Bitcoin Forum
December 27, 2025, 02:39:30 PM *
News: Latest Bitcoin Core release: 30.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: NoID, A Gift to Humanity  (Read 89 times)
SNoID (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
December 25, 2025, 11:30:04 PM
Last edit: December 26, 2025, 09:48:26 AM by SNoID
 #1

In recent years, a global shift toward mandatory identification has begun to dominate everyday life. Access to wealth, essential services, and basic participation in society is increasingly gated by identity systems, invasive databases, and centralized points of failure.

These systems are often introduced under the guise of convenience or security, but they carry heavy, long-term consequences.
When money requires identity, transactions become permissions. Access can be delayed, monitored, limited, or revoked at the whim of an intermediary. Once identity is attached to value, the loss of privacy is permanent and retroactive.

History teaches us that systems built with good intentions are often repurposed. Records persist. Policies shift. What is considered acceptable today may be targeted tomorrow.

No ID exists to remove this dependency.

The purpose of No ID is not to evade responsibility, but to ensure that the ability to hold and transfer value is a fundamental human right that does not depend on registration, approval, or disclosure.

No ID is designed to function without accounts, names, or personal data. Value exists through cryptographic ownership alone. Participation requires no permission beyond adherence to the protocol rules.

This design restores a simple, sovereign principle:
Money should be neutral, like mathematics, and accessible, like speech.

No ID is built to be:
Free from Identity: No KYC, no accounts.
Free from Control: Peer-to-peer by design.
Free from Central Points of Failure: Distributed consensus.

The system does not ask who you are; it only verifies whether a transaction is mathematically valid. In a world moving toward permanent financial surveillance, No ID stands as the necessary alternative.

Privacy is the final layer of decentralization.

Technical Foundations

No ID is built on a Proof-of-Work model.

Block creation follows a competitive mining process where participants expend computational work to secure the network. This ensures neutrality, censorship resistance, and a verifiable history that cannot be altered without overwhelming consensus.

Transactions in No ID do not reference static addresses.

Instead, the system uses dynamic cryptographic commitments. Each transaction moves value from one commitment to another, rather than from a fixed public address. These commitments are one-time, unlinkable, and change form with every transaction.

On the public ledger, transactions appear only as:

[ commitment ] → [ commitment ]


No identities, reusable addresses, or persistent account structures are recorded.

A commitment reveals no information about the sender or the recipient. It only proves that:

the transaction is valid,

the value is conserved,

and no double-spend has occurred.

Only the wallet that holds the corresponding private data can recognize that a commitment belongs to it and unlock the received funds. To all other observers, commitments are indistinguishable from one another.

Because commitments are regenerated for every transfer, transaction history cannot be traced forward or backward. Ownership does not accumulate a visible trail.

The blockchain remains fully auditable and verifiable, while transaction privacy is preserved at the protocol level rather than added as an optional feature.

No ID does not attempt to hide the ledger.
It removes the ability to correlate it.

This design allows the network to remain open, decentralized, and provable, while ensuring that participation does not require identity, registration, or disclosure.

Soon will come the white paper, docs and mainnet where people can mine it.
ptaank
Jr. Member
*
Offline Offline

Activity: 54
Merit: 4


View Profile
December 26, 2025, 06:15:21 AM
 #2

Interesting concept.

Adderss-less transfers using 1 time cryptographic commitments while keeping a fully auditable ledger on POW is theoretically a strong direction if implemented correctly. But how this differs from existing CT / Mimblewimble-style systems ? how inflation bugs and double-spends proofs will be enforced ? how ownership is recognized by the wallet without scanning the entire chain ?

Have a good day Smiley
SNoID (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
December 26, 2025, 09:39:54 AM
Last edit: December 26, 2025, 05:01:28 PM by SNoID
 #3

Interesting concept.

Adderss-less transfers using 1 time cryptographic commitments while keeping a fully auditable ledger on POW is theoretically a strong direction if implemented correctly. But how this differs from existing CT / Mimblewimble-style systems ? how inflation bugs and double-spends proofs will be enforced ? how ownership is recognized by the wallet without scanning the entire chain ?

Have a good day Smiley


Thank you for the insightful feedback. You’ve touched on the core technical trade-offs of the No ID protocol. Here is how we address those points

Philosophy: Visible Ledger, Invisible People
No ID follows a unique design path in the privacy space. While systems like Mimblewimble or Confidential Transactions (CT) focus on concealing transaction amounts, they introduce the risk of "hidden inflation", if the underlying cryptographic math is ever compromised, an attacker could mint infinite supply undetected. No ID keeps amounts transparent to ensure the 21M supply remains 100% auditable by anyone at all times. Instead, we focus strictly on Identity-Decoupling via Stealth-UTXOs. The network sees the value moving, but can never link it to a persistent identity or a static address.

The Core Mechanism: Stealth Commitments & Salts
In a transparent blockchain like Bitcoin, every transaction links a sender's address to a recipient's. In No ID, Public Keys are never recorded on the ledger.

The Formula:
(Commitment = SHA256(Recipient_PublicKey + Random_Salt)

The Impact:
Because the salt is randomized for every output, every commitment on the ledger appears as a unique, unrelated string. To an outside observer, the ledger appears as a stream of random data. Only the holder of the private key can "solve" the hash to claim the funds.

Safety & Auditability
Inflation Protection: Because amounts are plaintext, every node verifies that the sum of the outputs equals the value of the spent inputs. This ensures no hidden inflation can occur outside of the hardcoded coinbase rewards.

Double-Spend Prevention:
This is enforced by the Node maintaining a global set of 'spent nullifiers' (the specific commitments used as inputs). Any block containing a transaction that tries to spend a commitment already marked as spent is rejected by consensus rules.

The Transaction Flow (Step-by-Step)
Step A: Discovery (Stealth Scanning)
The wallet software identifies assets by iterating through the ledger and computing a local hash using the user's Public Key and the salt attached to each on-chain output. If SHA256(User_PubKey + salt) = On_Chain_Commitment, the wallet recognizes the funds.
Note: In a production environment, this is optimized using Compact Block Filters (BIP-157/158) to ensure instant scanning without downloading the full chain.

Step B: Creating a Transaction
UTXO Aggregation: The wallet identifies a list of unspent commitments that, when combined, meet the required balance.

Stealth Generation: The wallet generates unique random salts for the recipient and a new "Change" output for the sender.

Commitment Calculation: It derives the new on-chain commitments using the destination Public Key and the new salts.


Step C: Signing & Verification
The wallet signs the transaction data using the user's Private Key. This provides mathematical proof of ownership over the input commitments without ever revealing the underlying identity. The signed transaction is then broadcast to the network mempool.

Step D: Mining (Finality via PoW)
Network miners collect transactions and perform Proof of Work. Once a block is found, the transaction is committed, and all used "Input Commitments" are globally marked as spent.

https://imgur.com/a/HjD9Tbm
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!