Part 1 trades with party 2
Party 1 sends party 2 some bitcoin cash
Party 2 sends party 1 a liquid equity text.
Both parties run the same contract, in separate places. Send means, counterfeit proofed encrrypted message which is self defining and sent once. Cash is over the counter. Both parties have already gone through the ledger queue to obtain liquid assets to trade. In the simple case, it is all over but the shouting, just guarantee the send function. Both parties have prior agreement to the ledgers in use, hence Party one can uniquely verify the stock received. Party one and two verify each other by their ability to decode valid messages in the context.
Now, i would seem to me all ledgers have a counterfeit problem, they still have the miners ganging up problem. I like proof of provability. Any card that can prove it will conduct the basic exchange honestly then can be called on multiple times to repeat the exchange. The harder proof is cost of counterfeit. Cards easier to counterfeit have shorter expiration dates, lower cash limits, and fewer key capability.
The key hierarchy starts at the lab which has its own root key. From their the typical key embeds drop down the graph, the lower the less lower combinations allowed.
How about cash return on failure? Both parties can insure against that because the cash return obeys the basic contract law, and the condition stable a single cache state.
So the contract terminates in either the fail mode or success mode, both secure cards wait for the appropriate response. The exchanged ext returned to the sending party. Contract stability is when all parties have moments to agree on the current state of the contract. For smart card the only violations should be congestion, sudden card to card network congestion, and counterfeits. Money on the public ledger is subject to pit trades.
The smart cards delegates to known trading bots to manage portfolios. If you consider a portfolio o be an array of independent fair traded pit prices. Then these bots are independent to the user, but the user and application allocated trading bandwidth across the portfolio. The application and card set the betting resolution for their bots in the pits. The bot is then tending to bet a fair coin over fewer tosses with lower resolution. The trading bot is running round robin at high trading speeds. The trading pit guarantees the bot a certain number of steps in the instruction cache. The trading pit likely supplies a cash function to the bots, but all the bots are guaranteed security of their necessary keys. They act as hot smart cards. There is a public area in the instruction cache where keys can be kept secret and hidden on instruction cache swaps.
Trading bot are restricted to the current pit and communication back to the smart card. There are o conditionals on exterior trusted miners, the pit boss matches prices, takes risk and swaps party assets on the internal ledger. The trading bot can exit the pit and ship cash around anywhere.
No comments:
Post a Comment