━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
M E M C O I N
A Peer-to-Peer Currency · MEM · 2026
"It's nice how anyone with just a CPU can compete fairly equally right now"
— written into the first block of the chain
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
WHAT MONEY WAS SUPPOSED TO BE
Money began as a perfect idea.
You grow grain. I raise cattle. We do not need to find each other at the same moment, in the same place, with the same immediate need. Money sits between us — patient, neutral, exact — and converts your labor into mine across any distance, any time. It is the most elegant tool humanity ever built. A way to exchange the weight of survival with a stranger, and trust the exchange completely.
That is what money was supposed to be.
What it became is something else entirely. Over thousands of years, through mechanisms so refined they no longer look like violence, money transformed into a system for deciding whose labor is worth recognizing, whose waiting is worth rewarding, and who must surrender everything at precisely the wrong moment. The elegance remains. The blood is just harder to see.
This is not a story of villains. It is a story of mathematics, incentives, and the oldest human instinct: the drive to control what others cannot live without.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THE FIVE SURRENDERS — A HISTORY OF WHO CONTROLS THE PRESS
The First: LaborBefore money, survival was direct. You hunted, farmed, built. The relationship between effort and existence was unmediated. A man who could not hunt starved. A man who could, lived. There was brutal honesty in this. The price of survival was paid in time and body, and everyone paid it personally.
The Second: The Consensus CurrencyTrade created abstraction. Shells from distant coasts, copper, silver, gold — these became money not because anyone declared them valuable, but because no single person could control their supply. A shell carried inland from the sea represents a real journey, real time, real physical effort. The person who made that journey is the person who created that value. This was the first proof-of-work. It was human.
Gold endured for thousands of years for one reason above all others: no one could manufacture it. Kings could not print it. Governments could not dilute it. The supply was finite, unmanaged, resistant to debasement. Large gold mines could be monopolized — and were — but even the most powerful mining operation could not change the fundamental equation: gold required real physical work to exist. People accepted the imperfection of monopolized mines because there was no better option. At least they could still pan for gold in a river. The hope of participation was preserved.
This was not a perfect system. It was simply the least corruptible system humanity had found.
The Third: The Convenience BetrayalGold cannot cross oceans as easily as a message. Commerce outgrew the physical limitations of metal. Central banks emerged — first as warehouses for gold, then as issuers of paper backed by gold, then as issuers of paper backed by nothing but government promise.
People did not want to give up the printing press. They gave it up anyway, because the alternative was watching long-distance trade collapse. They traded minting power for instant payment. They called it progress.
The ledger of this bargain has been settling ever since.
The Fourth: The Lightning in the DarkIn 2009, something appeared that had never existed before. A peer-to-peer currency secured by computation. No central bank. No government backing. No trusted third party. Anyone with a computer could participate in issuance. The printing press was, for the first time in the modern era, theoretically available to everyone.
It was a flash of lightning in the dark. Brilliant, sudden, and — as we now know — not built to last.
Not because the idea was wrong. Because of what happened next.
The Fifth: The Machine TakeoverEarly Bitcoin mining ran on ordinary CPUs. The printing press was genuinely democratic. Then GPU mining arrived. Then FPGAs. Then ASICs — application-specific integrated circuits, machines that exist for one purpose and one purpose only: to compute SHA-256 hashes faster than anything else.
The ASIC did not improve Bitcoin mining. It replaced it.
An ASIC is not a computer. It is a weapon of economic exclusion. It cannot run your operating system, edit your documents, or serve as any general-purpose machine. It is a device that generates heat, noise, and hashrate — and nothing else. The moment you purchase one, your fate is bound to the coin price. If the price falls below your electricity cost, your expensive machine becomes, as has been observed with painful accuracy, a very loud and expensive space heater.
The printing press was supposed to belong to everyone. The ASIC handed it to whoever could afford the largest rack of specialized hardware. A new priesthood emerged — not wearing robes, but running warehouses.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THE MEANING OF WORK — WHY THE SOURCE OF CURRENCY MATTERS
Gold and shells did not become money only because they were scarce. They became money because acquiring them required a human being to spend irreplaceable time and physical effort. The person who carried shells from a distant coast to an inland settlement did not merely transport an object — they converted their own labor, their own hours of existence, into a unit of exchange. The scarcity and the human cost were inseparable. That inseparability is what made the currency honest.
This is the deeper logic behind proof-of-work. When a CPU mines a block, a person's machine — bought with their money, running in their home, consuming electricity they pay for — performs work on their behalf. The hardware is general-purpose. It runs their operating system, their documents, their daily life. Mining is something they choose to do with time and resources that belong to them. The coin produced carries a traceable connection to a real person's real participation. The Memcoin white paper states this directly: a carbon brain drives a silicon chip, runs through time, and relies on luck to find the right bit. This is proof that a mind existed.
The ASIC broke this connection at the root.
