Welcome to PHANTOM Delegates

Performance Driven Encrypted Transactional DataPrivate Smart Contracts through a Delegated Proof-of-Stake System

Open Source

Built on top of ARK’s open-source blockchain to build an interoperable, scalable, governed solution.

Scalable Infrastructure

Allows for cross-chain interoperable communication through smart bridges and private smart contracts

51%

Malicous Attack Proof by operating a Delegated Proof-of-Stake consensus model.

Protect Data

Build Decentralized Applications that can be trustless and protect sensitive data such as ID applications.

Private Contracts

The transactional data that gets verified by the nodes is  divided so that one node does not have the ability to view the information

Supports Open Standards

High Throughput Transactional Capabilities to process Private Smart Contracts efficiently.

Phantom Chain Connect to the PHANTOM network through a standard desktop client

Phantom Chain gives our users the ability to send and receive transactions, launch and view private smart contracts, vote and stake in the network, and more.

Run a PHANTOM Node

Enabling Strong GovernanceA decentralized protocol where delegates are voted in to operate the system

Delegates

PHANTOM network Delegates are the block producers of the network who are voted by the operators of the blockchain.

Multiple Nodes

Transactions performed by Private Smart Contracts get broken down to pieces of code that go through numerous nodes so that the data can’t be revealed. 

Guaranteed

Transactions are guaranteed to be processed by nodes with low fee computing costs.

Cross-chain Interoperable Smart ContractsUtilize ARK's Smart Bridge Tool to communicate cross-chains privately

The PHANTOM blockchain has been built and forked off of ARK’s system with the ability to be interoperable with other blockchain’s launched within the network. PHANTOM launched blockchains are pre-programmed with our PHANTOM layer that allows communication between different designed blockchains with the ability to communicate privately. Users can set up a specific key which will be used to access the data when sending a transaction. This key is is locked by the system and broken into pieces so that one single node can’t decrypt the data. 

Ready to Learn More?The Hard Fork Is Coming

 Read the Light Paper

PHANTOM CommunityJoin us on social media!