How Can We Help?

¿Cómo se compara Gini con otras monedas de privacidad?

Estás aquí:
<Atrás

La mayoría de las otras monedas de privacidad se basan en el protocolo CryptoNote. Protegen la privacidad con mecanismos computacionalmente complejos llamados firmas de anillo para proteger la dirección del remitente, direcciones ocultas para ocultar al receptor y "transacciones confidenciales de timbre" (RingCT), que ocultan el monto de la transacción. Algunas otras monedas de privacidad utilizan una tecnología llamada zk-SNARK (pruebas de conocimiento cero), que puede proporcionar más anonimato que las monedas basadas en CryptoNote. En general, las criptomonedas basadas en esas tecnologías de privacidad generalmente brindan una sólida protección de la privacidad, pero imponen varias ventajas y desventajas:

  • Their computational complexity makes them extremely slow—even slower than Bitcoin’s seven transactions per second. This is primarily because they've bolted their privacy features on top of the Bitcoin code base, which was only designed for anonymous transactions, transacciones no realmente privadas. But anonymity is very different from true privacy; so it's often relatively easy to link Bitcoin transactions together to reveal the identity of the transacting parties. This is a risk that applies to all cryptocurrencies that are substantially based on the Bitcoin source code and others that have adopted Bitcoin's non-private anonymity model.
  • Their complex architectures are more vulnerable to bugs and hacks than Gini's architecture because Gini is built with el lenguaje de programación haskell, cifrado homomorfo, optional Tor/I2P routing, and true transaction privacy at its core. This means Gini's architecture is simpler, which enables the Protocolo de confianza de Gini para procesar transacciones mucho más rápido con menos vulnerabilidad a errores y hacks.
  • Otras transacciones de criptomoneda no son privadas por defecto; Los usuarios deben activar la privacidad de cada transacción. En contraste, todas las transacciones de Gini son privadas de forma predeterminada (después de que las características de privacidad se implementan por completo).
  • Other cryptocurrencies based on zk-SNARKs require a trusted setup process, which makes it difficult for many people to believe that it has not been set up with backdoors or built-in privileges that could secretly benefit the founders of those other cryptocurrencies. For example, they could arbitrarily create new crypto-money for themselves and nobody would be able to detect it. In contrast, there's no secret setup process for Gini's privacy features. Gini is designed to be private by default so that Gini stakeholders can control the privacy of their transactions at all times.
  • There is no way to audit the money supply of those cryptocurrencies. In contrast, Gini's money supply is audited in real-time and anybody can verify that no new Gini money has been created out of thin air at any time.
  • No hay forma de que las partes autorizadas auditen fácilmente las transacciones individuales con esas otras monedas de privacidad. En contraste, Gini está diseñado con características de auditoría únicas que permiten a los interesados permitir a terceros que ellos autoricen Auditar sus transacciones si lo desean. Esto es útil para auditorías contables y organizaciones que tienen requisitos de informes financieros exigidos por el gobierno.
  • Algunas monedas de privacidad cobran tarifas adicionales por sus transacciones privadas. Gini no lo hace.
  • Algunas monedas de privacidad se basan en "masternodes" permanentes, que requieren más de USD 500,000 (hasta abril de 2018) para compra. Eso significa que solo un pequeño número de crypto ballenas adineradas tienen oportunidades significativas para operar esos masternodes. Por supuesto, esto es completamente opuesto a cómo funciona Gini, ya que nuestro Protocolo de confianza de Gini y Corrientes de valor y Sistema monetario las páginas ilustran
  • Con ciertas otras monedas de privacidad, cientos o miles de masternodes y su correspondiente suministro de criptomoneda. can be secretly owned or controlled by the same entity because there are no ecosystem sustainability mechanisms to prevent this. Again, this is completely opposite to Gini's architecture and philosophy.
  • All the early adopters in those cryptocurrencies purchased their masternodes when it was cheap, giving them perpetual aristocratic control over their crypto ecosystems. Given the hyper-concentration in all other crypto markets today, it’s reasonable to assume that their networks are substantially and secretly controlled by a small number of entrenched masternode operators with overwhelming economic and political power over their ecosystems. This outcome is no different than all the other highly concentrated cryptocurrencies today. In contrast, Gini's architecture and philosophy are fundamentally designed to prevent this, as illustrated at the links provided above.

To be clear, we have a lot of respect for any cryptocurrency project that takes transaction privacy seriously. The more privacy, the more liberty and freedom for humanity. However, Gini is substantially different on many levels from all other privacy coins today and we feel it's appropriate to clearly explain these differences so that Gini is never incorrectly characterized as "just another privacy coin." Gini is much more than "just another privacy coin."

Ver también: Auditoría de transacciones Gini


Did You Like This Resource?


Gini is doing important work that no other organization is willing or able to do. Please support us by joining the Gini Newsletter below to be alerted about important Gini news and events and follow Gini en Twitter.


[mailpoet_form id="1"]


Warning: sprintf(): Too few arguments in /home/customer/www/ginifoundation.org/public_html/wp-content/plugins/popup-maker/classes/Upsell.php on line 82