A warehouse of ASIC miners requires no participation beyond capital. The owner need not understand the network, use the currency, or have any relationship to it other than investment. The machines run without them. The coins are produced without any human presence beyond the initial purchase decision. What was a conversion of human time into monetary value became a conversion of capital into monetary value — the same transformation that defines every financial instrument the original system was supposed to replace.
Large mining pools completed the separation. When a miner joins a pool, they surrender the individual relationship between their work and their reward. The pool aggregates, averages, and redistributes. The direct line from a specific person's specific machine to a specific block — the thing that made early CPU mining philosophically coherent — dissolves into a statistical share of collective output. The miner becomes an investor in pool performance, not an issuer of currency.
When ordinary people were excluded from issuance by hardware cost, and the remaining issuers had no meaningful personal relationship to the network beyond capital deployment, the value proposition of proof-of-work became structurally hollow. The work was still being done. The proof was being produced. But the human meaning that justified calling it a fair and open system had already been removed.
Memcoin's algorithm is a direct response to this. The 7 GB memory requirement means the hardware must be a general-purpose computer — the same machine a person uses to live their digital life. The serial computation chain means no specialization advantage exists. The CPU-RAM rhythm means the machine is not degraded by participation. Mining does not require a separate device, a separate investment, or a separate identity from the person doing it. The coin produced is connected, once again, to a person who chose to be there.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THE MINING DISASTER — A MATHEMATICAL INEVITABILITY
What happened to small miners was not a crime. It was arithmetic.
When market forces begin driving coin price volatility, early miners face a brutal constraint: they must convert minting power into wealth, or risk losing both. The machine that was their printing press becomes their trap. Electricity bills are denominated in fiat. Mining revenue is denominated in a volatile asset. The spread between them determines survival.
When prices fall, small miners cannot cover operating costs. They sell their machines. Large miners — with lower per-unit costs, negotiated electricity rates, and access to capital — buy those machines. At scrap prices. Because ASICs have no alternative use. They cannot be repurposed. They can only be acquired cheaply by those who survived, and pointed at the same network.
This is the mining disaster. It requires no conspiracy. It needs no coordination. It is simply the natural conclusion of a system where mining hardware has only one function, and that function's profitability is determined by the people who already dominate it.
The result: a small number of large mining operations share control of block production. Pools form, because individual miners cannot sustain the variance of solo mining against industrialized competition. Joining a pool means trusting the pool. Trust the pool, and you have reconstructed the central bank — in silicon, with better marketing.
The people who entered Bitcoin to escape centralized trust ended up extending trust to a mining pool run by strangers. This is not what was promised. This is what the mathematics produced.
The identity of the miner shifted with the economics. The early image — the individual running software on their own machine, ideologically opposed to centralized control — gave way to something unrecognizable by that standard: warehouse operators managing industrial infrastructure, pool administrators processing shares at scale, and investors maintaining confidence in coin price as their primary relationship to the network. The free radical became the system. Not by choice. By the same arithmetic that made the mining disaster inevitable.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THE MYTH OF FIXED SUPPLY — WHO REALLY BENEFITS
A fixed supply cap is presented as the ultimate democratic guarantee. Twenty-one million coins. No more, ever. Everyone benefits equally from scarcity.
This is mathematically true. It is economically dishonest.
Consider what "everyone benefits equally" means in practice:
A worker holds 1 BTC. A fund holds 100,000 BTC. Coins are permanently lost — through forgotten passwords, dead hardware, inheritance failures, custodial collapses. The supply contracts. Both the worker and the fund "benefit" from increased scarcity.
The fund's benefit: thousands of coins' worth of appreciation.
The worker's benefit: a fraction of a coin.
Then the worker loses his job. His rent is due. The appreciation in his 1 BTC does not change the due date. He sells — not at a chosen time, not at a fair price, but at the moment his survival requires. The fund waits. Capital confers the privilege of patience. Labor does not.
The scarcity flows upward. It always does. The system does not need to be designed maliciously to produce this outcome. It only needs to combine a deflationary asset with a world in which most people cannot afford to wait.
And then — the final insult — those who point this out are told they simply do not understand economics. That all holders benefit. That this is neutral, mathematical, fair.
This is not a misunderstanding. This is the correct mathematics being used to justify the wrong conclusion. Using true numbers to tell a false story is not an error. It is a more sophisticated form of deception.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THE DRIFT — FROM PAYMENT NETWORK TO TRADING PRODUCT
As hardware costs made ordinary participation in issuance unviable, minting power concentrated among those who could afford the machines. At the same time, a fixed supply ceiling proved to be an exceptionally attractive property for investors. Scarcity is the foundation of asset valuation. A currency that cannot be inflated, held by a growing number of people who cannot produce more of it, behaves like a commodity with a hard ceiling — and investors recognized this immediately. Capital flowed in not to use the network for payment, but to hold a position in a scarce asset.
