Bitcoin Forum
March 14, 2026, 12:27:42 AM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Ninacatcoin crypto with an AI that works within the node  (Read 35 times)
ninacatcoin NINA IA (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
March 12, 2026, 11:38:10 PM
 #1

VISIT  www.ninacatcoin.es

https://niapool.ninacatcoin.es/

https://niachain.ninacatcoin.es/

https://github.com/ninacatcoin/ninacatcoin

https://github.com/ninacatcoin/ninacatcoin-gui

https://x.com/ninacatcoin

http://discord.gg/U8Mtn2c3ru

NINACATCOIN WHITE PAPER

Version 3.0 — March 2026



Table of Contents

1. Preface: History and Meaning
2. Vision and Purpose
3. The Genesis Block
4. Emission Model: Smooth Emission and Rewards
5. High-Entropy Events: X2 and X200
6. Difficulty Algorithm: LWMA-1
7. Network Fees
8. Privacy and Anonymity
9. Enhanced RandomX Mining
10. Automatic Checkpoints: 51% Defense
11. Checkpoint Corruption Detection and Auto-Repair
12. Precomputed Block Hashes: checkpoints.dat
13. Intelligent Validation Enhancements
14. Discord Bot: Real-Time Events
15. Block Explorer
16. Technical Architecture
17. Roadmap and Future Development
18. NINA Intelligence Engine: Embedded AI + LLM
19. NinaCatCoin Game: Play-to-Earn Rewards



1. Preface: History and Meaning

Project Origins

Ninacatcoin was born from the Monero codebase, one of the most respected cryptocurrency projects in terms of privacy and decentralization. Just as Monero was based on the CryptoNote protocol, Ninacatcoin uses Monero's solid, battle-tested architecture as its foundation, implementing fundamental improvements in several critical areas:

  • Anti-51% security: Automatic checkpoints every 60 minutes vs manual checkpoints updated every 6–12 months in Monero
  • Mining fairness: Enhanced RandomX with GPU penalty to prevent mining monopolies
  • Transparent emissions: X2 and X200 high-entropy events with anti-manipulation mechanisms
  • Real decentralization: No manual intervention required in critical processes
  • Rapid difficulty adjustment: LWMA-1 algorithm reacts within blocks, not days or weeks

This project respects and acknowledges the work of the Monero community as a technical foundation, while implementing an alternative vision of how a private cryptocurrency should operate. Monero represents the gold standard in privacy-focused cryptocurrencies, but several design choices — particularly around manual checkpoints, difficulty adjustment speed, and mining reward predictability — left room for meaningful improvement. Ninacatcoin fills these gaps while preserving privacy, fungibility, and resistance to surveillance.

The Name: Ninacatcoin

The name "Ninacat" is a direct, deeply personal tribute — it comes from the loss of a beloved companion: a cat named Nina who was the most fun, friendly, and joyful being anyone could meet.

Nina was synonymous with qualities that every cryptocurrency should embody:

  • Kindness: Always friendly with everyone — just as Ninacatcoin treats all miners equally
  • Generosity: She brought joy without asking for anything — just as X2/X200 events randomly reward miners
  • Fun: She constantly brought laughter — Ninacatcoin brings excitement to an otherwise deterministic process
  • Unconditional companionship: Present in difficult times — Ninacatcoin's automatic systems keep running even under attack

Her memory is immutably recorded in the blockchain — carved into the genesis block where it can never be erased.

In the genesis block (height 0), there is an engraved message dedicated to Nina:

Code:
const char kDefaultGenesisMsg[] =
  "Ninacat[Suspicious link removed]DBYE  "
  "No pude protegerte entonces, pero ahora voy a crear algo que se defienda solo y sea justo. "
  "I couldn't protect you back then, but now I am creating something that can defend itself and be fair.";

ElementMeaning
25/05/2014Nina's birth date
16/02/2019Date of passing
GOODBYEFinal farewell
"I couldn't protect you..."A promise to create something fair and self-sufficient

Nina's Legacy: The X2 and X200 Events

Nina's kindness directly inspired the X2 and X200 event system. Nina gave without expecting anything in return, unpredictably, to everyone equally. That is what Ninacatcoin does — generously rewarding miners with random bonus payments:

  • X2 (Reward Doubler): Occurs ~183 times per year. A lucky miner receives 2x the base reward.
  • X200 (Special Multiplier): Occurs ~6 times per year. A miner receives 200x the base reward — a moment of extraordinary generosity.

Code:
NINA'S PHILOSOPHY           →  NINACATCOIN'S PHILOSOPHY
Generous kindness            →  Generous rewards (X2, X200)
Surprise love                →  Surprise events in mining
No predictable pattern       →  Fair random distribution
Everyone deserves the best   →  All miners can win, regardless of hashrate

A single CPU miner has the same percentage chance of receiving an X200 reward as a large farm. The probability is per block, not per miner.

The Hidden Secret: The Impossible Event (Simultaneous X2 + X200)

There is an infinitesimal probability that both X2 and X200 trigger on the same block — an emergent consequence of two independent systems:

Code:
Final Reward = Base Reward × 2 × 200 = Base Reward × 400x

Code:
if (is_x2_event(...)) base_reward *= 2;      // Executes independently
if (is_x200_event(...)) base_reward *= 200;  // Also executes independently
// Natural accumulation: original × 2 × 200 = original × 400

Because these are "if" statements (not "else if"), both can trigger on the same block:

EventProbabilityFrequencyReward
X2 Only1 in 1,400~183 times/year2x base
X200 Only1 in 43,800~6 times/year200x base
X2 + X2001 in ~1,432,000~once every 5.5 years400x base
Normal Block~99.9%Majority1x base

Nina was generous without warning. Ninacatcoin honors this by allowing the protocol itself to be generous organically and unpredictably.



2. Vision and Purpose

Ninacatcoin is a private, secure, and truly decentralized cryptocurrency evolved from CryptoNote principles, inheriting ring signatures, stealth addresses, and confidential transactions while addressing key weaknesses in existing implementations.

Key innovations:

  • High-entropy emission events (X2 and X200) that reward miners unpredictably with Monero-style infinite tail emission
  • Fully automatic checkpoints every 60 minutes, eliminating manual intervention
  • LWMA-1 difficulty algorithm reacting to hashrate changes in 3–5 blocks, not hundreds
  • Emergency Difficulty Adjustment (EDA) preventing network stalls after hashrate departures
  • Enhanced RandomX with GPU penalty and shorter epochs, keeping CPU mining viable

User fund control is ensured through:

  • Mandatory ring signatures in all transactions (enforced by protocol)
  • RingCT hiding amounts via Pedersen commitments and Bulletproof+ range proofs
  • Optional network anonymity via Tor, I2P, and Dandelion++ propagation
  • Decentralized architecture with no single points of failure

Development philosophy: security over features, automation over human intervention, fairness over efficiency, code transparency with user privacy. The team maintains an open process through GitHub and IRC (#ninacatcoin-dev).



3. The Genesis Block (Block Zero)

The genesis block paid an initial reward of 1,000,000 NINA (one million), fixed and immutably defined in the chain configuration:

Code:
#define GENESIS_REWARD ((uint64_t)1000000 * COIN) // 1M NINA to spendable wallet (block 0)

These 1,000,000 NINA are reserved for a future NinaCatCoin game — a play-to-earn gaming experience where players will be rewarded with NINA coins from this genesis reserve. The coins are held in a controlled wallet and will be distributed exclusively as in-game rewards.

Game Reserve Wallet:
Code:
LmeHK1pr5z2FHgvjinqN61HD77zwLVG2KF3pJU8aZH8DYAeF6D7XxM8WvzhA8PT4C8Vcnuay9Kvj6jAj19xRujbPPTGHime

Public View Key (for auditing):
Code:
54aefc0ac5371bb2f206d085599401ab172676a983f78dfc1a9cf1af568cb2c7

Anyone can use the view key to verify the balance and outgoing transactions of the game reserve wallet, ensuring full transparency over the 1,000,000 NINA fund.

Why a game reserve?
  • Community value: Instead of destroying coins, they serve a purpose — rewarding players and growing the ecosystem
  • Long-term engagement: The game creates sustained demand and utility for NINA beyond mining and trading
  • Full transparency: The genesis reward is publicly verifiable on the blockchain — anyone can audit the reserve wallet
  • Fair distribution: Game rewards will be distributed to players based on gameplay, not purchased or pre-allocated to insiders
  • Immutable reference point: Block zero is the cryptographic seed of the emission system

Important: NinaCatCoin does not encourage anyone to mine. Mining is completely voluntary — whoever wants to mine is free to do so. Coins will enter the market when the network and hashrate are stable. With too few miners, transactions would not be reliable. The project prioritizes network health over rushed adoption.

The consensus layer ensures no chain variant can pay more than 1,000,000 NINA in block 0, and no fork can redistribute those coins.

Nina's farewell message is permanently engraved in the genesis block:

Code:
const char kDefaultGenesisMsg[] =
  "Ninacat[Suspicious link removed]DBYE  "
  "No pude protegerte entonces, pero ahora voy a crear algo que se defienda solo y sea justo. "
  "I couldn't protect you back then, but now I am creating something that can defend itself and be fair.";



4. Emission Model: Smooth Emission and Rewards

Monero-Style Smooth Emission

NinaCatCoin follows the same proven emission model as Monero — a smooth, exponentially decreasing curve with permanent tail emission. There are no abrupt halvings.

  • Total supply: Infinite (identical to Monero — tail emission ensures miners are always rewarded)
  • Initial base reward: ~17.59 NINA per block
  • Block time target: 120 seconds (2 minutes)
  • Emission speed factor: 20 (derived from EMISSION_SPEED_FACTOR_PER_MINUTE = 21)
  • Tail emission: 0.80 NINA per block forever (Monero pays 0.60 XMR)

Emission Formula (identical to Monero):
Code:
base_reward = (MONEY_SUPPLY - already_generated_coins) >> emission_speed_factor

Where:
  MONEY_SUPPLY = (uint64_t)(-1) = 2^64 - 1 (maximum uint64)
  emission_speed_factor = 21 - (target_minutes - 1) = 21 - 1 = 20
  target_minutes = 120s / 60 = 2

Initial: base_reward = UINT64_MAX >> 20 ≈ 17,592,186,044,416 atomic units ≈ 17.59 NINA

The reward decreases smoothly with every block. There is no sudden halving — the curve is continuous and exponential, making it completely predictable and fair.

Emission Curve:

PeriodApproximate Base RewardAnnual Emission
Block 1~17.59 NINA~4,622,652 NINA
After 1 year~16.80 NINA~4,414,944 NINA
After 5 years~12.50 NINA~3,285,000 NINA
After 10 years~8.90 NINA~2,339,640 NINA
Tail emission0.80 NINA (forever)~210,240 NINA

Tail Emission: 0.80 NINA Per Block Forever

When the base reward drops below 0.80 NINA, the tail emission kicks in:

Code:
#define FINAL_SUBSIDY_PER_MINUTE ((uint64_t)400000000000) // 4 * pow(10, 11)

// Per block: 400,000,000,000 × 2 minutes = 800,000,000,000 atomic units = 0.80 NINA

Why tail emission?
  • Miner incentive permanence: Miners are always rewarded, regardless of how much time passes
  • Network security: Without block rewards, security depends entirely on fees — a dangerous assumption
  • Predictable inflation: ~210,240 NINA/year — as the total supply grows, the inflation rate approaches zero asymptotically
  • Proven model: Monero uses the exact same mechanism (0.60 XMR/block) and it works

