cthulhu white paper - ctl-storage.comctl-storage.com/uploads/ctl_whitepaper.pdf · challenges to...

33
1 Cthulhu White Paper

Upload: others

Post on 05-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

1

Cthulhu White Paper

Page 2: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

2

Catalog

Chapter I Project background ................................................ 3

Chapter II Introduction to blockchain ........................................ 7

2.1 What is digital assets ............................................... 7

2.2 What is blockchain ................................................... 7

2.3 Integration of blockchain and digital assets ......................... 9

Chapter III Project introduction ............................................ 10

3.1 Introduction to CTL ................................................. 10

3.2 CTL advantages ...................................................... 12

3.3 Characteristics of CTL .............................................. 13

3.4 Cthulhu profit ..................................................... 15

Chapter IV Technical Framework of CTL ....................................... 16

4.1 Overall architecture design ......................................... 16

4.2 Node ID ............................................................. 20

4.3 Storage dispute resolution .......................................... 20

Chapter V Application scenarios of CTL ...................................... 21

5.1 Distributed file storage ............................................ 21

5.2 Distributed file sharing ........................................... 22

5.3 Multimedia application .............................................. 22

5.4 Digital content transactions ....................................... 23

5.5 Social applications ................................................. 23

Chapter VI Ecological construction of CTL ................................... 24

6.1 Storage ecology ..................................................... 24

6.2 Retrieval ecology ................................................... 25

6.3 Application developer ecology ....................................... 26

6.4 Application service ecology ......................................... 26

Chapter VII Introduction to operation team .................................. 26

Chapter VIII Issuance plan .................................................. 29

8.1 Release plan ........................................................ 29

8.2 Issuance details ................................................... 30

Chapter IX Risk tips ........................................................ 30

Chapter X Disclaimer ........................................................ 32

Page 3: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

3

Chapter I Project background

The development and opportunity of big data distributed

storage in the digital economy is very important. 5g

communication technology is developing rapidly. Many Internet

enterprises increase their product volume, especially the rise

of some social networking sites, which leads to the

unprecedented increase of data volume.

In 2020, the Internet is also in the era of data explosion.

The word "big data" has become everyone's topic. Multimedia

data such as text, audio, video and image are also overwhelming.

With the development of technology, big data exist widely, such

as enterprise data, statistical data, medical data, mobile data,

Internet of things data and so on. In all walks of life, data

has shown unprecedented growth.

Page 4: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

4

In the face of the growing capacity, increasing types and

accelerating speed of data,huge data volume brings great

challenges to data storage.

The birth of blockchain technology has opened up a new way

for the development of software definition storage. It creates

the possibility of rethinking cloud storage and solving

industry dilemmas at the technical and economic level. First

of all, storage pooling can be realized in a broader space and

in a richer form. Secondly, the token incentive mechanism of

blockchain can drive you to contribute the remaining storage

space of enterprise storage, server, PC, mobile storage, etc.

Finally, the actual data stored in each node is just some slices

of data, and these slices are also saved in an encrypted way.

The data can be protected more safely. Even if the user who

provides the storage node has the opportunity to view these

slices, what they see is also the data segments without

practical significance. Blockchain, as a distributed business

model, has the opportunity to accelerate the development of the

distributed storage industry with the help of global resources

and talents, just like everyone's firewood. Compared with

existing cloud storage solutions, blockchain based distributed

Page 5: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

5

storage is more secure, faster, cheaper, more auditable and

more widely distributed. It creates a market that allows people

to monetize their spare storage space, and the influx of supply

in the global storage market will reduce storage prices.

Blockchain can ensure to do this in a safe, untrusted,

peer-to-peer way. From centralized storage to decentralized

storage. From centralized Internet to decentralized Internet.

We are at a turning point in history.

In short, blockchain is to synchronize the storage of all

nodes in the whole network through the storage resources of

distributed nodes, and to ensure the effectiveness of internal

nodes' changes to the storage content through the corresponding

consensus technology, so as to maintain a complete searchable

database. In this system, the storage is the change or total

surplus of the balance between the accounts generated in the

chain. Of course, some more perfect system functions also

include the data state maintenance of multiple accounts to the

sub accounts in the database. Therefore, the main function of

this system is to record the change of the state, and then

synchronize. For nodes, whether pow, POS or POC, the core

requirement is to follow specific voting rules and synchronize

new changes in the storage of all nodes. If a system uses the

Page 6: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

6

blockchain structure, it does not support the user's personal

data, or the data we want to achieve value. The data on the

blockchain is account data and settlement data, which are

stored in each node exactly the same.

