Replying to Avatar arkinox

Autonomous Geometric Vaults

I've think I've figured out a method to hide data in a location in #cyberspace

The only way to decrypt it is to use PoW to move through cyberspace to the location where the data is hidden.

Once you arrive, the data is unlocked. But not before. And observers can't unlock it without producing the requisite PoW.

The basic idea is to execute the secret's wasm blob with your action chain history as the argument. By accumulating your vector towards the secret location, you reach a threshold that proves you have arrived. If valid and in the secret's defined radius, the wasm will spit out the decryption key for the secret.

Multiple radiuses could be stacked to create a gradually resolving 3D model as you get closer. Or the data could be anything else.

This is really cool because it now allows people to put things into cyberspace that can ONLY be accessed through cyberspace. There are no shortcuts. No meta-analysis. Trying to decompile the wasm will take more work than following the rules.

If it works, then that means you can also hide data in physical locations in the real world, as cyberspace overlays our entire planet.

Now I have to build a prototype/demo.

I'm still hoping for input from someone more qualified than I, but I think this could work.

Ideas that didn't work:

- higher dimensional traversal over non-euclidean spaces

- weak encryption breaking

- Homomorphic vector accumulator

- path-dependent hash

- merkle consolidation

- binary power map

nostr:nevent1qqs2eqjraulf9rccz3tzk2lk9fjg98dnpfu9py4hgzefpphr8tc8w4qpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsyg8ga5me33hla0l6ppgp4su7yutx9073vrmg372vghtf9krk0hf5tgpsgqqqqqqsp2p3up

I want to emphasize that if I can get this to work, it will further solidify the spatial aspect of cyberspace. Consequential distance in a shared virtual space.

Why?

Because bitcoin harnessed the time dimension in a digital system by anchoring it to proof of work.

I believe that we can harness the spatial dimensions in a digital system by anchoring it to proof of work.

Our brains are wired for spatial cognition. Our lives revolve around locations and things.

Cyberspace is an omnipresent haze lying dormant in the background of reality. I want to open its doors to the world.

nostr:nevent1qqs8jkel24gdawh6t04mkg95cuskdp20h3e5ejva8v6tz4ggdtk026spr3mhxue69uhkx7tzv4e8xurpvdjjumn0wd68yvfwvdhk6tczyr5w6duccml7hlaqs5q6cw0zw9nzhlgkpa5gl9xyt45jmpm8m5695qcyqqqqqqg3x3n0z

Reply to this note

Please Login to reply.

Discussion

I've been obsessed with solving this problem for probably over a year now.

I think about it like this.

You go for a walk. You walk a mile. You see a tree. You examine the tree up close. And carved into the tree's bark is a tiny 😉 face.

When you began your journey you did not and could not have known about the 😉 face, unless someone else told you it was there because they had discovered it themselves.

The 😉 face was secret, but it had no password.

To unlock that secret, you had to find the right location. To find the right location, you had to walk. Proof of work.

Autonomous Geometric Vaults aren't about encryption. They are a method to hide something inside of distance. They make traversal consequential. They harness the spacelessness of the digital and yoke it to Locality. They enable the exact scenario above with the tree and 😉 to take place at the protocol level of nostr in a decentralized manner.

I think that is something amazing.

nostr:nevent1qqs8n5d76umt95dd9lv39ylsdgyaa9ngf7spxwt6pf55yw73zvr74csprfmhxue69uhkvctwveshyetn9ehx7um5wgcjucm0d5hsyg8ga5me33hla0l6ppgp4su7yutx9073vrmg372vghtf9krk0hf5tgpsgqqqqqqskae3zx