What is Geeq?
Geeq sets the stage for an economy where trade relies on the reciprocal power of verification rather than trust. Our goal was simple: to enable transactions with completely anonymous accounts, without needing to trust anyone but yourself. All the information you would need to protect your interests would be available, accurate, and reliable. The same must hold true for your counterparty—because in any transaction, the roles could easily be reversed.
To achieve this, we designed a blockchain protocol unlike any other in distributed ledger technologies (DLTs). The tradition in DLTs is to incentivize validators to behave honestly through rewards or reputation, while the network assumes innocence until proven guilty. Within this framework, protocol designers must balance the effort and cost of detection against known rewards, leaving space for manipulation, misaligned incentives, and systemic weaknesses.
Geeq takes a stricter view. We assume every attack on validity will be attempted. Our protocol treats every action as a potential threat and neutralizes it by making tampering obvious. By requiring validators to provide objective, provable answers to “yes” or “no” questions, Geeq eliminates subjectivity and minimizes risk. How we do this is the subject of deeper dives. The result is a blockchain ecosystem in which users have the tools to verify objective outcomes without needing to trust the network or each other.
Everything Geeq does is rooted in three non-negotiable principles:
- Impartiality: Every transaction must be evaluated by the same rules, including first come, first served. Geeq validates transactions in the order they were received. No MEV. No exceptions.
- Verification, Not Trust: Geeq delivers reliable verification independently of third parties, creating certainty without relying on trusted intermediaries.
- Innovation with Purpose: Geeq delivers secure, decentralized solutions designed for real-world needs. Its architecture bridges the gap between Web2 familiarity and Web3’s potential by delivering accessible tools for users and developers, including apps and searchable records.These features work without introducing unnecessary risks like smart contracts or requiring users to navigate complex social consensus systems.
Key Takeaway
Geeq is much more than a reinvention of blockchain. It’s a disruptive reorganization of how we secure digital interactions and exchange value. Instead of accepting a world where others control the information we receive, users can de-risk their own transactions by using tools and data services anchored by Geeq. Geeq’s blockchains deliver definitively sourced data, reliable timelines, and verifiable methods to secure, transfer, and track assets. Its architecture provides a clear, neutral system for regulating data access without trust. By investing in a robust infrastructure, Geeq supplies the definitions and tools needed to implement zero-trust security practices—ensuring individuals can protect their assets, data, and transactions as responsibility for safety shifts squarely to them.
close
How Does Geeq Work?
Blockchains promised security, transparency, and the prospect of access for all — but existing systems fall short. L1 and L2 blockchains are burdened by inefficiencies, vulnerabilities, and protocols that reward concentrations of power. Many rely on mechanisms like majoritarian voting, leader election, or social consensus to resolve disputes and validate transactions, opening the door to manipulation and coercion.
Geeq reassembles blockchain’s core components to validate transactions sequentially, preserving an unbroken timeline of events and making every action easily and directly verifiable by on-chain evidence. Users have clear visibility into ownership, provenance, and custody—essential for secure trade, data governance, and real-world problem-solving. Geeq scales through a multi-chain platform where each chain runs the same neutral Layer 0 protocol with 99% Byzantine Fault Tolerance, maintaining the same high level of security across all chains. Chains may be tailored for specific applications, supporting public, private, or hybrid environments.
Core Features of Geeq’s Layer 0 Protocol:
- No MEV: Geeq eliminates Maximal Extractable Value (MEV) by enforcing individual accountability at every step. A necessary condition to protect the integrity of a timeline of data is to remove all opportunities to exploit or manipulate transaction selection or sequencing before validation.
- Neutral Validation: Every transaction is treated equally and validated in the exact order received, with no exceptions. The protocol is designed so transactions are treated impartially, for example, no one can pay higher fees to jump the queue. Any deviation by a node is immediately detectable, triggering an automatic audit that removes non-compliant nodes from the active network.
