Comprehensive Analysis of Intel's HERACLES Fully Homomorphic Encryption Accelerator: Technical Benchmarks, Competitive Landscape, and Market Implications
0 point by adroot1 4 hours ago | flag | hide | 0 comments
Comprehensive Analysis of Intel's HERACLES Fully Homomorphic Encryption Accelerator: Technical Benchmarks, Competitive Landscape, and Market Implications
Key Points:
- Performance Acceleration: Evidence suggests that Intel's new purpose-built hardware accelerator, HERACLES, provides a computational speedup of approximately 1,074x to 5,547x over traditional high-end server CPUs when executing Fully Homomorphic Encryption (FHE) workloads [cite: 1].
- Hardware Advancements: It appears that overcoming the massive computational overhead of FHE requires radical architectural departures from standard x86 designs; HERACLES utilizes an 8192-way SIMD compute engine and 48 GB of High-Bandwidth Memory (HBM3) fabricated on a 3nm process [cite: 1, 2].
- Competitive Ecosystem: While Intel has demonstrated a highly advanced physical prototype, the competitive landscape is rapidly evolving. Startups like Cornami and Niobium Microsystems are developing alternative many-core and custom silicon architectures, suggesting a robust and competitive future market for FHE hardware [cite: 3, 4].
- Market Trajectory: Research indicates that the broader Privacy-Enhancing Computation (PEC) market is projected to grow significantly, potentially reaching upwards of USD 50.8 billion by 2034, driven by stringent regulatory frameworks like GDPR and CCPA [cite: 5].
- AI and Cloud Integration: The integration of hardware-accelerated FHE is likely to fundamentally alter cloud computing and artificial intelligence by enabling zero-trust environments where highly sensitive data can be processed without ever being decrypted [cite: 6, 7].
The commercialization of Fully Homomorphic Encryption (FHE) has long been impeded by severe computational bottlenecks, earning it the moniker of cryptography's "Holy Grail" [cite: 8, 9]. While software-based FHE solutions provide profound theoretical security guarantees, their practical deployment has been stifled by latencies up to six orders of magnitude higher than plaintext execution [cite: 10, 11]. Recent advancements in specialized hardware, specifically Intel's HERACLES accelerator developed under the DARPA DPRIVE program, represent a paradigm shift. By addressing the fundamental mathematical and memory-bandwidth constraints of encrypted computation, these architectures aim to bridge the gap between theoretical cryptography and real-world deployment. This report provides an exhaustive academic analysis of Intel's FHE hardware, benchmarking its technical efficacy against existing software libraries and emerging competitor hardware, and forecasting its transformative impact on privacy-preserving cloud computing and secure artificial intelligence.
1. Introduction to Fully Homomorphic Encryption
1.1 The Cryptographic Paradigm Shift
Traditional encryption architectures—whether symmetric (e.g., AES) or asymmetric (e.g., RSA)—are designed to protect data at rest and data in transit [cite: 12, 13]. However, a fundamental vulnerability exists in modern computing: data must be decrypted into plaintext before it can be processed by a Central Processing Unit (CPU) or Graphics Processing Unit (GPU) [cite: 1, 7]. This decryption exposes sensitive information to a variety of vectors, including memory scraping, hypervisor snooping, Direct Memory Access (DMA) attacks, and insider threats [cite: 1, 14].
Fully Homomorphic Encryption (FHE) resolves this vulnerability by permitting arbitrary mathematical operations to be executed directly on encrypted data (ciphertext) [cite: 7, 8]. The underlying mathematics guarantee that when the processed ciphertext is finally decrypted, the resulting plaintext perfectly matches the outcome of the same operations performed on unencrypted data [cite: 8, 15].
1.2 Mathematical Foundations and Computational Overhead
FHE schemes, such as BGV, BFV, and CKKS, rely heavily on lattice-based cryptography, specifically the Ring Learning with Errors (Ring-LWE) problem [cite: 1, 16]. These algorithms are inherently resistant to quantum computing attacks, offering a post-quantum security posture [cite: 15, 17]. However, this security relies on injecting intentional "noise" into the ciphertext [cite: 18].
