Browse Source

We call them Hush Arrakis Chains now. God created Arrakis to train the faithful.

master
Duke 4 months ago
parent
commit
3f57ab0488
  1. 47
      README.md

47
README.md

@ -1,25 +1,25 @@
# Hush Smart Chains - The z2z Platform
# Hush Arrakis Chains - The z2z Platform
Hush Smart Chains (HSCs) are a way to create your own HUSH blockchain, with a focus on fully-shielded (z2z) chains for
Hush Arrakis Chains (HACs) are a way to create your own HUSH blockchain, with a focus on fully-shielded (z2z) chains for
maximum privacy. These blockchains can be run completely isolated from the internet and decide if they want to
interact with the main HUSH blockchain (HUSH mainnet).
## Private vs Public Hush Smart Chains
## Private vs Public Hush Arrakis Chains
Private Hush Smart Chains are perfect for a group of people who want to use encrypted memos but do not want their
Private Hush Arrakis Chains are perfect for a group of people who want to use encrypted memos but do not want their
data on the public Hush mainnet. It allows groups to completely isolate their data, yet still use HUSH technology.
A Private HSC could be run on a VPN which requires credentials to even get on the network, while a Public HSC is meant
to "federate" and allow anyone on the internet with compatible software to join. Some HSC's could be in remote places,
such as a LAN of a few computers that only occassionally gets batched Internet data via radio or satellite. HSC's do
A Private HAC could be run on a VPN which requires credentials to even get on the network, while a Public HAC is meant
to "federate" and allow anyone on the internet with compatible software to join. Some HAC's could be in remote places,
such as a LAN of a few computers that only occassionally gets batched Internet data via radio or satellite. HAC's do
not need the Internet to operate and they can wait to transmit data, when there is a connection, or simply listen, and
never send any data out. The use casese are very flexible.
# Use Cases
A Hush Smart Chain (HSC) can be used as a factory to make isolated and compartmentalized encrypted messenger platforms.
We will describe a few use cases. HushChat is compatible with all Hush Smart Chains.
A Hush Arrakis Chain (HAC) can be used as a factory to make isolated and compartmentalized encrypted messenger platforms.
We will describe a few use cases. HushChat is compatible with all Hush Arrakis Chains.
## Use Case: Medical Billing
@ -29,7 +29,7 @@ medicall billing information to a 3rd party to receive payment for her services.
Traditionally this is done with fax machines and unencrypted email, with no concern
for privacy at all.
Insurance companies would create their own HSC's and then health-care providers such
Insurance companies would create their own HAC's and then health-care providers such
as Alice and Bob, could use an encrypted protocol with extremely high privacy. Of
critical importance is that there is a record of thise information being transacted.
If the insurance company is suspected of doing fraud, there is cryptographically-signed
@ -43,7 +43,7 @@ system discourages cheating on both sides by providing a ledger of information t
Currently if Alice would like to send medical records internationally, people resort
to fax machines, unencrypted email or physically handing them over. If individual
health care professionals create their own HSC's, their client data is completely isolated
health care professionals create their own HAC's, their client data is completely isolated
from the rest of HUSH mainnet, which may be required for government compliance anyway.
Alice could send her doctor Bob a PDF of her medical records or a textual account of them,
@ -56,7 +56,7 @@ information that they will utilize and sell, forever.
Alice is being persecuted by the local police for something she did not do, in sunny Portland, Oregon.
She searches the web for a lawyer that is close by. She contacts her
new lawyer Bob via HushChat on HUSH mainnet, as a way to initiate communication. Then
they immediately switch to Lawyer Bob's Hush Smart Chain PDXLAW, and then they can
they immediately switch to Lawyer Bob's Hush Arrakis Chain PDXLAW, and then they can
communicate knowing that they are leaking information to as few people possible.
Alice can send image attachments to Bob to show him evidence and send textual chat which are encrypted
@ -73,8 +73,7 @@ or pay-for-image, or various other use cases. HushChat is a platform for communi
and every HushChat can attach HUSH (or FANZ coins) to unlock more content/value/etc.
In this model, each celebrity owns their own blockchain, like owning their own label or recording study. They
are not under the thumb of whoever controls the communication or payment platforms. These blockchains can
integrate with HUSH for 51% attack protection or be completely their own entities. Some people may want to
are not under the thumb of whoever controls the communication or payment platforms. Some people may want to
use HUSH mainnet directly for convenience and then migrate to their own system as they expand.
## Use Case: United Nations Human Rights reports
@ -87,11 +86,7 @@ The United Nation could provide a service, similar to SecureDrop for journalists
private manner. This also has the benefit of there being a censorship-resistant record of what is happening.
This would improve the dignity and privacy of all people. Privacy is a universal human right.
In this use case, it's important to use Delayed-Proof-of-Work to send data to HUSH, so it can be protected
by Bitcoin hashrate security.
## Developers: Creating a Hush Smart Chain
## Developers: Creating a Hush Arrakis Chain
You will need the [Official Hush full node Git repo](https://git.hush.is/hush/hush3):
@ -112,8 +107,8 @@ hush-smart-chain -ac_name=TCASH -ac_private=0 -ac_blocktime=75 -ac_supply=0 -ac_
The above command makes the ticker of that chain `TCASH` with a block time of 75 seconds and halving every 210000 bloks with
initial reward of 12.5 TCASH. The default block time is now 60 seconds and is a good default for most use cases.
The argument `-ac_private=0` is needed because HSC's are z2z by default, which means only private transactions can be made.
Zcash mainnet (ZEC) does not have `z2z` and only a small percentage of transactions actually use privacy, around 5%.
The argument `-ac_private=0` is needed because HAC's are z2z by default, which means only private transactions can be made.
Zcash mainnet (ZEC) does not have `z2z` and only a small percentage of transactions actually use privacy.
### Pirate replica
@ -125,7 +120,7 @@ hush-smart-chain -ac_name=ARRRUKIDDING -ac_supply=0 -ac_halving=388885 -ac_priva
```
This replica has exactly the same mining schedule as PIRATE as well as block reward. One notable exception
is that all Hush Smart Chains are Pure Sapling, which means no 1.6GB download would be required to sync
is that all Hush Arrakis Chains are Pure Sapling, which means no 1.6GB download would be required to sync
the `ARRRUKIDDING` chain.
One may note that the halving interval looks different than the 77777 that Pirate normally uses. This was
@ -133,12 +128,6 @@ the halving interval of the original Pirate chain, which the author mined on, bu
mining rewards being emitted in about 5 years. Komodo internally multiplies the interval by 5 to give a
~25 year emission and that is where 3888885 comes from.
## Adding DPoW
All Hush Smart Chains support Delayed-Proof-of-Work innately, though the service must be run and data injected into the network.
DPoW is not needed for private Hush Smart Chain. Public Smart Chains that will have financial value need protection
from double spend attacks, so DPoW is highly encouraged.
## Getting Help
We are happy to help you build upon the Hush platform, please join our [Telegram](https://hush.is/telegram) and ask questions.
We are happy to help you build upon the Hush platform, please join our [Telegram](https://hush.is/telegram) or [Matrix](https://hush.is/matrix) and ask questions.

Loading…
Cancel
Save