secret–thecommunity application whitepaper
TRANSCRIPT
Secret reserves all rights for the final explanation. Any corporation or individual
should never use any information in this paper for commercial purposes without
authorization.
《SECRET – THE COMMUNITY》
APPLICATION
WHITE PAPER
Contents
Preface......................................................................................................................... 4
Problems to be solved.............................................................................................6
1. The Pain of Community – Privacy Leakage..........................................6
2. Social problems caused by the community weakening.................... 6
3. Pseudointelligent robot..............................................................................7
4. Slow-growing smart contract system.....................................................7
Ⅰ. SECRET Community............................................................................................9
1. Privacy Protection.........................................................................................9
2. Content Creation and Sharing................................................................10
Ⅱ. SECRET Community Economy.......................................................................11
1. Community Value.......................................................................................11
2. Community Ecosystem............................................................................. 11
3. Community Application........................................................................... 11
4. Open Community Interface.....................................................................12
Ⅲ. SECRET AI............................................................................................................13
Ⅳ. Secret Ecosystem Applications..................................................................... 15
1. Ecosystem applications..................................................................... 15
2. Open Application Interfaces................................................................... 34
3. Secret Vision................................................................................................ 35
Ⅴ. SECRET Win – Win Ecosystem..................................................................... 36
1. Mutually Beneficial Ecosystem............................................................... 36
2. The hard currency of ecosystem-SIE..................................................... 37
Ⅵ. SIEN – A Data Chain Network for SECRET................................................ 38
1. Multi–Chain..................................................................................................38
2. Consensus Mechanism............................................................................. 40
3. Explanation of SIEN’s Developing Plan.............................................41
Ⅶ. The Application Scenarios of SIEN...................................................................42
1. AI hash Sharing...........................................................................................42
2. Content Creation and Sharing................................................................43
3. SECRET + SIEN+DEFI.................................................................................44
4. SIEN behind SECRET..................................................................................45
5. Total Involvement, Node Evolution........................................................46
6. Secret on SIEN.............................................................................................48
Ⅷ. Secret Public Chain..................................................................................................49
Ⅸ. Relationship................................................................................................................51
X. SIE Issuance Algorithm.............................................................................................52
1. Holding hash...............................................................................................52
1.1 Holding Reward.........................................................................................52
1.2 Consumption hash.................................................................................53
1.3 SIE hash.......................................................................................................53
1.4 Deposit hash...............................................................................................54
2. Invitation Hash............................................................................................54
2.1 Invitation candy calculation..................................................................55
3. DeFi Fund................................................................................................. . .56
3.1 Key algorithm............................................................................................56
Preface
Over the past two decades, the sustained development of
information and computer technology has put on a succession of
technological revolutions on this planet, changing the destiny of
humanity.
At present, artificial intelligence and DeFi are undoubtedly the two
most dazzling stars in human society.
Getting into all parts of our life, from AlphaGo winning human
player in the Go game, to the development of autonomous driving, the
artificial intelligence in the intelligent technology sector is stepping into
our vision and our daily life out of the academic circle.
In the economic and financial sector, all centralized financial system
in the world has been losing their trust since the collapse of the Bretton
Woods System. Central Banks have been printing money without
restraint, and the general public has had to accept inflation. The rapid
development of technology completely exposed these contradictions,
and DeFi emerges.
DeFi is a decentralized application based on Ethereum smart
contract, also known as DApps. The global locked positions of DeFi has
exceeded 14 billion since its appearance, with a maximum increase of
more than 80 times. It is just the first step to break the traditional
financial restrictions, and the disruptive wave sweeping the world's
finance has just begun!
If we look back a little bit, maybe only a few years ago, the hottest
discussions in science and technology were about community networks
and 5G technology. Although the popularity of community networks has
declined in the past two years, it has become the air for our daily life. The
5G technology application is gradually spreading to the world. People
may witness the huge changes the 5G technology brings to the world
soon.
And now, if we think out of the box and combine AI with 5G
technology, community network, and DeFi, we may discover that the
value of the combination of the four is far more than the sum of them.
The AI built on community networks exerts more innovations while the
5G technology working as underlying supporting technology boosts
vitality for the network; DeFi will create more economic value based on
the other three and derive broader domains.
In this paper, we would elaborate on how SECRET integrates them,
with the community network as transmission tool, with continuously
evolving AI as core part and with 5G technology as the underlying data
and task distribution platform, to create and integrate more projects in
DeFi, and deeply generate impressive power like nuclear fusion.
Problems to be solved
This paper analyzes these problems in four aspects:
1. The Pain of Community – Privacy Leakage
With the development of the community network, people raise
their awareness of privacy protection. However, the nature of the
community network is a communication whose manifestation is the total
or limited disclosure of information.
Whether Facebook or Twitter, incidents of user information leakage
occur from time to time. Such privacy breaches caused by the service
provider's vulnerability or the user's own negligence have caused great
losses.
How to provide maximum protection for user privacy is the first
problem to be solved in this paper.
2. Social problems caused by the community weakening
A large portion of today’s social problems, political problems, and
economic problems are caused by the community weakening, even we
have tens of thousands of small groups with the spread of community
networks all over the world, we feel lonelier and more miserable. For
nearly two centuries, so many intimate communities are weakening or
even collapsing, triggering dozens of political unrest and economic
crisis.
The second problem to be solved is how to subtly balance the user
and the community network provider, rebuild the community, and
reboot the human nature in a society of community weakening and
interior difference.
3. Pseudointelligent robot
More and more community network has made the function or
interface of Bot (chatbot) available to help with user ’ s automated
problems. But at present, the so-called AI involvement is not beyond the
operations such as auto-reply and smart assistant.
Here comes the third problem to be discussed and solved. How to
make Bot truly intelligent? It might be one of the answers that AI would
evolve with the use of the community network.
4. Slow-growing smart contract system
The birth of blockchain has opened a decentralized gap, but the
gap is still small.
Bitcoin started as a decentralized asset, not a financial system, but
one that started to be structured because Ethereum provided smart
contracts. Creating a decentralized financial world requires more
powerful tools to accommodate higher transaction frequencies and
more complex intelligent contracts.
The transaction frequency of Ethereum is only 12 to 45 transactions
per second, which is far from the requirements of the global financial
system. Given the rapid development of artificial intelligence in the
financial industry, the smart contract on the blockchain will inevitably use
very sophisticated algorithms such as neural networks and deep learning.
