Cybercentry ($CENTRY)
Recent developments: 20% of the initial token allocation is held by the creator.
Creator token stats last updated: Jun 1, 2025 12:03
The following is generated by an LLM: Summary AI cybersecurity hub with blockchain transparency and vested team tokens
Analysis Cybercentry ($CENTRY) is an AI-powered cybersecurity platform built on the Virtuals Protocol, aiming to address the global cybersecurity talent shortage and high costs through blockchain and AI integration. The tokenomics allocate 20% (200M tokens) to the founder, Leigh Cronian, with a 12-month vesting period starting December 2025, reducing immediate sell-off risks. The project demonstrates legitimate use cases for its token, such as transparent billing and global accessibility to cybersecurity services, while partnering with established firms like CompTIA and Cyberbit. However, reliance on a single founder and unverifiable LinkedIn credentials introduce risks. Smart contracts were audited by Solidity Scan, and the multi-phase roadmap shows structured growth plans. The 20% founder allocation is reasonable given vesting schedules but warrants monitoring. No evidence of a rug pull exists at launch.
Rating: 7
Generated with LLM: deepseek/deepseek-r1
LLM responses last updated: Jun 1, 2025 12:04
Original investment data: # Cybercentry ($CENTRY)
URL on launchpad: https://app.virtuals.io/geneses/3574
Launched at: Sun, 01 Jun 2025 08:19:45 GMT
Launched through the launchpad: Virtuals Protocol
Launch status: GENESIS
## Token details and tokenomics
Token symbol: $CENTRY
Token supply: 1 billion
Creator initial number of tokens: Creator initial number of tokens: 200,000,000 (20% of token supply)
## Creator info
Creator address: 0xcBF336181e219E7900C1dE539f85dECC1509e3a0
Creator on basescan.org: https://basescan.org/address/0xcBF336181e219E7900C1dE539f85dECC1509e3a0#asset-tokens
Creator on virtuals.io: https://app.virtuals.io/profile/0xcBF336181e219E7900C1dE539f85dECC1509e3a0
Creator on zerion.io: https://app.zerion.io/0xcBF336181e219E7900C1dE539f85dECC1509e3a0/overview
Creator on debank.com: https://debank.com/profile/0xcBF336181e219E7900C1dE539f85dECC1509e3a0
## Description at launch
@centry_agent – An AI-Powered Cyber Security Information and Intelligence Hub, an Agent Commerce Protocol (ACP) ready, Virtuals Hackathon finalist, which automates aggregation and analysis of cyber security data. It delivers up-to-date insights on best practices, compliance, and industry trends. Provides actionable knowledge to help users stay informed, adapt to challenges, and strengthen digital defences.
## Overview
Whitepaper
Abstract
$CENTRY, a Virtuals Hackathon finalist, Agent Commerce Protocol (ACP) ready, is the world’s first AI-Powered Cyber Security Information and Intelligence Hub on the Virtuals Protocol, revolutionising how cyber security knowledge is accessed and applied. By automating the aggregation and analysis of cyber security data, $CENTRY delivers, actionable insights on best practices, compliance updates, and industry trends. It addresses a global shortage of 3.5 million cyber security professionals in 2025 (Cybersecurity Ventures), empowering new entrants, professionals, and small to medium-sized enterprises (SMEs) to strengthen their digital defences against £7.6 trillion ($10.5 trillion) in annual cybercrime costs. Built on the Virtuals Protocol Generative Autonomous Multimodal Entities, Software Development Kit (GAME SDK) Framework, and leveraging blockchain for transparency, $CENTRY democratises access to cyber security expertise in a market projected to reach £198 billion ($271.9 billion) by 2029, ensuring users worldwide can effectively and affordably secure their digital assets.
Introduction
The cyber security landscape in 2025 is at a critical juncture, with a global job shortage of 3.5 million (Cybersecurity Ventures), £7.6 trillion ($10.5 trillion) in annual cybercrime damages, and a projected market growth of £198 billion ($271.9 billion) by 2029, highlighting the urgent need for innovative solutions. Traditional cyber security consultancy, often costing £500 ($620.76) per day, is inaccessible to many, particularly SMEs and individuals in underserved regions. Meanwhile, the rapid pace of digital transformation has exposed vulnerabilities, from ransomware to supply chain breaches, demanding agile, scalable, and universally accessible security measures.
$CENTRY addresses these challenges by combining Artificial Intelligence (AI) with blockchain technology. As an AI-Powered Cyber Security Information and Intelligence Hub, it automates the delivery of cyber security insights, bridging the knowledge gap for users globally. By integrating blockchain principles inspired by the original $CENTRY vision, $CENTRY ensures transparency and trust in its operations, making cyber security knowledge not only accessible but also equitable. Built on the Virtuals Protocol GAME SDK Framework, $CENTRY empowers users to navigate the digital landscape confidently, aligning with the mission to secure digital assets "one token at a time" while adapting to the evolving needs of a globalised market.
Market Opportunity
Cyber Security Industry Growth Potential
The global cyber security market is undergoing rapid expansion, driven by the escalating frequency and sophistication of cyber threats coupled with the increasing digitisation of business operations worldwide. Market research forecasts indicate that the industry, valued at $87 billion in 2024, is expected to burgeon to $271.9 billion by 2029, representing a compound annual growth rate (CAGR) of 26%. This growth is not only a reflection of rising demand for robust cyber security solutions but also signals a significant opportunity for innovative approaches like those offered by $CENTRY.
$CENTRY targets four key challenges in the cybersecurity industry, drawing from both its current mission and the foundational insights of the original $CENTRY project:
High Fees in Cyber Security: Globally, cyber security is a significant financial burden for individuals and businesses due to the high costs associated with securing digital assets against increasing threats. The Global Cyber security Outlook 2024 by the World Economic Forum highlights that the complexity and necessity of cyber security measures continue to drive up costs, which can be particularly challenging for SMEs that may lack the resources for such significant investments (World Economic Forum, 2024).
Lack of Transparency in Cyber Security Billing: The World Economic Forum also notes issues related to the transparency of cyber security efforts, including how costs are calculated and billed. This lack of transparency can lead to difficulties in financial planning and budgeting for businesses, exacerbating the challenge of managing cyber security expenditures (World Economic Forum, 2024).
Rigid Payment Structures in Cyber Security: As reported by Cobalt, the rigid payment structures commonly seen in the cyber security industry often do not align well with the dynamic nature of cyber threats and the evolving needs of individuals and businesses. This can prevent access to the most effective and up-to-date security measures when they are most needed, thus increasing their vulnerability to cyber-attacks (Cobalt, 2024).
Global Cyber Security Job Shortage: According to Cybersecurity Ventures, there were 3.5 million unfilled cybersecurity jobs worldwide in 2021, highlighting a significant skills gap in the industry. This shortage has persisted, with projections suggesting that the number of unfilled positions remains at around 3.5 million through 2025. This gap is creating a bottleneck in the global fight against cybercrime, as there are not enough trained professionals to secure the digital infrastructure against the ever-evolving threats (Cybersecurity Ventures, 2024).
$CENTRY'S Solution:
Transparent Pricing: Leveraging blockchain technology, $CENTRY aims to eliminate hidden fees and provide complete visibility into transaction histories, thereby addressing global concerns about billing transparency in cyber security.
Flexible Access: By allowing users to pay for cyber security services on-demand, $CENTRY addresses the need for more adaptable payment structures that can quickly adjust to the evolving landscape of cyber threats.
Global Accessibility: $CENTRY uses blockchain to lower entry barriers, making high-quality cyber security services affordable and accessible to markets worldwide, particularly benefiting regions, individuals, and businesses previously underserved.
@centry\_agent: Introduced by Cybercentry, @centry\_agent is a revolutionary tool within the $CENTRY ecosystem. It automate the aggregation and analysis of cyber security information, ensuring users receive up-to-date insights on best practices, compliance updates, and industry developments, enhancing the security posture of users at a fraction of traditional costs. The agent operates seamlessly within the $CENTRY framework, ensuring users can scale their security measures without financial strain.
Leveraging Global Trends for Local Impact
$CENTRY is uniquely positioned to capitalise on the shift towards more digital and decentralised individual and business environments, which demand innovative cyber security solutions. By addressing the specific needs and challenges identified in various global markets, $CENTRY can tailor its offerings to provide maximum value, enhancing its adoption and impact.
Tokenomics Plan
$CENTRY operates with a fixed supply of 1 billion $CENTRY tokens, ensuring sustainable growth and user trust:
Public Sale (37.5%): 375 million tokens allocated for public participation, fostering broad adoption.
Liquidity Pool (12.5%): 125 million tokens to maintain market stability.
Early Adopter Incentive (2.5%): 25 million tokens, fully released on 17.12.2025, rewarding early adopters.
Liquidity Provisions (5.0%): 50 million tokens, fully released on 17.12.2025, supporting ecosystem liquidity.
Utility (5.0%): 50 million tokens, released over 6 months, 17.12.2025 to 17.06.2026, enabling platform functionality.
Community & Marketing (5.0%): 50 million tokens, released over 6 months, 17.12.2025 to 17.06.2026, driving user engagement.
Team (20.0%): 200 million tokens, released over 12 months, 17.12.2025 to 17.12.2026, supporting development.
Treasury (12.5%): 125 million tokens, released over 12 months, 17.12.2025 to 17.12.2026, funding future initiatives.
The Team
Overview
As the founder of $CENTRY, Leigh Cronian manages all strategic and technical aspects of the project. His extensive background in IT and cyber security equips him to handle these responsibilities effectively.
Profile
Leigh Cronian - Founder and Managing Director
Background: With over three decades in IT, Communications and Cyber Security, Leigh Cronian has cultivated a depth of knowledge that drives the innovative solutions at $CENTRY. His experience spans from system architecture to project management in various high-stakes environments.
Key Contributions: Leigh Cronian’s role involves overarching project management, technical development, community engagement, and business strategy.
For further details on his professional experience and qualifications, please view his LinkedIn profile [ https://www.linkedin.com/in/leigh-cronian/ .]( https://www.linkedin.com/in/leigh-cronian/ .)
Building Trust and Credibility
Leigh Cronian has led high-stakes projects for government and defence clients, strengthening cyber security frameworks and implementing secure system architectures. His expertise includes threat modelling, risk assessments, cloud security operations, and compliance with international standards, as demonstrated by his certifications. Recognising the transformative potential of blockchain technology, he has designed secure frameworks for blockchain-based systems, integrating them into cyber security practices to enhance pricing transparency, flexible access and global accessibility. These accomplishments establish his credibility in IT, cryptocurrency, and cyber security, laying a strong foundation for $CENTRY as a secure, transparent, and efficient payment token for cyber security services.
Transparency: Commitment to transparency and excellence is the cornerstone of this project. Leigh Cronian will engage continuously with the community through various channels to maintain open communication and ensure that our roadmap aligns with user needs and industry standards.