Applications for User-Defined Data:
Geeq turns user-defined data into verifiable, transferable assets, addressing challenges in supply chains, compliance, data governance, access controls, and risk management. Its core logic delivers unique token mints, multi-layered assets, fungible tokens, counterparty records, atomic swaps, gas stations, and granular permissions— all without smart contracts.
Why Geeq Stands Out:
- Traces Asset Ownership with Precision: Geeq’s tokenization process ties assets to individual accounts, providing clear, irrefutable records of ownership and transfer.
- Validates Data Records: Geeq mints create a deed for each tokenized asset, including data-as-an-asset. The deed records the original source of the data. Perfect for data governance.
- Provides Zero-Trust Security Tools: Geeq tokenizes data with granular permissions, enabling secure, auditable sharing outside firewalls, reducing internal and external cyber risks.
- Embeds Verifiability and Accountability: Geeq replaces the necessity of trusting third parties to preserve your data in its original state.
Key Takeaway
Geeq redefines blockchain at its core, eliminating systemic vulnerabilities like majoritarian consensus, coercion, and MEV. Its deterministic, no-leader protocol sets a new benchmark for fairness, precision, and security. With its multi-chain Layer 0 infrastructure delivering unparalleled scalability, Geeq ensures users retain direct control over their assets, data, and trades—free from external manipulation. By establishing a tamper-evident, verifiable foundation, Geeq transforms blockchain into the essential infrastructure for accountability, trustless collaboration, and real-world problem-solving.
close
How Does Geeq Solve the Trust Gap in Supply Chains?
Geeq provides unparalleled visibility in supply chain operations by tokenizing goods and data as unique assets tied to specific accounts. Unlike traditional QR codes or generic blockchain systems, Geeq ensures precise ownership tracking and accountability at every step.
- Clear Responsibility: Each tokenized asset is tied to a single account at a time, identifying the responsible party—human, machine, or device—for each handoff.
- Verified Integrity: Geeq validates tokens without smart contracts, ensuring authenticity, provenance, and security without relying on mutable or off-chain data.
- Unmatched Resilience: Geeq preserves an unchangeable timeline of events, enabling fast dispute resolution and operational recovery even in the most challenging environments.
Key Takeaway
Geeq eliminates ambiguity by combining precise ownership tracking with provable timelines. This provides businesses with the tools to resolve disputes, coordinate solutions quickly, and ensure the uninterrupted flow of goods and information.
close
How Does Geeq Protect Brands and Verify Authenticity?
Counterfeiting, fraud, and unverifiable provenance cost brands billions annually while eroding consumer trust. Geeq solves these challenges by tokenizing products into verifiable digital assets tied directly to a brand’s minting account. This ensures each asset’s authenticity and provenance are tamper-proof and instantly verifiable.
- Fraud-Resistant Provenance: Geeq links assets to a brand’s minting account, preventing counterfeits by ensuring tokens are unique across all chains and cannot exist in multiple accounts. This creates an unbreakable connection between products and their true source.
- Real-Time Verification: Geeq’s apps provide both brands and consumers with the ability to instantly confirm authenticity and trace ownership, safeguarding inventory and eliminating risks like scams, fake endorsements, and double sales.
- Dynamic Reputation Management: Unlike systems reliant on intermediaries or smart contracts, Geeq ties every product and statement directly to the brand, eliminating uncertainty and distortions. This gives brands comprehensive tools to manage resale terms and foster consumer confidence without relying on intermediaries.
Key Takeaway:
Geeq provides brands and consumers with an intuitive, scalable platform for verifying authenticity and safeguarding products and interactions. This foundation can extend to new environments like the metaverse, enabling adaptability to emerging markets and audiences without the risks of fraud or distribution issues.
close
How Does Geeq Handle Data Tracking and Verification?
Cyberattacks, insider threats, and the challenges of fragmented systems are overwhelming centralized infrastructure, making it increasingly urgent to secure critical information exchanges. Geeq provides an independent, neutral blockchain layer that enables organizations to tokenize data as verifiable assets, ensuring secure, efficient sharing without reliance on vulnerable centralized systems.