However, the current intelligent contract execution mode of Ethereum is
far from enough.
Ⅰ. SECRET Community
Secret is a community chatting tool that protects user privacy via
peer-to-peer encryption technology. The user ’s chats are invisible to
others, and the server won’t store any plaintext content. Without explicit
authorization from users, no one includes the server has the right to view
the chats.
Secret will create a more intelligent and humanized Bot (chatbot)
with AI technology and big-data training and help users solve more
problems. Furthermore, users can participate in the Bot training through
the intelligent training mode. Bots can learn communication styles or
even the thinking patterns and personalities in the training process,
making the chatbot more intelligent and suitable for users.
1. Privacy Protection
Among the three modes, common-mode secludes the chatting
contents from any other third party (including the service provider) via
peer-to-peer encryption technology and undoubtedly maximizes the
protection of user’s privacy.
The other two modes dismiss peer-to-peer encryption as Bot is
required to get involved and read the chatting contents. The following
measures are adopted to protect privacy under the two models:
• We keep users informed of their environments all the time, such
as the chatting mode, the initiation or dismissing of encryption, and the
participation of Bot, allowing them to decide what kind of information
they would disclose under different chatting models.
• Even though peer-to-peer encryption is not enabled, the data
flow is encrypted between the chatting parties and Bot, which means the
intercepted messages cannot be decrypted without getting the secret
key from chatting parties or Bot.
• Bot disposes of the contents in real-time during its learning
process. It saves desensitizing feature information for its learning and
training instead of permanently storing original texts.
• In chatting, Bot owns a temporary secret key that will be
destroyed once the dialogue is ended.
2. Content Creation and Sharing
Besides the above chatting modes, we will further extend the
function and capability in SECRET.
In future versions, we will provide more functions such as content
creation and knowledge sharing to attract more users and accumulate
more valuable data that are of great significance to the AI improvement.
These functions will derive more possibilities in the Secret
ecosystem and create greater values.
Ⅱ. SECRET Community Economy
It’s pretty clear that the community economy is the trend of future
economy. In the eye of the storm, Secret, the community-based
application platform, has developed all kinds of applications based on
the community, forming a unique Secret ecosystem.
1. Community Value
Community is the foundation and the core value of the Secret. In
Secret, users can create their communities secretly. Without member
limits, it can be a community for two or thousands of people.
Communities created in it are fully protected, and all activities, chats,
sharing, and transactions are encrypted.
2. Community Ecosystem
Community is the user. The community ecosystem is the
user-based Secret ecosystem taking user experience as the core. It could
be a private space for two people, also could be a family, a group of
friends, a company, a game, a project, a shopping website, a transaction
platform, or even a fan's kingdom of idols. You can create any
community as you want. Secret can provide application tools for any
community. All users have to do is add corresponding tools to their
communities.
3. Community Application
The secret ecosystem has a mass of applications, and some of the
more typical apps are Payment, Assembly, Mall, Transaction, Headline,
Table, Game, and Chatbot.
Besides basic applications, Secret has many secret apps to be
explored. Furthermore, third-party developers will continuously add and
improve more applications for the community to use. All applications in
Secret are not isolated but mutually compatible and facilitated.
4. Open Community Interface
As an inclusive platform, Secret will open interfaces to third-party
developers who meet the requirements under the premise of
confidentiality, supporting them in their efforts to provide users with
various applications, further improving secret features to help us nurture
rich Secret culture and achieve the great vision that Secret changes the
community while the community changes the world.
It will accumulate more valuable data for the platform and
contribute to boosting the development and empowerment of Secret
communities. All of these would be tightly bound with the DeFi public
chain mentioned in the following passages to generate greater values.
Ⅲ. SECRET AI
AI is getting feverish popularity around the world in the era of big
data. However, users are no more than a consumer for those
corporations of intelligent products. Secret wants to change this
situation so that the user is no more than a pure consumer but a
steersman mastering everything about AI in the era of intelligence.
For this purpose, Secret has made preparations, plans, and
development researches, and created an AI that users can decide where
to go. It can learn and evolve independently, and you can also train it to
become the chatbot you want, complete tasks that are impossible for
users, and maximize the benefits.
Users can create AI roles that belong to the community in Secret.
These roles have their unique personalities and capabilities. The new role
will be in role stores of Secret and available for all users.
With the development of big data and AI, and the implementation
of hash sharing, the personal representation data could be stored and
run on a 5G internet platform. With the user ’ s authorization and
technology such as big data, AI and encryption technology, the data
could be permanently stored online without being tampered. In the
future, when AI is strong and intelligent enough, it will make AI roles of
your personality with these specific data and hash. All of your memories
and relationships will exist as you wish.
We know that AI technology at present is not sufficient to help with
human life. Though AI is applied in some assistant work, including voice
recognition, auto-translation, face recognition, and even medical
diagnosis, investment analysis, furthermore, AlphaGo has defeated
humans in the Go game, AI is incapable of combining with the
complicated social life. The technological advancement consumes
massive hash, urging those technological giants to establish their
supercomputing centers. As our AI applications are supported by the
community and 5G platform, we will construct our supercomputing
center by sharing the hash to bring profits to users.
Ⅳ. Secret Ecosystem Applications
At present, Secret ecosystem largely consists of toolkits,community
ecosystems, SIE applications,Secret House, Secret Meeting and DeFi in-
telligent cloud.
1. Ecosystem applications
At present, Secret ecosystem largely consists of toolkits, community
ecosystems, and SIE applications.
(1)Toolkit
The toolkit includes four categories: socializing, commerce,
management, and technology.
Social Toolkit
① Encrypted Chat
When using Secret, the user information will be encrypted
end-to-end to ensure the security and privacy of all chat messages.
②Super Group
Users can build their own Super Groups for chat socializing and
document sharing.
③Headline
Users can post headlines in the community and share them with
other non-community users.
④Community
It’s the community plaza. Users can publish content to share their
life stories.
⑤ Voice & Video Conference
Secret supports multiperson mobile cloud video conference
software and provides users with HD multiperson video and voice calls,
screen sharing, conference booking management, and other services on
mobiles and PCs.
⑥Live Streaming
Secret supports community live streaming, and only the community
members can get access to it.
⑦Radio
Secret will support community radios, allowing users to share more
quality sound works and get tipping rewards.
Commercial Toolkit
①Online and Offline Merchants
Many merchants have already settled in Secret. Users can receive
consumption hash by spending SIE in merchant stores and then
participate in the issuance of dividends to get consumption bonuses.
