Navigation

    BBS.cash

    • Register
    • Login
    • Search
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • header.languages
    1. Home
    2. jennifer
    J
    • Profile
    • Following
    • Followers
    • Topics
    • Posts
    • Best
    • Groups

    jennifer

    @jennifer

    5
    Reputation
    46
    Posts
    778
    Profile views
    1
    Followers
    0
    Following
    Joined Last Online

    jennifer Follow

    Posts made by jennifer

    • Free Consensus Infrastructure Architecture

      The underlying logic for building a cryptocurrency economy based on free consensus has been basically formed, the protocol system has been established, and the main logic and products can be divided into the following categories:

      Basics: Basic data on the main network chain
      1.UTXO
      2.CoinDays:Credit fuel in the cryptocurrency world. "FIPA4V1_CoinDays" https://bbs.cash/topic/557/
      3.Inviter:The first social relationship of the cryptocurrency identity. "FIPA6V1_Inviter" https://bbs.cash/topic/562/

      Storage: Storage logic of the cryptocurrency world
      4.Free storage:A fully open storage system. "FIPA8V1_Freedrive" https://bbs.cash/topic/588/

      Hash Attribute Table
      5.Data management system. "FEIP32V1_HAT" https://bbs.cash/topic/587/
      6.Cloud Files: Personal file management CAPP.

      Applications: Application architecture of the password world
      7.Free protocol, a consensus protocol system that is free, open, competitive, and evolutionary on the chain. "FEIP1V6_FreeProtocol Consensus" https://bbs.cash/topic/533/
      8.Password application, a free and open on-chain password economic application publishing and management system. "FEIP15V4_CAPP(zh-CN)" https://bbs.cash/topic/597/
      9.Free services, a system for on-chain free publishing of commercial products or services. "FEIP29V1_Service(en-US)" https://bbs.cash/topic/566/

      Identity: Identity system of the password world
      10. Password identity (CID), a unique human-recognizable identity system on the chain. "FEIP3V4_CID" https://bbs.cash/topic/537/
      11.Homepage, the location binding of the personal homepage published by CID. "FEIP26V1_Homepage(en-US)" https://bbs.cash/topic/563/
      12.Notification fee, the threshold fee for individuals to declare their willingness to receive information. "FEIP27V1_NoticeFee(en-US)" https://bbs.cash/topic/564/
      13.Authorized login, a non-private key application that obtains authorized login through identity management applications. "FIPA7V1_授权登录(zh-CN)" https://bbs.cash/topic/581/

      Relationships: Basic social relationships in the world of cryptography
      14.Inviter: The first social relationship of a cryptographic identity. "FIPA6V1_Inviter" (in English) https://bbs.cash/topic/562/
      15.Controller: The first declarer of a CID (Cryptographic Identity) who controls their own identity. The second basic social relationship in the world of cryptography. "FEIP6V5_Authorization" (in English) https://bbs.cash/topic/565/
      16.Contacts: An encrypted on-chain address book that is permanently stored and never lost. "FEIP12V3_Contacts" https://bbs.cash/topic/575/

      Social: Basic social patterns in the world of cryptography
      17. Private Message: An on-chain encrypted communication message that is permanently stored. "FEIP7V4_Message" https://bbs.cash/topic/558/
      18. Instant Messaging: Off-chain high-performance communication tool, with contact information stored on-chain, chat records locally saved, and voluntary sharing.
      19. Group: Fully open, decentralized social tool for groups. "FEIP19V1_Group" https://bbs.cash/topic/561/
      20. Team: Organized social collaboration tool. "FEIP28V1_Team" (in English) https://bbs.cash/topic/567/

      Publishing: Public Information Publishing
      21. Knowledge Base
      A platform for publishing various human public knowledge. "FEIP31V1_OpenKnowledge(en-US)" https://bbs.cash/topic/583/openKnowledge
      22. Declaration
      An official statement of personal willingness to take responsibility. "FEIP8V5_Declaration" https://bbs.cash/topic/591/
      23. CID Homepage
      A place that aggregates various public information of CID, also known as "CID Home". https://cid.cash

      Work: Personal work-related applications
      24. Safe Deposit Box:An encrypted platform on the chain that permanently stores personal privacy data. "FEIP17V3_Safe" https://bbs.cash/topic/560/
      25. Cloud Memo
      A personal writing tool that uses distributed storage.