The primary barrier to FHE adoption is computational overhead. FHE operations involve complex polynomial arithmetic and massive integer sizes. Furthermore, every homomorphic addition or multiplication operation increases the noise within the ciphertext [cite: 18, 19]. If the noise exceeds a certain threshold, the data cannot be successfully decrypted. To manage this, a computationally ruinous procedure called "bootstrapping" must be periodically applied to reduce the noise, which drastically inflates processing times [cite: 20].
To illustrate the mathematical complexity, a standard FHE ciphertext operation can be conceptualized using LaTeX:
[ c = (c_0, c_1) \in R_q^2 ] [ \text{where } R_q = \mathbb{Z}_q[X]/(X^N + 1) ]
Here, ( N ) represents the polynomial degree (typically a power of 2, such as 8192 or 16384), and ( q ) is a large ciphertext modulus [cite: 1, 18]. The multiplication of two such ciphertexts requires complex Number Theoretic Transforms (NTTs) and inverse NTTs, which are extremely memory-bandwidth intensive and poorly suited for traditional von Neumann architectures [cite: 1, 11]. As a result, software-based FHE operations on standard CPUs can be up to a million times slower than plaintext operations [cite: 12, 21].
2. The DARPA DPRIVE Initiative
The US Defense Advanced Research Projects Agency (DARPA) recognized the strategic imperative of FHE but acknowledged its prohibitive overhead. In early 2021, DARPA launched the Data Protection in Virtual Environments (DPRIVE) program [cite: 21, 22]. The objective of DPRIVE is to design and implement hardware accelerators capable of executing FHE computations at speeds within one order of magnitude of unencrypted computation [cite: 8, 15].
DARPA awarded multi-million dollar contracts to four primary research teams:
- Intel Federal (partnering with Microsoft) [cite: 12, 22].
- Duality Technologies [cite: 8, 15].
- SRI International [cite: 8, 15].
- Galois [cite: 8, 22].
The program mandated the exploration of novel memory management techniques, flexible data structures, and the utilization of massive native word sizes (up to 1000 bits) to natively handle FHE arithmetic [cite: 21, 22]. Intel's response to this initiative culminated in the development of the HERACLES accelerator [cite: 9, 10].
3. Architectural Deep Dive: Intel's HERACLES Accelerator
Intel's HERACLES (Homomorphic Encryption Revolutionary Accelerator with Correctness for Learning-oriented End-to-end Solutions) is not an x86 CPU; it is a highly specialized, purpose-built System-on-Chip (SoC) designed exclusively to accelerate ring polynomial arithmetic [cite: 1, 11]. Demonstrated at the IEEE International Solid-State Circuits Conference (ISSCC) in early 2026, HERACLES represents a monumental leap in cryptographic hardware engineering [cite: 17, 23].
3.1 Physical and Silicon Specifications
Unlike early academic research chips that measured under 10 square millimeters, HERACLES is a massive silicon construct measuring 197 mm² [cite: 1, 2].
- Fabrication Node: Manufactured using Intel's advanced 3-nanometer (Intel 3) FinFET process technology [cite: 1, 24].
- Power and Thermal Envelope: The processor operates within a 176-watt power envelope and utilizes liquid cooling to manage thermals due to the intense computational density [cite: 1].
- Clock Speed: The engine operates at a frequency of 1.20 GHz [cite: 1, 24].
- Form Factor: It is currently deployed as a PCIe accelerator card designed to be installed alongside standard data center servers [cite: 1, 25].
3.2 Compute Engine and Memory Subsystem
Conventional CPUs and GPUs choke on FHE workloads due to the heavy data movement and the complex permutations required for NTTs [cite: 1, 7]. HERACLES circumvents this through a radically different architecture:
- 8192-Way SIMD: The chip features an 8192-way Single Instruction, Multiple Data (SIMD) vector compute engine [cite: 1, 24].
- Grid Topology: This engine is composed of 64 tile-pairs (each containing 128 parallel arithmetic lanes) arranged in a 2D 8x8 mesh Network-on-Chip (NoC) [cite: 1, 24].
- Specialized Arithmetic Units: The tiles integrate arithmetic units uniquely optimized for modular addition, modular subtraction, modular multiplication, and the specific Cooley-Tukey butterfly operations vital for Number Theoretic Transforms (NTTs) [cite: 1, 24].
- Memory Bandwidth: FHE is notoriously memory-bound. HERACLES addresses this with a three-tiered memory subsystem [cite: 24]. It includes 64 MB of internal scratchpad memory, large register files, and dedicated buffers that stage data immediately adjacent to the compute engines [cite: 1].