Open the Secret map, you can find offline merchant addresses. In open
platform applications, you will see various products sold by online
merchants.
②Sales Display
Merchants upload quality products and timely monitor the entire
product sales process through powerful back-stage management
functions while supporting B2C and C2C business models.
③Payment
Users can use Secret to pay for various online and offline products.
④OTC(Over The Counter)
Users can purchase all kinds of virtual assets with the OTC
application. They can buy and sell in real-time through the confirmation
by both parties.
⑤Wallet
Users can add mainstream coins such as BTC, ETH, and USDT to
their wallets or transfer them to any wallet. Furthermore, the open
platform allows third parties to import their virtual currencies to create
their own wallets.
⑥Red Packet
If you select the positioning feature of the red packet, users can
only receive it at the designated location. If you enable its AR feature,
users need to scan the specific AR items to get it. You can also set it as an
image red packet, and users need to find the designated image to open
it.
⑦Coin Exchange
Users can use any virtual asset to exchange assets in an encrypted
chat window. If everyone agrees on the value, the exchange can be all
accomplished.
⑧Digital Currency Trading Platform
The digital currency trading platform of Secret supports exchange
transactions of mainstream coins such as BTC, ETH, USDT, and SIE.
Managerial Toolkit
①Community Relations
Any third-party application can distribute rewards and discounts by
inviting users to join the community.
②Social Relationship Management
Users use Secret to manage their key user relationships.
③Task Management System
Secret will roll out a task management platform to help all teams
and individuals manage and view tasks whenever and wherever they can.
④Remote Working System
Secret has created an all-direction integrative enterprise
cooperation management platform covering online documentation,
remote punch-in, voice and video conference, project management,
task management, and schedule management.
Technological Toolkit
①Chat Agent
Users can set up a chatbot. Through continuous training, the
chatbot will chat with your friend as you do.
②Intelligent Customer Service Robot
Users can access the open platform API to make the robot their
customer service to answer all questions of users.
③Robot Factory
Users can set up a community-only AI robot designed for the
community to serve community users.
(2)Community Ecosystem
The community ecosystem consists of Consumption Community,
Interest Community, and Working Community.
Consumption Community increases the circulation value of SIE.
Consumption applications will be introduced to the Secret
community. While using a series of tools, you can use Secret as a
payment method to increase the circulation value of SIE.
①”Super Merchant” Community App
Super Merchant consists of online merchants and offline
merchants.
online Merchants: they provide various products for sale on Super
Merchant;
offline Merchants: they manage their customers through the
community and support offline store consumption. Customers who pay
by SIE can receive consumption hash and then participate in the issuance
of dividends to get consumption bonuses.
②N.ONE Community: SIE Candy Community promotes Secret’s
native currency.
③Bounty Hunter Community: merchants promote products and
issue rewards via the task system.
④Game Application
The present game introduced to Secret includes Snake, Bull Bull,
and Red Packet Link.
⑤US Stock Community
Secret is about to roll out the US Stock Community, which has the
advantages of flexible T+0 trading, various transaction type, and
unrestricted account establishment.
Destruction promotes the scarcity value of SIE
Destruction applications will be introduced to the Secret
community. When users pay by Wechat and Alipay, the rebate part of SIE
is destroyed to promote its scarcity value.
①Guangying Video: a short video sharing platform where content
creates value, and you can get benefits from watching and publishing
videos.
②Expansion Mall: a shopping discount platform where users can
participate in discount activities for various products, and they can get
hash and rebates when placing orders.
③Moreteam: a new mobile social distribution e-commerce app
platform where each consumer can be a retailer.
Interest Community
Interests and hobbies lead the social trends. The Secret community
has rolled out video socializing, a new dating platform for people. It
makes socializing more intimate and life more colorful.
①Showtime Community Application
Showtime community is a large social application settled in Secret.
It has four ecosystems: the dating platform ShowMe, the project display
ShowProject, the live commerce ShowLive and the video entertainment
ShowFun.
②News Community
Training communities are emerging, such as Chinese blockchain
headlines, Korean blockchain headlines, and English learning
communities.
Working Community
Secret will roll out two working applications to make perfect use of
the community and maximize benefits.
① Task Management Community: every project has a community
such as the App development community, construction planning
community, and milk tea franchise community.
②Folder Community: it makes your work more efficient. Files are
transmitted at high speed, downloaded online and saved offline. Each
file is encrypted before being transmitted.
(3)SIE Application
Secret will strive to create a blockchain system that can support the
decentralized financial world. SIE is crucial in Secret ’ s DeFi world. In
addition to providing payment and charging interfaces for tool functions
and community ecosystem applications, it will also work as transaction
fees and mortgage assets for various applications in the DeFi system or
as gas fees for the execution of the DeFi smart contract, which will
dramatically improve the frequency of SIE use and increase SIE value.
①Function Charging
It supports function applications with payment requirements and
provides SIE charging interfaces for third parties.
②Mall Payment
It provides payment interfaces for the mall, enabling users to pay
SIE directly. It’s quick and easy.
③Community Ecosystem Payment
It offers payment interfaces to all community ecosystems and
promotes the positive development of the community ecosystem.
④Transaction Fee
Any transaction fee and gas fee can be paid by SIE. Furthermore,
the hashrate and discount deductions are calculated directly without
multiple conversions.
(4) Secret House
Secret House is a within-community application characterized by
instant audio social communication. Each community member can create
a room, and the room type can be public, social or private.
①The Secret House mode requires both parties to interact instantly.
②The topic-based round table discussion of Secret House ensures
its content.
③Secret House allows everyone to be a listener as well as a
speaker, reflecting its interactivity.
As mentioned above, the focus of Secret House’s product design
is an instant audio interaction.
How to use Secret House?
Users in the Secret House can be creators, speakers or listeners.
①Creator: can create a room with a topic, invite members to
chat together, and listeners can enter the room to listen; the creator
is also responsible for determining the topic and invitee, directing
the topic and keeping the order in the room.
②Speaker: can participate in the topic discussion and be able to
switch their own voice mode at any time. (Away/Speak/Press/Mute).
③Listener: can listen to members’ topic discussions, and be
able to raise their hands to apply for membership.
Function Description
Users can create different scenarios for chatting according to their
different needs.
①Create a Secret House chat
After entering the community application, each user can select
the type to create a room.
Open Secret House (Open roundtable discussion): it’s visible
and available to all users (open to all community members who have
Secret House).
