-
Cryptocurrencies
-
Exchanges
-
Media
All languages
Cryptocurrencies
Exchanges
Media
CloakCoin (CLOAK) is the fastest and most secure way to use blockchain technology to trade cryptocurrencies, and it is also a new generation of Ingmar encryption technology that can truly create completely private transactions. Ingma is a unique, advanced, private and secure trading system established by the Cloak Coin team. It can achieve anonymous transfer of Cloak Coin without "trust" other nodes without stealing funds or leaking sensitive information.
Security is the symbol of the cloak coins:
1. Privacy: The cloak shield that uses end-to-end encryption and completes separate secure communication, allowing each node to avoid traffic analysis. The merger with the Ingmar system makes the Cloak Shield become the core of meeting privacy needs with the RSA symmetric encryption algorithm supported by the elliptic curve Diffie Hermann key exchange protocol.
2. Open Source: Open Source is of great significance to Cloak Coin because it brings complete transparency to Cloak Coin and allows peers to evaluate the software. Users can fully trust the software to continue to perform small vulnerabilities, tracing, malware or any other unnecessary software checks.
3. Availability: Cloak coins provide extremely private decentralized, untraceable, secure digital currency transactions. The cloak coins are simple to operate and allow anyone to safely participate in the digital currency market transactions on the day with the help of a computer or smartphone, without worrying about voyeurism or obstruction of the transaction by irrelevant parties.
4. Autonomy: The only goal of the Cloak Coin is to allow its holders to enjoy financial freedom from the very beginning in a simple, practical, economical and substantial instant way. But Cloak Coin will not and will never attempt to support illegal markets, activities, or actions beyond the law.
The Advantages of Cloak Coin: Bonus and Circulation
1. Make profits through the proof of equity model (cumulative equity) + 6% per year
Cloak Coin is a pure Proof of Stake (PoS) cryptocurrency that provides 6% interest per year on a cumulative currency basis. As long as the user wants, he can also get a share of 1.8% of the network fee due to the support it provides for the Ingmar transaction. Compared to mining, Cloak coins are more energy-saving and easy to get more Cloak coins by simply putting the currency into your wallet.
2. Limited circulation 5,118,471
Cloak coins were originally a rare digital currency. Such a limited supply can bring outstanding appreciation potential to currency holders. The increase in the circulation supply of cloak coins is at a minimum. In theory, its increase ratio is consistent with the bonus, at a maximum of 6% per year. Generally speaking, the actual increased circulation is much less than 6%, so the cloak coins will not face excessive circulation and will always be a scarce commodity.
Technical Overview
CloakCoin uses the token CLOAK using PoS consensus mechanism. Its team developed a trading system called Enigma, in which token trading will implement anti-tracking through a decentralized transfer, promoting personal privacy protection and ensuring the security and effectiveness of transactions.
Operation of Enigma
1. Generate a public key when the transaction is started;
2. Publish the public key of this transaction and the amount hidden required;
3. Nodes that participate directly or indirectly can communicate with each other.
When users want to send CLOAK tokens, they can select a series of nodes with sufficient balance and send a request, requesting these nodes to assist in covering transactions, and the nodes that receive the request respond to the requester invisible disease. If any node does not agree or does not respond, the system will promptly select a replacement node to complete the above operations. DDos protection measures will also blacklist some malicious nodes in the above process to ensure the health and efficiency of the entire network.
Nodes participating in stealth transactions will generate a public key through ECDH technology, which is used to encrypt each node and the host. When a node accepts an "invisible" request, it provides a data list of input and output. The input provided by the node must be greater than or equal to the sending amount of Enigma (including handling fees), and the output must be consistent with the real output amount of Enigma.
If the node's output address has been recorded before receiving funds, the Enigma system will issue a certain "invisible" reward to the node.
Application Scenarios
Alice hopes to send 10 CLOAKs to BOB through 5 "invisible" nodes, so Alice sent a request to the Enigma system to announce her needs. Five nodes that meet the requirements participated in the "invisible mode" and created a secure CloakShield encryption channel to communicate securely with Alice. The participating nodes sent a data list of input and output to Alice through the encryption channel.
Next Alice will decrypt the responses of each node and create an Enigma transaction to mix its input and output with each node, and then send it to each node for signature. The participating node will check the integrity of the transaction and verify the input and output of the transaction. After signing, the transaction will be placed in the block.
Since the transaction process is reflected by third-party nodes, it is impossible to track the real transaction parties.
https://www.cloakcoin.com/cn/
https://info.binance.com/cn/currencies/cloakcoin
https://zhuanlan.zhihu.com/p/37175632