- Accountable Data Sharing: Geeq tokenizes data at the point of transfer, tying it to identifiable accounts. This eliminates reliance on traditional methods, where data is exposed through shared access permissions, cloud systems, or network connections that rely solely on perimeter defenses. By reducing strain on IT security teams, Geeq improves overall organizational efficiency while preventing unauthorized data access.
- Efficient Validation at Scale: Geeq’s shared ledger provides an authoritative one-to-many reference for validated data. Each record is created by aggregating and validating diverse inputs in real time, all while maintaining data hygiene against threats like bot attacks and unverified sources. Because every node in Geeq’s network continuously proves it maintains the correct database, users gain a unified, verifiable source of truth without redundancy or wasteful revalidation.
- Verified Data as a Service: Geeq creates opportunities for organizations to leverage verified data and authenticated inputs from specific sources. This granular validation supports new markets for secure, custom data services, enabling collaboration across enterprises that previously lacked the tools to verify information from diverse or anonymous sources.
Key Takeaway:
Geeq revolutionizes data tracking and validation at a time when traditional systems are failing under the strain of massive data production and unprecedented threats. Geeq offers precise tools for secure sharing and governance, giving users actionable pathways to create resilient systems for the future and to meet the urgent global need for reliable, independently verified information.
close
What Is the Role of Geeq’s Native Coin?
The Geeq Coin is the cornerstone of Geeq’s public blockchain platform, ensuring impartial, secure validation and supporting essential utility for scalable applications.
- Validator Payments: Validators are paid exclusively in Geeq Coins for delivering provably accurate and secure data services.
- Ledger Rent: Geeq Coins fund the long-term storage of records, ensuring nodes are compensated for maintaining data. Unlike other protocols that rely on goodwill to sustain services, Geeq’s model guarantees the availability of validated and provably authentic data, giving users ultimate control over their assets.
- Good Behavior Bonds: Validators must stake Good Behavior Bonds (GBBs) in Geeq Coins to participate in the network. If a validator fails to provide proof of accurate ledger maintenance, the system automatically audits and ejects them, with the GBB forfeited. This mechanism ensures integrity, deters bot attacks, and maintains network reliability.
- Micropayments: Geeq’s micropayment technology enables low-cost transactions in fractions of Geeq Coins, supporting real-time, scalable use cases.
- Unforkable Ecosystem: Geeq’s native coins cannot be forked, preserving the integrity and reliability of the ecosystem.
Key Takeaway
Geeq Coin powers all public chains and applications on the platform, providing essential utility for secure and scalable operations. A process for swapping ERC-20 Geeq Tokens to native coins will be available after mainnet launch, supporting access to the platform’s essential utility. Geeq’s tokenomics are designed to support a resilient and scalable system, aligning with its principles of impartiality and secure validation.
Forward Looking Statements:
This page contains forward-looking statements regarding our business plans, future operations, financial performance, and objectives. These statements are based on current expectations, assumptions, and projections, and are not guarantees of future performance.
Forward-looking statements include, but are not limited to, expectations of revenue growth, scalability, profitability, and operational milestones. Factors that could impact these outcomes include changes in market conditions, competition, regulatory changes, technological advancements, and other risks inherent in early-stage businesses. Actual results could differ materially from those expressed or implied in the forward-looking statements. We undertake no obligation to update or revise any forward-looking statements to reflect changes in circumstances or new information except as required by law.
close
Proofs – An Essential Value Proposition of Blockchain
An essential value proposition of blockchain is that it is an automated system that offers unbiased mathematical proof that a given transaction has been processed correctly. If you have proof, you no longer have to depend on another party’s version of the truth.
In fact, the ability to produce indisputable proof is one of the most sought after outcomes in advanced blockchain technology.
Geeq has solved this problem. Geeq’s protocol efficiently calculates proofs of inclusion for each transaction entered in a block, distinguishing between transactions deemed valid and invalid. Geeq’s proofs of validity and inclusion are durable; they will hold up despite any attempts to tamper with the data in the blockchain itself.
