Imagine being able to invest in the domain name system back in the early days of the internet…
TNS does for blockchain what DNS did for the internet.
DNS was a simple solution to substitute long strings of numbers and
punctuation that had previously been used to access websites. Instead
of an IP Address, 184.108.40.206, using DNS you could just type
WSJ.com. Although the concept was simple, DNS was a revolutionary
catalyst for the widespread adoption of the World Wide Web.
Since the creation of DNS, the number of globally registered domain
names has eclipsed 350 million. The owners of those names pay a nominal fee on an an annual basis to retain the exclusive right to those
addresses. The DNS market is now an essential IT industry that grosses
over $6 billion per year in revenue.
Blockchain transactions are non-reversible. If you send cryptocurrency to the incorrect wallet address, that money is lost forever. Believe it or not, millions of dollars worth of cryptocurrency have been lost this way as a result of simple, inevitable typos.
Similar to DNS, the solution for this non-trivial problem is a user-friendly naming system that can replace the cumbersome blockchain wallet address format. That solution is called Crypto Names.
Unless otherwise specified, all return figures shown above are for illustrative purposes only, and are not actual customer or model returns. Actual returns will vary greatly and depend on personal and market circumstances. Investments in TNS are not FDIC insured, not bank guaranteed and may lose value. Investing in securities involves risks, and there is always the potential of losing money when you invest in securities. Before investing, consider your investment objectives, as well as TNS charges and expenses. This website is not intended to provide comprehensive tax advice or financial planning. For more details please see our token purchase agreement, regulatory filings and other disclosures. Past performance does not guarantee future results and the likelihood of investment outcomes are hypothetical in nature. Not an offer, solicitation of an offer, or advice to buy or sell securities in jurisdiction where TNS is not registered. The information provided by TNS is educational only and is not investment or tax advice.
The way Crypto Names work is very similar to how human-readable domain names were created to replace having to use a number-based IP address for web destinations.
TNS provides an API for public and public decentralized servers called Zone Servers located in strategic locations around the world. Zone Servers provide the data needed for wallets, apps, exchanges, etc., to convert a TNS Crypto Name back into an actual alpha-numeric cryptocurrency public key address. These functions are all hidden from end-users.
TNS makes available a simple API for developers and merchants to use the data provided for crypto name lookups, data channel functions and analytics.
Mr Corsi has over 30 years experience in software development. He was instrumental in the development of the world wide web in the early 90’s. He served as one of the original INAIC Council members, which helped to draft many of the internet top level domain protocols. He has operated 2 of the worldwide DNS root servers from the early 90’s.
Chris has over 20 years experience with programming in many languages. He has led major development projects for many large companies. He leads development for server infrastructure and backend API systems.
Thomas has been an entrepreneur, capital markets leader and fintech innovator for over 30 years. He is the founder and CEO of DealBox.
DealBox is a blockchain business accelerator and crowdfunding platform.
Charles Voltron has founded 3 successful tech ventures, is a blockchain technologist, coder and C-level technical leader with over 17 years of experience.
Charles has been actively involved in the blockchain industry since 2015 as a developer and technical team leader.
He has held the roles of CTO and technical advisor for several blockchain ventures with a focus on technical strategy, cryptoeconomics/product development, and software architecture.
Jerome Conlon is former Director of Brand Planning and Marketing
Insights for Nike, Inc., Vice President of Brand Planning,
Consumer Insights & Category Development for Starbucks Coffee
Company, Senior VP of Marketing and Program Development
Research for NBC Entertainment, and has been a professor of
economics at Gonzaga University.
Jerome is the author of Soulful Branding – Unlock the Hidden
Energy in Your Company and Brand (FutureLab Press 2015) and
the soon to be released Brand Bridges – Connecting BusinessModels with Positive Consumer Experience (Futurelab Press 2019)
Corsi develops an interest in the need for meaningful, multi-purpose digital identities, spurred on by the adoption of blockchain technology.
Proof of concept code for the core functions of Digital Name Service is completed and transitioned into alpha testing.
Corsi and the team conduct customer discovery interviews which yield strong evidence of demand for user-friendly blockchain wallet addresses.
Infrastructure deployments and additional security testing. Early adopters begin purchasing Crypto Names.
Dealbox’s Thomas Carter brought on as an advisor.
DealBox engaged for security token offering and go-to-market strategy.
Digital Name Service integrated into the Dealbox security token offering workflow. Offering details, investor relations and branding commence.
Branding expert Jerome Conlan brought on as Marketing advisor. Finalization of go-to-market strategy and security token offering launched.
The tokens are backed by something tangible like tangible assets, profits, or company revenue.
