Shyft Network: Alphanet.
The Shyft Network isn't hypothetical technology, it's already being built. Now, we’re calling on individuals, organizations, and companies to prove and verify identity credentials, ownership rights, and credibility between counterparties in real-time and at scale. Will you join us?Register Now
The Shyft Ecosystem
Shyft operates with the help of a few major types of users and institutional contributors.
01. Trust Anchors
Trust Anchors may include organizations, enterprises, institutions, public and private networks, or any other party who contribute to the network by attesting verifications.
Shyft enables any proof-of-sender rule set on the blockchain including conventional KYC, physical verification, or other compliance procedures.
Trust Anchors attest to the network and other participants that specific information about a given user has been verified. This formulates the basis for cumulative credibility.
02. Data Holders
These are the participating trust anchors who maintain control over data via private keys, to which only they have access, and can grant access to certain data upon network request. All actions regarding the transfer and approval of data is done with informed consent.
03. Data Users
These are the businesses, services and other network participants that neither hold nor verify data, but want to leverage the network’s ability to source data and identity verification for their prospective customers. When they request information from the network they pay a small fee to the data source and the network in exchange for the attested information.
These are network clients who run a copy of the network blockchain. Each node acts as a validator, running a single piece of software that connects to distributed peers, organizes validation efforts, and aides in recovery efforts in the case of a breach; all of these activities are incentivized by the network.
Network Architecture – Phase 1
The Shyft Block Explorer
Relational Merit Scoring (RMS)
Shyft Token (SHFT)
News & Articles
Shyft’s Privacy and Consent Framework
Shyft Network initiates a phased mainnet rollout and announces Byfrost, its revolutionary bridging technology
The power of Shyft’s attestation features
Recognizing the value of data
Introduction to Shyft
How Can Exchanges Gain Back Users’ Trust?
The challenges of "Banking the Unbanked"