Monero Digital Signature and Proof-of-Payment Verification with a Pluggable Authentication Module
Posted: 24 Dec 2024 16:17
The Sovereign Project (http://sovereign.i2p) has recently developed a Pluggable Authentication Module (PAM) that enables authentication via the verification of a digital signature provided through a Monero wallet and optionally enables authorization through the verification of a Monero payment.
Successful access via PAM can be constructed to require just a verified digital signature or a verified digital signature as well as the verification of a Monero payment.
The Sovereign Project claims to leverage Proof-of-Power. From their web site:
The Sovereign Project believes that effective cyber security requires an investment of physical power to make cyber attacks cost-prohibitive. Logic alone doesn't suffice, we need to leverage physical power in the form of watts (i.e., electrical power) to defend against attack. The Sovereign Project leverages the power consumption of a proof-of-work blockchain to effectively secure resources defended with the Sovereign protocol, using watts, at very low cost. Currently the Sovereign protocol can leverage more than 68 megawatt hours to secure resources.
The PAM leverages the use of the I2P network access. This is an interesting approach to securing resources using PAM and a privacy coin (Monero).
Successful access via PAM can be constructed to require just a verified digital signature or a verified digital signature as well as the verification of a Monero payment.
The Sovereign Project claims to leverage Proof-of-Power. From their web site:
The Sovereign Project believes that effective cyber security requires an investment of physical power to make cyber attacks cost-prohibitive. Logic alone doesn't suffice, we need to leverage physical power in the form of watts (i.e., electrical power) to defend against attack. The Sovereign Project leverages the power consumption of a proof-of-work blockchain to effectively secure resources defended with the Sovereign protocol, using watts, at very low cost. Currently the Sovereign protocol can leverage more than 68 megawatt hours to secure resources.
The PAM leverages the use of the I2P network access. This is an interesting approach to securing resources using PAM and a privacy coin (Monero).