The Internet becomes a sidechain to the Bitcoin blockchain. The Metanet is a value network—the entire global system of online activity and data connected commercially." The Internet has transformed. The Metanet is a layer-2 protocol, designed such that any data can be stored immutably on a blockchain in a searchable and flexible manner. This is achieved primarily by structuring all Metanet data in a directed graph, governed by public key addresses. The data involved in the Metanet protocol can be broadly categorised as. Featuring Bitcoin Association Founding President Jimmy Nguyen, Robin Kohze, and Adam Bishop of the Cambridge Metanet Society, the BSV Virtual Meetup explored the extensive education and outreach of the Metanet Society, including a showcase of some of the exciting projects on Bitcoin SV.
Metanet bitcoinMetaNet Land - BitCoin Powered MMORPG
The magic of the land is only as limited as the creators who wield the magicks that shape the trees, the wind, the land upon which you, brave adventurer, will walk. Your Quest. The MetaVerse. Welcome Traveller! Monetary reward or pure knowledge awaits you. A Boundless Land upon a Small World. Each area is contained on a transaction. No downloads or storage required. Use Google translate to play in any language. There are many different ways to create identity on-chain, steps ways and tiered methods.
Paymail is a step towards identity on-chain. For the purposes of this paper, we will talk about business associated identity, in that a business is part of the model for providing identity to end-users.
In the current framework and models of most KYC and AML, the users provide identity to the business in question and they are normally stored on a central server or database.
As some may know and as Metanet. ID has recently experienced, this has its own particular security flaws. In the model that we will be moving to the future users retain control of their identity via encrypted uploaded data on-chain that is key-paired to their paymail.
The right to privacy is defined as a human and legal right. And many anti-bitcoin proponents try to put across that the right to privacy is broken on a transparent blockchain when you include data on top of it. This is a false claim that attempts to dissuade people from a part of the true power of bitcoin and Metanet. Transactions are transparent and publicly viewable, but data on-chain can be encrypted or made publicly viewable by all.
There are various methods for encrypting data on-chain, either through a website or direct on-chain encryption methods. There follows that there are also various methods for decryption of on-chain data, which can again be done through a website will directly on-chain. The data that can be encrypted on-chain ranges from a variety of usages, from merchandise labelling to receipts to PII to tax reports.
Not only can data on-chain be encrypted, but transaction amounts can be broken down into multiple amounts which further obfuscates what has been transacted.
Yet the sender and receiver of any such transactions can retain the ability to prove that the transactions were theirs and what the transaction was for. Advanced key pairing methods will allow data on-chain to be encrypted and using the second key pairing to allow such data to be obfuscated. This will in no way hide the original transaction and recipients or senders which will remain fully transparent and publicly the accessible. Only the data that was uploaded and encrypted can be obfuscated.
There is also the simple method of being able to update information on chain. All data uploaded on-chain is time-stamped and newer data more easily be visible over the old data, referencing from new data to roll data can easily be made and threshold key pairing can be used to assign the rights to whatever is in question.
Users of data on-chain will often be pointed towards the latest version of whatever data they are seeking, updaters of information can use simple referencing systems to inform users of previous old data, and they can also add redirect systems to old and new data which guides users towards the new data.
Not everything needs to be on-chain nor will everything be on-chain in the small amount of time. The old infrastructure can and will be used as a sort of foundational piping system.
Even when websites are fully contained on-chain there will still be oracles that link the metanet to the real world and will make use of various old infrastructure. Many agencies, governments and banks included, will still want to retain PII and other very sensitive information on their own servers.
These key pairings can even be made to be biometrics such as fingerprints or facial recognition or retinal scans, which substitute and count as the paymail key pairing. The security model of this allows users to gain secure access from anywhere in the world, shows who accessed and when as previously mentioned, and provides a record that cannot be removed.
This key pairing method can be used in conjunction with threshold systems whereby users are in separate parts of the world yet can securely and quickly conjoin to access the required information or services. In cases of loss of keys through clumsiness or loss of life, systems can be designed which allows for N set of keys to create new threshold systems. Such systems are very adaptable and can be used in a variety of cases such as business meetings, shares, stakeholders, judiciary bodies, simple voting systems, complex voting systems, safes and locking systems.
The common misconception is that a private key equals identity. This is a fallacy and created by people who would like to be able to drop their private key or pass their over to someone else and shift the blame for whatever malfeasance they have been doing.