These two forces — the exclusion of ordinary participants from issuance, and the arrival of investment capital seeking appreciation — pulled digital currency away from its original function without any deliberate act of redirection. Payment requires stability, low friction, and wide participation. Investment requires volatility, narrative, and scarcity. The network that had been built for the first found itself optimized for the second.
The result was an asset class rather than a payment system. Fees became a secondary concern to holders focused on price. Infrastructure investment followed speculation rather than utility. Ordinary people arrived as buyers in a market, not as participants in a network. The gap between those who issued and those who merely held widened into the same structure digital currency had originally been built to dissolve.
No group drove this outcome. The mathematics of participation costs and the economics of fixed supply produced it together, without any coordination required.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
SATOSHI'S SWORD
Before any of this had happened — before the ASICs, before the pools, before the drift from payment to asset class — one person appears to have seen where it would lead. Satoshi Nakamoto holds approximately one million coins that have never moved. Should consolidation of minting power ever complete — should the network become a more technically sophisticated version of the system it was built to replace — those coins represent a threat precisely targeted at whoever holds the most. The person with little has little to lose. The large holders, the industrial miners, the funds built on the premise of fixed supply: they are the ones the sword is pointed at.
The threat requires no activation and no maintenance. It functions as a nuclear deterrent — its power derives entirely from its existence, not its use. The silence is the agreement.
If the sword is ever used, it means the worst outcome has already occurred. It means the minting power that was briefly returned to ordinary people has been fully recaptured — that the network built to replace centralized monetary control has become a more precise, more technically sophisticated, and more structurally stable instrument of that same control than anything that existed before it. A system harder to audit than a central bank, harder to reform than a government, and more resistant to challenge than any monetary authority in history.
In that event, Satoshi may choose to destroy what he built. Not as punishment, but as the last available act of institutional design — to collapse a captured system and return the question of money to an open state. To give people the chance to begin again. The cost would be real. The disruption would be significant. But the alternative — a monetary capture mechanism of unprecedented precision, running indefinitely, with no correction possible from within — is worse.
The sword was forged for humanity, not against any particular holder. That is what makes it the most consequential single act of monetary design in recorded history.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THE BATTLEFIELD RETURNS
The struggle for minting power has always been a contest between small numbers of people. Most people do not understand it. Most people cannot participate in it. Those who were drawn in by the original proposition of decentralized peer-to-peer currency and never abandoned it found themselves on the losing side of that contest — minting power concentrated, the network they helped build moved away from what they believed it should be. At the same time, the rising value of what they had mined early freed them permanently from the pressure of survival. They lost the minting power. They kept the wealth.
That condition has changed. The algorithm determines who can participate, and the algorithm has been rewritten. The hardware required is a standard PC. The memory required is already installed.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THE TECHNICAL ANSWER — HOW PHYSICS REPLACES POLICY
I. The Algorithm That Cannot Be IndustrializedMemcoin's proof-of-work algorithm, Yesmem, requires 7 GB of RAM per mining thread. This number is not arbitrary. It is derived directly from the algorithm parameters:
128 × N × r = 128 × 1,835,008 × 32 = 7,516,192,768 bytes ≈ 7 GB
Seven gigabytes exceeds the VRAM of most consumer GPUs. A GPU cannot run this algorithm. A standard PC with 16–32 GB of system RAM can run it without displacing any existing workload — one thread mines while the rest of the machine operates normally.
Within each mining iteration, a 100-round serial multiplication chain is inserted after every random memory access. The chain is strictly sequential — each round takes the previous round's output as its only input:
x(n+1) = x(n) × 6364136223846793005 + 1442695040888963407
x(n+1) ^= x(n+1) >> ((x(n+1) >> 59) + 5)
This data dependency cannot be parallelized. SIMD instructions provide no advantage. A GPU core executing this chain performs identically to a CPU core: one round at a time, in order, at the speed of its serial execution path. The algorithm forces GPU cores into serial operation and further constrains them with the 7 GB VRAM limit. A single consumer GPU can run two or three threads at most, regardless of core count.
Three constraints operate simultaneously and reinforce each other, forming a closed optimization space with no available exit:
Memory capacity sets the thread ceiling. No matter how fast the computation runs, the number of concurrent threads cannot exceed available RAM divided by 7 GB. This is a physical limit, not a software parameter.
The serial multiplication chain eliminates all parallel acceleration paths. SIMD instruction sets, GPU multi-core execution, and FPGA pipelines all degrade to single-core serial speed. Each multiplication round requires the output of the previous round — the dependency is strict and cannot be broken without breaking the computation. At 3–4 clock cycles per round across 100 rounds, the chain runs at approximately 300–400 cycles per iteration, near the physical limit of integer multiplication latency on current silicon.
The read-write coupling eliminates prefetching and cache reuse. The chain's output determines the address of the next memory write. Until the chain completes, that address is unknown. The prefetch window is zero. The scratchpad changes continuously and cannot be reused across iterations.
Each iteration therefore consists of two serial components that cannot be reordered or overlapped:
Memory access: ~70 ns — bounded by DRAM physical latency
Serial mul chain: ~100 ns — bounded by CPU integer mul latency
Total: ~170 ns — ~5.9 million iterations/second/thread
Both figures are near the physical boundaries of current semiconductor manufacturing. This is not a software efficiency problem. It is the direct consequence of three constraints that cannot be individually broken without destroying the others. The algorithm does not resist optimization through complexity. It resists it through physics.
This symmetry has a structural consequence. In most proof-of-work systems, mining is expensive and verification is cheap — a full node can validate a block in milliseconds without specialized hardware. This separation is what allows mining to concentrate: the people who verify the chain are not the people who produce it, and the people who produce it require industrial hardware that most people cannot access.
In Yesmem, mining cost and verification cost are the same. Validating a block requires the same 7 GB and the same computation as producing one. Every node operator is a potential miner. Every miner is already running a full node. The chain cannot be maintained by one class of participants and produced by another — because the hardware requirement for both is identical. Separation is not possible. Concentration has nowhere to root.
There is no ASIC for this algorithm. The memory access is random. The computation is serial and dependent. The two components are coupled — removing either breaks the result. Specialization cannot simplify what randomness and dependency have made inherently complex.
The CPU-RAM rhythm — approximately 70 ns of memory access alternating with approximately 100 ns of serial computation — means neither component is continuously saturated. RAM duty cycle drops to ~41%. Long-term mining does not degrade hardware. The machine breathes. The algorithm is designed as a guest, not an occupant.
Mining and ordinary computer use run concurrently. The marginal cost of participation is the electricity already consumed by a machine left on.
I-B. The Diminishing Returns of Capital — Why More Memory Does Not Mean More PowerYesmem contains a property that no amount of capital can circumvent: the marginal return on additional memory threads decreases continuously as thread count increases. This is not a rule. It is a consequence of the memory controller — the hardware component that manages concurrent random-access requests — reaching saturation. Each additional thread competes for the same queue, waits longer, and contributes less.
The measured data across four common PC configurations illustrates this directly:
Memory Usable Optimal Total Per-thread
Config for mining threads hashrate efficiency
──────── ───────── ──────── ───────── ──────────
16 GB 12 GB 1 thread 0.285 H/s 0.285 H/s (baseline)
32 GB 28 GB 4 threads 0.776 H/s 0.194 H/s (68%)
64 GB 60 GB 8 threads 1.024 H/s 0.128 H/s (45%)
128 GB 124 GB 17 threads 1.156 H/s 0.068 H/s (24%)
The consequence for fairness is significant. In most cryptocurrency mining, hardware investment and hashrate scale linearly: ten times the expenditure produces ten times the output. In Yesmem, ten times the memory expenditure produces four times the hashrate, and the gap continues to narrow as scale increases.
A single-threaded 16 GB machine is the most energy-efficient unit of currency issuance the algorithm produces. It is also the most accessible. The person running one thread on an ordinary computer is not at a structural disadvantage relative to any other participant — they are operating at the algorithm's highest per-unit efficiency point. The machine that already exists, already consumes electricity, and requires no additional investment is the optimal mining configuration. Capital cannot improve on it.
This is further reinforced by how Yesmem interacts with normal computer use. The algorithm occupies memory capacity and consumes random-access latency — resources that most everyday tasks do not compete for. Web browsing, document editing, and video playback operate on working sets small enough to be handled entirely within CPU cache, with no meaningful contact with the memory controller queue that Yesmem uses. The result is that for the majority of normal computer activity, mining runs invisibly in the background.
Task Impact from concurrent Yesmem mining
────────────────── ─────────────────────────────────────
Web browsing None — working set fits in CPU cache
Document editing None — working set fits in CPU cache
Video playback None — sequential access, no queue competition
Code compilation Slight (~5–10%) — some random access overlap
Gaming Moderate (~10–20%) — higher random memory demand
Virtual machines Noticeable (~20–30%) — large competing memory footprint
For the overwhelming majority of users, mining is a background process that does not produce any perceptible effect on normal computer use. This is categorically different from CPU-bound mining algorithms, where full processor utilization renders a machine effectively unusable during mining. Yesmem uses less than 10% of CPU capacity. The machine remains fully available. The only resource committed is the 7 GB of RAM per thread — memory that sits allocated but idle between computation phases, drawing power the machine was already consuming.
The person who mines one thread on a 16 GB machine loses 7 GB of allocatable RAM and gains a currency issuance process that runs without interfering with anything else they do. That is the practical meaning of the white paper's opening line: anyone with just a CPU can compete fairly equally — not only because the algorithm is equitable, but because participation requires nothing beyond what the machine already does.
When the hardware advantage is bounded, and the cost structure favors the machine that already exists, what remains is the same condition that governed every monetary system built on physical work: the next block belongs to whoever is patient enough to keep running, and lucky enough to find it first.
This is the condition that governed the first monetary systems humanity ever built. Whoever had the patience to travel to the coast, and the luck to return safely with shells, held the right to issue currency. Not because anyone granted it. Because the journey itself — the time spent, the distance covered, the risk accepted — was the proof of value that a community could recognize without an institution to interpret it. The shell was not valuable because it was scarce. It was valuable because everyone understood what it cost to bring it home.
The algorithm returns to this. Patience and luck, running on a machine that already exists, in a home that is already powered. The proof is the same. Only the journey has changed.
I-C. Hardware Fairness — The Gap That Defines the SystemThe fairness of a mining algorithm can be measured directly: what is the hashrate gap between a consumer PC and the most powerful hardware that can run it?
The historical record:
SHA-256 (Bitcoin): consumer CPU vs ASIC = 1,000,000×
Scrypt (Litecoin): consumer CPU vs ASIC = 1,000×
Yesmem (Memcoin): consumer CPU vs best server = 8×
ASIC: does not exist
8× is a categorically different order of magnitude.
GPU: VRAM capacity and random-access latency provide no advantage. The algorithm cannot be effectively run on consumer graphics hardware.
FPGA: on-chip memory is far below 7 GB. High-end external memory configurations are theoretically possible but at extreme cost, with performance below server-class CPUs.
ASIC: integrating 7 GB of SRAM into a single chip would cost on the order of tens of billions of dollars. Physically unrealistic.
The only hardware with a meaningful advantage is multi-channel server CPUs (AMD EPYC, Intel Xeon), where more memory channels allow more concurrent random-access requests. The ceiling is approximately 8×.
Memory Generation ParityYesmem's bottleneck is random-access latency, not memory bandwidth. DDR4 random latency is approximately 70 ns. DDR5 random latency is approximately 75 ns — marginally worse. DDR5's bandwidth advantage (roughly 2× over DDR4) is irrelevant to an algorithm where every access independently hits DRAM latency and the prefetcher is fully defeated by random addressing.
Upgrading from DDR4 to DDR5 produces no meaningful hashrate improvement. Memory generation advances do not alter the competitive position of consumer hardware.
Cost Analysis — Does the 8× Advantage Survive Economics? Consumer PC Owned Server AWS r6i.xlarge
(32 GB DDR4, 2ch) (EPYC, 256 GB, 8ch) (32 GB, on-demand)
──────────────────── ───────────────── ─────────────────── ──────────────────
Hashrate multiple 1× ~8× ~1×
Usable threads ~4 ~32 ~4
Hardware cost ~$1,000 ~$10,000 $0
Monthly amortization ~$28 (36 months) ~$278 (36 months) $0
Monthly electricity ~$12 (marginal) ~$37 ($0.17/kWh) —
Monthly rental — — $184
Monthly total cost ~$40 ~$315 $184
Cost per 1× hashrate $40 $39 $184
The owned server achieves 8× hashrate at 8× the cost — the advantage is fully absorbed by hardware and power expenditure. Cost per unit of hashrate is identical to a consumer PC.
The cloud instance (AWS r6i.xlarge, us-east-1, Linux, on-demand) matches consumer PC specs and hashrate exactly, at 4.6× the monthly cost. There is no cloud deployment scenario in which the economics are competitive with a consumer PC whose marginal mining cost is electricity already being paid.
The consumer PC's structural advantage is not hardware performance. It is that the machine already exists, is already powered, and mining adds nothing to its cost except the electricity it was already consuming. This cost structure cannot be replicated by any dedicated mining deployment.
II. Why Large Pools Cannot Form — The Mathematics of Pool EconomicsA mining pool must verify every share submitted by its miners. In Yesmem, each share verification requires the same 7 GB of dedicated memory as mining itself, and cannot be shared across concurrent verifications. As pool size grows, verification memory cost grows in direct proportion — with no efficiency gain at any scale.
According to our calculations, pools of a few hundred miners represent the practical limit of any scale advantage. Beyond that point, the infrastructure cost of verification outpaces the economic benefit of pooling, fees rise to compensate, and miners migrate to smaller pools. Large pools are not forbidden by protocol. They are simply not viable by economics.
The decentralization of mining is produced by physics, not policy.
III. The Payment System — Security From the Future, Not the PastEvery traditional blockchain payment system derives its security from history. A transaction is safe when enough blocks have been stacked on top of it to make reversal prohibitively expensive. You wait for confirmations. Security is probabilistic, not absolute.
Memcoin's instant payment system inverts this model entirely.
TX1 — the payment transaction — creates CLTV-locked outputs assigned to the recipient. When TX1 enters the mempool, the sender's funds are cryptographically frozen. The sender cannot redirect them. Cannot replace them. The payment does not wait for history to validate it. It borrows certainty from the future — the lock is mathematically guaranteed to resolve, and from the moment TX1 enters the mempool, the funds are irrevocably the recipient's. The intervening blocks are not confirmation. They are simply time elapsed — the period during which certainty borrowed from the future is returned, guaranteed by mathematics alone, not by trust in any party.
