The Opportunity

Imagine being able to invest in the Domain Name System back in the early days of the internet

DNS was a simple solution to substitute long strings of numbers and
punctuation that had previously been used to access websites. Instead
of an IP Address,, using DNS you could just type Although the concept was simple, DNS was a revolutionary
catalyst for the widespread adoption of the World Wide Web.

Since the creation of DNS, the number of globally registered domain
names has eclipsed 350 million. The owners of those names pay a nominal fee on an an annual basis to retain the exclusive right to those
addresses. The DNS market is now an essential IT industry that grosses
over $6 billion per year in revenue.

DNS 2.0

The same problem that existed for web destinations in the early days of the internet exists now for blockchain.
Blockchain wallets designed to hold digital currency have addresses that look like this:


Cryptocurrency wallets are the lynchpins of the entire blockchain ecosystem.
Even as the market for various high market cap coins softens, the number of new wallets registered on their networks continues to increase

The Problem

Not only is having to deal with a long string of alpha-numeric characters cumbersome, it presents a problem vastly more critical than the IP Address problem faced by early internet pioneers.

Blockchain transactions are non-reversible. If you send cryptocurrency to the incorrect wallet address, that money is lost forever. Believe it or not, millions of dollars worth of cryptocurrency have been lost this way as a result of simple, inevitable typos.

The Solution

Crypto Names

Similar to DNS, the solution for this non-trivial problem is a user-friendly naming system that can replace the cumbersome blockchain wallet address format. That solution is called Crypto Names.

  • You can create a simple Crypto Name alias for any blockchain wallet address.
  • For example, you can send bitcoin, eth or any other applicable cryptocurrency to $JohnSmith.btc, $MyStorefront.eth, $MyKids.btc, etc., instead of 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa

The Offering

The structure of the TNS Security Token is designed to provide investors with a 50% profit share of gross profits generated by TNS.
The 12 month goal for TNS is to sell 5 million Crypto Names for $19.95/year to end users which represents a modest 10% (approximately) of the crypto wallets in existence today; generating  annual recurring net revenues of $94,750,000.



  • Est. Total Wallets 50MM
  • 10% Share 5MM Users


  • Cost
  • Net $94.7MM - 5MM users @ $19.95
Reg D 506c

60 Days

40mm tokens
Public Sale
Date: 04/15/19

90 days

25mm tokens
$0.25 per token
Accredited investors only
  • Token Symbol TNS
  • Token Sale Start 12/17/18
  • Token Sale End 2/17/19
  • Tokens for sale 40mm
  • Token Price $0.25 USD
  • Specifications Stellar Token
  • Total Supply 65mm
  • Sale duration 60 days

Operating Allocation


Unless otherwise specified, all return figures shown above are for illustrative purposes only, and are not actual customer or model returns. Actual returns will vary greatly and depend on personal and market circumstances. Investments in TNS are not FDIC insured, not bank guaranteed and may lose value. Investing in securities involves risks, and there is always the potential of losing money when you invest in securities. Before investing, consider your investment objectives, as well as TNS charges and expenses. This website is not intended to provide comprehensive tax advice or financial planning. For more details please see our token purchase agreement, regulatory filings and other disclosures. Past performance does not guarantee future results and the likelihood of investment outcomes are hypothetical in nature. Not an offer, solicitation of an offer, or advice to buy or sell securities in jurisdiction where TNS is not registered. The information provided by TNS is educational only and is not investment or tax advice.

About TNS

TNS is a blockchain infrastructure service that provides human-readable names for complicated alpha-numeric cryptocurrency wallet addresses.

The way Crypto Names work is very similar to how human-readable domain names were created to replace having to use a number-based IP address for web destinations.

TNS provides an API for public and public decentralized servers called Zone Servers located in strategic locations around the world. Zone Servers provide the data needed for wallets, apps, exchanges, etc., to convert a TNS Crypto Name back into an actual alpha-numeric cryptocurrency public key address. These functions are all hidden from end-users.

TNS makes available a simple API for developers and merchants to use the data provided for crypto name lookups, data channel functions and analytics.

