## White Paper

white paper

A node willingly validates and stores the complete history of transactions on the network. To run a node, you need to stake a certain amount of NewBit (NEBTC). The staking amounts differ depending on NFT you hold (the package you purchase).

#### 1. Introduction

Blockchain technology has made significant strides in its development, which enables us to get closer to a decentralized, trustless Internet, transparency of transactions, and more. The possibilities of blockchain technology are truly endless. One of the most relevant use cases for blockchain is cryptocurrencies.

A cryptocurrency is a tradable digital asset, built on blockchain technology that only exists online. From DeFi (Decentralized Finance) to NFTs (Non-Fungible Tokens) to DAOs (Decentralized Autonomous Organizations), blockchains open up a variety of opportunities.

Especially, NFTs are believed to be the cornerstone of next generation digital infrastructure and the future of blockchain technologies. Many expect digital assets will be a solid alternative to fiat currencies for global finance.

#### 2. Security Issues in Crypto

###### 2.1 Private Keys

In cryptocurrency, private keys are used to sign transactions and prove ownership of a blockchain address. The safe keeping of the private key is very important, since losing this information means losing everything. The private key should never be disclosed, shared to anyone whether online or offline. If the private key is intercepted or stolen, there is often very little that the wallet owner can do to regain access to coins within. A private key is usually a string of 64 hexadecimal characters, so it is practically impossible to remember. So many crypto wallets are introduced to conveniently manage and use the private keys.

###### 2.2 Crypto Wallets

There are many different types of crypto wallets to store cryptocurrencies: custodial wallets, non-custodial wallets, hardware wallets, and so on. Many cryptocurrency holders use hardware wallets like USB sticks, hard drives, and phones. But what if the device is lost, damaged, or stolen? What if you forgot your PIN number? Recently, crypto hacks have drastically increased as hackers have discovered that vulnerabilities exist.

###### 2.3 Mnemonic Phrase

Many wallet providers use Mnemonic Phrase because it is easy to copy and backup. Mnemonic Phrase is a series of words (12 or 24 words) generated by the wallet that give the user access to the crypto associated with that wallet. It should be stored somewhere safe, preferably offline on a piece of paper, which is troublesome and not easy for the following reasons;

• Loss or theft or misplacement
• Gradual deterioration of legibility over time
• Lack of awareness of backup location to family or heirs
• Catastrophic destruction due to natural disasters like floods or fire

• ###### 2.4 Fingerprints

To increase the security level, PIN number or fingerprints are mixed with Mnemonic Phrase when creating private keys. But the age and occupation of a person may cause some difficulties in capturing a complete and accurate fingerprint image. Fingerprints are also relatively easy to be copied, so that usage may be restricted when used for security purposes.

###### 2.5 Concerns

Cryptocurrencies are vulnerable to the threat of hacks and cyber-attacks. What if you forgot your PIN number? Is there any safer method than using PIN or fingerprint? Is there any way to secure crypto assets against hacks with no need to store the private keys or Mnemonic Phrase?

#### 3. Finger Vein Authentication as a solution

Identity verification has become an integral part of people’s daily life. It is needed when we log into computers or electronic accounts, use ATMs (Automated Teller Machines), and get entrance permission to a bank or an area. There are many ways to verify someone’s identity. The usage of a password or fingerprints is the most popular, but it tends to be obsolete due to some problems to be solved.

Finger vein recognition is a relatively new method of biometric authentication. It matches the vascular pattern in an individual’s finger to previously obtained data. Finger vein authentication is replacing existing methods such as a password or fingerprints since it offers a higher level of security. The technology is currently in use or development for a wide variety of applications, including credit card authentication, automobile security, employee time and attendance tracking, computer and network authentication, end point security and automated teller machines. Finger vein authentication is considered as a possible solution to the threat of hacks and cyber-attacks.

###### 3.1 Features of Finger Vein Authentication
• Accuracy
• The finger vein authentication technology has recently received much attention as a new method for biometric authentication because the authentication accuracy is high compared to other forms of biometric technologies such as fingerprint authentication.

• Uniqueness
• Finger vein biometrics identifies a user based on the vein patterns in their fingers, which are unique to every person.

• Usability
• Finger vein recognition claims to have superior usability characteristics where false acceptance or rejections hardly occur, close to zero.

• Security
• Veins are located inside the body, so it is extremely difficult to read or steal. There is little risk of forgery or theft. Unlike fingerprints, finger veins do not leave any trace during the authentication process and so cannot be duplicated.

