On the advice of our diverse set of financial and regulatory attorneys, we are postponing the launch of AI Coin until such time as we have obtained the necessary money services business licenses in 48 States, and BitLicense or equivalent licenses in jurisdictions requiring them. To go forward without those in place would make our business plan a legal risk.
[October 22, 2014 - I changed the project name to AI Coin. Drew Hingorani is the co-founder and President, I am CTO]
The A.I. Coin project is a multi-year effort to achieve a no-proof-of-work mining implementation in an cryptocurrency that ...
Meets or beats the existing proof-of-work implementation with regard to securing the blockchain against attack.
Provides sub second response time when acknowledging transactions for certain incorporation into the blockchain, in contrast to Satoshi's Bitcoin which only promises best effort which takes more than a second to reach all nodes and takes minutes on average for the first confirmation.
Does not permit double-spending fraud attacks, whereas Satoshi's Bitcoin sometimes does, e.g. the BitUndo service.
Meets or beats the existing implementation with regard to no trusted third parties, as Satoshi's Bitcoin is evolving towards hashers' trust of a single, dominant industrial mining pool.
Preserves to the greatest possible extent, Satoshi's social contract between developers and users.
Specifies how a nomadic mint agent creates new blocks without effort, and allocates block creation rewards to secure the distributed network using conventional data security techniques.
Permits the issuance, relay and blockchain storage of microtransactions having 100x lower fees than Satoshi's Bitcoin.
Explicitly pays for for the creation, ongoing enhancement, and operation, of the enterprise-class, scalable, secure, and robust networking infrastructure that can accommodate all the world's financial transactions. In contrast, the Satoshi Bitcoin full node network consists of mostly unpaid volunteers.
Provides a multi-agent framework upon which human agents and intelligent software agents can be vetted, integrated and paid for skills delivered.
Note that the May 2013 whitepaper below describes a hard fork of bitcoin. That cannot possibly happen unless A.I. Coin is successful and subsequently convinces the Bitcoin community that a good alternative exists for the current industrial mining method. Furthermore, the current approach is not conventional proof-of-stake, rather the block rewards are used to pay for network infrastructure, developers and community support, e. g. through institutions such as the Bitcoin Foundation. It appears that there is no need to pay staking dividends to secure the network.
Whitepaper: Bitcoin Cooperative Proof-of-Stake Stephen Reed
A hard-fork reconfiguration of the peer to peer Bitcoin network is described that substitutes tamper-evident logs and proof-of-stake consensus for proof-of-work consensus. The block creation rewards and transaction fees are reallocated to establish and staff a secure financial data network capable of handling the world’s transactions with sub-second response time. The new system pays dividends to stake-offering bitcoin holders. In contrast to Satoshi Nakamoto’s mesh network consisting of competing peers, this system uses an enterprise class network that is efficient, robust, and scalable, consisting of cooperating peers. The network backbone nodes host trustless nomadic agents. Thousands of distributed full nodes are paid to replicate a singleton blockchain built upon every 10 minutes by a nomadic mint agent whose actions are verified by its peers. This arrangement enables immediate acknowledgment to an issuing node that its transaction has been accepted. Less effort means that subsidized transaction costs will be lower. Network reconfiguration enables the processing of numerous microtransactions. Stake-weighted distributed consensus is achieved when necessary with less than one-half arbitrarily faulty nodes. Important invariants of the Satoshi Social Contract between core developers and users are maintained: The reward schedule, the blockchain format, the fixed number of bitcoins, and the decentralized, trustless protocol are untouched. The system remains a global distributed database, with additions to the database by consent of the majority, based on a set of transparent rules they follow.
GitHub: TexaiCognitiveArchitecture

stephenreed@yahoo.com
LinkedIn: stephenreed
mobile: 1-512-791-7860
Descriptive posts . . .
