Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Siddley Voucher Safe Project

Siddley Voucher Safe Project

Ratings: (0)|Views: 4,611|Likes:
Published by Carl Mullan
Siddley Voucher Safe Project
Siddley Voucher Safe Project

More info:

Published by: Carl Mullan on Jan 20, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/20/2013

pdf

text

original

 
DGC Magazine December 2010 Issue § 1
 
DGC
>> How the ConTen Act can Return America to Sound Money p.41 <<
December 2010
voucher-Safe
Siddly’s Nwopn SDigitl Bctiits
 
4 § DGC Magazine December 2010 Issue
 hat 
’ 
 
 in 
 
your
 
safe 
?
S
iddley
i
 nc
.U
 nveilSthe
i
 nternet
S
 n
eweStand
c
ooleSt
d
igital
c
Urrency
(and it’s awesome)
 
DGC Magazine December 2010 Issue § 5
Voucher Safe
Design GoalsIt seems best to begin with a number of design goalswhich guided us:
1. The system must not be account-based, but constitute
a true digital bearer certicate exchange system, wheredigital wallets exist but accounts do not.
2. To engender user trust in the system, it must be 100%open source, not only for our code but for any code
packages or libraries which are utilized.
3. The system must be distributed so that it cannot be shut
down by highly organized crime.
4.
All data must be encrypted, and handled in such a way
that the user does not need to trust any of the system
operators. (The sole exception being the Issuer, whichmust be trusted to store bona de backing assets.)
5. Payments must be irrevocable, and untraceable. It mustbe physically impossible for any component, even theVP, to provide a transaction history for any user. That
which is impossible cannot be compelled. (See goals 1and 3.)
6. The system architecture must provide inherent
economic benets to its operators, while minimizing
costs to users.7.
To mitigate the threats of DDoS, spam, and easy trafcanalysis, HTTP browser and email trafc should be
avoided.8.
Given the increasing ubiquity of wireless hand-held devices such as web-enabled cell phones, it is
desirable not to restrict users needlessly to the desktopenvironment.
Get Started Here: http://www.voucher-safe.com/

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->