, statements regarding the future plans, costs,
objectives or performance of Shyft Network Inc. (the “Company”), the ecosystem or the platform or the
assumptions underlying any of the foregoing. In this Whitepaper, words such as “may”, “would”, “could”, “will”,
“likely”, “believe”, “expect”, “anticipate”, “intend”, “plan”, “estimate” and similar words and the negative form
thereof are used to identify forward-looking statements. Forward-looking statements should not be read as
guarantees of future performance or results, and will not necessarily be accurate indications of whether, or the
times at or by which, such future performance will be achieved. The actual results of the Company, the ecosystem
and the platform could vary from the forward-looking information contained herein, including as a result of such
risks as a collapse in the market for cryptocurrencies, adverse regulatory developments and competition from
other platforms. Forward-looking statements and information are based on information available at the time
and/or management’s good faith belief with respect to future events and are subject to known or unknown risks,
uncertainties, assumptions and other unpredictable factors, many of which are beyond the Company’s control.
The forward-looking information contained herein was developed based on assumptions related to, among
other things, the continued growth of the blockchain technology industry, the success of the participants in the
ecosystem and the demand for such participants in the ecosystem and the demand for such participants’ product
offerings. The Company does not intend, nor does the Company undertake any obligation, to update or revise
any forward-looking information or statements contained in this Whitepaper to reflect subsequent information,
The Whitepaper contains statistical data, market research and industry forecasts that were obtained, unless
otherwise indicated, from independent industry and government publications and reports or based on estimates
derived from such publications and reports and the Company’s knowledge of, and experience in, the sectors
in which the Company plans to operate. While the Company believes this data and information to be reliable,
market and industry data and information is subject to variation and cannot be and therefore has not been
verified due to limits on the availability and reliability of raw data, the voluntary nature of the data gathering
process and other limitations and uncertainties inherent in any statistical survey. The Company has not
network enabling users to securely obtain, store, inquire institutions are increasing in number, complexity, and
about, and work with regulatory-compliance-satisfying rigor.1 Costs of satisfying these obligations continue to
(KYB); Anti-Money Laundering (AML); Enhanced Due For banks and large institutions, compliance represents a
Diligence (EDD), etc.], while maximizing data security and substantial drain on resources. For smaller institutions, it
protecting identity beyond the capabilities of traditional, can stifle even basic operations. For example:
non-blockchain-based compliance systems. In this
manner, compliance becomes cheaper, faster, and more • Inefficient compliance onboarding processes cost the
secure. average global bank $61 million USD annually. 3
Shyft also features a Creditability system, providing • Costs in the UK can range from $13 to $130 USD per
consumers with a reputational score based on compliance individual compliance check. 4
and historical transactional activity, which is especially
useful for the unbanked. • The average UK bank is currently wasting $6.5 million
1 https://www2.deloitte.com/content/dam/Deloitte/ru/Documents/financial-services/Facing%20the%20sanctions%20challenge%20in%20financial%20services.pdf
2 http://eprints.lse.ac.uk/79943/1/blogs.lse.ac.uk-Fintechs%20have%20advantages%20over%20established%20banks%20but%20regulation%20is%20a%20major%20challenge.pdf
3 https://globenewswire.com/news-release/2017/06/26/1028793/0/en/Typical-UK-bank-will-waste-10m-annually-on-inefficient-KYC-checks-as-AMLD4-regulation-comes-into-force.html
4 https://www.trulioo.com/blog/aml-kyc-automation/
5 https://uk.reuters.com/article/bc-finreg-beneficial-ownership-rule/banks-brace-for-rocky-implementation-of-u-s-treasury-beneficial-ownership-rule-idUSKBN1D31BK
cost-effective, risk-reducing compliance by implementing collection, and 15% on data organization and entry. 6
raise headcount and deploy larger and larger amounts of Additionally, compliance processes can be repeated
capital to meet new mandates. This approach is crude, multiple times by subdivisions of an organization due
unscalable, and, over time, has demonstrated diminishing to “data siloing”, effectively multiplying costs. Data silos
• In 2013, JP Morgan spent an additional $1 billion on of an organization. One division’s repository is often
adding 4,000 employees to their compliance department. 6 inaccessible to other divisions and/or incompatible with
• Half of global financial institutions have added to both divisions. These inefficiencies stem from a lack
employees to keep up with Know Your Customer (KYC) of flexibility and poor interoperability between the
compliance over the past year.7 organization’s technological and bureaucratic systems.
