New Authentication Protocol which has Data Supremacy and is Quantum Resistant Based on Post-Blockchain Technology
RAIDA – Redundant Array of Independent Detection Agents
Computer scientist Sean H. Worthington invented RAIDA - and developed by the CloudCoin Consortium team.
Enabling financial freedom and freedom of speech is essential to RAIDA and the CloudCoin Consortium.
The RAIDA is a new authentication protocol that is the first of its kind and is the first true Cloud-based authentication system, to have Data Supremacy and Quantum Resistance
The CloudCoin Consortium is a non-profit organization. It’s a group of businesses and individuals around the world who are seeing the protection of personal data and freedom of speech as challenges for modern society.
The CloudCoin Consortium is not a legal entity. It has no bank accounts. It has no headquarters. The consortium is best described as a Libertarian organization made up of individuals who are very interested in Freedom. It is a freedom-based movement that is not just talking. It’s doing something about it. The Consortium was a Platinum Sponsor at Freedom Fest in Las Vegas in 2018.
Enabling financial freedom and freedom of speech is key to RAIDA and CloudCoin Consortium
The person or persons are known as “Satoshi Nakamoto” introduced a revolutionary advancement affecting technology, finance, sociology, and other fields with the advent of distributed ledger technology in 2008. Nakamoto or that group of people was the first to solve what computer scientists call ‘the physical integrity problem,’ allowing for the creation of the first widely accepted Cryptocurrencies that could not be copied or double-spent.
That was over a decade ago.
Distributed ledger technology (DLT, also known as blockchain) also was promoted as something that would be a solution for every problem from currency inflation to world hunger to global warming.
The hype has not been the reality. Blockchain technology has been hampered by the inability to efficiently scale up to handle societal needs, unreasonably slow transactional times, and overly complicated and dangerous consensus paradigms. Blockchain applications are also immensely harmful to the environment, consuming more electricity each day than used by most nations.
Some might say that there has been progress in the application of distributed ledger technology, and there has, but regardless of the many brilliant minds which have been working on it, improvements have not come close to solving its fundamental weaknesses.
DLT has failed to deliver on its promise to become a transformative innovation.
Continuous advances in quantum computing, meanwhile, threaten to completely nullify the centerpiece of DLT: asymmetric elliptic curve cryptography.
The Quantum Era is near, if not already upon us, as many experts believe. Quantum computers rely on quantum mechanical phenomena like entanglement and superposition to operate on quantum bits of data (qubits). Traditional bits are binary: they are either ones or they are zeros. But Qubits can be ones, zeros, or both and can be in multiple locations at the same time. Because of this, a quantum computer can view millions of probabilities involved in a logical computation at one time. It is, therefore, able to process data twenty million or more times faster than a traditional computer.
The contest between quantum computers and DLT’s asymmetric cryptography has been likened to cutting hair with an extremely sharp knife or a high-powered focused laser – a single quantum computer can easily defeat cryptographic systems thousands of times stronger than existing today.
The simple reality is that by the time DLT/blockchain technology reaches anything near critical mass, it will already be obsolete!
We are, factually, already in a post-blockchain environment. The next generation of technology to shield data transmission, stop counterfeiting, ensure privacy, safeguard financial security and protect intellectual property will be effective only if it is quantum-safe and provides solutions to the blockchain’s problems with scalability, efficiency, governance, and ecological sustainability.
The CloudCoin Consortium has developed applications based upon the next generation of technology and is now the world’s only quantum-safe technology that solves these security problems and more.
The technology platform is RAIDA – Redundant Array of Independent Detection Agents
The RAIDA is the new authentication protocol (post-blockchain protocol) that is the first of its kind and is the first true unhackable Cloud-Based authentication system.
Most authentication protocols require one password to be given to one server that is checked against one database. The RAIDA uses many passwords against many different servers, each with a no-share database.
RAIDA has already proven its value and significance as the backbone of CloudCoin, the world’s fastest and most secure post-blockchain Digital Currency. CloudCoin is the native currency of the RAIDA network. There has not been and will not be any ICOs or fundraising rounds. This means that CloudCoin is not obligated to investors, and since the RAIDA network features are free to the Consortium, all CloudCoin transactions are free to the users.
CloudCoin is now just beginning to be utilized as a means of exchange throughout the world and already has a market capitalization exceeding $30 million.
CloudCoin – The World’s First Cloud Currency!
CloudCoin is a Digital Currency. That cannot be counterfeited, controlled, tracked, or stolen. CloudCoins cannot be double spent, mined or lost. It is 100% private and requires no public ledgers, accounts, or encryption.
CloudCoin is a completely fair, decentralized and ethical monetary system that is not owned or controlled by anyone.
Our goal at the CloudCoin Consortium is to make our Digital Currency accessible and usable for everyone regardless of experience.
The world is not made up of tech-savvy people. Programmers and others who are wise in the ways of computers and how to handle them are very few compared with most of the world population. We believe that digital currency should be easy to use by people from every walk of life as well as have the best security and privacy available anywhere.
RAIDA technology is challenging existing players in the DLT space with this amazing post-blockchain solution. Here are a few key statistics.
- 23,000 times faster than blockchain and will reach 8 million transactions per second (8 mil. TPS).
- (3e+21) three-sextillion times more secure than blockchain and simply cannot be hacked or compromised, even by quantum computers.
- 41,000 times more efficient than blockchain, which means less cost to the user and less damage to the environment.
Unlike blockchain, RAIDA is fully scalable. It actually grows faster and more efficient as the network grows. The blockchains will slow down with more users and the more data it handles.
People are doubtful, and often ask, “How is the RAIDA Quantum safe?”
That’s actually a good question. It is quantum-safe for a few reasons.
The first reason is that it does not have a public ledger, which acts as an entry point for anyone trying to decrypt it. RAIDA does not have a public key. It is not in any way public.
The second is that when CloudCoins are transmitted, the coin’s self-contained code is cut apart or “shared” into 25 pieces and even smaller again. making each of them meaningless on their own. So, if a hacker were to capture one of the RAIDA servers, you would only have 1/32 of 1/25th of the authentication data. Since the system works on a decentralized consensus basis, you would simultaneously need to first find and then decrypt a majority of the servers. If you were able to decrypt one server or even a few of them, it would not give you ownership of any coins.
In order to crack a CloudCoin, you would need to guess the Authenticity Numbers of a majority of the RAIDA. Each CloudCoin is made up of 400-bytes of code with 16-bytes per line. Each of those lines is made up of a 16-byte password that is 100% random. Each of the 25 lines is sent to a different core server. The core server then cuts or “shards” the 16-byte lines into smaller pieces that get sent to sub-servers, which are also hidden around the globe. Then, just like a program on your computer that locks you out when you fail your passcode too many times, the platform has a similar safeguard. The RAIDA has a bottleneck of how many guesses can be done each second. With such bottlenecks, the calculations which would be required are mathematically phenomenal.
The public ledger does not have a bottleneck.
With a public ledger, a hacker could make as many guesses as they had servers. If a hacker has a football field full of supercomputers (like the NSA), then they could guess trillions of combinations per second.
With quantum computers, a hacker could guess all combinations within two minutes and crack the Blockchain. With RAIDA, we can only guess 8 million per second per RAIDA. This means that it would take more guesses than there is the time in the Universe, and the RAIDA is Quantum-Safe.
Each RAIDA network is composed of many redundant servers, networks, and databases. Such arrangements of hardware are often referred to as Clouds. The Domain Name System (DNS) that the Internet is based upon has such redundancy in place. And it has never been brought down since 1985. No matter what components fail or are attacked, the system keeps going. The databases are mirrored in several different physical locations. There are teams of Web servers for high availability. Multiple locations allow for catastrophic failures from catastrophes such as typhoons, floods, earthquakes, meteor strikes, or unfriendly government attacks, yet still, stay operational. Because the content of a CloudCoin is invisible, it does not present an attractive target and therefore with all the difficulty involved it is highly unlikely that RAIDA clouds would become the target of free-lance hackers. However, because RAIDA allows for financial freedom it will predictably be attacked by one unfriendly government or another in an attempt to demonstrate the system as unsafe and discredit it, or to simply take the system down, but like past failed attacks on the DNS system, the RAIDA Clouds will survive those attacks too.
Each CloudCoin can be sliced into 25 parts and then into 32 smaller parts. There are 25 core-clouds (called "crypts"). Each crypt is responsible for one CloudCoin slice. A Sentinel cluster guards its series of 32 sub-crypts. The Sentinel clusters themselves hide behind Content Management Systems. For security purposes, Sentinels are dispersed around the world in different countries. The Sentinel IP addresses are hidden, and only the Content Management Systems know their IPs. Then the Sentinels each hold a directory of all the IP addresses of the detection agents in their crypt. Only the Sentinels know the IP addresses of the detection agents, so the locations of the detection agents are hidden from everyone else and are therefore obscured from view. The Sentinels query the Detection Agents on behalf of the CloudCoins to detect Counterfeits and fix any seeming faults that might appear in the coins. This is important because with so many simultaneous transmissions, some errors can occur and the consensus is necessary for authentication. The system, therefore, has a built-in method of handling discrepancies.
