1.0 Overview
The core innovation behind Bitcoin is its decentralized structure. Unlike traditional fiat currencies,
Bitcoin has no central control, no central repository of information, no central management, and no
central point of failure. To this point, Verge was created to bring tailored transactional applications and
inherent privacy implementations to strengthen user obfuscation while maintaining Nakamoto’s vision
of a decentralized electronic payment system based on cryptographic proof instead of third-party trust.
1.1 Multi-Algo PoW
Verge is a multi-algorithm enabled proof-of-work based cryptocurrency that is designed to enable people with different
types of mining devices to have equal access to earning coins. It is one of the few cryptocurrencies to support 5 hash
functions combined on one blockchain. This results in increased security due to a wider range of people and devices that
can mine Verge. The 5 algorithms supported on the Verge network are: Scrypt, X17, Lyra2rev2, myr-groestl and blake2s.
All 5 algorithms have a 30-second block target time and the difficulty is influenced only by the algorithms hash rate.
1.2 Tailored transactional applications
Verge (XVG) was originally created based on the idea of providing end-user identity obfuscation suited for everyday use.
We believe that every human deserves the right to privacy and with that idea in mind we pride ourselves on being able
to provide several different available methods of transacting across the Verge network. Each method provides our users
with a base level of obfuscation through the TOR network as well as different obfuscation options tailored for everyone’s
specific needs.
1.3 Simple transactions
Much like Bitcoin, the Verge network operates on a publicly facing blockchain. It is important to understand that all
transactions are stored publicly and permanently on the blockchain. This means that anyone can see the balance and
transactions of any Verge address. However, Verge addresses are not themselves linked to a person or entity and users
remain pseudo-anonymous so long as different addresses are used per transaction and or until information is revealed
during a purchase or other transactional circumstance [REF]. These styles of transactions are best suited for general
everyday use.
1.4 Stealth transactions
Stealth transactions are primarily compromised of dual-key stealth addresses. As you will read later in this paper, stealth
addresses are a method by which additional obfuscation can be implemented to further protect the receiving party
when transacting with Verge. This is done by requiring the payers to generate random one-time addresses for a given
transaction. When multiple users send funds to a stealth address, rather than these transactions appearing on the
blockchain as multiple payments to the same address, they instead appear as multiple payments going to different
addresses. This (in theory) makes it near-impossible to link transactions to the recipient’s published address or one-time
generated addresses.
It is important to note that this type of transaction is designed such that the recipient of a payment can maintain their
privacy, Stealth addresses do not provide 100% anonymity and do not protect the sender.
1.5 Anon transactions
Anon transactions use a combination of dual-key stealth addresses and RingCT (Ring Signatures and confidential
transactions) to preserve the anonymity of both the sending and receiving parties. These concepts will be explained later
in this paper; however, the short version is that Ring Signatures make it harder to trace transactions by obscuring the
output of the true sender in a set of other outputs on the blockchain, confidential transactions hide the actual amounts
being sent, and TOR hides both parties true IP addresses i.e. IP obfuscation.
This style of transaction is best suited for those who are fully looking to maintain their personal privacy.