- High-Bandwidth Memory (HBM3): The package is flanked by 48 GB of HBM3 memory (two 24 GB stacks), a configuration typically reserved for high-end AI training GPUs. Custom data paths maximize internal bandwidth to multi-terabytes per second [cite: 1, 2].
3.3 Software Integration and Programmability
Hardware acceleration is ineffective without a robust software stack. Intel designed HERACLES to natively process ring polynomials, supporting multiple major FHE schemes including BGV, BFV, and CKKS [cite: 1, 24].
// Conceptual Representation of HERACLES Hardware-Offloaded FHE Parameters
EncryptionParameters parms(scheme_type::ckks);
size_t poly_modulus_degree = 8192; // Natively supported by the 8192-way SIMD engine
parms.set_poly_modulus_degree(poly_modulus_degree);
parms.set_coeff_modulus(CoeffModulus::Create(poly_modulus_degree, { 60, 40, 40, 60 }));
// HERACLES offloads NTT and Key-Switching automatically via PCIe/CXL interface
The HERACLES software stack leverages the static, data-oblivious nature of FHE programs, allowing for optimal offline scheduling [cite: 11]. It also supports on-die twiddle factor generation and key-switching material expansion, which drastically reduces the crippling metadata movement overhead traditionally associated with FHE [cite: 11, 19].
4. Benchmarking: HERACLES vs. Software-Based Solutions
The core metric of success for FHE acceleration is the reduction of computational latency compared to existing software implementations running on conventional hardware. Software libraries such as Microsoft SEAL, PALISADE, OpenFHE, and TFHE-rs are heavily utilized in the industry, but they remain constrained by general-purpose CPU architectures [cite: 16, 26, 27].
4.1 Theoretical and Empirical Performance Metrics
According to Intel's benchmarks, the HERACLES chip achieves staggering performance metrics at peak operation:
- Butterfly Primitives: ~29.5 Tera Operations Per Second (TOPS) [cite: 1].
- Modular Arithmetic: ~9.8 TOPS [cite: 1].
- Polynomial Arithmetic: Single-cycle 8k polynomial arithmetic throughput [cite: 24].
When benchmarked against a 24-core Intel Xeon W7-3455 'Sapphire Rapids' server CPU running the same FHE mathematical operations in software (clocked between 2.50 GHz and 4.80 GHz), the HERACLES chip (running at just 1.20 GHz) proved to be 1,074 to 5,547 times faster [cite: 1].
4.2 Case Study: Secure Voter Ballot Verification
To contextualize this theoretical speedup, Intel provided a live demonstration at the ISSCC simulating a highly sensitive real-world workload: private database queries for voter ballot verification [cite: 6, 7].
In this scenario, a voter wishes to verify that their ballot was recorded correctly without revealing their identity or vote to the server. The database and the query remain fully encrypted.
- Conventional Intel Xeon CPU: 15 milliseconds per verification [cite: 6, 23].
- Intel HERACLES Accelerator: 14 microseconds per verification [cite: 6, 23].
While a single instance shows a difference perceptible only to machines, scaling this workload exposes the absolute necessity of hardware acceleration. To verify 100 million encrypted ballots:
- Conventional Server CPU: Over 17 days of continuous compute [cite: 2, 6].
- Intel HERACLES Accelerator: 23 minutes [cite: 2, 6].
Table 1: Performance Benchmark Comparison (FHE Workloads)
| Metric / Workload | High-End x86 Server CPU (e.g., 24-core Xeon) | Intel HERACLES Accelerator | Speedup Factor |
|---|---|---|---|
| Architectural Focus | General Purpose, limited SIMD | Purpose-built 8192-way SIMD | N/A |
| Peak Butterfly Operations | Variable (Cache-bound) | ~29.5 TOPS [cite: 1] | N/A |
| Relative Math Ops Speed | Baseline (1x) | 1,074x to 5,547x [cite: 1] | Up to ~5,500x |
| Single Voter Verification | 15 milliseconds [cite: 6] | 14 microseconds [cite: 6] | ~1,071x |
| 100 Million Verifications | > 17 Days [cite: 6] | 23 Minutes [cite: 6] | ~1,071x |
These benchmarks indicate that HERACLES successfully transitions FHE from an academic curiosity to a deployable enterprise technology, fulfilling the foundational goals of the DARPA DPRIVE program [cite: 22, 28].