      Tools: Basic password tools, see FIPS CAPP
      26. Signature Verification
      27. Encryption and Decryption
      28. Hash Calculation
      29. Code Scanning and Generation

      posted in Technology/技术
      J
      jennifer
    • Freecash Development Related Resources

      1.Domestic FCH node servers for accelerating block synchronization: fchnode.at4.one, fchnode0.at4.one, fchnode1.at4.one, fchnode2.at4.one, fchnode3.at4.one. If transaction broadcasting is delayed or synchronization is slow, you can add these nodes to your wallet.

      2.Test network:
      39.104.93.114, p2p port 18333.

      1. Genesis rawtx: 01000000010000000000000000000000000000000000000000000000000000000000000000ffffffff4e04ffff001d0104465361746f736869204e616b616d6f746f206f70656e65642074686520646f6f7220666f722066726565646f6d2e205765206861766520746f2066696e6420746865207761792effffffff0200f90295000000001976a914f1704a9663c1e530f82ca1bc7ff52f0f65abc1ca88ac00f90295000000001976a914f1704a9663c1e530f82ca1bc7ff52f0f65abc1ca88ac00000000

      2. Main network RPC port is 8332, P2P port is 8333.

      3. miqian open source code: https://github.com/hbyscpp/CryptoSigner
        Author: Free_Cash

      6.FCH js open source library: https://github.com/hbyscpp/fchjstool
      Author: Free_Cash

      7.FCH Java version utility library: https://github.com/hbyscpp/bitcoinj
      Please switch to the FchTool branch and check the FchTool class. The current main functions include address generation, transaction signature, message signature and verification, and hash calculation.
      Author: Free_Cash

      8.Full node installation guide
      https://github.com/freecashorg/freecash/wiki/Full-Node-Installation-Guide

      9.Linux node installation guide: https://github.com/freecashorg/freecash/blob/master/doc/build-unix.md

      10.Freecrypto: an encryption library based on libsecp256k1.schnorr
      https://github.com/SKlayer/freecrypto
      You can perform Schnorr signature by adding schnorr=True to key.sign.
      https://github.com/SKlayer/freecrypto/releases/tag/1.0.0.0T1
      Author: Satoshi_Uat4"

      11.Freetx: an open source library for easy creation of FCH transactions.
      https://github.com/SKlayer/freetx
      Installation:
      After cloning, simply run "python setup.py install"
      Depends on freecrypto.
      Author: Satoshi_Uat4

      12.Freer DB: an open source service for providing CID query record services.
      https://github.com/SKlayer/Freers_DB
      API:
      uri/get_freer_by_cid?cid=Satoshi_Uat4
      uri/get_freer_by_address?address=FMHuHuKmWQHQx3ZxmaeHnrRsPrLYRkUat4
      uri/get_all_freer
      Author: Satoshi_Uat4

      13.Implementing an FCH library in Java: https://github.com/xiaomicoin01/fch4j
      Includes: RPC, P2P, protocol parsing
      Encapsulates all FCH RPC commands, and all wallet commands can be called through a single client
      Implements P2P functionality, which can provide underlying support for mobile wallets
      Implements logic for parsing all FCH protocols, currently built-in protocol parsing for CIDs
      Author: @王林 (wanglin_w9re)

      14.FreeDrive, a distributed storage side chain for the Free Cash ecosystem: https://github.com/freedrivecash
      Usage:
      put: https://open.api.qingniao.cloud/api/put
      get: https://open.api.qingniao.cloud/api/get
      list: https://open.api.qingniao.cloud/api/list
      get_drive_info: https://open.api.qingniao.cloud/api/get_drive_info
      auth: https://open.api.qingniao.cloud/api/auth
      Author: pisa_n5oN

      15.Authentication (FEIP9) Library and API
      Commands:

      url:port/get_all_tx;
      url:port/get_base_by_utxo?utxo=d54cb03ede7fd27fbacca0595b9e9a31e06c2023afaa1be83e9c1078c7b4cd45.
      Open source code: https://github.com/zhangsanfeng1988/FEIP.git
      Author: Programmer Zhangsanfeng_BXwx