Current locations of Sentinel Servers: Australia, Macedonia, Philippines, Serbia, Switzerland, South Korea, Japan, UK, India (x3), Germany (x2), USA (x3), Taiwan, Russia (x2), France (x2), Singapore, Argentina, Canada.
Right now, the RAIDA network consists of 25 core servers, which is 11 more than the entire core system of the Internet’s DNS network.
In the future, as need demands, new clouds will be added and placed in other geopolitical locations. This will facilitate more traffic and make the entire system faster and more secure.
The RAIDA is like a clock-tower in the center of a medieval village. It provides a public service, but it needs to have someone wind it up every day and make sure it is maintained. The clock keeper may make sure that the clock is secure and works, but the clock keeper did not invent the system of time and does not invent new features.
The RAIDA is made up of over 22 independent companies that are physically located in different geopolitical jurisdictions around the world. Each of these RAIDA Administrators - called Sentinels - are independent and are paid for their operations by recovering lost or abandoned CloudCoins. The Sentinels are world-class systems administrators whose job is very simple: Keep their RAIDA up and running. Just like the clock keeper who kept the city clocks going in medieval days. They do this by purchasing and maintaining their own application servers, reverse-proxy servers, backup servers and DNS names. They must provide bandwidth, electricity and updating code when released by the CloudCoin Consortium. The RAIDA administrators own their RAIDA for life so long as the follow the RAIDA constitution.
The RAIDA constitution specifies their duties and all the reasons they could be removed. RAIDA Admins are appointed by the President of the CloudCoin Consortium based upon their technical expertise and dedication to a free economy. Many of the Sentinels have 32 Detection Agents behind them that actually hold the data. Detection Agents are independent individuals who operate using a small "Raspberry Pi" computer in their home. Each of the detection agent’s computers is connected to the Sentinels directly via an encrypted VPN connection and cannot communicate with any other computers except the Sentinels. The independence of the Detection Agents help add integrity to the system, but they have no say in how the RAIDA is governed. The Sentinels keep the clock running but depend on the Detection Agents to handle data and on the CloudCoin Consortium for innovations.
The keeper of the clock (The RAIDA) runs by itself. The CloudCoin Consortium developers work to maintain and improve the RAIDA software. In this way, the “Cloud People” will create a virtual Republic that will defend the economic liberty of its users no matter where they are located.
INDEPENDENT DETECTION AGENTS
Each Sentinel and Detection Agent is controlled by a different person. Each Sentinel may use a different algorithm for dividing the load among the Detection Agents. Some Sentinels may shard (divide by rows) the CloudCoin authentication data between the Detection Agents.
Some Sentinels may use a hash or random lookup table to divide the load. Detection Agents may not know the serial numbers of the CloudCoins that they are detecting. When random lookup tables are used, RAIDA administrators can't assemble the CloudCoins back together. Only Sentinels can do this, and they cannot do it alone since a consensus is required.
Independence: RAIDA Clouds operate under different controllers and are not beholden to each other but instead are peers (equals). They can use whatever technologies they like, such as Linux, Windows, PHP, C#, Java, Apache, Tomcat, IIS, MySQL, Microsoft SQL, Oracle, etc.
Distributed: With few exceptions, RAIDA Clouds are located in different liberal nations. The word "Liberal" is used in the classical meaning of the term used by Philosopher John Locke to describe countries that protect life, liberty, and property. This guards the RAIDA against the actions of governments. Because the speed of electricity can circle the globe in milliseconds, there are no performance issues.
Redundant: RAIDA Clouds all do the same basic job. In theory, they could all go down, and so long as one still works, the CloudCoins are good.
Fixability: It is unlikely, but has been assumed, that RAIDA Clouds will go down completely and have all their data hacked. That is why the system has been built so that it is possible to simply discard RAIDA Clouds and rebuild new ones somewhere else. Unlike the blockchain, the CloudCoins themselves hold the data. Even the CloudCoins themselves are independent. CloudCoins have a grade based on their redundancy, and these grades can be improved by fixing themselves on the RAIDA Clouds.
The location of detection agents is unknown, and no information is collected on their location.
Here’s a visual representation of the RAIDA
Fig 1. – The CloudCoin is divided into 25 slices. Each slice goes to a different Sentinel. Each Sentinel has a directory that holds the secret IP addresses or between 1 and 32 Detection Agents. Each node is controlled by a different and independent entity. The Sentinels and the Detection Agents are located in different jurisdictions. The Sentinels can each decide how data is stored within their Agents.
