9 Downloadable computer software for blockchain technology; downloadable computer software for managing cryptocurrency transactions using blockchain technology; security software; cryptography software; downloadable cryptographic keys for receiving and paying with cryptocurrency; downloadable cryptographic keys for receiving and paying with crypto assets; data networks; data protection software; data processing programs; interactive databases; electronic databases; distributed databases; computer networking and data communications equipment related to blockchain services and technology; mobile apps related to blockchain services and technology; computer software platforms, recorded or downloadable related to blockchain services and technology; software for monitoring, analyzing related to blockchain services and technology; computer software that assists computers in deploying parallel applications and performing parallel computations; software for smart contracts; privacy software; privacy protection software; privacy protection sensors; information technology infrastructure and applications in relation to privacy-preserving computation; information technology infrastructure and applications for multiparty computation and blockchain technologies; decentralized IT-infrastructure to be operated in a network of independent computers (the computers can be anything from a phone to a large data center); downloadable computer software featuring multiparty computation (MPC) or confidential computation meaning cryptography used in creating methods that allow more than one party to jointly compute a function over their inputs while keeping those inputs private; downloadable computer software featuring blockchain technology, namely digital ledger technology (DLT) that consists of growing list of records, called blocks, that are securely linked together using cryptography; distributed ledger technology, namely, decentralized databases formed by a consensus of replicated, shared, and synchronized digital data that is geographically spread (distributed) across many sites, countries, or institutions; downloadable computer software featuring threshold cryptography, namely as a cryptosystem that protects information by encrypting it and distributing it among a cluster of fault-tolerant computers; downloadable computer software featuring confidential computation that protects data and applications by encrypting data locally before use and running the confidential computation directly on the encrypted data in a network of servers, thus creating a solution that relies on the software run by the servers but not the hardware in the servers; downloadable computer software featuring privacy-preserving technology, namely technology like cryptography developed with the aim of preserving privacy of those using the technology; downloadable computer software featuring privacy enhancing technologies (PET), namely technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data.