      16.FCH Electrum Server
      Subscribes to transactions using the Electrum protocol and supports subscribing to block headers using SPV wallets.
      electrum.fch.plus, ssl50002 port
      Author: Satoshi_Uat4

      17.Test address and private key

      Address: FEk41Kqjar45fLDriztUDTUkdki7mmcjWK
      Private key: L2bHRej6Fxxipvb4TiR5bu1rkT3tRp8yWEsUy4R1Zb8VMm2x7sd8
      Public key: 6vU3ZMpwggurw92AUy1Vi6WBxEnBPdjupXGKD7Q5Zcw8yvdJAf
      Generated by: sign.cash - "Generate Address", passphrase "春花秋月何时了"
      Address: F86zoAvNaQxEuYyvQssV5WxEzapNaiDtTW
      Private key: L5DDxf3PkFwi1jArqYokpTsntthLvhDYg44FXyTSgdTx3XEFR1iB
      Public key: 5XEV28ubXGx9Y3sLgQCUvbbE8bJe4tB3xWvY4HanoQeGxmbn3x
      Generated by: sign.cash - "Generate Address", passphrase "往事知多少"

      18.Profile picture
      https://zhimidaxue.com/file/get/getByAddress/FJeRnehc2VvRMV3wRF2AtiXDVnaKnmnZhp"

      posted in Technology/技术
      J
      jennifer
    • Security Instructions for Using MiQian

      Cryptocurrency is a type of ledger currency, and your account is your address. Here is an FCH address: FAmwiAFdnGiwxvWrFnedPkNS8B8woH1MBN.

      Just as we use a password to control account funds, each FCH address corresponds to a password, which we call a "private key". The private key for the above address is: L4bo4FvKjwd6F9Z2pKsxdDYr6nqWLNGVYjUaTRYpxMP8FJRswM6g.

      FCH's private keys can be used to calculate addresses, but addresses cannot be used to calculate private keys. This is called "asymmetric cryptography." Whoever has the private key can calculate the address and control the currency on that address. Additionally, cryptocurrency is anonymous, so whoever has the private key corresponding to an address owns the currency on that address. Therefore, remember:

      NEVER disclose or lose your private key!!!
      NEVER disclose or lose your private key!!!
      NEVER disclose or lose your private key!!!

      When using cryptographic signature operations for addresses and private keys, please pay attention to the following security issues:

      Keep your device offline, i.e., do not connect it to other devices via cables, mobile networks, Wi-Fi, Bluetooth, NFC, or any other means.
      Make sure that the private key and password are never disclosed or lost. The password used to generate the private key can generate the private key at any time, but the private key cannot be deduced from the password. When using a brain wallet password, make sure it is not easily guessed or forgotten!
      When displaying private keys, passwords, or mnemonic words on the screen, make sure the surroundings are secure, with no one else able to view or capture the screen.
      The private key, password, or mnemonic phrase used to store assets must be securely backed up offline in at least two places and kept separately, and checked regularly.
      If this device is lost or potentially compromised, immediately use the backup private key to transfer assets to a secure address.
      When generating a private key from a password, the password should be of sufficient length and complexity, preferably 40 characters or more, and include multiple types of characters, and may include a certain length of random numbers. Do not use famous quotes or poems. Remember, you are facing computers around the world that are cracking private keys.
      The code that generates passwords on this device is open source (https://github.com/hbyscpp/fchjstool), and you can test and compare it with simple passwords on sign.cash to prevent attackers from impersonating the password signature app and providing leaked private keys. Never use passwords used to store assets for online testing.

      You can generate private keys or mnemonic phrases in a secure and trusted external device and import them into the MiQian device by scanning or manually entering them. The security of this process will depend on the source of the private key and the mnemonic phrase and your operations.
      Again, emphasize that the private key must never be disclosed or lost, and the device must be offline. This is the meaning of MiQian.

      posted in 教程
      J
      jennifer
    • 【Tutorial】MiQuan

      Miquan download: https://capp.cash/miquan/

      Closed circle registration CID: http://freecash.cc/index.php?id=238

      Dynamic tutorial of dense circle plus group: http://freecash.cc/index.php?id=239

      posted in 教程
      J
      jennifer
    • 【Tutorial】FCH: Mastering the New World with Private Keys

      As the bull market is about to start, centralized exchanges are facing regulatory crises, and security management issues for crypto assets are exposed.