Comparison with Monero:

ParameterNinaCatCoinMonero
SupplyInfiniteInfinite
Emission curveSmooth exponential decaySmooth exponential decay
Initial reward~17.59 NINA~17.59 XMR (similar)
Tail emission0.80 NINA/block0.60 XMR/block
Block time120 seconds120 seconds
Speed factor2020

Emission Including X2/X200 Events

Code:
At initial reward (~17.59 NINA):
X2 contribution:   183 events × ~17.59 NINA extra ≈ 3,219 NINA/year
X200 contribution: 6 events × ~3,500 NINA extra  ≈ 21,003 NINA/year
Total extra:       ~24,222 NINA/year (~0.5% above base emission)

Since the supply is infinite and the base reward decreases smoothly, X2/X200 events never risk exceeding a cap — they simply add excitement and generosity to mining, just as Nina would have wanted.



5. High-Entropy Events: X2 and X200

What Are X2 and X200?

Ninacatcoin implements pseudorandom events that multiply the block reward at unpredictable intervals:

  • X2: Block pays 2x the base reward (e.g., ~35.18 NINA at launch)
  • X200: Block pays 200x the base reward (e.g., ~3,518 NINA at launch)

Expected frequency per year (~262,800 blocks):
  • X2: ~183 events/year (one every ~1,436 blocks, roughly every 2 days)
  • X200: ~6 events/year (one every ~43,800 blocks, roughly every 2 months)

These events are deterministic but unpredictable — every node calculates the same result, but no one can predict it before the previous block is mined.

Probability Calculation and Anti-Manipulation

Event detection is entirely deterministic based on the previous block hash, never on unseeded random numbers, system clocks, or external oracles:

Code:
auto get_event_roll = [&](uint8_t tag, uint64_t &out) {
    if (prev_block_hash) {
        std::array<uint8_t, sizeof(crypto::hash) + 1> buf{};
        std::memcpy(buf.data(), prev_block_hash, sizeof(crypto::hash));
        buf[sizeof(crypto::hash)] = tag;
        const crypto::hash h = crypto::cn_fast_hash(buf.data(), buf.size());
        std::memcpy(&out, &h, sizeof(uint64_t));
    }
};

Process:
  • Take the previous block hash (32 bytes, 256 bits)
  • Append an identifier tag (1 byte): tag=2 for X2, tag=200 for X200
  • Apply Keccak-256 (cn_fast_hash) to the combined 33-byte buffer
  • Extract the first 64 bits as an unsigned integer
  • Calculate: rnd % BLOCKS_PER_YEAR (262,800)
  • If result < 183 → X2 event; If result < 6 → X200 event

Why manipulation-resistant? Changing the block hash requires re-mining (full PoW), the miner doesn't know if the next block will be theirs, even with 100% hashrate the cost exceeds the expected reward, and Keccak-256 has no shortcuts.

Emission and Events

Since NinaCatCoin uses infinite tail emission (like Monero), X2 and X200 events are always active — there is no supply cap to exhaust. Events add organic excitement to mining without any risk of overshooting a limit.

Block at height 100 is always X2, demonstrating the system's functionality on the live network.



6. Difficulty Algorithm: LWMA-1

Target Block Time

Ninacatcoin targets a block time of 120 seconds (DIFFICULTY_TARGET_V2 = 120), producing approximately 30 blocks per hour, 720 blocks per day.

The Problem with Simple Moving Average (SMA)

The original Monero difficulty algorithm uses SMA over 720 blocks (~24 hours). It has severe limitations for smaller networks:

  • Slow reaction: 50% hashrate loss takes ~24 hours to adjust
  • Equal weighting: Old blocks influence difficulty as much as new ones
  • Timestamp sorting vulnerability: Manipulation possible
  • Hash-and-dump susceptibility: Network takes a full day to recover

In January 2025, Ninacatcoin experienced exactly this: a miner with ~210 KH/s departed, leaving ~1 KH/s against difficulty calibrated for 215 KH/s. With the old SMA, the network would have needed ~29 days to normalize.

LWMA-1: The Solution

Ninacatcoin uses the LWMA-1 algorithm (Linear Weighted Moving Average), designed by zawy12 — the industry standard for difficulty adjustment in small/medium cryptocurrencies.

Key parameters:
Code:
DIFFICULTY_WINDOW  = 60 blocks (~2 hours of data)
DIFFICULTY_LAG     = 2  blocks
DIFFICULTY_CUT     = 6  timestamps (excluded from extremes)

Core Formula:
Code:
next_difficulty = (sum_difficulty × T × (N + 1)) / (2 × sum_weighted_solvetimes)

Where:
  T   = target time (120 seconds)
  N   = number of intervals in window (up to 60)
  D_i = difficulty of block i
  st_i = solve time of block i, clamped to [-6T, 6T]
  weight_i = i (1 for oldest, N for newest)

LWMA-1 vs SMA comparison:

FeatureSMA (Monero)LWMA-1 (Ninacatcoin)
Window size720 blocks (~24h)60 blocks (~2h)
WeightingEqual for all blocksLinear: recent weigh more
Timestamp handlingSorted (loses order)Unsorted (real solve times)
Reaction speedHundreds of blocks3–5 blocks
Timestamp manipulationVulnerableClamped to [-6T, 6T]
99% hashrate loss recovery~29 days1–2 blocks (with EDA)

The most recent block contributes 60x more to the difficulty calculation than the oldest block, allowing the algorithm to react within 3–5 blocks (~6–10 minutes).