Meet The Team

Executive team

Frank Corsi
Founder & CEO

Mr Corsi has over 30 years experience in software development. He was instrumental in the development of the world wide web in the early 90’s. He served as one of the original INAIC Council members, which helped to draft many of the internet top level domain protocols. He has operated 2 of the worldwide DNS root servers from the early 90’s.

Sherri Smith

Sheri has been a software developer for over 20 years, working for several fortune 500 firms. Her expertise in problem-solving and developing solutions to automate the process has been her strong point. She is vastly experienced with several programming languages which include PHP, Coldfusion, and MySQL. She has been a huge asset to the company.

Christopher R. Mccaron
Network Administrator

Chris has over 20 years experience with programming in many languages. He has led major development projects for many large companies. He leads development for server infrastructure and backend API systems.

Thomas Carter

Thomas has been an entrepreneur, capital markets leader and fintech innovator for over 30 years. He is the founder and CEO of DealBox.


Charles Voltron

Charles Voltron has founded 3 successful tech ventures, is a blockchain technologist, coder and C-level technical leader with over 17 years of experience.

Charles has been actively involved in the blockchain industry since 2015 as a developer and technical team leader.

He has held the roles of CTO and technical advisor for several blockchain ventures with a focus on technical strategy, cryptoeconomics/product development, and software architecture. 

Jerome Conlon
Marketing/Branding Advisor

Jerome Conlon is former Director of Brand Planning and Marketing
Insights for Nike, Inc., Vice President of Brand Planning,
Consumer Insights & Category Development for Starbucks Coffee
Company, Senior VP of Marketing and Program Development
Research for NBC Entertainment, and has been a professor of
economics at Gonzaga University.

Jerome is the author of Soulful Branding – Unlock the Hidden
Energy in Your Company and Brand (FutureLab Press 2015) and
the soon to be released Brand Bridges – Connecting BusinessModels with Positive Consumer Experience (Futurelab Press 2019)


DealBox is a blockchain business accelerator and crowdfunding platform.

Supported By


Road Map

May 2017

Corsi develops an interest in the need for meaningful,  multi-purpose digital identities, spurred on by the adoption of blockchain technology.

August 2017

Proof of concept code for the core functions of Digital  Name Service is completed and transitioned into alpha testing.

November 2017

Corsi and the team conduct customer discovery interviews which yield strong evidence of demand for user-friendly blockchain wallet addresses.

January 2018

Infrastructure deployments and additional security testing.  Early adopters begin purchasing Crypto Names.

March 2018

Dealbox’s Thomas Carter brought on as an advisor.

June 2018

DealBox engaged for security token offering and go-to-market strategy.

September 2018

Digital Name Service integrated into the Dealbox security token offering workflow. Offering details, investor relations and branding commence.

January 2019

Branding expert Jerome Conlan brought on as Marketing advisor. Finalization of go-to-market strategy and security token offering launched.

What is a security token?

A security token offering is similar to an ICO (Initial Coin Offering) , except that security tokens are actual financial securities.

The tokens are backed by something tangible like tangible assets, profits, or company revenue.

STO investors are investing with the expectation of receiving future cash flows, dividends, or voting rights directly tied to the security being issued.

Because they derive their value from actual securities, security tokens are considered investments, which means additional regulatory and reporting requirements for the issuing entity.


Get In Touch

Any question? Reach out to us and we’ll get back to you shortly.



THIS MUTUAL NONDISCLOUSURE AGREEMENT (this “Agreement”) is made on the date and time recipient accesses the file TNSv1.7.pdf from this website and is between Token Name Service, Inc., a Delaware Corporation (“TNS”) and the legal entity or person accessing the file TNSv1.7.pdf from the server hosting it at (“Recipient”)

Purpose. The parties wish to explore a business opportunity of mutual interest (the “Opportunity”), and in connection with the Opportunity, each party has disclosed and may further disclose to the other confidential technical and business information that the disclosing party desires the receiving party to treat as confidential.