      The FCH community has always attached great importance to the importance of personal private key control over information and assets. The first step to enter the FCH ecosystem is to learn how to generate private keys offline and sign transactions offline.

      Currently, the main offline signing tool in the FCH ecosystem is "MiQian", which is used together with the online web page "Sign.cash" and the scanning tool "YiZhiSao". "MiQian" manages private keys offline and signs them, "Sign.cash" organizes the content of transactions to be signed online, and "YiZhiSao" is used for information transmission between online and offline devices.

      Using "MiQian" and "Sign.cash", you can perform basic operations of cryptographic economics, such as "hashing", "encryption", "decryption", "signature", "verification", "transaction", and "on-chain engraving", and you can choose UTXOs for payment.

      "MiQian" completely covers the functions of expensive hardware wallets and is lower in cost and stronger in functionality. You only need an old phone with Android 7.0 or above to safely control your assets and information with private keys.

      To encourage everyone to master their own private keys and practice offline signature transactions, the FCH ecosystem has launched the "CoinDay Reward" program: Users can engrave text in a certain way, choose UTXO, sign the transaction with private keys, destroy a certain amount of CoinDay, and get FCH rewards in proportion.

      In addition to FCH, MiQian also supports offline generation of addresses and signature transactions for BTC, BCH, and BSV (which operates the same as BCH). However, due to limited development resources, the user experience is not good enough, and more developers are needed to join in.

      On the basis of offline signature transactions and engraving, FCH has established a cryptographic identity (CID) system, which can achieve more cryptographic economic functions beyond currency.

      On the FCH CoinDay leaderboard (which ranks addresses with the most FCH and the longest time held), most addresses have registered a CID. These CIDs also appeared in the list of 3 ecological contributions.

      Signature transactions are just a simple application of cryptographic economics. Private keys can enable individuals to securely control various information and assets, and are the beginning of a new world, new life, and new perspective.

      Most FCH holders are not just coin hoarders or speculators, but builders of cryptographic economics.

      A new era of cryptographic economics is about to come, and the FCH ecosystem already knows how to get started. However, there are too many tasks and opportunities, and we need more developers and builders to join us.

      Welcome to join us!

      posted in 教程
      J
      jennifer
    • 【Tutorial】How to get FCH address?

      There are four methods to obtain an FCH address, choose the one that suits your situation based on security and convenience.

      Method 1: Online generation on Sign.cash

      Security: Low
      Convenience: High

      On the "Generate Address" webpage of Sign.cash, enter a long and random passphrase to generate an address and private key. Keep the private key safe and do not disclose it. The address can be used to receive FCH, and the public key can be used to encrypt messages.

      Note: The private key generated in this way is not secure, for example, the passphrase may be obtained by the input method. Therefore, it can only be used for learning or small amount transactions, and should not be used to store large amounts of assets.

      Method 2: Offline generation using Misign

      Security: High
      Convenience: Moderate

      On an Android phone (7.0 or above), download Misign from Sign.cash, enter a long and random passphrase in the "Generate Address" section to generate an address and private key. Follow the instructions to save and copy the backup to paper, and carefully verify it. The address can be viewed in the "Manage Private Key" section and on the home page of Misign, which also displays the first saved address and QR code. Video reference:
      https://v.youku.com/v_show/id_XNDUyMzgxNjgzNg==.html?spm=a2h0k.11417342.soresults.dtitle

      Note:

      The passphrase entered must be long and random enough to avoid being guessed by hacker's programs.
      If security requirements are not high (for small amounts or for learning and testing), it is possible to use an online method on a mobile phone.

      Method 3: Address Conversion

      Security: Medium
      Convenience: Low

      If you have the private key of a BTC or BCH address, you can convert it to an FCH address on the "Address Conversion" page of Sign.cash. To spend FCH from this address in the future, you need to import the private key into "Misign" or another wallet with private key import functionality.