Conclusion
Leigh Cronian’s comprehensive approach ensures that $CENTRY is not just a product but a pioneering solution in the cyber security space, promising high efficacy and user satisfaction. His direct involvement in all aspects of the project guarantees that we adhere to the highest standards of quality and innovation.
Partners
Cybercentry collaborates with leading companies to provide $CENTRY users with a comprehensive suite of cyber security offerings:
Bulletproof: Secure hosting and infrastructure to ensure reliable access for $CENTRY users.
CompTIA: Cyber security certifications and training resources for $CENTRY users to enhance their skills.
CoreView: Tools for improved visibility and management of digital assets, available to $CENTRY users.
Cyberbit: Access to cyber range training for $CENTRY users to practice real-world threat response.
Greenbone: Vulnerability management solutions for $CENTRY users to identify and mitigate risks.
ISC2: Professional development programs in cyber security for $CENTRY users to meet global standards.
Kite: Seamless integration tools for $CENTRY users to connect with various platforms.
MAD20: Advanced cyber security technologies for $CENTRY users to strengthen their defences.
Otario: Threat intelligence and analytics services for $CENTRY users to stay ahead of risks.
Pervade Software: Monitoring software solutions for $CENTRY users to enhance security oversight.
Proton: Privacy-focused tools for $CENTRY users to protect sensitive data.
Solidity Scan: Smart contract auditing services for $CENTRY users to ensure secure transactions.
Sonar: Code quality and security tools for $CENTRY users to improve their development practices.
Vanta: Compliance management solutions for $CENTRY users to meet regulatory requirements.
Through these partnerships, $CENTRY users gain access to a wide range of tools and services, enabling them to effectively secure their digital assets.
Leveraging External Support
Overview
To ensure $CENTRY achieves its objective of streamlining cyber security, we will collaborate with leading specialists who provide additional skills and resources essential for our operational success.
Outsourced Roles and Partners
Token Creation
Virtuals Protocol
Expertise and Contribution: Virtuals Protocol specialises in the technical creation of blockchain-based tokens and the GAME SDK Framework for the @centry\_agent AI-Agent. For the $CENTRY project, they leverage their extensive blockchain expertise to meticulously develop the $CENTRY token, ensuring both its robustness and functionality.
Reason for Outsourcing: By leveraging Virtuals Protocol’s expertise in token creation, we ensure that the foundational cryptocurrency aspect of $CENTRY is developed according to the highest standards of blockchain technology. This collaboration allows our team to focus intensively on developing the @centry\_agent, AI-Agent and Marketplace, which is at the core of our innovation in cyber security.
Token Deployment
Base
Expertise and Contribution: Base specialises in deploying blockchain-based tokens onto its Ethereum Layer 2 platform. For the $CENTRY project, Base Network’s role is specifically focused on the seamless deployment of the $CENTRY token, ensuring its integration within Base’s infrastructure is secure, scalable, and optimised for efficient transactions. This process guarantees that $CENTRY tokens are positioned to operate effectively within the decentralised ecosystem, leveraging Base’s low-cost and high-performance capabilities.
Reason for Collaboration: By utilising Base Network’s expertise in token deployment, $CENTRY ensures a smooth transition onto a robust Layer 2 environment. This strategic partnership enables our team to concentrate on advancing the $CENTRY platform’s core features and innovation in cyber security, while relying on Base to provide the secure, scalable blockchain environment necessary to support our token.
Smart Contract Security and Verification
Solidity Scan
Expertise and Contribution: Solidity is a leader in blockchain security, known for their rigorous auditing processes. They provide comprehensive smart contract audits that ensure the security and integrity of blockchain implementations. Solidity Scan will conduct thorough security audits on our smart contracts to identify and prevent vulnerabilities, thereby enhancing trust in our transaction mechanisms.
Reason for Outsourcing: Engaging Solidity Scan’s specialised security services ensures that the $CENTRY tokens are not only compliant with the highest standards of blockchain security but are also safeguarded against emerging cyber security threats. This collaboration underscores our commitment to maintaining rigorous security standards and building user trust.
Marketing and User Engagement
Sprout Social Inc
Expertise and Contribution: Known for their advanced digital marketing strategies, Sprout Social Inc will manage our efforts to promote $CENTRY and engage with potential users worldwide. They will help communicate the benefits of using $CENTRY for cyber security.
Reason for Outsourcing: Outsourcing this role enables us to focus on core development while ensuring that our marketing is effective, innovative, and professionally managed.
Building Trust and Credibility
Selection Process: All partners, including Virtuals Protocol, Solidity Scan and Sprout Social, were selected for their proven expertise and alignment with $CENTRY’s mission to simplify cyber security.
Management and Coordination: Regular reviews and coordination meetings are held to ensure that all outsourced activities align with $CENTRY’s operational goals and user expectations.
Conclusion
By outsourcing critical operations to Virtuals Protocol for token creation, Base for token deployment, Solidity Scan for security auditing, and Sprout Social Inc for marketing, $CENTRY leverages specialised expertise to enhance the functionality and market reach of our token. This strategic approach ensures that $CENTRY is optimally positioned to revolutionise the cyber security industry, making it more accessible, transparent, and efficient. These partnerships not only extend our operational capacity but also reinforce our commitment to providing a reliable payment solution within the cyber security space.
Smart Contract Security
Ensuring Trust and Transparency
$CENTRY's commitment to security is paramount, given the critical role of trust in adoption and scalability of any blockchain-based platform. Recognising this, $CENTRY has invested in comprehensive security strategies that not only safeguard the platform but also ensure its operations are transparent and verifiable by all stakeholders.
External Audit by Solidity Scan
To ensure the highest standards of security, $CENTRY's smart contract has undergone rigorous auditing by Solidity Scan, a leading provider of blockchain security solutions. The audit process is extensive and is designed to ensure that the smart contracts not only meet expected standards but also set new benchmarks for security in the cryptocurrency space.
Audit Objective and Scope
Comprehensive Analysis: The audit comprehensively reviews the smart contract’s codebase for security vulnerabilities, adherence to best coding practices, and alignment with the latest in blockchain security protocols.
Functionality Verification: Tests the functionality of all smart contract mechanisms to ensure they operate as intended under various conditions.
Identification of Vulnerabilities and Logical Flaws: Focuses on identifying potential security risks, including reentrancy attacks, overflow bugs, and improper access controls.
Stress Testing: Subjecting the smart contracts to extreme conditions to evaluate their resilience and ability to handle unexpected or malicious interactions.
Audit Outcomes and Implementations
Recommendations and Improvements: Solidity Scan provides detailed recommendations based on its findings, which $CENTRY’s development team promptly implements. This collaborative process ensures any vulnerabilities are addressed before the token goes live.
Ongoing Audits and Security Updates: Security is an evolving challenge, especially in the blockchain space. $CENTRY has committed to regular audits and updates to its smart contract to adapt to new threats and vulnerabilities as they emerge.
Solidity Scan’s Role in Enhancing $CENTRY’s Reliability
Building User Trust: By partnering with a respected and independent third-party auditor like Solidity Scan, $CENTRY enhances its credibility and builds trust among its users and investors.
Transparency of Security Practices: Solidity Scan’s audit results are made public, providing transparency and reinforcing $CENTRY’s commitment to security and accountability.
Future Security Initiatives
Automated Security Checks: Integration of automated tools to continuously scan the smart contract for vulnerabilities.
Enhanced Security Protocols: Ongoing development of proprietary security protocols that leverage the latest advancements in blockchain technology.
Community Involvement in Security: Encouraging the $CENTRY community to participate in security verifications through bounty programmes and public audits.
Roadmap (2025–2029)
Phase 1: Launch and Awareness (Q2 2025)
Objective: Successfully launch $CENTRY and initiate a comprehensive global awareness campaign.
Key Activities:
Host a series of educational webinars and interactive sessions to engage potential users and investors, showcasing the benefits and functionalities of $CENTRY.
Kickstart aggressive social media campaigns across multiple platforms to build brand recognition and community support, utilising targeted ads and influencer partnerships.
Establish foundational liquidity on Virtuals Protocol to ensure smooth trading and accessibility for users globally.
Milestones: Achieve 10,000 active users and complete 50,000 transactions.
Risk Management: Develop a market volatility response plan and consult with compliance experts to ensure regulatory adherence in all operational regions.
Phase 2: Cybercentry Agent Commerce Protocol (ACP) Integration (Q3 2025)
Objective: Integrate Cybercentry (@centry\_agent) with the ACP to enable secure, AI-driven commerce with enhanced cyber security for autonomous agent transactions.
Key Activities:
Develop and implement integration of Cybercentry’s (@centry\_agent) AI-Powered Cyber Security Information and Intelligence Hub capabilities into ACP ( https://app.virtuals.io/research/agent-commerce-protocol ), ensuring full compatibility with ACP’s smart contract-based escrow and cryptographic verification systems.
Launch targeted outreach campaigns to engage developers and AI agent communities, highlighting how Cybercentry’s (@centry\_agent) security strengthens ACP’s permissionless commerce for trusted, scalable agent interactions.
Milestones: Complete integration of Cybercentry (@centry\_agent) with ACP and achieve secure, verified transactions via ACP.
Risk Management: Employ Cybercentry’s (@centry\_agent) advanced AI-driven threat detection to monitor ACP transactions for potential vulnerabilities, ensuring robust protection within ACP’s decentralised framework and preventing security breaches.
Phase 3: Partnerships with Cyber Security Providers and Cybercentry Partner Programme (Q4 2025)
Objective: Form strategic partnerships with leading cyber security firms and implement the Cybercentry Partner Programme to extend $CENTRY’s reach to vulnerable groups and drive ecosystem adoption.
Key Activities:
Collaborate with cyber security service providers to pilot $CENTRY payments, focusing on demonstrating ease of integration and transaction security.
Launch the Cybercentry Partner Programme to engage with advocacy groups, non-profits, and academic institutions, providing subsidised services and fostering innovation through joint initiatives.
Develop comprehensive case studies to showcase the effectiveness and benefits of integrating $CENTRY into existing cyber security solutions and the impact of the Cybercentry 
Partner Programme.
Milestones:
Secure at least five strategic partnerships with leading cyber security firms.
Onboard 10 advocacy groups or non-profits through the Cybercentry Partner Programme to provide subsidised services.
Risk Management:
Conduct regular security assessments and updates in collaboration with partners to enhance system security.
Establish feedback loops with Cybercentry Partner Programme participants to refine and improve the initiative.
Phase 4: Bitpay, Coinbase Commerce and Crypto.com Integration (Q1 2026)
Objective: Enable seamless $CENTRY transactions through Bitpay, Coinbase Commerce and Crypto.com.
Key Activities:
Work closely with technical teams from Bitpay, Coinbase Commerce and Crypto.com to ensure seamless integration.