• Constancy
• Finger vein patterns remain relatively constant through the adult years.

• Minting rewards
• Minting rewards
• D.Volt rewards

• #### 4. Finger Vein Authentication

Finger Vein Authentication was developed and patented by Korecen (Vein-X):
United States Patent, European Patent (3057034), Japan Patent (5951817), and Korea Patent (10-1496852).

###### Features of Vein-X Finger Vein Authentication
• 99% of accuracy (FRR=99%, 100% can be reached by retry)
• Able to accurately recognize the identical vein patterns in spite of the different posture and position of fingers
• Solved the problem of tracking errors occurring under uneven illumination
• Can be used outdoors (20,000 lux) the existing method only works below 3,000 lux
• Works at -20℃ to 60℃- the existing method only works at 5℃ to 35℃
• Fast processing less than a second
• Each person can use 8 fingers for authentication (3 patterns per finger, total 24 patterns can be used)

• ###### 4.1 Image Capture

Due to the property of the hemoglobin having a lower absorbance to the NIR wavelengths than the visible ones, the camera can capture an image containing the finger veins.

###### 4.2 Image Inversion

In order to capture clearer vein patterns, the captured image is converted into gray by using Gray Conversion method and then inversed, which enables to reduce memory usage and shorten processing time.

• Gray Conversion
• A new formula was developed to capture clearer vein patterns by changing the proportion of red, green and blue. The formula is as follows.

$$Img=(Img[0]*R_S)+(Img[1]*R_G)+(Img[2]*R_R)$$

$$1=R_S+R_G+R_R, 0<Img<255$$

• Inversion
• The image is inversed to reduce memory usage and shorten processing time.

Table 2. Original Image, Grayscale Conversion, and Image Inversion

###### 4.3 SWA (Shifted Waveform Analysis) Algorithm

In order to extract clear vein patterns from the captured image, SWA (Shifted Waveform Analysis) algorithm was developed and applied. SWA algorithm is a method of using the phase difference of certain X axis and Y axis. The original signal $$X[n]$$ is shifted by d to get $$X_d[n]$$ . δn is obtained by calculating the difference between $$X[n]$$ and $$X_d[n]( \delta_n=X[n]-X_d[n] )$$.

δnMeaning
0Intersection of $$X[n]$$ and $$X_d[n]=2$$
+The pixel of the applied location is bright
-The pixel of the applied location is dark

The vein pattern is darker than the other tissue in the captured image. So the location of veins can be detected by padding the positive numbers of Grayscale with zeros, and applying threshold to the value after squaring the negative numbers of data. The advantages of the SWA algorithm are as follows; (i) the great performance to detect a small variation of a fiducial point under uneven illumination condition, (ii) the ability to detect a fiducial point in various bandwidth, (iii) and relatively fast calculation. The dotted line in Figure 1 represents the SWA signal, and the solid line represents the original signal $$X(n)$$. SWA signal maintains the original signal in the increasing section, while SWA signal keeps the peak from p to d at the peak point value where the slope of the signal is zero. After then, SWA signal repeats the declining process until it becomes the same as or smaller than the original signal, from d to x. At this time, two types of features are extracted as shown in Figure 2. Figure 3 is in regard to the fiducial point of finger joints, and Figure 4 shows the direction in which SWA algorithm applies. To extract finger joints, SWA algorithm is performed only once as shown in Figure 3. To extract features, SWA algorithm is performed Yn times on the Y axis shown in Figure 4-(A) and Xn times on the X axis shown in Figure 4-(B).

Figure 1. SWA Algorithm Example

Figure 2. Two types of a peak point extracted from SWA amd the original signal

Figure 3. Fiducial point for the detection of finger points

Figure 4. Directions in which SWA algorithm applies

###### 4.4 Finger Joints Detection Algorithm

Every finger (except a thumb) has two finger joints. The location of two finger joints can be detected by image processing. It works as follows: (i) obtain SWA signal by applying SWA algorithm to the inverted image by applying SWA algorithm to $$(X_0, Y_c) (X_1, Y_c) … (X_n, Y_c)$$ on Yc axis in Figure 3. (ii) calculate the location of high values as shown in Figure 2. (iii) perform repeatedly both on the left side and the right side of Xc fiducial point.

###### 4.5 Difference Between the Original and SWA

To obtain the values required for the next process, calculation of the difference between the original and the SWA is performed, as many times as in 4.3.

