UMI Blockchain Six-Level Security

As you likely know from our website and Whitepaper, the UMI network fully uses the blockchain technology to ensure its users with supreme security and transparency as well as to secure itself against unauthorized access. The UMI network cannot be hacked. No transaction can be canceled or forged.

As compared to other cryptos, the UMI network is known for a unique implementation of blockchain technology. Like other cryptocurrencies, UMI is also based on a decentralized blockchain rather than traditional servers and databases controlled by specific organizations. But the 6-level security of the blockchain distinguishes UMI from other coins and makes it the safest cryptocurrency.

Level 1 — a seed phrase is fully secured

All popular cryptocurrencies have a common downside: to run a transaction, their official nodes require you to import your private keys (wallet.dat file if you want to send BTC) or a seed phrase (if you want to send NXT or PRIZM).

This way, when using a node, your mnemonic phrase/private keys are transmitted to the network. It means that if there’s a network attack or node holders’ conspiracy, your private keys can be compromised, which undermines the key idea behind the blockchain technology –– no trust of others

In this regard, the UMI network applies an alternative solution. To ensure the maximum security possible, the UMI node does not require a mnemonic phrase to complete a transaction. In real fact, moreover, the network doesn’t allow for executing transactions directly through a node. There are libraries/SDKs created specifically for this purpose. These tools, which are available free, significantly simplify the process of wallet and other UMI-based apps development

Thus, UMI nodes never transmit a seed phrase to the network, in whatever form. Secret data does not leave your device and are always kept secured. We should also remind you, just in case, UMI uses the encryption algorithm which protects the mnemonic phrase you enter to log into your UMI wallet

Level 2 — invalid and trash transactions are absolutely rejected

By using libraries, anyone can create a transaction in the UMI network, but not all transactions are approved. UMI libraries are designed to support specific standards and automatically reject, for example, invalid or trash transactions, cluttering up the network for spam purposes.

  • Imagine that there is a transaction “address A transfers 100 coins to address B”. This transaction is correct and means that one person will receive a transfer from another one.
  • But there might be another scenario: someone can send an unfair transaction (for example, send coins from an account with non-sufficient funds on it to cover the transaction) or an absolutely invalid one (jumble of symbols), which makes no sense and is not based on a programming command.

UMI libraries try to secure the network against the last-mentioned types of transactions by checking them against only specific standards and automatically rejecting every transaction that does not comply with the rules.

Level 3 — validator nodes verify all transactions

Unfortunately, sometimes people intending to ruin something can’t be stopped. Hackers can set out to find security holes to send an invalid transaction. With this in mind, the UMI team set verifying the correctness of transactions as a key function of validator nodes.

In fact, this is their key task –– to verify incoming transactions against basic blockchain requirements. Therefore, if a fake or invalid transaction reaches the network in some way, a validator node will automatically reject it and won’t allow it to get into the mempool, and consequently the blockchain. All “trash” that reaches the node is immediately weeded out.

Level 4 — master nodes re-verify transactions

Only after validator nodes carefully have carefully verified transactions against the basic requirements, the transactions are sent to the mempool to be checked by master nodes. Despite being part of the same network, master nodes, which are responsible for the network security, won’t rely on validator nodes. They double-check each (!) transaction against all the requirements.

Even if bad faith users somehow compromise validator nodes, they still won’t be able to trick the system. Only those transactions that are validated triply –– by the libraries, validator nodes, and master nodes –– are collected into blocks and sent to the UMI network.

Level 5 — master nodes check blocks

Even after blocks have been added to the network, they are double-checked again by master nodes. Only after a block goes through the final verification of all parameters, it “gets approval” and included in the network.

Level 6 — unique security model detects malicious master nodes

Master nodes ensure the correctness of a block and all the transactions it includes. However, in theory at least, the keys granting access to master nodes may fall into the wrong hands. For example, they may be stolen or whatever else may happen to them. Therefore, there are a lot of master nodes on the network. They are located around the world on different continents, while access keys to them are distributed amongst different people.

Other cryptocurrencies use the tactic of trusting the majority master nodes to secure themselves against being compromised. Assume that:

  • There are 100 master nodes in total.
  • Those approved by at least 51 master nodes (51%) are considered valid.

The idea is that with the proper functioning of most master nodes, a loss of several keys will be not crucial. Nonetheless, that system has a significant downside –– the network risks falling victim to 51% attack. Decide for yourself: if attackers access and control most master nodes, they could relay invalid or falsified transactions to the network.

UMI uses a disparate approach. Not only a few, but even most of the master node keys lost do not pose any threat to the network. Because each (!) master node checks an incoming block against all (!) of the rules. In other words, if someone obtains the secret keys to most master nodes, creates an incorrect block, and tries to send it to the network, the block will be immediately rejected and blacklisted, while the nodes that signed it will be blocked. Thus, an incorrect and fake transaction can get into the UMI network only if approved by ALL master nodes (100%) instead of 51% as in the case with other cryptocurrencies.

Six-level security of the UMI blockchain provides this cryptocurrency with the best ever protection which has never been seen before. That is because the UMI team considers the security of users’ coins as a priority.

We wish you a pleasant experience using our product.

Sincerely yours, UMI team