Distributed storage is a kind of data storage technology.

It uses the disk space of every machine in the enterprise

through the network. These distributed storage resources

constitute a virtual storage device, and the data is stored in

every corner of the enterprise.

Distributed storage system, which can distribute data on

multiple independent devices. Traditional networked storage

systems use centralized storage servers to store all data.

Storage server becomes the bottleneck of system performance and

the focus of reliability and security, which can not meet the

needs of large-scale storage applications. The distributed

network storage system adopts the scalable system structure,

uses multiple storage servers to share the storage load, uses

the location server to locate the storage information, not only

improves the reliability, availability and access efficiency

of the system, but also is easy to expand.

Page 7: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

7

Chapter II Introduction to blockchain

2.1 What is digital assets

Digital assets refer to the non monetary assets owned or

controlled by enterprises, existing in the form of electronic

data and held for sale or in the process of production in daily

activities.

Generalized digital assets refer to the assets in the form

of electronic data owned or controlled by individuals and

enterprises, which are held in daily activities to exchange or

exercise the corresponding physical assets. In a narrow sense,

digital assets refer to the computer program (token) registered

on the blockchain distributed ledger, which can be programmed.

The exchange between assets is the exchange of code and code.

2.2 What is blockchain

Blockchain is a new application mode of distributed data

storage, peer-to-peer transmission, consensus mechanism,

encryption algorithm and other computer technologies. The

so-called consensus mechanism is a mathematical algorithm for

building trust and acquiring rights and interests among

different nodes in the blockchain system. It is essentially a

Page 8: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

8

decentralized database and serves as the underlying technology

of tokens. Blockchain is a series of data blocks generated by

using cryptography method. Each data block contains the

information of a bitcoin network transaction, which is used to

verify the effectiveness of its information

(anti-counterfeiting) and generate the next block.

In a narrow sense, blockchain is a kind of chained data

structure that combines data blocks in chronological order and

ensures the tamper proof and forgery proof distributed ledger

by cryptography.

In a broad sense, blockchain technology is a new

distributed infrastructure and computing method, which uses

blockchain data structure to verify and store data, uses

Page 9: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

9

distributed node consensus algorithm to generate and update

data, uses cryptography to ensure the security of data

transmission and access, and uses intelligent contract

composed of automatic script code to program and operate data.

2.3 Integration of blockchain and digital assets

After the digitization of resources, there are many

problems, such as piracy, privacy disclosure, illegal data

reselling and so on. The key reason behind these problems lies

in that the mechanism of data resource transaction flow,

ownership certification, rights and interests protection is

not perfect enough, which makes it difficult for "digital

resources" to form "digital assets", and the value of data is

difficult to fully show.

The emergence of blockchain technology solves the above

problems. More and more industries are proposing their own

blockchain solutions. It can play a rapid role after landing

and application. Blockchain can help digital assets further

develop and upgrade. The details are as follows:

From centralization to decentralization, build the

ecosystem of digital assets. Blockchain promotes product and

cultural exchanges in all walks of life, and no longer relies

Page 10: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

10

on third-party institutions or centralized management.

From mistrust to trust, blockchain helps digital assets to

solve the problems of fraud, duplicate payment and so on. The

operation of the system is open and transparent. Through the

mechanism of signature and the principle of minority obeying

the majority, the credit can be guaranteed. Users can view the

source of retroactive tokens at any time, and no longer worry

about risks such as counterfeiting.

From insecure to secure, information is sent from the

current node to all nodes after each transaction. When trading

again, the block will check whether the data has been tampered

through the data of other nodes, once it is found that it will

recover from the data of other nodes, effectively preventing

the hacker from tampering with the data.

Chapter III Project introduction

3.1 Introduction to CTL

Cthulhu is a chain based on the core technology of

blockchain distributed storage. It is a distributed database

that stores data on blocks and establishes through the storage

space of open nodes. It solves the problem that traditional

Page 11: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

11

distributed storage is a centralized system, stores data on

multiple independent devices, adopts scalable system structure

and uses multiple storage servers The problem of carrying

storage load and using location server to locate storage

information.

The distributed storage service platform built by CTL is

faster, safer and cheaper than centralized storage. The file

is divided into several small parts (to ensure a certain degree

of redundancy) and stored on many nodes of the network. As long

as a certain number of nodes operate normally, the file can be

safe and complete.

CTL itself ensures that users' files are stored. As a

by-product of CTL mining process, the innovative encryption

proof creates a set of useful and valuable services for

Page 12: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

12

customers. Miners are encouraged to use their hard disk space

to make money in CTL's verifiable storage market, and they will

be rewarded with the same amount: the larger the amount of

miners' storage, the more proof of interest token they will

earn.

3.2 CTL advantages

1. High performance

CTL has high-performance distributed storage, can

efficiently manage read and write cache, and supports automatic

hierarchical storage. CTL uses distributed storage to improve

the response speed of the system by mapping data in hot areas

to high-speed storage; once these areas are no longer hot spots,

the storage system will move them out of high-speed storage.

2. Support hierarchical storage

Due to the loose coupling of CTL through the network,

distributed storage allows high-speed storage and low-speed

storage to be deployed separately, or mixed in any proportion.

In unpredictable business environments or agile applications,

the advantages of tiered storage can be maximized.

3. Expansibility

CTL benefits from a reasonable distributed architecture.

Page 13: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

13

Distributed storage can predict and elastically expand

computing, storage capacity and performance.

CTL distributed storage level expansion has the following

characteristics: 1) after node expansion, the old data will

automatically migrate to the new node to achieve load balancing

and avoid single point overheating; 2) level expansion only

needs to connect the new node and the original cluster to the

same network, and the whole process will not affect the business;

3) when the nodes are added to the cluster, the overall capacity

and performance of the cluster system will expand linearly.

After that, the resources of the new nodes will be taken over

by the management platform and used for allocation or

recycling.

3.3 Characteristics of CTL

CTL regards blockchain as the underlying technology,

builds a platform to store big data, and can set up node

management, storage management, user management, license

management, business channel management, etc. To provide high

availability and dynamic expansion of the underlying services

of blockchain network for the upper business applications. In

the application layer of this platform, API interfaces can be

Page 14: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

14

built to make the use of the whole platform flexible and

extensible. Blockchain distributed storage has the following

characteristics:

1. Secure data storage

With the distributed storage of blockchain, real big data

can be stored safely. First, data is never lost. This is

especially friendly for the historical data of big data, and

convenient for the call and comparison of new and old data.

Secondly, data is not easy to be leaked or attacked. Because

the data is distributed storage, if it is attacked, it can only

get the data fragments stored in some nodes, and can not get

the complete data information or data segments.

2. Data security sharing

Blockchain can realize the storage of data, that is, right

confirmation, so as to avoid the infringement of intellectual

property rights and realize the safe sharing.

3. Data traceability monitoring

Using encryption technology, the stored data is encrypted

on the distributed storage platform. If the ecological big data

changes, the platform can record its different versions, which

is convenient for post tracking and verification.

This protection mechanism mainly uses the non

Page 15: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

15

tamperability of data to meet the requirements of data security

in all kinds of business processes using big data.

3.4 Cthulhu profit

1. Profit of shopping mall

The mall transaction itself is free and open. The mall can

charge a considerable fee to provide advertising space for

merchants, which is also a main mode of profit in the early stage.

By refining the advertising of the mall, the merchants can

accurately locate the target customers, so that the advertising

fees invested by the merchants can be recovered and the profits

can achieve a win-win effect.

More refined services can be provided and more profit space

can be obtained in various scenarios of mall transaction.

2. Investment profit

Use the existing information resources to directly invest

in products with great development potential in the industry.

3. Blockchain parent chain profit

In the development of the market, the recognition degree

and self-worth are improved. Through the transaction of various

commodities, the user population and demand increase. As well

as the impact of blockchain ecology in various industries on

Page 16: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

16

the parent chain, further realize the value growth, so as to

generate the profit of the parent chain.

4. Data profitability

(1) Market transaction data: for the collection of industry

first-hand transaction data, the trend data of the industry can

be mastered through the analysis of big data technology.

Provide data assistance to the industry and related industries.

(2) Payment data: through multiple image analysis of

payment location, time, crowd, etc., the market information is

deeply mined to provide services for enterprises that need

marketing. The platform information is pushed to the target

users, and then information feedback is obtained through users,

thus forming a closed-loop marketing.