- A Bitcoin Super-Peer Network
- After-the-fact Distributed Consensus and Repair
- Bitcoin Proof-of-stake Super Peer Network Diagram
- Transitional SHA-256 Mining Multipool
- The Satoshi Social Contract
- The Hard Fork
- Bitcoin Proof-of-Stake Node Roles and Responsibilities, from the Whitepaper being written
- CPoS Network Proxy
- Bitcoin Cooperating Agent Diagram
- Bitcoin Cooperating Agent Design
- Communication with the BlackCoin Foundation
- Advice on securing a re-engineered Bitcoin network
- CPoS To Be Written in the Java programming Language
- CPoS To Be Implemented Using the Texai Cognitive Architecture
- A Blockchain-Based Exchange Between Proof-of-Work (PoW) Bitcoin and Cooperative Proof-of-Stake (CPoS) Bitcoin
- August 18, 2014 Status and Thoughts
- TexaiCoin
- Self-signed X.509 Certificate Transparency
Project Development Approach . . .
- Migrate the Texai cognitive architecture project to a public GitHub repository.
- Write software agents to sandbox the Bitcoin Core program - bitcoind, demonstrating the smallest possible network.
- Write additional software agents to complete the verification of peers, migration of responsibilities, and network operations.
Reading List, the current situation . . .
- Bitcoin open source implementation of P2P currency Satoshi Nakamoto, February 11, 2009
- Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto, 2009
- Bitcoin Protocol Specification Protocol Version 0.8.6 Krzysztof Okupski
- ASICs and Decentralization FAQ andytoshi
- A Treatise on Altcoins Andytoshi, January 9, 2014
- Anonymous Byzantine Consensus from
Moderately-Hard Puzzles: A Model for Bitcoin Andrew Miller, Joseph J. LaViola, Jr. - The Proof-of-Work Concept Daniel Krawisz, June 24, 2013
- What are checkpoints in bitcoin code?
- Bitcoin Hurdles: the Public Goods Costs of Securing a Decentralized Seigniorage Network which Incentivizes Alternatives and Centralization Tim Swanson, April 9, 2014
- Learning from Bitcoin’s past to improve its future Tim Swanson, April 27, 2014
- Satoshi Client Operation: Overview bitrick
- Global Bitcoin Full Nodes Distribution
- DNS Seeds
- Network Propagation Statistics
- DNS Seeds Availability
- Estimating the number of bitcoin miners Organ Ofcorti
- Wiki - Scalability
- Some Thoughts on Bitcoin Dan Kaminsky
- Dan Kaminskys thoughts on scalability Mike Hearn
- PSA: The amount of full Bitcoin nodes is dropping. Please consider running a full node.
- Bitcoin Nodes: How Many is Enough? Jameson Lopp
- What Are Bitcoin Nodes and Why Do We Need Them? Daniel Cawrey, May 9,2014
- An Order-of-Magnitude Estimate of the Relative Sustainability of the Bitcoin Network Hass McCook, June 5, 2014
- Transactions Withholding Attack AnonyMint
- The Sybil Attack John R. Douceur
- Wiki - Common Vulnerabilities and Exposures
- Wiki - Weaknesses
- Deanonymisation of clients in Bitcoin P2P network Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov, May 28, 2014
- On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies Nicolas T. Courtois, May 2, 2014
- Primecoin: Cryptocurrency with Prime Number Proof-of-Work Sunny King, July 7, 2013
- CryptoNote v 2.0 Nicolas van Saberhagen, October 17, 2013
- Fullnode Provision full nodes in a datacenter for $20 per month
- On Mining Vitalik Buterin
- The Anatomy of a Money-like Informational Commodity: A Study of Bitcoin [Kindle Edition] Tim Swanson, August 3, 2014 - also available as a free download
- An Investor's Investigation Into The Mining Statistics Of Bitcoin Alternatives Devtome
- The Math Behind Bitcoin ericrykwalder
Reading List, suggested improvements to the Bitcoin network . . .
- Information Propagation in the Bitcoin Network Christian Decker, Roger Wattenhofer, 2013
- On Bitcoin and Red Balloons Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar, June 2012
- Accelerating Bitcoin’s Transaction Processing, Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky, Aviv Zohar, 2013
- O(1) Block Propagation Gavin Andresen, August 2014
- Bitcoin Improvement Proposals GitHub
- Could Bitcoin Transactions Be 100x Faster? Nicolas T. Courtois, Pinar Emirdag and Daniel A. Nagy, August 2014
- A Scalability Roadmap Gavin Andresen, October 6 2014
- Enabling Blockchain Innovations with Pegged Sidechains Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille, October 22, 2014
Reading List, the incumbent competition . . .
- SWIFT Messaging Services Distributed Architecture Phase 1 SWIFT, 2009
- Pricing made easier For new SWIFT customers SWIFT
- VisaNet The technology behind Visa Visa
- Inside Visa's Data Center Network Computing, May 19, 2013
- Digital Currency Deep Dive: Is Bitcoin Cheaper and More Efficient than Traditional Payments? David S. Evans
Reading List, proof-of-stake . . .
- Proof of stake instead of proof of work QuantumMechanic, earliest reference - July 10, 2011
- Proof of Stake ripper234, March 11, 2012
- Proof of Stake (Bitcoin Wiki)
- Proof of blockchain fair sharing Bitcoin Wiki
- Crypto-Currency Market Capitalizations
- Proof of Stake Coin List
- What Proof of Stake Is And Why It Matters Vitalik Buterin, Bitcoin Magazine, August 26, 2013
- User:Gmaxwell/alt ideas
- Can we have a serious, constructively critical, but respectful discussion about Proof-of-Stake and "nothing at stake"?
- Proof of Stake Andrew Poelstra, May 28, 2014
- Peercoin Whitepaper
- Decentralised currencies are probably impossible (but let’s at least make them efficient). Ben Laurie, July 5, 2011
- Delegated Proof-of-Stake (DPOS) Daniel Larimer April 3, 2014
- What are the pros and cons of Ripple's consensus as compared with Bitcoin's proof-of-work? David Schwartz, April 25, 2013
- Video: How Ripple Works - The Consensus Process
- Slasher: A Punitive Proof-of-Stake Algorithm Vitalik Buterin
- It will cost you nothing to ”kill” a Proof-of-Stake crypto-currency Nicolas Houy, 2014
- POS is MORE vulnerable to 51% attacks than POW (even though wiki says the opposite) Reddit /r/BitcoinSerious 2014
- Proof of Stake Velocity: Building the Social Currency of the Digital Age Larry Ren, April 2014
- TenderMint: Consensus without Mining Jae Kwon
- Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake Iddo Bentov, Charles Lee, Alex Mizrahi, Meni Rosenfeld, June 2014
- Cryptocurrencies without Proof of Work Iddo Bentov, Ariel Gabizon, Alex Mizrahi, June 2014
- Proof of Stake Investment - HBN/PHS/TEK/CAP and more StakeHunter
Reading List, misc altcoin ideas . . .
- A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays Mainak Ghosh, Miles Richardson, Bryan Ford, and Rob Jansen
- Cyptocoins List, may be sorted by volume Cryptocharts
- Decentralized Autonomous Organization Wikipedia
- Factom Whitepaper - Business Processes Secured by Immutable Audit Trails on the Blockchain Paul Snow, Brian Deery, Jack Lu, David Johnston, Peter Kirby, December 2014
Reading List, global networking . . .
- Global Networks: Engineering, Operations and Design, G. Keith Cambron
Reading List, super-peer network introduction . . .
- Designing a super-peer network Beverly Yang, Hector Garcia-Molina, 2003
- Chord: A scalable peer-to-peer lookup service for internet applications
Reading List, super-peer network service discovery . . .
- One Ring to Rule them All: Service Discovery and Binding in Structured Peer-to-Peer Overlay Networks Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Antony Rowstron, 2002
- Discovery of Stable Peers in a Self-OrganisingPeer-to-Peer Gradient Topology Jan Sacha, Jim Dowling, Raymond Cunningham, and Rene Meir, 2006
Reading List, network security and fault tolerance . . .
- Distributing Authorities and Verifying Their Claims Nick Szabo, 1997
- The God Protocols Nick Szabo, 1999
- Confidential Auditing Nick Szabo, 1998
- Advances in Distributed Security Nick Szabo, 2003
- Trusted Third Parties Are Security Holes Nick Szabo, 2005
- Pacemaker: Fighting selfishness in availability-aware large-scale networks Fabrice Le Fessant, Gigdem Sengul, Anne-Marie Kermarrec, 2008
- An Approach to Generalising the Self-Repair of Overlay Networks Barry Francis Porter, 2004
- Byzantine consensus in asynchronous message-passing systems: a survey Miguel Correia, Giuliana Santos Veronese, Nuno Ferreira Neves, Paulo Verissimo, 2011
- The Byzantine Generals Problem Mark Nelson, March 18, 2008
- Practical Byzantine fault-tolerance and proactive recovery M. Castro and B. Liskov, 2002
- Byzantine fault-tolerant transaction processing for replicated databases Aldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia, 2011
- A Robust Byzantine Fault-Tolerant Replication Technique for Peer-to-Peer Content Distribution Ayyasamy Sellappan and Sivanandam Natarajan, 2011
- Secure routing for structured peer-to-peer overlay networks M. Castro, P. Druschel, Y. C. Hu and A. Rowstron, 2002
- Performance and Dependability of structured peer-to-peer overlays M. Castro, M. Costa and A. Rowstron, 2004
- Authenticated Data Structures, Generically Andrew Miller, Michael Hicks, Jonathan Katz, and Elaine Shi, 2014
- Byzantine Fault Tolerant Public Key Authentication in Peer-to-Peer Systems Vivek Pathak, Liviu Iftode
- Secure History Preservation through Timeline Entanglement Petros Maniatis, Mary Baker, 2002
- PeerReview: Practical Accountability for Distributed Systems Andreas Haeberlen, Petr Kuznetsov, Peter Druschel, 2007
- Secure Network Provenance (Technical Report) Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr, 2011
- Remote Attestation on Program Execution Liang G, Xuhua Ding, Robert H. Deng, Bing Xie, Hong Mei, 2008
- Attested Append-Only Memory: Making Adversaries Stick to their Word Byung-Gon Chun, Petros Maniatis, Scott Shenker, John Kubiatowicz, 2007
- Attestation Turns Crash Tolerance into Byzantine Tolerance Jonathan Herzog, Jonathan Millen, Brian O’Hanlon, John D. Ramsdell, Ariel Segall,
- Intel Trusted Execution Technology for Server Platforms, William Futral and James Greene, Apress Media, 2013
- vSphere Security and the Virtualization Layer VMware
- Enhanced Cloud Security with HyTrust and VMware Intel
- Building Trust and Compliance in the Cloud with Intel ® Trusted Execution Technology Intel
- Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks Nikolaos Michalakis, Robert Soule, Robert Grimm, 2007
- DEFEATING DDOS ATTACKS Cisco Systems
- Closing the Floodgates: DDoS Mitigation Techniques Symantec
- CloudFlare security CloudFlare
- Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis Subramani rao Sridhar rao
- Three-Tier Security Model for E-Business: Building Trust and Security for Internet Banking Services Yu Lasheng, and MUKWENDE Placide, 2009
- Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, v.1.1.9 CA/Browser Forum, August 4, 2014
- NIST SP 800-57 Recommendation for Key Management Part 3: Application-Specific Key Management Guidance NIST, May 2014
- Distributed Systems Mikito Takada
- In Search of an Understandable Consensus Algorithm (Raft) Diego Ongaro and John Ousterhout, May 2014
- Daily Solar Data U.S. Dept. of Commerce, NOAA, Space Weather Prediction Center
- Latest Solar Radio Flux Report from DRAO, Penticton Natural Resources Canada
- Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas, Andres Kroonmaa and Risto Laanoja, 2013
- Efficient Data Structures for Tamper-Evident Logging Scott A. Crosby, Dan S. Wallach, 2009
- Efficient Data Structures for Tamper-Evident Logging slide presentation Scott A. Crosby, Dan S. Wallach, 2009
- Origin-Bound Certificates BrowserAuth.net
Texai Cognitive Architecture
- Natural Language Approach of the Texai Project Stephen Reed's Texai project presentation recorded at the 2008 Artificial General Intelligence Conference
- OpenCyc Commonsense AI Tutorial - part 1 Stephen Reed presentation recorded at the 2009 AGI Conference
- OpenCyc Commonsense AI Tutorial - part 2
- Bootstrap Dialog: A Conversational English Text Parsing and Generation System Stephen L. Reed, Texai.org, presented at the Artificial General Intelligence Conference, 2009.
