Carteira CyberVein segura & protegida

Assuma o controle dos seus CyberVein ativos com completa confiança no ecossistema Trezor.

  • Protegido por sua carteira de hardware
  • Use com carteiras quentes compatíveis
  • Confiança de mais de 2 milhões de clientes
Captura de tela da interface da carteira CyberVein no app Trezor Suite - exibindo integração completa e suporte

Envie & receba o seu CyberVein com o app Trezor Suite

O aplicativo Trezor Suite é um app projetado para funcionar com CyberVein, disponível para desktop, web & dispositivos móveis.
Enviar & receber

Enviar & receber

Transfira facilmente o seu CyberVein de qualquer carteira ou corretora para sua carteira física Trezor.
Compre, venda & troque

Troque

Transfira, proteja e armazene seus ativos usando uma carteira física Trezor.

As carteiras de hardware Trezor suportam CyberVein

Sincronize sua Trezor com apps de carteira

Gerencie a sua CyberVein com sua carteira física Trezor sincronizada com vários apps de carteira.

  • Trezor Suite
  • MetaMask
  • Rabby

Rede CyberVein Suportada

  • Ethereum

Por que uma carteira de hardware?

Fique offline com a Trezor

  • Você controla 100% das suas moedas
  • Sua carteira está 100% segura offline
  • Seus dados são 100% anônimos
  • Suas moedas não estão vinculadas a nenhuma empresa

Corretoras online

  • Se uma corretora falir, você perde suas moedas
  • Corretoras são alvos de hackers
  • Seus dados pessoais podem ter sido expostos
  • Você não tem total controle das suas moedas

Como CVT na Trezor

1

Conecte seu Trezor

Conecte sua carteira física Trezor ao seu computador ou aparelho móvel. Se você ainda não tem uma, você pode comprá-la aqui.
2

Instale o aplicativo Trezor Suite

Instale o aplicativo Trezor Suite
Baixe e instale o aplicativo Trezor Suite para a melhor experiência ou abra o aplicativo web no seu navegador.
3

Transfira seu CVT

Transfira sua moeda
Abra o aplicativo Trezor Suite, selecione seu ativo (ative-o primeiro se preciso), vá para “Receber,” mostrar o endereço completo, verifique-o no seu Trezor, copie o endereço no campo “Enviar para” de sua corretora. É isso!
4

Aproveite o máximo do seu CVT

Quando a CyberVein transferência for finalizada, você poderá gerenciar de maneira fácil e segura seu CyberVein com sua carteira Trezor, através do app Trezor Suite.

Trezor mantém o seu CVT seguro

CyberVein was founded at the beginning of a world class structure, and is a public link to open to the world. CyberVein is made to integrate the form of data economy in various aspects with the block chain technology as the core. Blockchain is the essence of a variety of technology integration into a State of a synchronous Machine (State Machine), using the characteristics of block chain technology to solve problems which cannot be solved in a traditional network. CyberVein also need to fully consider the model in the process of economics, architecture of applied mathematics, computer hardware and software technology. Its main purpose is to use the block chain technology to successfully serve the problem solving product/platform (BASS).

Through the analysis of the problems encountered in the design process of the existing blockchain technology, we also propose solutions to these problems. CyberVein is a underlying framework based on DAG and contains a programming language, the virtual machine, new smart contracts to build ecological chain system, the underlying blocks dedicated to and from the aspects of technical level and business level to solve the problem from the data value of the information age.

The business logic of CyberVein

  1. The value of passive data: passive data (such as Cookies) is not valuable in itself and only has the value to be exchanged.
  2. Definition of data exchange value: the exchange value of data needs to be defined by carrier and medium, which can be quantified to define data value and realize data transfer.
  3. The ownership of data: data is different from the ownership of the property rights and intellectual property rights. Data ownership is fundamentally to dominate the process of data, it can define the data owner distributing the data in detail, the capability of sharing, and delivered to the other party; At the same time, data ownership can also define the rights of data owners and tripartite users to create, edit, modify, share, and restrict access to data. The three characteristics of CyberVein in the design of deep understanding and mining data can only improve the ecology of data value discovery.

The technical solutions of CyberVein CyberVein has the following technologies and innovative solutions proposed by multiple analysis to realize the design goal of CyberVein. 1.A distributed ledger of DAG architecture. 2.A smart contract programming language improved by CyberVein and a database virtual machine. 3.A new consensus mechanism - PoC (Proof of Contribution) 4.A new, inter-ecological smart contract architecture. On the value of the data found in the process of using a DAG architecture of distributed books and a virtual machine with database functions, anyone can write the database and release smart contracts and Dapp, thus they can develop the data ownership of their value, data exchange format and data conversion function of rules.

CyberVein programming language and virtual machine In order to better achieve our smart contract outstanding performance, there are differences to the existing blockchain smart contracts. CyberVein will be in the development of the network at the same time, develop our own programming language Vein and Virtual Machine CBVM (CyberVein Virtual Machine). Vein language will take the Solidity as the foundation, at the same time, to improve the running mechanism with the help of some rich libraries about database operations, realize functions such as definition method call price. Vein language will help in the existing smart contract writers blockchain migration, and CyberVein will release documents to help developers get started faster. CBVM defines the data value in ecological and metastasis, and provide safe and reliable high-performance smart contracts running environment. CyberVein virtual machine in addition to used to run the smart contract, will also be a database operation system. Unlike traditional database, the database in CBVM sandbox is more like a database, and the operation of each node of the virtual machine will have independent sandbox, ensure data or use condition does not affect chain is affected.

CyberVein new consensus algorithm: Proof of Contribution CyberVein, like all blockchain technology, is driven by motivation of safe mode. In the traditional blockchain mining consensus, it is based on the choice of total difficulty of highest blocks. Miners and others to the blocks. In most of the consensus standards, only containing a given difficulty of work experience (PoW) of blocks are valid. There’s no mining mechanism in the DAG architecture because there is no miner concept. However, the existing DAG in the project before the release unit verification, most are using PoW and CyberVein will use our PoC mechanism is put forward. CyberVein contribution to prove: a response to block in the chain of the abuse of power or force concentrated and algorithm. PoC is based on the user's contribution to the network, add the appropriate hash calculation, to determine whether can win in the competition mechanism in the network. In traditional blockchain PoC can be used in the process of mining. In each have the same hash miners work force, contribute more to the network resources miners (such as he contributed more hard disk capacity, or bandwidth, or power, etc.) will have smaller hash difficulty, so as to have more chance to beat competitors in the probability, acquired the right to the manufacture of new blocks. In the DAG, when a user has more units under the condition of (he contributed more hard disk storage unit in the network), it will be more likely to reference the existing units, and obtain the corresponding fees. IOTA and Byteball projects in PoW validation of the role is mainly used to prevent the witch attacks and network to some extent abuse problems, and we believe that the use of PoC and other mechanisms, and can be done at the same time, encourage more users to participate in and contribution to the attack of prevention effect.

Comunidades

Explore outras moedas & tokens compatíveis

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Explore todos os ativos compatíveis