Confidential Information. Shall mean (a) any information disclosed by either party to the other party, either directly or indirectly, in writing, orally or by inspection of tangible objects, including, without limitation, algorithms, business plans, customer data, customer lists, customer names, designs, documents, drawings, financial analysis, forecasts, formulas, know-how, ideas, market information, marketing plans, processes, research, specifications, software, source code, trade secrets, or any other information which is designated as “confidential”, “proprietary”, or some similar designation (collectively, the “Disclosed Materials”) and (b) any information otherwise obtained, directly or indirectly, by a receiving party through inspection, review or analysis of the Disclosed Materials. Information disclosed orally shall be considered Confidential Information only if such information is confirmed in writing as being Confidential Information within a reasonable time after the initial disclosure. Confidential Information may also include information of a third party that is in possession of one of the parties and is disclosed to the other party under this Agreement. Confidential Information shall not, however, include any information that (i) was publicly known and made generally available in the public domain prior to the time of disclosure be the disclosing party; (ii) becomes publicly known and made generally available after disclosure by the disclosing party to the receiving party through no action or inaction of the receiving party (iii) is already in the possession of the receiving party at the time of disclosure by the disclosing party as shown by the receiving party’s files and records immediately prior to the time of disclosure; (iv) is obtained by the receiving party from a third party lawfully in possession of such information and without a breach of such third party’s obligations of confidentiality; or (v) is independently developed by the receiving party without use of or reference to the disclosing party ‘s Confidential Information, as shown by documents and other competent evidence in the receiving party’s possession.

Non-use and Non-disclosure. Each party agrees not to use any Confidential Information of the other party for any purpose except to evaluate and engage in discussions concerning the Opportunity. RC agrees not to use or share the Disclosed Materials provided by TNS with potential competitors to TNS. Each party agrees not to disclose any Confidential Information of the other party, except that, subject to Section 4 below, a receiving party may disclose the other party’s Confidential Information to those employees of the receiving party who are required to have the information in order to evaluate or engage in discussions concerning the Opportunity. If a receiving party is required by law to make any disclosure that is prohibited or otherwise constrained by this Agreement, the receiving party will provide the disclosing party with prompt written notice of such a requirement so that the disclosing party may seek a protective order or other appropriate relief. Subject to the foregoing sentence, such a receiving party may furnish that portion (and only that portion) of the Confidential Information that the receiving party is legally compelled or is otherwise legally required to disclose; provided, however, that the receiving party provides such assistance as the disclosing party may reasonably request in obtaining such order or other relief. Neither party shall reverse engineer, disassemble or decompile any prototypes, software or other tangible objects that embody the other party’s Confidential Information and that are provided to the party under this agreement.

Maintenance of Confidentiality. Each party agrees that it shall take reasonable measures to protect the secrecy of and avoid disclosure and unauthorized use of the Confidential Information of the other party. Without limiting the foregoing, each party shall take at least those measures that it takes to protect its own confidential information of similar nature, but in no case less than reasonable care (including, without limitation, all precautions the receiving party employs with respect to its confidential materials). Each party shall ensure that its employees who have access to the other party’s Confidential Information have signed a non-use and non-disclosure agreement in content similar to the provisions of this Agreement or are otherwise legally obligated not to disclose such Confidential Information, prior to any disclosure of Confidential Information to such employees. No party shall make any copies of the other party’s Confidential Information except upon the other party’s prior written approval. Each party shall reproduce the other party’s proprietary right notices on any such authorized copies, in the same manner in which such notices were set forth in or on the original. A Party receiving Confidential Information shall promptly notify the party disclosing such Confidential Information of any use or disclosure of such Confidential Information in violation of this Agreement of which the receiving party becomes aware.

No Obligation. Nothing is this Agreement shall obligate either party to proceed with any transaction between them, and each party reserves the right, in its sole discretion, to terminate the discussions contemplated by this Agreement concerning the Opportunity.


Return Of Materials. All documents and other tangible objects containing or representing Confidential Information that has been disclosed by either party to the other party, and all copies or extracts thereof that are in the possession of the other party, shall be and remain the property of the disclosing party and shall be promptly returned to the disclosing party upon the disclosing party’s written request.

