Skip to main content

Money in Secret Messages

You want to write a message to a friend. But you don't want to leave any trail leading to her. It is important that your message does not include her address. You have to leave your message at a secret place so that she can pick it up later.

I have created a secret messaging place Blindtalk.net.

As a software developer I cannot run away from cryptocurrency. I studied Bitcoin's whitepaper and its source code. Being so serious about it I managed to extract Bitcoin's message verification code into a standalone library. While many people are focusing too much on the blockchain I'm focusing on the signing algorithm.

Cryptocurrency leads me to Blindtalk. But I'm not using Bitcoin or the signing algorithm. Instead, I'm using the Waves platform. I've created Blindtalk token based on Waves, which is the easiest part.

Blindtalk is a repository where the senders post messages and the receivers search for them. But it is not a regular posting. A sender has to send a token to Blindtalk. And Blindtalk will verify the token's transaction before a message is accepted into the repository. It is actually a paid posting in Blindtalk tokens.

I was experimenting token-based payment in Blindtalk using the Waves platform.

While cryptocurrency is promising, the speculation on its values is out of hands. The exchanges are the avenues for speculators and manipulators. Even though speculation has nothing to do with software development still I have to dirt my hands into it. Because I have to understand every aspect of cryptocurrency.

The Waves client has a built-in decentralized exchange (DEX). I use the DEX as the market place for Blindtalk tokens. You can buy and sell Blindtalk tokens in the DEX.

Blindtalk tokens will not have a value if no one trades them. Thus, I have to stimulate the Blindtalk token DEX. I set a rule that if you want to post a message in Blindtalk you have to hold 1000 Blindtalk tokens. It means you have to buy 1000 Blindtalk tokens, post a message, and then sell back the remaining tokens. You can hold the tokens indefinitely. As the rule of thumb you should buy the tokens at a lower price and sell them back at a higher price. If you are lucky you will make money by posting messages in Blindtalk.

The key point here is that if you want to accept tokens as payment then you should enforce holding certain amount of the tokens during the transaction so that the tokens have value through buys and sells.

On the other hand, charging for postings in Blindtalk will deter spamming and reduce noise. And since the value of the tokens is expected to be very small so the charging fee will be insignificant. One of the cryptocurrecy usages is micropayment. Blindtalk is implementing micropayment.

Finally I'm having a repository of secret messages. I'm going to take a peek into your secret messages. And I hope you make money.

Comments

Popular posts from this blog

Setting Up PyScripter for Quantum GIS

PyScripter is a general purpose Python Integrated Development Environment (IDE). Quantum GIS (QGIS) is a desktop GIS application that can be extended with Python plugins. Both are open source softwares. We intend to use PyScripter as an IDE to build QGIS Python plugin. We are using PyScripter 2.4.1.0 and QGIS 1.6.0 in Windows. PyScripter does not come with Python. On the other hand, QGIS is built in with Python. Thus, we will setup up PyScripter to use the build in Python in QGIS. We assume both PyScripter and QGIS are already installed. Preparing PyScripter batch file We assume that QGIS is installed in C:\OSGeo4W\ folder and PyScripter is installed in C:\Program Files\PyScripter\ . 1. Copy qgis.bat in C:\OSGeo4W\ bin to pyscripter.bat 2. Edit pyscripter.bat to remove the last line that read something like this start "Quantum GIS" /B "%OSGEO4W_ROOT%"\apps\qgis\bin\qgis.exe %* and replace it with this in one line Start "PyScripter" /B "C:\Progr...

Access Control

Access control is about controlling user flow within your application. Do not mistaken access control with security which is a bigger subject in itself. Access control begins by authenticating user and limit his or her activity in your application. An activity is something like creating, updating or deleting a content. There are always finite number of activities that can be done in a given application. Each user can be assigned to a set of activities that he or she is allowed to do. Access control is usually tied to session management. However, you do not need session management to have access control. When a user log in, a session is created so that the user is remembered for the subsequent access. Otherwise the user has to keep on providing his or her credential for each access. We can also keep a list of activities that the user is allowed to do in the session record. Some applications let the session alive indefinitely and some applications time out user after a duration of inacti...

Maps Without Dedicated Server

Geographical Information System (GIS) was designed for engineers. That was good because engineers always work with standards which make interfaces open. Web Map Service (WMS) is one of the open interface standards. WMS focuses on maps portrayal via the Internet. A WMS client will request map graphics from the server which acquires, stores and prepares the maps using GIS back ends. A WMS server can be a full blown GIS engine or it can just be a gateway for other GIS engine. Due to the GIS engineering perspective, many GIS implementation was done by hardcore  programmers who work with C/C++ or Java programming languages. The legacy survives till today. The choice of programming language determines the type of server the GIS requires. Unfortunately, most GIS implementations only work with dedicated servers which incur high operating cost. A dedicated server need a special work force to overlook on the daily operation. We have to be realistic if we want to bring GIS into the ...