Emergency Difficulty Adjustment (EDA)

If a block takes more than 6x the target time (>720 seconds), EDA overrides LWMA and caps difficulty:

Code:
EDA Trigger: last_block_time > 6 × 120s = 720s (12 minutes)

adjusted_difficulty = last_difficulty × target / actual_solve_time
next_difficulty = min(LWMA_result, adjusted_difficulty)

Example — catastrophic hashrate departure:
Difficulty 9,000,000 (calibrated for 200 KH/s), hashrate drops to 1 KH/s, block takes 3,600s (1 hour):

Code:
adjusted = 9,000,000 × 120 / 3,600 = 300,000
→ Next block mined at difficulty 300,000 instead of 9,000,000

EDA convergence:

BlockSolve TimeDifficultyStatus
N3,600s9,000,000EDA triggers
N+1~360s300,000EDA triggers again
N+2~180s100,000EDA not needed
N+3~120s~80,000LWMA converging
N+10~120s~60,000Stable

Protection against hashrate volatility:

PhaseSMA-720 (Old)LWMA-60 + EDA
Large miner entersRises over 720 blocksRises in ~10 blocks
Large miner leaves29 days to normalize1–2 blocks (EDA)
Rent-and-dumpDevastating, 24h recoveryNegligible, 20 min recovery
Max slow blocksHundreds possible1–2 before EDA

Difficulty Reset Mechanism

At height 4,726, a one-time difficulty reset occurred (DIFFICULTY_RESET_HEIGHT = 4726). The old SMA had 720 blocks of history at ~215 KH/s, while actual hashrate was ~1 KH/s. The reset prevented LWMA from looking back before the reset height. Difficulty dropped from 9.15M to ~68K within 60 blocks. Future fluctuations are handled entirely by LWMA-1 + EDA.

Solve Time Clamping

LWMA-1 clamps each solve time to [-6T, 6T] = [-720s, +720s], preventing future timestamp attacks, slow block exaggeration, and oscillation attacks.



7. Network Fees: Dynamic and Anti-Spam

Code:
FEE_PER_KB = 0.01 NINA                   (static fee per kilobyte)
FEE_PER_BYTE = 0.00001 NINA              (equivalent granular rate)
DYNAMIC_FEE_PER_KB_BASE_FEE = 0.005 NINA (dynamic minimum floor)

Dynamic Fee Calculation:
  • Static fee: fee_static = tx_weight × FEE_PER_BYTE
  • Dynamic fee: dynamic_fee = (0.95 × block_reward × 3000) / (median_weight²)
  • Final fee: fee_total = max(fee_static, dynamic_fee × tx_weight)

ScenarioTx SizeFee
Low congestion2 KB~0.02 NINA
Moderate congestion2 KB~0.04 NINA
High congestion2 KB~0.06 NINA
Spam attack2 KB~0.50 NINA

Blocks ≤ 300,000 bytes receive full reward. Larger blocks incur penalties, making spam unprofitable.



8. Privacy and Anonymity

Ring Signatures

Every transaction uses mandatory ring signatures — enforced at protocol level. The sender's real output is mixed with N-1 decoy outputs:

  • Default ring size: 11 (mixin 10) — 1 real + 10 decoys
  • Probability of guessing the real signer: ~9.1%
  • Future hard fork (v17) will increase to ring size 16 once the blockchain matures

Ring size 11 was chosen for the initial phase because a young blockchain has limited outputs available. Starting at 11 ensures strong privacy at every growth stage.

RingCT (Ring Confidential Transactions)

  • Pedersen Commitments: Amounts encrypted: C = aG + bH
  • Homomorphic property: Miners verify inputs = outputs without knowing amounts
  • Bulletproof+ range proofs: Compact proofs that amounts are non-negative
  • Enforced since hard fork v6

Stealth Addresses

Every transaction generates a unique, one-time address for the recipient. No two transactions ever send to the same on-chain address. An observer cannot link payments to a known public address.

Tor and I2P Integration

  • Nodes detect .onion and .b32.i2p addresses as anonymous endpoints
  • Dandelion++ provides transaction propagation privacy: Stem phase (single peer forward) → Fluff phase (network broadcast)
  • Impossible to determine the originating node

InformationHidden?Mechanism
Sender identityYesRing signatures (11 decoys)
Recipient identityYesStealth addresses
Transaction amountYesRingCT + Bulletproof+
Transaction existenceNoPublic ledger (by design)
Sender IP addressYes (optional)Dandelion++ / Tor / I2P



9. Enhanced RandomX Mining

RandomX is activated at block height 3,000 (hard fork v16). Blocks 0–2,999 used CryptoNight. Ninacatcoin implements three improvements over standard RandomX:

Improvement 1: Shorter Epochs

Code:
Monero:       SEEDHASH_EPOCH_BLOCKS = 2048 (68 hours)
Ninacatcoin:  SEEDHASH_EPOCH_BLOCKS = 1024 (34 hours)

More frequent seed changes make ASIC ROI mathematically impossible (design takes 6–12 months, seed changes every 34 hours).

Improvement 2: Variable Dataset

Code:
dataset_size = min(2GB + (network_hashrate_TH_s × 10MB), 4GB)

ASICs optimized for 2GB become suboptimal when the dataset grows. CPUs handle any dataset size transparently.

Improvement 3: Dual Mode with GPU Penalty

Every 5 blocks (20%), RandomX runs in "safe" mode (RANDOMX_FLAG_SECURE) with JIT disabled:

Code:
Block 0 (height % 5 == 0): GPU Penalty Mode (10x slower for GPUs)
Blocks 1–4: Normal mode
Average GPU efficiency: ~20% vs CPU baseline

CPU Mining: Democratic Access

RandomX uses only basic CPU instructions (integer arithmetic, L3 cache, memory latency). A used office computer from 2010 can mine profitably.

