The Evolution Of Digital Identity

Average rates for the project

Average
rating
Team
-
Vision
-
Product
-
Hype
-
Rating
- / 5
-
-
-
-
- / 5
-
-
-
-
- / 5
-
-
-
-
- / 5
-
-
-
-
- / 5
-
-
-
-
- / 5
-
-
-
-
- / 5

Xenchain ICO datesexport to calend


Whitelist
12.11.2018
12.11.2018
KYC
12.11.2018
12.11.2018
PreICO
12.11.2018
12.11.2018
PreSALE
12.11.2018
12.11.2018
ICO
12.11.2018
12.11.2018
12.11.2018
12.11.2018
12.11.2018
ICO
Aug. 1, 2018 — Aug. 15, 2018

Funding

Token
XEN
Hard cap
$ 15.000.000
Price on ICO, usd
0.16

About Xenchain

We at Xenchain have developed a global platform that runs on the Blockchain network and operates under the principle of smart contract that can gather, securely store and provide on-demand (with the permission of the data owner), PII data to consumers and users alike at a lower cost and in a seamless manner. We are experienced in managing KYC and user data access using our modern and high tech software solutions for text and facial recognition that can be deployed for user data validation.

Xenchain is set to introduce you to a global, end-to-end disruptive model of identity management that is solely powered by the Blockchain network. This new model is poised to provide a platform for secured identity verification, KYC enhancement and onboarding process on a timely intervention and a lower cost. Our solution removes the complexity of assess requirements associated with multiple websites and applications, and also the issues of user authentication. One of the key breaching points in cyber-attacks is usually through the Business Email Compromise (BEC). It is reported that over $5 billion has been stolen through BEC over a three year period from 2013 to 2016. In 2017 alone, over 200 companies have also been identified to have run the risk of being under BEC attacks by some cyber fraud syndicate. These figures indicate just how phishing attacks become more lucrative for cybercriminals.

With Xenchain, we deploy enhanced user authentication mechanism which includes super intelligent text identifiers, facial recognition and digital ID scanners to ensure user data are securely and legitimately gathered, protected and assessed.


Most important news for today

 

Recent articles