• 75-85% of compliance costs are represented by So far, costs described have concerned conducting
Anti Money Laundering (AML) spending. Compliance compliance procedures and not the protection of the
professionals headcount deployed to handle KYC data procured. As can be seen from widely publicized
increased more than 3.5 times, from an average of 68 incidents, data breaches are increasing in frequency
employees in 2016 to 307 in 2017. 5 and size.10 Organizations, especially large bureaucratic
• Despite significant increase in resources, time arms race.11 The recent Equifax breach, which
required to perform compliance operations continues to compromised 143 million user records is an example of
lengthen—on average taking 26 days to on board a client the potentially catastrophic risk inherent to centralized
in 2017, up from 24 days in 2016. 8 databases. In our opinion, no good (traditional) fix exists.
5 https://uk.reuters.com/article/bc-finreg-beneficial-ownership-rule/banks-brace-for-rocky-implementation-of-u-s-treasury-beneficial-ownership-rule-idUSKBN1D31BK
6 https://www.trulioo.com/blog/aml-kyc-automation/
7 https://www.thomsonreuters.com/en/press-releases/2016/may/thomson-reuters-2016-know-your-customer-surveys.html
8 https://www.thomsonreuters.com/en/press-releases/2017/october/thomson-reuters-2017-global-kyc-surveys-attest-to-even-greater-compliance-pain-points.html
9 https://www.kofax.com/-/media/Files/Infographics/EN/ig_top-5-reasons-you-need-RPA-for-KYC_en.pdf
10 https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/
11 https://www.bloomberg.com/news/articles/2017-10-03/white-house-and-equifax-agree-social-security-numbers-should-go
Blockchain-based distributed ledger technologies have of distributed ledgers and the programmability of smart
the potential to streamline, cut costs, and reduce risks contracting. In the context of KYC/AML regulations, this
inherent in traditional compliance systems. powerful combination holds the potential to drastically
Over the past seven years, projects ranging from Functioning as a distributed network, Shyft has no
digital governance to supply-chain shipping have been single point of failure susceptible to centralization risk
developed. Organizations are retrofitting existing product inherent to compliance systems of old, i.e. it cannot be
are appearing in traditionally risk-averse institutional Compliance becomes cheaper, faster, and more secure.
of data. Additionally, blockchain tokens are being used The ecosystem surrounding the network is intended to
to incentivize users to act deterministically within serve both traditional and blockchain-based industries.
For most - if not all - blockchains currently operating, developing applications, or simply consuming network
collection of any user data, let alone collection of data services. Here are some potential use cases:
The lack of blockchains focussed on compliance data, Network (known as ‘Trust Anchors’). Trust Anchors can
coupled with what we saw earlier—financial institutions include financial institutions such as banks, exchanges,
spending significant resources to tackle compliance— or any organization or business for which compliance
means there is a significant opportunity for a blockchain and KYC/AML processes are an integral part of customer
We aim to build such a distributed compliance data • Application providers seeking to leverage the
The Shyft Network: Ecosystem Overview Anchors as well as by other businesses where compliance
is an obstacle.
the Shyft Network and ecosystem before delving into the • General consumers can use the Shyft Network for
FEE
Owners of K YC/AML Data. They FEE
may or may not be regarded as
Trusted Entities. They provide
Data Consumers
their K YC/AML data to Trusted DATA
FEE DATA
ISSUER CONSUMER
Entities in exchange for an
Offer pre-approved app services
attestation. Make use of app
that require the use of K YC
services.
data. They review attestations,
interactions as transactions on
the decentralized ledger.
reputation can be confirmed via attestation. Upon the launch of the Shyft Network, the Shyft team
and new technologies continue to mesh with Shyft over With our Trust Anchor and ecosystem partners, we will
time, arbitration and other capabilities will come online. promote the development of open standards across a
In addition to lower compliance costs, consumers will point where costs are lowered for all participants.
system will provide consumers with a reputational score This development of standards also includes plug-in
based on compliance data and transactional history, capabilities like Shyft Envoy,12 where users can subscribe
further described in the RMT section below. to API13 services (e.g., forward to wallets) through
12 A plug-in architecture that is developed with ecosystem partners. The goal of this standardized interface is to suit the needs of other blockchain approaches to domains that Shyft
participates in. Examples would include other blockchain identity projects, which can increase the Shyft user’s effective identity score and enable cross-blockchain use cases.