###### 4.6 Feature Detection Method

The threshold with values calculated in 4.5 is set and the value of the pixel at the peak point is converted into zero(white). Converted value reconstructs the image using X axis vector and Y axis vector with black backgrounds. At this time, features of vein patterns can be extracted by the synthesized vector of X axis vector and Y axis vector.

Figure 5. Feature of peak point shown on th difference of twp signals

###### 4.7 Generate Biokey

After inverting the pixel value to brighten the vein patterns, SWA algorithm is applied and the difference between the original image and SWA result value is calculated. The image is reconstructed with the features of vein patterns which is extracted by applying Feature Extraction Algorithm and removing background and noise. The extracted image is converted into data, which is encrypted to generate 2kb Biokey. Biokey is composed of a public key and a private key.

#### 5. D.Volt Wallet

Seoul-based eTunnel, Inc., has manufactured a crypto wallet, called D.Volt. The D.Volt has adopted a FINGER VEIN AUTHENTICATION method in order to provide a more advanced decentralized crypto wallet that is free of hacks or loss.

###### 5.1 Finger Vein is a Private Key

With D.Volt Wallet, there is no need to use Mnemonic Phrase, PIN number or fingerprint. User’s finger vein acts as a private key, which has little risk of loss, forgery, theft, duplication or hacking. When transferring cryptocurrencies to others, users use their finger vein instead of PIN number or fingerprints.

###### 5.2 How to Create Private Keys

Private keys are created and managed by user’s finger vein. Since hemoglobin in the blood absorbs near-infrared lights, vein patterns appear as a series of dark lines. The finger vein reader captures an image of the finger vein patterns. The captured image is then converted into data. The data are encrypted and stored as a Biokey, which is double encrypted to create private keys (how to create private keys with Biokeys cannot be specified). Public keys are generated from the private keys. The public keys are stored in the wallet, but the private keys are not, for a security reason.

###### 5.3 How to Sign a Transaction

The user can recover the private key with their finger vein at the time he needs to sign a transaction. The user puts his finger vein on the finger vein device and creates a new Biokey. The newly made Biokey is compared against the stored Biokey. If both are identical, then it instantly generates the private key to sign a transaction. The private key disappears right after signing a transaction. Private keys are not stored anywhere. Users use their finger vein instead of private keys when signing transactions. Users do not need to use PIN number or fingerprints.

Generation of Biokey and Private Key

###### 5.4 Features of D.Volt Wallet

D.Volt is an integrated solution wallet that supports almost all different types of cryptocurrencies including NFT tokens. Unlike other crypto wallets on the market, D.Volt has the NFT marketplace and the DeFi platforms. It allows users to store and retrieve NFT tokens and their other digital assets, to exchange one cryptocurrency they hold for the equivalent value of another cryptocurrency (swap), and to use DeFi services where users can lend out their cryptocurrency or receive a loan. Metaverse and Crypto Payment Gateway will be added to it in the near future.

D.Volt provides outstanding features as follows:

• Deposit
• Withdrawal
• Swap
• NFT Marketplace
• DeFi (Lending/Borrowing)
• Metaverse
• Payment Gateway

• #### 6. NEBTC Network

NEBTC Network, designed to be automated and decentralized, runs on a blockchain protocol fully and autonomously in accordance with rules encoded via smart contracts (DAO Governance). D.Volt wallet is operated on NEBTC Network, which is the decentralized ledger used to maintain NEBTC coins.

###### 6.1 DAO Governance (Decentralized Autonomous Organization)

A DAO, a decentralized autonomous organization, is a software-enabled organization built and governed by smart contracts on a blockchain network. A smart contract is a set of rules written in computer code on a blockchain network that enables a network of computers to communicate and execute pre-programmed transactions once certain conditions are met. A DAO does not have a CEO or a board. It is owned by the members (nodes) and make decisions based on proposals that nodes vote on. A DAO has received much attention because it offers many advantages such as transparency, no corruption or owner risk, equitable distribution of earnings, etc.

