A Sybil attack describes a scenario where an attacker subverts a reputation-based system by creating multiple identities. Read on to discover how Encointer uses a real-world web of trust to...
Continue readingEconomically deprived areas often struggle to generate growth. People have skills and products to sell, but lack the purchasing power to buy from others.
Encointer’s free, easy-to-use technology enables any community to generate their own currency and distribute it regularly and equally among all active participants to boost local economic activity.
Encointer provides a way to increase the local money supply and keep it circulating. The value of each community currency is determined by local supply and demand, rather than changeable macroeconomic factors.
Each Encointer currency is subject to demurrage, which means that if you store it in an account, the value will decrease each month. This encourages all participants to spend rather than hoard their Encointer income, so everyone benefits.
Each participant attends regular physical key-signing events to show that they are a unique person, which prevents anyone from claiming multiple incomes. In this way, the Encointer protocol establishes a community web of trust without demanding proof of identity.
Around 1 billion people have no official proof of identity, according to World Bank data. That’s no barrier to using Encointer, because no state-issued ID is required. Encointer income is accessible to any human with a smartphone.
Encointer community currencies are distributed unconditionally, at regular intervals, to all active participants. But if anyone can join and nobody needs an official ID, how is misuse prevented? For example, how can users be sure that an individual participant cannot claim the currency twice under two different identities?
Encointer’s unique, practical identity system is based on the fact that a person can only be in one place at one time. Here’s how it works:
Every participant agrees to make themselves available in person for key-signing meetups, which are held simultaneously at regular intervals in all locations.
Each time a key-signing event occurs, random selections of participants meet at random locations in the community to prove that they are unique individuals.
This requirement to prove personhood on site makes Encointer more secure, ensuring that so long as the majority of a community is honest, misuse is not possible.
A Sybil attack describes a scenario where an attacker subverts a reputation-based system by creating multiple identities. Read on to discover how Encointer uses a real-world web of trust to...
Continue readingThe Encointer protocol involves a number of interesting and sometimes countervailing design characteristics. But how might it play out in practice in a community of rational individuals in a low-income...
Continue readingDid you participate in our demo at Polkadot Decoded 2022? Then read on to find out how to claim your exclusive commemorative NFT.
Continue readingThe US dollar has been the world’s reserve currency for as long as most of us can remember, since the signing of the Bretton Woods Agreement in 1944. But go...
Continue readingFor all the latest news and updates: