You are on page 1of 34

White Paper of Bit Rice(BTR)

Create the optimum data storage and content sharing eco-chain

BitRice Foundation Singapore

April 2018
Abstract

In BTR project "Home Cloud" and other intelligent hardware function as the
nodes, distributed shared storage, "Bit Disk", as the core, blockchain digital assets
"Bit Rice (BTR)" as the incentive, data storage and content sharing as the core
applications. BTR project aims to create a future-oriented data storage and content
sharing ecosystem featured by privacy, security, impartiality, decentralization, distribution
and sharing. It will enable users to commercialize their spare storage space and digitalize
the value of their original contents (photos, videos and files) by sharing, and therefore
become a mature project with real-life applications seamlessly integrating the
concept of “Smart Hardware + Block Chain Technology + Sharing Economy +
Digital Assets + Content Payment”.

The Home Cloud intelligent hardware has built in mass storage modules, which
provide private, safe and cross-platform storage which can be accessed globally to
provide service for users’ various devices such as mobile phones, computers and tablets.
It also has built-in 4K high definition output to TV. With its certain spare storage space,
mass users sharing their spare storage with others, Home Cloud intelligent hardware can
form a storage resource pool with no constraints on the number of nodes, which will build
distributed shared storage, Bit Disk based on blockchain technology and InterPlanetary
File System (IPFS). More specifically, each Home Cloud hardware is also a Bit Disk node.
All nodes work together to provide shared storage services at low cost. The users of
Home Cloud are incentivized in the form of BTR digital assets according to their shared
storage space, online time, network connectivity, and actual service quality and so on.
BTR is issued through the unique algorithm of PoWS and based on the open source
blockchain project - ChainSQL, which is the token to digital assets based on the Bit Disk
storage chain and the token to drive the operation of Bit Disk storage chain, and also the
incentive digital value reward for users to contribute their spare storage space. BTR is
also the unified digital pricing standard for the users of Home Cloud and Bit Disk to share
their original video, photos and other documents, and live videos, with which the
originators can get incentive from the viewers’ and downloaders’ payment, so as to
promote the valuable production and circulation of digital content.

The BTR project shall build the future-oriented data storage and content
sharing value chain, become the super storage with maximum global nodes as well
as largest storage volume and super media with the most original contents, which
will promote the marketization of distributed storage applications and valuable digital
contents, realize the transformation of cloud storage market and content circulation
market, and create huge social value and economic value.
Content

Abstract ............................................................................................................................................ 2
Chapter I Concept description ...................................................................................................... 5
1.1 Cloud storage ................................................................................................................... 5
1.2 Public cloud, Private Cloud and Home Cloud ............................................................. 5
1.3 Sharing economy ............................................................................................................. 5
1.4 Shared storage and Bit Disk .......................................................................................... 5
1.5 Digital asset-BTR ............................................................................................................. 6
1.6 IPFS-Interplanetary File System.................................................................................... 6
Chapter II Overview of BTR eco-chain ....................................................................................... 8
Chapter III Private Cloud intelligent hardware – Home Cloud ................................................. 9
3.1 Multi-terminal interworking and global access .......................................................... 10
3.2 File privacy, and not stored in the cloud ..................................................................... 10
3.3 Double disk hot standby and data security ................................................................ 10
3.4 Multi-user usage in common and convenient sharing.............................................. 10
3.5 HD viewing and home entertainment.......................................................................... 10
3.6 Three network access, convenient and practical ...................................................... 10
3.7 Intelligent platform and continuous expansion .......................................................... 11
Chapter IV Framework for blockchain of Bit Disk & BTR ....................................................... 12
4.1 What is blockchain? ...................................................................................................... 12
4.2 ChainSQL platform based on open source project ................................................... 12
4.3 Multilayer framework ..................................................................................................... 17
4.4 BTR wallet....................................................................................................................... 17
Chapter V Technique implementation scheme of Bit Disk & BTR......................................... 19
5.1Formulation of storage resource pool .......................................................................... 19
5.2 Construction of storage node and storage chain ...................................................... 19
5.3 BTR incentive algorithm of storage node ................................................................... 19
5.4 Specific implementation of Bit Disk user and PoWS algorithm............................... 20
5.5 File storage of Bit Disk .................................................................................................. 21
5.6 File reading of Bit Disk .................................................................................................. 23
5.7 File sharing in Bit Disk .................................................................................................. 23
5.8 Conclusion ...................................................................................................................... 23
Chapter VI Motivation System of BTR ...................................................................................... 25
6.1 Allocation Plan of BTR .................................................................................................. 25
6.2 BTR output of Shared Storage Nodes ........................................................................ 25
6.3 The direction of the construction of BTR ecosystem ................................................ 26
6.4 The BTR Application Scene ......................................................................................... 26
6.4.1 Storage Service .................................................................................................. 26
6.4.2 Content Service .................................................................................................. 27
6.4.3 Internet Service ................................................................................................... 27
6.4.4 Peer-to-peer Service .......................................................................................... 27
6.4.5 Other Service ...................................................................................................... 27
Chapter VII Development History and Development Plan of BTR Project .......................... 28
7.1 Development History and Development Plan of Hardware Partner -- Home Cloud
................................................................................................................................................ 28
7.2 Development History and Plan of BTR Project ......................................................... 29
Chapter VIII Structure of Project Governance ......................................................................... 30
8.1 Introduction of BTR Foundation................................................................................... 30
8.2 Governance Structure of BTR Foundation Governance .......................................... 30
8.3 Acquisition Methods of Information ............................................................................. 30
8.4 Project Cooperation with BTR ..................................................................................... 31
Chapter IX Introduction of the Core Team ................................................................................ 32
9.1 Project Partner– The Core Team of Home Cloud Intelligent Hardware................. 32
9.2 The Core Team of BTR Project.................................................................................... 32
9.3 Consultant Team of BTR Project ................................................................................. 33
Chapter X Function, Characters and Risk of BTR .................................................................. 33
Chapter I Concept description

1.1 Cloud storage

Cloud storage is a cloud computing system with data storage and management as
the core. Briefly speaking, cloud storage is a kind of schema that put the storage
resources into cloud for user access. The users can access and store data easily through
any internet access terminal at anytime and anywhere.

1.2 Public cloud, Private Cloud and Home Cloud

The cloud storage that provides service for massive number of users with centralized
Internet Data Center (IDC) is called public cloud. All files of the users are centrally stored
in the various IDC of public cloud. The public cloud service provider can technically view
all documents stored in the public cloud, in which privacy cannot meet the psychological
needs of users.

Based on the private/enterprise IDC as infrastructure, the cloud storage that serves
only specific internal users is called Private Cloud. Generally Private Cloud does not
provide services externally.

The Home Cloud is a kind of Private Cloud for individuals/households/small teams.


The home cloud intelligent hardware can be seen as the cloud storage server that is
placed at home with minimal footprint. All files of users are only stored in the tangible and
visible home cloud intelligent hardware, but not in the cloud server. Even the technicians
responsible for the development, operation and maintenance cannot access the files
stored in Home Cloud.

