Proof of Origin

Transfer the data to someplace safe.

Proof of Origin

Transfer the data to someplace safe.

To put it simply,

A chain that confirms a location through the collection, confirmation, and storage of bound witness interactions. This chain is used to answer questions related to location data certainty.

A chain that confirms a location through the collection, confirmation, and storage of bound witness interactions. This chain is used to answer questions related to location data certainty.

A real world example of proof of origin is coming soon!

What is Proof of Origin to a developer?

Proof of Origin is the key to verifying that ledgers that contain location data flowing into the XYO Network are valid.

A unique ID for source of data is not practical since it can be spoofed.

Private key signing is not practical since most parts of the XYO Network are difficult or impossible to physically secure, so the ability for a bad actor to steal a private key is too feasible.

To solve this, XYO Network uses Transient Key Chaining. The benefit of this is that it is impossible to falsify the chain of origin for data. This key chaining comes from the Bridge to the Archivist and then to the Diviner.

Proof of Origin is the key to verifying that ledgers that contain location data flowing into the XYO Network are valid.

A unique ID for source of data is not practical since it can be spoofed.

Private key signing is not practical since most parts of the XYO Network are difficult or impossible to physically secure, so the ability for a bad actor to steal a private key is too feasible.

To solve this, XYO Network uses Transient Key Chaining. The benefit of this is that it is impossible to falsify the chain of origin for data. This key chaining comes from the Bridge to the Archivist and then to the Diviner.