Shyft Network: Alphanet.
The Shyft Network isn't hypothetical technology, it's already being built. Now, we’re calling on individuals, organizations, and companies to prove and verify identity credentials, ownership rights, and credibility between counterparties in real-time and at scale. Will you join us?Register Now
The Shyft Ecosystem
Shyft operates with the help of a few major types of users and institutional contributors.
01. Trust Anchors
Trust Anchors may include organizations, enterprises, institutions, public and private networks, or any other party who contribute to the network by attesting verifications.
Shyft enables any proof-of-sender rule set on the blockchain including conventional KYC, physical verification, or other compliance procedures.
Trust Anchors attest to the network and other participants that specific information about a given user has been verified. This formulates the basis for cumulative credibility.
02. Data Holders
These are the participating trust anchors who maintain control over data via private keys, to which only they have access, and can grant access to certain data upon network request. All actions regarding the transfer and approval of data is done with informed consent.
03. Data Users
These are the businesses, services and other network participants that neither hold nor verify data, but want to leverage the network’s ability to source data and identity verification for their prospective customers. When they request information from the network they pay a small fee to the data source and the network in exchange for the attested information.
These are network clients who run a copy of the network blockchain. Each node acts as a validator, running a single piece of software that connects to distributed peers, organizes validation efforts, and aides in recovery efforts in the case of a breach; all of these activities are incentivized by the network.
Network Architecture – Phase 1
The Shyft Block Explorer
Relational Merit Scoring (RMS)
Shyft Token (SHFT)
News & Articles
CipherTrace and Shyft Partner to Address the New FATF Virtual Currency Travel Rule
CipherTrace, Shyft Unveil ID Protecting Solution to FATF Crypto Guidance
Partnership series: Harmony X Shyft Network
G20 Gives Official Support to FATF Crypto-Regulation Guidelines
FATF's Crypto Guidelines Could Pose Serious Financial Privacy Issues: OECD Blockchain Advisor
FATF Recommendation 16 Could Send Bitcoin “Back To The Dark Ages”
Shyft’s Privacy and Consent Framework
Shyft Network initiates a phased mainnet rollout and announces Byfrost, its revolutionary bridging technology
The power of Shyft’s attestation features
Recognizing the value of data