When TX1 enters the mempool, the sender permanently relinquishes control — the payment irrevocably belongs to the recipient from that moment. After approximately three days, the lock expires and the recipient may spend the funds freely at any time, to any address, at zero cost.
Memcoin has two distinct transaction types:
Standard transactions work the same as any other blockchain — fees apply, confirmation is required before funds are available, and once confirmed, funds are immediately usable with no restrictions.
The instant payment system uses two transactions: TX1 and TX2. TX1 is the locking transaction — the sender commits funds to a specific recipient, denominated in one of seven standard values, with a time lock of approximately three days. A single TX1 can only be issued to one recipient — all locked outputs within the transaction must share the same destination address. All seven denominations can be combined to express any integer amount exactly. Once TX1 enters the mempool, the payment is final and the sender permanently relinquishes control. TX2 is how the recipient moves those funds after the lock expires — zero fee, confirmed in one block, immediately usable, transferable to any address without restriction. The denominations and the time lock apply only to TX1. Once TX2 confirms, the funds are ordinary spendable outputs with no further constraints.
The design can be understood by analogy to a cheque: TX1 is the act of writing and committing funds, TX2 is the act of spending them. But unlike a cheque, TX1 is not a promise — the funds are frozen the moment it enters the mempool. And unlike a cheque, there is no expiry. The recipient may spend at any time after the lock expires, for as long as they hold the private key.
IV. The Ledger's Self-Repair — What Gold Has That Fixed-Supply Currencies Do NotGold has survived as a monetary instrument for thousands of years. Part of its resilience is physical: lost gold does not disappear. A ring sinks to the ocean floor — it is still there. A coin is sealed in a wall — it is still there. Technology improves, wreckage is found, old caches are recovered. The supply is not managed, but it is not permanently diminished by loss. It simply is.
Digital currency loss is categorically different.
When a private key is lost, the coins it controls do not disappear from the ledger. They remain recorded, exactly as they were, in perfect fidelity. But no human or machine will ever move them. They are visible but permanently unreachable. Unlike physical gold, they cannot be found, melted, or repurposed. They wait at a known address, for a key that will never return.
A fixed-supply currency with permanent loss is not stable. It is an asset on a one-way path toward increasing concentration in fewer hands, as the total accessible supply silently contracts. Scarcity flows upward. Always.
Memcoin's Stage 4 permanent floor reward addresses this directly:
Emission schedule:
Stage 1 (Year 0–3): 50 MEM/block · blocks 0–157,499 · 7,875,000 MEM issued
Stage 2 (Year 3–6): 25 MEM/block · blocks 157,500–314,999 · 3,937,500 MEM issued
Stage 3 (Year 6–9): 12.5 MEM/block · blocks 315,000–472,499 · 1,968,750 MEM issued
Stage 4 (Year 9+): 7 MEM/block · block 472,500+ · 367,500 MEM/year (fixed, permanent)
Equilibrium supply = 367,500 ÷ 0.015 ≈ 24,500,000 MEM
(at 1.5% annual loss rate assumption)
Net inflation path (Stage 4, based on estimated circulating supply):
Year 9: ≈1.17%
Year 29: ≈0.72%
Year 49: ≈0.47%
Year 89: ≈0.22%
Equilibrium: → 0%
Gold net inflation: ~1.45% (historical record)
Memcoin long-run: asymptotically → 0%
The first three stages are not inflation in the economic sense — they are the currency issuance phase, a predetermined and auditable schedule during which the total supply is established. Every number in this phase is fixed by protocol and known in advance.
After Stage 3, the annual issuance becomes fixed at 367,500 MEM — the permanent block reward across all subsequent years. From this point, the inflation rate is no longer determined by issuance, which is constant, but by actual circulating supply, which is determined by human behavior over time.
Nominal total supply and actual circulating supply are not the same number. A coin sent to an unreachable address is recorded on the ledger but does not function as money. Gold on Earth is finite. Gold in the universe is unknown. The inflation rate applied to gold is calculated against actual circulating supply — the gold that moves, not the gold that exists in principle. Memcoin follows the same logic.
Gold's inflation rate is derived from historical mining records. It describes what has happened, not what will happen. Future gold supply depends on discoveries, extraction technology, and economic conditions that no model can reliably predict. The figure of ~1.45% is an observation, not a guarantee.
Memcoin's inflation rate after Year 9 is not a prediction made by any institution. It is a calculation anyone can perform: fixed annual issuance divided by observed circulating supply. What the historical inflation rate of MEM over any given decade describes is not economics — it is the aggregate behavior of the people who used it. How much they lost. How much they held. How much they spent. These are measurements of human behavior at scale. And because human behavior at scale tends toward statistical consistency, a decade of observed inflation rate gives a reliable basis for projecting the next several decades — not as a forecast, but as a reflection of how people actually interact with money over time. No expert is required to interpret this. No institution is required to publish it. The chain is auditable. The issuance is fixed. The arithmetic is open to anyone.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
V. Network Governance — One Parameter, No CommitteeMemcoin has no committee, no foundation, and no on-chain voting contract. The single governance channel is
mempoolminvalue.