###### 6.2 Consensus Algorithm; PoA-NP (Proof of Authority-Node Pool)

NEBTC Network uses Proof of Authority-Node Pool (PoA-NP). PoA-NP is a community-based consensus algorithm that introduces a practical and efficient solution for blockchain networks. A node pool is a community of nodes who own a Vein-X NFT which can be obtained by purchasing a Vein-X Finger Vein Authentication package designed to airdrop NEBTC coins. NEBTC coins airdropped is locked lifelong but used only to form an x node. Anyone who receives NEBTC airdrop deserves to run an x node. An x node is a fundamental unit that comprises a node pool. X node holders can delegate to node pools if they wish to participate in the protocol and receive rewards. There are two ways an x node holder can earn rewards: by delegating their x node to a node pool run by someone else, or by running their own node pool. The number of x nodes delegated to a certain node pool is the primary way the NEBTC Network protocol chooses who should add the next block to the blockchain and receive a monetary reward for doing so. The more x node is delegated to a node pool, the more likely it is to make the next block – and the rewards that it earns are shared between everyone who delegated their x node to that node pool. Node pools are run by a reliable operator with the knowledge and resources to run the node on a constant basis.

In NEBTC Network, transactions and blocks are validated by selected node pool operators, called validators. Selected node pool operators run software allowing them to put transactions in blocks. The process is automated and does not require node pool operators to be constantly monitoring their computers. It, however, does require maintaining the computer uncompromised.

• Individuals qualified for an x node earn the right to become node pool operators.
• New node pool operators acting as a validator can be selected in accordance with the size of the node pool they generate.
• Selected node pool operators(validators) take turns signing and creating blocks at a set period.
• The first selected node pool operator must be registered in the Genesis Block.
• Selected node pool operators can be removed through voting among operators.
• PoA-NP of NEBTC Network delivers comparatively fast transactions.

###### 6.3 A Major Role of a D.Volt package in NEBTC Network

A D.Volt package is composed of a finger vein reader, a D.Volt wallet, and a smart watch. It has been developed for the purpose of setting up a node in the NEBTC Network. Each D.Volt package is NFTized and provides a Vein-X NFT as a certificate of authenticity. Each D.Volt package contains its own information such as its model name and the number of NEBTC airdrop coins given. Whoever wants to run a node should have a Vein-X NFT. Airdrop coins are used only to set up a node. Anyone with NEBTC airdrop coins is eligible to run an x node.

###### 6.4 Nodes in NEBTC Network

A blockchain consists of numerous blocks of data. These blocks of data are stored on nodes that can be compared to small servers. On a blockchain, all the nodes are connected to each other and they continuously exchange the newest information on the blockchain with each other. This ensures all nodes are updated.

In NEBTC Network, there are three kinds of nodes; x nodes, super nodes and authority nodes. An x node is a fundamental part of NEBTC Network blockchain network. Only x nodes are eligible to build a node pool, a community that is composed of not less than three x nodes.

The total number of x nodes in a node pool can serve as a criterion for selecting validators. According to the size of the node pool, super nodes and authority nodes are determined; Node pools from 1st to 5th are called authority nodes, and 6th to 10,000th super nodes.

There is no limit to the number of node pools, but a total number of super nodes and authority nodes is set at 10,000 for the stability of the blockchain network. If needed, the number can be increased by voting in the future.

###### 6.41 X node

X nodes receive rewards in return for a service, such as either participating in an existing node pool or newly building their own node pool. An x node should be in a node pool to receive x node rewards.

###### 6.42 Super node

Super nodes communicate with the blockchain while relying on authority nodes to provide them with the necessary information. They store a copy of the blockchain, and broadcast transactions for processing.

Super nodes receive additional rewards in return for a service, such as storing and communicating with the blockchain.

###### 6.43 Authority Node

Authority nodes act as a server in NEBTC Network. Their main tasks include maintaining the consensus between other nodes and verification of transactions. They also store a copy of the blockchain, thus being more secure and enable custom functions such as instant transfers and private transactions.

When making decisions for the future of a network, authority nodes are the ones that vote on proposals.

Authority nodes receive additional rewards in return for a service, such as verifying transactions, broadcasting transactions, storing a copy of the blockchain, and so on.

Airdrop & NFT Registration Procedures

#### 7. Tokenomics

• Name: NewBit
• Ticker Symbol: NEBTC
• Total Supply: 21,000,000
• Airdrops for Nodes: 10,000,000 (Locked eternally, only used as the criteria for setting up a node)
• Minting Rewards: 11,000,000 (Circulating Supply)

###### 7.1 Airdrops for Nodes

Of 21,000,000 NEBTC, 10,000,000 NEBTC are airdropped to set up nodes. To run an x node, you should stake as many as NEBTC coins airdropped.