No License. Nothing in this Agreement is intended to grant any rights to either party under any patent, mask work right, copyright, trade secret or other intellectual property right of the other party, nor shall this Agreement grant any party any rights in or to the other party’s Confidential Information.

Term. The obligations of each receiving party under this Agreement shall survive until such time as all Confidential Information of the other party disclosed hereunder becomes publicly known and made generally available through no action of inaction of the receiving party, but in no event more than two years after the last disclosure of Confidential Information under this Agreement.

Availability of Equitable Relief. Each party understands and agrees that its breach or threatened breach of this Agreement will cause irreparable injury to the other party and that money damages will not provide an adequate remedy for such a breach or threatened breach, and both parties hereby agree that , in the event of such a breach or threatened breach, the non-breaching party will also be entitled, without requirement of posting a bond or other security, to equitable relief, including injunctive relief and specific performance. The parties’ rights under this Agreement are cumulative, and a party’s exercise of one right shall not waive the party’s right to assert any other legal remedy.

Severability. If any provision of this Agreement is found to be illegal or unenforceable, the other provisions shall remain effective and enforceable to the greatest extent permitted by law.

Counterparts and Facsimiles. The parties may execute this Agreement in counterparts, each of which is deemed an original, but all of which together constitute one and the same agreement. This Agreement may be delivered by facsimile transmission, and facsimile copies of executed signature pages shall be binding as originals.

Miscellaneous. This Agreement shall benefit and bind the parties and their respective successors, heirs, legal representatives and permitted assigns. This Agreement constitutes the entire agreement between the parties with respect to the Opportunity and supersedes all prior written and oral agreements between the parties regarding the subject matter of this Agreement, and neither party shall have any obligation, express or implied by law, with respect to trade secret or proprietary information of the other party except as set forth in this Agreement. No provision of this Agreement may be waived except by a writing executed by the party against whom the waiver is to be effective. A party’s failure to enforce any provision of this Agreement shall neither be construed as a waiver of the provision nor prevent the party from enforcing any other provision of this Agreement. No provision of this Agreement may be amended or otherwise modified except by a writing signed by the parties to this Agreement.

Governing Law and Jurisdiction. This Agreement shall be governed by and interpreted in accordance with the laws of the State of Delaware. Each of the parties hereto consents to such jurisdiction for the enforcement of this Agreement and matters pertaining to the transaction and activities contemplated hereby.

Attorney’s Fees. If a party to this Agreement shall bring any action, suit, counterclaim, appeal, arbitration, or mediation for any relief against the other parties, declaratory or otherwise, to enforce the terms hereof or to declare rights hereunder (referred to herein as an “Action”), the non-prevailing party in such Action shall pay to the prevailing party in such Action a reasonable sum for the prevailing party’s attorneys’ fees and expenses (at the prevailing party’s attorneys’ then-current rates, as increased for time to time by the giving of advance written notice by such counsel to such party) incurred in prosecuting or defending such Action and/or enforcing any judgment, order, ruling or award (referred to herein as a “Decision”), granted therein, all of which shall be deemed to have accrued from the commencement of such Action, and shall be paid whether or not such Action is prosecuted to a Decision. Any Decision entered into in such Action shall contain a specific provision providing for the recovery of attorneys’ fees and expenses incurred in enforcing such Decision. The court or arbitrator may fix the amount of reasonable attorneys’ fees and expenses upon the request of any party. For purposes of this Section, attorneys’ fees shall include, without limitation, fees incurred in connection with (1) post judgment motions and collection actions, (2) contempt proceedings, (3) garnishment, levy and debtor and third party examination, (4) discovery and (5) bankruptcy litigation.

IN WITNESS WHEREOF, the parties have executed this Agreement as of the day and year in which the Recipient chooses to access the file TNSv1.7.pdf from this website.

Token Name Service Inc.

By: Frank Corsi

Title: CEO


Signed via electronic signature