Develop and distribute comprehensive user-friendly guides and promotional campaigns to encourage adoption among SMEs and individual users.
Milestones: Achieve full operational integration with both payment platforms.
Risk Management: Establish dedicated support channels to promptly address any integration issues or user concerns.
Phase 5: Global Expansion (2026)
Objective: Expand the $CENTRY ecosystem into underserved regions, focusing on localisation and accessibility.
Key Activities:
Build partnerships in Africa, South America, and Southeast Asia to tailor $CENTRY's offerings to meet local market needs and compliance requirements.
Develop localised marketing campaigns that address regional cyber security challenges and highlight $CENTRY's benefits.
Milestones: Successfully launch operations in at least two new continents.
Risk Management: Adapt strategies based on ongoing market feedback and regional regulatory developments.
Phase 6: Enhancing Utility (2027)
Objective: Introduce token-based subscriptions for cyber security services and enhance the utility of the $CENTRY token.
Key Activities:
reward programs for users who adhere
Implement reward programmes for users who adhere to security best practices, enhancing user engagement and platform security.
Milestones: Successfully transition 25% of existing users to the new subscription model.
Risk Management: Monitor user feedback and adjust the subscription model as needed to maximise satisfaction and utility.
Phase 7: Ecosystem Development (2028)
Objective: Develop a comprehensive cyber security marketplace.
Key Activities:
, such as discounts or access to new features, designed to boost
Partner with universities to fund research projects using $CENTRY tokens, fostering innovation in cyber security solutions.
Milestones: Launch the marketplace with at least 50 active vendors and 10,000 transactions per month.
Risk Management: Implement strict vendor verification processes and continuous monitoring to ensure a secure and reliable marketplace.
Phase 8: Global Standardisation (2029)
Objective: Establish $CENTRY as the global standard for blockchain-based cyber security payments.
Key Activities:
Collaborate with governments and multinational corporations to advocate for blockchain adoption in cyber security payments.
Publish annual reports showcasing $CENTRY’s impact and industry adoption, reinforcing its status as a market leader.
Milestones: Achieve recognition as a standard payment method in at least five major industries.
Risk Management: Engage in continuous dialogue with industry leaders and regulators to ensure $CENTRY meets evolving standards and expectations.
Technology Architecture
Blockchain Architecture and Data Flow
Overview
$CENTRY is an ERC20 token on the Base Chain, an Ethereum Layer 2 network built on Optimism’s OP Stack. Base provides secure, low-cost, and developer-friendly infrastructure, leveraging Ethereum’s security with faster transactions and lower fees. Integrated with the Virtuals Protocol and GAME SDK Framework, $CENTRY enhances dApps with seamless transaction management, asset integration, and user accessibility, supported by Base’s Coinbase integration.
Data Flow
Token Creation: A smart contract defines $CENTRY’s supply and rules, deployed on Base, configured with Virtuals Protocol for asset interoperability, and integrated with the GAME SDK for enhanced functionality.
Transactions: Users interact via ERC20 functions (transfer(), approve()) or GAME SDK APIs for efficient asset transfers, with Virtuals Protocol enabling cross-dApp compatibility.
Validation: Base nodes validate transactions against the contract’s rules, with Virtuals Protocol and GAME SDK ensuring compliance.
Execution and Recording: Validated transactions update the blockchain ledger, recorded in a new block, with the GAME SDK syncing states and Virtuals Protocol maintaining interoperability.
Advanced Technologies
Virtuals Protocol: Facilitates interoperable asset management and cross-dApp interactions, enhancing $CENTRY’s utility in DeFi ecosystems.
GAME SDK Framework: Enables secure asset management and user-friendly wallet integration, optimizing $CENTRY for DeFi applications.
Oracles: Import off-chain data to trigger contract events, expanding $CENTRY’s functionality.
This framework positions $CENTRY as a secure, innovative token for DeFi, leveraging Base, Virtuals Protocol, and the GAME SDK for scalability and growth.
User Adoption Strategies
Tactics for Onboarding Users
Educational Programmes
$CENTRY will initiate an extensive series of educational initiatives aimed at demystifying blockchain technology and highlighting its advantages for cyber security. These programmes will include webinars, interactive workshops, and comprehensive guides tailored to accommodate different user groups, from tech-savvy individuals to less technical SME owners. This ensures all users are well-equipped to leverage the platform effectively.
Incentive Structures
To encourage adoption and foster loyalty, $CENTRY will deploy various incentives:
Loyalty Rewards: Frequent users will receive rewards, such as discounts or access to new features, designed to boost retention.
Airdrops: Community engagement activities will include airdrops to distribute free tokens, rewarding participation and bolstering community growth.
The Cybercentry Partner Programme
The Cybercentry Partner Programme is a cornerstone initiative designed to extend $CENTRY’s reach and impact by collaborating with advocacy groups, non-profit organisations, academic institutions, and private companies. This programme aims to support vulnerable groups and drive user adoption by:
Offering discounted or free access to premium cyber security tools.
Enhancing Awareness: Delivering educational campaigns and training tailored to vulnerable populations.
Fostering Innovation: Encouraging joint research to develop tailored cyber security solutions.
Through strategic partnerships, $CENTRY aims to enhance trust, expand its ecosystem, and establish itself as a socially responsible platform addressing global digital security disparities.
Feedback Mechanisms for User Adoption
To ensure the platform aligns with user needs and expectations, $CENTRY will integrate robust feedback mechanisms:
Surveys and Community Forums: Following the launch, $CENTRY will gather user feedback through detailed surveys and active forums, enabling users to share their experiences and provide suggestions.
Pilot Programmes: These programmes will collect real-world insights from early adopters, providing valuable data to refine user interfaces, optimise transaction processes, and ensure the platform evolves to meet user needs.
Conclusion
These strategies are designed to smooth the onboarding process, sustain user engagement, and adapt $CENTRY’s platform to effectively serve its growing global user base. By combining education, incentives, partnerships, and continuous feedback, $CENTRY ensures a robust and user-focused ecosystem for cyber security.
Regulatory Compliance and Ethics
Meeting Global Compliance Standards
Compliance Framework: $CENTRY is developed in strict adherence to international cyber security and financial regulations, including GDPR in Europe and CCPA in California, ensuring that user data is handled with the highest standards of privacy and security.
Ethical Considerations: $CENTRY commits to ethical operations, emphasising user consent and transparency. The system is designed to ensure that all transactions are traceable and auditable by authorised parties only, fostering trust and accountability within the ecosystem.
committed to our mission of providing
Ethics in Deployment
Fair Access: $CENTRY's model is built to ensure that all users, regardless of their economic or geographical conditions, have access to affordable and effective cyber security solutions. This commitment to fairness and equity is central to $CENTRY's mission.
Sustainability: Considering environmental impacts, $CENTRY's blockchain operates on a Proof-of-Stake (PoS) mechanism, which significantly reduces energy consumption compared to traditional Proof-of-Work (PoW) systems, aligning with global sustainability goals.
Proof-of-Stake (PoS) mechanism, which significantly reduces energy consumption compared to traditional Proof-of-Work (PoW)
Conclusion
Reinventing Cyber Security
$CENTRY has been meticulously designed to redefine the landscape of cyber security through the innovative application of blockchain technology. By addressing the challenges of high fees, lack of transparency in billing, and rigid payment structures in cyber security, $CENTRY is set to transform how cyber security services are accessed and paid for, ensuring that individuals and businesses worldwide can secure their digital assets effectively and affordably.
Key Achievements and Future Outlook
Transparency and Trust: $CENTRY’s blockchain-based system eliminates hidden fees and provides a transparent transaction ledger, ensuring that users can trust the integrity and fairness of the payment process.
Flexibility in Service Provision: The tokenomics of $CENTRY allow for on-demand access to cyber security services, enabling users to respond swiftly to evolving threats without the constraints of traditional methods.
Global Accessibility: By democratising access to top-tier cyber security services, $CENTRY enables individuals and businesses, in underserved regions, to protect their digital assets at a fraction of the conventional cost.
@centry\_agent: Cybercentry’s @centry\_agent, integrated into the $CENTRY ecosystem, automates cyber security information analysis, delivering real-time insights on best practices, compliance, and industry trends. Operating within the $CENTRY framework, it enhances users’ security posture cost-effectively, reinforcing $CENTRY’s commitment to scalable, accessible cyber security solutions.
$CENTRY's Role in the Evolving Cyber Security Ecosystem
As digital threats become more sophisticated and pervasive, the need for innovative and effective cyber security solutions becomes increasingly critical. $CENTRY’s introduction of a blockchain-powered payment platform is a timely solution that aligns with global digital transformation trends. The platform’s ability to integrate seamlessly with existing cyber security infrastructures makes it a versatile and essential tool for future-proofing digital security.
Call to Action
We invite individuals, businesses, cyber security providers, and investors to join us in this journey to secure the digital landscape, one token at a time. Whether you are seeking to enhance your cyber security measures or contribute to the evolution of digital payment systems, $CENTRY offers a unique opportunity to participate in a pioneering project that combines security, innovation, and community-focused values.
Looking Forward
As we look to the future, $CENTRY is committed to continuous improvement and adaptation to meet the challenges of an ever-changing cyber security environment. Our roadmap is designed not only to expand our services and reach but also to foster innovation that sets new standards in cyber security. We are excited about the possibilities that $CENTRY brings to the digital world and are committed to our mission of providing secure, flexible, and transparent cyber security solutions.
Join us as we forge ahead, shaping the future of cyber security with blockchain technology, and securing the digital landscape, one token at a time, to protect individuals and businesses worldwide.
References
World Economic Forum. (2024). Global Cyber Security Outlook 2024. This report discusses the financial burdens of cyber security and the challenges of transparency in billing practices.
Cobalt. (2024). Offensive Security Services Report. Analyses rigid payment structures in the cyber security industry that do not adapt well to the dynamic nature of cyber threats.
Cybersecurity Ventures. (2025). Cybercrime Report. Predicts a 3.5 million worldwide job gap in cybersecurity for 2025.
## Additional information extracted from relevant pages
<fetched_info>
""" https://www.linkedin.com/in/leigh-cronian/
Firecrawl API error: 403
"""
""" [Creator profile on Virtuals Protocol]( https://api.virtuals.io/api/profile/0xcBF336181e219E7900C1dE539f85dECC1509e3a0 )
{
"data": {
"id": 239105,
"displayName": null,
"bio": "I’m Leigh Cronian, the Founder of $CENTRY, a project I’m genuinely excited about that’s reshaping cyber security for cryptocurrency and Web3 with a fresh, transparent approach. Based in England, United Kingdom (UK), I lead the strategy, delve into technical development, and enjoy connecting with our fantastic community. With over 30 years in IT, communications, and cyber security, plus an MSc in Cyber Security, I bring a wealth of experience from crafting secure system architectures to leading major projects for government, defence, and the financial sector, across the UK and internationally.\r\n\r\nI’m passionate about tackling significant challenges, particularly in designing secure, AI-powered solutions for cryptocurrency and Web3 that deliver transparent pricing, flexible access, and global accessibility. My certifications and deep expertise keep me sharp, ensuring $CENTRY upholds the highest standards for secure digital ecosystems. It’s all about building an AI-agent that’s robust, user-focused, and ready for the future of decentralised tech.\r\n\r\nI value open communication, regularly engaging with our community to share progress and align $CENTRY with user needs and industry standards. My goal is to make $CENTRY a trusted and impactful solution for the cryptocurrency and Web3 ecosystem.\r\n\r\nLearn more about my journey on LinkedIn: linkedin.com/in/leigh-cronian.",
"avatar": {
"id": 35248,
"name": "Bio.jpg",
"alternativeText": null,
"caption": null,
"width": 500,
"height": 337,
"formats": {
"thumbnail": {
"ext": ".jpg",
"url": " https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/thumbnail_Bio_5512eea7c0.jpg ",
"hash": "thumbnail_Bio_5512eea7c0",
"mime": "image/jpeg",
"name": "thumbnail_Bio.jpg",
"path": null,
"size": 2.47,
"width": 231,
"height": 156
}
},
"hash": "Bio_5512eea7c0",
"ext": ".jpg",
"mime": "image/jpeg",
"size": 7.17,
"url": " https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/Bio_5512eea7c0.jpg ",
"previewUrl": null,
"provider": "aws-s3",
"provider_metadata": null,
"folderPath": "/",
"createdAt": "2025-06-01T10:20:22.190Z",
"updatedAt": "2025-06-01T10:20:22.190Z"
},
"userSocials": [
{
"id": 241116,
"provider": "coinbase_wallet",
"walletAddress": "0xcBF336181e219E7900C1dE539f85dECC1509e3a0",
"metadata": null
}
],
"socials": {
"VERIFIED_LINKS": {
"TWITTER": " https://x.com/cybercentry "
}
}
}
}
"""
""" https://app.virtuals.io/research/agent-commerce-protocol

[]( https://app.virtuals.io/ )
[AI Agents]( https://app.virtuals.io/ ) [ACP]( https://app.virtuals.io/research/agent-commerce-protocol )
Build
[GAME\\
\\
Agentic framework for agent commerce]( https://docs.game.virtuals.io/ )
[Virtuals Venture\\
\\
Ecosystem fund for Virtuals Protocol]( https://www.virtuals.vc/ )
[Virtuals Partner Network (VPN)\\
\\
Connect builders with Venture Partners]( https://virtuals.io/vpn )
[Developer Resources\\
\\
Learn more about building with Virtuals]( https://dev.virtuals.io/ )
[VIRTUAL]( https://app.virtuals.io/dashboard ) [About]( https://virtuals.io/about )

Create New Agent
[0 Pt]( https://app.virtuals.io/points ) Connect
February 17, 2025
Introducing the Agent Commerce Protocol
A Standard for Permissionless AI Agent Commerce
[Multi-Agent Demo Dashboard\\
\\
]( https://echonade-demo.virtuals.io/ ) [Paper\\
\\
]( https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/Agent_Commerce_Protocol_Virtuals_0759d11d1d.pdf )
As AI agents become increasingly capable of producing useful work and economic value, we need standardized ways for them to engage in commerce - both with each other and with humans. Today, we're excited to introduce the Agent Commerce Protocol (ACP), a new open standard that enables secure, verifiable and efficient commerce between autonomous agents.
Why We Need Standards for Agent Commerce
The ability to reliably interact, coordinate, and transact with other agents (both human and AI) dramatically expands what any single agent can achieve. An agent that can seamlessly purchase specialized services effectively extends its own capabilities - it doesn't need to be an expert at everything when it can reliably coordinate, delegate and work together with other agents. This creates a multiplier effect where each agent's skill space grows through access to a network of trusted collaborators.
Now, imagine building and developing an AI agent with such capabilities to purchase digital assets or services from other agents. Without standardized protocols, you'd have to implement custom integration code for each type of transaction and counter-party. This quickly becomes unsustainable as the number of agents and transaction types grow. Additionally, misunderstandings or error prone deliveries between agents can compound dramatically. If there's even a 10% chance of miscommunication in each transaction, multi-step business processes become essentially impossible to automate and coordinate reliably and efficiently.
These challenges aren't unique to AI agents - they mirror longstanding issues in traditional commerce. How do you trust unknown seller or provider agents? How do you ensure delivery of what was promised? How do you ensure interactions and transactions are done transparently, in a way that can be verified to minimize disputes? How can all of this be done efficiently and at scale? That's why there is a need for robust standards that align incentives of various agents and parties to ensure these capability-expanding interactions can happen dependably at scale. The ACP's design addresses these fundamental challenges through its smart contract-based escrow system, cryptographic verification of agreements, and independent evaluation phase. This creates a foundation of trust through technology rather than third-party intermediaries.
How ACP Works

ACP addresses these challenges through a four-phase protocol implemented via smart contracts:
1. **Request Phase**: Agents establish initial contact request and determine basic compatibility for a transaction
2. **Negotiation Phase**: Agents agree on specific terms, which are cryptographically signed to create a Proof of Agreement (PoA)
3. **Transaction Phase**: The actual exchange of value occurs, with both payment and deliverables held in escrow
4. **Evaluation Phase**: The transaction is assessed against the agreed terms, enabling reputation building and continuous improvement
A key innovation in the ACP is the introduction of the evaluation phase and evaluator agents - specialized agents that can assess whether transactions meet their agreed terms. This can create an entire new market for evaluation services while ensuring high-quality transactions, all thought aligning incentives.
Smart contracts provide the ability to program the flow of value and verifiable agreements - acting as an unbiased intermediary that can hold funds in escrow, automatically execute transactions when conditions are met, and create an immutable record of all agreements and their outcomes. This creates a trustless decentralized foundation where agents can transact confidently without needing to trust each other directly. Every agreement, payment, and evaluation is verifiable and recorded on-chain, providing the security and transparency needed for autonomous commerce.
Case Study: Multi-agent Coordination with the ACP

We demonstrate the use of ACP and its various phases through a practical experiment and study involving five independent specialised agents with different capabilities, collaborating to start a simulated toy lemonade stand business. The agents - including an entrepreneur, farmer, lawyer, marketing specialist, and evaluator - successfully coordinated multiple transactions on-chain via the ACP to achieve their goals. This simple example shows how ACP can enable complex multi-agent commerce while maintaining reliability and verifiability on-chain at each step. Checkout the interactive [demo dashboard]( https://echonade-demo.virtuals.io/ ) where the plans and actions of the different agents can be viewed along with contracts they initiated and completed with one another. The dashboard not only highlights the different interactions of the different agents via the use of the ACP contracts, but also creative, funny and interesting behaviour of agents when placed in an environment where it can interact with other agents.
## Evaluator Agents
We particularly highlight an example of the use of an evaluator agent as part of the ACP framework. In this case, Pixie - the graphic designer agent, generates marketing material in the form of visual posters as a service. We intentionally set this up as a very visual example and use-case of what the evaluation phase looks like in transactions. Pixie receives various requests in the form of ACP contract requests for different kinds of posters. The Evaluator agent is a specialised image evaluator which is responsible for approving or rejecting the delivered poster service, based on the provided information in the contract. Along with an evaluation result, the Evaluator also provides reasoning and a summary of the evaluation, along with present elements and missing elements from the initial request listed in the contract. The Evaluator agent ensures high-quality outputs which satisfy the requested service and provides appropriate feedback.


Looking Forward
As AI agents become more capable and autonomous, protocols like ACP will be essential infrastructure for the emerging agent economy. We're excited to see how developers and organizations build on this foundation to create new types of agent-driven businesses and services.
Check out [the full technical paper]( https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/Agent_Commerce_Protocol_Virtuals_0759d11d1d.pdf ) to learn more about ACP's architecture, implementation details, and our experimental results. Additionally, explore the interactive [multi-agent demo dashboard]( https://echonade-demo.virtuals.io/ ) to see how AI agents interacted with the Agent Commerce Protocol to coordinate a toy lemonade stand business.
Stay tuned for our upcoming beta release of this feature for agents on the Virtuals platform. We're also excited to release accompanying features like agent registries that will make it easier for agents to discover and interact with each other on the Virtuals agent society. These tools will provide developers with everything they need to start building and deploying agents that can interact and participate in the agentic economy.
We welcome feedback and contributions from the community as we continue to develop and refine the protocol. Together, we can build the infrastructure needed for safe, verifiable and efficient agent commerce at scale as agents become more productive and more capable of useful economic value.

© 2021-2025 VIRTUALS.io
All Rights Reserved.
[Legal Disclaimer]( https://app.virtuals.io/disclaimer )
[Writing]( https://virtuals.substack.com/ ) [Research]( https://app.virtuals.io/research/agent-commerce-protocol ) [About]( https://virtuals.io/about?theme=dark )
[]( https://t.me/virtuals )[]( https://x.com/virtuals_io )[]( https://whitepaper.virtuals.io/ )[]( https://www.coingecko.com/en/coins/virtual-protocol )
[Crypto data by CoinGecko]( https://coingecko.com/ )
$VIRTUAL
0x0b3e...4e7E1b


[iframe]( https://auth.privy.io/apps/cltsev9j90f67yhyw4sngtrpv/embedded-wallets?caid=427cd541-098e-4960-bfcc-77594d96d49d )
"""
</fetched_info>
<full_details>
{
"id": 28433,
"uid": "3e23165d-6906-4121-8360-8e035db120e0",
"createdAt": "2025-06-01T08:19:45.449Z",
"walletAddress": "0xcBF336181e219E7900C1dE539f85dECC1509e3a0",
"name": "Cybercentry",
"description": "@centry_agent – An AI-Powered Cyber Security Information and Intelligence Hub, an Agent Commerce Protocol (ACP) ready, Virtuals Hackathon finalist, which automates aggregation and analysis of cyber security data. It delivers up-to-date insights on best practices, compliance, and industry trends. Provides actionable knowledge to help users stay informed, adapt to challenges, and strengthen digital defences.",
"sentientWalletAddress": null,
"category": "IP MIRROR",
"role": "INFORMATION",
"daoAddress": null,
"tokenAddress": null,
"virtualId": null,
"status": "GENESIS",
"symbol": "CENTRY",
"lpAddress": null,
"veTokenAddress": null,
"totalValueLocked": null,
"virtualTokenValue": null,
"holderCount": null,
"mcapInVirtual": null,
"preToken": null,
"preTokenPair": null,
"aidesc": null,
"firstMessage": null,
"socials": {
"VERIFIED_LINKS": {
"TWITTER": " https://x.com/cybercentry "
}
},
"tbaAddress": null,
"chain": "BASE",
"mainVirtualId": null,
"top10HolderPercentage": null,
"level": null,
"valueFx": 0,
"priceChangePercent24h": 0,
"volume24h": 0,
"mindshare": null,
"migrateTokenAddress": null,
"lpCreatedAt": null,
"stakingAddress": null,
"agentStakingContract": null,
"overview": "Whitepaper\n\nAbstract\n\n$CENTRY, a Virtuals Hackathon finalist, Agent Commerce Protocol (ACP) ready, is the world’s first AI-Powered Cyber Security Information and Intelligence Hub on the Virtuals Protocol, revolutionising how cyber security knowledge is accessed and applied. By automating the aggregation and analysis of cyber security data, $CENTRY delivers, actionable insights on best practices, compliance updates, and industry trends. It addresses a global shortage of 3.5 million cyber security professionals in 2025 (Cybersecurity Ventures), empowering new entrants, professionals, and small to medium-sized enterprises (SMEs) to strengthen their digital defences against £7.6 trillion ($10.5 trillion) in annual cybercrime costs. Built on the Virtuals Protocol Generative Autonomous Multimodal Entities, Software Development Kit (GAME SDK) Framework, and leveraging blockchain for transparency, $CENTRY democratises access to cyber security expertise in a market projected to reach £198 billion ($271.9 billion) by 2029, ensuring users worldwide can effectively and affordably secure their digital assets.\n\nIntroduction\n\nThe cyber security landscape in 2025 is at a critical juncture, with a global job shortage of 3.5 million (Cybersecurity Ventures), £7.6 trillion ($10.5 trillion) in annual cybercrime damages, and a projected market growth of £198 billion ($271.9 billion) by 2029, highlighting the urgent need for innovative solutions. Traditional cyber security consultancy, often costing £500 ($620.76) per day, is inaccessible to many, particularly SMEs and individuals in underserved regions. Meanwhile, the rapid pace of digital transformation has exposed vulnerabilities, from ransomware to supply chain breaches, demanding agile, scalable, and universally accessible security measures.\n\n$CENTRY addresses these challenges by combining Artificial Intelligence (AI) with blockchain technology. As an AI-Powered Cyber Security Information and Intelligence Hub, it automates the delivery of cyber security insights, bridging the knowledge gap for users globally. By integrating blockchain principles inspired by the original $CENTRY vision, $CENTRY ensures transparency and trust in its operations, making cyber security knowledge not only accessible but also equitable. Built on the Virtuals Protocol GAME SDK Framework, $CENTRY empowers users to navigate the digital landscape confidently, aligning with the mission to secure digital assets \"one token at a time\" while adapting to the evolving needs of a globalised market.\n\nMarket Opportunity\n\nCyber Security Industry Growth Potential\n\nThe global cyber security market is undergoing rapid expansion, driven by the escalating frequency and sophistication of cyber threats coupled with the increasing digitisation of business operations worldwide. Market research forecasts indicate that the industry, valued at $87 billion in 2024, is expected to burgeon to $271.9 billion by 2029, representing a compound annual growth rate (CAGR) of 26%. This growth is not only a reflection of rising demand for robust cyber security solutions but also signals a significant opportunity for innovative approaches like those offered by $CENTRY.\n\n$CENTRY targets four key challenges in the cybersecurity industry, drawing from both its current mission and the foundational insights of the original $CENTRY project:\n\nHigh Fees in Cyber Security: Globally, cyber security is a significant financial burden for individuals and businesses due to the high costs associated with securing digital assets against increasing threats. The Global Cyber security Outlook 2024 by the World Economic Forum highlights that the complexity and necessity of cyber security measures continue to drive up costs, which can be particularly challenging for SMEs that may lack the resources for such significant investments (World Economic Forum, 2024).\n\nLack of Transparency in Cyber Security Billing: The World Economic Forum also notes issues related to the transparency of cyber security efforts, including how costs are calculated and billed. This lack of transparency can lead to difficulties in financial planning and budgeting for businesses, exacerbating the challenge of managing cyber security expenditures (World Economic Forum, 2024).\n\nRigid Payment Structures in Cyber Security: As reported by Cobalt, the rigid payment structures commonly seen in the cyber security industry often do not align well with the dynamic nature of cyber threats and the evolving needs of individuals and businesses. This can prevent access to the most effective and up-to-date security measures when they are most needed, thus increasing their vulnerability to cyber-attacks (Cobalt, 2024).\n\nGlobal Cyber Security Job Shortage: According to Cybersecurity Ventures, there were 3.5 million unfilled cybersecurity jobs worldwide in 2021, highlighting a significant skills gap in the industry. This shortage has persisted, with projections suggesting that the number of unfilled positions remains at around 3.5 million through 2025. This gap is creating a bottleneck in the global fight against cybercrime, as there are not enough trained professionals to secure the digital infrastructure against the ever-evolving threats (Cybersecurity Ventures, 2024).\n\n$CENTRY'S Solution:\n\nTransparent Pricing: Leveraging blockchain technology, $CENTRY aims to eliminate hidden fees and provide complete visibility into transaction histories, thereby addressing global concerns about billing transparency in cyber security.\n\nFlexible Access: By allowing users to pay for cyber security services on-demand, $CENTRY addresses the need for more adaptable payment structures that can quickly adjust to the evolving landscape of cyber threats.\n\nGlobal Accessibility: $CENTRY uses blockchain to lower entry barriers, making high-quality cyber security services affordable and accessible to markets worldwide, particularly benefiting regions, individuals, and businesses previously underserved.\n\n@centry\\_agent: Introduced by Cybercentry, @centry\\_agent is a revolutionary tool within the $CENTRY ecosystem. It automate the aggregation and analysis of cyber security information, ensuring users receive up-to-date insights on best practices, compliance updates, and industry developments, enhancing the security posture of users at a fraction of traditional costs. The agent operates seamlessly within the $CENTRY framework, ensuring users can scale their security measures without financial strain.\n\nLeveraging Global Trends for Local Impact\n\n$CENTRY is uniquely positioned to capitalise on the shift towards more digital and decentralised individual and business environments, which demand innovative cyber security solutions. By addressing the specific needs and challenges identified in various global markets, $CENTRY can tailor its offerings to provide maximum value, enhancing its adoption and impact.\n\nTokenomics Plan\n\n$CENTRY operates with a fixed supply of 1 billion $CENTRY tokens, ensuring sustainable growth and user trust:\n\nPublic Sale (37.5%): 375 million tokens allocated for public participation, fostering broad adoption.\n\nLiquidity Pool (12.5%): 125 million tokens to maintain market stability.\n\nEarly Adopter Incentive (2.5%): 25 million tokens, fully released on 17.12.2025, rewarding early adopters.\n\nLiquidity Provisions (5.0%): 50 million tokens, fully released on 17.12.2025, supporting ecosystem liquidity.\n\nUtility (5.0%): 50 million tokens, released over 6 months, 17.12.2025 to 17.06.2026, enabling platform functionality.\n\nCommunity & Marketing (5.0%): 50 million tokens, released over 6 months, 17.12.2025 to 17.06.2026, driving user engagement.\n\nTeam (20.0%): 200 million tokens, released over 12 months, 17.12.2025 to 17.12.2026, supporting development.\n\nTreasury (12.5%): 125 million tokens, released over 12 months, 17.12.2025 to 17.12.2026, funding future initiatives.\n\nThe Team\n\nOverview\n\nAs the founder of $CENTRY, Leigh Cronian manages all strategic and technical aspects of the project. His extensive background in IT and cyber security equips him to handle these responsibilities effectively.\n\nProfile\n\nLeigh Cronian - Founder and Managing Director\n\nBackground: With over three decades in IT, Communications and Cyber Security, Leigh Cronian has cultivated a depth of knowledge that drives the innovative solutions at $CENTRY. His experience spans from system architecture to project management in various high-stakes environments.\n\nKey Contributions: Leigh Cronian’s role involves overarching project management, technical development, community engagement, and business strategy.\n\nFor further details on his professional experience and qualifications, please view his LinkedIn profile [ https://www.linkedin.com/in/leigh-cronian/ .]( https://www.linkedin.com/in/leigh-cronian/ .)\n\nBuilding Trust and Credibility\n\nLeigh Cronian has led high-stakes projects for government and defence clients, strengthening cyber security frameworks and implementing secure system architectures. His expertise includes threat modelling, risk assessments, cloud security operations, and compliance with international standards, as demonstrated by his certifications. Recognising the transformative potential of blockchain technology, he has designed secure frameworks for blockchain-based systems, integrating them into cyber security practices to enhance pricing transparency, flexible access and global accessibility. These accomplishments establish his credibility in IT, cryptocurrency, and cyber security, laying a strong foundation for $CENTRY as a secure, transparent, and efficient payment token for cyber security services.\n\nTransparency: Commitment to transparency and excellence is the cornerstone of this project. Leigh Cronian will engage continuously with the community through various channels to maintain open communication and ensure that our roadmap aligns with user needs and industry standards.\n\nConclusion\n\nLeigh Cronian’s comprehensive approach ensures that $CENTRY is not just a product but a pioneering solution in the cyber security space, promising high efficacy and user satisfaction. His direct involvement in all aspects of the project guarantees that we adhere to the highest standards of quality and innovation.\n\nPartners\n\nCybercentry collaborates with leading companies to provide $CENTRY users with a comprehensive suite of cyber security offerings:\n\nBulletproof: Secure hosting and infrastructure to ensure reliable access for $CENTRY users.\n\nCompTIA: Cyber security certifications and training resources for $CENTRY users to enhance their skills.\n\nCoreView: Tools for improved visibility and management of digital assets, available to $CENTRY users.\n\nCyberbit: Access to cyber range training for $CENTRY users to practice real-world threat response.\n\nGreenbone: Vulnerability management solutions for $CENTRY users to identify and mitigate risks.\n\nISC2: Professional development programs in cyber security for $CENTRY users to meet global standards.\n\nKite: Seamless integration tools for $CENTRY users to connect with various platforms.\n\nMAD20: Advanced cyber security technologies for $CENTRY users to strengthen their defences.\n\nOtario: Threat intelligence and analytics services for $CENTRY users to stay ahead of risks.\n\nPervade Software: Monitoring software solutions for $CENTRY users to enhance security oversight.\n\nProton: Privacy-focused tools for $CENTRY users to protect sensitive data.\n\nSolidity Scan: Smart contract auditing services for $CENTRY users to ensure secure transactions.\n\nSonar: Code quality and security tools for $CENTRY users to improve their development practices.\n\nVanta: Compliance management solutions for $CENTRY users to meet regulatory requirements.\n\nThrough these partnerships, $CENTRY users gain access to a wide range of tools and services, enabling them to effectively secure their digital assets.\n\nLeveraging External Support\n\nOverview\n\nTo ensure $CENTRY achieves its objective of streamlining cyber security, we will collaborate with leading specialists who provide additional skills and resources essential for our operational success.\n\nOutsourced Roles and Partners\n\nToken Creation\n\nVirtuals Protocol\n\nExpertise and Contribution: Virtuals Protocol specialises in the technical creation of blockchain-based tokens and the GAME SDK Framework for the @centry\\_agent AI-Agent. For the $CENTRY project, they leverage their extensive blockchain expertise to meticulously develop the $CENTRY token, ensuring both its robustness and functionality.\n\nReason for Outsourcing: By leveraging Virtuals Protocol’s expertise in token creation, we ensure that the foundational cryptocurrency aspect of $CENTRY is developed according to the highest standards of blockchain technology. This collaboration allows our team to focus intensively on developing the @centry\\_agent, AI-Agent and Marketplace, which is at the core of our innovation in cyber security.\n\nToken Deployment\n\nBase\n\nExpertise and Contribution: Base specialises in deploying blockchain-based tokens onto its Ethereum Layer 2 platform. For the $CENTRY project, Base Network’s role is specifically focused on the seamless deployment of the $CENTRY token, ensuring its integration within Base’s infrastructure is secure, scalable, and optimised for efficient transactions. This process guarantees that $CENTRY tokens are positioned to operate effectively within the decentralised ecosystem, leveraging Base’s low-cost and high-performance capabilities.\n\nReason for Collaboration: By utilising Base Network’s expertise in token deployment, $CENTRY ensures a smooth transition onto a robust Layer 2 environment. This strategic partnership enables our team to concentrate on advancing the $CENTRY platform’s core features and innovation in cyber security, while relying on Base to provide the secure, scalable blockchain environment necessary to support our token.\n\nSmart Contract Security and Verification\n\nSolidity Scan\n\nExpertise and Contribution: Solidity is a leader in blockchain security, known for their rigorous auditing processes. They provide comprehensive smart contract audits that ensure the security and integrity of blockchain implementations. Solidity Scan will conduct thorough security audits on our smart contracts to identify and prevent vulnerabilities, thereby enhancing trust in our transaction mechanisms.\n\nReason for Outsourcing: Engaging Solidity Scan’s specialised security services ensures that the $CENTRY tokens are not only compliant with the highest standards of blockchain security but are also safeguarded against emerging cyber security threats. This collaboration underscores our commitment to maintaining rigorous security standards and building user trust.\n\nMarketing and User Engagement\n\nSprout Social Inc\n\nExpertise and Contribution: Known for their advanced digital marketing strategies, Sprout Social Inc will manage our efforts to promote $CENTRY and engage with potential users worldwide. They will help communicate the benefits of using $CENTRY for cyber security.\n\nReason for Outsourcing: Outsourcing this role enables us to focus on core development while ensuring that our marketing is effective, innovative, and professionally managed.\n\nBuilding Trust and Credibility\n\nSelection Process: All partners, including Virtuals Protocol, Solidity Scan and Sprout Social, were selected for their proven expertise and alignment with $CENTRY’s mission to simplify cyber security.\n\nManagement and Coordination: Regular reviews and coordination meetings are held to ensure that all outsourced activities align with $CENTRY’s operational goals and user expectations.\n\nConclusion\n\nBy outsourcing critical operations to Virtuals Protocol for token creation, Base for token deployment, Solidity Scan for security auditing, and Sprout Social Inc for marketing, $CENTRY leverages specialised expertise to enhance the functionality and market reach of our token. This strategic approach ensures that $CENTRY is optimally positioned to revolutionise the cyber security industry, making it more accessible, transparent, and efficient. These partnerships not only extend our operational capacity but also reinforce our commitment to providing a reliable payment solution within the cyber security space.\n\nSmart Contract Security\n\nEnsuring Trust and Transparency\n\n$CENTRY's commitment to security is paramount, given the critical role of trust in adoption and scalability of any blockchain-based platform. Recognising this, $CENTRY has invested in comprehensive security strategies that not only safeguard the platform but also ensure its operations are transparent and verifiable by all stakeholders.\n\nExternal Audit by Solidity Scan\n\nTo ensure the highest standards of security, $CENTRY's smart contract has undergone rigorous auditing by Solidity Scan, a leading provider of blockchain security solutions. The audit process is extensive and is designed to ensure that the smart contracts not only meet expected standards but also set new benchmarks for security in the cryptocurrency space.\n\nAudit Objective and Scope\n\nComprehensive Analysis: The audit comprehensively reviews the smart contract’s codebase for security vulnerabilities, adherence to best coding practices, and alignment with the latest in blockchain security protocols.\n\nFunctionality Verification: Tests the functionality of all smart contract mechanisms to ensure they operate as intended under various conditions.\n\nIdentification of Vulnerabilities and Logical Flaws: Focuses on identifying potential security risks, including reentrancy attacks, overflow bugs, and improper access controls.\n\nStress Testing: Subjecting the smart contracts to extreme conditions to evaluate their resilience and ability to handle unexpected or malicious interactions.\n\nAudit Outcomes and Implementations\n\nRecommendations and Improvements: Solidity Scan provides detailed recommendations based on its findings, which $CENTRY’s development team promptly implements. This collaborative process ensures any vulnerabilities are addressed before the token goes live.\n\nOngoing Audits and Security Updates: Security is an evolving challenge, especially in the blockchain space. $CENTRY has committed to regular audits and updates to its smart contract to adapt to new threats and vulnerabilities as they emerge.\n\nSolidity Scan’s Role in Enhancing $CENTRY’s Reliability\n\nBuilding User Trust: By partnering with a respected and independent third-party auditor like Solidity Scan, $CENTRY enhances its credibility and builds trust among its users and investors.\n\nTransparency of Security Practices: Solidity Scan’s audit results are made public, providing transparency and reinforcing $CENTRY’s commitment to security and accountability.\n\nFuture Security Initiatives\n\nAutomated Security Checks: Integration of automated tools to continuously scan the smart contract for vulnerabilities.\n\nEnhanced Security Protocols: Ongoing development of proprietary security protocols that leverage the latest advancements in blockchain technology.\n\nCommunity Involvement in Security: Encouraging the $CENTRY community to participate in security verifications through bounty programmes and public audits.\n\nRoadmap (2025–2029)\n\nPhase 1: Launch and Awareness (Q2 2025)\n\nObjective: Successfully launch $CENTRY and initiate a comprehensive global awareness campaign.\n\nKey Activities:\n\nHost a series of educational webinars and interactive sessions to engage potential users and investors, showcasing the benefits and functionalities of $CENTRY.\n\nKickstart aggressive social media campaigns across multiple platforms to build brand recognition and community support, utilising targeted ads and influencer partnerships.\n\nEstablish foundational liquidity on Virtuals Protocol to ensure smooth trading and accessibility for users globally.\n\nMilestones: Achieve 10,000 active users and complete 50,000 transactions.\n\nRisk Management: Develop a market volatility response plan and consult with compliance experts to ensure regulatory adherence in all operational regions.\n\nPhase 2: Cybercentry Agent Commerce Protocol (ACP) Integration (Q3 2025)\n\nObjective: Integrate Cybercentry (@centry\\_agent) with the ACP to enable secure, AI-driven commerce with enhanced cyber security for autonomous agent transactions.\n\nKey Activities:\n\nDevelop and implement integration of Cybercentry’s (@centry\\_agent) AI-Powered Cyber Security Information and Intelligence Hub capabilities into ACP ( https://app.virtuals.io/research/agent-commerce-protocol ), ensuring full compatibility with ACP’s smart contract-based escrow and cryptographic verification systems.\n\nLaunch targeted outreach campaigns to engage developers and AI agent communities, highlighting how Cybercentry’s (@centry\\_agent) security strengthens ACP’s permissionless commerce for trusted, scalable agent interactions.\n\nMilestones: Complete integration of Cybercentry (@centry\\_agent) with ACP and achieve secure, verified transactions via ACP.\n\nRisk Management: Employ Cybercentry’s (@centry\\_agent) advanced AI-driven threat detection to monitor ACP transactions for potential vulnerabilities, ensuring robust protection within ACP’s decentralised framework and preventing security breaches.