QURAS -A Decentralized Anonymous Smart Contract Platform For clouds and IoT


    The next generation in smart contract platform for untraceable privacy-oriented transactions, from a secure platform to anonymous clouds and IoT.

    The Quras project has been evolving and expanding its reach to provide a smart and secure solution for a wide range of different applications. It began with a passion to create a secure, anonymous blockchain for the healthcare industry, by achieving a level of previously unobtainable security and efficiency - helping healthcare service providers revolutionise their data storage - Quras is now ready to change the way businesses and individuals define “secure”. Utilising an open source approach, Quras gives the user complete control over the management of their own rights, data and assets, while ensuring the utmost protection from any external interference.

    Quras Videos:


    We take our users’ peace-of-mind seriously and can ensure Quras is using the latest privacy-orinteted anonymous technologies, such as zero knowledge proof systems, Tor and __ etc. By using the latest advancements in user security, Quras allows for complete anonymity when it comes to transactions and communication, giving the user a newfound level of control and protection over their assets.

    Clouds & Big Data

    Building upon traditional online storage technology (such as AWS) and utilising the latest distributed network technologies (such as Tor) - Quras ensures no risk of security breaches or leakage from the server. Our file storage encryption is world class and is a more secure way to share/store data and complete transactions.


    Fusing blockchain and DAG protocol has made transaction
    approval faster and incorruptible. Quras is equipped to manage vast
    streams of transactions from any sized IoT and then streamline the
    generated data into a secure and highly-anonymous communication network,
    forming Quras

    Smart Contract

    Our smart contract system allows for anonymous transactions within the Quras platform. A small transaction fee in accordance to the holding amount is charged when a transaction is initiated by the token issuer using their tokens, this is used to maintain the sustainability of the system. Users can also harness our smart contract system to create distributed applications across Quras.


    Quras coin can also be earnt through contribution to the platform itself. Through implementation of game, real trade function, P2P chat and call function and social function, users can enhance the community and earn Quras coin.


    The Quras is not entrenched in a high-power consuming PoW, instead there is no concept of mining. When a block is created, GAS is given as a dividend to the Quras holder according to its holding amount. At anytime a token holder can receive compensation, including the anonymous remittance fee.


    Quras coin can also be earnt through contribution to the platform itself. Through implementation of game, real trade function, P2P chat and call function and social function, users can enhance the community and earn Quras coin.


    The Quras is not entrenched in a high-power consuming PoW, instead there is no concept of mining. When a block is created, GAS is given as a dividend to the Quras holder according to its holding amount. At anytime a token holder can receive compensation, including the anonymous remittance fee.








  • QURAS ICO Update

    Hello all,  As you have probably noticed — QURAS ICO has been delayed a bit. We have a lot of questions about the reason for the delay coming from the community and in this post, we will explain and clarify the situation.

    From the start, we wanted to be absolutely sure that the investors’ funds are well protected. For this reason, we have decided to show results prior to the ICO. We want to show what we are doing in the code.

    Currently, the update for the beta of QURAS Wallet is coming and our Blockexplorer will be released in March. Coding of the anonymous transactions by zk-SNARKs on smart contracts and token fee refund to the token managers are mostly done and we are now implementing ring signature. With this token transaction fee sharing feature, the project can share transaction fee with QURAS consensus node and they can make their project more sustainable. Our source code will be made public after the testing.

    We are also introducing QRG, a gas cryptocurrency which is used for smart contract transaction. If the user has QRS, he can stake QRG per every 15 seconds. How many QRG will be given to the user is decided by how many QRS they have.

    QURAS was ready to do an ICO before and is ready now, but these are the reasons why we have decided to postpone the ICO. The project was presented all across the world at the key conferences, and we have a number of exchange listing agreements ready for the time when we decide to go public.

    QURAS has its own Blockchain and naturally, development and testing take time. We are making progress each day and will be happy to do an ICO when we can provide solid proof of what we are doing.

    We could get QURAS ERC-20 token listed on the exchanges, but that carries great risk from the price viewpoint. For this reason, we want QURAS coin, built on our Blockchain, to be listed on the exchanges.

    If you have any questions, feel free to post them in the comments or contact our admin team on Telegram.

    Thank you for your support and have a great day!

    Your QURAS Team

  • Potential Use Cases of Blockchain in Africa

    The blockchain is one of the main innovations that are driving the next industrial revolution. The nations are constantly looking to improve the state of the industry and government with technology. It is safe to say that even the most conservative countries are getting interested in the blockchain and all the things it can help with. Today we will be focusing on the potential use of blockchain in Africa.

    Blockchain in Africa

    In the last couple of years, cryptocurrencies have become one of the favored investment options for young African entrepreneurs. The increasing interest in digital assets led to the rise of Africa-based crypto exchanges, helping meet the demand for cryptocurrencies on the market.

    When first Bitcoin ATMs were installed in Africa, there was a boom of interest and demand for digital currencies, especially Bitcoin. According to Coinatmradar — there are 7 Bitcoin ATMs in Africa. The leading country is South Africa with 4 Bitcoin ATMs, while countries of Zimbabwe, Kenya, and Djibouti each have 1 Bitcoin ATM.

    The progress in this field shows that African nations are not afraid to explore the potential applications of blockchain technology. Still, if they want to make a significant impact, the countries need to invest more in the implementation of the blockchain in different sectors of the economy.