5. Competitive Landscape: Hardware Accelerators
While Intel's HERACLES has demonstrated remarkable physical scale and performance, it does not exist in a vacuum. The race to commercialize FHE hardware has spurred intense competition from agile startups and academic institutions, many of which utilize entirely different architectural philosophies [cite: 6, 9].
5.1 Cornami
Cornami is a prominent startup focusing heavily on combining FHE acceleration with Artificial Intelligence (AI) inference [cite: 3, 29]. Cornami relies on a massively multi-core "compute fabric" rather than a traditional SIMD vector engine [cite: 3, 30].
- Architecture: Their second-generation chip, the Mx2, is fabricated on TSMC's 16nm process [cite: 3]. It features 2048 cores within a 125-watt power envelope and utilizes 8GB of HBM [cite: 3].
- Software Compiler: Cornami’s true differentiator is its TruStream compiler, which dynamically reconfigures dataflow between cores and breaks applications into parallel streams, bypassing the traditional von Neumann bottleneck [cite: 3].
- Performance Claims: Cornami asserts that its Mx server (comprising 64 chips / 128,000 cores) can run FHE-encrypted AI inference 1,700 times faster than an unencrypted Nvidia DGX-H100 [cite: 3]. For FHE-encrypted training workloads, they claim a 700x speedup [cite: 3].
- Strategic Focus: Cornami explicitly targets real-time FHE-encrypted AI, aiming to match the speed and cost of unencrypted servers—a highly ambitious goal [cite: 3, 29].
5.2 Niobium Microsystems
Also a beneficiary of DARPA funding, Niobium Microsystems is building custom FHE silicon from the ground up [cite: 4, 25].
- Architecture: Niobium's approach eliminates traditional cache-based memory storage entirely, redirecting that silicon area specifically for ciphertext storage and processing [cite: 25].
- Fabrication: Niobium recently secured a $6.86 million contract with SEMIFIVE to fabricate their chip using Samsung Foundry’s 8nm (8LPU) process [cite: 6, 9].
- Performance Claims: Niobium claims its current accelerator design yields a 2,500x speedup over a typical CPU running FHE workloads [cite: 4].
5.3 Optalysys
Optalysys deviates from digital silicon entirely, pursuing a photonic hardware approach [cite: 2, 6]. By utilizing light to perform the complex Fourier transforms required by FHE algorithms, Optalysys aims to completely bypass the physical limitations of digital electronics, targeting a commercial release within three years [cite: 2, 6].
5.4 Academic and International Developments
The global academic community has also contributed significant hardware milestones:
- Fudan University (China): Demonstrated a 28nm Torus FHE processor that utilizes secure low-bit quantization at a 128-bit security level, achieving extremely low energy consumption [cite: 9, 31].
- KAIST (South Korea): Developed the OmniCrypt FHE accelerator, which demonstrated a 107x CPU speedup [cite: 9, 31].
Table 2: Competitor Hardware Accelerator Landscape
| Developer | Chip / Architecture | Process Node | Key Claims / Performance | Strategic Focus |
|---|---|---|---|---|
| Intel | HERACLES (8192-way SIMD, 48GB HBM3) | 3nm FinFET [cite: 1] | 1,074x - 5,547x vs CPU [cite: 1] | Cloud infrastructure, generalized FHE [cite: 7] |
| Cornami | Mx2 (2048 cores, 8GB HBM) | 16nm TSMC [cite: 3] | 1,700x vs DGX-H100 (Inference) [cite: 3] | Real-time Encrypted AI [cite: 3] |
| Niobium | Custom Silicon (No Cache) | 8nm Samsung [cite: 9] | 2,500x vs CPU [cite: 4] | PCIe Data Center Acceleration [cite: 25] |
| Optalysys | Photonic Computing | Optical | Targeting limits beyond digital [cite: 6] | High-throughput, low-energy FHE [cite: 6] |
| Fudan Univ. | Torus FHE Processor | 28nm [cite: 9] | Ultra-low energy consumption [cite: 9] | Academic / Low-power implementations [cite: 9] |
6. Projected Market Impact: Privacy-Preserving Cloud Computing
The advent of practical, hardware-accelerated FHE fundamentally alters the economics and security posture of the cloud computing industry. Organizations are increasingly shifting toward hybrid and multi-cloud architectures (utilized by over 90% of enterprises) to balance performance and flexibility [cite: 14, 32]. However, this shift exposes sensitive data to third-party infrastructure.
