Thank you for your feedback and for the time you have dedicated to reviewing my project. I also apologize for the delay in my response (Ucy).
Joniboini:
Regarding the comment about the document format, I fully understand the concerns related to downloadable files and the potential risks they may carry. I have therefore taken the time to provide a version that is directly accessible online, without any download required, so that the content can be easily and safely reviewed. The text is now readable and selectable (MarryWithBTC).
https://github.com/pbasynch/asynchronous-physical-exchanges/blob/main/README.mdIf you happen to remember the similar project you mentioned, I would also be interested in knowing its name. It could be useful to compare approaches. Please feel free as well to review the content and share your thoughts if any points raise questions or interest you.
Ucy:
I will now provide a more detailed response to the questions raised regarding the logistical commitment, its associated responsibilities, as well as the more detailed functioning of the nodes and layer B.
Regarding the transporter’s commitment, particularly in terms of insurance in case of loss or theft, it is important to clarify that this aspect does not fundamentally differ from what already exists today in traditional logistics systems. Transport operators already rely on insurance mechanisms, whether internal or through third-party insurers, depending on the nature and value of the goods being transported. In this context, risk management remains the responsibility of the logistics providers themselves, not the protocol. The system therefore does not introduce a new type of risk, but rather fits within a framework already mastered by transport actors. Concretely, these actors maintain financial reserves or risk-pooling mechanisms that allow them to cover potential losses, as is already the case today. This operates similarly to traditional insurance systems, for example in housing: not all claims occur at the same time, and the system relies on risk mutualization. If an extreme event were to occur simultaneously across all cases, no insurance system could cover all losses, yet this does not prevent such models from functioning effectively in practice. The principle remains the same here.
To avoid any situation in which an item would remain without handling after the buyer’s validation and payment, the system can rely on a set of logistics operators affiliated with the network. These operators, once registered within the infrastructure, accept the protocol rules as well as the cryptographic commitments associated with transport tasks. When an exchange is finalized and the item is locked in the deposit locker, the logistics task can be automatically assigned to one of these operators according to predefined rules. The corresponding cryptographic commitment is then triggered without requiring manual selection. This mechanism ensures that a validated and paid item is not left without a transporter.
Such a mechanism is not fundamentally different from practices already present in e-commerce. When placing an order online, the buyer may choose between several carriers or delivery levels, but once the order is confirmed, the transport task is automatically handled by the selected provider, without the provider individually accepting each package. In this model, logistics operators agree in advance to the protocol rules and associated commitment conditions, making automatic task assignment possible while ensuring process continuity.
Regarding the role of humans, it is indeed likely that current technological limitations still require some level of human intervention in certain cases. However, the objective of this model is precisely to minimize reliance on trust-based human mechanisms, moving toward a system where validation and execution rely primarily on cryptographic commitments and protocol rules rather than reputation or arbitration.
Finally, even with multiple witnesses and re-verification mechanisms, this still introduces forms of trust and potential coordination risks between participants. The goal here is to eliminate these dependencies by design, rather than attempting to mitigate them afterward.
System Compensation:
The system’s compensation relies on protocol fees integrated into the exchange and paid by the buyer, in addition to the logistics cost. These fees are intended to compensate both the logistics operator responsible for the physical transport and the nodes of the distributed infrastructure that ensure the operation of the state layer. Layer B does not constitute a monetary infrastructure and does not create value on its own. The compensation of participants relies exclusively on fees integrated into the underlying economic exchange. These fees, paid by the buyer during the transaction, are then redistributed between the logistics operators and the contributing nodes based on their effective participation.
Unlike systems based on competition or the designation of a single winner, layer B operates on a contribution-based compensation model. Nodes that actively participate in processing a given state—data reception and verification, cryptographic hashing, information propagation across the network, timely validation submission, and participation in the finalization of the state block—are identified by the protocol as contributing nodes.
For each validation sequence, the system records the actions performed by nodes (validation submitted, comparison executed, finalization signature, etc.) and builds a set of active participants. The fees associated with that state are then distributed among these contributing nodes, either equally or proportionally to their effective participation.
This mechanism ensures that nodes are compensated for the actual work performed, without introducing competition, lottery-based rewards, or arbitrary selection. It also enables continuous distribution of incentives, regardless of the rarity or frequency of events, in line with the non-monetary nature of layer B.
At the same time, the logistics operator is compensated through transport fees associated with the physical exchange and assumes, in return, the cryptographic commitment accepted when taking charge of the item.
Anchoring of States in Bitcoin:
To strengthen the resilience and integrity of the state registry, layer B can periodically anchor its data into the Bitcoin blockchain. Validated states are grouped and condensed using a cryptographic structure such as a Merkle tree. The root of this tree, which represents a unique fingerprint of all the associated states, can then be included in a Bitcoin transaction.
This mechanism allows the system to benefit from Bitcoin’s security and immutability while limiting the amount of data actually written to the blockchain. It is acknowledged that the use of the Bitcoin blockchain for anchoring external data should remain minimal so as not to unnecessarily increase the network’s data load, as its architecture is specifically designed to limit such growth. For this reason, anchoring can be performed by grouping states over a given period rather than on a per-transaction basis.
The objective is not to use Bitcoin as a storage layer, but as an external cryptographic reference that publicly attests to the existence and integrity of the states recorded by layer B.
As Bitcoin’s block subsidy decreases over successive halvings and is expected to disappear around 2140, miners will rely primarily on transaction fees to maintain network profitability. In this context, the use of the Bitcoin blockchain as an anchoring layer by external systems could contribute to supporting this fee-based economy.
This practice can increase demand for block space and therefore transaction fees, which may indirectly strengthen miners’ economic incentives. Within this model, the anchored data does not represent the content of physical exchanges themselves, but only a cryptographic proof that a validated event on layer B corresponds to a real operation associated with a transaction on layer A.
As such, this data maintains a direct link with a concrete economic activity. Unlike certain data that can be written to the blockchain without an explicit connection to an economic transaction, the goal here is to reference only real events resulting from an actual exchange.