top of page

There are different ways the world can communicate:

How do End to End Instant Messengers work? (Whats App, Signal, Telegram)

 

End to End Encryption was developed as a way to solve data security issues. Let's say Bill Gates wants to send Warren Buffet a text message. This text message must travel through a medium, like SMS, GSM or a wifi signal. Whats App, Signal and Telegram all provide this type of medium. 

 

Buffet’s message enters the medium. End to End Encryption would alter Buffet’s message using a combination of a public and a private key. This message would then only be decrypted by a similar key that only Gates has access to. A truly encrypted message, end to end, could travel freely from the sender to the receiver and the medium would have no way of accessing the information. The public key is just what it sounds like, easily accessible and decryptable. This key is derived from the private key, which only the owner has access to.


 

Currently, end to end encryption is not in its truest form. Communication platforms must succumb to instructions and have certain human error present. The government accesses certain information and forces its way into the medium. It is then able to decrypt this information. This is done in different ways; many companies store customers' private keys in case they are ever needed for surveillance or some companies weaken parts of their code selectively so the government can access their mediums if needed. Backdoors are the ways that your “encrypted” information can be accessed. 

 

Hackers can access these lists of private keys or can find the loopholes in the code. They can learn from governmental practice and attack data the same way the government is able to access it. This is a risk the government is willing to take.

Furthermore, many of the common end to end encryption platforms have significant downtime. Users have no control over when these downtimes may occur and often suffer serious administrative and monetary loss. 

 

It is clear that the current methods we communicate with have flaws. We are here to provide an alternative. 

 

How will blockchain and NFT technology give people optionality

 

End to End Encryption is not perfect. Fiat currency, currency issued and regulated by a central government, is not perfect. Human error exists and can alter the integrity of systems. As officials print more and more money, hackers access more and more private information, some systems would operate better if they were invincible to human alteration. Blockchain is just that.

 

G2 minus optimizes Non-Fungible tokens to ensure that messages remain private. Instead of public and private keys, G2 minus takes advantage of the strength of blockchain and NFT recognition. Every cryptocurrency wallet has a private key that, derived, creates a public identification key. The public key becomes your address, where people can look at the contents of your wallet and your past transactions. Private keys and encrypted and then converted to passwords, long chains of random words. This passcode acts as your private key and only you have access to it. The only way for someone to access your cryptocurrency wallet is if you gave them your private key. Furthermore, the only way someone could prove your identity is if you gave them your private key. You can create many wallets and store different currencies and tokens in each. 

 

The blockchain and cryptocurrency certification is done in two ways. There is proof of work and proof of stake methods to certify transactions between users. How these certifications take place is important to understanding the decentralized nature of cryptocurrency networks; Proof of work randomly awards certification contracts to network users and tasks them with solving complex numerical puzzles, using computer power, to certify transactions. Proof of Work is used by blockchain like Bitcoin and is considered one of the most secure certification mechanisms. Proof of stake selects validators through a computer selected bidding process, selecting those with large portions of cryptocurrency before smaller stakeholders. Regardless of the blockchain certification system, no governing body has control over what transactions are given to what certifying groups. This entails full transparency. Furthermore, the past transactions of the blockchain are public. Nobody can alter this. 

 

Non-Fungible Tokens live on this blockchain. When they are bought and sold, using cryptocurrency or other barter techniques, these transactions are certified through blockchain. No person has any say in what gets certified and what doesn't. There are many implications of this technology. G2 Minus is here to give you optionality, to give you freedom.

How will blockchain and NFT technology give optionality?

End to End Encryption is not perfect. Fiat currency, currency issued and regulated by a central government, is not perfect. Human error exists and can alter the integrity of systems. As we print more and more money, access more and more private information, blockchain and NFT technology provide a suitable alternative, invincible to human alteration. 

 

G2 minus optimizes Non-Fungible tokens to ensure that messages remain private. Instead of public and private keys, G2 minus takes advantage of the strength of blockchain and NFT recognition. Every cryptocurrency wallet has a private key that, derived, creates a public identification key. The public key becomes your address, where people can look at the contents of your wallet and your past transactions. Private keys and encrypted and then converted to passwords, most many, random words. This passcode acts as your private key and only you have access to it. The only way for someone to access your cryptocurrency wallet is if you gave them your private key. Furthermore, the only way someone could prove your identity is if you gave them your private key. You can create many wallets and store different currencies and tokens in each. 

 

The blockchain and cryptocurrency certification is done in two ways. There is proof of work and proof of stake methods to certify transactions between users. How these certifications take place is important to understanding the decentralized nature of cryptocurrency networks; Proof of work randomly awards certification contracts to network users and tasks them with solving complex numerical puzzles, using computer power, to certify transactions. Proof of Work is used by blockchain like Bitcoin and is considered one of the most secure certification mechanisms. Proof of stake selects validators through a computer selected bidding process, selecting those with large portions of cryptocurrency before smaller stakeholders. Regardless of the blockchain certification system, no governing body has control over what transactions are given to what certifying groups. This entails full transparency. Furthermore, the past transactions of the blockchain are public. Nobody can alter this. 

 

Non-Fungible Tokens live on this blockchain. When they are bought and sold, using cryptocurrency or other barter techniques, these transactions are certified through blockchain. No person has any say in what gets certified and what doesn't. There are many implications of this technology. G2 Minus is here to give you optionality, to give you freedom.

bottom of page