In order to guarantee a certain degree of immutability and security of the register and of the data that is printed on it, the data must be replicated in several nodes, which must be contained both in an extended geographical area and in a certain number of different subjects: for this reason we have designed a standard that takes the form of a distributed, decentralized and certified network composed of 3 classes of node groups optimized for higher performance with lower energy absorption, which allows mining the TRINCI blockchain, gaining in FIAT currencies (dollar, euro, pound etc.).
Today Affidaty, after having studied and tested numerous solutions to find the best hardware to run its blockchain, has a specific network for blockchain applications optimized for high performance with low energy consumption, so that it can be considered in all the aspects "sustainable". Compact size optimizes the necessary space, making the hardware installable everywhere. Furthermore, to be geographically located even in the most remote areas of the globe, it was designed and built to tolerate temperature variations to the highest standards. Extreme speed, low consumption, miniaturization, Affidaty changes the hardware paradigm for the mining and any blockchain application.
IndependentChain is the hardware network of T.R.I.N.C.I., the blockchain of Affidaty, a completely decentralized structure, PROOF OF AUTHORITY, formed by certified nodes and whose energy consumption is so insignificant that it can be defined "sustainable". No user has privileges over others, no one can control the information that is stored on it, modify or delete it, and no one can alter the protocol that determines the functioning of the underlying technology. Furthermore, there are no focal points, so the whole system is based on an entirely distributed architecture. Anyone, subject to authentication and certification, can become a miner in IndependentChain, actively participating in the generation of new transactions and earning from the sale of the computing power to all the applications that use the blockchain of the system.
Using IndependentChain is like being part of one of the safest blockchains in the world, made up of hardware specially designed and structured to support business projects and enterprise infrastructures. The distributed, decentralized and certified network service offered by the IndependentChain brand is provided by Affidaty SpA, which makes it available through the network on its domains. Except as prohibited by law, the user can access it from all over the world (through any channel he chooses) subject to acceptance of the attached Terms and conditions of use of the chosen service, as well as according to the terms reported in the AGA-BS annexe. Blockchain services are designed to be available twenty-four hours a day, seven days a week.
On September 11, 1940, George Stibitz succeeded for the first time in sending a problem using the teletype to the Complex Number Calculator in New York and receiving the result at Dartmouth College in New Hampshire.
This configuration, which included a central computer (or mainframe) and remote terminals without computing capacity, remained popular throughout the fifties. However, it was not until the 1960s that researchers began investigating packet switching, a technology that allowed small amounts of data to be sent to different computers without going through a centralized mainframe. A network of four nodes was first built and tested on December 5, 1969; this network later took the name of ARPANET, and in 1981 it came to connect 213 nodes. 
The development of ARPANET was based on the RFC ( Request For Comments ) mechanism and on April 7, 1969, RFC 1 was published. This process is vital as ARPANET later merged with other networks to create the Internet and numerous protocols on which the Internet is based today were specified by the RFC mechanism. In September 1981, RFC 791 introduced Internet Protocol version 4 (IPv4) and RFC 793 introduced the Transmission Control Protocol (TCP), thus giving rise to the TCP / IP protocol on which most of the Internet is based.
Since the birth of the Internet, many phenomena have arisen that have helped the development of the network to the present day.
Today there is a new challenge, making the Internet a safe and authentic place. However, the Internet was confusing and lacking in security, until the advent of Satoshi Nakamoto who in November 2008 published the Bitcoin protocol on The Cryptography Mailing List on the site metzdowd.com freeing up new technology on the Internet.
Thanks to the blockchain technology donated to the world by the undisputed genius Satoshi Nakamoto suddenly presents the opportunity to build an infrastructure to transform the Internet into a safe place in which to exchange even the economic value of hundreds of millions without running the risk of asset theft : before then it was unheard of even to imagine that it was possible.
However, paradoxical as it may be, the Satoshi Nakamoto protocol is not suitable for the transfer of low-value assets, in simple words it does not allow MicroPayments, that is, everything related to the Transaction sector as better described in the previous section "Segments". This scenario lacks infrastructures that have the intrinsic characteristics of the original Trusted Register like Bitcoin model, able to offer the same type of service accessible at this market level.
Our goal is to create an infrastructure in the internet infrastructure capable of allowing the Trusted registry to expand also in the Transaction segment through a protocol that enables the system to infinitely scale the request for this type of segment (which is huge).
Affidaty SpA is an independent authority of the network of nodes, it is not the owner of the system it relies on to write transactions. The network is owned by a joint venture community also defined as a mining community, similar to partners or trustees, and therefore Affidaty SpA does not undertake to carry out any of the regulatory obligations placed on the miners, nor does it assume any responsibility for the business or the operations of the latter. However, Affidaty SpA undertakes to ensure that the miners respect the terms and conditions contained in the license agreements accepted by the miners and that they respect the safety standards specified in the CN documents forming part of their license agreement. Affidaty SpA Guarantees the user that if one or more miners do not comply with the agreed standards in the terms and conditions of the licenses, as well as the CN security standards to which the licenses are associated, the permits will be revoked by disconnecting from the network the nodes that do not conform to the agreed provisions.
