이미 임시 명세서 제출하고 출원 번호까지 있음[email protected]
--
A provisional specification has already been submitted, and an application number is already in place.
Until now, all coins have been exposed to the tyranny of powerful forces under the name of consensus. The 51% power bloc could manipulate the ledgers if they so desired. This cryptocurrency operates according to physical laws, not human consent. This cryptocurrency was created with the very function of modifying the code removed from the outset. Hackers steal cryptocurrencies by modifying the code. Since there is absolutely no code modification function, theft is impossible. If the code modification function is removed from the beginning, no one can modify it, and even quantum computers cannot. Furthermore, to further strengthen security, difficult and complex sentences are embedded in every single issued cryptocurrency, much like Mitochondria Eve. A unique number, such as that of a computer or smartphone, is recorded for each cryptocurrency. There are absolutely no identical unique numbers. The unique number of the last trader is the true owner of that code. When withdrawing, the system is designed so that the last unique number matches the unique number of the device attempting to withdraw. Transactions are restricted to this cryptocurrency’s wallet only. This is because a hacker attempts to copy the code and withdraw funds using their computer or smartphone, but they cannot withdraw the money since the unique identifier of the device used by the hacker does not match the unique identifier of the last transactor. Even if a hacker creates a new, fake code identical to this cryptocurrency, it is impossible because they cannot recognize the Mitochondrial Eve sentence.Even quantum computers can never decipher the sentence or unique number because the entire code is hash-based encrypted. Authenticity is verified only when the wallet and the cryptocurrency meet. The wallet’s final unique number is updated in real-time, and similarly, the wallet is designed from the outset with no modification function and the entire wallet encrypted using hash-based encryption. Therefore, quantum computers cannot discover the unique numbers in the wallet, nor can hackers modify them. Furthermore, the unique number of cryptocurrency must be erased in real-time once withdrawn. This is to prevent double withdrawals. Through these processes, the ledger can be accurately maintained continuously without the need for 51% voting rights. This is truly a perfect decentralized cryptocurrency. In the event of loss due to an accident or malfunction, a complex, long sentence known only to the user is entered into a backup wallet and stored as a pair with the unique number; this allows for recovery by entering the user’s sentence into the wallet on a new device. As mentioned earlier, since the wallet completely lacks modification capabilities and is hash-based encrypted, hacking by hackers and quantum computers is impossible. Of course, what is recovered immediately is recorded with the new device’s unique number, while the remaining records must not become the true owner’s. This cryptocurrency is unhackable, quantum computer hackable, immune to the tyranny of powerful groups, completely decentralized, eco-friendly, and allows for the reuse of lost cryptocurrency. If continuous updates are required, the edit function does not need to be removed.Instead, when a specific file is executed on the developer’s computer, it contains the developer’s unique ID and the Mitchondria Eve sentence. The developer’s unique ID is pre-entered into the wallet, and access to the administrator page is restricted to cases where the Mitchondria Eve sentence is present within that specific file. Consequently, even if a hacker manipulates the unique ID, they cannot access the administrator page because the Mitchondria Eve sentence is missing. Of course, even if an edit function exists, hash-based encryption prevents hackers or quantum computers from breaching it. To prevent administrator tyranny, an edit function is included for large-scale updates; however, the clause requiring the unique ID proving ownership to match the ID of the device attempting to withdraw funds for withdrawal to be strictly unmodifiable must be strictly enforced. Even if the administrator knows the hash-based password and the Mitchondria Eve sentence, updates are possible, but manipulating users' unique IDs is impossible. Furthermore, even if a hacker were to discover the hash-based password and the Mitchondria Eve sentence, it would naturally be impossible; withdrawing users' cryptocurrency is also impossible because manipulating the unique IDs is impossible. Also, even if a hacker were to figure out the hash-based password and the Mitchondria Eve sentence, it would obviously be impossible to manipulate the unique number, so users cannot withdraw their virtual currency, and users can withdraw cash at their leisure. Users also know the rules of this system, so a massive crash can be prevented to some extent.Furthermore, the developers' computers and other systems related to this cryptocurrency must be completely and thoroughly deleted to fundamentally block any leakage of Mitochondrial Eve sentences. This cryptocurrency allows for real-time transaction records to be generated without a single server. This is because it only requires unconditional approval if the code matches the Mitochondrial Eve sentence in the wallet. Since the hash-based encrypted code and wallet are impossible to breach, the Mitochondrial sentence can never be deciphered. Because approval is granted simply by matching the Mitochondrial sentence in the wallet with the Mitochondrial Eve sentence in the code, absolutely no servers are needed. There is no need to update backup sentences in backup wallets on the server in real-time either. This is because the system recognizes ownership for only a single entity, preventing double spending even when funds are transferred at any time. Since no servers are required, DDoS attacks and server overload are impossible. By utilizing all of the above features and combining them with Tether, even large corporations can now send money in just one second with zero-fee international transfer fees, ensuring safety and eliminating volatility risks. It is highly suitable to use these for digital currency. Administrators can also update them. Furthermore, when freezing criminal proceeds, freezing is possible simply by adding the devices to the blacklist. It has already been stated that this is highly suitable as it is feasible with AI and is technically flawless.