Since 2015, various problems of public cloud keep on simmering: Users’


worries caused by serious violations of privacy, policy supervision crisis caused by
storage content censorship, sustained loss caused by their free-of-charge
business model, and difficulty in monetize the users’ visits, and then the
consumer-facing public cloud disk service was gradually shut down all over China,
among which 360 cloud disk and Kingsoft disk as representatives were phasing out
from the historical arena. It was announced that the golden era of public cloud disk
had passed while the Private Cloud was gradually recognized by more and more
users.

1.3 Sharing economy

Sharing economy has become the direction and consensus on social development
nowadays. The sharing economy incentivizes people to share their spare resources with
others and then speed up the flow and full utilization of social resources while the sharers
can also get a corresponding reward. The sharing economy is the socio-economic
ecosystem that incentivizes people to share material goods. Mobike is the representative
of bicycle sharing while Home Cloud & Bit Disk is the representative of shared storage.

1.4 Shared storage and Bit Disk

Shared storage is a distributed storage network composed of shared storage nodes


(such as Home Cloud of personal computers) in different districts. Each shared storage
node provides a certain storage capacity resource and all of them form a mass storage
resource pool, which offers the service of shared storage outside. With its decentralized
distributed storage through a certain redundancy and safety rules, the shared storage
service enables users to obtain the required storage contents nearby safe and quickly,
which can realize the privacy and security of users’ data.

Shared storage can effectively reduce the construction cost of mass storage
resources, increase the response speed of storage services, and improve the storage
experience of users. Besides, it can also take full advantage of shared fringe node to
expand the layout and number of nodes infinitely, promote the security and stability of
storage network, and realize file storage as well as transmission distance "As near as one
Kilometer".

Based on the blockchain created by Home Cloud & Bit Disk, the shared storage
ecosystem is the leading shared storage ecosystem in the industry. The Home Cloud
users can not only share the spare storage as Bit Disk node, but also enjoy Bit Disk
shared storage service and backup their file redundancy to Bit Disk.

The shared storage of Bit Disk can greatly reduce the waste of private storage space,
increase the utilization ratio of spare space by more than 90%, and significantly improve
the utilization ratio of total social resources, which is in line with the general trend of
society towards environmental protection and resource conservation.

Bit Disk is created on the basis of blockchain technology, and possesses the
attributes of decentralization, distribution and others naturally. The network core value of
Bit Disk belongs to the resource providers and users of Bit Disk. BTR Foundation is
responsible for the construction, technical services and community development of the Bit
Disk storage chain.

1.5 Digital asset-BTR

Digital asset is the record or Token based on blockchain technology. BTR is the digital
asset and operation Token based on Bit Disk storage chain, which is used to stimulate the
users to provide their spare storage resources and participate in Bit Disk service. It is also
a kind of blockchain digital asset reward for users to share their network bandwidth, spare
storage, and computing resources with demanders. BTR also incentivizes the content
producer to share their original contents. The content producer can obtain BTR reward by
sharing their original photos, videos and files stored in the Home Cloud or Bit Disk.

1.6 IPFS-Interplanetary File System

InterPlanetary File System (IPFS) is a peer-to-peer distributed file system and a


hypermedia distribution protocol, which integrate the best implementation schemas of
distributed system in recent years to provide the same file storage and addressing space
globally. It is the new basic internet protocol most probably to replace HTTP.

Content addressing is used in IPFS to replace the domain addressing in http. When
IPFS is requested for a file hash, it will use a distributed hash list to find the node of the file,
and then get back the file and verify the file data. IPFS has no storage capacity limit. It is a
global peer-to-peer distributed storage network. Large files can be cut into small pieces,
so they can be obtained from multiple servers simultaneously when downloaded. IPFS
has a nature of built-in CDN accelerating service capability.

The aim of IPFS is to make the web faster, safer and more open.

The shared storage of Home Cloud intelligent hardware supports IPFS protocol. After
the official release of IPFS network, the distributed shared storage with Home Cloud as
node will be switched to IPFS protocol.
Chapter II Overview of BTR eco-chain

BTR project is launched, operated, serviced and managed by the Singapore


BTR Foundation.

Home cloud intelligent hardware involved in this project is developed and


manufactured by Guangzhou CUME information technology Co., Ltd. the hardware
partner of BTR, and also a well-known Private Cloud manufacturer in China. All Home
Cloud users can voluntarily participate in the “Mutual Benefit Plan” and “Incentive Plan” of
BTR project, and participate in the construction and promotion of BTR eco-chain by
sharing their spare storage space and other means, and consequentially obtain digital
assets – BTR as reward. The users of Home Cloud intelligent hardware can also quit the
“Mutual Benefit Plan” and “Incentive Plan” at any time according to their own needs.

Besides Home Cloud, other Private Cloud manufacturers and users are also
welcomed to become partners of the BTR project, whom are also be incentivized to
participate in the construction and promotion of BTR eco-chain according to smart
contracts and BTR.
Chapter III Private Cloud intelligent hardware – Home Cloud

The Home Cloud is developed and manufactured by Guangzhou CUME information


technology Co., Ltd, partner of the project and also a well-known Private Cloud
manufacturer all over China, which is a Private Cloud storage intelligent hardware for
home users, white-collars elites, small and micro enterprises.

The first generation hardware of Home Cloud:

The second generation hardware of Home Cloud:


Home cloud intelligent hardware is the decentralized, private and secure storage
service used and managed by users themselves, which can be accessed globally. It has
the following functions:

3.1 Multi-terminal interworking and global access

Home cloud supports across-terminal and cross-platform usage of Android, IOS/MAC,


PAD, PC, TV and so on, any file updated from any device can be simultaneously updated
in other devices, and accessed globally. For mobile phone users, their data such as
photos, videos, documents, and address book can be backed up with one key, and there
is no need to worry about data leakage due to mobile phone replacement or loss.

3.2 File privacy, and not stored in the cloud

Compared with public cloud storages such as Dropbox, Baidu Cloud and Google
Photo album, iCloud, and others provided by the mobile manufacturers, the core
distinction and character of Home Cloud is that all the files are stored in the tangible and
visual intelligent hardware that the users can switch the power supply remotely, yet not in
the cloud servers so as to ensure the high privacy and security of users’ data.

3.3 Double disk hot standby and data security

From the second generation device, Home Cloud supports double disk hot Spare
(RAID1) technology, which significantly promotes the security and reliability of data. Home
cloud equipment is the first one of Private Cloud intelligent hardware that supports RAID.

Home cloud equipment has small dimensions with perfect design, a maximum
storage capacity of 60T storage, which can meet the storage needs of permanent data
center for family.

3.4 Multi-user usage in common and convenient sharing

One set of Home Cloud equipment supports multi-user usage in common. Each one
has his own independent storage space, and the saved files are invisible for the others by
default. As Home Cloud supports convenient and fast file sharing, and users can easily
share files with other users on the Home Cloud, or share it in the third party applications
such as WeChat, QQ, Weibo, Facebook, WhatsApp and so on.