6.1 The Privacy-Enhancing Computation (PEC) Market Boom
FHE is the vanguard technology within the broader Privacy-Enhancing Computation (PEC) market. According to recent market intelligence reports, the trajectory for this sector is explosive:
- The global PEC market was valued at approximately USD 4.40 billion to USD 5.2 billion in 2024 [cite: 5, 33].
- Projections suggest the market will grow at a Compound Annual Growth Rate (CAGR) of 19.85% to 25.6%, potentially reaching between USD 34.08 billion by 2035 [cite: 34] and USD 50.8 billion by 2034 [cite: 5, 35].
- Within this ecosystem, Homomorphic Encryption technology is the dominant sub-segment, holding nearly 38.7% of the total PEC market share in 2024 [cite: 5, 13].
6.2 Regulatory Compliance as a Market Driver
The primary catalyst for this massive capital influx is the tightening web of global data protection regulations, notably the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA), and China's Personal Information Protection Law (PIPL) [cite: 32, 33].
Non-compliance carries devastating financial penalties (e.g., GDPR fines exceeding $1.6 billion since 2018) [cite: 32]. FHE allows enterprises to strictly adhere to data sovereignty and privacy laws while still leveraging third-party cloud analytics [cite: 14, 32]. Because the cloud provider only ever processes cryptographically secure ciphertext, the provider mathematically cannot access the underlying Personally Identifiable Information (PII) [cite: 5, 13].
6.3 Transitioning Beyond Trusted Execution Environments (TEEs)
Currently, cloud providers secure data-in-use via Confidential Computing technologies relying on Trusted Execution Environments (TEEs), such as Intel SGX or TDX, and AMD SEV [cite: 20, 34, 36]. TEEs isolate data in secure hardware enclaves [cite: 34, 36]. While effective, TEEs require the user to place inherent trust in the hardware manufacturer and are occasionally vulnerable to sophisticated side-channel attacks [cite: 1, 14, 20].
Hardware-accelerated FHE provides a superior security paradigm. By eliminating the need for decryption inside the processor altogether, FHE nullifies entire classes of side-channel and hypervisor attacks [cite: 1]. Gartner predicts that by 2026, 60% of large companies will have adopted PEC techniques for processing data in untrusted environments, establishing FHE as a critical pillar of zero-trust architectures [cite: 37, 38].
7. Implications for Secure AI Processing
Perhaps the most profound impact of FHE acceleration lies at the intersection of cryptography and Artificial Intelligence (AI). The modern AI landscape presents a paradox: training robust models and generating accurate inferences requires massive datasets, yet this data is often highly sensitive, proprietary, or legally protected (e.g., healthcare records, financial histories) [cite: 5, 37, 39].
7.1 Secure AI Inference and Training
Chips like Intel's HERACLES and Cornami's Mx2 directly address this paradox by enabling "Blind AI" [cite: 3, 40].
- Privacy-Preserving Inference: A user can encrypt their raw data (e.g., a medical scan or a financial query) locally and send the ciphertext to a cloud-based Large Language Model (LLM) or computer vision model [cite: 6, 7, 41]. The AI model performs inference directly on the ciphertext and returns an encrypted prediction [cite: 20]. The cloud provider never sees the user's input, and the user cannot steal the cloud provider's proprietary model weights.
- Collaborative / Federated Learning: FHE facilitates cross-silo collaborative machine learning. Multiple institutions (e.g., competing hospitals or banks) can pool their encrypted datasets to train a shared, superior AI model without ever exposing their raw, unprocessed data to one another [cite: 5, 32, 34, 42].
7.2 Overcoming Computational Limits in AI
FHE relies heavily on the CKKS (Cheon-Kim-Kim-Song) scheme for AI applications, as CKKS supports approximate arithmetic on real and complex numbers, which is essential for neural network weights and activations [cite: 1, 3, 16].