Private Secret House (Invitation-only room): it’s visible to all
users in the room, and can be added by sending an invitation from
the creator to other members, rather than by searching.
②Search to join the room
All open Secret House can be searched and joined.
③Room permissions
Listener: can view the room information and member list, but cannot
speak.
Member: can view the room information and member list, and speak.
After all members exit the Secret House, the room will be closed auto-
matically.
In addition to the room creator, other members enter the Secret House
as listeners. The creator enters the Secret House as a member. If members and
listeners exit and re-enter the Secret House, they will be reset as listeners (ex-
cept the creator).
Listeners can apply to become Secret House members, and all members
can review the application. The creator can demote a member to a listener.
④Voice pattern
Press: add a press button, click it to speak.
Free: the microphone is always on.
Community Secret House: it’s visible to all community members, and
they can enter or exit it as they want. Non-community members cannot see
and add it, and searching is not supported. After selecting the type, you can en-
ter a room subject. Each user can only have one Secret House at a time.
Application Scenarios
Three scenarios: open round table discussion, community member chatting,
and invitation-only room.
① Roundtable discussion: the room is open to everyone outside (it’s avail-
able to all community members who have Secret House), and even
industrial elite will share some information on it.
② Community member: only users within the community can join the room.
It’s a chat between acquaintances and semi-acquaintances, which is
equivalent to a club in real world. It’s more like a group meeting in a living room/
café/college dormitory.
③ Invitation-only room: only users invited by the creator can join the
room.
Advantages
①Real speaker
People are hungry to hear the real voice of the people they admire and
build a real relationship with them. But the real media will always evolve into
channels with management and system. Especially as its importance and value in-
crease, it will be more controlled and managed.
The voice of a celebrity or anyone else will appear extremely real in a live,
unrecorded, and conversation-like mode. However, it’s irresistible to hear the
instant and real voice of the people or celebrities you followed in more private
media.
comfortably or establish a path that allows others to participate in any social
media platform. For all social products, it is a huge challenge for most users to
generate content instead of inactive spectators.
③Closely meet a salon where celebrities speak and talk with people in their
social network
Celebrity +scarcity: who doesn’t want to be in the same room with the
respected and get the sharing and fortune code? Secret has many hotshots. The
more scarcity they are, the more heated the discussion will be. The topic they
talked about can satisfy a beginner’s curiosity. People are easily attracted to
conversations when they are in a group related to themselves.
Speakers: feel accomplished when their talks with friends are listened to
carefully by others.
②Inclusive voice
It is a great opportunity to find a way to enable everyone to participate in
comfortably or establish a path that allows others to participate in any social
media platform. For all social products, it is a huge challenge for most users to
generate content instead of inactive spectators.
③Closely meet a salon where celebrities speak and talk with people in their
social network
Celebrity +scarcity: who doesn’t want to be in the same room with the
respected and get the sharing and fortune code? Secret has many hotshots. The
more scarcity they are, the more heated the discussion will be. The topic they
talked about can satisfy a beginner’s curiosity. People are easily attracted to
conversations when they are in a group related to themselves.
Speakers: feel accomplished when their talks with friends are listened to care-
fully by others.
(2)Secret Meeting
Secret Meeting is a secure, stable, high-definition and smooth video confer-
ence. It supports big meetings and is always free. Attendees can have meetings to-
gether anytime and anywhere through mobile phones, iPads, computers and other
devices.
Secret Meeting has remarkable HD audio and video performance, abundant
meeting collaboration capabilities, and solid meeting security. It is characterized by
free-use, on-demand purchase, super cost-effective, big meeting covered, end-to-
end encryption, and easy-to-use, and a meeting that everyone can use.
①Multiparty voice and video conference: remote camera + computer or mo-
bile phone screen.
②All-integrated: single + multiple, voice + video network + phone call.
③Multi-platform: mobile phone, computer, iPad, Android, iOS, Mac, Windows.
④The whole process: creates meeting groups and periodic meetings before/
during/after the meeting.
Functions
①High-definition and smooth voice and video, limited free
HD display, stable and smooth, and various audio technologies to achieve
pure voice synchronization; high-fidelity voice transmission, allowing you to be on
the scene, like a face-to-face meeting.
②Various Communication
Various permissions, chat types such as group chats, private chats and raise
hand speak, and multiple communication channels such as text, voice and video
make the instant interactive communication colorful.
③Meeting anytime, anywhere, flexible switching of voice/video
Realize the full platform operation of Mac, Windows, iOS, Android, iPad,
seamless switching between different platforms, allowing the meeting to break free
from device restrictions and attend in real time wherever you want.
④Diversified conference management functions to ensure efficient meeting
communication
Multilevel conference management permissions, meeting recording, meeting
roll call, raise hand speak, speaker focused, top attendees and other online interac-
tive functions make online meetings like on-site meetings.
Advantages
①An agenda can be automatically created when booking meetings, so you
won’t miss important meetings
The convener can reserve the meeting time in advance, and synchronize the
agenda to all attendees. It will automatically remind you and support a one-click
video conference.
②Extremely secure meeting guarantee to ensure an orderly meeting
A variety of security management functions, such as Secret conference, mute
all and lock conference are used to ensure that the entire meeting is safe,
controllable and orderly.
③Quick location of designated conference rooms, a variety of ways to attend
Attendees can quickly locate the designated meeting room and participate in
the meeting with one click through various methods such as links, text messages,
joining passwords, and meeting cards.
Application Scenarios
①Project Meeting: initiate a video conference with one click, making
communication within the team simple and convenient.
②Enterprise Training: a novel video conference instantly displays attendee
pictures, just like face-to-face communication.
③Remote Video: break time and space limits, improve work efficiency as on-
site meetings do.
(3)DeFi Intelligent Cloud
Secret DeFi Intelligent Cloud (hereinafter referred to as Intelligent Cloud) is an
integrated platform that includes Secret social users, DeFi applications, intelligent
recommendations, and registered merchants and project leaders.
For merchants:
The Secret community has already offered a business platform to enormous
merchants and project leaders. And now, with the help of big data, Secret
blockchain and its unique intelligent algorithm system, Secret Intelligent Cloud will
integrate more powerful features and applications, creating more opportunities for
merchants and project leaders.
Merchants and project leaders in Secret can apply for the Secret Intelligent
Cloud service. After the merchant submits the application, users can use SIE to vote
Yes or No. Unlike the original community, the Secret Intelligent Cloud service
enables merchants to expand their service from community users to all Secret
users.