This fulfills the promise of blockchain technology: when various unrelated actors are able to check the provable status of the same data, previously intractable coordination problems can be solved. Geeq’s technology incorporates permissions to read, write, and verify on-chain data for deployments of private chains suitable for enterprise and regulatory use.
Proof makes life easier
Whether you want to access your proofs now or later, knowing proofs exist and the same proof may be produced at any time has immense value. Use an app like Geeq Data or an API to send data to a Geeq blockchain, ask for the proof to be returned, and relax. The job is done. You have done your part. The technology can do the rest, to produce a durable (permanent) receipt.
Private Geeq blockchains have the ability to restrict who has access to them. However, as long as a small set of data (hashes) are published, a stranger can verify your 1 kb durable receipt using only these hashes, which reveal nothing about the underlying data. They do not even have to have an account on the blockchain to convince themselves of your claim.
Thus, you will not have to worry about assembling your various identification papers, making phone calls for permissions and then faxing copies for confirmations, or waiting for a time-intensive audit or expensive challenge to confirm your statements.
Geeq’s proofs are easily accessible, inexpensive, and available for any level of granularity of data you have chosen to submit to the blockchain.
Non-crypto applications for blockchain proofs
Supply chain and provenance: Once a digital object has been registered on-chain, it is possible to prove all on-chain claims to transfers of ownership. Using Geeq’s white-labeled, no-smart contracts NFTs, these digital objects may represent physical objects as well. Putting NFTs and attestations together on a Geeq chain provides independent certainty (with proof) over lawful ownership and transfers of ownership, whereas a dissatisfied employee may be able to tamper with a company’s internal tracking system during transit in order to falsify data.
Data lineage and chain of custody: A permanent, unbiased ledger of record may be automated where each step in a chain of custody is accompanied with proof based on contemporaneous attestations to the blockchain. For such sensitive data, Geeq’s industry-leading security crucially provide proofs that endure despite internal or external attempts to alter the data.
Compliance and auditing: A blockchain may be set up specifically to validate transactions required for compliance and auditing. Data may be sent automatically to an API or attestations may be provided individually. Upon receipt, validation occurs and is recorded in a block: at the same time, the existence of the proof may be calculated. Geeq’s standardized methods provide a convenient way to link the entire history of provably reported data, substantially decreasing the costs of compliance and audits.
Cyber-resilience and data integrity: Durable proofs of inclusion and validity can be used to ensure data restored after a cybersecurity attack are the same as the data that existed before an attack. These proofs may be kept economically in a system that stands apart from an enterprise system, akin to providing an “air gap” to prevent contamination between computers in a network.
The Geeq difference
Geeq’s protocols and data structures have been optimized to make the calculation of proofs affordable, efficient, and convenient for enterprises and individuals. Proofs of inclusion are approximately 1 kb for each transaction. These durable proofs are small enough to be stored locally on customers’ own hardware, even for huge volumes of transactions.
An ingredient in Geeq’s secret sauce is that Geeq’s standard transactions do not use smart contracts, a deliberate choice to eliminate a tremendous amount of complexity. It is one of several reasons Geeq can call itself a Layer 0 platform.
In contrast, platforms that incorporate smart contracts require data availability for each smart contract before it is able to truly verify the state of each contract and/or the code for interdependent smart contracts. These extra steps add costs in fees and time, cannot guarantee durability if a smart contract is exploited, and are very much a work in progress.
Confirmation is not enough. You need proof.
Confirmation your data is in a block is not enough. Any website or app can generate such a message, without ever touching a database. Software from a centralized provider can give you a false message if it has been compromised and – even if you think the message is correct – you’re trusting the provider to tell you the truth.
Conclusion
Proofs that do not depend on a trusted party are an essential part of the blockchain value proposition. Centralized parties have additional costs and security concerns to keep your current data safe, much less reconstructing proofs of the history of your data at a granular level. When you are fully dependent on a trusted party and they go down, they can take you down with them.
Geeq’s patented technology delivers the proof you need to protect your most valuable data. You (and your centralized providers) can use Geeq to prove the state of your data in a block whenever and to whomever you like. Simple.