3.5 HD viewing and home entertainment

With the built-in HDMI interface, Home cloud supports 4K HD video output to display.
All files saved in the Home Cloud can be viewed and outputted directly. Home cloud
supports the application market. Users can download other Android applications for use,
for example, iQIYI and Youtube for video viewing and MoreTV for TV viewing.

Home cloud provides the somatosensory games suite for home users, with which
users can play somatosensory games integrating entertainment, sports, and learning.

3.6 Three network access, convenient and practical

The second generation device of Home Cloud provides three network access modes:
Ethernet, WIFI, and AP, which can be used in different situations. If there is Ethernet cable,
it is firstly recommended to use Ethernet interface for network access, 5G WIFI access
secondly, and 2.4G WIFI access thirdly. If there is no network connection, Home Cloud
can also be used as AP for mobile phones and other terminals to directly connect to the
second generation device of Home Cloud.

In particular, when the user opens Ethernet and AP simultaneously, Home Cloud
becomes a home router which can support eight devices access the network
simultaneously.

3.7 Intelligent platform and continuous expansion

Home cloud is an intelligent platform, on which various service functions will gradually
open and provide with continuous upgrading. Currently available extended functions in
Home Cloud include data access through direct connection of USB cable, SAMBA file
sharing, cloud disk moving, remote offline download and file classification. Besides more
and more practical functions will continue to expand, such as direct connection with
camera, digital home interactive system and so on.

After the iterations of first generation hardware and second generation hardware, with
its matured systems and stable equipment, Home Cloud has gained users' favor and
support with good user experience. The extensive user base and massive user group has
become a solid foundation to successful operation of Bit Disk & BTR project.
Chapter IV Framework for blockchain of Bit Disk & BTR

4.1 What is blockchain?

Blockchain is a kind of technology to achieve the recognition and verification of


information with the cooperation of participants in the system through consensus
technology under the circumstance without need of mutual trust for multi-party. This kind
of collaboration achieves multi-node joint recording and maintenance through
decentralization to confirm an irreproducible and reliable data logging. Blockchain
technology enables users to have complete control and trust of data without needing
single-node central server so that the production relationship in the digital era is more
reasonable and secure, which will incentive users more efficiently.

As the data of each block is generated through cryptographic technique, and data
blocks are chained together through data fingerprints, we call this structure "Blockchain";
in addition, each full node has all transaction records or data logging ledger, so we also
called it "Distributed Ledger Technology".

The representative project and the first successful application of blockchain


technology is the Bitcoin network.

4.2 ChainSQL platform based on open source project

Bit Disk storage chain is developed based on ChainSQL platform. ChainSQL is the
open source blockchain platform integrating blockchain with traditional database. The
core thought is: To treat the operation of database as a transaction, and build a kind of log
type database platform based on blockchain network in the bottom layer, thus make the
operating history of data traceable and irrevocable so as to achieve a distributed
decentralized database.

ChainSQL establishes accounting system based on the four main characteristics of


blockchain: Decentralized, Trustless, Collectively maintained and Reliable Database. The
system adopts modular design, which encapsulate functions of consensus algorithm, P2P
communication protocol, block write in and others, thus each module are connected
seamlessly. The shared vouchers are saved, and incentive distribution is implemented in
the blockchain to ensure the publicity, transparency and impartiality of the operating data
in the Bit Disk storage chain with the traceable and irrevocable mechanism of blockchain.

Based on ChainSQL platform, Bit Disk storage chain adopts the following blockchain
underlying technologies when building:

4.2.1 Consensus algorithm

RPCA (Ripple Protocol Consensus Algorithm) is adopted for the consensus algorithm.
At present, there are several feasible solutions for Byzantine failures, such as POW
algorithm adopted by Bitcoin and Ethereum, and PBFT algorithm adopted by HyperLedger.
However, in this distributed payment system, the consensus efficiency is quite low due to
the need for simultaneous communication among massive nodes. In the RPCA algorithm,
in order to reduce the cost of the synchronous communication, a kind of scheme is
adopted which constitutes of a large network with sub-network of internal mutual trust.
The trust cost of sub-network is very low here, which can be further reduced to the atomic
choice of network nodes for other nodes within the sub-network. What is more, in order to
maintain the consistency of node data within the whole network, the connectivity required
between sub-networks cannot be less than a threshold. With the above solution, RPCA
realize a high performance algorithm with high Byzantine fault tolerance. RPCA algorithm
has been applied in the Ripple consensus protocol, and been verified through lots of
practical applications.

The consensus algorithm supports high network throughput capacity to be more


than1,000 TPS. Under the network, each node is non-anonymous node, and each server
participating in the consensus maintains UNL (Unique Node List). The servers assemble
in the list represents the trusted representative in the whole network, namely accounting
node, and the accounting node in the list determines the final consensus.

4.2.2 Problems solved by consensus algorithm

There have been more and more research on distributed consensus systems in
recent years. The aim of these research is to achieve a kind of transaction system with
high performance, low cost and decentralization. The main problems in the research
process of this kind of system can be classified into three categories: correctness,
consistency and availability.

Correctness refers to the ability of distributed systems to recognize normal


transactions and fraudulent transactions. In centralized system, this problem is solved
through the trust between institutions and digital signature to ensure that the transactions
are actually made by an institution. While in the decentralized system, people do not even
know each other and cannot establish similar trust relationship. Therefore, an alternative
solution must be found to ensure the correctness of transactions.

Conformance refers to the unique consensus that can be reached in the


decentralized system. Unlike correctness, a malicious user may not initiate a fraudulent
transaction, but he can make a profit by initiating many correct transactions
simultaneously. In the blockchain, a typical example is the "Double Spending" problem.
The consistency problem can be reduced to how to ensure that there is only one globally
unique transactions set in the system.

Availability generally refers to performance issues in the decentralized payment


system. Assuming that a system can guarantee both correctness and consistency, but it
takes one year to confirm a transaction, it is clear that the system has a low availability.
Furthermore, other aspects of availability include computing power required to achieve
correctness and consistency, as well as the applied algorithm complexity in order to avoid
a user being cheated.

The implementation of RPCA can solve the above three problems.

4.2.3 Basic concept of RPCA

The service node is a blockchain node that can receive transactions, including
verification nodes and non-verification nodes. Verification node refers to the node that is
added to the trust list by other nodes and can participate in consensus process. The
non-verification node does not involve in the consensus process.

Block record transactions. There are two kinds of key blocks in RPCA. One is the
newly closed block, namely the newly recognized block. Another is open block, and open
block refers to the block that is currently recognized. When the open block has been
recognized, it becomes the newly closed block.

UNL (Unique Node List) is the list of trusted nodes. Each service node maintains a
unique node list, where the unique is not what we usually understand but that I trust the
nodes in this list will not join together to cheat. In the consensus process, we only accept
votes from the nodes in the unique node list. In the Ripple, we designate UNL by adding
the public keys of other verification nodes in the configuration file.

4.2.4 Consensus process

Bit Disk storage chain network generates a new block every a few seconds. The
generation process of this block is the process of RPCA consensus of all network nodes.
Assuming that the consensus process is successful and there is no bifurcation in the
network, so the newly generated block is unique in the whole network.

The RPCA completes the transaction in two stages. The first stage is the consensus
of reaching the transaction set. The second stage is to propose the newly generated block,
and finally form the block that has reached a consensus.

The consensus that reaches the transaction set is carried out in a series of rounds,
and performs the following operation in each round. Each node collects as many possible
the required transactions as possible at the beginning of the consensus, and puts it into
“Candidate Set”;

Each node makes a union set of its “Candidate Set” in the UNL, and votes for each
transaction.

When the voting result of service node exchange transaction in the UNL reaches a
certain percentage of voting, it will enter the next round. If the transaction fails to the
percentage, it will either be discarded, or enter the candidate set in the next consensus
process.

In the final round, all transactions with more than 80% votes will be placed in the
transaction set that has reached the consensus. The transaction set is similar to Bitcoin
here, which is also the data structure of Merkle tree.

After formation of transaction set, each node starts to pack new blocks. The process
of block packing is as follows:

Put the new block number, Merkle tree root Hash, parent block Hash and current
timestamp of consensus transaction set to calculate a block hash.

Each node broadcasts its own block hash to its visible nodes. The visible nodes not
only refer to the nodes in the trusted list, but also the nodes that can be discovered in the
node discovery process.

After collection of the block hash broadcasted in all trusted lists, the node calculates a
ratio for each block hash in combination with the block hash generated by its own. If the
proportion of a hash exceeds one threshold value (generally 80%), the hash is considered
to be the block hash that has passed a consensus. If that is the same with its own hash, it
indicates that the packaged block has been confirmed as the new block that has passed a
consensus, which shall be stored locally and updates its status. If its own hash is different
from the one passed a consensus, it is necessary to request new block information from a
certain node with correct hash, and then store it locally and update the current status after
getting it. If there is not any hash passed the set threshold value for a block hash above,
the consensus process shall be restarted until conditions satisfied.

So far, the consensus process for one block is ended and the next round of
consensus process is started.

4.2.5 Verification

More fast and effective block authentication technology: All trust nodes in the whole
network are responsible for accounting, and the blockchain maintained by more than half
of the accounting nodes are effective chain. After generation, the block will be
broadcasted to the whole network for voting by the accounting nodes. The accounting
nodes determine which block is selected as the effective block according to the received
votes for a certain block, and a block can be generated within around 3 seconds.

Correctness: The verification method of correctness in the RPCA is very simple


because the consensus requires an 80% threshold value. As long as there are 80%
honest nodes in the UNL, the consensus can be reached. Moreover even if there are
more than 20% fraud nodes, the correctness cannot be destroyed, because the
consensus cannot be reached until the fraud nodes reach more than 80%. No matter the
fraud nodes or honest nodes, the consensus cannot be reached for less than 80% nodes.

Consistency: Consistency is guaranteed by the connectivity of the sub-network and


other sub-networks. In order to ensure that the blockchain is not bifurcated, each
sub-network must maintain the connectivity with at least 20% of the whole network nodes.
Availability: In the voting process of each round, the node will collect the response
time of each node in its UNL until the nodes with slow response time are removed so that
UNL can maintain high communication efficiency. On the premise of efficient
communication, RPCA can guarantee that a block is generated every 3-10 seconds at
TPS> 10, 000.

4.2.6 Multi-node data synchronization

When the node data is incomplete, the data is requested from adjacent nodes by the
mean of data discretization, multi-node simultaneous requesting and local recombination,
which makes the system possess such excellent features as fast data transmission,
breakpoint resume and others.

4.2.7 Radix-Merkle storage algorithm

The status and transactions in the block are assembled in the Merkel tree according
to the hashed result in the form of Merkel tree. Multiple leaf nodes are designed with the
structure of radix tree, and the key value can be quickly indexed to a specific transaction
or status.

4.2.8 Revised lz4 compression algorithm

Each field in the transaction content is sorted by the name to gain data content in
permanent order. Higher compression ratio and compression speed are obtained with the
revised LZ4 algorithm.

4.2.9 Smart contract Codius

BTR is the token on the Bit Disk storage chain. The issuance of BTR is implemented
based on smart contract Codius, which incentivize the node users involved in the storage
service of Bit Disk storage chain.
4.3 Multilayer framework

The technical multilayer framework of Home Cloud & Bit Disk & BTR includes:
application layer, consensus layer, bottom layer of blockchain, database layer, file system
layer and many other layers.

Application layer: Including terminals of different software versions (IOS, Android,


Windows and MAC), intelligent hardware, intelligent hardware service software and BTR
wallet.

Consensus layer: Chain consensus uses RPCA.

Blockchain layer: Developed based on the ChainSQL platform.

Database layer: Overlay the traditional SQL database services through the
blockchain layer.

File system layer: The file system adopts IPFS.

4.4 BTR wallet

BTR wallet structure is divided into user layer, application layer, service layer,
transaction layer and technical platform layer, which has the functions of decentralization
account management, sharing awards, settlement interfaces, secure storage and
transactions, etc.. The main part is a light-weight client.

Basic functions

Wallet registration, account importing and exporting, cipher key replacement and
other functions. The user's wallet file and private key are kept by user himself, which
completely return user's rights and make the system more private and secure. Once the
user's private key is lost, the wallet will never be retrieved.

Asset functions

Asset transfer and payment, transfer of assets and asset exchange. Through the
wallet, the BTR digital assets can be managed safely and conveniently.
Inquiry functions

BTR transaction and bill query makes all data of BTR in control.

BTR Wallet has officially issued and integrated into the home cloud APP.
Chapter V Technical implementation of Bit Disk & BTR

Bit Disk is the distributed storage service based on blockchain shared storage
created by this project. It is built based on blockchain technology, which naturally
possesses the attributes of decentralization, distributed and others.

The core value of Bit Disk network belongs to the resource providers and users.
Singapore BTR Foundation is responsible for the project development, technical services
and community development of Bit Disk storage chain.

BTR is the digital asset based on Bit Disk and token driving the operation of Bit Disk
storage chain.

5.1 Formulation of storage resource pool

The storage resource pool of Bit Disk is derived from all the users who are willing to
share their spare storage space. Particularly in this project, all users of Home Cloud
intelligent hardware can voluntarily join “Mutual Benefit Plan” of the BTR Foundation,
participate in the construction of disk storage chain by sharing their spare storage space,
and obtain the corresponding digital assets – BTR reward.

The users of Home Cloud intelligent hardware can quit “Mutual Benefit Plan” at any
time according to actual situations.

After joining the Bit Disk storage chain, the storage space shared by the nodes will be
used as a part of the distributed storage of Bit Disk. Massive number of users sharing the
storage nodes will jointly build a massive, flexible and sustainable storage pool.