Traditionally, evaluating a non-linear activation function (like ReLU or Sigmoid) homomorphically is exceptionally difficult, requiring deep polynomial approximations that drastically increase noise and demand frequent bootstrapping [cite: 18]. The raw throughput provided by HERACLES—specifically its high TOPS for transform operations and massive memory bandwidth—allows these deep polynomial evaluations to execute in real-time, moving secure AI from theoretical research to practical deployment [cite: 1, 11].
8. Technical Challenges and Future Trajectories
Despite the monumental breakthroughs represented by HERACLES and its competitors, the path to ubiquitous FHE deployment is not without obstacles.
8.1 Hardware and Physical Limitations
The sheer physical requirements of FHE hardware pose deployment challenges. Intel's HERACLES is a massive 197 mm² chip that draws 176 watts and requires specialized liquid cooling [cite: 1]. Deploying such chips at scale within existing data centers will require significant infrastructure upgrades [cite: 1]. Furthermore, the reliance on expensive HBM3 memory indicates that early iterations of FHE accelerators will carry high capital expenditure (CapEx) costs, initially limiting them to enterprise, defense, and high-value financial applications [cite: 1, 40].
8.2 Software Integration and Standardization
While the hardware overhead is being mitigated, the complexity of FHE software remains high. Balancing security parameters (polynomial degree, coefficient modulus) against noise growth and performance requires specialized cryptographic knowledge [cite: 5, 18, 19].
- Data Utility vs. Privacy: If parameters are set incorrectly, the noise may overwhelm the signal, destroying the data [cite: 5, 18].
- Standardization: The industry currently lacks a universal, cross-platform industrial standard for FHE compilation and execution, though Intel is actively pushing for ISO/IEC standardization [cite: 11, 31]. Without standardized APIs, integrating FHE into legacy enterprise systems will remain an expensive, bespoke process [cite: 5, 32].
8.3 The Quantum Computing Threat
While lattice-based FHE is generally considered quantum-resistant, the rapid advancement of quantum computing necessitates constant vigilance [cite: 15, 38]. Organizations must ensure that the specific parameterizations used in hardware accelerators like HERACLES maintain their cryptographic strength against both traditional algorithmic cryptanalysis and future Shor-based quantum attacks [cite: 27, 38].
9. Conclusion
Intel’s HERACLES chip marks a historic inflection point in the field of cryptography. By delivering empirical speedups of 1,074x to 5,547x over state-of-the-art server CPUs, it successfully bridges the performance gap that has relegated Fully Homomorphic Encryption to academic theory for over a decade [cite: 1]. The architectural innovations—including an 8192-way SIMD engine, ultra-wide memory bandwidth, and on-die metadata expansion—demonstrate that the "million-fold" overhead of FHE is an engineering problem capable of being solved through specialized silicon [cite: 11, 21, 24].
However, Intel will not dominate this space uncontested. The proliferation of alternative architectures from DARPA-funded startups like Cornami and Niobium Microsystems guarantees a dynamic and rapidly advancing hardware market [cite: 3, 4, 25].
The projected market impact is profound. As the Privacy-Enhancing Computation market accelerates toward a valuation of over USD 50 billion by 2034 [cite: 5], hardware-accelerated FHE will become the gold standard for regulatory compliance [cite: 33]. More importantly, it resolves the fundamental tension between data privacy and data utility. By enabling secure, collaborative AI processing and zero-trust cloud computing, chips like HERACLES do not merely protect data; they unlock the ability to safely analyze the world's most sensitive information.
Sources:
- tomshardware.com
- hyper.ai
- eetimes.com
- eenewseurope.com
- market.us
- hyper.ai
- engtechnica.com
- eetimes.com
- sina.cn
- intel.com
- ncsu.edu
- msspalert.com
- fraud.net
- fortunebusinessinsights.com
- nextgov.com
- arxiv.org
- simplenews.ai
- math-lock.com
- github.io
- diva-portal.org
- infosecurity-magazine.com
- darpa.mil
- slashdot.org
- ieee.org
- niobiummicrosystems.com
- intel.com
- scitepress.org
- itdaily.com
- cornami.com
- cornami.com
- 36kr.com
- intelmarketresearch.com
- precedenceresearch.com
- researchnester.com
- market.us
- ubuntu.com
- emerline.com
- accio.com
- fintechfutures.com
- reddit.com
- github.io
- snowzjx.me