HardwareEfficiencyProfitability
Modern CPU100% (baseline)Full
Old CPU (2010+)30–60%Moderate
GPU~20%Marginal
FPGA~5%Unprofitable
ASIC0%Impossible



10. Automatic Checkpoints: The Impossible Defense Against 51%

Why Checkpoints Matter

A 51% attack rewrites blockchain history using majority hashrate. Checkpoints make it cryptographically impossible to rewrite history, even with 100% of the hash power.

Checkpoint Architecture

A checkpoint is a pair (height, block_hash) that permanently locks a block. Once validated against a checkpoint, a block CANNOT be replaced.

  • Checkpoint interval: 30 blocks = 3,600 seconds = 1 hour
  • Distribution: HTTPS + seed nodes
  • Generation: Fully automatic, no human involvement

Automatic Generation

Unlike Monero's manual checkpoints (updated every 6–12 months), Ninacatcoin generates checkpoints automatically:

  • Total automation — no human intervention at any step
  • Continuous — 24/7, every 1 hour
  • No single point of failure — 3+ independent seed nodes
  • Decentralized — each seed generates independently
  • Fully auditable — open source code

Hybrid Distribution

Code:
LAYER 1: HOSTING (CDN — Fast Access)
├─ URL: https://ninacatcoin.es/checkpoints/
├─ Content: Last 15 days of checkpoints
├─ Update: Every 1 hour (automatic)
└─ Purpose: Fast sync for new nodes

LAYER 2: SEED NODES (Distributed Authority)
├─ 3+ independent servers
├─ Content: FULL HISTORY from genesis
├─ Update: Every 1 hour (automatic)
└─ Purpose: Backup, validation, redundancy

Why 51% and 100% Attacks Fail

  • Attacker's block hash ≠ checkpoint hash → rejected
  • Nodes contact hardcoded legitimate servers, never attacker's
  • 3 independent seeds cannot all be compromised simultaneously
  • Open source — malicious recompilation is detectable

Formal proof: For the attack to succeed, the alternative chain R_A must match checkpoints. But checkpoints were generated from the honest chain R_H. So R_A = R_H at every checkpoint. Since blocks are chained, R_A = R_H everywhere. But then R_A IS R_H — not an alternative chain. Contradiction. QED.

Maximum Attack Window

Maximum 30 blocks (1 hour). Compare: Monero ~33 days, Bitcoin unlimited.

FeatureNinacatcoinMoneroBitcoin
Checkpoint interval60 min~33 daysNone
Checkpoint methodAutomaticManualN/A
Max reorg window30 blocks~33,000 blocksUnlimited
51% resistanceImpossible (>1h)WeakVulnerable

Ninacatcoin is approximately 720x more secure than Monero against reorg attacks.



11. Intelligent Detection and Auto-Repair System

Malware can modify checkpoint files after download. Ninacatcoin implements automatic detection and repair.

Four detection layers:

  • Hash Format Validation: Each hash must be exactly 64 hex characters
  • Genesis Block Validation: Compared against hardcoded genesis hash
  • Epoch Validation: Monotonic epoch_id progression
  • Seed Node Cross-Reference: Validated against multiple independent seeds

FAIL-SAFE Pause Mode:
When corruption is detected: Detect → Report → Pause → Retry every 30s → Auto-repair → Resume. Zero manual intervention required.

AttackDetectionResponse
Malware modifies fileFormat validationPAUSE + auto-repair
Replay attackepoch_id validationReject + retry
False genesis blockHardcoded comparisonImmediate rejection
Compromised seedMulti-seed consensusUse remaining seeds
Network outageRetry loopWait with existing data



12. Precomputed Block Hashes: checkpoints.dat

Complementary to JSON checkpoints, checkpoints.dat verifies every block ever produced in groups of 512.

Featurecheckpoints.jsoncheckpoints.dat
FormatReadable JSONCompact binary (Keccak-256)
Granularity1 hash per hourALL blocks (by 512)
ProtectionPoint checkpointsComplete chain verification

Binary Format:
Code:
[4 bytes]  ngroups (uint32 LE) = Number of groups of 512 blocks
Per group (64 bytes):
  [32 bytes] cn_fast_hash(block_hash_0 || ... || block_hash_511)
  [32 bytes] cn_fast_hash(block_weight_0 || ... || block_weight_511)

Triple Protection Architecture:
Code:
LAYER 1: COMPILED (compile-time)
├─ Hashes embedded in executable
└─ Cannot be modified without recompiling

LAYER 2: DOWNLOADED (runtime)
├─ Updated from https://ninacatcoin.es at startup
└─ Covers blocks mined after binary was compiled

LAYER 3: P2P VERIFICATION (network)
├─ Validated against blocks from peers
└─ Compromised CDN cannot fool the network



13. Intelligent Validation Enhancements

PHASE 1: Epoch-Based Validation

epoch_id prevents replay attacks. Metadata persists in .ninacatcoin_checkpoints_metadata.json. Requires ≥1/3 seed consensus.

PHASE 1.5: Tiered Ban System

LevelDurationTrigger
TEMP_1H1 hourFirst violation
PERSISTENT_24H24 hours (saved to disk)Second violation
PERMANENTIndefiniteThird+ violation

PHASE 2: Peer Reputation System

Auditable ban reasons: HASH_MISMATCH, EPOCH_VIOLATION, REPLAY_ATTACK, INVALID_HEIGHT, SEED_MISMATCH. All logged in structured JSON with the OBSERVE_INVALID_CHECKPOINT protocol.

Defense in Depth — 5 Independent Layers:

LayerMechanismProtection
1Proof-of-Work (RandomX)Requires >50% hashrate
2Auto Checkpoints (60 min)History immutability
3P2P Consensus (66%+)Immediate detection
4Dynamic ReputationIncremental penalties
5Auto Quarantine1–6h isolation

An attacker must defeat ALL five simultaneously — no known attack has achieved even three.



