Blockchain protocol

White Paper en


ENDO is a Blockchain, a protocol and various data verification services. The Ecosystem of the ENDO protocol creates a decentralized environment for verified data. Data that people and robots will be able to trust: remotely, instantly, and safely.

Using the ENDO protocol, you can create private and public Blockchain, configure levels of access to information, the conditions for data exchange between different organizations, and depersonalize and protect data.

On the basis of the ENDO protocol, applications have been created that allow the transfer of paper documents with ink signatures to digital ones; a person can receive a digital certificate of their identity; brand things to create a digital passport of authenticity.

Anyone will be able to create their own applications based on the ENDO protocol as early as the beginning of 2019.

The ENDO Ecosystem allows organizations and users to participate in the information exchange process and use the services with the ENDO token.

All ENDO applications and products have one goal - to create a single, secure and certified environment for any type of data.

Now you can manage your personal, corporate, and public information about achievements, awards, indicators, transactions, etc., using the ENDO platform. By your consent, the platform provides secure access to your stored information to third parties.

The Alpha version of the first ENDO-based application is already operational and is currently used by large training organizations, transport companies and universities in Russia. At this stage of development, the following basic functions are available in the Alpha version: creation and publication of documents in the test network, cancellation, distributed document acknowledgment, owner addition and sharing, open API and OAuth for integration with institutions.

History of data

Living with information

Throughout life, people accumulate large amounts of information about themselves: certificates of various kinds, diplomas, and accounts. This concerns not only personal data, but also commercial documents: delivery of cargo to warehouses, orders, contracts, agreements, as well as acts and declarations.

When we store important data on paper, the consequence of this becomes the fragility and rapid wear and tear of documents. In addition, documents can be tampered with, which leads to negative consequences. A common example: the forgery of diplomas to obtain the desired job function.

However, the traditional storage of documents is still the most common way of combining personal information and identification.

Importance of Verification

The rapid growth in the number of smartphones and other mobile devices has led to the fact that many of us work through the Internet. We are less likely to meet with clients face to face, and this requires the invention of new ways to verify their identity. In a highly competitive market, the ability to quickly and reliably verify and verify the identity of customers and partners is of great importance. Attracting new customers, along with the need to control the risk of fraud and maintain a stable level of operational efficiency is a difficult task.

Each new document opens up new opportunities: having received a fake diploma, one can claim a higher salary; having received the necessary signature, one can hide shortcomings in work. The higher the stakes, the stronger the desire to forge the document, which leads to violation of law, and results riots.

In addition, when you change or zero the document, the old version remains on hand. It can be used for its own purposes where there is no access to the database. For example, if you lose your rights, they remain in the hands of the driver. They can be traveled freely in other countries, because now there is no single database in the world.

In the age of modern technology, where you can forge any seal and signature, we still have to trust the paper, because there is no worthy alternative.

The ENDO protocol, which uses built-in Blockchain technology, automatic data reading and document integration, will help protect companies, institutions and individuals from fraud.

Example usecases


Universities and educational institutions can give diplomas to graduates using Blockchain Technology. To get a job, recent graduate needs to collect and bring to the personnel department several documents to make sure that the documents are real and valid, which takes a long time. Moreover, this does not always work out.

With a diploma stored in the ENDO protocol, it is enough for the competitor to open the access to the personnel officer.

In addition, all documents will be safely stored and will never be lost due to the technology of decentralized storage. All working documents that require certification or confirmation, with the help of Blockchain, can be easily verified by an electronic signature.

The ENDO Blockchain-protocol will create benefits for all - teachers, secretaries, students, even officials. No diploma can be faked, the institution will have full rights to publish the documents, and any third- party data entry is simply ruled out. The diploma itself, published on Blockchain in public or restricted access, will have the same legal status as its paper equivalent - it will always be at hand, never break or get lost.


The banking sphere finds over 25 ways of using Blockchain Technology. Nine of world's largest banks, including Barclays, JPMorgan, Goldman Sachs, and Credit Suisse, have already signed partnership agreements with Blockchain companies.

The ENDO Blockchain Protocol allows for:

• Fast and safe transactions;

• Tracking of credit history. This is done using a single synchronized access system, where changing the status of the loan is instantly displayed in the system;

• Concluding of automated smart contracts.

In addition, the ENDO Blockchain Protocol supports FATCA and AML / KYC processes.

Any user can track their transaction on the Blockchain - this makes the system transparent. The program code is protected from manipulation, and the creation of copies of records on different computers allows you to quickly prevent falsifications.


The market is growing, many new directions are opening up: car-sharing, online credit services, crypto-exchanges. All this becomes a fertile ground for hackers and other scammers. Increasingly, we are faced with the need to verify your identity online. On the one hand, some users do not know how to properly manage their data: to whom it can be sent, and whom it's dangerous to do so. On the other hand, a photo with a passport can easily be faked.

The most relevant trend today, which supports all top-end cryptographic exchanges, is the creation of decentralized exchangers. The security of such sites will ensure not only the absence of a single control center, but also the advanced KYC procedure.

The ENDO Blockchain Protocol can offer a really advanced, convenient and reliable KYC. The thing is that our KYC is fully automated and the answer comes in a few minutes. ENDO has developed a document verification system that will not pass (allow) a fake passport from the Internet. Each person can create only one account.

Document Flow

ENDO provides a solution for companies that will help to systematize and secure the workflow - a private, encrypted Blockchain, which only trusted persons can access. Documents can be synchronized in digital format and verified with the help of Blockchain. Request and get the act, contract and invoice can be in a very fast time. Employees of organizations will be freed from a huge amount of "red tape", and the effectiveness of electronic document management will grow.

The exchange of structured data in digital format allows to automate the interaction between IoT devices. For example, verification of processes within the supply chain, reduces transaction costs that arise from the provision of knowingly false data. ENDO guarantees the invariability of information coming from different sources.

HR & Employment Records

ENDO creates a worldwide database of factual information about the history of candidates from the personnel department of organizations, acting as an extension of HR. ENDO will check and confirm information about newly hired employees to avoid, for example, providing an organization with fake university degrees.

Often, applicants exaggerate their services to employers or even mislead them regarding their previous work experience. And since information is recorded on paper, it is very difficult to verify its authenticity, and sometimes it is impossible. Therefore, companies have to waste time and money, hiring unsuitable candidates.

This problem is solved by the employment record on the ENDO Blockchain Platform. It stores all data about the previous places of work of a person - positions, working periods, as well as professional efficiency and effectiveness. If you want, the employer can leave a comment about the ex- employee here. It is important that this comment cannot be changed or deleted. Thus, the new recruiter will be relieved of the need to check anything - he will be able to see a full picture of the applicant's experience in just a minute.

Medical Institutions

ENDO has a solution for medical organizations - a digital equivalent of a medical card, accessible only by the patient and the doctor. All records of the methods, test results and treatment history are updated and synchronized in real time and always available. They cannot be faked in order to write out a fake prescription or health certificate. In the case of an erroneous diagnosis and treatment, you can quickly find out who made a mistake.

Within a few seconds the doctor will be able to obtain information about the patient's state of health. There is no need to take many new tests: the history of the disease will not be lost.

Effective interaction with insurance companies is extremely important for medical institutions. Smart contracts will allow you to get rid of a bunch of documents and approvals: after providing the service to the patient, the money will be transferred to the hospital account in an automatic mode.

In the future, this will allow for development of telemedicine: remote diagnostics and treatment in regions where there is no full-time access to highly qualified specialists. It will be safe and quick to share experiences and lessons with foreign colleagues to find new methods of treatment.

High-Value Goods

Every year, Rolex produces about a million watches. Each specimen receives a special certificate, issued by the Swiss Chronometer Test Institute. In addition, every year in the underground factories of Southeast Asia , another 40 million Rolex watches are produced. Such data for 2010 were published by the Swiss Customs Service. Pirates cause the brand significant damage - last year it amounted to 600 million dollars.

With the help of ENDO, it will be possible to distinguish the original from a counterfeit, and manufacturers will be able to track the way of each product to the customer.

The technology for protecting the authenticity of goods is somewhat similar to the protection of crypto-currency wallets. The manufacturer places on the products special NFC-chips, which update the identifier of authenticity, written on the Blockchain, after each scan. In the same way, the security of crypts is achieved: after each transaction, a purse appears with an additional address, the use of which increases confidentiality. Here, by updating the barcode, we provide protection for the original NFC chip printed on the product. The Blockchain will know that it has already been changed - and it will not be possible to use it to create fakes.


ENDO can be used to verify customer data. This type of service helps in checking customer data related to the product and services that are required for demographic or marketing research. Customer data in these cases should be checked for accuracy to prevent adverse statistical scenarios. The names, addresses of residences and e-mails, etc., must be verified, to confirm that the transaction was authorized by the client. Because customer data is subject to change (wedding, relocation, death), it is important that the data is effectively processed and updated regularly.

Some more facts

  • 5 million driver's licenses are bought in Russia annually
  • Up to 1 million counterfeit MTPL policies are sold annually
  • 13 million US Americans are living with forged passports
  • 3 million migrants in Australia work on fake documents
  • Up to 32% of US high school students have falsified identification documents for the illegal purchase of alcohol or cigarettes
  • According to international court statistics, however, the share of convicted persons for the forgery of documents of state sample does not exceed 10%

Sources: For Insurer , Bankrate , ElonNews

With the help of ENDO, you can check the authenticity of almost any kind of information: brands, manufacturers of medicines and food, documents, including passports, driver's license, employee photos, visas. ENDO is an excellent tool for the verification of international accounts using several of the most proven data sources, allowing you to quickly verify the identity of the client - even on the basis of minimal information. On the one hand, ENDO automates processes and saves time and money, and on the other - allows to be confident in the competencies of new employees, improves the quality of service, successfully fights against scammers and reduces the level of risks.

Data exchange

Companies that aggregate data sell their personal information to their customers, often with marketing goals. Data brokers store every bit of information, such as Internet activity, mass recording of operations and personal data, for example, the date of birth, as well as preferences when choosing books, films, etc. Various enterprises search for this information to identify target segments. Data brokers help companies in the analysis of the consumer model, providing them with important information about customers. This, in turn, allows organizations to better plan marketing strategies and identify potential customers. It is expected that the above factors already in the near future will create profitable business opportunities for data brokers.

A recent report published by Transparency Market Research (TMR) shows that the global data broker market will show a CAGR of 11.5% during the forecast period (2017-2026).

There are also companies that sell deliberately false data, and on their basis false conclusions are drawn, fundamentally wrong decisions are made. This, of course, hinders the development of the market as a whole.

Do not forget that in each country their own rules and laws on the regulation of processes with personal data. In Europe - the GDPR, in Russia the Federal Law "On Personal Data". Differences in the legal systems of states make the exchange of data between organizations in different jurisdictions very difficult, and in some cases impossible. Endo implements a data exchange system that allows companies to interact without violating the laws of any country.

