Peer Mountain (PMTN) ICO Review – ICO Token News
Peer Mountain is a mobile-first distributed system of trust. It uses cryptographic protocols to allow people and institutions to create and own a trusted record that encompasses digital identity, trust relationships, and proof of activities. System members own and control their data; they decide who can access it, as their information remains inaccessible and unexposed to third parties at all times. Peer Mountain uses such powerful cryptographic protection that data stays guarded from all other entities – even the platform itself. At a more abstract level, the ecosystem allows individuals and companies to assert facts about themselves and other parties, and to attest (i.e. verify) those assertions. This is especially valuable for financial institutions as it can significantly lower the cost of Know Your Customer (KYC)-compliant client onboarding.
Solution: A Marketplace Built Around Self-Sovereign Identity
Peer Mountain uses blockchain technology to give individuals and organizations full, secure ownership of their identities, and, for the first time, enable people to safely share their self-sovereign information with organizations and each other. Peer Mountain facilitates the rapid delivery of services through its blockchain framework. Identity is a core component of Peer Mountain, but this is not an identity platform. Peer Mountain is an application ecosystem designed to facilitate the commerce and exchange of digital and physical services.
Later versions of the Peer Mountain architecture will also support organizations, enabling them to model their structure through persona delegation and attach corporate identity documents to the main corporate persona. Organizations using Peer Mountain can use delegation to demonstrate ownership and control. Peer Mountain can then provide a verifiable record of these facts that can be shared with any organization or individual with a need to know. Specific bodies, such as a commercial registry or a trade authorizing body, can implement attestation engines to validate these facts.
Peer Mountain is at the intersection of consumers who want Self-Sovereign Identity and service providers who need Continuous and Reliable Compliance and Efficient Commercial Service Delivery. Trust providers offering validation services to third parties further support the ecosystem, which reinforces itself with network effects through Trust Interoperability and Portability. Peer Mountain is the facilitating technology for the Trust Ecosystem and sits right in the middle – without requiring that any of the three interests (consumers, service providers and trust providers) make a compromise of using someone else’s platform or solution. It’s truly peer-to-peer.
Peer Mountain’s Vision
Peer Mountain’s vision is to enable each of us, whether individual or organization, to manage our real-world trust online – to choose who we trust and how we trust based on our own assessments, values, and conclusions about the world. A major technical objective is to enable rapid consumption of services that are complex, difficult to deliver, and subject to regulatory requirements. With Peer Mountain, a user can complete a typical service dossier, such as a credit card application, in under 10 minutes. A person can find a service they want, share required information, and have trusted third parties attest to that information. Then the service provider can simply provide the service, completing the exchange seamlessly.
Each Peer Mountain user maintains control of their data. They never have to leave their personal information with businesses that require identification for any longer than is required by the regulations governing the service. This means that they may no longer need to provide hotels with copies of their passports, or give rental car companies copies of their drivers’ licences and credit cards. Peer Mountain provides the platform that facilitates secure sharing and recordkeeping for all of these scenarios, effectively reducing the risk of stolen or exposed customer data.
The Peer Mountain ICO Token ( PMTN) is a utility token used to measure the value of trustworthiness within the Peer Mountain ecosystem. Consumers of trust transfer PMTN to the entities they trust the most. The only way to earn PMTNs is to be trustworthy. Individuals and enterprises use PMTNs to consume attestations and generate invitations. Because Peer Mountain technology is cross-chain capable, entities can use PMTNs to move information from one chain application to another, e.g. from Ethereum to Stellar-based Peer Mountain instances.
Peer Mountain intends to raise a minimum of 50,000 ETH to build and deploy Peer Mountain into the world’s blockchain application standard for trustworthy commerce in nearly any legally regulated environment. PMTN shall be issued and sold by Peer Mountain DCB Limited, a special purpose financial company registered in the British Virgin Islands. The Peer Mountain founders are the current beneficial owners of the structure and the governance of the assets in the structure will follow a two signature requirement for access to funds that will be implemented with a series of multi-signature enabled hardware wallets, some of which shall be kept in traditional safe deposit boxes.
If you are new in the crypto world but interested to invest ICO project then you can read ICO Beginners Guide for proper understanding.
- Jed Grant, MBA CEO, Lead Architect, & VisionaryLeader. Technologist. KYC/AML expert. 25 years of turning bold ideas into benefit-rich solutions.
- Dr. Markus Forster Data ScientistBig data expert. Complexity analyst. Algorithm designer.
- Federico Cardoso Blockchain ArchitectPioneering blockchain solution developer. Fintech visionary.
- Ignacio Althabe Blockchain DeveloperFull-stack developer, teamwork activist, open-source advisor, and blockchain evangelist.
- Joel Wealer Lead Project ManagerEntrepreneur and experienced blockchain investor.
- Gabriel Pineda Backend DeveloperSenior software engineer and architect for backend systems. Learn, improve and solve. Love working with enthusiasts.
- Florian Lagouche Blockchain DevOps EngineerBlockchain enthusiast. Automation expert for streamlining operations and processes.
- Jaime Prieto Compliance OfficerLawyer specialising in financial crime, AML, anti-corruption and counter-terrorism financing
- Pavel Pavlov Mobile Architect17 years of dedication to quality architectures and code. Multinational team scrum master.
- Stefan Vartolomeev Mobile ArchitectPassionate about system architecture and data modeling. Scales startups from zero to beyond MVP.
- Patrick Seguin Content ManagerWriter specializing in content production and management for global tech companies.
- Marc Garriga Digital MarketingBlockchain enthusiast and former Fortune 500 business manager.
- Luis Giunta Software EngineerSenior software engineer and frontend developer. Puts the UX on chain.
- Ekaterina Semeshina UI/UX DesignCreating usable and delightful web and mobile experiences.
Research on distributed hash tables (Kademlia) with personal realm based security (Kerberos) sparks the idea to design a system of trust management that works for the human scale.
Discovery of the NSA paper “How to Make a Mint”, which was first published in 1996.
Blockchain technology makes the possibility of a human scale trust system feasible and the year in which Jed’s “identity” was stolen for the first time.
Founding of KYC3 begins the journey into compliance and regulatory trust.
Office of Personnel Management informs Jed that his security clearance file has been stolen from their systems.
KYC3 inducted into Fintech Fusion.
First Peer Mountain tech spec filed as iDepot 68499 at the Benelux Office of Intellectual Property.
KYC3 selected for L’Atelier by BNP Paribas.
KYC3 completes Fintech Fusion.
KYC3 secures capital increase for March 2017.
Peer Mountain project is born, KYC3 leads and will be a service provider to the platform.
Major Swiss financial services provider agrees to co-build Peer Mountain for 3 million users and signs Letter of Intent to do so.
KYC3 achieves 2016 revenue level
Peer Mountain development begins.
German Corporation expresses intent to deploy Peer Mountain when ready with 9 million users.
Peer Mountain prototyping.
German Corporation contracts Peer Mountain technology for early deployment.
Peer Mountain exits stealth mode
Peer Mountain v1 deployment.
Peer Mountain production deployment by Swiss financial services partner.
Peer Mountain deployment to 3 million end users in Switzerland.
Peer Mountain deployment by German corporation to 9 million end users.