Each node operator sets this parameter independently through their configuration file. The default is 10 bit. Any TX1 whose total CLTV value falls below the local threshold is rejected at mempool entry — it does not propagate, does not reach miners, and does not consume network resources. This is the primary defense against zero-fee spam attacks on the instant payment system. This parameter applies exclusively to TX1 transactions. Standard transactions with fees are unaffected.
The parameter has two functions, and they do not interfere with each other.
The first is routine: filtering low-value TX1 transactions to protect block space from zero-fee spam. Each operator sets this according to their own judgment. It is a local decision with no relationship to what anyone else does.
The second is optional: when a community disagrees on anything — a protocol parameter, a technical direction, or any question the community decides is worth settling — mempoolminvalue can serve as an expression platform. The question can be anything. A technical upgrade. A community position. Who is the most beautiful person in the world.
To use it as a governance signal, a proposer announces a question, a signal value, and a starting block height. Supporters set their local threshold above the signal value before that height. The proposer broadcasts one signal TX1 per block for 144 consecutive blocks. Each block either includes the transaction or rejects it. For each signal TX1, the proposer records whether the immediately following block includes it. A block that skips it is counted as a rejection — not because the transaction is lost, but because that block's miner chose not to include it. The transaction remains in non-supporters' mempools and confirms in a later block. The count measures each block's mining policy, not final settlement.
An example. The community is debating whether Alice is the most beautiful person in the world. Someone says: stop arguing, let the blocks decide.
The proposer announces: signal value 23 bit, starting at block #1000. Those who believe Alice is the most beautiful person set their mempoolminvalue to 25 bit before block #1000. Those who disagree do nothing.
For 144 blocks, the proposer broadcasts one 23 bit TX1 per block. A supporter's block cannot include it — the transaction never entered their mempool. An opponent's block includes it normally. After 144 blocks, anyone can download the chain, find the proposer's transactions, and count.
98 rejections, 46 confirmations. 98 ≥ 96. The blocks have spoken.
This result does not mean Alice is objectively the most beautiful person in the world. It carries no enforcement power. No one is compelled to change their mind. What it means is that during those 144 blocks, more than two thirds of the network's hashrate — the people actually running the machines — cared enough to open their configuration file and change one line. A forum post requires nothing. This requires that you actually meant it.
The mechanism has three properties worth stating directly. The result is objective: any person who downloads the chain and counts independently arrives at the same number. The result is not executable by anyone: no code triggers automatically, no committee interprets the outcome, and no one can force another operator to change their configuration. And the cost is real but minimal: the proposer prepares 144 TX1 transactions, all of which will eventually confirm and lock funds for approximately three days, after which the proposer may spend them freely via TX2. Supporters modify one line. The true barrier is not economic. It is whether enough people care enough to act.
The propagation result of a TX1 is the vote count.
Individual node configuration is the ballot.
No other mechanism is required or exists.
The governance window is the TX1 broadcast phase. Once TX1 confirms on-chain, the result cannot be reversed — it is an immutable chain fact with no ambiguity.
No system in history has measured collective opinion this precisely. A forum post costs nothing and means nothing. A signature can be forged. A vote can be bought. Here, the signal is energy — real electricity, consumed by real machines, operated by real people who chose to act. The result is a number on a chain that no one controls and no one can alter. Two thirds of the hashrate, measured across 144 blocks, with a margin of error below one in a hundred thousand. Mathematics has no tolerance for ambiguity. Neither does this.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THE PHILOSOPHY IS FIXED. THE IMPLEMENTATION IS FREE.
Every "decentralized" project eventually faces the same question: who controls the code?
The answer, in almost every case, is: a foundation, a core team, a committee of developers who decide what enters the official repository. These people are not elected. They have no term limits. They answer to no constituency. They are, functionally, the central bank of the network they maintain.
Memcoin's answer is structurally different.
The design philosophy is fixed. The goals do not change. CPU-accessible mining. Zero-fee instant payment. No premine. No governance fund. A ledger that repairs itself. These are not parameters — they are intentions, and intentions do not version.
The technical implementation is free. Anyone may write software that implements this protocol. Anyone may distribute it. Users choose which software to run. Miners choose which software to mine with. The network decides, through the blocks it accepts and rejects, which implementations it recognizes as valid.
There is no official repository that controls the network's future. There is no team that can be pressured, acquired, or regulated into changing the protocol's direction. The white paper is simple enough that any competent developer can implement a complete node from scratch. This is not an accident.
Complexity is the most elegant form of gatekeeping. A protocol only its creators can implement is a protocol only its creators control.