Geeq will roll its services out to enterprises first. Enterprises need an independent way to verify transactions across their own departments. They have partners and regulators to satisfy. Geeq’s technologies offer new methods to share unbiased and validated proofs that will stand the test of time with external parties. When all the milestones in the roadmap are complete and ready to accommodate public nodes, Geeq’s open source technology will become available for public use.
Delivering user-friendly proofs for public blockchains will mark a major advance in the blockchain technology space. Although there is still development work to get to ‘mainnet’, Geeq has already laid the groundwork for durable proofs at scale. Watch this space for explainers, guides, and examples to be published later this year.
All proofs in blockchain depend on using hashes, public-private keys, and repetition (more formally, recursiveness). These mathematical calculations are tried and true and have been used in computing for decades. What’s new is how efficiently Geeq applies these to its blockchain data structures.
close
What problems does Geeq Data solve?
Geeq Data is bringing you the power to certify your own documents and data. It is an attestation service that shows how Geeq’s blockchain technology provides solutions to problems that arise when responsibility for data integrity falls through the cracks or there aren’t enough resources to authenticate and verify every piece of data manually.
Data integrity is an issue that can cost businesses as much as 25% of revenue. As cybersecurity attacks worsen, even redundant backups may become useless if you do not have confidence the data are unchanged. With Geeq Data’s provable security, it is possible to identify which backups have been contaminated, which ones have data integrity, and how to narrow the scope of any necessary recovery efforts.
Lines of responsibility for data ownership also are becoming harder to maintain as the volume of data increases and interactions grow exponentially. Miscommunications or mishandling of data responsibilities can be the sources of rifts at work, breaches of privacy, liability, and worse. Geeq Data introduces clarity to those situations in a highly efficient and non-intrusive way.
As an individual, trying to trace data integrity and track down who is responsible for which data can be overwhelming. Too often it feels like you are lost and on your own, not knowing who to contact, how to find them, or when they might help you.
close
How does Metadata help with Visibility? Will I lose my Privacy?
Like labels on file folders, notes on memos, subject headings in emails, variable names and definitions in databases, metadata are used to describe the data you are certifying.
The Geeq Data app provides space for you to add metadata to describe the hash digest of your document. Together, the hash digest and metadata make up what is called the “data payload” of your transaction. When your transaction is validated and included in a block in the app’s Validation Layer Blockchain (VLB), the data payload is written in the corresponding block in the app’s Application Layer Blockchain (ALB).
In summary, applications powered by Geeq are supported by two parallel, simultaneously constructed Geeq chains.
Anyone with permission to use the Block Explorer will be able to search the blockchain. Metadata can make these searches easier.
For the private instance of Geeq Data, released for public testing, the first metadata field was required and the rest are optional. Metadata are entered as strings of characters in the Geeq Data app. Unlike the hash of the document, which never overtly reveals its contents, the metadata will be displayed in the Block Explorer as they were entered in the Geeq Data app.
If the user writes the metadata in cleartext, it will be displayed clearly in the Block Explorer to anyone who finds it. If the user encrypts the metadata, the encrypted metadata still will be visible – however, the only users who will understand what they mean will be those who know how to decrypt them.
The general point of being able to choose how and when to use encryption, even while blockchain tends to make transactions more transparent and visible, is often misunderstood by those who might be afraid of the word “transparency”. Actually, we have many options at our disposal, in this process of developing Geeq’s blockchain applications.
Another way to add privacy is to add permissioning structures that determine who is allowed to send transactions and who is allowed to access the Block Explorer. Geeq offers permissioning structures for its enterprise clients. Partner with us!
close
How Do I Stake Geeq?
Dear Geeq Community Members,
Soon we will release a new round of Geeq’s Web-Based Staking. After the success of the last round, we have decided to open up 2 new pools. We are happy to announce we will continue to bring you 2 Webstaking options.
- The new Geeq Staking 17 pool will be offering 10% APY
- The new Geeq LP Staking 7 pool will be offering 80% APY
Please notice the timing is exactly the same time that our previous round of web-staking reaches full maturity.
