Monday, October 21, 2021

NIX Technology, Part 2 - The Utilization Layer

NIX is a multi-layered privacy coin that uses an interoperable platform model to drive decentralized applications focused on privacy. After talking about the Protocol Layer in the first article of this series of publications on NIX Technology, today we will talk about the Utilization Layer.

This layer is responsible for performing multiple and complicated tasks in the background, while offering users a friendly interface, simple to use and totally focused on usability. Offering the user an easy and simple to use environment is one of the pillars of the NIX platform.

Ghost Vault

Within the Utilization layer, we will talk about the Ghost Vault of NIX, whose function is to make the NIX of the user completely anonymous and private within the blockchain. This feature based on the phantom protocol and uses Zerocoin to hide transactions.

Sending coins from the Ghost Vault is called “unghosting.”

NIX 2-Way Ghosting

Thanks to the mechanism introduced by the NIX team called “two-way phantom effect”, NIX users will be able to make totally private transactions between sender and receiver.

To make these “ghost” transactions, the NIX Ghost Protocol destroys the NIX coins and creates Zerocoins. These Zerocoins are stored in the Ghost Vault along with the Zerocoins of other users. When making a transaction, these Zerocoins become NIX again.

To prevent this transaction from being tracked:

“To eliminate privacy problems in one way, NIX uses a list of keys that contains one-time custom keys (Ghost Keys) based on the compromise key package scheme; they can be found in NIX core wallet and used to unlock zerocoins.”, explains the NIX Whitepaper.

These Ghost Keys are used when making these types of transactions and to increase the security of the user, once the transaction is completed the Ghost Key will be burned.

“Our innovative 2-way Ghosting technology allows total privacy of the sender / receiver in a transaction, using such a powerful mechanism that there is no possibility that the user’s history is compromised. Think of this as your NIX that disappears from view public as it is added to the Vault, and then reappears in another Vault, in a perfect operation.”, explains the NIX team.

About NIX

nix platform

Founded in April 2018 and based in San Francisco (California), NIX will provide the crypto ecosystem with an anonymous and decentralized environment allowing transactions between chains, transactions between decentralized exchanges (DEX) and intra-blockchain transactions, all anonymously.

The post NIX Technology, Part 2 - The Utilization Layer appeared first on Crypto Economy.

NIX Technology, Part 2 – The Utilization Layer