Matchpool

What is Matchpool?

Matchpool is a unique matchmaking protocol that makes use of the blockchain principle of decentralization and group dynamics to allow users to connect and get in touch with their lovers. Simply put, this is the blockchain equivalent of OK Cupid and so many other dating apps that have become famous in recent years.

However, unlike these dating apps, the potential for Matchpool is not just limited to finding love, but it is all about establishing a need and creating a community around that need.

By design, Matchpool is meant to be a generic platform upon which a community can be built, especially communities that require paid membership plans.

As long as the communities can clearly identify both sides of the market or their interaction, Matchpool can be a useful tool to make this a thriving experience.

The vision behind Matchpool is to establish and allow all users the chance to use matchmaking tools that do not just connect them with people around the world, but also incentivize quality interactions while at it. To incentivize the communities created, Matchpool uses cryptocurrency payments, hence providing value for everyone on the network.

What is the problem that Matchpool Solves?

A lot of those who have used dating apps in the past will admit that even though they managed to have fun using them, or even ended up meeting their soulmates, there were challenges that need to be addressed. There are two basic challenges that these apps seem to be struggling with.

One of the first concerns is the dehumanization of the strategies used for profiling users. As a result, these platforms end up putting very little effort towards using forms of matchmaking that are more effective and/or efficient.

Subscription money is the second challenge that these platforms grapple with. Everyone seems to be very keen on cashing in on the innate desire by people to go online and find a match. In light of this, a lot of the apps will intentionally establish and work towards maintaining a demographic imbalance, so that they can cash in on the user experience.

Relevant studies into the use of these apps suggest that more than 60% of people who use dating apps are men.

Other than that, there is the fact that we end up with a lot of social apps that are aimed at matchmaking.

However, the real picture on the ground is that these are people who barely have some social cues or real-life social experiences with people around them.

This abundance of men on social apps and an obvious shortage of women ends up in an environment that is neither successful nor fun to engage in.

In the long run, a lot of users are disappointed and disgruntled at their experience with these apps, and some even end up turning into predators. To be honest, none of these apps or companies, if any, ever truly care about what their users feel. For them, it is all about getting money through subscriptions, and bombarding you with ads where necessary.

How does Matchpool Solve the problem?

Matchpool is different from all these apps. In design and application, Matchpool uses game theory.

To do this, it allows users the benefit of creating their own pools to meet their unique demographic requirements.

The design of the pools draws from some of the most useful collaboration platforms out there, Meetup and Slack. Matchpool, therefore, has successfully designed the pools to look like a perfect blend between the Meetup groups and Slack channels. These are invite-only pools, which are federated and operated by matchmakers who are devoted to their course.

What makes Matchpool better than the competitors?

In a market that is already filled with apps and websites, each trying to carve a niche out for themselves, Matchpool’s biggest challenge is to come up with a unique proposal for their target market.

Unique

Uniqueness is not one of the easiest points to achieve in this market. Matchpool, however, has managed it by introducing a matchlock feature. This is a unique feature that strives to keep the ratio of x and y at 50:50. How does this happen?

Matchlock actively monitors the population in the Matchpool ecosystem. Whenever a given number of x have joined the network, it stops more x from joining that particular pool until a similar number of y have joined the pool.

X and Y here are used and do not necessarily signify men and women. This is because Matchpool can be used as a means of social interaction between different people, or people who share different common goals.

Assuming a dating context, for example, if a given number of men join the pool, matchlock makes sure that no more men will join the pool until a similar number of women have joined the pool.

This is, of course, in a pool that is specifically created for men and women to meet and interact with one another, and in a dating context based on gender.

In other parameters, x and y can be used in any situation where there is a need to establish an arbitrary market polarity. By design, there is no restriction in the structure of matchlock to warrant that x and y must always be opposites.

In the case of an entrepreneurial matchmaking, or in any other use, for example, x and y can be the same, or unset altogether. In an LGBT pool, for example, the gender demographic or configuration for either side might be the same. Therefore, it is up to the founder of that specific pool to determine what the composition of x and y will be, in order to meet the unique demands of the pool they created, or the community they have a vision to establish.

Strategy

In order to connect users, social networks employ one of two or both strategies, pooling, and profiling. Before social interactions went online, a profiling strategy would involve creating a classified in one of the local newspapers.

This is a very clear means of going about things, given that both sides of the divide are clear about what they are looking for. One user advertises what they want, the other user responds to that demand.

In terms of pooling, one social network that has perfected this is Twitter. While profiles are important on Twitter, most of the interaction comes from spontaneous human interaction.

Therefore, Twitter is a social platform that is geared towards pooling. In the real world, some of the best examples of pooling include interactions that happen in nightclubs, bars, concerts and so forth.