Today's Issues

  1. Centralization - risk of data loss if the central server is broken / hacked.
  2. Inconvenience of storage - in a large stream of unstructured data it is easy to lose the necessary document.
  3. Modification or deletion of information - without encryption and decentralized confirmation, the information is not protected from replacement, modification, or deletion.
  4. Verification - the verification process differs by volume and type of data; each agency has its own mechanism for verifying information, different deadlines, different methods and places for filing documents, which leads to unnecessary costs.
  5. The absence of a single convenient data source - even if the information is confirmed and easily verified, the data is transmitted in completely different channels and collected from different sources is quite laborious; information is not standardized, which complicates its use.
  6. Data exchange between countries is rather complicated due to the need for translation and apostille assurance.
  7. Manufacturing and protection. Today, documents, securities, certificates are protected using bar codes and holographic protective elements (HPE). The process of their production is expensive and time-consuming, but a HPE does not guarantee the necessary protection. The case of Microsoft, which attempted to protect its software products with "a new, non-copiable embossed hologram," is widely known. Already two months after the release of such holograms, pirated copies of programs with holograms visually indistinguishable from the originals appeared on the market.
  8. Ecology. In addition to cutting trees for the production of paper, an important environmental problem in pulp and paper mills is the use of sulfate and sulfite technologies in the cooking phase, as well as the use of chlorine and chlorine compounds in the bleaching stage. With the introduction of Blockchain Technology, you can significantly reduce the amount of paper produced, which will positively affect the state of the environment.
  9. Unnecessary consumption of resources. Companies and governments spend unnecessarily much natural resources, but also financial ones. With Blockchain, there will be no need to keep a large staff of accountants, lawyers and secretaries, since there will be no need for much of the paperwork.

Distributed Registry Technology

Blockchain technology enabled companies to supply more reliable systems for verification and data management. Distributed registry technology can provide an easily accessible tool that can improve business processes of data exchange, asset management, system state changes.

Cryptographic algorithms prevent the appearance of false information between the participants in the event that it falls into the hands of scammers.

These functions allow companies to maintain the security of confidential commercial / personal data and at the same time to be efficient and easily manageable, for example, medical or financial institutions.

System Implementation


Business Challenge

ENDO is a set of subsystems that interact with each other to fulfill the set business objectives:

  • Increase the level of trust in important data.
  • Reduce the likelihood of counterfeiting data.
  • Ease of access to data.
  • Decentralized model of data access.
  • Flexible and convenient control of data exchange.
  • Create a standard ontology for different types of data for typing and simplifying the exchange.
  • Single source of data monetization.
  • Ability to control access to the user's own data.
  • Ability to influence the preservation / deletion of user's own data from companies.
  • Ability to monetize user's own data.


The set business tasks form the requirements, the fulfillment of which is obligatory for solving the problems:

  • Data must be encrypted at all stages: only the issuer and the data owner must have access to data management.
  • The verification task and access control should be carried out in a decentralized manner to ensure a proper level of trust.
  • The system capacity must be high, because potentially the market of important data has a larger volume.

Subsystem Architecture


ENDO Protocol is a set of rules, algorithms, and business process logic, describing the interaction of subsystems among themselves. The ENDO protocol regulates the overall interaction between network units, allows them to communicate securely and transfer data among themselves. ENDO Protocol describes the following entities and processes:

  1. Data verification.
  2. Hashing, data encryption.
  3. Algorithms for providing access to data.
  4. Cryptography The cryptography used to protect data, and the interaction between applications.
  5. Structure of the open and closed software interface.
  6. Ontology of the data.
  7. Structure of data storage, the structure of interaction with local and cloud storage.


A unified model of data representation and adaptation of this model to the main entities in the applied cases is implemented. Models are needed to realize the possibility of more complete interaction and data management. Each object that appears in the system has a model. All models consist of:

  1. meta-information (issuer, owner, model creation date, serial number):
  2. the hash of the object's body.

In addition to unified models, narrowly-focused variants of abstraction models are implemented to operate various uses. Models solve specific problems of representation of data types and their contents. The task of modeling is to realize the possibility of maximum automation of processes, such as:

  • the interaction of data types between different applications of the system,
  • communication model and data type.

As a result, the degree of influence of the human factor is reduced, allowing applications to communicate automatically on the basis of automation and algorithms, which leads to the preservation of system stability.


Blockchain is an important link in the system and contains data and logic that require a high level of trust. Since, from the point of view of the cost of storage and data processing, Blockchain is an expensive solution, it is necessary to select the minimum required set of tasks to ensure the proper level of trust.

Necessary tasks

1. Data verification, storage and creation of hashes of data.

2. Authentication of users and companies.

3. Storing of open data of applications and companies (application identifier in the network, open documents about the company owner, etc.).

4. Managing tokens and their transactions.

5. Decentralization of the logic and data of the scoring system.

6. Ensure the download and execution of custom smart contracts.

Characteristics and properties

ENDO Protocol can be implemented on the basis of any platform that is able to solve these problems. The most suitable platform with the following characteristics and properties:

1. Low transaction costs.

2. High bandwidth with a high degree of scalability.

3. Ability to publish custom smart contracts.

4. The ability to implement a communication channel between two or more registries.

5. A model for managing economic parameters based on voting.

Algorithm of consensus and platform

The most suitable consensus algorithms are "Delegated Proof of Stake" and "Byzantine Fault-tolerant Consensus".

They have a high capacity, low cost of storage and processing. Such Blockchain platforms as EOS, Hyperledger, Corda, Exonum allow to implement business logic ENDO Protocol.

Implementation in ENDO

As a test of business cases ENDO Docs and ENDO Base, we implemented the basic part of the protocol based on the Graphene Blockchain platform. At the moment, our team is working on more narrow cases, analyzing vulnerabilities, testing the effectiveness of the protocol; implementation of the protocol based on the fork of the EOS platform as a public ENDO network, and Hyperledger as private network of organizations.

ENDO private Blockchain

The implemented protocol can be deployed as a private broker and act as a regulator of access rights, a verifier and an information transfer controller. This feature is implemented to perform narrow tasks within one or several companies. As a rule, the need for private Blockchain arises when it is necessary to be completely isolated and closed from the common network even in the case of recording hashes, transactions and users.

• The logic of the platform on a private Blockchain is similar to a public one.

• To implement a private system, you will need to deploy your own nodes to physical servers.