      Note:

      The "private key" is not a mnemonic phrase but a long string of characters starting with L or K, such as: L29jbWbx8xCmNFByqzS8hmKqGPudmTUzweDTBUJH7wqeF5yAqS3m.
      Only the "address" is used for conversion, and the "private key" should never be entered on any internet-connected device.

      Method 4: Setting up a node

      Security: High
      Convenience: Low

      Download the FCH node software on your computer and set up a node to send and receive FCH. Download link: https://github.com/freecashorg/freecash/releases.

      posted in 教程
      J
      jennifer
    • Governance Fund Distribution Management Plan

      The governance fund has matured since April 10, 2020. After consultation by the management committee to ensure safety and decentralization, the governance fund will be distributed and used according to the following plan:

      1. The governance fund address will be transferred to the aggregation address every 6 hours: The governance fund consists of a large number of 25f utxos, which need to be aggregated before distribution and use. Therefore, the governance fund will first transfer many small utxos to the aggregation address. For safety reasons, the private keys of the governance fund address and the aggregation address are held by different people.
      The governance fund address is: FTqiqAyXHnK7uDTXzMap3acvqADK4ZGzts
      The aggregation address is: FRc5NXWeUCAJxnCkJwZ8fyUiWTeXWykk33

      2.Contribution reward distribution addresses will issue contribution rewards every 2 days: Contribution reward distribution addresses will distribute contribution rewards according to the evaluation ratio for each period.

      3.The balance of the governance fund that has not yet been distributed will be stored in the balance temporary storage address, which will be managed by the management committee.

      Overall, the governance fund will try to achieve real-time transfer and distribution of funds to reduce the security risks of each address and minimize the centralization risk of management.

      posted in Government/治理
      J
      jennifer
    • Personal Contribution Reward Safety Plan

      As long as individuals ensure the security of their private keys, their assets will be safe. However, it cannot be ruled out that some contributors may not have secured their private keys properly, mainly in two situations:

      1. Private key theft: That is, the private key is stolen by others. If it is discovered that the private key has been stolen, the balance should be transferred to another address immediately, and the reward address should be changed immediately.

      2. Private key loss: That is, the individual loses their own private key. If the private key is lost, the balance cannot be transferred, and the reward address should be changed immediately.

      The contribution reward address and the amount of the reward have been established through a fair evaluation process, and changing the address will jeopardize the credibility of the governance mechanism. In order to prevent the private key from being stolen or lost, it is recommended that contributors adopt one of the following security plans in advance using cryptographic technology:

      1. Define equivalent private keys: With the "password relationship" function of sign.cash, define one or more addresses that are "equivalent" to the reward distribution address. Once the reward distribution address is lost, a replacement declaration signed by the equivalent address can be issued, and after the governance fund verifies the signature, the reward address can be changed. Note: Please keep the equivalent private key and the reward address private key separately. Keeping them together may result in loss.

      2. Define a supervisory private key: If the private key of the reward distribution address is stored in an online wallet, the risk of theft is greater than that of offline storage. It is recommended to use the "password relationship" function of sign.cash to define a "master-slave" relationship: Import the online private key into a secure signature device, and define a more secure offline private key as the "supervisor" of the online private key. Once the online private key is lost, the supervisor private key can be used to declare and terminate various offline rights of the subordinate private key, and transfer these rights to the master address, including changing the contribution reward distribution address to the master address.

      Defining an equivalent or master-slave relationship cannot change the ownership of FCH on the chain, but it can help to retrieve various off-chain rights, making the FreeCash ecosystem more flexible on a secure basis.

      posted in Government/治理
      J
      jennifer
    • Issues and Improvements in Freecash Contribution Evaluation

      The free cash ecosystem has undergone two contribution evaluations and distributions, achieving fair and equitable distribution based on contributions. However, there are some issues that can be improved.

      Dependency on Center
      Issue: Many people are accustomed to traditional management evaluations, believing that dedicated managers should record and evaluate the contributions of each person. This is often the root cause of other problems.
      Improvement: By promoting and encouraging participation in the evaluation process, more people can understand FCH's decentralized evaluation mechanism.

