Frequently Asked Questions

Are the GEDIS system and its G-TRAC (Global Tradable Real-Asset Certificate) warrants legal and compliant? How can I ensure the safety of my assets?

(1) Legal Compliance: On-Chain Rights and Responsibilities Are Equivalent to Offline Legal Status

Legitimate Identity Mapping: Your enterprise digital identity (DID) is generated strictly based on your valid legal entity and qualifications registered in a sovereign country, serving as your legal representative in the digital world and subject to the jurisdiction of the laws of the place of registration. The physical asset rights confirmation agreement and clearing agreement signed prior to obtaining a DID further reinforce the legal foundation of on-chain rights and interests.

Clear Asset Ownership: The physical asset (CID) anchored by the warrant fully corresponds to the offline property rights protected by the laws of the host country (e.g., land use rights, equipment ownership). Warrants do not create new property rights; rather, they serve as a digital record and split of existing legal rights, with ultimate interpretation governed by the laws of the asset’s location. On the China side, the revenue rights and distribution rights associated with warrants strictly align with the international trade fund settlement account while also anchoring to the underlying physical assets, ensuring a complete legal chain of traceability.

Regulatory Penetration Design: The system provides standardized audit interfaces for regulatory authorities across countries. All transactions, ownership changes, and fund clearing records are fully traceable and auditable, meeting the requirements for cross-border data flow, foreign exchange, and tax regulatory oversight. For enterprises operating in China, the binding of Digital RMB wallets and currency settlement accounts ensures that fund flows are completely transparent and subject to supervision.

(2) Technical Safeguards: Your Assets Remain Under Your Control

Asset and Data Sovereignty: Your critical business data can be stored in a self-controlled or designated trusted environment (e.g., a national trusted data space). Through GEDIS rules, you only need to share verifiable credentials without disclosing raw data, achieving “usable but invisible.”

Key Self-Custody: As your digital assets, the control (private key) of your warrants is held by you or a designated custodian. Any asset disposal requires your authorization, and the system only ensures the immutability and automated execution of authorized instructions.

Structured Risk Hedging: As an ecosystem node, you no longer bear the full-chain market and operational risks in isolation. Systemic risks are shared and hedged through ecosystem consensus and smart contracts.

(3) Authoritative Endorsement and Dispute Resolution

Foundation of Credibility: The system operates on the infrastructure of a “national-level trusted data space” and is derived from “national-level research achievements,” providing a solid compliance foundation and authoritative endorsement.

Trusted Judicial Evidence Storage: All key operations are anchored in the “Yan’an Trusted Space” and joint judicial evidence storage nodes, generating legally valid electronic evidence.

Clear Dispute Resolution: In the event of a dispute, on-chain evidence is given priority and can be linked to internationally recognized arbitration mechanisms, ensuring that your rights can be efficiently resolved within the legal framework.

Summary

In summary, the GEDIS system operates within the current international legal and regulatory framework through its design of “technical codification, legal mapping, and regulatory interfacing,” providing deterministic compliance and security protection for your cross-border digital assets and collaboration.

Prev:What is the most unique and irreplaceable value of GEDIS?