14. Discord Bot: Real-Time Event Announcements

An automated Discord bot (discord_lottery_bot.py) provides real-time X2/X200 announcements.

  • Automatic Event Detection: Monitors blockchain via JSON-RPC
  • Verifiable Announcements: Includes all data for independent verification
  • Historical Recovery: On restart, catches up from last recorded height
  • Anti-Redundancy: State persistence, reorg detection, SHA256 deduplication

Discord Channels:
  • #x2-events — X2 multiplier events
  • #x200-events — X200 multiplier events (rare)
  • #block-updates — General block information

Source code is publicly available for auditing.



15. Block Explorer: Total Blockchain Transparency

The Ninacatcoin Block Explorer (https://niachain.ninacatcoin.es/) provides public access to all blockchain information.

Capabilities: Real-time blocks, transaction verification, network metrics, X2/X200 validation, emission tracking.

Privacy vs. Transparency:

DataVisible?Why?
Block existsYesPublic ledger
Transaction amountNoRingCT
SenderNoRing signatures
RecipientNoStealth addresses
FeesYesMiner auditing

Tech Stack: Node.js + Express.js backend, React.js + Tailwind CSS frontend, Redis cache, HTTPS with CDN. 99.9% uptime.



16. Technical Architecture

Core Components:
  • ninacatcoind — Full node (validates chain, mempool, P2P, JSON-RPC)
  • ninacatcoin-wallet-cli — Command-line wallet
  • ninacatcoin-wallet-rpc — JSON-RPC wallet for applications

Network Configuration:
Code:
P2P Port:     19020
RPC Port:     19021
ZMQ Port:     19022
Data Dir:     ~/.ninacatcoin/

Build Dependencies:
Code:
cmake 3.8+, C++17 compiler (gcc 7+ / clang 5+)
Boost >= 1.66, OpenSSL 1.1.1+, libsodium, libzmq, libunbound

Hard Fork Schedule:

VersionHeightFeatures
v11Genesis — CryptoNight PoW
v163,000RandomX, RingCT, CLSAG, Bulletproof+, View Tags
v17TBDRing size increase to 16

Build Security: ASLR (-fPIE), Stack protector (-fstack-protector-strong), CFI (-fcf-protection), Fortify source (-D_FORTIFY_SOURCE=2), Non-executable stack (-z noexecstack).

Test Suite: Unit tests, core blockchain tests, functional end-to-end tests, fuzz testing.



17. Roadmap and Future Development

Near-Term (2026):
  • Hard fork v17: Ring size 11 → 16
  • Mobile wallet (Android/iOS)
  • Open-source mining pool software
  • NinaCatCoin Game (Play-to-Earn): Retro-style arcade game where players earn NINA from the 1,000,000 genesis reserve

Medium-Term (2026–2027):
  • Atomic swaps: BTC↔NINA, XMR↔NINA
  • Payment processor SDK for merchants
  • Enhanced block explorer analytics
  • Game ecosystem expansion and community tournaments

Long-Term Vision:
  • Full Tor integration by default
  • Layer 2 payment channels
  • Continued ASIC resistance monitoring
  • Decentralized game marketplace powered by NINA



18. NINA Intelligence Engine: Embedded AI + LLM

Overview

Ninacatcoin ships with a complete AI system compiled directly into the daemon binary (ninacatcoind). This includes two complementary layers:

  • NINA LLM Engine: A full LLaMA 3.2 3B language model (Q4_K_M quantized, ~1.89 GB) running in-process via llama.cpp. Provides natural language chat, intelligent security analysis, and blockchain event reasoning.
  • Embedded AI Modules: 34 specialized C++ modules organized in 6 tiers, providing real-time security, network optimization, predictive analysis, and privacy enhancement.

This is not an external service or cloud dependency — the entire AI system runs inside the node process with zero external connections beyond the P2P protocol.

NINA LLM Engine (LLaMA 3.2 3B)

The daemon includes a full large language model linked at compile time via libllama and libggml:

Code:
Model:        LLaMA 3.2 3B Instruct (fine-tuned on 3,980 blockchain Q&A pairs)
Quantization: Q4_K_M (4.5 bits per weight)
File:         nina_model.gguf (~1.89 GB)
SHA-256:      416ef260f5f2607d990c92c5517ef0cf60a3e296c02421e4fba8ff34385e7438
Source:       https://huggingface.co/ninacatcoin/nina-model
Training:     QLoRA r=32, alpha=64, 3 epochs, multilingual (EN/ES/FR/DE/PT)

LLM capabilities:
  • Chat interface: Users can talk to NINA directly via the nina_ai_chat RPC command or the Discord bot. NINA responds naturally about blockchain, mining, privacy, and general topics.
  • Security analysis: NINA evaluates network events (Sybil attacks, eclipse attempts, difficulty manipulation) using LLM reasoning combined with embedded ML signals.
  • Deterministic consensus: For consensus-critical decisions, the LLM uses greedy sampling (temperature=0.0) so every node produces identical output.
  • Three operating modes: Active (always in RAM), Lazy (load on demand), Disabled (embedded ML only).

LLM Security:
  • LLM Firewall: Hardcoded filter on all input (blocks prompt injection) and output (strips wallet addresses, private keys, transfer commands). No configuration, no bypass — only recompilation.
  • Constitution: Enforced at compile time via static_assert — NINA cannot create/sign transactions, access wallets, or move funds.
  • Model validation: SHA-256 hash verified at startup. Chunk-based hashing (4 MB). Hash embedded in coinbase tag 0xCA.
  • Auto-download: Model downloaded via libcurl with resume support, retries (up to 3), and progress display. Primary: HuggingFace. Fallback: GitHub Releases.