Chapter IV Technical Framework of CTL

4.1 Overall architecture design

CTL calculates the hash value of the file as the unique

identification of the object in the system, and the fragments

generated after the file is encrypted and encoded are the object

data. The storage node stores the object data in its own storage

unit, and the super node is responsible for maintaining the

Page 17: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

17

mapping relationship between the object data and the storage

node. The storage nodes are completely peer-to-peer. Through

a set of P2P transmission protocol, the storage nodes can

transmit data to each other. As a scheduler, the super node

receives the information of the storage node and updates the

real-time information of the storage object according to the

broadcast, so that the user can quickly return to the object

location when accessing the storage object.

1. Double layer network design

CTL separates the storage and retrieval networks, improves

the network efficiency and reduces the mining threshold.

Storage and retrieval requirements for mining machines are

different. Retrieval requires expensive computing power and

energy consumption, while storage requires idle storage

resources and bandwidth resources. The separation of storage

and retrieval is more conducive to the contribution of low-cost

miner to CTL.

2. Multi chain structure (main side chain design: Multi

Chain and multi consensus)

The main chain of CTL adopts porp (copy proof) and POE

(extract proof). IPW chain provides the consensus interface and

POW, POS, dpos and other real installations. Developers can

Page 18: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

18

create and deploy their own nodes through the consensus

interface provided by the main chain. Dpos can be used for side

chains with high performance requirements and POW can be used

for those with high decentralization requirements.

3. Storage network

The essence of P2P is a new network communication

technology. This new communication technology breaks the

traditional structure, gradually becomes decentralized and

flat, so as to achieve the future trend of node equality. The

application of P2P file sharing (BTS / emules, etc.) is the most

concentrated embodiment of P2P technology. CTL is a P2P file

sharing network as the entrance, around a file network system,

its operability combined with blockchain formula algorithm to

design a new flat, decentralized cloud storage network. At the

same time, it retains the open and transparent characteristics

of blockchain.

DHT (distributed hash table) is a distributed storage

method. In DHT, a kind of information that can be uniquely

marked by key values is stored on multiple nodes according to

a certain agreement / protocol, which can effectively avoid the

whole network paralysis caused by a single failure of

"centralized" servers (such as tracker). Different from the

Page 19: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

19

central node server, each node in DHT network does not need to

maintain the information of the whole network, but only stores

the information of its adjacent successor nodes in the nodes,

which greatly reduces the occupation of bandwidth and the

consumption of resources. DHT network also backs up redundant

information on the node closest to the key word to avoid single

node failure.

There are many technologies and algorithms to realize DHT,

such as chord, can, pastry, kademlia, etc. Considering

technology maturity and market application, CTL uses kademlia

algorithm. Kademlia, also known as the third generation P2P

technology, is a general P2P protocol, which is suitable for

all distributed peer-to-peer computer networks. Kademlia

defines the structure of the network, plans the communication

between nodes and the specific information interaction process.

In kademlia, network nodes use UDP to communicate with each

other, and store data through a distributed hash table. Each

node will have its own ID, which is used to identify the node

itself and also to assist in the implementation of kademlia

algorithm and process.

Page 20: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

20

4.2 Node ID

The generation of peer-to-peer identity information and

routing rules are formulated through kademia protocol. The

essence of CTL protocol is to build a distributed and loose hash

table, referred to as DHT. Everyone who joins the DHT network

must generate their own identity information, and then they can

be responsible for storing the resource information and contact

information of other members in the network through this

identity information. If new node a needs to find the contact

information of another node B, and node a does not have the

contact method of node B, then node a can get the contact

information of node B by contacting any node that has contact

with node B.

4.3 Storage dispute resolution

In the distributed storage network, the data nodes are

scattered in the untrustworthy edge network. It is necessary

to ensure that the data are stored in the data nodes, and can

resist the witch attack, outsourcing attack, generation attack

and other cheating means. Considering the existence of

malicious nodes, the distributed storage system needs to

prevent all kinds of attacks. CTL realizes the replication

Page 21: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

21

proof (porp) and extraction proof (POE) through zero knowledge

proof (zk snark) and seal, and realizes the storage proof with

less resources and high efficiency.