- Texai presentation at AGI-2009 recorded video Stephen Reed
- Texai presentation slides at AGI-2009 Stephen Reed
Developer bookmarks . . .
- Using Git Support in NetBeans IDE NetBeans
- Configuring Jenkins continuous integration server to work with Git uvd
- Developer Documentation bitcoin.org
- Doxygen generated documentation for the main bitcoin branch
- Wiki - Running Bitcoin, describes the command line options
- How to start your own mining pool using bitcoind + eloipool.
- Wiki - Protocol specification
- Wiki - Protocol rules
- Wiki - List of address prefixes
- Btcd + getwork + cgminer = profit Conformal Systems
- Announcing Statoshi: Realtime Bitcoin Node Statistics Jameson Lopp, May 7, 2014
- Programming With TrouSerS David Challener, June 13, 2011
- PeerReview Downloads
- BlockCypher full-nodes API
- How to set up an IDE for developing Bitcoin Core on Linux Jameson Lopp
- How to create a pull request Gavin Andresen
- A Hacker’s Guide to Git Joseph, Wildly Inaccurate
- Foundation for Intelligent Physical Agents, Specifications FIPA
- Howto: PCI-DSS Hardened Ubuntu 14.04LTS Systems Operations
- Use the Built-in Security Features in Your FOSS Distro OpenSource, September 10, 2013
- DEFCON 17: More Tricks For Defeating SSL Moxie Marlinspike, January 15, 2011
- Docker
- Are LXC containers enough? Matt on Cloud
- Is it safe to run applications in Linux Containers? Jerome Petazzoni, Docker, August 20, 2014
- ExoticVPS.com Listing 681 VPS hosts in 97 locations throughout 8 regions.
- Border Gateway Protocol Wikipedia
- BGP & Anycast Cloud HostVirtual
- Fee Schedule American Registry for Internet Numbers
- Coinffeine Exchange Algorithm
- CoinHook listens to Bitcoin addresses so you don't have to Pelle Braendgaard
- Bitcoin Address Shortener for the Blockchain Reddit discussion
- Transaction fees Bitcoin Wiki
- VirWoX MicroPayment API VirWox
- *** Complete Guide on How to Create a New Alt Coin *** Bitcointalk, June 4, 2013
- Open Whisper Systems encrypted voice for mobile
- joget workflow
- Easy Joget v3 for Absolute Beginner Madeng
- WebID W3C
- How to create scrypt based altcoins?
- How To Clone Scrypt Based Altcoins for Fun and Profit
- Introducing Toshi - An Open Source Bitcoin Node For Developers Coinbase
- How to run your own e-mail server with your own domain Lee Hutchinson, Ars Technica - Feb 16 2014
- Java Coding Guidelines - Security Software Engineering Institute
- Memory Wallet an altcoin JavaScript wallet
- Why you should build an Immutable Infrastructure Florian Motlik
- Hits-of-Code Instead of SLoC Yegor Bugayenko, 2014
- Bitcoin Core version 0.10.0 Release Notes December 28, 2014
GitHub & SourceForge Developer bookmarks . . .
- Texai TexaiCognitiveArchitecture GitHub
- bitcoin-testnet-box, Create a private, difficulty 1 bitcoin testnet freewil GitHub
- Coinpunk open source hosted wallet kyledrake GitHub
- Free Java class file shrinker, optimizer, obfuscator, and preverifier ProGuard SourceForge
- Copycat - Java implementation of the Raft concensus protocol kuujo GitHub
- Android Bitcoin Wallet App schildbach GitHub
- insight block explorer front-end bitpay GitHub
- insight block explorer API (back-end) bitpay GitHub
- Toshi, An open source Bitcoin node built to power large scale web applications coinbase GitHub
- blockpop, Proof-of-publication with the blockchain petertodd GitHub
- Google bitcoinj adapted for A.I. Coin
- Bitcoin Cartographer mikehearn GitHub