• Depending on the degree of decentralization and resiliency required within a private network, the number of nodes can vary.

ENDO Protocol also describes the rules for exchanging information between a private network and a public network. In the case of an exchange, the status of the transmitted data is recorded in the public network.


Objectives and restrictions

The task of the ENDO ecosystem is to organize the storage and exchange of the data itself, and not just write the hashes to Blockchain. ENDO Protocol describes the format of encryption, exchange, ownership, access control to data. There are a number of external restrictions:

  1. Part of the data is a trade secret.
  2. It is necessary to delete data by its owner.
  3. According to the laws on personal data of different countries, you must obtain permission to store and process data.


Storage of data occurs both centralized and decentralized. The owner of the application produces the storage choice.

ENDO implements interfaces for connecting to storage of different types, so that connected applications have a greater choice for solving the problem of data storage.

Data can be stored:

  1. In centralized cloud - Dropbox, Google Drive, etc.,
  2. In decentralized cloud - StorJ, IPFS, etc.
  3. On local / remote servers: connection via FTP, SSH, etc.
  4. On the nodes of the ENDO blockchain system in the decentralized storage based on IPFS.

Local storage allows you to deploy a completely private network within the enterprise. This guarantees protection from data leaks and the ability to exchange data between a limited range of agents.


ENDO Core is the foundation for all applications that are integrated with the network of Blockchain. Core performs functions that do not require a high level of trust and can be executed centrally.

ENDO Core is an open source desktop application. Core tasks include:

  • Encryption, hashing of data.
  • Receiving files from the repository.
  • Transfer files to the repository.
  • Integration with the network of Blockchain.
  • Recording and working with databases.
  • Scheme of interaction with other applications.
  • Storing data type models.
  • Providing an API for integrations.

The general logic of designing an application on a platform consists of two blocks.

The "application logic" reflects the main functionality of the application (the functional depends on the specifics of the application and can be any). The functional of the application describes the rules of working with the user and the general business idea of the application. Additional data models can also be added there.

ENDO Core is responsible for encryption and data transmission logic, communicating with the network of blockchain via API. GoApp Logic implements the merge task between the file store, the database and the API, allowing you to implement the task of linking a particular file to the repository with a record of the file in the database. GoApp Logic allows you to send data to the API on the Blockchain.


API is a program interface, a set of methods and a scheme of information exchange between ENDO and integration applications.

The ENDO platform contains 2 API groups:

1 - The API that implements the connection mechanism between ENDO Admin, MyENDO (standard applications for managing integration and user data), and ENDO Core with further sending of open ENDO Blockchain data.

2 - The communication channel between the ENDO blockchain system and the ENDO Core integration:

  1. Check application data.
  2. Application data exchange.
  3. Cooperation and communication in the application.
  4. Exchange of user data.

The application for access to the API test platform can be left here.


The application is a software product that uses an open API to implement business tasks related to data verification.

Meta applications

Meta-applications allow users and companies to create integration settings, manage them and control access to data.

ENDO Admin is the interface for creating integration, obtaining the API key, paying for platform functions, managing rules for exchanging data with other integrations. ENDO Admin is a tool for system settings for an organization. It also serves as the primary verifier of organizations in the system.

Main functions

1 - Application settings:

  1. Generation of a public-private key pair.
  2. Integration of the scoring system.

1 - Storage of encrypted data:

  1. Select a data warehouse.
  2. Connection to the storage and management of keys.
  3. Selecting the database. Connection to the database.

3 - Account verification:

  1. Download and store open identification documents and data.

4 - Data exchange parameters:

  1. Adjustment of data prices.
  2. Terms of exchange.

MyENDO is the aggregator of data belonging to a specific user. Through MyENDO, the user collects all data in a single interface, sets up rules for granting access to his data, and performs a request to delete their data from the application stores.

Main functions:

  1. Manage user data: accept / reject communication.
  2. Access to app ratings.
  3. Output of collected tokens.
  4. Configure access to data through OAuth.
  5. Request to delete user data.


Interacts via API. All applications connected to the network of the Blockchain can interact with both the network itself and with each other.

  1. All parameters are configured in ENDO Admin.
  2. Applications can communicate with each other through an integrated API. To implement specific interactions, the API can be expanded.

Application Examples

ENDO Documents

Paper documents have to be stored, numerous copies being made, and we send them by mail. They forge, damage and simply get lost.

ENDO Documents is an application created for the safe storage and exchange of documents belonging to a particular person. Documents can be easily shared with third parties by reference. The operation can be canceled at any time to disable access to the document.

Institutions create documents and bind them to a specific user. The administrators of the institution establish the rules for checking documents. For example, they can choose the number of administrators who confirm the publication of the document in the Blockchain. This mechanism provides decentralized publishing logic.


The KYC procedure is necessary for a large number of activities: registration, deposit, trade and withdrawal, investment, etc. However, different countries and different banks accept different information about the identification of a person's identity.

ENDO KYC is an aggregator of information about the identification of a person's identity. We add a large number of sources of identification data that can be used by different companies. This allows the user to provide data about their identity to different agents from the ENDO KYC interface using the "Login through ENDO" function.

Different degrees of identity confirmation have been implemented: social networks verification, online verification of the person, full-time verification.

ENDO Workflow

Businesses cannot exist without such documents as acts, invoices, bills, letters, etc. The process of using documents is accompanied by certification, signing, handing over and storing papers for a long time. The changes you make must be checked and tracked. In some countries, the paper form still has more weight than the electronic form. However, electronic documents are widely used and will soon prevail over securities.

ENDO Workflow is an application platform for B2B processes. It speeds up document validation and the sharing process. Since each business is unique, ENDO Workflow allows you to implement any options for checking, storing, sharing and exchanging electronic documents.

Open application API allows you to integrate with other software products and automated systems. For example, the supply chain verification allows to guarantee the unchanged data transferred from IoT devices to the enterprise database.