Proof of replication

Storage proof is different from workload proof and equity

proof. Storage proof is a consensus algorithm used in

distributed storage field. It is based on the storage space

contributed by users to the distributed cloud storage platform,

combined with traffic, bandwidth, online time and other factors

to motivate. The proof allows storage to provide the user to

convince the verifier by providing a copy proof (π). When the

verifier issues a random challenge, it provides proof that the

proof data X has been stored in a unique dedicated physical

storage area relative to the specific copy y of the verifier.

Porp algorithm can ensure that each data storage is independent,

and can prevent witch attack, exogenous attack and generation

attack.

Chapter V Application scenarios of CTL

5.1 Distributed file storage

CTL distributed storage cloud can provide basic cloud

Page 22: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

22

storage services. Through OpenAPI, customers can easily access

and use CTL cloud storage services. Distributed storage cloud

can provide more secure, reliable and cost-effective cloud

storage services.

5.2 Distributed file sharing

The distributed shared cloud is based on the shared storage

services of the distributed storage cloud. Users can share some

of their own files (digital media or other valuable content).

When sharing, you can set a certain amount of CTL reward

requirements according to the specific content. If other users

want to be able to download or view the file completely, they

need to pay the corresponding amount of CTL as a reward to the

uploader. As a file sharing service, CTL will review and manage

the uploaded content of users in strict accordance with the

legal requirements of the operation location.

5.3 Multimedia application

At present, the traditional online video website adopts the

centralized storage service, which requires high storage and

bandwidth costs. The related costs will be converted into:

watching long-term advertisements and restricting non members

Page 23: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

23

to watch and so on. The use of CTL as storage service will

greatly reduce the redundancy of the same resources, while

saving a large number of users' bandwidth costs when playing

video, making watching video more efficient and low-cost.

5.4 Digital content transactions

Due to the use of blockchain and distributed storage

technology, CTL storage cloud is very suitable for providing

storage capacity for copyright trading of long tail content.

Distributed ledgers can provide open, transparent and tamper

proof transaction records for transactions. It can also leave

a unique and unchangeable digital signature on the blockchain

for digital content works as the identification of copyright.

With the support of CTL platform, a large number of long tail

video, audio and photography creation can have a low-cost and

sustainable trading platform.

5.5 Social applications

Use CTL technology to create a decentralized social network.

As a decentralized application, CTL network allows social

applications to work without any center point, completely

peer-to-peer.

Page 24: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

24

Chapter VI Ecological construction of

CTL

6.1 Storage ecology

Storage miners provide data storage for the network, and

they participate in the CTL operation by providing disk space

and responding to customer requests. To be a storage miner,

users need to provide storage space and bandwidth resources.

The miner stores the user's pieces of data in sectors to earn

IPW. The storage miner responds to the user's storage request

by storing data in memory at a specific time. The storage miners

generate certificates and submit them to the blockchain network

to prove that they have stored data at a specific time.

Page 25: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

25

Storage miner workflow:

·The storage miner stores the mortgage in the blockchain

to ensure stable storage to the network. The collateral exists

to guarantee the service. If the miner generates a storage

certificate for the stored data, the collateral will be

returned. If a storage certificate is not successfully

generated, the miner will lose collateral.

·Once the mortgage transaction appears in the blockchain,

miners can provide storage services in the storage market.

·Once the order matches, the customer sends the data to

the storage miner. After receiving the data of the storage miner,

the miner and the customer sign the transaction order and submit

it to the blockchain.

·When the storage miners are assigned data, they must

generate the storage proof repeatedly to ensure that they are

storing the data proof to be published in the blockchain and

verified by the network.

·After the verification, the storage miner will receive

the corresponding storage reward.

6.2 Retrieval ecology

Retrieval miners provide data retrieval services for the

Page 26: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

26

network, and they participate in the operation of CTL by

providing the data required by user retrieval requests. Unlike

storage miners, they don't need collateral, they don't need to

submit storage data, they don't need to provide storage

certificates.

6.3 Application developer ecology

CTL needs more businesses to prosper the whole ecosystem,

and corresponding application developers to manage business,

so that more storage needs come in.

6.4 Application service ecology

CTL provides users with file storage and retrieval services.

It has used various services provided by CTL through CTL

browser.