The system will generate an intelligent robot, helping the merchant to make
intelligent promotion. Also, the merchant products or projects can be
decentralized and financialized. The merchant can sell products or create a
financial service brand to boost business.
As the driving force of modern society, technology and finance work together
on Secret Intelligent Cloud, creating more value for all Secret merchants.
Several advantages for merchants to use Secret Cloud:
①Serve more users. Secret will help merchants find more targeted users.
All users will be on the Secret cloud platform. When a merchant needs to
make a product or project promotion, the system will match appropriate users
based on big data and intelligent algorithm analysis and make intelligent
recommendations, helping identify targeted users.
②Intelligent robots promote sales. The more training the intelligent robot get
from merchants and their marketers, the more intelligent it will be.
24-hour online sales can help merchants provide quality services for users,
and intelligent robots are definitely the best customer service and sales. If
merchants train the intelligent robot based on the product features and project
requirements and increase its intelligence, they will get an efficient, quality, and 24-
hour online senior customer service to maximize benefits
③Decentralization Financialized. If the merchant has some business
experience on the Secret cloud platform and gets enough votes from SIE holders, it
can be decentralized and financialized.
Merchant decentralization and financialization mean a lot. First, the merchant
products or projects can be circulated on all Secret eco-chains in a free and
decentralized way, creating more opportunities and directions. Second, it creates a
bottom-up, decentralized, review-free, lowcost, automatic, and counterparty-risk-
free Secret financial system, allowing merchants to get more benefits in a more
secure transaction environment.
For users:
Social encryption is the core of Secret. Unlike chat encryption, on the Secret
cloud platform, users can encrypt their preferences and demands for privacy
protection, or disclose them to the public for better services.
Protecting user privacy is Secret’s mission and responsibility. Secret
Intelligent Cloud will understand user preferences based on their settings. Through
analyzing data, the intelligent robot will push the best products and services to
users. Besides merchant products on Secret Cloud, it includes eternal products and
services.
What Secret cloud brings to users is only a better shopping experience. It will
also share more technology dividends with users. There are many invisible network
connections between Secret users. Secret intelligent cloud will use these
connections to share technology dividends. In other words, users just need to
promote the freeware Secret, and the Secret intelligent cloud can help users create
value.
If any user you connect has made consumption in any merchants or projects,
or participated in DeFi project investments, or just viewed advertisements both
inside and outside Secret, it will generate performance. You can enjoy the
technology dividends and get economic value.
Sharing Rules:
①When merchants apply for Secret Intelligent Cloud service, a part of their
income needs to be set as "performance" so that the system can distribute rewards.
The merchant participation will further enhance the business and finance
ecosystem of Secret intelligent cloud, but its financial rules and value creation
requires some economic cost. The “performance” set by merchants is not just a
complement of economic basis but rather an incentive. If users make more
consumption, merchants will get higher profits, and the system will distribute more
rewards. Healthy competition and economic growth will push the business and fi-
nancial ecosystem of Secret Intelligent Cloud to prosperity.
②Any consumption generated by users through the Secret Intelligent Cloud,
including external product consumptions, DeFi investments, and advertisement
views, will create performance, which is accumulated based on the Secret user
network.
The intelligent robot will recommend appropriate products for users. For ex-
ample, fitness enthusiast A purchases a treadmill through the intelligent cloud.
When A views an advertisement while running and makes a DeFi project invest-
ment under the guidance of the advertisement, then A’s performance is the sum
of the three.
③If users participate in any project recommended by the Secret cloud, they
can get community performance rewards. How much you can get depend on your
engagement. When the accumulative rewards exceed $100, users can convert
them into SIE. The system will use these dollars to buy SIE in the market and de-
stroy 1% of them as the handling fee.
For example, investor B invests in a global transportation project recom-
mended by the Secret intelligent cloud. B invests 80% of the project and gets the
corresponding community performance rewards. The investment brings B $
100,000. After the system destroyed 1% as the handling fee, B can convert the re-
maining into SIE and hold them for better profits.
Community Management:
The entire Secret Intelligent Cloud will adopt the community management
model in DeFi applications, which means all management decisions will be voted
by SIE holders. For example:
①When a merchant applies for the intelligent cloud service, the system will
initiate a vote. If the merchant wins 67% votes and the total votes exceed 100,000,
the intelligent cloud service will be available.
②When a merchant applies for product or project financialization, the
system will initiate a vote. If the merchant wins 67% votes and the total votes
exceed 100,000, DeFi financial tools are available for merchants, such as issuance,
transaction, lending, and other DeFi applications.
Intelligent Cloud Robot:
Every Secret user has a default friend, the Intelligent Cloud. It’s the portal
to Secret intelligent cloud. It can chat with users and answer all questions about
the Secret and intelligent cloud. Or it can call robots trained by merchants in the
intelligent cloud to chat with users and explain the specific projects and
products. The intelligent robot can also initiate a vote to help users participate in
relevant community management, and recommend some product updates or
important news to users.
The intelligent cloud robot is a bridge between users and the Secret
Intelligent Cloud so that users can quickly and efficiently integrate into the
Secret Intelligent Cloud project and community management, and make their
difference.
2. Open Application Interfaces
All applications in Secret are not isolated but mutual, compatible,
and facilitated. Users can add many relevant applications in a community and
provide community members with more comprehensive and better services.
The secret ecosystem has a large number of applications. Besides basic
applications, there are many Secret applications to be explored.
Furthermore, as an inclusive platform, Secret will open interfaces to third-
party developers who meet the requirements under the premise of confidential-
ity, supporting them in their efforts to provide users with various applications
to nurture rich Secret culture and build the Secret community ecosystem.
3. Secret Vision
Humans get together for the community. In the past, we 've survived vari-
ous species attacks to create a splendid civilization. The vision of Secret is to
build more significant communities and create a more splendid human civiliza-
tion.
Based on the encrypted community, through typical applications such as
Payment, Assembly, Mall, Transaction, Headline, Table, Game and Chatbot and
more open source applications from the third party, Secret allows users to re-
trieve their Secret communities, making the community relationship more inti-
mate, the community power stronger and humans better.
Ⅴ. SECRET Win – Win Ecosystem
Taking Ethereum as the main body, we introduce the concept of the
smart contract:
• Recording and operating on the data chain ensure the traceability
and tamper- resistance of the smart contract.
