|
START PROCEDURE
First understand that every person collects data on his phone that is necessary for him to prove that the coins he received are legitimate. These are the Self-Sovereign Identity cards as shown in §4.1 and the blockchains of all people that he received coins from. The ID-Card is also what the user starts with. Before the user can start receiving his coins, he first needs to create an ID-Card that he can share with the other users he does transactions with. The filename of the ID-Card holds the hash of the ID-Card so it can easily be traced on the app and nobody will be able to change the ID-Card without changing the hash of it. This way users can check if the ID’s are valid. BLOCKCHAIN Each app will collect a large amount of blockchains (of all persons the user received coins from and paid coins to). The stability of our new financial system depends on the comparison of the parts of the blockchains that should be mutually shared and should be equal. If the software that checks this (that we named “the Sentinel”) finds irregularities, the receiver of the coins can simply dismiss the coins, and when others do similarly, these disputed coins will eventually depreciate to zero. This is the reason for collecting all these ID-cards and blockchains. The ID-Cards are named with the 64-character hash plus .png added. The blockchains are also named with the 64-character hash but add .txt to it. INITIAL STRING
TRANSACTION STRING
DEALING WITH OTHERS The next issue is what to copy from others? What is the necessary transaction data from others for the “Sentinel” (see next chapter) to check which coins are trustworthy? To illustrate this, let’s look at an obvious “crime”. A person could create a fake account and transfer coins from that fake account to his own account. This means that you should reject any coins that come from a person that you don’t personally know. This means we can accept the self-created coins of people we do direct transactions with or we accept the coins of a person we do a transaction with, that are self-created by people we did previous direct transactions with. Later we can possibly expand “the Sentinel” and the collection of (parts of) blockchains of others to coins that are collected by people we trust very well. In the beginning it is better to stick to people that are very close to create a more solid trust in the system. If there are irregularities then the receiver will obviously not accept the corrupted coins or abandon the entire transaction. It is up to the receiver if he will contact the third parties if the fraud has to do with their coins. It is also likely there will be more centralized organizations like the police or administration centers that will be asked to take a closer look at the fraud and help warning the community about the details of what has surfaced. |