    Potential Use Cases of Blockchain In Africa

    Blockchain could be the solution for unstable systems found in the majority of African countries. With the introduction of the decentralized functionalities, it would effectively put an end to the inefficient ways of governance and aid business operations. Here are a couple of use cases where blockchain could bring a lot of value to the users:

    1. Improvement of Cross-Border Supply Chains

    Africa’s economy is focused on the exports of goods, farm products, and oil. However, the supply chain systems in place are often inefficient. There are numerous middlemen in the system, increasing the costs and reducing the return on investment. The implementation of blockchain in combination with smart contracts could help fix those problems.

    2. Healthcare System Improvements

    Furthermore, one of the biggest challenges the African nations are facing is the healthcare system inefficiency. The medical staff is not well equipped and many healthcare facilities still use outdated storage systems. The blockchain could make things better in this area, as well as preserve the privacy of the patients while promoting transparency in the industry.

    3. Energy Supply Regulation

    There is a number of companies interested in building energy infrastructure such as solar panels or windmills in Africa. The only thing holding them back are potential misuses from the moment when the grid takes over the energy. Blockchain could help tackle this problem by recording all transactions and regulate supply according to demand.

    4. Property and Identity Management

    Blockchain could help in this area too. Narigamba Mwinsuubo, the founder and CEO of Bitland, a blockchain-based land registry startup, hopes that the project will help Ghanaian farmers lift out of poverty by making it easier for them to document and confirm land ownership. The banks refuse to give loans without proof of land ownership, and often do not trust the documents as they are easily forged. By having the ownership confirmed by an immutable blockchain, the authorities could be sure that the land actually belongs to the owner and help them get all the benefits.

    Other Sectors

    The other sectors in Africa that could be disrupted by blockchain include:

    • Voting systems
    • Food supply chain
    • Education

    The blockchain is present in Africa in the same measure it is present in the rest of the world. Every day there are more and more projects exploring the blockchain technology. The areas of particular interest are agriculture, banking, and governance.

    As soon as the blockchain-related regulations are introduced by African governments we will, without a doubt, see rapid growth in the development and implementations of blockchain technology all across the African continent.

  • Enhance Your Online Privacy & Security — The Basic Steps Everyone Should Take

    Not many people take online privacy and security seriously. It’s not an exciting topic, and people that are not tech-savvy often end up confused.

    For this reason, we have decided to create an introductory article for all those that haven’t heard of 2-factor authentification, Tor, VPN, and similar technologies. The online surveillance has become widespread and if you believe you don’t have anything to hide — please read on, you may think otherwise by the end of this article. Now we are going to go through the basic steps for improving your security online.

    Enable 2-factor Authentification

    Two-factor authentification is another layer of security on top of the standard username/password layer. Besides requiring to input your password, it requires you to enter a code that is sent to your smartphone. These codes are usually valid only for a couple of seconds, adding extra security to your online accounts.

    In order to hack your account, the crooks would now need not only your password but also access to your phone. In some cases, this code can be generated from an app installed on your phone or even by a small hardware device — but most online services rely on messaging to your phone number.

    Use a Password Manager

    Our team was recently talking about security and we have a general feeling that people use weak passwords. The only reasons for this are they are easy to remember and convenient to type in.

    Using a password manager should be the next step for all of you looking to increase the security of your account. Use a different password for each service you use, and always generate long and complicated passwords. By adding an extra number, dot or similar sign to your password you extend the brute force hacking time by days. And the more time and resources it takes to hack it, the less likely crooks will go that way.

    Use a VPN Service

    VPN is something many forget about. To put it plainly, your computer/smartphone have a unique ID (the IP address). And when you browse the web, everyone knows what you do and where are you located because IP address can be tracked to your physical address.

    Everyone from the government, Internet provider, and hackers can track everything you do online, and ultimately track it to your physical address. Using a VPN helps keep your privacy in check.

    You simply connect to a VPN server and then this VPN service masks your location. Without a VPN, your location and an IP address are public. But with VPN, you still have an IP address and the location, it’s just changed. It can come from servers across the world, showing that you are in China, for example.

    Besides that, your data is encrypted, making it harder to steal your info. VPNs are also a great way to go around the censorship in certain countries. Since certain websites are blocked based on your location, VPN can make it look like you are coming from another country and grant you access to these services. This is especially important for foreigners that often cannot access their social media in restricted countries, essentially getting them cut off from the communication channels used at home.

    You must know that any activity on networks such as Facebook, WhatsApp or Google are tracked and will always be traced back to you. This is not only the nature of these products, but they’re all bound to the US law. Use these networks wisely. Post whatever you want, but keep your private conversations private by using a VPN connection & a service that doesn’t give away your data. (more about that further down in this article)

    Use Tor

    All of these things can be also achieved by using the Tor browser. Tor is a browser focused on anonymity and decentralization. Since Tor uses many different participants in the network to keep everything anonymous, each action takes extra time. This is why it is not really great for daily use. Instead, use Tor for anything that needs an extra layer of security.

    Cover Your Cameras

    This may seem like a bit paranoid, but we point phone camera at our face every time we check our messages. In addition, there is another camera in the back that records our surroundings. The same goes for our laptops.

    Cameras can be turned on from the distance using special software, without any signs that it is recording.

    As for the microphone, there is an app called Micro Snitch which tracks the use of the microphone and alerts the user when an app tries to access it without your consent. The conversations you want to lead in “private” are not really that if you have two phones, a laptop and Amazon Alexa in the room.

    And even tho the majority of us does not have anything to hide, it is important to be aware of these things.


    We hope that this article was simple enough to understand. This article is here only to provide you with the basics of privacy protection. If you want to dive deeper, the internet is full of great resources. Naturally, there is always more we can do to stay safe, but this is a great way to start.

Looks like your connection to Cryptocentral was lost, please wait while we try to reconnect.