STO investors are investing with the expectation of receiving future cash flows, dividends, or voting rights directly tied to the security being issued.
Because they derive their value from actual securities, security tokens are considered investments, which means additional regulatory and reporting requirements for the issuing entity.
MUTUAL NONDISLOSURE AGREEMENT
THIS MUTUAL NONDISCLOUSURE AGREEMENT (this “Agreement”) is made on the date and time recipient accesses the file TNSv1.7.pdf from this website and is between Token Name Service, Inc., a Delaware Corporation (“TNS”) and the legal entity or person accessing the file TNSv1.7.pdf from the server hosting it at www.tnstoken.io (“Recipient”)
Purpose. The parties wish to explore a business opportunity of mutual interest (the “Opportunity”), and in connection with the Opportunity, each party has disclosed and may further disclose to the other confidential technical and business information that the disclosing party desires the receiving party to treat as confidential.
Confidential Information. Shall mean (a) any information disclosed by either party to the other party, either directly or indirectly, in writing, orally or by inspection of tangible objects, including, without limitation, algorithms, business plans, customer data, customer lists, customer names, designs, documents, drawings, financial analysis, forecasts, formulas, know-how, ideas, market information, marketing plans, processes, research, specifications, software, source code, trade secrets, or any other information which is designated as “confidential”, “proprietary”, or some similar designation (collectively, the “Disclosed Materials”) and (b) any information otherwise obtained, directly or indirectly, by a receiving party through inspection, review or analysis of the Disclosed Materials. Information disclosed orally shall be considered Confidential Information only if such information is confirmed in writing as being Confidential Information within a reasonable time after the initial disclosure. Confidential Information may also include information of a third party that is in possession of one of the parties and is disclosed to the other party under this Agreement. Confidential Information shall not, however, include any information that (i) was publicly known and made generally available in the public domain prior to the time of disclosure be the disclosing party; (ii) becomes publicly known and made generally available after disclosure by the disclosing party to the receiving party through no action or inaction of the receiving party (iii) is already in the possession of the receiving party at the time of disclosure by the disclosing party as shown by the receiving party’s files and records immediately prior to the time of disclosure; (iv) is obtained by the receiving party from a third party lawfully in possession of such information and without a breach of such third party’s obligations of confidentiality; or (v) is independently developed by the receiving party without use of or reference to the disclosing party ‘s Confidential Information, as shown by documents and other competent evidence in the receiving party’s possession.
Non-use and Non-disclosure. Each party agrees not to use any Confidential Information of the other party for any purpose except to evaluate and engage in discussions concerning the Opportunity. RC agrees not to use or share the Disclosed Materials provided by TNS with potential competitors to TNS. Each party agrees not to disclose any Confidential Information of the other party, except that, subject to Section 4 below, a receiving party may disclose the other party’s Confidential Information to those employees of the receiving party who are required to have the information in order to evaluate or engage in discussions concerning the Opportunity. If a receiving party is required by law to make any disclosure that is prohibited or otherwise constrained by this Agreement, the receiving party will provide the disclosing party with prompt written notice of such a requirement so that the disclosing party may seek a protective order or other appropriate relief. Subject to the foregoing sentence, such a receiving party may furnish that portion (and only that portion) of the Confidential Information that the receiving party is legally compelled or is otherwise legally required to disclose; provided, however, that the receiving party provides such assistance as the disclosing party may reasonably request in obtaining such order or other relief. Neither party shall reverse engineer, disassemble or decompile any prototypes, software or other tangible objects that embody the other party’s Confidential Information and that are provided to the party under this agreement.
Maintenance of Confidentiality. Each party agrees that it shall take reasonable measures to protect the secrecy of and avoid disclosure and unauthorized use of the Confidential Information of the other party. Without limiting the foregoing, each party shall take at least those measures that it takes to protect its own confidential information of similar nature, but in no case less than reasonable care (including, without limitation, all precautions the receiving party employs with respect to its confidential materials). Each party shall ensure that its employees who have access to the other party’s Confidential Information have signed a non-use and non-disclosure agreement in content similar to the provisions of this Agreement or are otherwise legally obligated not to disclose such Confidential Information, prior to any disclosure of Confidential Information to such employees. No party shall make any copies of the other party’s Confidential Information except upon the other party’s prior written approval. Each party shall reproduce the other party’s proprietary right notices on any such authorized copies, in the same manner in which such notices were set forth in or on the original. A Party receiving Confidential Information shall promptly notify the party disclosing such Confidential Information of any use or disclosure of such Confidential Information in violation of this Agreement of which the receiving party becomes aware.
