Encointer enables every community to create its own local cryptocurrency through public “trusted setup” ceremonies that verify human uniqueness and prevent Sybil attacks. Its Proof-of-Personhood protocol rewards verified participants with a universal basic income, secured by physical meetups and on-chain governance. This approach fuses decentralized identity, local trust, and community-driven digital money into one scalable system.Encointer enables every community to create its own local cryptocurrency through public “trusted setup” ceremonies that verify human uniqueness and prevent Sybil attacks. Its Proof-of-Personhood protocol rewards verified participants with a universal basic income, secured by physical meetups and on-chain governance. This approach fuses decentralized identity, local trust, and community-driven digital money into one scalable system.

How Local Digital Currencies Are Created and Governed by Their Communities

2025/10/06 04:47

Abstract and I. Motivation

II. Local Currencies

III. Unique Pop Ceremonies

IV. Monetary Policy

V. Purchasing-Power Adjusted Transaction Fees

VI. Architecture

VII. Trusted Execution Environment Security

VIII. Encointer Association

IX. Known Limitations

X. Conclusion and References

II. LOCAL CURRENCIES

Encointer is no single currency. It manages an unpermissioned set of many local currencies. Every geographically bound community can have their own local currency.

\ A. Bootstrapping a Local Currency

\

\ Then the initiators need to perform a trusted setup ceremony with 3-12 participants. An Encointer local currency should only be trusted if it was bootstrapped with a public trusted setup ceremony. In the best case you find locally renowned people to participate in the first ceremony. For the trusted setup it is recommended that public keys used for the ceremony are made public by their owners.

\ The currency’s identifyer Ck is the group public key of all registered trusted setup participants.

\ B. Urban Scalability

\

\

III. UNIQUE POP CEREMONIES

\

\ \ The registration data is transferred and stored confidentially to mitigate linkability across ceremonies.

\ B. Assignment

\ \

\ \ 1) Computational Complexity: Rules 1, 2 and 3 form an np-hard optimization problem. Therefore, the assignment has to be performed off-chain.

\ C. Meetup Procedure

\ \

\ \ D. Witnessing Phase

\ \

\ \ E. Validation

\ \

\ \ F. Reward

\ All participants who passed the validation above are issued an amount of RC as a universal basic income. RC can be defined and adjusted per local currency by means of on-chain governance.

\ G. Unique Proof-of-Personhood

\ Attending one meetup supplies the individual with a simple proof-of-personhood (PoP). However, it doesn’t prove that one individual maintains exactly one PoP over time. The more subsequent ceremonies an individual attends, the more trustworthy is his/her Unique-PoP (UPoP) claim with respect to uniqueness.

\ H. Threat Model

\ The Encointer UPoP protocol needs to defend against two categories of adversaries:

\ • those who try to get more than one reward per ceremony (sybil attack)

\ • those who try to sabotage the Encointer ecosystem even if this comes at a cost.

\ Both categories will collude among themselves to achieve their goal.

\ Hypothesis 1: The Encointer UPoP Protocol is secure if a majority of participants with reputation for each ceremony and each meetup is honest and successfully registers their nonempty attested claims to the blockchain in time.

\ Above hypothesis as not formally proved here. We expect to get probabilistic security with regard to the following attacks:

\ 1) Illegit Videoconference: People may try to meet virtually instead of physically. Mitigated subject to Hypothesis 1

\ 2) Surrogates: An adversary might pay other people to attend ceremonies on behalf of identities controlled by the adversary. The effect is similar to people renting out their identity. This attack is out of scope as it doesn’t affect issuance.

\ 3) Oversigning / Social Engineering: Attendees might talk others into signing more than one pseudonym per person. Bribery could happen too. Mitigated by rules 7 and 9 subject to Hypothesis 1

\ 4) Systematic No-Show: a meeting might become invalid if too many participants don’t show up (deliberately). Mitigated subject to Hypothesis 1

\ 5) Flooding: An adversary could register large numbers of fake participants who will never show up. This could prevent legit persons to participate. Mitigated by rule 3.

