Skip to content
A platform for decentralized privacy coins
Go Shell Other
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
addrmanager
bin
blockchain
bootnode
cmd
common
connmanager
consensus
database
databasemp
incognitokey
limits
memcache
mempool
metadata
metrics
mocks
netsync
peer
privacy
process
pubsub
rpcserver
specs
testexample
tests
transaction
utility
wallet
wasm
wire
.gitignore
COPYING
Dockerfile
GettingStarted.md
Gopkg.toml
README.md
build.sh
build_test.sh
config.go
constants.go
create_tmux.sh
go.mod
go.sum
incognito.go
keycache.go
keylist-mainnet.json
keylist.json
keylist_256.json
log.go
params.go
run_new.sh
run_node.sh
sample-config.conf
server.go
signal.go
start_chain.sh
start_node.sh
version-chain-main.json
version-chain.json
version.go

README.md

What is Incognito?

We now live in a token economy. Everything is being tokenized. Fiats. Gold. Bond. Storage. Computing Power. Digital Art. Collectibles. Buildings. More.

We believe the biggest problem to this new token economy is the lack of privacy. Current blockchains display all transactions publicly — so anyone can see your balances or track your activity. Given the choice, we strongly believe that very few people will willingly disclose their crypto financials to the entire world. Incognito offers anyone the option to turn on privacy mode in this new token economy.

That's why we work to create solutions that make privacy widely accessible and incredibly simple for anyone, anywhere on earth, to exercise their right to that choice.

Incognito is live. Give it a try!

Build the code

The below instructions will get you up and running on your local machine for development and testing purposes. Building Incognito requires Go. Once Go is installed, clone this project to your local GOPATH and build it.

go build -o incognito

Then, run an Incognito Node

./incognito --enablewallet --wallet "wallet" --walletpassphrase "12345678" --testnet --norpcauth --walletautoinit

Read the code

There is more than 1 million lines of code in the Incognito codebase. Below is a quick overview of Incognito architecture and its key components that will help you navigate through the code.

  • P2P Networking

    • Peer Management. Peer management handles peer-to-peer communications such as finding peers, connecting to them, sending and receiving transactions, blocks, and messages. Its code is in the connmanager package and the addrmanager package.

    • NetSync. NetSync is a mediator that receives incoming messages, parses them, and routes the messages to the right components. Its code is in netsync package.

    • Highway. Highway is a new network topology design that speeds up P2P communications. It is under development under the highway branch and will be merged into the master branch in November 2019.

  • Blockchain

    • Shards. Shards are subchains. A subchain is a Proof-of-Stake blockchain with its own committee of N nodes. A shard's job is to produces new block via a Practical Byzantine Fault Toloerance (pBFT) consenus algorithm. Its code is in the blockchain package.

    • Beacon. Beacon is also a subchain. A beacon's job is to coordinates the shards and maintain the global state of the network. Its code is in the blockchain package.

    • Synker. Synker makes sure the node is up to date among its peers and also broadcasts the node status to its peers. Its code is in the blockchain package.

    • Mempool. Mempool (memory pool) is a collection of transactions and blocks that have been verified but are not yet confirmed. Its code is in the mempool package.

    • Wallet. Software that holds all your Incognito keys. Use it to send and receive your Incognito tokens. Its code is in the wallet package.

    • Database. Incognito uses LevelDB to store block data. Its code is in the database package.

  • Core

    • Consensus

      • pBFT. For consensus algorithm, Incognito implements pBFT (Practical Byzantine Fault Tolerance). Its code is in the blsbft package.

      • BLS. For multi-signature agregation, Incognito implements BLS Multi-Signatures. Its code is in the blsmultisig package.

      • RNG. For random number generator, Incognito currently uses Bitcoin block hash. We'll explore other RNG solutions in the future. Its code is in the btc package.

    • Privacy

      • RingCT. For privacy, Incognito implements RingCT (Ring Confidential Transaction) with ring signatures, stealth addresses, and confidential transactions. Its code is in the privacy package.

      • Confidential Asset. RingCT hides the amount of the transaction, but it doesn't hide the type of asset being sent. Confidential Asset solves that. It's under development under the new-privacy-dev branch and will be merged into the master branch in December 2019.

      • Mobile ZKP. Incognito implements Zero-Knowledge Proofs (ZKP) Generation on mobile. Private transactions can be sent on any regular phone under 15 seconds. Its code is in the wasm package and the zeroknowledge package.

    • Bridges

      • Ethereum. Incognito implements a trustless two-way bridge between Incognito and Ethereum to let anyone send and receive ETH & ERC20 privately. Its code is in the bridge-eth repository.

      • Bitcoin. Incognito is working on a trustless two-way bridge between Incognito and Bitcoin to let anyone send and receive BTC privately. Estimated ship date: Dec 2019.

      • Cosmos. Incognito is exploring Cosmos and hops to build on a trustless two-way bridge between Incognito and Cosmos. Estimated ship date: March 2020.

  • Developer Tools

    • RPC. RPC lets developers interact with Incognito via your own programs. Its code is in the rpcserver package.

    • WebSocket. WebSocket is another way for developers to interact with Incognito via your own programs. Its code is in the rpcserver package.

    • SDK. Incognito is working on Developer SDKs to make it even easier to build on top of Incognito. Estimated ship date: Nov 2019.

  • Apps

    • Mobile Apps. It's easy to build your own mobile apps on top of Incognito, once the SDK is available. Here is an example: Mobile Wallet.

    • Web Apps. It's easy to build your web apps on top of Incognito, once the SDK is available. Here are some examples: Web Wallet or a Desktop Network Monitor.

    • Hardware Devices. It's easy to build your own hardware on top of Incognito, once the SDK is available. Here is an example: Node Device.

Contribution

Incognito is and will always be 100% open-source. Anyone can participate, everyone can join, no one can ever restrict or control Incognito. There are many ways to participate.

  • Report a bug via Github Issues

  • Suggest a new feature via Github Issues

  • Want to build a feature or fix a bug? Please send a Pull Request for the maintainers to review your code and merge into the main codebase.

  • Write tests. We'll provide instructions soon how to setup local test environment.

License

Incognito is released under the terms of the MIT license. See COPYING for more information or see LICENSE

You can’t perform that action at this time.