Integration of ENDO Workflow with software products popular on the B2B market such as SAP, 1C, Google Docs, allows you to verify documents without changing the usual business processes of companies.

To increase the degree of decentralization in ENDO Workflow, a multi-signature mechanism is implemented before publishing information on the Blockchain. The organization appoints the person responsible for confirming the sending of the data, setting the number of required signatures.

ENDO Legacy

ENDO Legacy is a service of confirming the authenticity of goods and products of companies (branded goods, high value goods, etc.). The service provides an opportunity to implement a system of property rights with the possibility of their further transfer.

When buying a branded item, the user will be able to verify the authenticity of the goods, and the company will be able to consolidate the purchase directly to the user.

As a result, we can see the entire "life history" of the goods, which will help to avoid buying counterfeit products and the very fact of forgery.

A valuable thing in the physical world is identified using a data store tied to things: identifier, QR code, NFC label. The problem of counterfeiting or duplicating a label is solved by double binding of data inside the label and Blockchain, which increases the cost of verification of the thing. But this reduces the likelihood of data compromise. Thus, even if 1000 copies of the chips are made, the first scan of the original, all other copies become invalid.


The ENDO Base application provides specific data that informs the user about events that occurred with the system. These can be security events, such as opening doors, detecting traffic, facts about IT products, entering or leaving the system, changing a file or even recording the temperature of an atomic reactor. Records are important and very sensitive to any changes or deletions of data.

ENDO Base is an application for checking data records based on events. It will be created mainly as a backup service with change tracking, data templates and analytics.

Data sources can be popular platforms for automation of actions, such as IFTTT, Zapier.

ENDO Reviews

Today, it is easy to see that feedback about a product does not reflect its quality. Moderators remove negative comments, poor ratings of their services and products. As a consequence, buyers have an incomplete understanding of the properties of the products. With the ENDO platform, all positive and negative comments will be visible and unchanged. And businesses and organizations, in turn, will receive real feedback. ENDO Reviews allows you to record all the reviews left on a product or service.


EToken is an internal platform token. EToken is the only means of exchange that can be used to pay for checking data and exchanging data between users of the system.

Why do we need EToken?

  1. Verification of data - the process of storing information on Blockchain. The decentralized platform is supported by nodes, respectively, a token is needed to stimulate network members to maintain the system.
  2. EToken is needed for data exchange between organizations - they set the cost of data exchange between each other.
  3. Etoken can be used when receiving services or paying for goods related to the use of verified data.
  4. EToken is used to vote for the development of the protocol and determine the economic parameters of the system.
  5. EToken is used to stimulate developers who create applications on the open Blockchain protocol of ENDO. The percentage of tokens from transactions through the application is awarded to the creator of said application.

ET Use-Cases

For Organizations

  • To verify data in a public Blockchain.
  • When exchanging verified data between organizations registered in the network.

For Users

  • The user can order a service from a provider or application on the network. Examples: pass the KYC procedure at a notary; translate the document by a professional translator.
  • When performing transactions between two network users: buying items in the store application.

In the future

In the future, if there is a lot of data, the user will be able to receive ET with the consent to share them with the companies. If we draw an analogy with the present time, Google would reward users for providing their data to advertising companies.

This will create a trusting relationship between ordinary people and corporations and will stimulate users to share their data without feeling deceived.

At the moment, information is a valuable asset. Companies earn millions on this, and ordinary Internet users do not get their share.

Token Rotation Scheme

How will the value of the token change?

To avoid the influence of high-level volatility of the value of the token, the mechanism for fixing the price of utilitarian application of the token is implemented - the price of the service is tied to the dollar. When you change the price of the token, which is determined by independent sources, the number of services rendered per one unit of the token will change. Thus, regardless of the cost of the token, this will not adversely affect the demand, and its strength on the platform will grow.


Company ENDO PROTOCOL PTE. LTD. is the first developer of the protocol and applications of the ENDO ecosystem. The company's goals do not include full ownership of resources and a monopoly on the products being developed. The company initiates the launch and development process of ENDO.

As the developer of the first public applications (ENDO Documents, ENDO KYC, ENDO Legacy, ENDO Workflow), the company receives tokens for using the functions provided by applications, as well as the percentage of transaction data exchange between applications.

The company also owns the first nodes, which support the work of public Blockchain process transactions and store information about data verification. The company's nodes receive tokens according to general rules.



The ENDO system implements a common authorization and authentication model within all applications. One account can be used to sign into any application. Authentication of users, authorization of rights is controlled by the Blockchain.


The function "Log in through ENDO" allows applications to access user information, and the user to control the access rights of applications to his data.

You can login to ENDO in two ways:

  • via a click on the authentication link using the MyENDO web application
  • by scanning the QR code using MyENDO mobile application.


Data Scoring

Accumulating and generating data, applications and their users are becoming increasingly vulnerable to unverified data. The Scoring system is necessary to make sure that personal data is optimal and reflects reliable information. Each application is a specific organization that publishes verified information, such as email addresses, phone numbers and links to accounts on social networks. The reliability of this information can be verified in a decentralized manner. The evaluation of applications is affected by the amount of information provided and the score from confirmed users.

User Scoring

Users have several levels of confirmation. Immediately after registration, the user's account is unconfirmed and is suitable for working with applications that do not require additional authentication. In the process of filling in the data, the account is assigned several statuses, depending on the amount of data. Data are divided into personal, general and social.

To fully verify your account, you need to go through the KYC procedure. The KYC procedure can only be carried out by accredited organizations for certain legal requirements. To increase the credibility of your account, a user can go through the procedure in several organizations. This is true if the user is working with services that require verification of identity around the world.

Reputational System

The concept of data evaluation and the actions of organizations / users allows the introduction of an assessment of the reputation of users on the basis of the voting procedure. Users will be able to vote for the organization. The weight of a voice depends on their reputation. Reputation is based on assessments when interacting with other users or organizations.

