VISIBLE LEDGER
INVISIBLE PEOPLE
THE MANIFESTO FOR SOVEREIGN VALUE TRANSFER
📊 PROTOCOL SPECIFICATIONS- Ticker: NID
- Total Supply: 21,000,000
- Premine: 0% (FAIR LAUNCH)
- Consensus: PoW (Argon2id)
- Block Time: 60 Seconds
- Difficulty: LWMA-60
- Privacy: Ring Sig (5) + Stealth
- Maturity: 10 Confirmations
- P2P Port: Gossip (Dynamic)
- Halving: Every 2.1M Blocks (~4 Years)
🔒 THE PROBLEM: IDENTITY AS A GATEKEEPERIn recent years, a global shift toward mandatory identification has begun to dominate everyday life. Access to wealth, essential services, and basic participation in society is increasingly gated by identity systems, invasive databases, and centralized points of failure.
When money requires identity, transactions become permissions. Access can be delayed, monitored, limited, or revoked at the whim of an intermediary. Once identity is attached to value, the loss of privacy is permanent and retroactive.
"History teaches us that systems built with good intentions are often repurposed. Records persist. Policies shift. What is considered acceptable today may be targeted tomorrow."
🛡️ THE SOLUTION: NO IDNo ID exists to remove this dependency.The purpose of No ID is not to evade responsibility, but to ensure that the ability to hold and transfer value is a fundamental human right that does not depend on registration, approval, or disclosure.
- Free from Identity: No KYC, no accounts.
- Free from Control: Peer-to-peer by design.
- Free from Central Points of Failure: Distributed consensus.
The system does not ask who you are; it only verifies whether a transaction is mathematically valid.
💰 TOKENOMICS: MATHEMATICAL SCARCITYNo ID adheres to strict Austrian economic principles. The supply is capped by mathematics, not policy. There is
no pre-mine, no ICO, and no developer tax. Every single coin in circulation must be created through the expenditure of energy (Proof-of-Work).
- Max Supply: 21,000,000 NID
- Premine: 0 NID (0%)
- Founder Allocation: 0 NID (0%)
- Initial Reward: 5 NID per Block
- Halving Interval: 2,100,000 Blocks (~4 Years)
⛏️ MINING ECONOMICS: RESTORING DECENTRALIZATIONBitcoin mining has become centralized in massive industrial ASIC warehouses. No ID resists this centralization by using the
Argon2id algorithm.
Why Argon2id?Argon2id is "Memory-Hard." It requires significant RAM access to solve a block, making it incredibly expensive to build specialized ASIC chips for it.
- CPU Friendly: Accessible to anyone with a laptop or desktop.
- GPU Mineable: Efficient on consumer graphics cards.
- ASIC Resistant: Prevents industrial centralization of the hashrate.
This aligns with the original vision of cryptocurrency: "One CPU, One Vote." By keeping mining accessible to consumer hardware, we ensure the network remains distributed, robust, and owned by the people.
🚀 WHY JOIN? THE VALUE PROPOSITIONIn an era of surveillance capitalism and CBDCs (Central Bank Digital Currencies), No ID offers a digital sanctuary.
🛡️ SovereigntyYou hold the keys. No bank can freeze your account. No government can confiscate your wealth without your consent.
👁️ Auditable PrivacyUnlike other privacy coins that hide the supply (risking undetected inflation), No ID keeps amounts visible while obscuring the sender and receiver. This guarantees the 21M cap is never breached.
💾 TECHNICAL MECHANICS: HOW IT WORKSThe No ID protocol utilizes a specific implementation of
Ring Signatures combined with
Stealth Addressing to break the link between sender and receiver. Here is the exact lifecycle of a transaction:
1. Input Mixing (5-Ring Construction)When a wallet initiates a transfer, it does not simply sign the input it wishes to spend. Instead, the protocol selects the
Real Input and automatically pulls
4 Decoy Inputs (random past outputs) from the blockchain.
- The Anonymity Set: These 5 inputs form a "Ring." To any external observer, all 5 inputs appear equally likely to be the source of funds.
- The Signature: The wallet generates a cryptographic Ring Signature over this group. This proves mathematically that "one of these 5 inputs authorized this spend" without revealing which one.
2. The Nullifier (Double-Spend Protection)Since the network cannot see
which input was spent, how do we prevent it from being spent twice?
- Every transaction publishes a unique Key Image (often called a Nullifier).
- This Key Image is derived deterministically from the user's private key and the real input being spent.
- If a user attempts to mix the same input into a new ring later, the math produces the exact same Key Image. The network checks its persistent database of "Spent Key Images" and rejects the duplicate immediately.
