From 3f57ab0488f502362159a8d956728db365f5d5c3 Mon Sep 17 00:00:00 2001 From: Duke Date: Wed, 3 Jan 2024 22:05:40 -0500 Subject: [PATCH] We call them Hush Arrakis Chains now. God created Arrakis to train the faithful. --- README.md | 47 ++++++++++++++++++----------------------------- 1 file changed, 18 insertions(+), 29 deletions(-) diff --git a/README.md b/README.md index e0dfcfb..0b44e59 100644 --- a/README.md +++ b/README.md @@ -1,25 +1,25 @@ -# Hush Smart Chains - The z2z Platform +# Hush Arrakis Chains - The z2z Platform -Hush Smart Chains (HSCs) are a way to create your own HUSH blockchain, with a focus on fully-shielded (z2z) chains for +Hush Arrakis Chains (HACs) are a way to create your own HUSH blockchain, with a focus on fully-shielded (z2z) chains for maximum privacy. These blockchains can be run completely isolated from the internet and decide if they want to interact with the main HUSH blockchain (HUSH mainnet). -## Private vs Public Hush Smart Chains +## Private vs Public Hush Arrakis Chains -Private Hush Smart Chains are perfect for a group of people who want to use encrypted memos but do not want their +Private Hush Arrakis Chains are perfect for a group of people who want to use encrypted memos but do not want their data on the public Hush mainnet. It allows groups to completely isolate their data, yet still use HUSH technology. -A Private HSC could be run on a VPN which requires credentials to even get on the network, while a Public HSC is meant -to "federate" and allow anyone on the internet with compatible software to join. Some HSC's could be in remote places, -such as a LAN of a few computers that only occassionally gets batched Internet data via radio or satellite. HSC's do +A Private HAC could be run on a VPN which requires credentials to even get on the network, while a Public HAC is meant +to "federate" and allow anyone on the internet with compatible software to join. Some HAC's could be in remote places, +such as a LAN of a few computers that only occassionally gets batched Internet data via radio or satellite. HAC's do not need the Internet to operate and they can wait to transmit data, when there is a connection, or simply listen, and never send any data out. The use casese are very flexible. # Use Cases -A Hush Smart Chain (HSC) can be used as a factory to make isolated and compartmentalized encrypted messenger platforms. -We will describe a few use cases. HushChat is compatible with all Hush Smart Chains. +A Hush Arrakis Chain (HAC) can be used as a factory to make isolated and compartmentalized encrypted messenger platforms. +We will describe a few use cases. HushChat is compatible with all Hush Arrakis Chains. ## Use Case: Medical Billing @@ -29,7 +29,7 @@ medicall billing information to a 3rd party to receive payment for her services. Traditionally this is done with fax machines and unencrypted email, with no concern for privacy at all. -Insurance companies would create their own HSC's and then health-care providers such +Insurance companies would create their own HAC's and then health-care providers such as Alice and Bob, could use an encrypted protocol with extremely high privacy. Of critical importance is that there is a record of thise information being transacted. If the insurance company is suspected of doing fraud, there is cryptographically-signed @@ -43,7 +43,7 @@ system discourages cheating on both sides by providing a ledger of information t Currently if Alice would like to send medical records internationally, people resort to fax machines, unencrypted email or physically handing them over. If individual -health care professionals create their own HSC's, their client data is completely isolated +health care professionals create their own HAC's, their client data is completely isolated from the rest of HUSH mainnet, which may be required for government compliance anyway. Alice could send her doctor Bob a PDF of her medical records or a textual account of them, @@ -56,7 +56,7 @@ information that they will utilize and sell, forever. Alice is being persecuted by the local police for something she did not do, in sunny Portland, Oregon. She searches the web for a lawyer that is close by. She contacts her new lawyer Bob via HushChat on HUSH mainnet, as a way to initiate communication. Then -they immediately switch to Lawyer Bob's Hush Smart Chain PDXLAW, and then they can +they immediately switch to Lawyer Bob's Hush Arrakis Chain PDXLAW, and then they can communicate knowing that they are leaking information to as few people possible. Alice can send image attachments to Bob to show him evidence and send textual chat which are encrypted @@ -73,8 +73,7 @@ or pay-for-image, or various other use cases. HushChat is a platform for communi and every HushChat can attach HUSH (or FANZ coins) to unlock more content/value/etc. In this model, each celebrity owns their own blockchain, like owning their own label or recording study. They -are not under the thumb of whoever controls the communication or payment platforms. These blockchains can -integrate with HUSH for 51% attack protection or be completely their own entities. Some people may want to +are not under the thumb of whoever controls the communication or payment platforms. Some people may want to use HUSH mainnet directly for convenience and then migrate to their own system as they expand. ## Use Case: United Nations Human Rights reports @@ -87,11 +86,7 @@ The United Nation could provide a service, similar to SecureDrop for journalists private manner. This also has the benefit of there being a censorship-resistant record of what is happening. This would improve the dignity and privacy of all people. Privacy is a universal human right. -In this use case, it's important to use Delayed-Proof-of-Work to send data to HUSH, so it can be protected -by Bitcoin hashrate security. - - -## Developers: Creating a Hush Smart Chain +## Developers: Creating a Hush Arrakis Chain You will need the [Official Hush full node Git repo](https://git.hush.is/hush/hush3): @@ -112,8 +107,8 @@ hush-smart-chain -ac_name=TCASH -ac_private=0 -ac_blocktime=75 -ac_supply=0 -ac_ The above command makes the ticker of that chain `TCASH` with a block time of 75 seconds and halving every 210000 bloks with initial reward of 12.5 TCASH. The default block time is now 60 seconds and is a good default for most use cases. -The argument `-ac_private=0` is needed because HSC's are z2z by default, which means only private transactions can be made. -Zcash mainnet (ZEC) does not have `z2z` and only a small percentage of transactions actually use privacy, around 5%. +The argument `-ac_private=0` is needed because HAC's are z2z by default, which means only private transactions can be made. +Zcash mainnet (ZEC) does not have `z2z` and only a small percentage of transactions actually use privacy. ### Pirate replica @@ -125,7 +120,7 @@ hush-smart-chain -ac_name=ARRRUKIDDING -ac_supply=0 -ac_halving=388885 -ac_priva ``` This replica has exactly the same mining schedule as PIRATE as well as block reward. One notable exception -is that all Hush Smart Chains are Pure Sapling, which means no 1.6GB download would be required to sync +is that all Hush Arrakis Chains are Pure Sapling, which means no 1.6GB download would be required to sync the `ARRRUKIDDING` chain. One may note that the halving interval looks different than the 77777 that Pirate normally uses. This was @@ -133,12 +128,6 @@ the halving interval of the original Pirate chain, which the author mined on, bu mining rewards being emitted in about 5 years. Komodo internally multiplies the interval by 5 to give a ~25 year emission and that is where 3888885 comes from. -## Adding DPoW - -All Hush Smart Chains support Delayed-Proof-of-Work innately, though the service must be run and data injected into the network. -DPoW is not needed for private Hush Smart Chain. Public Smart Chains that will have financial value need protection -from double spend attacks, so DPoW is highly encouraged. - ## Getting Help -We are happy to help you build upon the Hush platform, please join our [Telegram](https://hush.is/telegram) and ask questions. +We are happy to help you build upon the Hush platform, please join our [Telegram](https://hush.is/telegram) or [Matrix](https://hush.is/matrix) and ask questions.