Nulink provides privacy-preserving technology for decentralized applications via APIs. Build applications with all the best security and privacy practises
Frumps | OIG: Greetings OIG Community! We have another incredible AMA for you today.
We have with us today NuLink, they provide privacy-preserving technology for decentralized applications via APIs. With them, build applications with all the best security and privacy practises. Representing NuLink, we have David Jiao (Co-Founder ).
Welcome to the OIG Main Stage @DavidJiao!
Hi @DavidJiao, can you introduce yourself to our community?
David JIAO: Hi Nice to meet all of you here
My name is David Jiao, Cofounder of NuLink and GoldenRidge Robotic. Over 10 years of experience in the automotive and AI industry. Entrepreneur experience of founding startups both in Sweden and China , successfully raised a few rounds of investment and as CPO was responsible for a series of autonomous products.
Frumps | OIG: Great to have you and amazing to see the experience you have!
Can you briefly tell us what “NuLink” means in 3–5 sentences?
David JIAO: NuLink network is a decentralized solution for privacy-preserving applications developers to implement best practices and best of breed security and privacy. The NuLink platform provides endpoint encryption and cryptographic access control. Sensitive user data can be securely shared from any user platform to cloud or decentralized storage and access to that data is granted automatically by policy in Proxy Re-Encryption or Attribute-Based Encryption. For the data user on the other side, Zero-Knowledge Proof can help them verify the data source. In more advanced privacy-preserving use cases, NuLink uses Fully Homomorphic Encryption to customize enterprise-level data computation services.
Frumps | OIG: This is greatly needed in the world right now!
Let`s now talk about the milestones you have achieved so far and about your upcoming plans?
2021Q1: Project Start
2021Q4: Deliver NuLink Polkadot pallet and launch Polkadot watcher node
2022Q2: NuLink core library v.1 Release:
1. Watch Network Deployment
2. Fully support PRE.
3. NuLink API released.
Launch NuLink’s test network!
NuLink core library v.2 Release: Storage Layer Deployment to support more decentralized storage solutions!
Launch NuLink main network and start on-chain governance (DAO)!
2023Q2: NuLink core library v.3 Release:
1. support IBE&ABE.
2. NuLink API updates for supporting Identity&Attribute Bases features.
2024Q4: NuLink core library v.4 Release:
1. Data Availability Mechanism Supported through ZKP.
2. Privacy Data Computing Supported through FHE.
We have completed the Polkadot pallet recently and are currently working on the Polkadot watcher node. Once we finish this, all the users in Polkadot will find it easy to use our privacy-preserving services in their applications.
Frumps | OIG: Wow, you have achieved some big things already and there are a lot of huge things still to come!
What problem does NuLink try to solve and what are the solutions?
David JIAO: Today, businesses across the spectrum understand that data is the key to maximizing business value. Almost all businesses are mining data to fuel innovation and growth. Meanwhile, data can cause irreparable damage to businesses, reputations and people’s lives if sensitive information leaks in a data breach. In many cases, even though the law requires companies to implement data protection (for example, Europe’s GDPR or General Data Protection Regulation that is known as the toughest privacy and security law in the world), businesses regardless of size — enterprise, small or medium businesses or startups — often find it difficult to protect their users’ data. Finding a solution to these data privacy problems is the motivation behind NuLink.
By integrating best-in-class technologies we are building a strong technology foundation. The technical solutions provided by NuLink cover three main categories.
1.To ensure the availability of data in ciphertext form. The crypto techniques used here mainly include Zero Knowledge Proof.
2.Privacy-preserving data sharing. The general method is to encrypt data and let the data owner control access to it. The technologies include decentralized encrypted storage, proxy re-encryption, identity-based encryption and attribute-based encryption, etc.
3.Privacy-preserving data computing, which involves the integration of certain privacy computing capabilities into smart contracts. The technologies used include multi-party secure computing, homomorphic encryption and so on.
These three kinds of technical solutions can provide privacy-preserving applications in many application fields.
Frumps | OIG: This is highly needed and relevant in today's world, it's a must-have product for any business!
Can you describe some application scenarios using NuLink technology?
David JIAO: As I mentioned above, NuLink provides three kinds of technical solutions for many privacy-preserving scenes: encrypted NFTs trading market, secure electronic health records sharing, decentralized digital rights management, secure data sharing collected by IOT devices, financial encrypted data prediction, privacy-preserving social network, etc.
One of the most exciting use scenarios for NuLink’s technology solution is in the encrypted non-fungible token (NFT) trading market. The NFT market is booming — in the first half of 2021, NFTs saw $2.5 billion in sales. This means there is a great opportunity for new solutions that take NFTs to the next level. At NuLink, our first objective will be to provide technology for NFT marketplaces to facilitate private auctions, encrypted and private collections, and entirely new exciting use cases for encrypted NFTs. For instance, the NuLink solution makes it possible for artists to set up secure online private auctions where potential buyers can virtually view and bid for the art pieces on sale. The artist could also create special viewing events for their most dedicated fans or special collectors. Similarly, NFT owners will be able to securely share access to a specific NFT or their private collection with whomever they desire and even charge a viewing fee.
Frumps | OIG: Encrypted non-fungible token (NFT) trading market😍 This is huge!
Does NuLink have a token and what is it used for?