The new Pools will open Saturday, October 19th at 4 pm UTC. The contribution window is open for 14 days and closes on Saturday, November 2nd @ 4 pm UTC if the pool is not filled before then.
If you are unsure of how to provide liquidity please follow this guide https://geeq.io/how-to-stake-for-liquidity-pools/
The Staking Pools, Terms and Conditions:
Please read the descriptions for Geeq Staking 17 and Geeq LP Staking 7 carefully before making your decisions. The terms and conditions are described below. They are the same as the round that is concluding.
Geeq Staking 17
- Full Rewards: 10% annualized
- Full maturity: 90 days
- No Minimum, MAX stake allowed 200,000 $GEEQ
- Pool size: 4 million GEEQ
- Contribution window opens on Saturday, October 19th @ 4 pm UTC
- Contribution window closes on Saturday, November 2nd @ 4 pm UTC if the pool is not filled before then.
Geeq LP Staking 7
- Stake your Uniswap v2 LP tokens here
- Rewards: Uniswap Trading Fees + 80% APY
- Full maturity: 90 days
- Pool Size: $100k GEEQ/ETH each side lockup
- Contribution window opens on Saturday, October 19th @ 4 pm UTC
- Contribution window closes on Saturday, November 2nd @ 4 pm UTC if the pool is not filled before then.
For your convenience, all important dates and times for the pools are here.
General Information
Geeq Staking offers constant time-based rewards based on the duration of your staking commitment. In other words, the longer you stake, the higher the rewards.
The new web-staking pools will open on Geeq’s Staking Page. All information regarding the Token, including Token Announcements, Token FAQs, Staking FAQs and step-by-step instructions, are under “Token” in the top navigation of this website.
On the Staking Page, click on the contract that interests you to see its details. Then connect your ERC-20 Web 3 wallet to the contract, deposit your $GEEQ into the pool, and stake until you wish to withdraw. When you wish to withdraw, have your principal and rewards sent back to your wallet. Easy!
If you have any questions about staking and how to stake, including how to provide liquidity, please follow our guides in Geeq’s Staking FAQs.
Requirements for Staking
Here are the requirements:
Metamask: GEEQ Staking requires an ERC-20 wallet extension such as Metamask, or a compatible Web 3 wallet which will automatically link to our staking contracts. This is the wallet address you will contribute from and where your earned rewards will be distributed upon withdrawal.
Once the staking pools are opened, they will continue to stay open until they are filled or the 2 week contribution window ends, whichever comes first. If you wish to know the exact percentage of the pool that is filled, please click through to the contract.
Full Maturity
Stake until full maturity to receive maximum rewards. Maturity will have a date and time assigned at which time full rewards will be available for withdrawal, so you will know exactly when you can withdraw to receive the maximum rewards.
Early Withdrawal
GEEQ Staking offers an early withdrawal option for flexibility. Early withdrawal will have a date and time assigned so you will know exactly when you can withdraw early.
Although rewards are lower for early withdrawal, they increase linearly every day — past the early withdrawal date right up until full maturity.
In other words, if you withdraw after the early withdrawal date and closer to full maturity, rewards will be higher, but still less than full maturity.
Alternative Geeq Staking Programs
Should you wish to use an alternative staking option both Ascendex and Kucoin offer Geeq staking options @ 10% APY.
Interested in details about our token?
Join Us For a ChatTo learn more about Geeq™ follow us:
Website ~ Grab a Coffee ~ http://www.geeq.io/news/
Telegram ~ Join us for a chat ~ https://t.me/GeeqOfficial
Twitter ~ Keep up to date ~ https://twitter.com/GeeqOfficial
YouTube ~ Feast your eyes ~ https://www.youtube.com/c/GeeqOfficial
close
What Makes Geeq’s Technology So Special?
