Anonymous Social 3.0-The advent of the blockchain star

Concealment is a system that truly implements privacy protection with Turing complete smart contracts.

May 25, 2020 /PressReleaseAgency/

All centralized products have a desire to control the things themselves. Even the decentralized blockchain concept is constantly blocked and targeted. When centralized online services become the norm, citizens ’privacy and security issues are not guaranteed. Citizen data being monitored and targeted for advertising, capitalists are increasingly greedy for citizens' data, so the geek team from the anonymous world has launched a new system -Concealment.

Project Introduction:

In response to the current situation, the Geek went deep into the technology in 2015, and eventually develop a solution that can protect the security of people ’s assets and the privacy of data-Concealment .

Concealment is a system that truly implements privacy protection with Turing complete smart contracts. Compared with the existing centralized system, Concealment can not only realize the privacy protection of account information and transaction information, but also realize the privacy protection of Turing's complete smart contract input and output.

The technical architecture of the top layer of Concealment from bottom to top is: data layer, network layer, incentive layer, consensus layer, contract layer and application layer.

Each level can serve certain applications, meet the specific needs of different applications, and help users quickly and safely implement various application scenarios.

Concealment data layer

Beyond standard block riddle structure, Merkle tree, hash function, asymmetric encryption, and timestamp technology, the data layer also introduces technologies such as dynamic priority calculation, Fibonacci sequence calculation, and cryptographic evidence. The traditional block data structure didn’t fully consider scalability at the beginning of the design, resulting in the inability to accommodate large-scale data, and the lack of flexibility in structural design led to the existing blockchain technology chain is only suitable for digital currency Circulation.

Concealment network layer

In order to increase the network load and increase the speed of network transaction processing, the network layer adopts the P2P networking method. Concealment can be used for flexible protocols according to different scenarios in system design, and supports multiple P2P protocols. In terms of communication security, flexible communication protocols such as HTTPS / TLS are flexible.

Concealment incentive layer

A transaction is a basic transaction in which equity changes on Concealment, and any transaction needs to cancel Concealment. Concealment incentive bookkeeping nodes in addition to direct asset income rewards, there are bookkeeping contribution rewards. In addition, with the continuous improvement of Concealment technology and ecology, the value of Concealment will continue to increase.

 Concealment consensus layer

Concealment uses the POW mechanism to select nodes and then create blocks from the held computing power, and the account elected by the community will make decisions on behalf of the community. The decision representative needs to protect the security of the entire block. If the decision-making representative tries to use the decision The right to tamper with the authenticity of data and other issues will be removed by all users of the community using the DPOW mechanism, and then re-select new community decision-making representatives, DPOW security comes from each user and verifies the quality of the node The algorithm, even if a person has 50% of the effective voting rights, cannot decide a block alone.

Concealment smart contract

    Smart contracts are the best way to expand blockchain functionality. In the current era, there are many opportunities for the blockchain to be combined with traditional industrial applications in many scenarios, but such a combination is far from mature. Smart contracts are solutions that allow us to conduct various experiments at the fastest speed and lowest cost. Based on the growth of virtual machine technology, we can transplant smart contract technology that supports multiple development languages ​​into the Concealment project, and will explore various industries.

After the smart contract is deployed on the chain, in addition to being directly called by the user or having access to assets, it can also call other smart contracts / built-in native contracts or be called by other smart contracts.

 Some functional logic can be implemented in the form of smart contracts and deployed on the chain, and other smart contracts can be used as third-party libraries to extend the functionality of the blockchain.
Concealment atomic exchange contract

The actual exchange of the two assets is through atomic swaps. Comply with the agreement, and if one party quits later, the funds will be returned to the accounts of the parties at the specified time. Atomic swaps can use slightly modified HTLCs.

In short, using the BTC / ETH example, when real-time Bitcoin flows from Exchange A to Bitcoin Payment Channel B and Exchange B ’s real Ethereum, real-time exchange Ethereum Payment Channel A. Atomic exchange with special HTLC ensures. The atomicity of the exchange: either the exchange is completely completed, or nothing happens.

The payment channel atomic exchange technology is quite new and has recently been successfully tested between Bitcoin and Ethereum, Bitcoin and Zcash, and Bitcoin and Litecoin. In the future, full compatibility between different HTLCs on different chains will be achieved.

Optimistic Rollups mechanism

Optimistic Rollups is a side chain solution that is dedicated to reducing the burden on the main chain. The biggest benefit of using the Rollup solution is to help users reduce Gas overhead, which in turn improves the transaction volume per second (at least a few hundred) of the entire network. PS). The fact that the transaction itself becomes cheaper also means that applications that used to consume too much gas without a chance to appear, such as privacy schemes that use complex cryptography, are now also possible. Therefore, although the Rollup solution itself does not provide privacy benefits, it is a suitable basis for developing privacy protection technologies. Optimistic Rollup's method of processing data also brings it good simplicity, which is very prominent compared to other Layer-2 protocols.

Of course, the above is not all the highlights of the Concealment system technology. More information still needs to be understood by citizens themselves. Concealment is about to go online now, and its potential is beyond your imagination.

Contact Info:
Name: Media Relations
Email: Send Email
Organization: Global News Online
Website: http://www.globalnewsonline.info

Source: PressReleaseAgency

Release ID: 88958886

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.