※ How to calculate the number of coins to stake when setting up a node

$$If \frac{100*p}{2^{a-1}}\leq M \ Then\\ \qquad A=\frac{100}{2^{a-1}}$$

$$Else\\ \qquad A=\frac{M}{P}$$

※ Number of coins to stake (A)

SeriesNumber of Packages availableAirdropNEBTC to stake (A)
X1 10,000 100 A=0
X2 20,000 50 A≤50
X3 40,000 25 A≤25
X4 80,000 12.5 A≤12.5
X5 160,000 6.25 A≤6.25
X6 320,000 3.125 A≤3.125
X7 640,000 1.5625 A≤1.5625
X8 1,280,0000.78125 A≤0.78125
X9 2,560,0000.390625 A≤0.390625
X105,120,0000.1953125A≤0.193125
• The holder of X1 package will be provided with an airdrop of 100 NEBTC. X1 holders do not need to stake any additional NEBTC coins to run a node. 10,000 packages for X1 series are available.
• The holder of X2 package will be provided with an airdrop of 50 NEBTC. X2 holders need to stake additional 50 NEBTC (or less) coins to run a node. 20,000 packages for X2 series are available.
• The holder of X3 package will be provided with an airdrop of 25 NEBTC. X3 holders need to stake additional 25 NEBTC (or less) coins to run a node. 40,000 packages for X3 series are available.
• The holder of X4 package will be provided with an airdrop of 12.5 NEBTC. X4 holders need to stake additional 12.5 NEBTC (or less) coins to run a node. 80,000 packages for X4 series are available.
• The holder of X5 package will be provided with an airdrop of 6.25 NEBTC. X5 holders need to stake additional 6.25 NEBTC (or less) coins to run a node. 160,000 packages for X5 series are available.
• The holder of X6 package will be provided with an airdrop of 3.125 NEBTC. X6 holders need to stake additional 3.125 NEBTC (or less) coins to run a node. 320,000 packages for X6 series are available.
• The holder of X7 package will be provided with an airdrop of 1.5625 NEBTC. X7 holders need to stake additional 1.5625 NEBTC (or less) coins to run a node. 640,000 packages for X7 series are available.
• The holder of X8 package will be provided with an airdrop of 0.78125 NEBTC. X8 holders need to stake additional 0.78125 NEBTC (or less) coins to run a node. 1,280,000 packages for X8 series are available.
• The holder of X9 package will be provided with an airdrop of 0.390625 NEBTC. X9 holders need to stake additional 0.390625 NEBTC (or less) coins to run a node. 2,560,000 packages for X9 series are available.
• The holder of X10 package will be provided with an airdrop of 0.1953125 NEBTC. X10 holders need to stake additional 0.1953125 NEBTC (or less) coins to run a node. 5,120,000 packages for X10 series are available.

• ###### 7.2 Rewards for Nodes

There are two types of node rewards;

• Minting rewards
• D.Volt rewards

• ###### 7.21 Minting Rewards

Of 21,000,000 NEBTC, 11,000,000 NEBTC are distributed as rewards to ‘x nodes’ autonomously in accordance with rules encoded via smart contracts. To receive minting rewards, every x node should make a choice of either participating in an existing node pool or building his own node pool. Only x nodes who are in a node pool are qualified for minting rewards. Minting rewards are programmed to be offered to x nodes at a certain rate, in accordance with the amount of the sales of a D.Volt package. As the sales increase, the number of nodes may increase accordingly. A maximum of 1,500 to 1,000 NEBTC can be given out a day – which can be changed by voting.

Minting Rewards Distribution Rules

Each X Node receives minting rewards up to a maximum of 2000 times.

SeriesWhen to rewardRewardsTotal rewardsTo Whom
X1Every 10 sales15001,500,000X1
X2Every 20 sales13001,300,000X1, X2
X3Every 40 sales12001,200,000X1, X2, X3
X4Every 80 sales10001,000,000X2, X3, X4
X5Every 160 sales10001,000,000X3, X4, X5
X6Every 320 sales10001,000,000X4, X5, X6
X7Every 640 sales10001,000,000X5, X6, X7
X8Every 1,280 sales10001,000,000X6, X7, X8
X9Every 2,560 sales10001,000,000X7, X8, X9
X10Every 5,120 sales10001,000,000X8, X9, X10

For every 10 X1 package sold, 1,500 NEBTC are distributed as rewards equally to x nodes who have X1 NFT.

For every 20 X2 package sold, 1,300 NEBTC are distributed as rewards equally to x nodes who have X1 and X2 NFT.

For every 40 X3 package sold, 1,200 NEBTC are distributed as rewards equally to x nodes who have X1, X2 and X3 NFT.

For every 80 X4 package sold, 1,000 NEBTC are distributed as rewards equally to x nodes who have X2, X3 and X4 NFT.

For every 160 X5 package sold, 1,000 NEBTC are distributed as rewards equally to x nodes who have X3, X4 and X5 NFT.

For every 320 X6 package sold, 1,000 NEBTC are distributed as rewards equally to x nodes who have X4, X5 and X6 NFT.

For every 640 X7 package sold, 1,000 NEBTC are distributed as rewards equally to x nodes who have X5, X6 and X7 NFT.

For every 1280 X8 package sold, 1,000 NEBTC are distributed as rewards equally to x nodes who have X6, X7 and X8 NFT.

For every 2560 X9 package sold, 1,000 NEBTC are distributed as rewards equally to x nodes who have X7, X8 and X9 NFT.

For every 5120 X10 package sold, 1,000 NEBTC are distributed as rewards equally to x nodes who have X8, X9 and X10 NFT.

###### 7.22 D.Volt Rewards

D.Volt rewards are to share profits generated in the D.Volt Wallet ecosystem. 75% of the profits are given out as D.Volt rewards to x nodes, while 25% are given out to super nodes and authority nodes in proportion to the number of x nodes in the node pool.

※ Formula for calculating Vein-X rewards to X nodes

$$T_p=\sum_{a=1}^{10}\frac{(a+2)*b}{100*T_p}$$

or

$$1=\sum_{a=1}^{10}\frac{(a+2)*b}{100}$$

or

$$b=\sum_{a=1}^{10}\frac{100}{a+2}$$

(However, a is applied to the formula only in case of Xan>0 to calculate b)

$$X_Ra=\frac{T_p*((a+2)*b)}{X_an}$$

$$where\quad T_p=Total\quad profits \\ \qquad X_an:\quad Total\quad number\quad of\quad X\quad nodes\quad with\quad X_a\quad series\quad (a = 1, 2, 3, …, 10) \\ \qquad X_Ra:\quad Vein-X\quad rewards\quad for\quad X_a$$

Super nodes can increase the reputation by sharing rewards with the pool members or by donating part of them to society. Donations will be 100% returned at the time of the next rewards.

Donations are managed separately in the donation account. Super nodes can suggest ideas for how to spend the donations. Authority nodes should make a final decision in agreement before spending.

The flow of funds can be traced in Explorer and details will be posted on the Website.

System Architecture

###### Explorer

A service that can display the details of all transactions created on the blockchain network.

###### Dashboard

A service that monitors the recent block time, average block time, and gas price of nodes running on the network. If you check transaction information through Explorer, check the network status through Dashboard.

###### Decentralized Wallet

A wallet service in which each individual manages their private key through Mnemonic as a decentralized wallet. It allows pure P2P digital transactions without a separate entity (institution) that manages assets.

###### Synchronous Server

A service that directly connects and processes the address, deposit, and withdrawal requests required for hybrid wallet, multi-wallet and various service operations with the blockchain node.

###### Hybrid Wallet

All transaction details are recorded on the block chain, and transaction details are provided by using the DB as an auxiliary ledger. In addition, if necessary, a wallet service that provides a side-chain function through Wrapping/Un-Wrapping

###### Multi Wallet

A wallet service that connects legacy business and blockchain business models by providing various APIs to be linked with external systems such as finance, payment, and communication

#### D.Volt Wallet

A wallet service that manages virtual assets through a finger vein sensor

#### Smart Watch

Interlocking finger vein sensor and smart wallet in the early stage

#### Finger Vein Sensor

Sensor that manages finger vein information

#### Disclaimer

This white paper is to provide general information and is subject to change as required. We do not guarantee the accuracy of the statements made and we expressly disclaim any warranties or representations with respect to but not limited to the following;

• No assurance is given as to the future performance or value in respect to NEBTC.
• Unless a potential user fully acknowledges and accepts the nature of Vein-X business model and understands the possible risks associated with possessing, transferring and storing NEBTC, they shall not participate in any event on Vein-X.

• However, we shall make every effort to ensure that all information available is up to date:

• in Vein-X’s Whitepaper
• on Vein-X’s Website
• on Vein-X’s Telegram