Cryptocurrency

Viewing 15 posts - 1 through 15 (of 31 total)
  • Author
    Posts
  • #473 Reply
    Gandalf
    Guest

    I have an idea about a cryptocurrency that will work in a time of crisis, but I couldn’t create a topic in this forum due to an error. Let’s see if this works.

    #474 Reply
    Gandalf
    Guest

    Very well then. Here it goes:

    Is it viable to have a cryptocurrency that runs its private keys over barcodes? Think about it like an IRL hard key, but through actual goods. Instead of a blockchain you could run a peer-to-peer barter exchange. Much, much better use case compared to cryptocurrencies which are still not in practical use.

    #480 Reply
    3iWEvuKEag
    Keymaster

    Hi Gandalf, could you please expand upon this?

    #481 Reply
    Gandalf
    Guest

    Of course. As you already know and have demonstrated yourself, most encryption models operate with a public key and a private key. Now, instead of worrying about the quantum computers and prime factorization and the security of post-crypto communications, what if we simply assign the private key to a numerical value already present on any good we can find in every market? Or in other words, a barcode.

    A barcode, is present on almost everything we can purchase. Those that come without a barcode, have a barcode on their invoice.

    #482 Reply
    Gandalf
    Guest

    1- A barcode is unique either to a product, or to a set of products within a store. The store may vary in size, from a supermarket to Amazon.
    2- In contrast to blockchain where the transactions do not exist outside a digital plane, the barcode embedded on a physical product is similar to a Two-Factor Authorization. You can check the transaction both digitally and physically. This is what I meant by the IRL key.
    3- The system is inherently Byzantine fault tolerant. There is no possibility of double-spending because it is a peer-to-peer system that matches a seller to a buyer. There is no need for miners to solve the Proof of Work, because there is no chain for each block to synchronize.

    #485 Reply
    3iWEvuKEag
    Keymaster

    Which currency or exchange of value would be used? I want to understand how the property would actually become exchanged. Would there still be some form of common ledger between the two parties?

    #486 Reply
    Gandalf
    Guest

    There is no currency. It’s a barter system. Crypto acts as a measure of trust. I can’t post the rest of my messages because of errors. Hold on.

    #487 Reply
    3iWEvuKEag
    Keymaster

    Which errors are you getting?

    #488 Reply
    Gandalf
    Guest

    ERROR: Your reply cannot be created at this time.

    Whenever I type longer than 2-3 sentences, I get the above error.

    #489 Reply
    3iWEvuKEag
    Keymaster

    Ah, okay. That was because of blacklisted words. I have removed it and it should work now.

    #490 Reply
    Gandalf
    Guest

    4- Blockchain is susceptible to attacks because it has no collateral other than the mining algorithm of its own.
    5- The barcode based cryptocurrency can be mined on demand to facilitate a transaction. First, the collateral will be agreed upon between parties. Each party sends out two sets of public keys, along with two sets of private keys (barcodes). Upon receiving their goods, each party then enters the barcode on their goods to confirm the transaction.
    6- There are two scenarios: a- where the buyer and seller meet IRL. In case a, the cryptocurrency functions as a marketplace for users to display their goods, enabling market making. Communications for bargaining and value-setting can be done over BeeChat, or IRL. Case b- where the crpytocurrency facilitates transactions over a long distance. This is the usecase where BeeChat and HAM shines and a high level of trust is required. The trust can be established by the facilitator, which is the logistics in between.
    7- The trust can be a block that is generated when two sides confirm a transaction. The base logistics price, regardless of distance, is 1 block/walking distance/day. To bootstrap the system, the logistics price must be initially non-negotiable. However, the collateral for the block, such as resources to purchase fuel, or food for man-hour, can be negotiable.
    8- Whenever a communication is established over BeeChat or HAM, the cryptocurrency announces the number of successful transactions of the broadcaster. Thus, it becomes a currency of trust, that is mined through confirmed transactions, for which the collateral are goods with barcodes.
    9- Upon reaching a high level of trust, a “trustworthy partner” may act as a logistics hub, an escrow to hold the “trust coins” of each transactee in case one side tries to screw the other over, or a retailer that sells its stockpiles for “trust coins”.

    #491 Reply
    3iWEvuKEag
    Keymaster

    I see, so it would be a true barter system. To put a simple example, I could exchange a table for another table which both parties agree to exchange. In a sense, then, BeeChat becomes the software for making contracts of exchange, whereby delivery is made by a third party. Is that correct?

    #492 Reply
    Gandalf
    Guest

    Possible attack vectors:

    1- Drugs and money laundering – it’s very hard to use barcode crypto for nefarious purposes because these items can’t be barcoded. IRL transactions can be manipulated if both parties are crooked (broken package seals to hide drugs inside), but that’s almost impossible to track in any current system. It is possible to provide a static address that is still anonymous but enough to deter black markets.
    2- Spam transactions. To generate more blocks, more and more rudimentary transactions between two parties can be spammed. This can be avoided by a simple algorithm that generates blocks for transactions between unique addresses.
    3- Crooked vendors. Whenever a product is faulty or a vendor refuses to honor its obligations, the blocks that the vendor has can be sent to the buyer as the seizure of the collateral. The vendor loses trust and the trust points of the crooked vendor can be used for purchasing other goods.

    #493 Reply
    Gandalf
    Guest

    I see, so it would be a true barter system. To put a simple example, I could exchange a table for another table which both parties agree to exchange. In a sense, then, BeeChat becomes the software for making contracts of exchange, whereby delivery is made by a third party. Is that correct?

    Yes, although it doesn’t necessarily have to include a third party. Only when distances get longer.

    #494 Reply
    Gandalf
    Guest

    One attack vector that I’m considering is the brute forcing of a private key by a vendor, who already possessed the other private key. This way, the vendor can claim to have completed the transaction without sending its product.

    For this I’m thinking of an image recognition software or a barcode scanner that will upload the scanned barcode and no other method of confirmation will be accepted. Sort of like a crypto wallet.

Viewing 15 posts - 1 through 15 (of 31 total)
Reply To: Cryptocurrency
Your information: