Hello to the Enigma community! Today we have some exciting news concerning our privacy protocol and some new partners.

If you’ve followed our project for some time, you know that we care deeply about building real decentralized solutions and scaling their adoption. There are two critical components to this mission: nurturing a strong community, and working with the best partners. Today, we’re very excited to share some new information about both by introducing the very first Enigma Launch Partners.

Enigma Launch Partners are working directly with our development team to integrate our protocol into their own impactful, groundbreaking solutions. Each one is a talented team building a key product for our decentralized future. Crucially, these are not simply proposed collaborations — we are already working together to implement Enigma’s privacy-preserving capabilities into their products. As you will see below, we have already scoped out the technical integrations with each partner and they have begun building with the Enigma testnet.

These partners are also helping us develop Enigma’s “building blocks,” or libraries that other developers can use while building on their network of choice (such as Ethereum) that can be used as foundational pieces of their solution. For each partner, we’ll outline below how we’re collaborating.

By implementing Enigma’s protocol, these projects are strengthening their own world-changing products and platforms and helping build a more powerful decentralized ecosystem. Enigma and our partners believe that a commitment to collaboration and openness are essential to building and scaling a more decentralized future — one that works better for everyone.

Read on to see who is working with us and how they are building on Enigma!

Who: Ocean Protocol is a decentralized ecosystem aimed at unlocking data for AI consumption. To facilitate this, the Ocean ecosystem will provision data assets and associated services along with AI models for the creation of orchestrated solution supply chains that can be both verified and privacy preserving.

How: For many use cases, the ability to supply private, verifiable compute within a data services supply chain is paramount. Given the complementary nature of the two projects, plus the shared collaborative mindset, Ocean and Enigma feel compelled to work together. As one illustrative case, Ocean uses Token-Curated Registries (TCRs) to maintain registry of high-quality datasets through voting. Privacy is critical to protect the confidentiality of voters and prevent potential attacks. As an initial step, we will be integrating Enigma’s private voting into our work on TCRs at Ocean.

Who: Datawallet is a decentralized consumer to business (C2B) data exchange. Datawallet empowers individuals to derive value from the data they create and provides companies with best in class analytics based on a completely new data universe.

How: Datawallet is using Enigma to create a tool for sybil prevention, utilizing users’ social data without revealing this data to any third parties. Self-sovereign data is a crucial part of formulating a self-sovereign identity. This method bootstraps identity using existing social media profiles to prove a user is not a bot, while keeping the user’s social data completely private from all parties.

See Technical Integration Diagram here.

Who: Colendi is a decentralized credit scoring and microcredit protocol which uses blockchain technology to deliver/provide innovative credit scoring and a universal financial passport that serves as a bridge between lenders, merchant, and unbanked/underbanked microfinance borrowers globally.

How: Colendi is focused on the decentralized credit building block, integrating Enigma’s secret contracts into their credit protocol in order to store relations between data providers and users, securely run algorithms over user data, and perform machine learning tasks. You can read more about this integration on Colendi’s blog.

See Technical Integration Diagram here. Blog post here.

Who: 2key is re-inventing the link. Our protocol fuses blockchain with HTTP, allowing smart contracts to be played out from web links, embedded with groundbreaking multi-step tracking technology and automatic rewarding. We’re using this innovative technology to build the 2key Network — a decentralized platform that empowers anyone to create smart links that incentivize and fairly reward anyone who shares them.

How: 2key’s multi-step tracking links automatically track anyone who shares them by their cryptographic address and accordingly build referral chains. Some information in the 2key contracts is business or user sensitive information. Working with Enigma, we are creating a building block that encrypts specific inputs to the contract and facilitates role-based or user-tailored access to data submitted to the contract, over the course of the referral chain. Privacy in 2key contracts is crucial, as it enables participants to safely input sensitive personal or business information while ensuring other participants can verify data integrity and contract outcomes without compromising the data itself.

Who: Eximchain is creating the first privacy-focused, publicly available, enterprise-ready blockchain ecosystem for global supply chain. Founded in MIT in 2015, Eximchain has built team and client relationships across three countries.

How: Eximchain is working with Enigma to enable a novel supply chain finance use case by leveraging Enigma’s secret smart contracts. Eximchain is creating a decentralized way for borrowers to secure the best rates given their credit profile, while maintaining ownership and privacy over their data throughout. Companies in global supply chain will be able to leverage on-chain behavior as proof of business history to underwriters, helping to address a $1.5 trillion global trade finance gap, 74% of which comes from small-and-medium-sized enterprises (as estimated by Asian Development Bank in 2017).

See Technical Integration Diagram here.

Who: Datacoup provides apps and tools for individuals to reclaim control of their data and monetize it through a blockchain-based data marketplace. Such data includes demographic, purchase history, search and browsing, fitness, social and other data-sets.

How: Narrowing or filtering data is a necessary precursor to deriving value or insight from any dataset. However, filtering from a dataset that includes sensitive personal data is not simply a perfunctory requirement, it is the key means of separating potentially de-anonymizing metadata from the relevant data to be computed upon. The hedge funds and market researchers that we target as early users of the Datacoup system intend to analyze aggregate datasets and do not want to handle PII for legal or compliance reasons.

This building block, searching over encrypted metadata, shows how sensitive data stays unexposed and desired outcomes are achieved by the interested parties. Being able to search over encrypted metadata provides a way for data requesters in our marketplace to buy only relevant data. To do this, users first query from a data-set based upon narrow parameters (metadata), then compare the metadata with the dataset to determine relevancy/match in a trusted environment, which returns a list of relevant data fields for the specific query. This process is executed while maintaining the privacy of sensitive user data.

See Technical Integration Diagram here.

Who: ReBloc is a decentralized real estate data marketplace. We allow parties to transact directly and freely, without the need of marketplace middlemen, and with unprecedented levels of data quality.

How: ReBloc makes it possible to buy and sell real-estate data with confidence from exponentially more stakeholders, from the largest insurance company to the smallest broker or homeowner in our decentralized marketplace. However, as a result of blockchains’ inherent transparency, it presents us with a new, key challenge — keeping the raw data private. This is important to prevent the data sold from being leaked to any third party (other than the buyer).

We’re excited to collaborate with Enigma on secret validation, a building-block we think can be useful to many future applications. Secret validation enables a user to purchase data with confidence, using “data validators” to check the accuracy of the underlying data without exposing it on-chain. With data integrity guarantees, consumers no longer need to rely on the incumbent, trusted data providers, opening up the data validation market to a wider range of data providers.

See Technical Integration Diagram here.

Who: Portal Network is an incentivized and fully-decentralized platform that provides blockchain protocols and projects with blockchain name service (BNS) governed by smart contracts. In addition to our BNS technology, Portal Network has developed a product suite which allows both technical and non-technical users to create, deploy, and experience decentralized websites and applications.

How: Portal Network will be deploying Engima Name Service (ENGNS) utilizing a design for secret auctions. This design will enable user to bid for a domain name with encrypted bid, and non-winning bid will not be unsealed. Further, Portal Network will also be testing the potential of using secret auctions in its decentralized BNS marketplace for cross-chain bidding.

See Technical Integration Diagram here.