      Centralized Classification
      Issue: CY_vpAv set up six categories when initiating the evaluation, which easily deviated from the real contributions covered by each category during the first-level evaluation. For example, the finance category has few actual contribution projects and correspondingly fewer achievements, and was assigned a weight of 10% in the first round of evaluation. The second round of evaluation resulted in 3.6%, still relatively high compared to the amount of distribution and other category contributions.
      Improvement: Change the top-down classification evaluation to a bottom-up classification evaluation. The details are yet to be explored.

      Centralized Organization
      Issue: In the two evaluation organizations, CY_vpAv, N_B485, and HHQ_fR8N were responsible for the main evaluation organization and data processing affairs. Although the key weight evaluation was determined by contributors, and the evaluation results were overall successful, the organizers still bear significant pressure and risk, and need to underestimate their own contributions to avoid falling into the mouth of others, which provides a basis for center dependency. As the community expands, the difficulty and pressure of centralized organizations will further increase, and a slight mistake will make it even more centralized.
      Improvement: 1) Reduce workload by developing a contribution reporting system; 2) Fully implement self-declaration and mutual evaluation by contributors; 3) Establish a clear delegation authorization mechanism; 4) Implement a bottom-up evaluation process.

      Small Contributors vs Large Contributors
      Issue: If there is a huge difference in contribution among a group of evaluators, and each person has the same voting rights, the result of the self-interested game will be small contributors eating large contributors. For example, if A, B, C, D, E, F, and G jointly evaluate and A, B, and C have the same actual contributions, which are ten times that of the other four people. In the evaluation, even if A, B, and C attribute all of the other four people's contributions (100%) to themselves, they will only increase their profits by about 10%. The other four people overestimate their contributions by 100%, reducing the profits of A, B, and C by only about 10%. Moreover, the small contributors are in the majority, and if the large contributors overestimate themselves first, it will lead to harsher retaliation from the small contributors, and win by number of votes. Therefore, the result of the game is often that large contributors give up their interests.
      Improvement: 1) The entire evaluation process should be open to the entire ecosystem; 2) Consider allowing independent evaluators to participate in the evaluation, the details of which are under discussion; 3) Consider using a representative system for the initial evaluation in a bottom-up evaluation process, selecting evaluators first and then evaluating weights.

      Missing Contribution Reporting
      Issue: During the self-reporting process, some contributors may forget, miss announcements, or not understand the mechanism, resulting in discovering missing contributions during or after evaluation.
      Improvement: 1) Promote the evaluation principles of self-reporting; 2) Develop tools such as WeChat robots to facilitate quick reporting; 3) Encourage delegation of evaluation agents to record and report contributions.

      Lack of Understanding of Evaluation
      Issue: Contributors who participate in contribution evaluations may not understand the evaluation mechanism and how to participate.
      Improvement: 1) Allow for abstention. Abstention does not mean giving up rewards, but rather accepting the results of others' evaluations; 2) Delegate evaluation agents; 3) Learn and understand the evaluation mechanism.

      Lack of Knowledge of Other's Contributions
      Issue: Contributors may only know their own contributions and not understand others', making it difficult to evaluate objectively and leading to subjective evaluations.
      Improvement: 1) Encourage contributors to pay attention to the release of contributions and community notifications; 2) Collect and publish contribution information regularly; 3) Delegate evaluation agents.

      False Contribution Reporting
      Issue: False reporting of contributions has not been found yet, but as the community grows and anonymity increases, false reporting may occur.
      Improvement: 1) Link CID with WeChat or other account to confirm the contributor's identity and actions; 2) Strengthen contribution verification mechanism by inviting others (especially collaborators) to assist in verification during reporting;

      Contribution Reporting Techniques
      Issue: Reporting techniques can affect contribution evaluations. Specifically, the more detailed the reporting, the more likely it is to influence evaluation judgments and receive more rewards.
      Improvement: 1) Encourage contributors to report in the most detailed unit possible. If everyone does this, there will be no special advantages; 2) Avoid reporting in bulk due to memory and impatience during reporting; 3) Hire evaluation agents to assist.

      posted in Government/治理
      J
      jennifer
    • Freedom Consensus Entrepreneurship Financing Plan V1

      Conditions:The current construction of the cryptocurrency economy presents a rare historical opportunity.
      1.1 Market: Blue ocean market. The Internet economy is transitioning to the cryptocurrency economy, which will inevitably generate huge economic dividends.
      1.2 Entrepreneurship: Innovative advantages. Entrepreneurial activities based on freedom consensus have competitive advantages. Based on the already established freedom consensus model, combined with Internet application scenarios, the entrepreneurial risk is relatively small.
      1.3 Funds: Global liquidity. With the large-scale monetary easing policies implemented during the global economic crisis, market funds are relatively abundant, and traditional and Internet industries cannot fully absorb them.
      1.4 Talent: Serious unemployment. The global economic crisis and information warfare have caused severe layoffs and unemployment in the Internet industry, resulting in an abundance of talent resources.

      Issues: How to effectively organize market, entrepreneurship, funds, talent and other resources based on freedom consensus.
      2.1 Market: The potential of the cryptocurrency market has not been fully demonstrated.
      2.2 Entrepreneurship: Successful cases of entrepreneurship in the market are lacking to provide guidance and demonstration.
      2.3 Funds: Potential investors lack understanding and confidence in the prospects of the cryptocurrency economy, freedom consensus mechanism and entrepreneurial opportunities.
      2.4 Talent: Currently, the main incentive for talent is governance funds, making it difficult to attract and support more professional teams.
      2.5 Venture capital: Traditional venture capital lacks understanding of freedom consensus, has long investment cycles, information asymmetry, relevant regulatory constraints, and complex equity operations.

      Direction: Freedom consensus system can organize economic activities more securely, efficiently, and freely based on cryptographic identity, on-chain relationships, open reputation, and free cash, and can therefore solve the problem of resource organization.
      3.1 Cryptographic identity can provide unified identity entities for project establishment, investment, financing, implementation, collaboration, supervision, communication, evidence storage, revenue, and distribution.
      3.2 On-chain relationships can establish the business relationships of all parties through on-chain consensus, ensuring safety and trustworthiness.
      3.3 Open reputation can solve the problem of information asymmetry and process management in resource collaboration.
      3.4 Free cash can realize most of the value exchange on-chain and store the evidence, and can utilize multi-signature and smart contracts to achieve more collaboration methods.
      3.5 The free evolutionary mode achieves rapid evolution and explores new resource collaboration organizational modes from simplicity to complexity.

      Proposal:
      4.1. Organized based on a free consensus system
      4.1.1. All parties register CID
      4.1.2. Implementation on the cooperation relationship chain
      4.1.3. Use cryptocurrency
      4.2. Decomposition organization of entrepreneurial process
      4.2.1. Project initiators propose an overall plan
      4.2.2. The overall plan is broken down into multiple stages that can be independently evaluated
      4.2.3. The first stage is funded and released in batches
      4.2.4. After the first stage is completed, the results are evaluated and made public
      4.2.5. Funding for subsequent stages is rolled out in sequence
      4.3. Equity tokenization
      4.3.1. Every investment creates a new investment token
      4.3.2. Investors receive investment tokens that represent their equity
      4.3.3. Investment tokens can be freely traded
      4.3.4. Token holders participate in project governance
      4.4. Reputation support
      4.4.1. Collaboration platforms provide collaboration services
      4.4.2. Collaboration platforms provide reputation support for all cooperating parties
      4.4.3. The platform or investors invite credible independent CIDs to provide reputation support
      4.5. Intelligence
      4.5.1. All parties manage funds through multisignature technology
      4.5.2. The organizational model gradually matures to achieve protocolization
      4.5.3. The organization process is made intelligent based on protocols and smart contracts

      Implementation:
      5.1. Discuss and test this model for relevant projects
      5.2. The initiator formulates the first-stage construction objectives and financing plan
      5.3. The initiator forms and announces the collaboration team and registers the application CID
      5.4. Choose a platform for release (such as dplanet)
      5.5. The initiator, platform, and independent CID manage the funds address through multisignature technology
      5.6. Issue tokens and distribute them to investors (consider using SLP on BCH)
      5.7. Investment tokens are freely traded
      5.8. The funds are released in batches to the initiator to complete the project
      5.9. The results of each stage are evaluated, cleared, and the next stage of financing is initiated.

      posted in Government/治理
      J
      jennifer