5.2 Construction of storage node and storage chain

Each node running Bit Disk storage can not only serve as the provider of storage
service, but also serve as the checker of storage service and messenger of storage chain
information.

All storage nodes work together in real-time and ensure the stable operation of Bit
Disk storage chain. According to the service characteristics of typical PoWS and
decentralized shared storage, BTR proposes a new algorithm based on PoWS in
combination with the working characteristics of distributed intelligent hardware nodes,
which validate and motivate users’ service contribution according to their shared storage
space volume, network bandwidth, service quality and service time.

5.3 BTR incentive algorithm of storage node

BTR project’s incentive algorithm to users of storage node is as follows:

1. Each user's contribution score C represents its service workload in the settlement
interval;

2. Total BTR issuance in the settlement interval=T;

3. BTR gained by a certain user during the settlement interval H=T*C/


(C1+C2+...+Cn);
4. User’s contribution score C = (Storage score * storage weight + bandwidth score *
bandwidth weight + service score * service weight + hardware score * hardware weight) *
(online duration / settlement interval);

Storage weight = 40%. Storage score: Perform weighted computation according to


the volume of storage space shared by the user.

Service weight = 30%. Service score: It is evaluated according to the service


response quality when Bit Disk user stores and reads the stored file.

Bandwidth weight = 20%. Bandwidth score: It is evaluated according to the network


upstream bandwidth and downstream bandwidth of user’s node equipment.

Hardware weight = 10%. Hardware score: It is evaluated according to the computing


capabilities of user node device hardware.

Settlement interval: It is settled once every 24 hours.

Bit Disk storage chain solidifies the incentive logic of BTR through smart contract,
which guarantees the openness, fairness and irreversibility of computational logic, and
distributes the reward of BTR according to the contribution of storage node.

5.4 Specific implementation of Bit Disk user and PoWS algorithm

Each user account of Bit Disk is actually a BTR wallet address. Bit Disk user keeps
his own private key, and saves the public key to the storage chain.

The user of Bit Disk drives the storage service of Bit Disk. On one hand, the user of
Bit Disk drives the whole Bit Disk storage chain to implement the relevant function for file
storage, reading, sharing and etc.; on the other hand, when storing and reading files, the
user of Bit Disk needs to pay BTR required by the storage chain operation of Bit Disk, so
as to stimulate the orderly operation of storage service node and auxiliary verification
node in the Bit Disk storage chain.

The specific implementation of Bit Disk PoWS algorithm is composed of file storage,
file reading and file sharing of Bit Disk.

5.5 File storage of Bit Disk

When storing files, user of Bit Disk needs to use BTR to drive the Bit Disk storage
chain. Bit Disk file system uses IPFS as bottom file system, and realizes the distributed Bit
Disk shared storage through PoWS according to the characteristics of Bit Disk storage
node.

5.5.1 Typical stored procedure

When storing the file, user A of Bit Disk carries out piecewise encryption to the file
need to be stored (user can choose his own encryption algorithm, for example choose
AES 256 or SMS4) at first, and forms a Merkle tree of file pieces. Then the user
broadcasts the request message for corresponding piecewise storage, which includes the
task sequence number, size of file piece, hash value as well as storage copy quantity, hop
count of the node down broadcast, broadcast validity and the BTR quantity to be paid.
After BTR quantity of user A is verified by the smart contract, the BTR to be paid shall be
froze, and then the message can be sent out to prevent malicious users from wasting
storage resources.

After receiving the task broadcast, the nodes on the Bit Disk storage chain adjacent to
user A will verify whether the address is true or not at first, and whether the BTR input in
the contract is sufficient, and then determine whether to response the storage task after
checking the authenticity of the task. If the adjacent nodes determine to perform this task,
they shall broadcast to adjacent nodes with the hop count of message broadcast minus 1.
If adjacent nodes determine not to perform the task, they will not reduce the broadcast
hop count, and directly broadcast it to adjacent nodes. The nodes broadcast the
messages by analogy and until the hop count is reduced to zero.

All nodes that decide to participate in the task are directly connected with user A. Now
user A will decide the next operation according to the node number N that responds to the
stored file and the copies M that need to be stored:

If N >= M, the smart contract selects M nodes to perform the storage according to
response time of node and service quality weight of node storage. At last these M nodes
that are determined to verify the fulfillment of storage service share the BTR paid by user
A for this storage service.

If N<M, the smart contract allows the N nodes to perform this storage and launches a
second broadcast in the meantime. In the content of the second broadcast, the stored
copies required by node users are changed to N-M, and the BTR to be paid is
correspondingly reduced to the BTR proportion that fails to complete the node. At this
point, the node that has executed the file storage will choose to ignore this storage task
according to the hash value, and broadcast to the adjacent nodes without reducing the
broadcast hop count, and the like till the storage task of user A is completely performed
and verified. Then user A pays BTR for this storage service to these final M nodes.
For no malicious node, the typical storage tasks are completed within less than 2
times of broadcasts. The user and storage node record each other's node information,
and the storage node records user as the owner of the file.

Bit Disk creatively uses the addresses, transaction input and transaction output of
BTR directly as the judgment of trust degree. The trust degree of a certain user is
positively correlated with the total number of BTR spent by the user's address. Meanwhile
the trust degree of a certain storage node is positively correlated with total earning of BTR
obtained by the storage node address for its providing of storage service. Therefore, when
the normally completed storage task transfers BTR paid by user A for the storage service
to the BTR address of the storage node, it means that both the trust degree of user A’s
address and the storage node are increased.

5.5.2 Verification of storage services and discovery & treatment of malicious storage
nodes

After completion of storage task, user A initiates the verification of the storage
services provided by the above M nodes. User A independently performs reverse fast
verification based on Merkele Tree- Abstract HASH for each node's stored content. If it
fails to respond, it indicates that the node does not actually store the file of user A. Then
user A records it as malicious node, and refuses to pay BTR in this storage service to the
node.

Each user independently keeps its own list of malicious storage nodes. The real
malicious storage nodes are quickly discovered by legitimate users and include into the
list of malicious nodes, thus lose long-term harm to the storage chain.

In the Bit Disk storage mechanism, the malicious storage node can hardly have
effective impact on the storage chain.

5.5.3 Discovery and treatment of malicious users’ attack

After actually completing storage service on the storage node, if the user client
maliciously refuses to pay the BTR reward to storage nodes, the storage nodes will delete
the saved file and include the user into list of malicious users. Each storage node will
discover the malicious user quickly and independently, and refuse to provide services for
this user so that the malicious user loses long-term harm to storage chain. If the forged
malicious user widespread and attacks the Bit Disk storage chain for service response
frequently, it will result in huge resource consumption to the storage chain and even cause
the storage chain service failure.