• Recording the operation data on the data chain, making its
running process and result traceable and tamper-resistant.
• The programmability of the smart contract can be used to
describe complicated regulations, making it possible to develop diverse
applications on the data chain.
Data chain and smart contracts make the transparent stake proof
possible without the intervention of centralized authorized institutions.
1. Mutually Beneficial Ecosystem
Secret is committed to creating a win-win ecosystem for all
participants to make profits. With data chain technology, we are building
a stake proof system where every participant in the SECRET ecosystem
benefits from its evolution.
The data chain technology ensures all the participants to involve,
witness, and benefit from the construction and evolution of the
ecosystem in a transparent and open environment. Its features
guarantee that the rules are unable to be altered, and the data cannot be
tampered with by anyone for unreasonable benefits.
Following is a list of some feasible income sources:
• AI reservation
• Knowledge pricing
• Paying for intelligent advertising totally different from Internet
ads searching
• The consumption of consciousness extension
• Public chain GasFee
• Outer ecosystem circulation and application created based on
core applications
2. The hard currency of ecosystem-SIE
SIE (Social Intelligent Evolution) is a token issued by SECRET and the
equity proof of the ecosystem.
In the beginning, we issued a total amount of 3 billion SIE via the
Ethereum smart contract. After that, we will build our data chain network
and provide token holders with corresponding solutions and tools so
that they can transfer SIEs to the data chain network created by Secret.
Except for taking the management of SIE circulation, the self-built public
chain handles more functions described in detail in the next chapter.
Ⅵ. SIEN – A Data Chain Network for SECRET
We will build a data chain network SIEN (Social Intelligent Evolution
Network) to carry the circulation of SIE Token. Besides, SIEN handles
other functions, including the storage of user data from Secret chat,
computing service, sharing services of AI hash, and even supporting
other distributed applications with storage and hash.
Furthermore, Secret will integrate SIEN data chain network and
DeFi to roll out a blockchain system that supports decentralization,
empowering SIEN with a decentralized smart contract system. It
combines the DeFi public chain with the SIEN ecosystem, enabling more
general users to participate in establishing a data chain network, creating
value, and building an ecological world for themselves.
1. Multi–Chain
SIEN network is a multi-chain system consisting of the main chain
and several side chains.
As the central system for all side chains, the main chain bears the
accounting system in SIEN, provides the core data of side chains, and
verifies the certificate and cross-chain messaging.
In principle, each side chain handles a specific type of problem. For
example, there is a side chain in charge of storage (it can be a more
specified storage service, such as storing small data key or relational
data). Also, there is another side chain providing neural network
computation for Bot training in Secret, and there can be a side chain
practicing content creation and knowledge sharing in Secret network.
SIEN offers the basic constructing standard and tools for side
chains abiding by related regulation to join in and to create their own
value.
2. Consensus Mechanism
At present, the mainstream digital currency takes PoW (Proof of
Work) as the consensus mechanism, which is a guarantee of participation
justification. However, PoW brings a negative impact on the mechanism
that the hash competition causes a huge waste of computing resources
and energy. Furthermore, it also leads to the hash integration to a few
big mining pools, which might take control of the whole network. Also,
the features of the PoW limit its processing capacity to the network. Take
Bitcoin as an example, its processing capacity is about 10 TPS, well short
of handling those applications with high transaction frequency, such as
small payment.
The PoS (Proof of Stake) and its derivative DPoS (Delegate Proof of
Stake) has, to some extent, solved the low efficiency and waste in PoW.
However, it is controversial to prove equity through stakeholding. How
to issue initial share? How to prevent strong stockholders from hostile
behaviors? These are the inevitable questions for the PoS mechanism to
answer.
We designed SIEN ’ s consensus mechanism by successfully
integrating edges from both PoW and DPoS. PoW is adopted on the
main chain while the side chains select their own consensus mechanism.
That is, the side chain constructor could select PoW or DPoS as a
consensus mechanism concerning what task that side chain is
processing.
Security and justice are the basis we bear in mind, and PoW on the
main chain ensures a secure and justified network. Besides, as the main
chain processes monotonic problems with a low frequency, its relatively
frail processing capacity is not a bottleneck for the system. The free
selection of consensus mechanisms on the side chain provides flexibility
to different tasks. It is a vivid metaphor that the side chain is like a
singular bank practicing massive services every day (such as inner-bank
transfer), and DPoS is an ideal choice for settlement as problems from
the inner settlement is with slim possibility and can be digested
internally, while the main chain is like the clearing agencies between
banks processing settlement regularly. Though PoW runs slowly, it is
safer and more credible. Even the main chain + sidechain mode is
adopted, SIE guarantees a quasi-real-time cross-chain transaction. This is
because the mutually recognized side chains will set a specialized hot
wallet equivalent to the credit lines of banks to do inner transfer for
users’ real-time transactions.
3. Explanation of SIEN’s Developing Plan
Due to the limited R&D resources, we focus on SECRET chat and AI
at the early stage followed by the development of SIEN and DeFi
integration.
As the SIE Token issuance takes earlier than SIEN network
development, we issue SIE Token on the Ethereum network. In the future,
when SIEN Network is available, we will provide mapping and
transferring tools for users to transport their SIE Token to SIEN.
Before that, the chatting and AI services of SECRET are running on a
centralized server. But we have taken the idea that all services and
modules can be transplanted on the SIEN network as one of the basic
objectives at the designing stage, including core data structure design,
basic algorithm design, and AI framework design.
Ⅶ. The Application Scenarios of SIEN
In this chapter, two application scenarios of the SIEN network are
introduced for users to better understand the designing philosophy and
application style of SIEN.
1. AI hash Sharing
The SECRET AI service demands massive computing resources to
process all kinds of computation and training practices. The huge input
of software and hardware resources is deemed to be the premise of a
self-built AI computing network. Here we have found a new direction
that building AI hash sharing service on the SIEN data chain network.
The features of SIEN ensure its security and justification. We
construct a measurable evaluation and transaction system for
computation resources, encouraging more users to share their surplus
computing capacity in the SIEN network.
The first thing to solve is the abstraction of computing resources so
that they can be measured. An AI network is first a computing network,
so the traditional CPU, memory, and network basic measurement
methods are still needed. Also, we focus on abstracting the
floating-point number parallel computing capabilities that are
particularly concerned in the AI field. We examine the mainstream CPUs
and GPUs on the market and specially designed AI computing chips and
other AI computing devices. Based on these devices, a fair AI hash
measurement index is abstracted.