Others that are more direct include speed-dating.

Matchpool has managed to combine profiling and pooling effectively. Those who join pools have profiles, but these are only useful in sorting out the pools. After that, they can engage one another in different pools they belong to, through chats, attending events or playing dapplets.

The events are often organized by the persons in charge of the pools for the entire group. Pools essentially create an enabling environment wherein nature can take its own course, and people can interact with one another freely.

The pools are designed to create as many matches as innately possible. There is also the natural motivation by singles. Intentionally, the pools created in Matchpool establish a community high on trust. There is a lot of pressure for the pool members to behave well towards one another, avoid spamming, or sending mass messages of low quality.

How can Matchpool be categorized?

Matchpool is a social networking project. It is a project that is built and leveraged on the benefits of the blockchain, such as decentralization and the use of Ethereum smart contracts. This matchmaking blockchain project is not just one of a kind, but a champion, given that it does not restrict the type and number of communities that can be created.

What’s Matchpool’s vision on Security?

Like any other platform that brings together different people with different interests and creates communities for them to fit in, security is one of the prime concerns of Matchpool. Matchpool uses smart contracts. Smart contracts are unique lines of code that are written to perform a specific task upon execution. Apart from that, the use of smart contracts also makes sure that there is a trustless and automated interaction without having to concentrate power in a central space.

Matchpool is an Ethereum-backed project. Because of this, all users are in full control of their security, their data, community management, and identity management. This is one of the features that inspires a high level of trust among Matchpool users.

Transparency of the blockchain is another factor that has made it easier for a lot of people to venture into Matchpool. Given that Matchpool runs on a decentralized platform, it is very difficult and expensive to orchestrate an attack. There is no central point to target, so for anyone to make an attempt, it would take a lot of effort and in the long run, this would be very expensive for them, hence a deterrent.

Examples of Matchpool use cases/applications

Bloggers

Content curators and bloggers can use Matchpool to establish communities that are passionate about the topics they write about. This is a good way for them to create and sustain exposure, while at the same time driving traffic to their pages.

Startups

In the case of startups, using Matchpool is all about creating organic communities like what we find on Telegram and Slack. These ventures can benefit from using pools to interact with like-minded persons.

Recruitment

Recruiters can also use Matchpool to link people with the right set of skills to the right employers who would appreciate their services.

School Communities

Learning institutions are often focused on creating communities that share a common goal or objective. More often, these communities will include faculty members, professors, students, and at times the wider community around the school, especially for corporate social responsibility purposes.

Through Matchpool, it is possible to enhance the activities of people who share objectives in this manner. There are specific, user-defined matchmaking and reputation scores which apply, and it is through these that Matchpool is able to connect like-minded persons. Deploying Matchpool on different mobile platforms has also made it easier, and increased the reach potential for Matchpool.

Students

There are several ways through which Matchpool has been an innovative product, and applications vary, given the kind of community that it is being used in, or for. Let’s take the case of the student population, for example. Matchpool has made it easier for students to monetize their talents in the following manner:

  • Success Fees

Until a match is confirmed, it is barely a match. The pool owners can put a price on matches. For each match they facilitate, they can earn monetary rewards. This, in the student environment, can have a wide range of applications.

The pool owners can simply create a platform that matches students with classes that they feel the users should consider taking, match them with sports teams which would be a good fit for the students, or even link students with tutors.

  • Pay Walls

It is up to the pool owner to decide whether or not they must implement a pay wall. Pay walls simply require members to pay a fee before they can join a given pool. The good thing about this is that it creates an element of exclusivity and clout, which can be leveraged by the pool owners or members, and used as an income-generating venture.

This can be used by students to create a unique pool that allows them access to a special or unique society like a sorority or a fraternity, access to a special or extremely talented group of tutors, join a club or sport or something of the sort.

  • Subscription

Using a subscription model for pools is another way to generate money out of this for students. This is not just for the student population, but learning institutions can also implement this. They can create pools where members pay a subscription fee to access certain classes directly.

Resources

https://coincheckup.com/coins/Matchpool

https://matchpool.co/

https://blog.matchpool.com/

https://medium.com/matchpool/faq/home

https://matchpool.co/wp-content/uploads/2017/04/mp_wp3.pdf

NAV Coin

What is NAV Coin?

NAV Coin is a self-sustaining entity, built to take advantage of the benefits of decentralization, and to help more people integrate blockchain technology into their lives.

From the basic design, all cryptocurrency is all about decentralization. A product or project that is honestly built to be operated by and for the public must have the element of rigorous truth in it.

Through decentralization and subsequent automation, people who use projects like NAV Coin are in a good position to make informed decisions about some of the systems that they intend to operate. This, therefore, gives them an advantage, because, for the first time, users are able to experience a fair playing field, without interference from overlords in the form of governing bodies and other middlemen.

Apart from offering a decentralized solution to so many problems that we struggle with today, NAV Coin also offers protection to all those who use the project for one reason or the other. Hypothetically, there is safety in numbers when using projects like NAV Coin. Therefore, there is a very limited chance that someone would be able to execute a malicious attack on the system, attack or threaten those who are already using the system.

This all comes down to the fact that there are so many people involved in the project operation, and the nature of their relationships makes it very difficult for malicious attacks to thrive.

NAV Coin is not just a self-sustaining entity, it is also distributed free, as open source code. It is designed to establish and facilitate trust, and in so doing, users who meet these requirements earn rewards in the process.

What is the problem that NAV Coin Solves?

NAV Coin makes use of some of the best features inherent to decentralized tech, alongside some privacy-centered network design features. NAV Coin also uses a dual blockchain system to support the network. However, it does not depend on centralized databases.

While the dual blockchains are decentralized, all the scripts that are run through them, and process all transactions are run on a web server that the public interact with. This means that this is one network point that can easily be referenced with an IP address. All this is maintained and managed by the Nav Coin Development Team.

Safe Subchain Distribution

It is virtually impossible for someone to gain access to the subchain coins for malicious purposes, especially since the subchain is available to the public. Therefore, a supposed attacker would be unable to send the wrong instructions to a server in an attempt to gain NAV Coins from the system.

The way servers are designed in NAV Coin, they are only supposed to respond to instructions on subchains, that are considered truthful sources. Given this concept, if any user learns how to read and identify addresses from outgoing servers and send transaction requests to that address, it becomes possible for them to instruct the server to send NAV Coins to whichever address the attacker would have specified.

Protection from malicious server operations

Building on the concept of decentralization has its benefits and challenges. One of the challenges is that when unknown members of the global population have the opportunity to become server operators, there is always a risk that one of these operators might have malicious tendencies.

There is a possibility of taking advantage of system flaws. For example, the system accumulates all incoming transactions before processing them in blocks in a period of every two minutes. What this means, therefore, is that a cunning server operator has a 2-minute window within which they can take their server offline before any pending funds are processed, and in the process, steal all the NAV Coins that might have been in the input process.

Other than the risk of stealing NAV Coins, there is also the possibility that such a server operator might also be tempted to record or simply monitor all transactions that pass through their servers for whichever reason.

Power to the end user

For such a system to be in operation, there is a lot of trust needed between the users and server operators. On the part of the users, they expect that the server operator exercises due diligence in the operation, wherein they do not record any information, and besides that, offer a guarantee that the shared funds will be delivered to the intended recipients.

In a system that relies on trust, power and choice should be in the hands of the users. The reason for this is because taking away choice from users means they have no control over the platform they are using. Without control, users cannot trust the platform. It is important in the decentralization realm, that users have the ability to establish and use their own systems, instead of depending on intermediaries.

How does NAV Coin Solve the problem?  

While decentralization is an important aspect of the blockchain revolution, it has certain challenges as outlined above, which should be addressed in a technical capacity. With NAV Coin, the most efficient security method that can be used to protect the system from hacks or fraudulent players is to create trusted clusters for the servers, wherein they can transact with one another.

By having servers operating in the same cluster, these servers are able to share different and layered security features. This makes it easier to prevent the processing of unwarranted transactions, hence keeping the system safe.

IP Restriction

This is one of the safest ways of preventing malicious users from gaining access to the outgoing servers. Even in the unlikely event that one such person was able to clone one of the IP addresses that are accepted by the incoming servers and request for credentials, the outgoing server would simply send the response to the original IP address (incoming server) and not the clone. Therefore, the ISP simply routes traffic to the correct incoming server IP address, instead of the one created by the malicious attacker. How is this done?

At the configuration point of all servers set to accept incoming transactions, a list of accepted IP addresses for all the servers that send outgoing transactions is provided.

The servers use this list whenever processing transactions. Therefore, the servers cannot communicate with any IP address that is not on this list.

Unless the incoming servers are undergoing scheduled maintenance, there is no IP restriction on them.

This is important so that their API stays open for prompt communication between potential IP addresses and the NAV wallets. It is also important to note that the outgoing servers are the only servers with a pre-loaded pool of NAV which can be extracted. As a result, it is important that they are given this kind of protection.

RSA Encryption

In order for an incoming server to handle transactions or communicate with the outgoing server, there are several IP restriction tests that it has to pass. If the messages are coming from a recognized IP address, the outgoing server sends a public RSA encryption key to the incoming server.