13 Application Programming Interfaces (API) is a series of standards that allow interconnectivity between connected parts of an application development ecosystem.
The Shyft Network is a combination of centralized data codebase evolves, we will keep pace by incorporating
attestation (the ‘Shyft Bridge’) and an expansive network technical changes to improve the network. The Shyft
of validation nodes that connect to the outside world (the Network’s subcomponents will be described in the
the Shyft Bridge and the Shyft Ring. It is based on the Intra-Generational Blockchain Solutions
modifications to its consensus engine: By leveraging the stability of the Bitcoin network and the
1. All Shyft Ring nodes must forward end-user requests Virtual Machine (EVM) programming language, Shyft will
to the Shyft Bridge. develop and maintain blockchain software that bridges
2. All Shyft Ring nodes must validate the transactions in potential integrations with sidechain platforms such as
the Shyft Ring mempool up to the defined capacity limit of Liquid and Rootstock, and the creation and deployment
computing power of the Shyft Ring node (with other As blockchain technology expands in reach and in
incentivization(s) to be determined at a later date). scope, we fully expect the development community to
4. All Shyft Ring nodes must process any end-user blockchain attestations, as well as the basic software
transactions, and immediately signal and provide proof of the blockchains. While the Shyft blockchain initially
to the network of malicious actor activity (for example, will be deployed as a Peer-to-Peer (P2P) Proof-of-Work
attempts to double spend). (PoW) blockchain, the longer term goal for the Shyft
Federation15 design.
14 https://forum.ethereum.org/discussion/2262/eli5-whats-an-uncle-in-ethereum-mining
[“Uncles are like blocks that were very close to being the ‘correct’ next block in the blockchain, but are not because they were resolved after the main block producer. That is why they are
uncles and not blocks and constitute a fork in the blockchain, and are thus not valid.”] The ethereum platform rewards “uncles” to add “weight” to the consensus-driven block production
services. Shyft will enable developers to run the majority The Shyft blockchain will allow third parties, or Trust
of their private infrastructure on local machines, while Anchors, to onboard new users and update their data.
architecting applications utilizing Shyft within the cloud. In order to provide additional security to the entire
As local machines can also act as validation nodes on the blockchain, a machine learning system (the Shyft
Shyft Ring, the entire network attestation can happen in a Conservator) is used to investigate and confirm the
distributed, transparent manner— all while conforming to validity of the information collected through KYC forms.
best-in-class encryption standards. Developers can post
attestations, state configurations, and registries of assets A compliant KYC/AML system will enable financial
and indexes, powering the next generation of trustless institutions and other players to create products (e.g.
applications. asset-backed or collateralized loans and debt instruments,
The Shyft Blockchain target market. Applications on the Shyft blockchain can
Pseudonymous blockchains, like Bitcoin and Ethereum, only to the topology of trust required for execution of a
while practical for moving value outside the financial The Shyft blockchain is the core blockchain software on
system, can be difficult to integrate with services that the various components of the Shyft Network, the Shyft
cannot bypass KYC/AML regulation (e.g. most, nearly Bridge and the Shyft Ring (described in further detail
all, traditional financial services institutions.) Generally, below). It is an extension of the Ethereum codebase that
this is a non-starter for traditional financial service allows the capability to read and write the attestation
providers, and so this excludes both the institution and its data that KYC/KYB data providers require to function, at a
We propose the Shyft blockchain that facilitates the the formats that are required in the attestation process,
following: the collection of users’ data off-chain using along with reducing the transaction execution cost re:
traditional databases and collection strategies with lookups to the KYC/KYB database elements.
the public.16
Open Standards
On Implementing ‘Know Your Customer’ Initiatives to set standards with an open development
16 The most direct example of this would be the plain language description of the members of a bit field.
17 https://www.ethereum.org/
18 https://theethereum.wiki/w/index.php/ERC20_Token_Standard
Attest; be a witness to; certify formally. serving the price/pair ratio of the tokens. The exchanged
All smart contracts running on the Shyft blockchain will be controls around how that contract is treated, so that large
signed by their creators. The ability to create new smart amounts of value don’t get locked or otherwise lost.