The next thing to solve is the acquisition and trading of computing
power. We will implement a side chain for AI hash sharing on SIEN. This
side-chain provides various types of services related to AI hash sharing,
such as the hash declaration, hash usage and measurement, hash trading,
etc.
For popular platforms, we provide SDK for both hash provider and
hash user to quickly get access to the network or application
development and hash usage.
With the quick and efficient mechanism of the 5G network, more
and more people are willing to share their surplus resources for a profit.
Also, thanks to the accessibility of computing resources, the sharing hash
on SIEN is more cost-efficient against other popular platforms.
It can be predicted that except for driving the AI on SECRET, SIEN
will be taken by more and more AI applications.
2. Content Creation and Sharing
We have mentioned the developing plan of content creation and
knowledge sharing in the previous chapter. We will illustrate the
prospect of combining these applications with SIEN.
SIEN network support users to create side chains to provide specific
services. As a content creation and knowledge sharing network, it allows
users to build a side chain to offer various services such as content
storage, copyright verification, content pricing, and trading.
The contents created by users can entirely or partly be stored on
the side chain. It is a solution to the storage problem. The side chain
provides the deposit certificate for copyright. As long as the copyrighter
records the fingerprint of the works on the side chain, the timestamp and
tamper-resistant work information is the most persuasive copyright
proof. The side chain constructors could select SIE or a Token issued by
themselves to price and trade with the contents circulating on that side
chain.
The profits and piracy reduction attract more users to create
content on SIEN. And with the enriching contents, users show a
preference for consuming and sharing content on SIEN.
3. SECRET + SIEN+DEFI
SECRET and SIEN are symbiotic, which created a mutually beneficial
ecosystem where they work together and help each other. They are more
than additive effects, but multiplier effects and even exponential effects.
The combination of the two will burst into tremendous energy.
The Secret blockchain technology is always under research and
development. With the arrival of the decentralized financial era, its
design will be further strengthened. In addition to significantly
increasing the frequency of blockchain transactions, it will also adopt an
original smart contract system to ensure that more sophisticated smart
contracts, and even contract programs in high-intensive fields like
artificial intelligence and deep learning algorithms can be supported in
the future, building the infrastructure for the big data era of future
decentralized finance.
Secret will roll out a blockchain system that can support the
decentralized financial world, with a settlement frequency similar to VISA,
and a smart contract system that can accept infinite computing difficulty
and provide a large number of packaged contract computing interfaces.
Combining with the Secret social platform, it allows DeFi to exist not only
in the world of technical players but also in the decentralized financial
world that everyone can join.
Secret chain comes with gateway smart contract technology, which
can be connected with any other blockchain or non-blockchain financial
system, as long as there is a corresponding decentralized gateway. For
example, a BTC gateway allows users to get BTC on the Secret chain as
they pledge BTC, which can open up the connection with the BTC
blockchain network. Through the automatic conversion of the gateway,
users can even initiate money transfers directly to the BTC network.
The participation of DeFi provides the Secret and SIEN network with
a decentralized foundation and broader development, which also means
the ecological world created by the combination of the three is full of
infinite possibilities.
4. SIEN behind SECRET
The first served Secret chatting service attracts a mass of users with
its security and easy-to-use, while the AI service later will attract more
with its unique ideology and promising prospects.
With the development of 5G technology, platforms based on this
will grow stronger and the social value they create will be greater. As
SIEN is closely related to SECRET, the users from SECRET naturally turn
into initial SIEN users.
In the future, SECRET would be a stand-alone application deployed
on SIEN. There will be many other applications such as AI-like cloud
ecosystems running on SIEN after its completion. Meanwhile, SECRET
also builds the fundamental value system for SIEN.
5. Total Involvement, Node Evolution
SIE is crucial in the DeFi world of Secret.
It‘s not only used as a transaction fee but also used as a mortgage
asset for various applications in the DeFi system and gas fees for the
execution of the DeFi smart contract.
Since Secret provides a powerful smart contract execution system,
the income from gas fees will be huge. Meanwhile, whether transaction
fees or gas fees, 20% of which will go to the node that provides
blockchain hash, and the remaining 80% will be returned to the issuance
pool. Congestion occurs when too many transactions for nodes to
process.
Secret has created a node evolution algorithm. With the fitness
function design and node evolution model, it allows each node to
become an independent interconnected processing system if necessary.
The node evolution can not only ensure the active participation of
every node user and make the transaction processing timely and fast but
also give each node a certain power to ensure the blockchain fluency,
which vastly optimized the Secret chain.
6. Secret on SIEN
Secret sees an appreciating value in itself when its services are
transferring to SIEN. This is because both the computation and storage
of chatting and the mass requirements of the hash are supported by the
distributed SIEN network. For a service strengthening privacy and
security, its value would be greatly improved if it were running on a
distributed network getting away the control by any individual or
institution.
Comparing with hacking a centralized network, the invasion into a
distributed network is much more difficult and costly. The distributed
technology makes Secret a safer service that no one shall reject. A
centralized service is vulnerable to the uncontrollable factors on
economics and politics, but those running on the data chain obtain
robustness, making it stronger against destruction and intangibly
improving the public credit of SECRET.
Ⅷ. Secret Public Chain
Secret is committed to solving the problems of existing blockchain
solutions such as low transaction processing speeds, very expensive and
limited computing resources and capacity. Secret proposes a blockchain
solution suitable for large-scale transactions and calculations, with high
performance, high security, and flexible expansion.
Secret core features include:
(1)Original POE (Proof of Equality) consensus mechanism
With high-performance transaction processing capabilities (average
TPS 4500+) and low-consumption performance, the POE consensus mech-
anism provides everyone with the same opportunity to participate, truly
breaking the monopoly of blockchain computing power.
(2) The built-in decentralized computing power network
brings verifiable and unlimited computing power to the blockchain.
Smart contracts make it possible to implement largescale matrix multipli-
cations, AI model training and 3D rendering, to enable more real-world
commercial applications and achieve computing goals.
(3) The chain state synchronization function
can effectively, solve the problems of the continuous expansion of
block data, and greatly reduce the participation threshold of Secret ´s
nodes, to truly allow everyone to participate in blockchain and benefit
from it.
The Secret ecosystem is a framework that consists of three technical
layers: the data persistence layer, the domain layer and the service layer.