The RSA encryption key encrypts the secrets, address, and amounts involved in the transaction before committing the transaction to the blockchain. An outgoing server receives the subchain transaction and decrypts the information on it. If the outgoing server is not able to decrypt the transaction, the transaction is sent back to the subchain from where it originated.

What is the role of this encryption? The encryption helps in keeping all information that is submitted to the subchain private as it should be. Other than that, it is only possible to access a public key through the API of an IP restricted outgoing server. For this reason, the only transactions that the outgoing servers can process and those that come from whitelisted incoming server IP addresses.

Use of Secret Tokens

When setting up an incoming server in a server cluster, a 42-character token is generated. This token is then added to a configuration file in the cluster, that identifies all the incoming servers and outgoing servers.

After creating a subchain, the secret token is combined with the address and the amount in the transaction, encrypted with the public keys for the outgoing servers, and then added to the blockchain.

Upon decryption by the outgoing server, the secret token in the transaction has to be similar to the secret that is present in the configuration file for the outgoing server. If this is not the case, the subchain is sent back to the originator.

Even with some of the best supercomputers in the world today, this is one of the most difficult RSA encryption protocols to decode or hack. Other than that, since this secret is not broadcast on any of the servers that make up the cluster, it is impossible for anyone to hack it. In fact, according to experts, it would take someone who is dedicated to hacking the secret at least 143 vigintillion years to hack this through brute force.

Server Whitelists

Each user has the capacity to determine the incoming servers that they can include in the configuration files for their wallets. In case you have already been using the NAV Coin project, your wallet configuration file should have the Official Navtech incoming servers included. In case any of the service operators you use has created a cluster of Navtech servers which you would intend to use, you can easily add the servers in that cluster to your configuration file. Presently there is no limit to the number of servers you can add to the configuration whitelist for your wallet.

What makes NAV Coin better than the competitors?     

Security

NAV Coin offers a highly secure platform for users, and this is one of the reasons why it is a cut above most of the competition. In the blockchain realm, this level of security also inspires confidence in the users and makes them appreciate the project even more.

Malicious attacks

Servers in the NAV Coin project can be operated in private clusters. Because of this reason, it is virtually impossible for a malicious attacker to extract coins from the network. Assuming that the network was to be run as a large network without clusters or boundaries, it would be almost impossible for any user to be confident that their coins would safely terminate to the other end of the transaction since they have zero control over the entity in the network that processes their coins.

Public confidence

The public can be assured of transparency in the mode of operation. The public Github source and community server lists provide a level of guardianship, which helps to bestow confidence in the decentralization of this project.

How can NAV Coin be categorized?

NAV Coin is a digital currency that is built off Bitcoin. Through the Navtech system, NAV Coin presents users an opportunity to protect their privacy when engaging in financial transactions online. It offers a level of anonymity that makes transactions safe, secure and efficient.

What’s NAV Coin’s vision on Security?

NAV Coin is one of the projects that has taken security a notch higher. There are several steps in place to help with this. NAV Coin uses the server MD5 Hash. Other than users being able to add incoming servers to their configuration files, they are also able to specify Navtech hashes that should be considered as genuine.

At the point where the user wallet needs to make a transaction request to an incoming server, it must first of all request the server to hash the running file, which the server will return as part of the response. In case the hash returned by the server is not similar to the hash that was pre-identified as a genuine hash, the wallet notifies the user that the server that it has been in contact with does not have the same source code that is expected. Therefore, you need to remove that server from your list. Other than that, this automatically bars the transaction from completion.

The hash is not backed into the wallet but is user specified. The reason for this is because NAV Coin is an open-source project. In case a user would love to create their own cluster of servers and tweak the source code to meet their needs and have it perform a different transaction, NAV Coin does not intend to stop users from doing that. This is the beauty of open source development. Users are free to do as they please with the source code.

This is also aimed at making sure that whenever update hashes have been posted, they are not forced down on users to download the wallets and update their Navtech source all the time.

Examples of NAV Coin use cases/applications

NavPi Kowhai

This is a rebuild of the NavPi StakeBox with enhanced usability, performance, and security. It is specifically designed to help in making NAV staking easier for users and efficient.

Lightning Network

The implementation of the lightning network is important in the sense that it allows users to access atomic swaps, cross chain and instant transactions between NAV and any of the other cryptocurrencies that might be supported.

Resources

https://coincheckup.com/coins/NAV-Coin

http://www.navcoin.org/

https://info.navcoin.org/

http://medium.com/nav-coin

https://info.navcoin.org/faq/

https://www.navcoin.org/files/navtech-whitepaper-beta-v0.9.pdf