No Obligation. Nothing is this Agreement shall obligate either party to proceed with any transaction between them, and each party reserves the right, in its sole discretion, to terminate the discussions contemplated by this Agreement concerning the Opportunity.
No Warranty. ALL CONFIDENTIAL INFORMATION IS PROVIDED “AS IS.” EACH PARTY MAKES NO WARRANTIES, EXPRESS, IMPLIED OR OTHERWISE, REGARDING THE ACCURACY AND COMPLETENESS OF THE CONFIDENTIAL INFORMATION.
Return Of Materials. All documents and other tangible objects containing or representing Confidential Information that has been disclosed by either party to the other party, and all copies or extracts thereof that are in the possession of the other party, shall be and remain the property of the disclosing party and shall be promptly returned to the disclosing party upon the disclosing party’s written request.
No License. Nothing in this Agreement is intended to grant any rights to either party under any patent, mask work right, copyright, trade secret or other intellectual property right of the other party, nor shall this Agreement grant any party any rights in or to the other party’s Confidential Information.
Term. The obligations of each receiving party under this Agreement shall survive until such time as all Confidential Information of the other party disclosed hereunder becomes publicly known and made generally available through no action of inaction of the receiving party, but in no event more than two years after the last disclosure of Confidential Information under this Agreement.
Availability of Equitable Relief. Each party understands and agrees that its breach or threatened breach of this Agreement will cause irreparable injury to the other party and that money damages will not provide an adequate remedy for such a breach or threatened breach, and both parties hereby agree that , in the event of such a breach or threatened breach, the non-breaching party will also be entitled, without requirement of posting a bond or other security, to equitable relief, including injunctive relief and specific performance. The parties’ rights under this Agreement are cumulative, and a party’s exercise of one right shall not waive the party’s right to assert any other legal remedy.
Severability. If any provision of this Agreement is found to be illegal or unenforceable, the other provisions shall remain effective and enforceable to the greatest extent permitted by law.
Counterparts and Facsimiles. The parties may execute this Agreement in counterparts, each of which is deemed an original, but all of which together constitute one and the same agreement. This Agreement may be delivered by facsimile transmission, and facsimile copies of executed signature pages shall be binding as originals.
Miscellaneous. This Agreement shall benefit and bind the parties and their respective successors, heirs, legal representatives and permitted assigns. This Agreement constitutes the entire agreement between the parties with respect to the Opportunity and supersedes all prior written and oral agreements between the parties regarding the subject matter of this Agreement, and neither party shall have any obligation, express or implied by law, with respect to trade secret or proprietary information of the other party except as set forth in this Agreement. No provision of this Agreement may be waived except by a writing executed by the party against whom the waiver is to be effective. A party’s failure to enforce any provision of this Agreement shall neither be construed as a waiver of the provision nor prevent the party from enforcing any other provision of this Agreement. No provision of this Agreement may be amended or otherwise modified except by a writing signed by the parties to this Agreement.
Governing Law and Jurisdiction. This Agreement shall be governed by and interpreted in accordance with the laws of the State of Delaware. Each of the parties hereto consents to such jurisdiction for the enforcement of this Agreement and matters pertaining to the transaction and activities contemplated hereby.
Attorney’s Fees. If a party to this Agreement shall bring any action, suit, counterclaim, appeal, arbitration, or mediation for any relief against the other parties, declaratory or otherwise, to enforce the terms hereof or to declare rights hereunder (referred to herein as an “Action”), the non-prevailing party in such Action shall pay to the prevailing party in such Action a reasonable sum for the prevailing party’s attorneys’ fees and expenses (at the prevailing party’s attorneys’ then-current rates, as increased for time to time by the giving of advance written notice by such counsel to such party) incurred in prosecuting or defending such Action and/or enforcing any judgment, order, ruling or award (referred to herein as a “Decision”), granted therein, all of which shall be deemed to have accrued from the commencement of such Action, and shall be paid whether or not such Action is prosecuted to a Decision. Any Decision entered into in such Action shall contain a specific provision providing for the recovery of attorneys’ fees and expenses incurred in enforcing such Decision. The court or arbitrator may fix the amount of reasonable attorneys’ fees and expenses upon the request of any party. For purposes of this Section, attorneys’ fees shall include, without limitation, fees incurred in connection with (1) post judgment motions and collection actions, (2) contempt proceedings, (3) garnishment, levy and debtor and third party examination, (4) discovery and (5) bankruptcy litigation.
IN WITNESS WHEREOF, the parties have executed this Agreement as of the day and year in which the Recipient chooses to access the file TNSv1.7.pdf from this website.
Token Name Service Inc.
By: Frank Corsi
Signed via electronic signature