David JIAO: Great question
NuLink’s token symbol is NLK. The total supply of NLK is 1 billion and it will be generated in two stages: pre-allocation and stake mining after the mainnet launch.The pre-allocation of NLK can be classified into four categories: Foundation (15%), BD & Community Incentivization (20%), Core Team Incentivization (15%) and Pre-sale (20%). After the mainnet is launched, the remaining 30% of the total supply will be mined by Providers in the NuLink network within four years. After four years, the new mining rules will be determined by the on-chain governance mechanism (DAO) maintained by the community.
In the NuLink network, NLK tokens have the following main functions. They will be:
1. Used as the staking collateral for different kinds of Providers (Proxies, Watchers, Computing Providers, Storage Providers). Providers need to stake NLKs in the NuLink network to provide services and obtain benefits. Meanwhile, they will bear the risk of NLK slashing in the case of a penalty.
2. Used as the staking benefits for different kinds of Providers (Proxies, Watchers, Computing Providers, Storage Providers). If the Providers provide proper services in the NuLink network, they will be rewarded with NLKs.
3. Used as the NuLink network’s service fees. Users in NuLink who want to use the service (secure data storage, secure data sharing or secure data computing) need to pay fees to the corresponding providers.
4. Used in the election and voting of the on-chain governance mechanism (DAO). NLK is used to vote on proposals.
Frumps | OIG: Great utility! Great reason to hold the token!
Can you briefly describe the architecture of NuLink?
The NuLink network integrates the Application Layer, the Cryptograph Layer, the Storage Layer, the Blockchain Layer and the Watcher Network:
1. The Application Layer: The Application Layer is an abstract interface layer that directly interacts with the application. The Application Layer also needs to interact with the Cryptograph Layer to grant authorization of the application’s privacy data.
2. The Cryptograph Layer: The Cryptograph Layer is an entity that handles cryptographic operations on behalf of the Application Layer. The cryptographic operations include key generation, encryption, decryption, etc. The Cryptograph Layer also needs to connect to the Storage Layer and is responsible for uploading and downloading the encrypted privacy data.
3. The Storage Layer: The Storage Layer is a storage network that can be used to store encrypted privacy data. Currently, we support IPFS (InterPlanetary File System) as our decentralized storage network. Other storage networks such as Swarm and S3 will be available soon.
4. The Blockchain Layer: The Blockchain Layer is the blockchain system that can handle the proxy registration and re-encryption request management. Currently, proxies can register in Ethereum only. However, the user could send their requests to other blockchain systems such as Polkadot and Solana.
5. The Watcher Network: The Watcher Network is a relayer network that relays the information of proxy nodes from Ethereum to other blockchain systems. The Watcher Network will be maintained under an on-chain governance mechanism (DAO) to guarantee its decentralization and security.
Frumps | OIG: Excellent stuff, clearly your team and project is technically advanced!
Can you explain the relationship between NuLink and NuCypher?
David JIAO: NuLink is an independent privacy project. It got official support from NuCypher when the project started. Our team cooperates with the NuCypher team both in Technology and Business Development.
Here I want to cite a comment from Maclane(The Co-founder of NuCypher) to explain the difference between NuCypher and NuLink. “I’m excited to see NuLink bring NuCypher/Threshold’s proxy re-encryption and other privacy-preserving technologies to smart contract platforms beyond Ethereum. Cross-chain interoperability is both one of the hardest technical problems and alluring siren calls in the blockchain space. The NuLink team is well-positioned to execute on making this dream a reality and I’m happy to support them in that quest.”
Frumps | OIG: Great to have this clarification!
Do you have community incentive activities such as airdrops?
David JIAO: Yes, we have 20% tokens reserved for all kinds of community incentive activities, please feel free to join our community.
Frumps | OIG: I recommend to OIG community to join the NuLink channels and become part of this amazing project!
Well @DavidJiao, your answers have been amazing and very informative, its time to turn to the community Twitter questions and see what the people want to know
Community Twitter Questions
David JIAO: We have a long term roadmap to build a privacy data-sharing platform to privacy computing platform for the future. The reason we can do it is because we not only have a deep knowledge of cryptography techniques like ZKP and FHE, but also we can find tons of interesting scenarios to apply our tech.
Frumps | OIG: Great answer
David JIAO: Yes, we are trying to build these encrypted or private NFT features for players to have more usage in this niche market. It will definitely help NFT be used more widely in different platforms for gaming or cosplay or techno music or whatever. More usage modes, better price stats.
Frumps | OIG: This prospect is very exciting
David JIAO: Since some of the NuLink founders including myself have a long enterprise experience in the off-chain traditional industries such AI/Fintech/Automotive. We have a better understanding of how to help them in a way to integrate with our middleware to get data security in their software architecture.
Frumps | OIG: Your experience is going to be a massive factor in driving NuLink forward!
David JIAO: NuLink provides several cryptographic tools to ensure the security and privacy of the data, such as PRE,ZKP,ABE,FHE. Users could encrypt their data on the local side and then use the encrypted data to continue the procedure. That’s how Nulink protects the privacy and security of data by implementing endpoint safty.
Frumps | OIG: Clearly security has been considered in every aspect!
David JIAO: Oh, yes, we do have! For those who want to become an Ambassador please join our community and contact admin there. We have incentive token for Ambassador plan. Details would be released in our media soon.
Frumps | OIG: If fully recommend the OIG community take this chance and become ambassadors for your briliant project!
David JIAO: Thank you!
Frumps | OIG: Well @DavidJiao this about sums up our time here at the OIG Main Stage!
Are there any final words you would like to leave with our community?
David JIAO: Welcome to join NuLink communities.
Thank you for everyone!
Frumps | OIG:
Thank you @DavidJiao, your answers have been amazing and very informative and thank you to the OIG community for your support as always