Shyft developers. The highest quality control standards As the walled garden work progresses, new and
will be used with careful, secure, and efficient coding innovative applications of, and bridges to, Shyft tokens
practices. A formal specification of these practices will and the surrounding architecture will arise, enriching and
Once processes and procedures for smart contracts Use of the Shyft blockchain will require payment with the
development and deployment for the Shyft Network are Shyft token, a “gas” equivalent created to cover the cost
established, we intend to open up Shyft Wings. Shyft of transaction validation, storage of data, settlement, and
a company or an individual, users will be able to create The term “gas” comes from the Ethereum blockchain,
software that functions within the context of signature- where a single unit of computational execution in the
based smart contract execution in a walled garden Ethereum virtual machine language (“EVM”) corresponds
Within the walled gardens, in order to prevent cross- platform, it follows the same mechanisms and uses
contamination of smart contract event pools and to the same form of payment for services on the Shyft
reduce the risk of harmful contracts, any smart contract blockchain and the Shyft Dapp platform.
token (defined below) or another token will be flagged The primary purpose of this gas is to set a predefined
and the application code responsible will go under code price-per-operation for usage of the Shyft blockchain
review by Shyft developers and bounty programs. While and the smart contracts therein. This sets upper limits
we are at a stage in the evolution of blockchain systems on the execution capability of the Shyft blockchain
where Dapps such as distributed exchanges are possible per block generated, creating an opportunity for each
and have working examples, we would prefer to initially validator node to apply an algorithm and charge a specific
restrict the usage of the Shyft platform’s native token price-per-operation. In this scenario, Shyft Network
exchange systems. This being said, a “large quantity” participants could potentially collect Shyft token and pay
• Functions exactly like the Ethereum network, barring a • Connects to Shyft Safe (see more details on Shyft Safe
resembles the web API of a block explorer • At the end of every block (17 seconds, with basic timing
• Every node that receives a transaction must pass it to Ring’s block hash and commits state to Shyft Safe if both
• Attested Assets (which may include the use of pegged • Organizes the deployment of PoW and validation
sidechains such as Liquid, Rootstock, etc.) efforts.
• KYC data potentially embedded • Maintains sparse connectivity to the Shyft Bridge to
Shyft Ring (Consensus Mechanism) Shyft Ring validator participants are incentivized
Consensus; group solidarity in sentiment and belief. optimal efficiency of the Shyft Network.
mechanism for the state of the Shyft Network. The Shyft Operations that a Shyft Ring validator will participate
Ring connects directly to the Shyft Bridge. Shyft Ring in include consensus-based verification of the Shyft
participants are necessarily validators for the entire state blockchain state (in combination with a distributed
of the network, completing PoW hashes to propagate network of peers), creation of merkle tree Chords by
blocks and establish security (PoW will later be upgraded compacting the entire traced tree of transactions per
to a Strong Federation model). These validators also act user, and the routing of pre-signed transactions from
as local connection nodes for non-full-node users.19 mobile clients to the Shyft blockchain peers.
Shyft Ring Usage Chords are created with block hashes as attestation
Shyft Ring Validators will run a single piece of software incoming mobile requests. Chords allow wallets to resume
partners.
19 There is explicit trust that the connections will not be censored however part of the reward to the validator nodes is based on their honesty (i.e. if a pre-signed transaction is sent to more
than one relay/validator node by default and this process is randomized; any node that attempts to censor this communication while another reports to the Bridge truthfully will be penalized
by a reduction in reputation and associated rewards as a validator/relay).