Encryption, hashing

All data passing through the ENDO ecosystem is encrypted using AES public/private keys cryptosystems. AES is the accepted encryption standard. It is considered reliable enough to store information containing personal data, commercial, state secret.

ENDO Protocol allows applications to use different encryption standards, because there are strict requirements for data storage within the information security policy of state-owned companies of different countries.

When data is verified, data sections are identified that identify the information unit and can be compromised: the data body, the data authorship, the data owner, the creation time. Changing any of these fields will lead to detection of compromise.

For hashing information by default, the SHA algorithm is used, with the possibility of using other algorithms for hashing information.

Data Exchange<em>Hc6nIPsTB</em>7z3AO1jvj4OdPyMJ6yxYwIXla4dkSuwAL-

Application B requests data from application A via the ENDO platform, after which the platform client downloads data from the application A storage, encrypts it with the public key of application B, and transfers it to a platform that writes them to the application store B using the platform client.

Potential vulnerabilities

Losing access to your account

Access to the account on the platform may be lost. In the case of passing the KYC procedure and linking the person to the account, it will be possible to restore access by re-passing the KYC procedure from several agents, to decentralize the process.

If the account has not been confirmed, the user is able to specify several friendly accounts, each of which can receive part of the new recovery code. After connecting the codes, the user will have access to the lost account.

Ability to upload false data

Verification provides a guarantee of invariability, authorship and loading time of data. ENDO cannot guarantee the correctness of the data loaded into the system.

To this end, ENDO tries to collect maximum information about the data issuer and display them in an open manner so that the user can make a decision about the trust in the data. This is implemented using the Scoring procedure.

Lack of adjustment when operating Tokens

Organizations that are interested in using ENDO applications are registered legal entities in a particular jurisdiction. Currently, in most countries the purchase of cryptographic tokens is not subject to regulation and is not described in the legislation.

To provide services to legal entities in the tasks of the company ENDO PROTOCOL PTE. LTD. includes the creation in different countries of a network of partners that will encapsulate the logic of payment for ecosystem services for legal entities. Thus, companies will be able to use ENDO services without interaction with tokens.

Compromising user data on the application side

When data is exchanged between applications, the receiving application technically has the ability to store, decrypt and distribute data stored in the repositories.

ENDO Protocol allows you to decentralize access to storage keys. Once the loaded storage key in ENDO Core will be encrypted using a multi-signature algorithm, with several administrators, which reduces the risk of data compromise.

Different goals for community members

ENDO Blockchain implements a system of delegated voting for economic decisions within the ecosystem. Thus, each member of the community can indirectly influence the development of the system based on the percentage of tokens in the possession.

Different roles in the system may have different goals with respect to changes in economic parameters: the cost of services, the number of unit-producer blocks, the size of the additional issue, and so on.

The ENDO team allocates significant resources for the analysis and modeling of the economic system to determine the interaction processes and parameter values ​​that will lead to balance within the system and roughly equal benefits when using the system for different agents.

At the initial sale of tokens, a limit is set for the purchase of ~ 2 million tokens, which does not allow centralizing the votes of one participant in the system.

Availability of critical vulnerabilities in the underlying platform

The ENDO team does not set goals for the development of a new type of blockchain system and for solving the problems faced by distributed registries but uses existing platforms to implement the protocol.

We conduct a platform research on vulnerabilities and performance testing. Part of the resources of the development team is allocated to the study of new platforms, which, to some extent, decentralizes dependence on a particular Blockchain.

In addition, ENDO Protocol allows you to implement anchoring of the data in public stable Blockchain, such as Ethereum and Bitcoin.

Data Security Principles

  • All stored data is encrypted; therefore, no unauthorized party can access the information.
  • Access to the data is regulated by the role system.
  • Keys from applications and data stores are released in a single copy for the owner, and the owner is responsible for the security of their storage, because the system does not store or write the key to the network.
  • When exchanging information, the platform requests data from the local platform client application that stores the access keys to the vaults.
  • The user can request the deletion of data.
  • If organizations request local storage or hashing, this can be implemented on the local platform node.
  • ENDO PROTOCOL PTE. LTD. has no control over the data.

Potential clients

  • Branch businesses. Business owners with multiple branches will be able to synchronize invoices, acts, contracts and other documents and exchange them.
  • Universities, training centers, online schools. Confirmed information about the online diploma will lead to an easier procedure for job search and will reduce the costs of checking information.
  • Real estate. The e-ownership register will allow you to check the current status of the property, see personal information about the tenant, realtor and real estate agency.
  • Reviews. Sending feedback to the Blockchain will confirm their authenticity. Reviews are stored in a closed vault; this ensures that comments cannot be edited after they are written.
  • Labor documents. Employers will be able to verify the real data about the potential employee, looking through his work history.
  • ICOs and Exchanges. Integrated KYC procedures for ICO and exchanges to speed up the registration process.
  • Travelers. Social networks, such as couch surfing, are very popular, but have a big drawback: a weak system for checking apartment owners, to which travelers come. To check the criminal history of a person regarding the security of living together with a guest, Endo can provide accurate information.
  • Taxi and car rental services. Companies can use the system of mutual tracking of all car orders, where each new order or change in it will be saved and immediately coordinated with the database on all corporate computers.
  • Banks. Tracking of credit histories can be performed using a single system of synchronized access, in which the instant change in the status of the loan is displayed in the system. The FATCA laws also apply, and the AML / KYC processes can be verified through ENDO.
  • Sports rewards. All awards are stored in a personal account and checked by sports communities.
  • Collectors and museums. ENDO Legacy allows you to verify the arts, track the history of their movement and sale.
  • Brand shops. With the help of ENDO Legacy, it will be possible to easily identify the authenticity of a brand thing, and companies will also be able to track their secondary market and make profit from it.
  • Visa centers, embassies. Coordinated communication between visa centers and embassies of countries will provide a faster confirmation of information.
  • Police and hospitals. All medical centers can have a single access to patient analyzes and medical records, where it will be possible to study all the updated health indicators.
  • Driving license and fines. A proven, non-corrupt license that will always be available for use.
  • Labor documents. Employers will be able to verify the real data about the potential employee, looking through his work history.
  • Insurance companies. Regarding the insurance segment inspection, ENDO will help insurance companies to check the information provided by customers for quick and reliable decision-making
  • Aviation. ENDO can help airlines to establish transparent document circulation between alliances. In the aviation industry, according to the Ministry of Transport, from proven to the authenticity of more than 60 thousand items revealed almost 10.5 thousand products-doubles, more than 3 thousand spare parts, for which it is impossible to determine the deadline for their operation, almost 2 thousand parts, the release of which is not confirmed by enterprises -producers. With the help of ENDO, it will be possible to avoid falsification of spare parts for aircraft and to change this, in fact, deadly statistics.
  • Agriculture. With the help of ENDO WorkFlow it will be possible to track the whole way of production from the beginning of production to the shelf in the store. This will reduce the import and sale of counterfeit and substandard products.
  • State structures. According to experts, by 2023 the Blockchain technology will be actively used in the sphere of public services by the leading world powers. Moreover, about 10% of world GDP (according to the OECD forecasts) will be created with the direct use of Blockchain technology. With the help of ENDO, it is possible to reduce bureaucratic processes, get rid of corruption, and also cadastral records on the detachment.

