IRON FISH. Putting back the power of choice!
- Privacy is everyone's right.
- What is an Iron Fish. What are the goals of the project.
- What advantages does Iron Fish have over other cryptocurrencies.
- Why Iron Fish is a unique project for Web3.
- How Iron Fish protects your privacy.
- Why privacy really matters.
- How the network works.
- Types of messages.
- Iron Fish Resources.
Regardless of the controversy surrounding this issue, it is confidenity itself that leads to innovation and social evolution. For example, passwords on a bank card, a safe deposit box code, or a lock on a house door are all security measures used by most people, even if they do not have anything to confide in.
What is an Iron Fish. What are the goals of the project
The world demands private cryptocurrency. All of us are moving towards becoming a digital society where every activity and purchase is recorded, scrutinized and sold. Confidentiality is now more important than ever. Project developers follow modern trends, which is why Iron Fish was created - a decentralized, universally accessible and censor-resistant blockchain project based on proof-of-work (PoW).
The main idea of Iron Fish is to provide guarantees of confidentiality of each transaction. The creation of digital security protocols SSL/TLS in the 90s contributed to the emergence of electronic commerce. This development benefited a large number of industries. As of today, the most important factor in the protection of users and the expansion of cryptocurrency capabilities, as well as the emergence of a new class of industry of goods and companies without barriers is confidenciality.
What advantages does Iron Fish have over other cryptocurrencies
Today, such popular cryptocurrencies as, for example, Bitcoin or Ethereum are used mainly as a protective mechanism against inflation, an instrument for saving money and their transfer. However, they lack confidenciality and speed of transfer of transactions. These cryptocurrencies have high fees. Also, Bitcoin and Ethereum are the most private ways of crypto-transactions due to their protocols for transferring orders.
Of course, there are other privacy coins, but they do not meet the guarantees provided, or are so difficult to use that they are not really popular among users.
While Iron Fish was built from the ground up to ensure ease of use and enable fully private transactions, while respecting the Sapling protocol. It is also important that each Iron Fish record has its own key for review. By giving it to the user, the user can gain access only to its review.
Iron Fish greatly simplifies the process of establishing true P2P connectivity without requiring any setup requirements from the users. The first implementation of Iron Fish is built in such a way that in further iterations you can expand it to run the full site directly in the middle of the browser. Thanks to this, significantly reduces the time of entry, and therefore each user on a PC, tablet or smartphone can feel comfortable when running a full web browser.
Why Iron Fish is a unique project for Web3
Let's imagine that most popular cryptocurrencies are like a ledger where all the details of transfers are transmitted. This is the same as posting a bank statement on Twitter. It doesn't sound very safe, does it?
Confidenciality in the world, which is certainly in the direction of digitalization, is the most important factor for a true global currency
The use of other coins in the network, such as Monero, Zcash and Grin - is a loud and difficult process both for the miner and for the end user. In addition, these coins have shortcomings in ensuring the protection of personal data.
Iron Fish developers immediately refused to compromise on confidentiality, keeping their cryptocurrency accessible and easy to use. Thanks to this, each user has access to private money.
How Iron Fish protects your privacy
In the course of a comprehensive study of Proof-of-Work (PoW), Proof-of-State (PoS) and Delegated Proof of Stake systems, developers have identified a few really important patterns:
- PoW systems are more secure.
- They have a better understanding of the attack vectors.
- Have an effective patch to achieve decentralization.
While PoS systems may sometimes improve UI/UX and decrease blocking time, but their disadvantages far outweigh their benefits
The developers of the project work with state-of-the-art cryptography, using an interactive cryptographic protocol with zero-knowledge. It allows one of the parties to verify the truthfulness of any statement without possessing the information of the other party.
Zero-Point Proofs (ZPK) is an innovative cryptographic tool that verifies the veracity of calculations. With its help it became possible to create private transactions, which fully preserve data about originator, beneficiary and amount of order. At the same time, ZPK provides proof that the transaction is real. Every transaction at Iron Fish is private - no one can see the details of the record.
The only exception is when the owner provides a special key for access to view the information
This level of confidentiality is unprecedented compared to other cryptocurrencies or classic bank operations.
Currently, there are more than 4 million Internet users and about 2 billion computers connected to the worldwide network. However, there are only about 10,000 fully active bitcoin nodes. Due to the fact that most of the cryptocurrencies were created by engineers for engineers, the rate of entry of the users has significantly increased. Iron Fish believes that it is possible to achieve truly decentralized money only by increasing their participation and use in the network.
An important part of every blockchain is its measure level. It is essential for maintaining the functions that make the platform protocol unique. Specifically, the measure level dictates the nature and type of interaction between nodes, which transport levels they can use for communication, how they relay messages to other peers, and how they record and respond to specific messages.
When creating a decentralized peer-to-peer P2P system, it is important that the network addresses translation (NAT). Most computers, laptops, tablets, and smartphones on the network are behind routers and firewalls, making direct connections with peers much more difficult. This is where the level of flexibility comes in.
To solve possible problems with NAT, other networks require the user to configure port forwarding in the router. However, the developers of Iron Fish made the measure more accessible by using a combination of WebRTC and WebSockets in the transport layer. They use many methods to establish direct communication between nodes.
In other words, the implementation of the Iron Fish node works out of the box, or in the CLI environment, or even indirectly in the browser. This allows any user to use Iron Fish, regardless of its technical capabilities
When a station is started for the first time, it must know at least one other station that can be connected to. The last one is called the loading station and is the transit point. Initial connection to the destination node is made through WebSocket, and all peer connections use WebRTC.
Notifications in the Iron Fish measure level is a narrow format of data that is transmitted between pairs. There are several types of internal messages and the way they interact with nodes:
- Identification: notifications that help the players to identify themselves to others.
- Signaling: notifications used to signal the start of communication between two peer-to-peer nodes in real time (RTC).
- List of peers: a notification containing a list of peer nodes to which a particular node is currently connected.
- Cannot Satisfy Request: a notification that signals that a failure has occurred.
The world is changing, and the world of cryptocurrencies is changing even faster. Today, anonymity of transactions is not enough for a feeling of complete safety. Iron Fish offers a new level of security, as modernity demands. This cryptocurrency protects both the personal information of the user and details of his or her transfers. However, if there is a need to verify transactions, the user can give a key to view this information. This is convenient and safe.
https://ironfish.network/
https://twitter.com/ironfishcrypto
https://discord.gg/YDVrRSwQDq
https://ironfish.network/blog
https://docs.google.com/spreadsheets/d/1KoJBd3WYmjBcwX-EGfshDQ4tDHxtNo0O8KFlfZ8d0jg/edit#gid=1283773986