Sichere & geschützte CyberVein Wallet

Übernimm die Kontrolle über deine CyberVein Assets mit vollem Vertrauen in das Trezor Ökosystem.

  • Gesichert durch deine Hardware-Wallet
  • Nutze ihn mit kompatiblen Hot-Wallets
  • Über 2 Millionen Kunden vertrauen uns
Screenshot der CyberVein Wallet-Oberfläche in der Trezor Suite App – zeigt die vollständige Integration und Unterstützung

Sende & empfange deinen CyberVein mit der Trezor Suite App

Trezor Suite App ist eine App, die für die Verwendung mit CyberVein entwickelt wurde, verfügbar auf Desktop-Computern, Internet & Mobilgeräten.
Sende & empfange

Sende & empfange

Verschieben deine CyberVein ganz einfach von jeder beliebigen Wallet oder Börse auf deine Trezor Hardware-Wallet.
Kaufe, verkaufe & tausche

Tauschen

Verschiebe, sichere & speicher dein Vermögen mit deiner Hardware-Wallet.

Trezor Hardware-Wallet, die CyberVein unterstützen

Synchronisiere Trezor mit Wallet-Apps

Verwalte deine CyberVein mit deiner Trezor Hardware-Wallet, die mit mehreren Wallet-Apps synchronisiert ist.

  • Trezor Suite
  • MetaMask
  • Rabby

Unterstütztes CyberVein Netzwerk

  • Ethereum

Warum eine Hardware-Wallet?

Gehe offline mit Trezor

  • Du besitzt 100 % deiner Coins
  • Deine Wallet ist offline zu 100 % sicher
  • Deine Daten sind zu 100 % anonym
  • Deine Coins sind an keine Firma gebunden

Online-Börsen

  • Wenn ein Umtausch fehlschlägt, verlierst du deine Coins
  • Börsen sind Ziele von Hackern
  • Deine persönlichen Daten könnten offengelegt werden
  • Du besitzt deine Coins nicht wirklich

Wie man CVT auf Trezor

1

Verbinde deinen Trezor

Verbinde deine Trezor Hardware-Wallet mit deinem Computer oder Mobilgerät. Wenn du noch keine hast, kannst du sie hier kaufen.
2

Installiere Trezor Suite App

Installiere Trezor Suite App
Lade die Trezor Suite App herunter und installiere sie für das beste Erlebnis oder öffne die Web-App in deinem Browser.
3

Übertrage deinen CVT

Übertrage deinen Coin
Öffne die Trezor Suite App, wähle dein Asset aus (aktiviere es gegebenenfalls zuerst), gehe zu „Empfangen“, lass die vollständige Adresse anzeigen, überprüfe diese auf deinem Trezor und füge die Adresse in das Feld „Senden an“ deine Wallet ein. Voilà!
4

Mache das Beste aus deinen CVT

Sobald die CyberVein-Überweisung abgeschlossen ist, kannst du deine CyberVein mit deiner Trezor Hardware-Wallet einfach und sicher verwalten, alles über die Trezor Suite App.

Trezor hält dein CVT sicher

CyberVein was founded at the beginning of a world class structure, and is a public link to open to the world. CyberVein is made to integrate the form of data economy in various aspects with the block chain technology as the core. Blockchain is the essence of a variety of technology integration into a State of a synchronous Machine (State Machine), using the characteristics of block chain technology to solve problems which cannot be solved in a traditional network. CyberVein also need to fully consider the model in the process of economics, architecture of applied mathematics, computer hardware and software technology. Its main purpose is to use the block chain technology to successfully serve the problem solving product/platform (BASS).

Through the analysis of the problems encountered in the design process of the existing blockchain technology, we also propose solutions to these problems. CyberVein is a underlying framework based on DAG and contains a programming language, the virtual machine, new smart contracts to build ecological chain system, the underlying blocks dedicated to and from the aspects of technical level and business level to solve the problem from the data value of the information age.

The business logic of CyberVein

  1. The value of passive data: passive data (such as Cookies) is not valuable in itself and only has the value to be exchanged.
  2. Definition of data exchange value: the exchange value of data needs to be defined by carrier and medium, which can be quantified to define data value and realize data transfer.
  3. The ownership of data: data is different from the ownership of the property rights and intellectual property rights. Data ownership is fundamentally to dominate the process of data, it can define the data owner distributing the data in detail, the capability of sharing, and delivered to the other party; At the same time, data ownership can also define the rights of data owners and tripartite users to create, edit, modify, share, and restrict access to data. The three characteristics of CyberVein in the design of deep understanding and mining data can only improve the ecology of data value discovery.

The technical solutions of CyberVein CyberVein has the following technologies and innovative solutions proposed by multiple analysis to realize the design goal of CyberVein. 1.A distributed ledger of DAG architecture. 2.A smart contract programming language improved by CyberVein and a database virtual machine. 3.A new consensus mechanism - PoC (Proof of Contribution) 4.A new, inter-ecological smart contract architecture. On the value of the data found in the process of using a DAG architecture of distributed books and a virtual machine with database functions, anyone can write the database and release smart contracts and Dapp, thus they can develop the data ownership of their value, data exchange format and data conversion function of rules.

CyberVein programming language and virtual machine In order to better achieve our smart contract outstanding performance, there are differences to the existing blockchain smart contracts. CyberVein will be in the development of the network at the same time, develop our own programming language Vein and Virtual Machine CBVM (CyberVein Virtual Machine). Vein language will take the Solidity as the foundation, at the same time, to improve the running mechanism with the help of some rich libraries about database operations, realize functions such as definition method call price. Vein language will help in the existing smart contract writers blockchain migration, and CyberVein will release documents to help developers get started faster. CBVM defines the data value in ecological and metastasis, and provide safe and reliable high-performance smart contracts running environment. CyberVein virtual machine in addition to used to run the smart contract, will also be a database operation system. Unlike traditional database, the database in CBVM sandbox is more like a database, and the operation of each node of the virtual machine will have independent sandbox, ensure data or use condition does not affect chain is affected.

CyberVein new consensus algorithm: Proof of Contribution CyberVein, like all blockchain technology, is driven by motivation of safe mode. In the traditional blockchain mining consensus, it is based on the choice of total difficulty of highest blocks. Miners and others to the blocks. In most of the consensus standards, only containing a given difficulty of work experience (PoW) of blocks are valid. There’s no mining mechanism in the DAG architecture because there is no miner concept. However, the existing DAG in the project before the release unit verification, most are using PoW and CyberVein will use our PoC mechanism is put forward. CyberVein contribution to prove: a response to block in the chain of the abuse of power or force concentrated and algorithm. PoC is based on the user's contribution to the network, add the appropriate hash calculation, to determine whether can win in the competition mechanism in the network. In traditional blockchain PoC can be used in the process of mining. In each have the same hash miners work force, contribute more to the network resources miners (such as he contributed more hard disk capacity, or bandwidth, or power, etc.) will have smaller hash difficulty, so as to have more chance to beat competitors in the probability, acquired the right to the manufacture of new blocks. In the DAG, when a user has more units under the condition of (he contributed more hard disk storage unit in the network), it will be more likely to reference the existing units, and obtain the corresponding fees. IOTA and Byteball projects in PoW validation of the role is mainly used to prevent the witch attacks and network to some extent abuse problems, and we believe that the use of PoC and other mechanisms, and can be done at the same time, encourage more users to participate in and contribution to the attack of prevention effect.

Communitys

Entdecke andere unterstützte Coins & Tokens

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Entdecke alle unterstützten Vermögenswerte