The data persistence layer has an account system, a POE consensus
mechanism, and smart contracts. The domain layer consists of a
crosschain protocol suite based on smart contracts, a distributed comput-
ing system, and a data mapping and storage protocol suite. Finally, the
service layer of the platform consists of a complete third-party protocol,
API and SDK, a dashboard and related components. The service layer also
provides access to developers and other related parties, realizing the
processes of information generation, consumption,and delivery of the
entire ecosystem.
Ⅸ. Relationship
Participation is the keyword for the development of the social
network. The more people in it, the more value it has.
People join a social network because they have acquaintances there.
So it is an effective way of expanding social networks by attracting the
friends of its existing users.
We abstract the above situation to a concept of “relationships”
which reflects the physical connection between different users as wells as
the equity network model in Secret. With more newcomers building
“relationships” with users in Secret, the user contributes higher value
to the Secret ecosystem and thus benefits more from its development.
Simplifying the model, we suppose a new user as one
“ relationship ” with his/her counterpart at the first chatting. It is a
one-way and exclusive relationship. Once a new user became the
relationship of someone, he/she cannot become the relationship of
others and can only add later comers as his/her relationship.
Based on the relationship model, we could build a tree hierarchy
where the early comers stay at a higher stage. Users with more
relationships can get greater income weight. SECRET rewards
high-weight users to boost the development and expansion of its
community and ecosystem.
The relationship model triggers the existing users to invite new
users, activating the booming of the whole ecosystem.
X.SIE Issuance Algorithm
The initial candy issuance algorithm was written into the blockchain by Se-
cret as the original SIE issuance algorithm. Based on the current number of SIE
liquidity, it issues 0.1% per day until the circulation reaches 3 billion. But since
the 80% of transaction fee and gas fee continue to return to the issuance pool, it
will take more time to reach the expected issuance of 3 billion. When the circula-
tion reaches 3 billion, only 80% of the transaction fee and gas fee of the previous
day will be issued every day.
1. Holding hash
1.1 Holding Reward
Total amount: 50% of this candy reward
Rules: the reward is proportional to the user’s holding hash.
User candies=User holding hash/Platform holding hash*Total amount
The holding hash consists of three parts
Holding hash=Consumption hash+ SIE hash+ Deposit hash
(1) Consumption hash
User consumption in community applications such as Mall will produce SIE
destruction, thereby obtaining consumption hash.
(2) SIE hash
IUsers can get the corresponding hash by holding SIE and increase the
growth rate through daily growth.
Note: Only users with more than 100SIE can get holding hash.
(3) Deposit hash
Users can get deposit hash by depositing SIE regularly in Secret
DeFi applications.
1.2 Consumption hash
(1)SIE destruction
User consumption will produce SIE destruction, thereby obtaining
destruction hash.
(2) Destruction hash
When the user consumption produces SIE destruction, the user can
get a destruction hash of (destructed SIEs*10) to the power of 1.1
for three years, the merchant can get a destruction hash of (De
structed SIEs*2) to the power of 1.1 for three years.
1.3 SIE hash
1.31 Calculation
The holding formula is as follows
SIE Hash=SIE Holdings to the power of 1.1*Growth Rate
The initial growth rate of each wallet is 1. According to the daily
change of SIE holdings, the formulation and table for the change of in
crement n% are as follows:
(Day SIEs-Previous Day SIEs)/ Previous Day SIEs*100%
Note: u is the growth variation
1.32 Growth variation
According to the calculation,
u=e-0.03(a-b)
u is the growth variation
a is the user growth rate in the previous day
b is the average growth rate of all users in the previous day
The number e, also known as Euler's number, is a mathematical constant, an in
finite non-repeating decimal, and a transcendental number approximately
equal to 2.718281828459045.
1.4 Deposit hash
1.41 Deposit hash calculation
Deposit hash=the sum of (fixed deposit SIEs to the power of 1.1* the deposit
growth rate)
Note: A single deposit of less than 100SIE will not participate in the candyissuance
For example:
User A deposits 100SIE, 100SIE, 200SIE in Secret DeFi,respectively
1) Current deposit 100SIE (no hash generated)
2) Fixed deposit 100SIE for 1 month
3) Fixed deposit 200SIE for 1 month
1.42 Deposit growth rate
(1) Calculated the current deposit growth rate of users based on the fixed deposit
market.
The growth rate of a one-month fixed deposit is 20% of the average growth rate.
The growth rate of a three-month fixed deposit is 50% of the average growth rate.
The growth rate of a six-month fixed deposit is 75% of the average growth rate.
The growth rate of a one-year fixed deposit is 100% of the average growth rate.
The growth rate of a two-year fixed deposit is 150% of the average growth rate.
The growth rate of a three-year fixed deposit is 200% of the average growth rate.
(2) The growth rate of each fixed deposit is calculated separately
Before the deposit expires, the deposit period can be changed to a longer period, or
it can be withdrawn in advance. A 10% fee and the income from the high growth
rate during the deposit period need to be deducted for the advance withdrawal.
2. Invitation hash
2.1 Invitation candy calculation
Total amount: 50% of this candy reward
The deposit hash of user A=1001.1 *the growth rate of fixed deposit for 1
month+2001.1 * the growth rate of fixed deposit for 1 month
Rules: the reward is proportional to the user’s invitation hash.
User candies=User invitation hash/Platform invitation hash*Total amount
(1) Secret will calculate the invitation hash and invitation candy of users based on
their invitation relationship.
(2) The invitation hash of users is the sum of the large community holding hash to
the power of 0.3+the sum of all small communities holding hash to the power of
0.7.
For example:
User A has a large community B, a small community C, and a small community D,
then the invitation hash of user A=the sum of community B holding hash to the
power of 0.3+the sum of community C holding hash to the power of 0.7+the sum of
Community D holding hash to the power of 0.7.
3. DeFi Fund
The DeFi ecosystem is richer in content. The secret has the advantage of the growth
rate algorithm and the security and prosperity of the DeFi ecosystem. Furthermore, it
can ensure a steady rise of SIE price via the algorithm.
3.1 Key algorithm
If the SIE price drops by n% compared to the previous day, it will make a purchase of
DeFi funds across the network, and 2n% (up to 10%)of the liquid SIE assets of all
users will be automatically used to purchase the DeFi fund. The DeFi fund returns
10% a month for a year, which means users can get 120% of the income. In this way,
which ensures an up-trend of SIE price in any relatively large range.
it not only delivers a fixed income to users but also reduces the instant liquidity,
which ensures an up-trend of SIE price in any relatively large range.