Chapter VII Introduction to operation

team

Project team members have passion, fighting spirit, dream

and ability. They adhere to the attitude of integrity,

professionalism, concentration and focus, and put all their

energy into the development of CTL. The main technical

Page 27: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

27

personnel of the project have many years of industry experience,

are proficient in blockchain and related professional

technologies, and are good at understanding the needs of

customers and transforming them into services. He has rich

experience in project management and has undertaken many

large-scale projects at home and abroad. Team members with

strong technical strength and rich industry experience to

support the growth and development of CTL.

Founder: W Erickson

W Erickson graduated from Harvard University as a PHD. Once

served as the technical director of the world's top 500

enterprises, responsible for system architecture design,

leading more than 500 engineers to develop the underlying

modules. Since October 2017, a team of uining technology has

been formed to fully invest in the project of developing the

uining blockchain.

Technical partner: Jonathan Rosenberg

Page 28: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

28

Jonathan Rosenberg graduated from Massachusetts Institute

of Technology in the United States. He is a senior software

engineer and has obtained the project management professional

certificate in the United States. He has been developing video

processing software on Facebook for 3 years. Two years ago he

turned his attention to the study of Ethereum technology. Good

at C + +, Java, solidity, web3.js, truffle framework, open

Zeppelin contract review technology. At present, he is

responsible for leading the development team to write the

platform of uining.

Business partner: David Lewis

Page 29: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

29

The co-founder of bitworld purchase financial management

is responsible for the operation and promotion of bitbuy

financial management. At the same time, he also joined the

unining team at the invitation of the sponsor. At present, he

works as a business operation consultant. 20 years of financial

and business experience can help unining understand the needs

of users, and help the marketing and user operation of unining.

Chapter VIII Issuance plan

8.1 Release plan

1. Token Name: CTL.

2. Total token issuance: 100 million.

3. Issuance rules: Based on the ETH public account book,

decentralized, tamperable, fair and open.

4. At present, the project has obtained private investment

from a number of global investment banks and funds.

Page 30: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

30

8.2 Issuance details

The total number of token issues is 100 million. private

funding 10%; founding team 10%; exchange 10%; mining 70%.

Chapter IX Risk tips

1. Risks related to judicial supervision

Blockchain technology has become the main object of

supervision in every major country in the world. If the

supervision subject interferes or exerts influence, the

application or token may be affected by it. For example, laws

and regulations restrict the use and sale of electronic tokens,

Page 31: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

31

which may be restricted, hindered or even terminated.

2. Risk of application lack of attention

Platform applications are not likely to be used by a large

number of individuals or organizations, which means that the

public does not have enough interest to develop and develop

these related distributed applications. Such a lack of interest

may have a negative impact on tokens and applications.

3. Risk of competitive expansion

There is a certain competition between blockchain tokens,

assuming that there are stronger competitors in the industry,

it will be affected.

4. Risk of related applications or products failing to meet

expected standards

In the development stage of the platform itself, before the

release of the official version, there may be relatively large

changes, or before the release, the market experienced

tremendous changes, resulting in the platform failing to meet

the expected requirements in function or technology. Or because

of the wrong analysis, the application of the platform or the

function of token failed to meet the expectations.

5. Risk of cracking

At present, the technology used can not be cracked, but

Page 32: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

32

assuming the rapid development of cryptography, or the rapid

progress of computer computing speed, such as the development

of quantum computer, or will bring the risk of cracking, leading

to the loss of tokens.

6. Other instructions

Please fully understand the development plan of the

operation platform and the relevant risks of the blockchain

industry. Otherwise, it is not recommended to participate in

this investment. If you make an investment, on behalf of you,

please confirm that you have fully understood and recognized

the terms and conditions in the detailed rules.

Chapter X Disclaimer

This document is only for the purpose of conveying

information, and does not constitute the relevant opinions of

the project. The above information or analysis does not

constitute the reference basis for investment decision-making

power. This document does not constitute any investment

proposal, investment intention or investment solicitation.

This document does not constitute or understand the act of

offering any business, nor is it a contract or promise in any

form.

Page 33: Cthulhu White Paper - ctl-storage.comctl-storage.com/uploads/CTL_Whitepaper.pdf · challenges to data storage. The birth of blockchain technology has opened up a new way for the development

33

Relevant intended users need to clearly understand the

risks of the project. Once they participate in the investment,

they will understand and accept the risks of the project, and

are willing to bear all the corresponding results or

consequences.

The operation team shall not bear any direct or indirect

losses caused by participating in the project.