The design of the Everything Chain is aimed at the serious security issues of the current Internet of Things. Combining cryptographic asymmetric encryption technology, semi-homomorphic encryption ciphertext computing technology, and a distributed architecture without a data center. It not only solves the problem of device control security, and hackers cannot control the user's device; it also protects the data security sovereignty and privacy security of the user and the device. Only the user can view the data that must be recorded in the camera of the smart device. The Everything Chain architecture can meet the high concurrency environment of the Internet of Things. The main chain adopts PBFT's consensus strategy, combined with the DAG subnet point-to-point communication network, and cleverly combines the Merkel tree data structure simple verification technology. The performance of the main network can meet the concurrency of 100,000, and the entire network can achieve better concurrency due to the distributed DAG subnet architecture. At a time when the big data revolution is sweeping across business, WanChain proposes for the first time that data sovereignty belongs to users and is technically guaranteed. Data that is not circulated is worthless. WanChain uses probabilistic models such as zero-knowledge proof, BloomFilter, and Hyperloglog to provide a smart contract data analysis interface. Merchants can submit smart contracts to use user data for machine learning and pay users tokens based on the contribution of user data.