To "bitmover": consider this scenario,
Alice Smith emails Bob a new address with zero balance. He sends her 10btc. Eve observes this email in transit, or by hacking into Alice's or Bob's mailbox. Now, Eve knows that person
[email protected] received 10btc. By inspecting other info about
[email protected] she learns of her identity as Alice Smith, her address and so on. She blackmails Alice to report her to police for receiving so much money over crypto. Alice is forced to take a week holiday from her day job, in order to talk with her accountant. She pays to the accountant $1000 in fees and looses a week of work, causing about $3000 of damage. After that Eve targets Bob, blackmailing him that he got the money from engaging in an illegal business. Etc.
Now, let's say Alice instead created 20 addresses, and asked Bob to send 0.5 btc over each address. Then Eve can still collect this information by scanning all of the emails in her mailbox.
To BrewMaster:
In the other thread I explained what's lacking in ProtonMail. PGP would work according to your scheme, but PGP is hard to use. Also, physically giving Bob a flash drive is hard and slow if they can't physically meet in person. For example, to mail a flash drive, you will need a mailing address of Bob. Bob is forced to reveal details of his identity to Alice, that he may not want to reveal. Even transferring the mailing address is not that simple.
asajapheth: that means both Alice and Bob should use the same P2P messenger, and must known each other usernames or phone numbers (if this is WhatsApp or Signal). Furthermore, the must verify their identity public keys, before they can be sure that there is no MITM between them. The fingerprint of Alice-Bob public identity key pair in WhatsApp is 12*5=60 digits. How will Alice communicate 60 digits to Bob?
OmegaStarScream: PrivNote can not guarrantee that the record is deleted after the message was received. The message is on their server, and they may be obligated to keep it around.
The revenue model is to sell usage licences to corporate employees, while individuals can use it for free. Another source of revenue is to sell physical things related to the security scheme, on sites like Amazon. For example USB flash drives preloaded with authentic data.
I am not going to reveal anything about my solution to these problems without a signed NDA. If you are interested, begin by writing me a private message.