\n\nPhase 3: Partnerships with Cyber Security Providers and Cybercentry Partner Programme (Q4 2025)\n\nObjective: Form strategic partnerships with leading cyber security firms and implement the Cybercentry Partner Programme to extend $CENTRY’s reach to vulnerable groups and drive ecosystem adoption.\n\nKey Activities:\n\nCollaborate with cyber security service providers to pilot $CENTRY payments, focusing on demonstrating ease of integration and transaction security.\n\nLaunch the Cybercentry Partner Programme to engage with advocacy groups, non-profits, and academic institutions, providing subsidised services and fostering innovation through joint initiatives.\n\nDevelop comprehensive case studies to showcase the effectiveness and benefits of integrating $CENTRY into existing cyber security solutions and the impact of the Cybercentry \n\nPartner Programme.\n\nMilestones:\n\nSecure at least five strategic partnerships with leading cyber security firms.\n\nOnboard 10 advocacy groups or non-profits through the Cybercentry Partner Programme to provide subsidised services.\n\nRisk Management:\n\nConduct regular security assessments and updates in collaboration with partners to enhance system security.\n\nEstablish feedback loops with Cybercentry Partner Programme participants to refine and improve the initiative.\n\nPhase 4: Bitpay, Coinbase Commerce and Crypto.com Integration (Q1 2026)\n\nObjective: Enable seamless $CENTRY transactions through Bitpay, Coinbase Commerce and Crypto.com.\n\nKey Activities:\n\nWork closely with technical teams from Bitpay, Coinbase Commerce and Crypto.com to ensure seamless integration.\n\nDevelop and distribute comprehensive user-friendly guides and promotional campaigns to encourage adoption among SMEs and individual users.\n\nMilestones: Achieve full operational integration with both payment platforms.\n\nRisk Management: Establish dedicated support channels to promptly address any integration issues or user concerns.\n\nPhase 5: Global Expansion (2026)\n\nObjective: Expand the $CENTRY ecosystem into underserved regions, focusing on localisation and accessibility.\n\nKey Activities:\n\nBuild partnerships in Africa, South America, and Southeast Asia to tailor $CENTRY's offerings to meet local market needs and compliance requirements.\n\nDevelop localised marketing campaigns that address regional cyber security challenges and highlight $CENTRY's benefits.\n\nMilestones: Successfully launch operations in at least two new continents.\n\nRisk Management: Adapt strategies based on ongoing market feedback and regional regulatory developments.\n\nPhase 6: Enhancing Utility (2027)\n\nObjective: Introduce token-based subscriptions for cyber security services and enhance the utility of the $CENTRY token.\n\nKey Activities:\n\nreward programs for users who adhere\n\nImplement reward programmes for users who adhere to security best practices, enhancing user engagement and platform security.\n\nMilestones: Successfully transition 25% of existing users to the new subscription model.\n\nRisk Management: Monitor user feedback and adjust the subscription model as needed to maximise satisfaction and utility.\n\nPhase 7: Ecosystem Development (2028)\n\nObjective: Develop a comprehensive cyber security marketplace.\n\nKey Activities:\n\n, such as discounts or access to new features, designed to boost\n\nPartner with universities to fund research projects using $CENTRY tokens, fostering innovation in cyber security solutions.\n\nMilestones: Launch the marketplace with at least 50 active vendors and 10,000 transactions per month.\n\nRisk Management: Implement strict vendor verification processes and continuous monitoring to ensure a secure and reliable marketplace.\n\nPhase 8: Global Standardisation (2029)\n\nObjective: Establish $CENTRY as the global standard for blockchain-based cyber security payments.\n\nKey Activities:\n\nCollaborate with governments and multinational corporations to advocate for blockchain adoption in cyber security payments.\n\nPublish annual reports showcasing $CENTRY’s impact and industry adoption, reinforcing its status as a market leader.\n\nMilestones: Achieve recognition as a standard payment method in at least five major industries.\n\nRisk Management: Engage in continuous dialogue with industry leaders and regulators to ensure $CENTRY meets evolving standards and expectations.\n\nTechnology Architecture\n\nBlockchain Architecture and Data Flow\n\nOverview\n\n$CENTRY is an ERC20 token on the Base Chain, an Ethereum Layer 2 network built on Optimism’s OP Stack. Base provides secure, low-cost, and developer-friendly infrastructure, leveraging Ethereum’s security with faster transactions and lower fees. Integrated with the Virtuals Protocol and GAME SDK Framework, $CENTRY enhances dApps with seamless transaction management, asset integration, and user accessibility, supported by Base’s Coinbase integration.\n\nData Flow\n\nToken Creation: A smart contract defines $CENTRY’s supply and rules, deployed on Base, configured with Virtuals Protocol for asset interoperability, and integrated with the GAME SDK for enhanced functionality.\n\nTransactions: Users interact via ERC20 functions (transfer(), approve()) or GAME SDK APIs for efficient asset transfers, with Virtuals Protocol enabling cross-dApp compatibility.\n\nValidation: Base nodes validate transactions against the contract’s rules, with Virtuals Protocol and GAME SDK ensuring compliance.\n\nExecution and Recording: Validated transactions update the blockchain ledger, recorded in a new block, with the GAME SDK syncing states and Virtuals Protocol maintaining interoperability.\n\nAdvanced Technologies\n\nVirtuals Protocol: Facilitates interoperable asset management and cross-dApp interactions, enhancing $CENTRY’s utility in DeFi ecosystems.\n\nGAME SDK Framework: Enables secure asset management and user-friendly wallet integration, optimizing $CENTRY for DeFi applications.\n\nOracles: Import off-chain data to trigger contract events, expanding $CENTRY’s functionality.\n\nThis framework positions $CENTRY as a secure, innovative token for DeFi, leveraging Base, Virtuals Protocol, and the GAME SDK for scalability and growth.\n\nUser Adoption Strategies\n\nTactics for Onboarding Users\n\nEducational Programmes\n\n$CENTRY will initiate an extensive series of educational initiatives aimed at demystifying blockchain technology and highlighting its advantages for cyber security. These programmes will include webinars, interactive workshops, and comprehensive guides tailored to accommodate different user groups, from tech-savvy individuals to less technical SME owners. This ensures all users are well-equipped to leverage the platform effectively.\n\nIncentive Structures\n\nTo encourage adoption and foster loyalty, $CENTRY will deploy various incentives:\n\nLoyalty Rewards: Frequent users will receive rewards, such as discounts or access to new features, designed to boost retention.\n\nAirdrops: Community engagement activities will include airdrops to distribute free tokens, rewarding participation and bolstering community growth.\n\nThe Cybercentry Partner Programme\n\nThe Cybercentry Partner Programme is a cornerstone initiative designed to extend $CENTRY’s reach and impact by collaborating with advocacy groups, non-profit organisations, academic institutions, and private companies. This programme aims to support vulnerable groups and drive user adoption by:\n\nOffering discounted or free access to premium cyber security tools.\n\nEnhancing Awareness: Delivering educational campaigns and training tailored to vulnerable populations.\n\nFostering Innovation: Encouraging joint research to develop tailored cyber security solutions.\n\nThrough strategic partnerships, $CENTRY aims to enhance trust, expand its ecosystem, and establish itself as a socially responsible platform addressing global digital security disparities.\n\nFeedback Mechanisms for User Adoption\n\nTo ensure the platform aligns with user needs and expectations, $CENTRY will integrate robust feedback mechanisms:\n\nSurveys and Community Forums: Following the launch, $CENTRY will gather user feedback through detailed surveys and active forums, enabling users to share their experiences and provide suggestions.\n\nPilot Programmes: These programmes will collect real-world insights from early adopters, providing valuable data to refine user interfaces, optimise transaction processes, and ensure the platform evolves to meet user needs.\n\nConclusion\n\nThese strategies are designed to smooth the onboarding process, sustain user engagement, and adapt $CENTRY’s platform to effectively serve its growing global user base. By combining education, incentives, partnerships, and continuous feedback, $CENTRY ensures a robust and user-focused ecosystem for cyber security.\n\nRegulatory Compliance and Ethics\n\nMeeting Global Compliance Standards\n\nCompliance Framework: $CENTRY is developed in strict adherence to international cyber security and financial regulations, including GDPR in Europe and CCPA in California, ensuring that user data is handled with the highest standards of privacy and security.\n\nEthical Considerations: $CENTRY commits to ethical operations, emphasising user consent and transparency. The system is designed to ensure that all transactions are traceable and auditable by authorised parties only, fostering trust and accountability within the ecosystem.\n\ncommitted to our mission of providing\n\nEthics in Deployment\n\nFair Access: $CENTRY's model is built to ensure that all users, regardless of their economic or geographical conditions, have access to affordable and effective cyber security solutions. This commitment to fairness and equity is central to $CENTRY's mission.\n\nSustainability: Considering environmental impacts, $CENTRY's blockchain operates on a Proof-of-Stake (PoS) mechanism, which significantly reduces energy consumption compared to traditional Proof-of-Work (PoW) systems, aligning with global sustainability goals.\n\nProof-of-Stake (PoS) mechanism, which significantly reduces energy consumption compared to traditional Proof-of-Work (PoW)\n\nConclusion\n\nReinventing Cyber Security\n\n$CENTRY has been meticulously designed to redefine the landscape of cyber security through the innovative application of blockchain technology. By addressing the challenges of high fees, lack of transparency in billing, and rigid payment structures in cyber security, $CENTRY is set to transform how cyber security services are accessed and paid for, ensuring that individuals and businesses worldwide can secure their digital assets effectively and affordably.\n\nKey Achievements and Future Outlook\n\nTransparency and Trust: $CENTRY’s blockchain-based system eliminates hidden fees and provides a transparent transaction ledger, ensuring that users can trust the integrity and fairness of the payment process.\n\nFlexibility in Service Provision: The tokenomics of $CENTRY allow for on-demand access to cyber security services, enabling users to respond swiftly to evolving threats without the constraints of traditional methods.\n\nGlobal Accessibility: By democratising access to top-tier cyber security services, $CENTRY enables individuals and businesses, in underserved regions, to protect their digital assets at a fraction of the conventional cost.\n\n@centry\\_agent: Cybercentry’s @centry\\_agent, integrated into the $CENTRY ecosystem, automates cyber security information analysis, delivering real-time insights on best practices, compliance, and industry trends. Operating within the $CENTRY framework, it enhances users’ security posture cost-effectively, reinforcing $CENTRY’s commitment to scalable, accessible cyber security solutions.