Development directions

  1. Increase the number of applications and organizations involved.
  2. Increase the volume of the community. Bounty extension.
  3. Issue testnet platform.
  4. Run the ENDO Base application.
  5. Launch the ENDO Legacy application.
  6. Starting the KYC application.
  7. Launch the WorkFlow application.
  8. The adoption of the platform by different states.
  9. Launch the Log application.
  10. Biometric authentication.
  11. EOS Blockchain integration.
  12. Smart EOS contracts will exist as applications on the ENDO platform.

Legal information

The purpose of this document is to provide information about ENDO to potential EToken owners. The information given here is not exhaustive and does not imply any contractual obligations. It can be viewed only as marketing information about the project. This document is intended to provide the potential holders of tokens with basic data on the basis of which it will be possible to decide on the purchase of ET.

Nothing in this document can be construed as an investment quote of any kind. This quote ET is not an offer to sell or buy securities in any jurisdiction. This document does not offer the purchase of ET to individuals and companies that do not have sufficient legal capacity to participate in token sale.

If you are not sure that you have the right to participate in the ENDO auction, you need to contact a professional legal, financial, tax or other consultant.

Participation in the sale of tokens is completely voluntary. Everyone should carefully consider and accept the terms of the agreement on the sale of tokens on the ET sales website. If you do not agree with the terms partially or completely, you should not participate in the sale of ET, and if you participate with further disagreement, ENDO will have to withdraw from the sale of ET and when buying ET.


Certain risk factors associated with the purchase, sale and use of tokens.





By purchasing tokens, owning and using them, you directly realize and accept the following risks:

  1. Risk of loss of access to tokens due to loss of private key (s), errors in the store or errors of the buyer. A private key or a combination of private keys is required to monitor and dispose of the tokens stored in your digital wallet or store. Accordingly, the loss of the required private key (s) associated with your digital wallet or token storage will result in the loss of your tokens. Moreover, any third-party person who accesses such a private key (s), including by accessing the login credentials of the wallet that you use, can use your tokens incorrectly. Any errors or malfunctions caused or otherwise associated with the digital purse or storage that you have chosen to receive and store the tokens, including your own failure to properly maintain or use such a digital wallet or storage, may also lead to the loss of your tokens. In addition, your failure to comply with the rules established for the purchase and receipt of tokens also affects the level of risk.
  2. Risk of hacking and vulnerability in the security system. Hackers or other malicious groups or organizations may attempt to interfere with the Platform or tokens in various ways, including, but not limited to, malware attacks, denial of service attacks, consensus attacks, Sivilla attacks, smurfing and spoofing. In addition, because the platform is based on open source software, there is a risk that a third party or a member of the company team may intentionally or unintentionally introduce weaknesses into the platform's underlying infrastructure, which can adversely affect the Platform and tokens, including the usefulness of tokens for services. Hackers or other malicious groups of organizations can also attempt to access private keys or other access credentials in your wallet or any other purse, storage, or other storage used to receive and store tokens. As result, tokens can be lost forever.
  3. Risks related to trade in tokens. Tokens are intended for use solely on the platform, and the Company will not support or otherwise facilitate any secondary trading or external evaluation of tokens. This limits the intended use of tokens to provide or receive the Services, and therefore may create a non-liquidity risk with respect to the Tokens that you own. Even if the secondary trade in tokens is provided by third-party exchanges, such exchanges can be relatively new and not subject to minimal or any regulatory control, which makes them more susceptible to fraud or manipulation. In addition, to the extent that third parties attribute the value of the external exchange of tokens (for example, as indicated in digital or fixed currency), such a value can be extremely volatile and decrease to zero.
  4. Risk of uninsured losses. Unlike bank accounts or accounts in some other financial institutions, tokens are not insured unless you specifically receive private insurance to insure them. Thus, in the event of a total loss or loss of utility value, a state insurer, such as the Federal Deposit Insurance Corporation, or private insurance organized by the Company, will offer assistance.
  5. Risks associated with the uncertainty or lack of regulation in most regions. The status of token management and distributed register technology is unclear or unresolved in many jurisdictions. It is difficult to predict how regulators can apply existing regulation with respect to such technology and its applications, including the Platform and tokens. It is also difficult to predict how the legislature or regulators will decide in legislation and regulations affecting the technology of distributed registers and its applications, including the Platform and tokens. Regulatory actions can have a negative impact on the Platform and tokens in various ways - by determining that the purchase, sale and delivery of Tokens is illegal activity or that tokens are an adjustable instrument that requires the registration or licensing of these instruments by some or all of the parties involved in the purchase, sale and delivery. The company may terminate activities in the jurisdiction in the event that regulations and changes in legislation or regulation render illegal activities in such jurisdiction or are not commercially desirable to obtain the necessary regulatory approvals to operate in such jurisdiction.
  6. Risks arising from taxation. The tax characterization of the tokens is uncertain. You should look for your own tax advice, which can lead to adverse tax consequences for you, including withholding taxes, income tax and tax reporting requirements. In addition, revenue from the sale of Token (including any cash that the buyer is paid for the tokens) may be levied by the company, which could adversely affect the financial resources available to the Company, the Company's business and the Company's ability to achieve its goals.
  7. The risk of competing platforms. Perhaps, alternative platforms can be installed that use the same open source code, and the protocol underlying the platform, and try to facilitate services that are substantially similar to Services. The platform can compete with these alternatives, which can adversely affect the platform and tokens, including the usefulness of tokens for receiving the Services.
  8. Risk of insufficient interest in the platform or distributed applications. It is possible that the platform will not be used by a large number of individuals, companies and other organizations, it is also possible that there will be limited public interest in the creation and development of distributed platforms (such as the Platform) in more general terms. Such a lack of use or interest may adversely affect the development of the Platform and, therefore, the potential usefulness of tokens, including the usefulness of tokens for obtaining Services.
  9. Risks related to the development and support of the platform. The platform is still in development and may undergo significant changes over time. Although the Company intends to use the tokens and platform as described and intends to take commercially reasonable steps in this direction, the Company may have to make changes to the specification of tokens or platforms for a number of legitimate reasons. In addition, the Company does not control how other participants will use the Platform, what products or services will be offered through the platform by third parties, or how third-party products and services will use tokens (if at all). This can create the risk that the tokens or platform that will be developed and maintained may not meet your expectations at the time of purchase. In addition, despite the Company's diligent efforts to develop and participate in the Platform, it is still possible that the Platform will fail or otherwise not be properly developed or maintained, which could adversely affect the Platform and tokens, as well as the potential usefulness of ETokens, including the usefulness of tokens for receiving the Services.
  10. Risk of adverse fluctuations in ETH, BTC or other coin value. If the cost of ETH, BTC or other coins fluctuates unfavorably during or after the sale of the tokens, the company team may not be able to finance the development, development and support of the Platform in the manner in which it was intended. In addition to conventional market forces, there are several potential events that can exacerbate the risk of adverse fluctuations in the value of ETH, BTC or other coins, including another DAO-type attack on the Ethereum network or significant security or market disruptions in one or more major exchange of crypto currency.
  11. Risk of liquidation of a company or platform. It is possible that for a number of reasons, including but not limited to, adverse fluctuations in the value of ETH, BTC (or other cryptographic and fiat currencies), the reduction in tokens (including their utility for receiving the Services), the inability of commercial relations or the problem of owning intellectual property, the Platform can no longer be viable or a company can dissolve.
  12. Risks arising from the lack of management rights. Since the tokens do not grant any rights to manage the Platform or the Company, all decisions regarding the Company's products or services on the Platform or the Company itself will be made by the Company at its own discretion, including (but not limited to) the termination of its products or services in the Platform, the decision to create and sell more tokens for use on the Platform, and to sell or liquidate the Company itself. These solutions can adversely affect the Platform and the usefulness of any tokens that you own, including their usefulness for receiving the Services.
  13. Regulatory risks. The company and, in addition, the Platform, are subject to various federal, state and international laws and regulations, including with respect to confidentiality and data protection, consumer protection, data security, etc. These laws and regulations, as well as the interpretation or application of these laws and regulations, may change. In addition, new laws or regulations affecting the platform may be adopted, which may affect the usefulness of tokens in the Platform. In addition, the platform participants are subject to industry laws and regulations or licensing requirements. If either of these parties fails to comply with any of the licensing requirements or other applicable laws or regulations, or if such laws and regulations or licensing requirements become more stringent or otherwise expanded, this may adversely affect the Platform and tokens, including the use token for receiving Services. In addition, changes in legislation or regulations governing the activities of the Company may adversely affect its operations. Any change in the tax status of the Company or tax legislation may affect the value of its financial assets, its business and the Company's ability to achieve its business purpose. Prospective buyers are strongly advised to consult their tax advisers regarding their specific tax situations and the tax consequences of buying Tokens from the Company.
  14. Operational risks. The company is young, and the growth of the team and its capabilities may take longer than expected, as a result of the alleged use of tokens. Tokens are just one product in a highly competitive market, and widespread adoption by other users and development of technology partners can take longer than expected. The usefulness of tokens depends on the degree of widespread adoption of the technology on the market.
  15. Risk of lack of borrowing. The success of the platform, services and tokens largely depends on the adoption of the platform, services and basic technologies by users. Perhaps users do not accept or use the Platform. Such a lack of use or interest may adversely affect the development of the Platform and, therefore, the potential usefulness of tokens, including the usefulness of tokens for obtaining Services.
  16. Technological risks. Tokens are designed to provide new opportunities, new technologies that are not fully tested in use. As technology matures, new features can significantly change the usefulness of tokens, or the possibility of using them, or selling them. Tokens functionality is complex, requires improvements and product support over time, and full functionality may take longer than expected. The full functionality of the tokens is not yet complete, and with respect to such an end, no certainty can be unconditional.
  17. Unexpected risks. Cryptographic signs, such as tokens, are a new and untested technology. There are other risks associated with the purchase, storage and use of tokens, including unforeseen risks.