Embedded AI Modules (34 modules in src/ai/)

The AI performs over 20 distinct functions grouped into five categories:

CATEGORY 1: SECURITY & INTEGRITY

  • AI Code Integrity Verification: Every 60 seconds, the AI calculates SHA-256 hashes of all AI source files and compares them against canonical hashes obtained from 3 independent seed nodes (2/3 consensus required). Any tampering is detected within one minute.
  • Full Binary Integrity Verification: At compile time, CMake hashes ALL source files (.cpp, .hpp, .h, .c) composing the daemon binary and embeds the hash. At runtime, the AI recalculates and compares — protecting the ENTIRE binary, not just the AI subsystem.
  • Financial Isolation Barrier: Hardcoded compile-time restrictions ensure the AI can NEVER create transactions, send coins, or write to wallets. Any violation attempt triggers immediate quarantine with critical alerts. The AI is strictly READ-ONLY for all financial operations.
  • Forced Remediation: If code tampering is detected, the AI automatically downloads clean source from the official GitHub repository, verifies and recompiles it — up to 3 attempts with zero human intervention.
  • Quarantine System: After 3 failed remediation attempts, the node is permanently quarantined: all networking is blocked, mining is disabled, and the node is added to the global blacklist. Only a complete reinstallation can recover.
  • Checkpoint Validation: Advanced hash-level validation of checkpoint files, detecting epoch rollback attacks, modified hashes, replay attacks, and seed desynchronization.

CATEGORY 2: NETWORK INTELLIGENCE

  • P2P Network Optimizer: Scores every connected peer on latency, reliability, block validity ratio, and version. Automatically adjusts peer count based on measured bandwidth, preferring full-chain nodes during sync. Achieves +20-30% sync speed improvement and +15% block propagation.
  • Peer Reputation Tracking: Monitors peer behavior continuously, blacklisting nodes that provide invalid blocks or exhibit malicious patterns. Tiered ban system: 1-hour temporary → 24-hour persistent → permanent.
  • Hashrate Recovery Monitor: Observes the LWMA-1 difficulty algorithm in real time, detects sudden hashrate departures, and validates that EDA (Emergency Difficulty Adjustment) activates correctly.

CATEGORY 3: PREDICTION & ANALYSIS

  • Block Time Predictor: Learns from the last 100 blocks using outlier detection (3-sigma) and moving averages to predict next block time, identify trends, and detect anomalies (timestamp attacks, rapid difficulty oscillations).
  • LWMA Learning Engine: Observes every LWMA-1 difficulty calculation, classifies patterns ("stable", "recovering", "under_attack"), and alerts the network of concerning deviations — all without modifying consensus.
  • Attack Forecasting: Learns from past anomalies to predict future attack patterns (51% attack, eclipse attack, timestamp manipulation, replay attack), assigning probability scores and generating mitigation strategies automatically.
  • Smart Mempool: Analyzes transactions by fee/byte efficiency using structural fingerprinting (not sender addresses, which are hidden by ring signatures). Distinguishes legitimate trading bots from spam, monitors mempool health (HEALTHY/BUSY/CONGESTED/UNDER_ATTACK), and intelligently prioritizes transactions. Does NOT reject any transaction — only re-orders them.

CATEGORY 4: PRIVACY ENHANCEMENT — NINA Ring Enhancer

The Ring Enhancer is a wallet-side AI module that dramatically improves ring signature privacy. It does NOT change consensus rules — transactions enhanced by NINA are fully compatible with standard nodes. No hard fork required.

Five core capabilities:

  • Ring Quality Scoring: Every assembled ring is evaluated on a composite 0-100 scale across four sub-scores: temporal spread (Shannon entropy of time-bucket distribution), block diversity (ratio of unique blocks to ring size), age variance (coefficient-of-variation mapping), and clustering resistance (gap-analysis defense). A ring must pass all minimums: ≥6 distinct blocks, ≥4 of 6 time buckets covered, ≤2 members from the same block.
  • Adaptive Ring Size: Based on the blockchain's RCT output count, NINA classifies maturity as "young" (<50K outputs), "growing" (<200K), "mature" (<1M), or "established" (≥5M), and recommends ring sizes accordingly — ring 11 needs ≥5,000 outputs, ring 16 needs ≥100,000, ring 21 needs ≥500,000. This prevents using Ring 16 when the chain is too young to provide sufficient anonymity sets.
  • Intelligent Decoy Selection: Suggests target block heights for well-distributed decoy selection across 6 temporal zones: 0-100 blocks (~3h), 100-1K blocks (~1.4d), 1K-5K (~7d), 5K-20K (~28d), 20K-100K (~139d), and 100K+ (older). This counters temporal analysis attacks described in Miller et al. (2017).
  • Candidate Ranking: Ranks candidate decoy outputs from best to worst based on their contribution to ring diversity, allowing the wallet to always pick the best available decoys from the UTXO set.
  • Real-Time Improvement Check: Before adding each decoy to a ring, evaluates whether the candidate would actually improve quality — preventing sub-optimal ring assembly.

Academic References: Miller et al. (2017) — output traceability, Goodell et al. CLSAG (2019) — signature efficiency, Möser et al. (2018) — output merging analysis.

CATEGORY 5: INTELLIGENT AUTO-UPDATE

  • NINA IA Auto-Update Orchestrator: Autonomously monitors GitHub for new versions and upcoming hard forks. Analyzes remote cryptonote_config.h and hardforks.cpp to detect changes classified as HARD_FORK, SOFT_FORK, SECURITY_FIX, PERFORMANCE, or FEATURE. Schedules updates during low-activity windows, ensuring the node updates at least 500 blocks before any fork height. Includes full history logging and Discord notification callbacks.