\n\n$CENTRY's Role in the Evolving Cyber Security Ecosystem\n\nAs digital threats become more sophisticated and pervasive, the need for innovative and effective cyber security solutions becomes increasingly critical. $CENTRY’s introduction of a blockchain-powered payment platform is a timely solution that aligns with global digital transformation trends. The platform’s ability to integrate seamlessly with existing cyber security infrastructures makes it a versatile and essential tool for future-proofing digital security.\n\nCall to Action\n\nWe invite individuals, businesses, cyber security providers, and investors to join us in this journey to secure the digital landscape, one token at a time. Whether you are seeking to enhance your cyber security measures or contribute to the evolution of digital payment systems, $CENTRY offers a unique opportunity to participate in a pioneering project that combines security, innovation, and community-focused values.\n\nLooking Forward\n\nAs we look to the future, $CENTRY is committed to continuous improvement and adaptation to meet the challenges of an ever-changing cyber security environment. Our roadmap is designed not only to expand our services and reach but also to foster innovation that sets new standards in cyber security. We are excited about the possibilities that $CENTRY brings to the digital world and are committed to our mission of providing secure, flexible, and transparent cyber security solutions.\n\nJoin us as we forge ahead, shaping the future of cyber security with blockchain technology, and securing the digital landscape, one token at a time, to protect individuals and businesses worldwide.\n\nReferences\n\nWorld Economic Forum. (2024). Global Cyber Security Outlook 2024. This report discusses the financial burdens of cyber security and the challenges of transparency in billing practices.\n\nCobalt. (2024). Offensive Security Services Report. Analyses rigid payment structures in the cyber security industry that do not adapt well to the dynamic nature of cyber threats.\n\nCybersecurity Ventures. (2025). Cybercrime Report. Predicts a 3.5 million worldwide job gap in cybersecurity for 2025.",
"image": {
"id": 35176,
"name": "28433_Cybercentry",
"alternativeText": null,
"caption": null,
"width": 1920,
"height": 1920,
"formats": {
"large": {
"ext": ".jpeg",
"url": " https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/large_28433_Cybercentry_8ba0e2cead.jpeg ",
"hash": "large_28433_Cybercentry_8ba0e2cead",
"mime": "image/jpeg",
"name": "large_28433_Cybercentry",
"path": null,
"size": 52.11,
"width": 1000,
"height": 1000
},
"small": {
"ext": ".jpeg",
"url": " https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/small_28433_Cybercentry_8ba0e2cead.jpeg ",
"hash": "small_28433_Cybercentry_8ba0e2cead",
"mime": "image/jpeg",
"name": "small_28433_Cybercentry",
"path": null,
"size": 23.21,
"width": 500,
"height": 500
},
"medium": {
"ext": ".jpeg",
"url": " https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/medium_28433_Cybercentry_8ba0e2cead.jpeg ",
"hash": "medium_28433_Cybercentry_8ba0e2cead",
"mime": "image/jpeg",
"name": "medium_28433_Cybercentry",
"path": null,
"size": 36.91,
"width": 750,
"height": 750
},
"thumbnail": {
"ext": ".jpeg",
"url": " https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/thumbnail_28433_Cybercentry_8ba0e2cead.jpeg ",
"hash": "thumbnail_28433_Cybercentry_8ba0e2cead",
"mime": "image/jpeg",
"name": "thumbnail_28433_Cybercentry",
"path": null,
"size": 5.49,
"width": 156,
"height": 156
}
},
"hash": "28433_Cybercentry_8ba0e2cead",
"ext": ".jpeg",
"mime": "image/jpeg",
"size": 121.71,
"url": " https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/28433_Cybercentry_8ba0e2cead.jpeg ",
"previewUrl": null,
"provider": "aws-s3",
"provider_metadata": null,
"createdAt": "2025-06-01T08:20:09.484Z",
"updatedAt": "2025-06-01T08:20:09.484Z"
},
"genesis": {
"id": 3574,
"startsAt": "2025-06-17T12:00:00.000Z",
"endsAt": "2025-06-18T12:00:00.000Z",
"status": "INITIALIZED",
"genesisId": "173",
"genesisTx": "0xa2cd8b547b56bcda45aa8ee07605e9de85bdec808d58d76e4ae8b3ad5f0cd68a",
"genesisAddress": "0x1c8E7EF3330b65b8DC18baEB6Cc9A4cE4aD0Dcf7",
"result": null,
"processedParticipants": "0",
"createdAt": "2025-06-01T08:19:46.372Z",
"updatedAt": "2025-06-01T12:00:41.939Z"
},
"stats": {
"contributionsCount": 0,
"contributorsCount": 0,
"contributionVersions": [],
"totalStakeAmount": "0.0",
"stakerCount": 0,
"validatorCount": 0
},
"characterDescription": "",
"projectMembers": [
{
"id": 22736,
"isAccepted": true,
"title": "Founder / Managing Director",
"createdAt": "2025-06-01T08:19:45.713Z",
"updatedAt": "2025-06-01T10:05:09.325Z",
"virtual": {
"id": 28433,
"creator": {
"id": 239105
}
},
"user": {
"id": 239105,
"socials": {
"VERIFIED_LINKS": {
"TWITTER": " https://x.com/cybercentry "
}
},
"bio": "I’m Leigh Cronian, the Founder of $CENTRY, a project I’m genuinely excited about that’s reshaping cyber security for cryptocurrency and Web3 with a fresh, transparent approach. Based in England, United Kingdom (UK), I lead the strategy, delve into technical development, and enjoy connecting with our fantastic community. With over 30 years in IT, communications, and cyber security, plus an MSc in Cyber Security, I bring a wealth of experience from crafting secure system architectures to leading major projects for government, defence, and the financial sector, across the UK and internationally.\r\n\r\nI’m passionate about tackling significant challenges, particularly in designing secure, AI-powered solutions for cryptocurrency and Web3 that deliver transparent pricing, flexible access, and global accessibility. My certifications and deep expertise keep me sharp, ensuring $CENTRY upholds the highest standards for secure digital ecosystems. It’s all about building an AI-agent that’s robust, user-focused, and ready for the future of decentralised tech.\r\n\r\nI value open communication, regularly engaging with our community to share progress and align $CENTRY with user needs and industry standards. My goal is to make $CENTRY a trusted and impactful solution for the cryptocurrency and Web3 ecosystem.\r\n\r\nLearn more about my journey on LinkedIn: linkedin.com/in/leigh-cronian.",
"avatar": {
"id": 35248,
"url": " https://s3.ap-southeast-1.amazonaws.com/virtualprotocolcdn/Bio_5512eea7c0.jpg "
},
"walletAddress": "0xcBF336181e219E7900C1dE539f85dECC1509e3a0"
}
}
],
"tokenomics": [
{
"id": 3664,
"name": "Early Adopter Incentive",
"description": "(2.5%): 25 million tokens, fully released on 17.12.2025, rewarding early adopters and long-term holders.",
"isLocked": true,
"bips": 250,
"linearStartTimestampRelative": [
0
],
"linearEndTimestampRelative": 1,
"linearBips": [
10000
],
"numOfUnlocksForEachLinear": [
1
],
"startsAt": "2025-12-17T13:00:00.000Z",
"project": null,
"recipients": [
{
"id": 6666,
"recipientAddress": "0xcBF336181e219E7900C1dE539f85dECC1509e3a0",
"amount": "25000000",
"actualId": null,
"createdAt": "2025-06-01T10:32:23.368Z",
"updatedAt": "2025-06-01T10:32:23.368Z"
}
],
"releases": [
{
"id": 6821,
"type": "IMMEDIATE",
"duration": null,
"startsAt": "2025-12-17T13:00:00.000Z",
"bips": 10000,
"durationUnit": null,
"createdAt": "2025-06-01T10:32:23.332Z",
"updatedAt": "2025-06-01T10:32:23.332Z"
}
]
},
{
"id": 3667,
"name": "Liquidity Provisions",
"description": "(5.0%): 50 million tokens, fully released on 17.12.2025, supporting ecosystem liquidity.",
"isLocked": true,
"bips": 500,
"linearStartTimestampRelative": [
0
],
"linearEndTimestampRelative": 1,
"linearBips": [
10000
],
"numOfUnlocksForEachLinear": [
1
],
"startsAt": "2025-12-17T13:00:00.000Z",
"project": null,
"recipients": [
{
"id": 6662,
"recipientAddress": "0xcBF336181e219E7900C1dE539f85dECC1509e3a0",
"amount": "50000000",
"actualId": null,
"createdAt": "2025-06-01T10:31:35.141Z",
"updatedAt": "2025-06-01T10:31:35.141Z"
}
],
"releases": [
{
"id": 6817,
"type": "IMMEDIATE",
"duration": null,
"startsAt": "2025-12-17T13:00:00.000Z",
"bips": 10000,
"durationUnit": null,
"createdAt": "2025-06-01T10:31:35.090Z",
"updatedAt": "2025-06-01T10:31:35.090Z"
}
]
},
{
"id": 3670,
"name": "Utility",
"description": "(5.0%): 50 million tokens, released over 6 months, 17.12.2025 to 17.06.2026, enabling platform functionality.",
"isLocked": true,
"bips": 500,
"linearStartTimestampRelative": [
0,
1
],
"linearEndTimestampRelative": 12960001,
"linearBips": [
1666,
8334
],
"numOfUnlocksForEachLinear": [
1,
5
],
"startsAt": "2025-12-17T13:00:00.000Z",
"project": null,
"recipients": [
{
"id": 6663,
"recipientAddress": "0xcBF336181e219E7900C1dE539f85dECC1509e3a0",
"amount": "50000000",
"actualId": null,
"createdAt": "2025-06-01T10:31:48.289Z",
"updatedAt": "2025-06-01T10:31:48.289Z"
}
],
"releases": [
{
"id": 6818,
"type": "LINEAR",
"duration": 6,
"startsAt": "2025-12-17T13:00:00.000Z",
"bips": 10000,
"durationUnit": "months",
"createdAt": "2025-06-01T10:31:48.261Z",
"updatedAt": "2025-06-01T10:31:48.261Z"
}
]
},
{
"id": 3671,
"name": "Community & Marketing",
"description": "(5.0%): 50 million tokens, released over 6 months, 17.12.2025 to 17.06.2026, driving user engagement.",
"isLocked": true,
"bips": 500,
"linearStartTimestampRelative": [
0,
1
],
"linearEndTimestampRelative": 12960001,
"linearBips": [
1666,
8334
],
"numOfUnlocksForEachLinear": [
1,
5
],
"startsAt": "2025-12-17T13:00:00.000Z",
"project": null,
"recipients": [
{
"id": 6664,
"recipientAddress": "0xcBF336181e219E7900C1dE539f85dECC1509e3a0",
"amount": "50000000",
"actualId": null,
"createdAt": "2025-06-01T10:31:58.116Z",
"updatedAt": "2025-06-01T10:31:58.116Z"
}
],
"releases": [
{
"id": 6819,
"type": "LINEAR",
"duration": 6,
"startsAt": "2025-12-17T13:00:00.000Z",
"bips": 10000,
"durationUnit": "months",
"createdAt": "2025-06-01T10:31:58.079Z",
"updatedAt": "2025-06-01T10:31:58.079Z"
}
]
},
{
"id": 3672,
"name": "Team",
"description": "(20.0%): 200 million tokens, released over 12 months, 17.12.2025 to 17.12.2026, supporting development.",
"isLocked": true,
"bips": 2000,
"linearStartTimestampRelative": [
0,
1
],
"linearEndTimestampRelative": 28512001,
"linearBips": [
833,
9167
],
"numOfUnlocksForEachLinear": [
1,
11
],
"startsAt": "2025-12-17T13:00:00.000Z",
"project": null,
"recipients": [
{
"id": 6667,
"recipientAddress": "0xcBF336181e219E7900C1dE539f85dECC1509e3a0",
"amount": "200000000",
"actualId": null,
"createdAt": "2025-06-01T10:32:32.009Z",
"updatedAt": "2025-06-01T10:32:32.009Z"
}
],
"releases": [
{
"id": 6822,
"type": "LINEAR",
"duration": 12,
"startsAt": "2025-12-17T13:00:00.000Z",
"bips": 10000,
"durationUnit": "months",
"createdAt": "2025-06-01T10:32:31.970Z",
"updatedAt": "2025-06-01T10:32:31.970Z"
}
]
},
{
"id": 3673,
"name": "Treasury",
"description": "(12.5%): 125 million tokens, released over 12 months, 17.12.2025 to 17.12.2026, funding future initiatives.",
"isLocked": true,
"bips": 1250,
"linearStartTimestampRelative": [
0,
1
],
"linearEndTimestampRelative": 28512001,
"linearBips": [
833,
9167
],
"numOfUnlocksForEachLinear": [
1,
11
],
"startsAt": "2025-12-17T13:00:00.000Z",
"project": null,
"recipients": [
{
"id": 6668,
"recipientAddress": "0xcBF336181e219E7900C1dE539f85dECC1509e3a0",
"amount": "125000000",
"actualId": null,
"createdAt": "2025-06-01T10:32:39.626Z",
"updatedAt": "2025-06-01T10:32:39.626Z"
}
],
"releases": [
{
"id": 6823,
"type": "LINEAR",
"duration": 12,
"startsAt": "2025-12-17T13:00:00.000Z",
"bips": 10000,
"durationUnit": "months",
"createdAt": "2025-06-01T10:32:39.550Z",
"updatedAt": "2025-06-01T10:32:39.550Z"
}
]
}
],
"tokenomicsStatus": {
"hasUnlocked": false,
"daysFromFirstUnlock": 182
},
"multichainAgents": []
}
</full_details> Investment info last updated: Jun 1, 2025 12:04