Traditionally, blockchain protocols make security assumptions that are, at best, unverifiable, such as assuming less than 1/3 of the network will be malicious. These security assumptions introduce tremendous uncertainty about the future. At worst, the many assumptions required for the security of a blockchain platform are unrealistic. In order to mitigate those risks and improve function, most subsequent work has inadvertently introduced new attack surfaces by adding complexity, rather than addressing the root problems inherent in the way they define consensus.
Geeq’s mission is simple: we put the well-being of end users first. Achieving such an idealistic goal required preparing for the worst case. Here is the breakthrough: Geeq’s technology works even when we have no idea who is in a network and what they may or may not choose to do. We know we can’t control others’ choices in a decentralized world – nor would we want to. The bottom line is this: the only thing that matters about blockchain is whether it is able to provide us a better way to organize economic activity compared to using a centralized database.
By re-examining the data that honest users will need to make decisions, rather than what network participants may want them to believe, we found a way to solve the information game by re-engineering the idea of consensus.
Simply put, Geeq’s protocol requires each node to work independently. Honest nodes are able to deliver Proof of Honesty only if they’ve arrived at the singularly honest conclusion. As a result, all honest nodes arrive at the same, provably honest blockchain on their own, and the information coordination problem is solved when users interact only with honest nodes.
Consensus, at Geeq, is the product of honesty.
Blockchains based on Proof of Work, Proof of Stake, or Proof of Authority work on the assumption that power – in terms of hash rate, financial muscle, or institutional standing – produces truth. At Geeq, we believe that only those who are truthful should be powerful.
close
What is Blockchain Technology?
Blockchain technology describes a class of technologies that constructs a sequentially linked database (a blockchain) that is stored, after each block is appended, as a distributed database. A distributed database means the database exists redundantly on a network of computers.
Each blockchain technology specifies its own set of protocols. Protocols define the set of rules that agents are supposed to follow when they update and store the database on their own computers. Depending on the protocol, these agents may be called nodes, validators, or miners.
Geeq does not include mining. Why not? We explain below.
close
When is Blockchain Useful?
Geeq’s technology addresses an old problem: lack of trust due to asymmetric information. How can parties feel comfortable negotiating or transacting if one feels the other has an advantage in manipulating information?
Thus, Geeq is a new information and communications technology.
The primary economic value of services powered by Geeq is that they provide access to dependable, neutral, and correctly validated data sets.
In so doing, the data can be acceptable to all parties who wish to coordinate on some, but not all, dimensions with each other and do not wish to trust a third party.
How do we identify potential pain points?
There are five key criteria that make it likely that Geeq has a better approach to addressing a problem than conventional data systems or centralized cloud-based software as-a-service (SaaS) solutions:
- The problem requires secure transfer of value, possibly in very small increments; for example, micropayments for content or web services and machine to machine markets, and person to person payments such as small charitable contributions or sharing the cost of a meal among a group of friends.
- The problem involves agents who do not know or do not trust each other; for example, peer to peer markets for goods and services, escrows, and providing proof that all parties are what they say and behaved honestly.
- The problem involves many different actors from different organizations whose interests do not align; for example, logistics or chain of custody applications that transfer responsibilities from party to party.
- The problem requires objective provability of facts or data; for example, audit trails and telemetry collected from connected industrial, medical, and infrastructure devices.
- The problem involves agents who might wish to censor, alter, or hide data; for example, securities, land title, and financial transactions where theft and fraud are real possibilities.
For blockchain to offer a viable solution to these problems it must be secure, inexpensive and scalable. For Blockchain as a Service (BaaS) to become a realistic alternative to private databases, it needs to be flexible, upgradable, environmentally sustainable, and protect users from unreasonable volatility in token value.
close
What is a Blockchain?
A blockchain is an electronic data structure made up of blocks (containing groups of transactions or data) which are appended sequentially.
The primary economic value of a blockchain is to provide a dependable data set that is acceptable to all parties who wish to coordinate on some, but not all, dimensions with each other and do not wish to trust a third party.
Interested in learning more? Check out Geeq’s Glossary entry for Blockchain.
close
Banner Art Image by Levi Elizaga on Unsplash