Being able to serve from the central Shyft Bridge (the Bridge; something that is intended to reconcile or form a
connection between Shyft Safe and the Shyft blockchain) connection between two things
means that the average transaction time can be reduced
significantly and the reward for the Shyft Ring validation The Shyft Bridge is the centralized Shyft blockchain based
process can be appropriately adjusted. attestation engine which functions in tandem with the
Having the option to KYC the validation nodes would allow A software solution maintained at Shyft headquarters and
at least some institutions to participate in the Shyft Ring, shared as necessary on secure servers, would be running
helping further stabilize the network. They would have the Shyft blockchain and connecting to pegged sidechain
nothing to gain other than Shyft rewards, as the Shyft networks Safe attestations. The primary operation of the
Ring cannot modify the Shyft Bridge’s decision. system is intended to be a connection-of-last-resort for
Shyft Ring and the Shyft Bridge. 20 As a result, any mobile end-user can institute a reliably
20 Given that a simultaneous takeover means that the Shyft Ring would need to immediately grow to a much larger capacity (or else the problem turns into “bad actor(s) also somehow
manage to convince all of the good actors to become corrupt at a specific point of time”), the network’s own understanding of what the actual proportional vote is for which blocks are valid
should show that an issue is about to arise. If consensus looked like 51% vs 49%, there’s most likely a problem. if the voting was usually around 10% voting against consensus, to invert it
explicitly would require a +80% takeover of the Shyft Ring in a single block to hide that there was an attack.
21 For certain classes of users, the Shyft Bridge is a Trust assumption for healthy network operation.
Safe; protected from or not exposed to danger or risk; not Conservator; a person responsible for the repair and
now requires operation on the Shyft Network and the As the digital asset regulatory environment evolves,
secondary network to be modified, removing a singular the amount of national and regional rules will need
This is a strategy of long-term bookkeeping that ensures managed. Building the bridges to connect these regions
accessibility to assets past the point of last resort of together is the first step to bring Shyft’s benefits to
Shyft itself (i.e. certain assets can be spent under some the global market. To monitor such a system without
conditions during or after Shyft Network failure). The depleting the working capacity of Shyft Ring Validators,
networks that are used in a Safe asset context need not we’ve considered an external (relative to the Shyft Ring)
be of similar smart contract capability. This process only machine learning algorithm trained to detect fraudulent
requires contact parameters and metadata, such as a transactions and account behaviors.
for the delivery of said asset (e.g. from the physical Purpose
account in the case of digital asset.) The Shyft Conservator will operate as a Trust Anchor that
Trust Channels
between peers.
22 The main use case is when a consumer has a Trust Channel alignment through several Trust Anchor and is offered services from other members within the Trust Channel. From a TA/
service provider perspective, providing onboarding incentives is easier because the entity is already aware of the payment channels, insurance entities, etc. within the Trust Channel (i.e. no
redundant setting up of the channel or diligence conduct.)
Valuation; an estimation of something’s worth, especially period—the Integrated Exchange Valuation (IEV). When
one carried out by a professional appraiser. transactions are completed by parties on the Shyft
Financial exchange systems require threshold limits on determine reportability of the transaction, if there are
amounts transacted for a variety of reasons (e.g. transfer any Trust Anchors associated with the user’s account that
maximums, reporting thresholds, etc.) For example, define compliance protocols for transaction reporting,
should the value of a transfer exceed a threshold limit, and complete additional compliance procedures as
the transfer needs to be reported to a regulatory body. needed based on the involved Trust Anchor’s attested
The Reputational Merit Token (‘RMT’) is intended as a These unbanked individuals are designated ‘Level 0 KYC’
The RMT layer, which exists above the KYC layer on When remittance services become Trust Anchors to the
the Shyft blockchain, is intended to provide reputation Shyft blockchain, they are able to allocate RMT tokens to
data overtime for non-KYC’d participants and give them senders and receivers for every remittance transaction.
reputational identity and access to the KYC layer, allowing As receivers gain reputation tokens by receiving funds
them use of otherwise unavailable financial services. from KYC participants, they can gain trust and access to
Use Case
23 There is a decent amount of risk when trusting unbanked individuals generally. However, the current situation presents an almost implicit embargo against unbanked individuals. Shyft
enables self-policing, such that less risk-averse institutions would be comfortable offering services to less than ideal KYC’d individuals. As a result, unbanked individuals have greater access
to tiers of financial services currently unavailable to them.