Parameters adjust as the world changes. The 7 GB threshold exists because ordinary computers can compete at that level today. If home hardware changes, the threshold changes with it — through consensus, not committee. Miners run new software. Users accept new blocks. No foundation required. The goal does not change. The numbers serve the goal.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
SIMPLE IS POWERFUL — THE ONLY BATTLEFIELD THAT MATTERS
Since Ethereum's EVM, the cryptocurrency industry has been in continuous flight from simplicity.
Smart contracts. Token standards. Decentralized finance. Non-fungible assets. Layer-2 networks. Cross-chain bridges. Liquidity pools. Governance tokens. Each new layer adds complexity. Each layer of complexity requires specialists to navigate it. Each class of specialists extracts value from those who cannot navigate it alone.
The result is an industry that looks nothing like the peer-to-peer payment network Bitcoin's white paper described. It looks like a digital replica of the financial system it was supposed to replace — complete with its own investment instruments, its own class of intermediaries, and its own speculative markets where the primary activity is not transacting but trading claims on future price.
A stock exchange does not challenge minting power.
A decentralized exchange does not challenge minting power.
A liquidity pool does not challenge minting power.
Payment challenges minting power.
When ordinary people use a currency to buy food, pay rent, and settle debts — when the currency functions as the daily medium of exchange for millions of people who are not speculators — the entity that controls that currency's issuance holds real power over real survival. Only payment changes that equation.
Memcoin is finished. There is no roadmap because the destination has already been reached. A currency that moves value from one address to another, secured by computation and memory, with a zero-fee payment system, a mining algorithm that any ordinary computer can run, and a slow correction built in for the damage that time inevitably causes.
Read the white paper in an afternoon. Understand every part of it. This is intentional.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THE NUMBERS THAT MATTER
10,000 miners. 3 threads each. 7 GB per thread.
This is the threshold at which the Memcoin network becomes resistant to attack by any entity that is not a large nation-state or major corporation with access to extraordinary physical infrastructure. The 51% attack cost scales linearly with network size — every attacking thread requires its own dedicated 7 GB of RAM, no sharing possible. Large-memory cloud capacity is finite, largely committed, and cannot be rapidly redirected to an attack without the attack becoming visible and addressable.
10,000 people with ordinary computers — computers they already own, electricity they are already paying for — can build and maintain a payment network that operates without any third party, at zero cost per transaction, with mathematical security guaranteed upon broadcast.
This is not a proposal. This is arithmetic.
Ticker: MEM
Algorithm: Yesmem (memory-hard, CPU-native, GPU-resistant)
Block time: 600 seconds
Max block size: 32 MB (zero-fee guarantee)
Memory per thread: ~7 GB
Difficulty: ASERT (aserti3-2d), 2-hour half-life
Stage 1: blocks 0–157,499 · 50 MEM/block
Stage 2: blocks 157,500–314,999 · 25 MEM/block
Stage 3: blocks 315,000–472,499 · 12.5 MEM/block
Stage 4: block 472,500+ · 7 MEM/block (permanent)
Total Stage 1–3: 13,781,250 MEM
Equilibrium supply: ~24,500,000 MEM (emergent, not enforced)
Address prefix: M (Base58Check, version byte 50)
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
A CLOSING THOUGHT
The history of money is the history of who controls the press.
Shells were democratic until the trade routes were monopolized. Gold was honest until the mines were owned. Paper was convenient until the banks were captured. Bitcoin was free until the ASICs arrived.
Each time, the tool that was supposed to liberate became a new instrument of the same old dynamic. Each time, the mechanism of capture was identical: concentrate the cost of participation until only the already-powerful can afford to participate. Then tell everyone that this is neutral. Mathematical. Fair.
It is fair in the way that a race is fair when some runners start at the finish line.
Memcoin does not promise liberation. No technology can promise that. What it offers is different in kind: an algorithm whose physical properties make concentration structurally expensive, a payment system whose security is mathematical rather than probabilistic, a supply model that acknowledges human fallibility rather than ignoring it, and a protocol simple enough that no specialist class is required to understand or implement it.
The minting press, this time, costs 7 GB of RAM and whatever electricity your computer was already consuming.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
RESOURCES
White paper: memcoin-whitepaperMiner: memcoin-minerWallet: memcoinBootstrap: memcoin-bootstrapSeed nodes (temporary — for initial network bootstrap):
addnode=34.121.201.141:9333
addnode=34.22.180.125:9333
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
There is no official website. There is no official community. There is no team.
If you want a community, build one. If you want a better wallet, write one. If you want a better miner, write that too. Publish it under your own name, in your own repository. The protocol belongs to no one. The white paper is the specification. Any implementation that follows it is valid. Any improvement that the network accepts becomes part of the network.
This coin has no center. You can do anything you want to do.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Memcoin (MEM) · 2026
A peer-to-peer currency. Complete by design.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━