A completely different coin in itself. It is not an altcoin based on someone else's work. We have written the code from scratch, and we have been working on it for the past 5 months. The code is written in Java, is closed-source, and we plan on releasing it 6 months after the official launch of the coin.
Why so late? Is it full of bugs and you are afraid others will discover them too soon? Or is it ugly spaghetti code without any documentation or unit tests? Smells highly suspicious.
We chose the Java programming language mainly because we could not achieve what we wanted to, if we just made another copy of the SHA-256 or SCRYPT altcoins. Plus, Neutron does not need to be mined, as the Genesis Block which is 10,000,000 coins will be released on 1 March 2014, so SHA-256 or SCRYPT does not help us in any matter whatsoever. You may say that this coin is pre-mined, but you would be wrong because there is no mining done here, just a distribution of coins, the price of which we cannot control.
You sit on the full bag of all the coins now, so by selling the bag to the public (oh look! these fools trade our coin for $1 a piece! quick, dump the remaining 5 million coins!) you can easily influence the coin (so after our dumping the coin is 1000 pieceses a dollar? buy those 10 million back, we'll still have 4990 thousand left
Any feature currently announced can disappear in a whim
there goes the code stability ... if we are too lazy to support something, we'll just throw it out of the window.
Because we need a unique currency with completely different concepts that back it up. In our case, the Neutron features near-instant transaction speeds (91.037 sec. is the fastest speed that we achieved in our tests)
90 seconds is instant? So what is then non-instant? 1 week?
Some quick coins with 30 or 60 sec blocks come quite close to this.
CC transactions are under 5 seconds usually (though they are centralized...). Beat it.
Can you imagine the benefits alone that a quick transaction brings? The power to buy anything in under 2 minutes, anywhere, anytime. No 1 hour-long transactions, no paper money, no credit cards, no banks, no eyes to spy on your economical activity. Now you can achieve complete anonymity with a dash of speed.
Complete anonymity? Just wait for zerocoin. I'd guess people that are into some sort of money laundering usually don't care that much whether their monthly profit will launder in 15 minutes or 5 minutes
3. Uniquely created code from start to finish
So a recycled and polished university project?
8. A client ban/appeal system
You have too much money? We ban you. You can send your appeals at /dev/null.
At the end of the IPO period, NEU coins will be released to the founders according to the Shareholders Chart (you get a number of Neutrons depending on the percentage of shares that you own) For instance, if you own a share of 31% you will receive 3,100,000 NEU.
And close to the end of IPO period, you can just easily take all the BTC's in the pocket and buy effectively some 50% share
Perhaps even repeat it multiple times
Current wallet state: IN DEVELOPMENT
Current coin state: IN DEVELOPMENT
Current coin design state: DONE
Current blockchain state: IN DEVELOPMENT
Current website state: LAUNCHED
Current forum state: IN DEVELOPMENT
Current pie-chart state: LIVE
Current support state: LIVE
Current Android and iOS wallets state: IN DEVELOPMENT
Current code state: CLOSED
So you actually just have a web with pie-chart done? Not much ...
Be sure to also send us an email with the following details at
[email protected]- the BTC transaction ID (TRXID) do not send us your address as we have no use for it
- a name to be written in the "Founders" page of
neutrons.us website
Cool. How long until someone writes a bot that will monitor the block chain for transactions to the donation address and send out emails "the transaction XYZ is mine, my founder name is ABC."? If your code is as secure as this, then god save us ...
Also, the necessity of banning system suggests that this is rather snake-oil crypto secure just because nobody can see easily under the lid and once (ONCE, not IF) the client is decompiled, I guess first usable attack will follow shortly thereafter.
Show us at least some whitepaper, or some more technical description of the algorithm, so we can verify that the algorithms used are solid.
Otherwise it is just another vaporware project.