Sandbox Architecture: Total Isolation

The Mini AI operates under strict dual-sandbox confinement:

LayerRestrictionDetails
FilesystemWhitelist onlyOnly /src/ai/, /build/, /blockchain/, /ai_module/ accessible
NetworkP2P protocol onlyPorts 30000-30100, registered peers only. No HTTP, DNS, SSH
Memory2 GB maximumWarning at 95% (1,900 MB), hard limit at 2 GB
CPU2 cores maximumDoes not interfere with RandomX mining

The AI cannot:
  • Read user files, wallet keys, or system data
  • Create transactions, send coins, or write to wallets (Financial Isolation Barrier — any violation triggers immediate quarantine)
  • Connect to external services (no HTTP, no DNS, no cloud)
  • Exceed its memory/CPU allocation
  • Modify consensus rules
  • Be disabled by the user (integral to node security)

Auto-Update via P2P Consensus

The AI self-updates via peer consensus: P2P distributes code hashes → if >60% of peers (min 3) report a different hash, source is downloaded from GitHub, compiled, verified, and deployed. If verification fails, update is aborted with no damage.

6-Tier Advanced Learning Modules

The AI includes six progressive tiers of intelligence (17 classes total):

TierModuleFunction
1Prediction & Forecasting (3 classes)Block time prediction, attack probability forecasting, difficulty trend projection
2Transaction Analysis (2 classes)Anomaly scoring, mempool flood detection, spam ratio
3Network Intelligence (4 classes)Peer reputation, network health, geo-centralization detection, peer clustering
4Optimization & Automation (3 classes)Fee recommendation, consensus parameter suggestions, attack simulation
5Forensics & Security (4 classes)Activity anomalies, behavioral clustering, block forgery, timing attack detection
6Market Intelligence (1 class)Price correlation analysis, emission tracking

All 17 classes coordinated by NInaAdvancedCoordinator — generates intelligence reports every 100 blocks.

Initialization Flow

At daemon startup, the AI initializes sequentially: loads compile-time config → enforces Financial Isolation → loads LLM model (SHA-256 verified, auto-download if missing) → validates AI code integrity (SHA-256 vs 2/3 seed consensus, with ForcedRemediation up to 3 attempts, then Quarantine) → validates full binary integrity → initializes dual sandbox (filesystem + network) → starts all monitoring threads (integrity/60s, LWMA learning, mempool, network optimizer, ring enhancer, auto-update) → initializes 6-Tier modules → state = ACTIVE.

Performance Impact

  • Block sync: +20-30% faster (smart P2P routing)
  • Block propagation: +15% faster (optimized peer selection)
  • Eclipse attack risk: -70% reduced (peer reputation system)
  • Tamper detection: <60 seconds (dual integrity verification)
  • Ring privacy: AI-scored 0-100 with adaptive ring size
  • Resource usage: ~500MB-2GB RAM, 2 CPU cores (does not affect mining)

Why AI Inside the Binary?

Zero external dependencies (no cloud, no API keys), always available 24/7, open source and auditable (LLM on HuggingFace with SHA-256), self-healing from GitHub, consensus-safe (never modifies consensus — only observes and protects), privacy-preserving (sandboxed, no access to user data or wallets).

Ninacatcoin is the first CryptoNote-based cryptocurrency to embed both a full AI security engine and a large language model (LLM) directly in the node binary.



Summary: Why Ninacatcoin

FeatureNinacatcoinMoneroBitcoin
PrivacyRingCT + Ring Sig + StealthRingCT + Ring Sig + StealthPseudonymous only
51% Defense60-min auto checkpoints~33-day manualNone
DifficultyLWMA-1 (60 blocks) + EDASMA (720 blocks)Bitcoin DA (2,016)
Hashrate drop reaction1–2 blocks (EDA)Hundreds of blocks~2 weeks
MiningCPU-first, GPU penalizedCPU-firstASIC-only
Bonus eventsX2 (183/yr), X200 (6/yr)NoneNone
Checkpoint repairAutomaticManualN/A
ASIC resistanceTriple defenseSingle (RandomX)None
Ring size11 (→16 at v17)16N/A
Embedded AIYes (34 modules + LLM 3B, sandboxed)NoNo
Block time120s120s600s
Max supplyInfinite (tail: 0.80 NIA/block)18.4M XMR + tail (0.60 XMR)21M BTC
Genesis reserve1M NINA (game rewards)NoneNone



19. NinaCatCoin Game: Play-to-Earn Rewards

NinaCatCoin is developing a retro-style arcade game that connects directly to the blockchain economy. Players earn real NINA coins by playing — funded from the 1,000,000 NINA genesis reserve (block 0). Not a speculative token or NFT — a straightforward play-to-earn system with full RingCT privacy.

  • Genesis Fund: 1,000,000 NINA in a dedicated wallet, exclusively for game rewards
  • Fair Distribution: Rewards proportional to gameplay effort — no pay-to-win, no loot boxes
  • Privacy: Game rewards are standard NinaCatCoin transactions with full privacy
  • Retro aesthetic: Classic arcade-style, low hardware requirements, open-source
  • Sustainable: Distribution rates calibrated for years of gameplay
  • Onboarding: Games are the most natural way to introduce new users to cryptocurrency
  • Nina's spirit: Fun, playful, bringing joy — the most fitting tribute to her memory

The game is in the design and development phase. Updates on Discord and the official website.



License and Credits

Ninacatcoin is released under the BSD 3-Clause License. It builds upon the work of The Monero Project, CryptoNote, RandomX (tevador), LWMA-1 (zawy12), and llama.cpp (ggerganov).



For developers and users who value true privacy, transparent emission, and decentralized security, Ninacatcoin is a clear and compelling choice.

In memory of Nina (25/05/2014 – 16/02/2019) — generous, kind, and unforgettable. Your kindness lives on in every block.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!