2. Positive interactions between KYC’d users Also, when onboarding these new customers, institutions
Creditability; Applying plausibility, believability, or likelihood This also affects banked and existing customers as well.
that something can be credible, where regular evidence If an existing customer has a positive history overall but
is lacking, like identity and trust. Ability for someone or frequent negative interactions with a Trust Anchor or
something to be creditable. KYC’d users, other TAs in the network can monitor the
A sender with good reputation transacting with a receiver activity. Trust Anchors can also use this data to give notice
that may be insufficiently credible due to lack of KYC data to customers that may be at risk of not meeting financial
or ‘Level 0’ causes the receiver to gain some RMT. obligations (such as loans, credit lines, etc.)
Note: The phases below are subject to change as the majority of the development work will require collaboration with
ecosystem partners; the Shyft Network implementation may require additional time. Further details will be released as
development progresses.
Phase 1: Focus on security. - Operational Shyft Bridge architecture, accepting connections, verifying
requests to the mobile beta network.
- Shyft Ring validator node architecture beta testing.
- Shyft Ring validator node deployment and incentive program initiation.
- Shyft Envoy program initiated to integrate and enable other blockchain
attestation technologies.
- Shyft Conservator program initiated, focusing on first-order financial
insurance.
Phase 2: Focus on - Shyft Wings development schedule begins with the focus on scaling
the developer base, committing to the education potentials that Shyft
compatibility.
provides.
- Wallet architecture updated to include further compatibility with
ecosystem providers.
- Identity, Reputation, Federation scores further refined and attributed
to increase the community’s ability to reduce credit friction and enable
integration into traditional wealth management realms.
One of the first Dapps that we intend to introduce of physical gold that is actually stored in the vault.
on the Shyft Network is Alchemie, which is currently Because of this high leverage multiple, investing in “paper
in development by the blockchain production team gold” for longterm wealth preservation is a non-starter as
BlockUnity. it does not represent real gold ownership. On top of that,
Solution
Tradeable assets (e.g. stocks, real estate, gold, carbon
earn revenue, yet has storage fees, resulting in a net loss. The platform’s main objective is to create a stable and
value: the assets’ ability to move in more standardized or taking delivery of physical gold will require full KYC
and well-developed markets. Blockchain technology registration either at the point of purchase or at the point
The biggest challenge, however, lies in securing supply traditional gold markets by providing the stability of
chain and storage facilities that are both reliable, highly physical gold ownership together with the speed and ease
secure, and low-cost. In order to tackle these issues and of trading offered by traditional exchange-traded paper
the world’s most respected gold and precious metals BlockUnity provides an ability to turn what would
manufacturers and custodians. BlockUnity is also working otherwise be considered a stale asset into a productive
with a well-known international precious metal trading and useful asset that can be instantly mobilized globally
BU-Au tokens have all the technical attributes of a Entry Point and Asset Storage
represent real physical gold held on an allocated and BlockUnity will provide the initial onboarding for
insured basis in ISO-certified vaulting facilities in Canada interested users. In addition, the Alchemie platform
and other global regions users request. will provide the exchange between CAD/USD/BTC/
In addition to being able to trade on digital asset storage options: pool or allocated storage (the latter
exchanges, BU-Au Tokens can be used to facilitate easy being fully insured, identified, and stored assets in one
P2P investments, trading, or posted as insured collateral of BlockUnity’s supplier’s vaults.) Pool storage is still fully
for lending transactions on the blockchain. backed 1:1 by physical assets, however these are stored
The price of each BU-Au Token will be directly tethered to digitized assets. Users also have the option to redeem
the price of gold. This will offer stability to the token and their tokens and request delivery of the physical asset,
will become useful in hedging the volatility of other “un- provided they have accrued the equivalent of at least 1 kg
backed” digital assets. of BU-Au. In exchange for use of the platform, users pay
service fees.