Skip to main content

Product Introduction

Evidence Market is a dual-engine intelligence network composed of two markets with complementary logics.

To adapt to the information flow needs of different scenarios, the platform has built two independent sub-product sectors: Evidence Box Market and Bounty Market.


1. Evidence Box Market

A Passive Disclosure Network: "Evidence First, Buyer Later"

The Evidence Box Market is the cornerstone product of Evidence Market. The main problem it solves is: When a whistleblower already holds high-value or high-risk sensitive secrets, how can they safely monetize them and ensure the truth is eventually made public?

Core Operational Logic:

  • Encrypted Minting: The whistleblower encrypts the evidence via TEE and mints it into an on-chain blind box (Evidence Box), setting a buyout "base price" and the initial "delay fee".
  • Buyer's Game: Stakeholders (such as criminals) pay the base price to obtain the decryption key. If they want this evidence to remain private, they must continuously pay an exponentially increasing Delay Premium.
  • Trending towards Publication: When the buyer stops paying or can no longer afford the exorbitant delay fees, the smart contract will automatically release the key, and the truth will be published to the entire society.

Typical Application Scenarios:

  • Internal employees holding evidence of corporate financial fraud.
  • Insiders exposing environmental pollution or user data leaks.
  • Anonymous hackers acquiring criminal records of an illegal organization.
  • Whistleblowers grasping criminal records of an illegal organization.
  • Conscientious civil servants holding criminal records of corrupt officials.

2. Bounty Market

An Active Intelligence Network: "Demand First, Clues Later"

If the Evidence Box solves "I have a secret", then the Bounty Market solves "I need clues". It has transformed traditional offline bounty notices and informant systems into a decentralized intelligence demand pool characterized by transparent processes, anonymity, and privacy, requiring no trust.

Core Operational Logic:

  • Locking Bounties: Institutions or individuals publish specific information collection needs and pre-lock a certain amount of EMC, BTC, USDT in the smart contract as a bounty.
  • Anonymous Submission: Insiders submit relevant clues through the Bounty Market. The entire process is stealthy on-chain, ensuring personal safety.
  • Verification and Distribution: The bounty publisher evaluates and verifies the clues. Once verified, the bounty will be released to the intelligence provider.

Typical Application Scenarios:

  • Web3 projects that suffered hacker attacks offering bounties for clues to recover stolen funds.
  • Law enforcement agencies or security companies soliciting intelligence on fugitives globally.
  • Victim rights groups jointly offering a bounty for the internal key roster of a fraud syndicate.
  • Commercial research institutions publicly offering bounties for specific business data of listed companies.
  • Anonymous informants submit intelligence on criminal activities in exchange for a reward.

Conclusion: The Complementary Effect of Dual Engines

  • Evidence Box Market creates a "Game Pool of Information Blind Boxes", using economic pressure to force wrongdoers to pay the price, providing a monetization and protection channel for random, sudden exposures.
  • Bounty Market creates a "Clear Pool of Information Demand", using pre-placed real money to drive insiders to break their silence, providing intelligence sources for long-term, specific investigations.

These two markets are independent yet closely integrated in the underlying token mechanism, together forming the complete intelligence circulation infrastructure of Evidence Market.