In order to prevent the problems caused by above-mentioned malicious user attacks,


the trust mechanism creatively adopted by the Bit Disk storage chain can play an
important role. When User A saves the file for the first time, because the trust degree of
his address is 0 (because it has historically never performed a storage task), even if the
user requests to save a huge file, his request will be divided into tiny ones by the smart
contract of the storage node, and settled with the user after the micro file storage task is
completed. Only after the settlement is completed and the BTR reward of the file is
obtained, the trust degree of user A will increase. Then the storage capacity is increased
and the following tasks are continued. In addition, the trust degree of user’s address also
determines how well the storage node accepts its broadcast hop count. When the address
trust is 0, no matter how many broadcast hop count the user has sent, the neighboring
storage nodes will not forward their broadcast messages. Therefore, the accumulation of
user trust degree must be formed at the cost of BTR.

Thus malicious users must pay the pre-cost before attack, and the cost will increase
rapidly as its attack task (storage capacity) increases. In addition, the malicious attack of
malicious users will be discovered by the storage node within a very short time. This
prevents malicious users from having a substantial impact on the storage chain.

5.6 File reading of Bit Disk

When the user reads the stored file, it directly communicates with the remote node
according to the locally stored remote storage node information. According to the online
node network, it will select the best multiple nodes with the optimal network channel after
verifying the online and network information of the currently online remote storage node,
and different data pieces of the file are read synchronously so as to implement parallel
high-speed download.

During the construction of Bit Disk storage chain, the number of BTR to be paid by
the user for reading the file is 0. But file-reading service of the storage node is weighted by
the smart contract and accumulated to the BTR incentive income of the storage nodes.

When the BTR are completely mined, the Bit Disk storage chain incentive mechanism
is completely driven by the user, and the user must also use the BTR to drive when
reading the file.

5.7 File sharing in Bit Disk

When Bit Disk user A needs to share a file with user B of the Bit Disk, the private key
is used to decrypt the storage node list of files, and the assembly rule of the file pieces.
And then user A will encrypt them with the public key of B and sent to B after encryption.
Therefore, user B can gain access to the file (User A can also authorize user B to have the
right to modify, delete, and delegate the file).

5.8 Conclusion

The Bit Disk shared storage is a distributed storage network composed of massive
number of nodes (such as Private Cloud, home computers, etc.) distributed in different
regions. Each shared storage node provides storage resources to external and forms a
massive pool of storage resources, which provide shared storage services to external.

The Bit Disk storage service is completely decentralized and fully distributed. Except
the user of the Bit Disk himself, the storage node and any other party including the BTR
Foundation cannot obtain the file content. And the redundant backups of massive nodes
guarantee the impact of single-node failure on file storage services, which ensures the
high privacy and security of the disk storage services. At the same time, the Bit Disk
storage services do not depend on any central server. This also means that any malicious
single-node attack wills fail.
Bit Disk support IPFS protocol. After the online of IPFS network, Bit Disk will be
switched to IPFS network and continue the service.
Chapter VI Motivation System of BTR

6.1 Allocation Plan of BTR

Holder Proporti Amount Applications


on (million)
Shared 50% 1,050 Users of storage nodes, like Private Cloud, are
storage incentivized to share their storage space and
node users receive BTR incentives according to the proof of the
service workload.
BTR 20% 420 1. The BTR Foundation is responsible for the
Foundation operation, marketing, community development and
long-term service of the BTR Project.
2. Use smart contracts to perform corresponding
BTR incentives for participants of the BTR
eco-chain.
Early 20% 420 Held by early investors.
Investors

BTR Team 10% 210 Held by BTR team, with a locked period of 1 year,
released in 4 phases after 1 year.
Total 100% 2,100
The total amount of BTR is 2.1 billion, among which 50% of them are obtained by the
Bit Disk storage chain node (Private Cloud and other storage node providers) for shared
memory space.

20% is held by the BTR foundation for the development of the BTR project, project
operation, marketing, community development and long-term service.

20% is held by the early investors, and the remaining 10% is held by the BTR
foundation with 1 year’s locked period.

6.2 BTR output of Shared Storage Nodes

The total number of BTR issued to Bit Disk storage node users through smart
contracts is 1,050 million. When the total number of storage chain nodes of Bit Disk
reaches the number provided by the project, the Bit Disk storage chain will adjust the BTR
output difficulty algorithm and optimize the construction cycle of the Bit Disk storage chain.

The Total Number of Bit Output Algorithm


Disk Storage Nodes (1,000)
<50 The output is completed in 12 years and halved every 4 years.
>=50 The output is completed in 12 years and halved every 3 years.
>=100 The output is completed in 9 years and halved every 3 years.
>=200 The output is completed in 8 years and halved every 2 years.
>=500 The output is completed in 6 years and halved every 2 years.
>=1,000 The output is completed in 4 years and halved every 2 years.
>=2,000 The output is completed in 4 years and halved every 1 year.
>=5,000 The output is completed in 2 years and halved every 1 year.
>=10,000 The output is completed in 1 year.
The completion of BTR production means that the construction phase of the Bit Disk
storage chain has completely ended and it has completely entered the operating phase of
the Bit Disk storage chain. During the operating phase, Bit Disk users need to use BTR to
drive the store and access of files, thus complete the operating incentive to the Bit Disk
storage chain nodes.

With the increasing number of device nodes participating in the Bit Disk storage chain,
the difficulty of sharing BTR by shared storage nodes will also increase. However, with the
continuous enrichment of the BTR Eco-chain and application scenarios, the value of BTR
will also continue. With the increase, the value of digital assets acquired by users of
shared storage nodes will continue to grow rapidly.

6.3 The direction of the construction of BTR ecosystem

In order to optimize and accelerate the ecological development of the BTR Project,
the BTR Foundation aims to:

A. Home Cloud Users’ Promotion and Using Awards

B. Bit Disk Users’ Promotion and Using Awards

C. Bit Disk Community Service Rewards

D. Bit Disk Application Scenario Development Award

E. Conversion service between BTR and other Blockchain assets

F. BTR Value Exchange and Application Scenarios

G. BTR Lock Rewards

Continued incentives and rewards were given to all aspects of the construction of the
ecological systems. BTR incentives were issued through smart contracts to promote
penetrability between Bit Disk and various other applications, as well as further
diversification and enrichment of bitcoin value exchange and practical application
scenarios.

The implementation of BTR’s above-mentioned incentive system will quickly increase


and stabilize the number of long-term users, which will greatly accelerate the construction
of BTR eco chain.

6.4 The BTR Application Scene

BTR digital assets already include the following application scenarios. With the
continued growth of Home Cloud users and Bit Disk users, the application of BTR digital
assets will continue to grow.

6.4.1 Storage Service

 Use BTR to exchange bit file storage services

 Use BTR to convert Home Cloud intelligent hardware or storage capacity to


expand capacity

6.4.2 Content Service

 Use BTR to exchange albums or other products

Through the BTR exchange service, users can create photographs, calendars,
cultural shirts, and other products in photos stored in Private Cloud and Bit Disk.

