Powered by $CashApp























Consensus











Tap to Switch the Burner on and off










Welcome to Trade!


DSU Sender Node

Sending DSU?


Example:
....4a3ppi4c4e681_.dsu.html






DSU Officiator Node

Recieved DSU?


Example:
....4a3ppi4c4e681_.dsu.html





Overview






USER PRIVACY POLICY

None of the personal information provided by the user is stored directly or indirectly on the server.

The platform will NOT:

share/market/distribute/sell/
buy/trade/
loan/release/show/forward

the hash or the raw form of the users' personal information
that the user has provided here

to/from/with/for/on/in/
or as any other:

user/third-party/
website/business/
corporation in any form/method for any reason.


Security Practices and Mechanics

The cypher used to encrypt does not encrypt the users information directly nor does it give the location to any encrypted or any plain text representing the users information.

The structure is made of Data Segments that are populated with the Data Fragments of Data Objects.

The Users information that was submitted as well as the users Device information and the users User Agent each make up their own Data Object.

Each Data Object gets split into groups of Data Fragments that will populate their own Data Segments.The original Data Objects now get Destroyed.

The length of each Data Segment as well as an assortment of individual Fragments are selected from the Data Fragments using an Obfuscator Algorithm, then the contents of each Data Segment and the remaining Data Fragments get Destroyed.

The Obfuscator Algorithm is selected from a list of Obfuscator Algorithm aliases using a Selector Algorithm.

From within the Selector Algorithm, each step and that steps calculated variable as well as the alias of the chosen Obfuscator Algorithm is added to the list of Fragments.

Each of the Fragments are encrypted using an Encryption Algorithm, once Encrypted the hashes get merged together.

The Encryption Algorithm used is selected from a list of Encryption Algorithms that each have an alias, the selection is made using a Selector Algorithm.

From within the Selector Algorithm, each step and that steps calculated variable as well as the alias of the chosen Encryption Algorithm is added to the list of encrypted Fragments.

A copy of the Fragments are each converted into a different data type then encrypted using a different Encryption Algorithm.The hashes get merged together and added to the list with the data type.

The list is reordered and reformatted to become the file name that the user needs to upload in order to 'log in'


Developer Contact

Questions? Email me at pointsseth45@gmail.com




New to this Site?
Enter Your Email and Alias Below

Registration



Example:
pointsseth45@gmail.com






Example:
noSpacesLettersONLY














Start Session Here
Upload Wallet File

Have Wallet?


Example:
...4a3ppi4c4e681==_.dsuw.txt







Welcome to dsutil.

The page you are on is designed to provide a general overview of:
The sites origins
The site plans
The course of action to each plan


If you want to head to one of the sites components the links are provided below,
just click or tap on it and it will take you where you want to go.








Beyond this point describes each component in this site as well as their roles within the site
What each component function does and what it means to the user, such as:

The processing of user registry data.
The Integration of processed user data into block structures.
Ledger structuring


What is..

  • 'Pl@4m'

  • 'Dsu'

  • 'Consensus'

  • 'WalletUtil'

  • 'TradeUtil'

  • 'IMPact'

  • 'SearchUtil'