RAIDA QUORUM MEMBERS
Our most important security feature is our people. We only allow internationally recognized Systems Engineers to be members of the quorum. Quorum members must have professional certifications and long histories of successful work experience. No people with criminal records or of low moral repute are allowed. The Quorum provides the governance of the RAIDA authentication system. Each Quorum member gets one vote. The Quorum members are funded by CloudCoins that are completely lost or abandoned so that it will work in perpetuity.
RAIDA AUTHENTICITY DETECTION PROTOCOL
The RAIDA protocol is an extremely light protocol that requires only milliseconds to execute and sends and receives just a few hundred bytes of data. Clients send authenticity requests in parallel to 25 RAIDA clouds. Thanks to the speed of light, it only takes milliseconds for signals to travel to the other side of the planet and back. Each RAIDA cloud responds with either a simple "pass" or "fail." There are no time-consuming codes to decipher or create. The RAIDA protocol requires no sessions or cookies. The conditional GET method is used to simultaneously indicate that the previous GET has not been modified and to reduce unnecessary network traffic.
RAIDA SELF-REPAIR PROTOCOL (TRIPLE KERBEROS)
Sometimes, the Sentinels will be unavailable. When unavailable, Sentinels are either restored or replaced. The CloudCoins can repair them because of the unique fact that all the authenticity data is stored in the CloudCoins themselves. The repair protocol cloud is called "Triple Kerberos" because it uses three tickets. Kerberos is a network authentication protocol that works on the basis of 'tickets' to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. It is designed to provide strong authentication for client/server applications by using secret-key cryptography.
RAIDA does everything that the Blockchain does, only much faster, more reliable and far more efficiently. The RAIDA is already more reliable and efficient, and in the future more nodes and networks can be brought on to perform all the world's transactions within milliseconds. With RAIDA, the work is distributed amongst more nodes instead of requiring each node to do more work (like occurs with the Blockchain).
The cost of electricity and operation is 3,000 times less than the Blockchain. Data storage is minimized. All data can be stored in RAM. The RAIDA is 100% quantum-safe and does not use encryption. The system is fault-tolerant and can withstand government attacks, natural disasters, hackers, and even internal subversion.
The RAIDA is ready for retail and does not require any client download except for a webpage, or small- size client software download of just 5 megabytes. Even though so little storage is necessary with CloudCoin, its security is far more intense.
Is with only a 32-byte private key. RAIDA is authenticated by 400-bytes of unguessable authenticity numbers (like DNA), which also completely change with every owner.
Blockchain processing can take between 10 and 45 minutes (or more) to make changes to the Blockchain. With RAIDA, the whole process takes less than 2 seconds to authenticate a CloudCoin and change the code (key).
The Blockchain is protected from hacking by encryption. Quantum computers run by governments most likely can already crack the Blockchain's encryption A CloudCoin note holds its own information. Authentication data is globally spread out (stripped or shredded) across 25 Clouds per network. With CloudCoin, there is no single bank to rob.
We created the software - first Client Software of its kind for secured Digital Currency Transactions, the First Non-Crypto Ledger to have Data Quantum Resistant Supremacy based on Post-Blockchain RAIDA technology!
Your Transactions with that software are Totally Secure and Anonymous! Your money belongs only to you, and nobody can track your transactions or the amount which is on your account! No-one can freeze your account either!
No Fees, No Tracking, “No Accounts,” No Waits, Totally Secured and 100% Anonymous!
The CloudCoin Consortium has developed an ultra-secure and totally anonymous system for Digital Money Transaction, where you immediately see your money in your wallet’s file system right after the transaction. It's not necessary to install huge amounts of data on your system. The software is only about 5mb and each coin 1kb.
CloudCoin requires no logins, usernames or passwords. And it does not track anything. So, there is no public ledger to look at. CloudCoin does not require a blockchain but operates as an evolution of the DNS system. CloudCoin has "Data Supremacy" and cannot be brought down by hackers, governments, not even the people who created it.
CloudCoin was based on "Theory of Perfect Money" by computer scientist Sean H. Worthington, that spells out how money should be.
The significance of the RAIDA is that now there is a global authentication system that people can depend upon to be Confidential, Available, and have integrity. So, everyone can now use as they wish and can even create their own domain controllers (RAIDA Realms) and then extend permissions and rights to whatever network resources (servers) they control.
In other words, the CloudCoin Consortium has developed a new authentication protocol that allows for complete privacy.
Confidential is one of the main factors, and like physical cash, digital money should not require any accounts, membership, or tracking a database like Blockchain.
Our technology is now being applied to Email and Data storage that can be used to create entire anonymous communities where people can communicate without revealing their identity.