 Use BTR to exchange paid videos

The Home Cloud has built-in 4K high-definition video playback capabilities, and users
can use BTR to exchange premium video services such as pay movies and TVs.

 Use BTR to exchange other user’s original content

The user has stored various original contents such as original photos and video
resources in Home Cloud and Bit Disk. And users can value the files they share. Other
users need to use BTR to view including paid photos, premium videos, live streaming,
paid documents, and other required resources.

6.4.3 Internet Service

 Use BTR to exchange home broadband network traffic

The Home Cloud smart hardware is a network device that requires home network
traffic. The user can use the BTR to exchange the broadband network traffic required by
the home.

 Use BTR to exchange mobile phone charges and web traffic

Both Home Cloud intelligent hardware and Bit Disk are globally accessible storage
services. Users can use BTR to redeem mobile phone charges and web traffic.

6.4.4 Peer-to-peer Service

BTR users can exchange their required services with each other in a peer-to-peer
manner.

6.4.5 Other Service

As the number of Home Cloud and Bit Disk users continues to increase, there will be
more and more scenes where BTR users can be used. For example, the electronic
product malls and virtual product services will continue to increase with the increased
value of BTR.
Chapter VII Development History and Development Plan of BTR Project

7.1 Development History and Development Plan of Hardware Partner -- Home Cloud

Date Events and Milestones Team


2015.5 Home Cloud project launched. CUME Tech.

2015.9 Home Cloud APP V1.0 released. CUME Tech.


2016.2 First-generation hardware of Home Cloud is officially released. CUME Tech.
2016.5 Home Cloud APPV2.0 released. CUME Tech.
2016.12 As the first generation hardware of Home Cloud, more than 1 million CUME Tech.
was raised by Jing Dong Crowdfunding.
2017.5 Second generation hardware of Home Cloud and Bit Disk project are CUME Tech.
officially set up.
2017.10 High and new technology enterprise certification awarded. CUME Tech.
2018.2 The First generation hardware of Home Cloud joined shared storage CUME Tech.
project of Bit Disk, and BTR is awarded through sharing of spare
storage.
2018.3 The Second Generation Hardware of Home Cloud, raised money CUME Tech.
from Jing Dong Crowdfunding.

Second generation software of Home Cloud launched mass CUME Tech.


promotion plan like viral marketing

2018.4 Second generation hardware of Home Cloud delivered. CUME Tech.


Users of the Second generation hardware of Home Cloud formally CUME Tech.
join the storage chain, obtain BTR by sharing their spare storage.

2018.6 Users can pay via BTR to share content services provided by Home CUME Tech.
Cloud .

2018.9 Home Cloud integrated with home cameras and open the function of CUME Tech.
live videos.

Strategic cooperation between Home Cloud and other original content CUME Tech.
platforms.

2018.12 The combination of Home Cloud and smart home system. CUME Tech.

2019 Continuously optimize the user experience of Home Cloud intelligent CUME Tech.
hardware.
Third generation intelligent hardware of Home Cloud will be CUME Tech.
introduced.
Home Cloud intelligent hardware expand to main countries in the CUME Tech.
world.
7.2 Development History and Plan of BTR Project

Date Events and Milestones Team


2017.2 Blockchain Technology Group established. BTR Foundation
2017.3 Researching and following Blockchain open source projects for BTR Foundation
making simultaneous decision, and selection of technical solutions
and market direction.
2017.6 Market Direction: Blockchain Distributed Storage BTR Foundation
Technical Solution: Based on the ChainSQL Open Source Platform.

2017.10 Development of the basic chain of Bit Disk storage chain was BTR Foundation
completed.
2017.12 Verified and issuance of BTR Digital Asset BTR Foundation
2018.2 Cooperation with CUME Tech., users of 1st generation hardware of BTR Foundation
Home Cloud join Bit Disk storage chain.
BTR wallet APP officially released. BTR Foundation
2018.4 Users of the second generation hardware of Home Cloud join in the BTR Foundation
Bit Disk storage chain.
2018.5 BTR exchange service and eco chain construction formally started, BTR Foundation
BTR can be used to exchange redeem storage services, photo album
gift production, paid video and other services.

2018.6 Bit Disk storage chain node ushered in the first outbreak with more BTR Foundation
than 50,000 nodes. BTR users exceed 200,000.
Bit Disk storage service V1.0 officially released. BTR Foundation
BTR Officially Logs into Digital Currency Exchange. BTR Foundation
2018.9 Bit Disk V2.0 Launches, Content Sharing Payment Service provided. BTR Foundation
BTR eco chain landing, creating original photos and other content BTR Foundation
sharing platforms.
2018.12 More than 200,000 Bit Disk nodes. BTR users exceed 2 million. BTR Foundation
BTR login over multiple digital currency exchanges. BTR Foundation
More than 2 BTR-based eco chain services have landed. BTR Foundation

2019.3 Bit Disk storage nodes expand beyond Home Cloud hardware. BTR Foundation
Other smart hardware devices can also join the Bit Disk storage
ecosystem.

2019.6 Total number of Bit Disk storage nodes exceeds 500,000. BTR Foundation
The total number of BTR users exceeds 3 million
2019.12 Total number of Bit Disk storage nodes exceeds 1 million. BTR Foundation
The total number of BTR users exceeds 5 million.
More than 5 BTR ecosystems and cross-system cooperation
services.
Chapter VIII Structure of Project Governance

8.1 Introduction of BTR Foundation

The BTR Foundation is registered in Singapore and is responsible for the BTR
Project. And it is also responsible for all the general and privileged matters of the BTR
Project, as well as the cooperation matters.

The BTR Foundation is committed to the technical development, transparent


governance, community services, and eco chain construction of the Bit Disk & BTR
project, and promotes the long-term, stable development of Bit Disk storage services and
the BTR eco-chain.

The governance objective of the BTR Foundation is to ensure the sustainability,


management effectiveness, and security of the funds for the BTR Project. The BTR
Foundation undertakes that all funds obtained through the Foundation will be used for the
technical development, community development, and ecological development of the BTR
Project.

The BTR Foundation consists of a decision-making committee, and a product


operation center.

8.2 Governance Structure of BTR Foundation Governance

The division of work in the institutions of the BTR Foundation is as follows:

(1) Decision-making committee: Responsible for the management and decision of


major issues, including appointment or dismissal of the leader of the product operation
center, and making important decisions. The members of the decision-making committee
are appointed for a term of three years and can be reappointed. The committee has one
chairman who will be voted by the committee members. The first session of the
decision-making committee was elected by the founding team and early investors of the
BTR Project

(2) Product Operation Center: Responsible for the work of product development, such
as technical development, product testing, product on-line, product audit, etc.; and also
the daily management work of community promotion, Publicity, finance, law, personnel,
administration etc.; staff of financial is responsible for the use and review of project funds;
staff of legal affairs is responsible for the reviewing and drafting of various types of
documents, preventing possible various kind of legal risks; staff of administrative and
personnel is responsible for staffing, salary, other personnel work and daily administrative
work. The product operation center will communicate technological progress and product
development with stakeholders, community contributors, and developers of open source
projects in the BTR community, and also hold technical conferences and product research
meetings from time to time, and continue to expand the ecosystem of the BTR project.

8.3 Acquisition Methods of Information

Official Website: https://bitrice.io/

WeChat: 13666620445
QQ: 2767993807

8.4 Project Cooperation with BTR

Please contact us via email info@bitrice.io for cooperation with the BTR Project.
Chapter IX Introduction of the Core Team

9.1 Project Partner– The Core Team of Home Cloud Intelligent Hardware

Home Cloud Intelligent Hardware was developed by the project partner – a


well-known domestic Home Cloud intelligent hardware manufacturer Guangzhou CUME
Information Technology Co., Ltd.

SAM Lee: CEO of Guangzhou CUME Information Technology Co., Ltd. Graduated
from the Class for Talented Youth of Xi’an Jiaotong University in 1996, Lee is a well-known
Information Security Expert, a successful entrepreneur of second business, and the
Blockchain Technology Geek.

Guangzhou CUME Information Technology Co., Ltd. has more than 30 professional
software and hardware R&D personnel, is the leading provider of Home Cloud storage
intelligent hardware solutions and products.

9.2 The Core Team of BTR Project

The BTR Project is under the responsibility of the BTR Foundation. There are more
than 20 members in the BTR Project team. The core members are as follows:

Michael Liu, Chairman of the Foundation and Director of the Product Operation
Center. Graduated from the Special Class for Gifted Youth of Xi’an Jiaotong University in
1994, he had served in Honeywell and several leading MNCs as System Development
Director and Chief Engineer. Michael is an early participant of Bitcoin, manager of big data
analyst team, and he has plenty of entrepreneur and management experience. In this
project, he is responsible for the formation and daily management of BTR team members,
and the product operation center.

Dr. Yan, PhD in Information Engineering, and Consultant Expert of the project.
Graduated from the Special Class for Gifted Youth of Xi’an Jiaotong University in 2001, he
has more than ten years’ experience of R&D and team management in leading global
high-tech companies and internet companies. He had led multinational teams to
implement technical and product development in data mining, cloud computing and other
fields. In this project, he is responsible for providing technical guidance in product design
and development planning.

Dr. HOSSEINI mainly developed large-scale data analysis and mining algorithms and
blockchain systems. He has participated in multiple projects of data intelligence, data
mining and blockchain, has extensive experience in project development. In this project,
Dr. HOSSEINI is mainly responsible for the collaboration and consultation on rationality
analysis of token logic, the design and development of token incentive mechanisms and
algorithms.

B. NASRULIN, Master of Science in Computer Science, has more than 5 years’


experience of development. He is proficient in C++, C, Python, Java, SQL, R and other
development languages, and familiar with OpenCV, YARP, PYL, CUDA, Thrust,
scikit-learn, Spark and other frameworks. NASRULIN was a core member in the
development of Hyperledger Iroha project. In this project, NASRULIN is mainly involved in
the development of the core code of the blockchain system.

I. NURGALIEV, Bachelor of Computer Science. Has more than 5 years of


development experience. He masters C++, Java, Phyton, etc., familiars with CUDA,
OpenCL, OpenMP, Scala, JS, etc. In this project, NURGALIEV is mainly responsible for
the core development work of the Bit Disk storage service.

John Wang, Bachelor of Computer Science. With more than 10 years’ experience of
R&D, John is responsible for the overall design of BTR and smart contracts in this project.

Pony Meng, Master of Science in Computer Science. With more than 8 years’
experience of R&D. Pony is mainly responsible for the overall design work of the Bit Disk
storage service in this project.

Dyson Wang, Computer Science Bachelor. With more than 6 years’ experience of
R&D, Dyson is mainly responsible for the application development of BTR and smart
contracts in this project.

Pony Lee, Bachelor of Computer Science. With more than 5 years’ experience of
R&D, Pony is mainly responsible for the application development of the Bit Disk storage
service in this project.

9.3 Consultant Team of BTR Project

Zhang Yiyun: Founder of Pegg Capital, a Bitcoin geek.

Jie Ni: Chairman of Jenny Media, a well-known We-media player.

Tian Dachao: Founder of the first audio program of the Blockchain “Listen FM”.

Chapter X Function, Characters and Risk of BTR

BTR is the virtual "fuel" needed for the bit storage chain operation and the exchange
unit of the BTR eco-chain incentive system.

With BTR as a virtual "fuel", the holders can use the storage function on the disk
storage chain (such as: storing files, accessing files, sharing files, etc.) through the
payment of BTR, and obtain original photos, video, text, live and other original content of
other disk users through the payment of BTR.

With the increasing number of users joining the BTR eco chain, the more sharing
resources on the BTR eco-chain, the economic efficiency of the whole BTR eco-chain will
be higher and higher, the unit cost of the consumption of resources will be lower and lower,
and bit meter BTR will also have more and more use value and exchange value.

In Singapore and its jurisdiction, BTR does not represent shares, dividends, claims or
investments in any way, nor does it give BTR holders any commitment to income, profit or
return on investment, nor does it represent the assets of the BTR foundation, affiliated
companies or other companies.

The holder needs to understand and accept the following characters of BTR.

(a)BTR cannot be converted into cash, or any other form of asset that is required to
be committed by the Singapore BTR foundation or its affiliates.
(b)BTR does not represent any rights granted to the holder of the income or assets of
the Singapore BTR foundation or its subsidiary bodies, including future income, shares,
ownership, equity, mortgages, voting, distribution, redemption, liquidation, ownership,
finance, law, or equal rights of intellectual property, or intellectual property rights or any
other rights related to Singapore BTR Foundation.

(c)BTR does not represent money, assets, commodities, debt, debt instruments or
any other financial or investment instruments.

(d)BTR is not a loan from Singapore BTR foundation or its affiliates. It does not
represent the debts owed by Singapore BTR foundation or its affiliates, and Singapore
BTR foundation does not make any promise to BTR holders.

The participants in the ecosystem also need to understand and accept the following
risks in exchanging, holding and using of BTR.

(e)In Singapore, Singapore BTR foundation is incorporated strictly under the


provisions of Singapore law, and there is no special additional laws and policies to be
followed by Singapore BTR foundation. However, it is not predictable when the Singapore
government will, or will there be regulators, to launch new regulatory policies or incentives
for blockchain technology enterprises and/ or blockchain applications such as BTR
foundation or the blockchain applications such as BTR. The new regulatory policy may
have a positive impact on the operation and / or the BTR eco chain of BTR foundation, but
it can also have negative and even severe negative effects.

(f)In other countries and regions outside Singapore, participants in BTR and BTR eco
chain need to assess the legal requirements of the country and region in the whole
process of exchange, possession, and use of BTR.

(g) Singapore BTR foundation has already released a risk warning for (f) and (g), and
shall not undertake any potential risks or losses caused by (f) and (g).

You might also like