\ 6) Threats to Personal Safety: As ceremony members need to meet in person, all risks involved with human encounters apply. These risks are reduced by randomizing participants and by the minimal group size of 3 persons. Participants are advised to choose public places for ceremonies. Threats by non-participants who want to hurt the Encointer ecosystem by attacking participants are mitigated if group s keeps their exact meeting point private.

\

:::info Author:

(1) Alain Brenzikofer ([email protected]).

:::


:::info This paper is available on arxiv under CC BY-NC-SA 4.0 DEED license.

:::

\

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC

Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC

The post Franklin Templeton CEO Dismisses 50bps Rate Cut Ahead FOMC appeared on BitcoinEthereumNews.com. Franklin Templeton CEO Jenny Johnson has weighed in on whether the Federal Reserve should make a 25 basis points (bps) Fed rate cut or 50 bps cut. This comes ahead of the Fed decision today at today’s FOMC meeting, with the market pricing in a 25 bps cut. Bitcoin and the broader crypto market are currently trading flat ahead of the rate cut decision. Franklin Templeton CEO Weighs In On Potential FOMC Decision In a CNBC interview, Jenny Johnson said that she expects the Fed to make a 25 bps cut today instead of a 50 bps cut. She acknowledged the jobs data, which suggested that the labor market is weakening. However, she noted that this data is backward-looking, indicating that it doesn’t show the current state of the economy. She alluded to the wage growth, which she remarked is an indication of a robust labor market. She added that retail sales are up and that consumers are still spending, despite inflation being sticky at 3%, which makes a case for why the FOMC should opt against a 50-basis-point Fed rate cut. In line with this, the Franklin Templeton CEO said that she would go with a 25 bps rate cut if she were Jerome Powell. She remarked that the Fed still has the October and December FOMC meetings to make further cuts if the incoming data warrants it. Johnson also asserted that the data show a robust economy. However, she noted that there can’t be an argument for no Fed rate cut since Powell already signaled at Jackson Hole that they were likely to lower interest rates at this meeting due to concerns over a weakening labor market. Notably, her comment comes as experts argue for both sides on why the Fed should make a 25 bps cut or…
Share
BitcoinEthereumNews2025/09/18 00:36
Share
Adoption Leads Traders to Snorter Token

Adoption Leads Traders to Snorter Token

The post Adoption Leads Traders to Snorter Token appeared on BitcoinEthereumNews.com. Largest Bank in Spain Launches Crypto Service: Adoption Leads Traders to Snorter Token Sign Up for Our Newsletter! For updates and exclusive offers enter your email. Leah is a British journalist with a BA in Journalism, Media, and Communications and nearly a decade of content writing experience. Over the last four years, her focus has primarily been on Web3 technologies, driven by her genuine enthusiasm for decentralization and the latest technological advancements. She has contributed to leading crypto and NFT publications – Cointelegraph, Coinbound, Crypto News, NFT Plazas, Bitcolumnist, Techreport, and NFT Lately – which has elevated her to a senior role in crypto journalism. Whether crafting breaking news or in-depth reviews, she strives to engage her readers with the latest insights and information. Her articles often span the hottest cryptos, exchanges, and evolving regulations. As part of her ploy to attract crypto newbies into Web3, she explains even the most complex topics in an easily understandable and engaging way. Further underscoring her dynamic journalism background, she has written for various sectors, including software testing (TEST Magazine), travel (Travel Off Path), and music (Mixmag). When she’s not deep into a crypto rabbit hole, she’s probably island-hopping (with the Galapagos and Hainan being her go-to’s). Or perhaps sketching chalk pencil drawings while listening to the Pixies, her all-time favorite band. This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Center or Cookie Policy. I Agree Source: https://bitcoinist.com/banco-santander-and-snorter-token-crypto-services/
Share
BitcoinEthereumNews2025/09/17 23:45
Share