3. Stealth Delivery (Receiver Privacy)Funds are never sent to a static public address (e.g. nid1...).
- Commitment Derivation: The sender uses ECDH (performECDH) to generate a shared secret from the recipient's public key and a random ephemeral key. This shared secret allows the derivation of a unique One-Time Commitment (createStealthCommitment) on the curve that only the recipient can unlock.
- View Tags: To allow the recipient to find this payment efficiently (without trying to decrypt every single transaction on the chain), a 1-byte View Tag hint is attached. The recipient's wallet scans these tags to identify and claim their funds.
🖥️ ARCHITECTURE & STACKThe No ID node software is built on a modern, modular stack designed for performance and auditability:
Consensus Engine: Argon2idWe use the
Argon2id hybrid mode. It combines Argon2d (maximal resistance to GPU/ASIC cracking) and Argon2i (resistance to side-channel timing attacks), ensuring fair CPU-friendly mining.
Ledger Storage: ClassicLevel (LevelDB)A high-performance key-value store used by Google and Bitcoin Core for rapid block retrieval and efficient UTXO management. Includes persistent indexes for O(1) lookups.
P2P Networking: WebSockets + JitterEnables real-time, low-latency block propagation. Includes a specific
Anti-Timing-Analysis feature (Traffic Jitter). The node injects random delays when relaying transactions to mask the origin IP of the sender.
Cryptography: Secp256k1 & AES-256-GCMIndustry-standard Elliptic Curve used for signing. Local wallet files are secured using
AES-256-GCM authenticated encryption (encryptData/decryptData), ensuring keys are never stored in plaintext.
⚖️ PHILOSOPHY: AUDITABILITY OVER OBSCURITYNo ID follows a unique design path. While systems like Mimblewimble or Confidential Transactions (CT) focus on concealing transaction amounts, they introduce the risk of "hidden inflation" via cryptographic exploits.
We reject this trade-off.No ID keeps amounts transparent (plaintext) to ensure the
21M supply remains 100% auditable by anyone at all times. Privacy is achieved by breaking the
Transaction Graph (via Ring Signatures) and the
Identity Link (via Stealth Addresses).
Security = Graph Obfuscation + Identity Decoupling + Supply Certainty
🌍 PROJECT ROADMAP
01 | GENESIS [COMPLETED]Core Blockchain, Proof-of-Work Mining, P2P Networking, Basic Wallet functionality.
02 | STEALTH PROTOCOL [COMPLETED]Implementation of
Ring Signatures and Stealth Commitments. Local encrypted key storage.
03 | EFFICIENT DISCOVERY [COMPLETED]Headers-First Sync & Pagination. Wallets fetch lightweight headers before blocks to minimize bandwidth.
Client-Side Bloom Filtering enables efficient stealth scanning.
04 | PROTOCOL EFFICIENCY [COMPLETED]Storage & Mining Optimization. Migration to
LevelDB for scalable ledger storage. Implementation of
Argon2id (Memory-Hard) mining for ASIC resistance.
05 | USER SOVEREIGNTY [COMPLETED]Advanced Wallet Tools. Offline "Cold" Storage Generator, Watch-Only Wallets for monitoring without risk, and Encrypted Backup Import/Export.
06 | CONSENSUS HARDENING [COMPLETED]LWMA-60 Difficulty Algorithm. Replaced static epochs with a Linearly Weighted Moving Average (N=60).
Median Time Past (MTP-11). Consensus rule preventing time-warp attacks.
07 | STATE SCALABILITY [COMPLETED]O(1) State Transitions. Refactored validation logic to update Nullifier Sets and Difficulty Targets incrementally.
Mainnet Simulation. Aligned network heartbeat to 60-second block targets.
08 | NETWORK HARDENING [COMPLETED]Traffic Jitter. Implementation of randomized transmission delays (await new Promise...) to mitigate timing analysis attacks.
Encryption at Rest. Full integration of
AES-256-GCM to secure all local wallet artifacts.
09 | PUBLIC MAINNET [PLANNED]Genesis Block Ceremony. DNS Seed deployment for decentralized bootstrapping. Release of binaries for Windows, Linux, and MacOS.
"Privacy is the final layer of decentralization."
This thread is for technical discussion, review, and suggestions related to the No ID cryptocurrency.
The original announcement (OP) is posted in the Altcoin Announcements section and describes the project goals and architecture.
https://bitcointalk.org/index.php?topic=5569562.0At this stage, No ID is in final testnet development. The blockchain, wallet, miner, and privacy model are implemented and running, and this is the appropriate moment to gather technical feedback before mainnet release.
Use this thread to:
Suggest protocol improvements
Point out potential weaknesses or edge cases
Discuss privacy, mining, or economic parameters
Review design decisions critically