✦ Synergy-X (SynX) Documentation ✦
Comprehensive guides, technical specifications, and resources for the world's first post-quantum cryptocurrency. Master quantum-resistant cryptography and secure your digital assets against the quantum future.
Quick Start
Technical Whitepaper
Complete technical specification covering Kyber-768, SPHINCS+, wallet architecture, transaction protocol, staking, and P2P marketplace.
Getting Started
New to SynX? Start here. Step-by-step guides to set up your quantum-resistant wallet and make your first transaction.
Migration Guides
Moving from Bitcoin, Ethereum, or other cryptocurrencies? Our migration guides make the transition seamless.
Understanding the Quantum Threat
Threat Analysis
Understand why current cryptocurrencies are vulnerable to quantum computers and the timeline for these threats.
Legacy Chain Vulnerabilities
Technical analysis of quantum vulnerabilities in Bitcoin, Monero, Zcash, and other popular cryptocurrencies.
Post-Quantum Cryptography
Kyber-768 Key Encapsulation
NIST FIPS 203 standardized key encapsulation mechanism based on Module-LWE problem. The foundation of SynX secure communications.
SPHINCS+ Digital Signatures
NIST FIPS 205 standardized hash-based signatures with information-theoretic security. Every SynX transaction is authenticated with SPHINCS+.
NIST Standards
Understanding the NIST Post-Quantum Cryptography Standardization Process and why it matters for cryptocurrency security.
Using SynX
Wallet Guides
Comprehensive guides for all wallet types: hot wallets, cold storage, hardware wallets, and mobile configurations.
Staking
Earn rewards while securing the network. Learn about SynX delegated proof-of-stake and how to maximize your returns.
Synergy Sea DEX
Trade directly with peers using non-custodial escrow. Zero KYC required — no centralized exchange, just secure peer-to-peer transactions.
Comparisons
SynX vs Legacy Chains
Objective technical comparisons showing how SynX compares to existing privacy and mainstream cryptocurrencies.
Developer Resources
Integration Guides
No KYC, no custody — prove shadow payments blind. Complete API reference for quantum-sealed proof verification, shadow transactions, and zero-metadata integrationTechnical documentation for developers building on SynX or integrating post-quantum cryptography into existing systems.
Bug Bounty Program
$10,000 USD Bounty
Think you can crack Kyber-768, forge a SPHINCS+ signature, or drain an escrow? We're offering $10,000 USD for any verifiable critical exploit. 90-day window. On-chain payout. No committees.
Legal
Terms of Service
Bearer Token Declaration & User Sovereignty Agreement. Your keys, your coins, your rules — and the legal framework that makes it binding.
Privacy Policy
“We See Nothing” Edition. Zero data collection, zero telemetry, zero analytics. The shortest privacy policy in crypto because there’s nothing to disclose.
Disclaimer
“We’re Not Your Bank.” No FDIC, no custody, no fiduciary duty. Plus the Shadow Marketplace notice — no escrow, no refunds, no chargebacks, no complaints.
Frequently Asked Questions
Quick Answers
Concise answers to common questions about post-quantum cryptography, SynX features, and cryptocurrency security.
Ready to Secure Your Future?
Download the SynX wallet and start protecting your assets with NIST-standardized post-quantum cryptography today.
Download Wallet