Affidaty SpA maintains and obliges to observe solid business conduct and is
equipped with related guidelines that cover possible conflicts of interest,
market abuse, corruption and fraud. Affidaty SpA and its staff comply with
these policies and require miners to maintain similar policies. Affidaty
SpA and its affiliated farms, may, wherever they do business, store and
process information relating to writing transactions carried out in
IndependentChain blockchain by the user, in accordance with the GDPR
provisions in cases where the people involved for this processing requires
notification or consent. Affidaty uses a PoA consent algorithm, with which
it uses the value of identities. This means that the block validators
(miners) put their infrastructure in a stake based on the certifications
they have. Consequently, IndependentChain is protected by validation nodes
that are arbitrarily selected as reliable entities thanks to the
standardized parameters contained in the CN attachments that are based on
guidelines for construction, maintenance and updating of farms in
accordance with universally recognized certifications.
The IndependentChain Proof of Authority model is based on an unlimited number of validators, a factor that makes it a highly scalable system. Blocks and transactions are verified by participants, pre-approved by Affidaty SpA, according to the rules established in the NCs that act as guidelines and moderators of the system.
The miners of Affidaty SpA who make the IndependentChain services available are independent of Affidaty SpA. Therefore Affidaty SpA has determined a uniform price list for each class of node, specifically designed to guarantee on the one hand adequate remuneration for the activities they carry out, as well as annexed terms and conditions to protect users, interposing itself between the interested parties as a moderating body. Affidaty SpA is not responsible for their actions, omissions, declarations and/or proposals if, in some countries, it is not convenient to legally undermine IndependentChain.
The PoA consent algorithm can be applied in a large number of scenarios and is considered a valid option for logistics applications. As for supply chains, for example, the PoA is regarded as an effective and adequate solution for the banking sector, which hosts a large part of the Transaction segment such as micropayment.
Neither party is responsible for failure to fulfil its obligations, different from economic ones, due to factors beyond its control. Before stating that the other has defaulted and failed to comply with its requirements, each party will allow the other a reasonable period to comply. Where approval, acceptance, consent, access, cooperation or similar actions by both parties is required, such response will not be unreasonably delayed or withheld.
Affidaty SpA may use personnel and resources located all over the world, including third- party contractors and subprocessors, to guarantee the delivery of Blockchain services. Affidaty SpA may transfer the Content, including personally identifiable information, across national borders. A list of countries where the Content can be transferred for a Blockchain Service is available within the contractual documentation. Affidaty SpA is responsible for the obligations set out in the contract's Terms and conditions of use of the module from which the user comes. Affidaty SpA may request the miners' access to the farms to ensure that the technical and organizational security measures described in the CN and accepted by the miner are respected, allowing Affidaty SpA to fulfil its obligations related to a Blockchain service to the user. A current list of miners and their safety standards will be provided upon request.
Affidaty SpA can offer customizations, configurations or other additional services to support Blockchain services, as specified in a CN. Affidaty SpA recognizes a diversified use of Affidaty blockchain services. Specifically, where the customer merely accesses and consults the contents already present in the Blockchain digital register without adding any information within it, payment of a fee is not envisaged and therefore he can consult such information free of charge. If, on the contrary, the customer adds information to the register, he will make a payment to Affidaty SpA as described in the document Terms and conditions of use of the Form from which it comes, the amount of which will be correlated to the exploitation of the power of calculation provided by IndependentChain miners with respect to the class and weight of information entered in the public register. This use of the Blockchain register is indicated with the terms "Writing" and "Reading".
Any writing developed by IndependentChain will be considered writing. The content consists of data encrypted with SHA256 technology referring only to transactions and without any other reference to things and/or persons and/or sex and/or religion and/or race and/or ethnicity, as the network of nodes does not have the possibility to archive any data that is not functional to the Token transfer agreement. IndependentChain reaches the level of maximum confidentiality (privacy) by denying access to the personal information of the interested parties since it only allows the use of TRINCI blockchains owned
by Affidaty SpA, which protects users through Public and Private
cryptographic keys, making the access to current legislation, so as to
constantly ensure the adequate levels of functionality, security,
accessibility and reliability of all the resources included, in order to
make available an optimal physical environment for the provision of key
services for the entire user community .
The information announced will be depersonalized and devoid of any reference, in particular we refer to all the transactions that take place within the blockchain community to which the user can access via Synkrony Alias and this, to ensure maximum confidentiality on sensitive data, is managed by breaking down the data deriving from the actions of the Synkrony Aliases with alphanumeric keys that will be announced on the public register where it will be possible to certify a specific write action, so as to guarantee the certainty that the data entered are true and that it is not possible to tamper with any so the integrity of the same while maintaining the total confidentiality of the user who wrote the transaction, the register can be inspected here: Alpha nodes. Privacy is maintained by breaking the flow of information: keeping anonymous public keys. The public can see that an alphanumeric key has traced a writing at a given moment on a given type of module and according to its rules. The outcome of the transaction generates a Track Record of the event that will be visible on the register anonymously, that is, without information linking the Record physically with reference to people or things. To allow associating the public data to a subject, it is necessary to have a private "Password" key which will be released when Synkrony Alias is opened. You can find more information on the Terms and Conditions of Use of the Synkrony Alias .
The association of the data published in anonymous form on the register is
called "interrogation" or "reading" and can only be done with the
authorization of consent by entering a private key.
The user is responsible for his own private key and must take
reasonable care of it since Affidaty SpA will not be liable in any way
for any damage suffered by the user in the event of theft or loss of
his private key due to negligence by the user.
Only the information concerning the "time" and the "size" of the individual
exchanges without the identification data of the parties will be
disseminated. Each module that has access to IndependentChain has specific
authorizations and will always be enclosed by its own contract. Terms and
conditions of use as well as the relative Privacy information in compliance
with the new European Regulation 2016/679 (GDPR).