Bitaid
A Palatable, Linear Guide
If you couldn't trust any central authority, how could you build a reliable emergency response system using only Bitcoin and cryptography?
The protocol answers this question through a single mechanism: Proof of ₿ond with Reputation — a way to make trustless coordination work by making bad faith expensive and honest participation profitable.
The Engine: Proof of ₿ond with Reputation
Every trust relationship in Bitaid is built on two things you bring to the table:
The ₿ond (Your Security Deposit)
This is Bitcoin you lock in escrow. It's fully refundable if you act honestly. It's a financial commitment that says, "You can trust me because it would cost me real money to betray you."
The Reputation (Your Earned Track Record)
This is a score you can't buy. It grows slowly with a history of correct, well-calibrated decisions. It's "time-salted," meaning you need at least 90 days of real participation for it to count fully, and your votes are weighted by how well they've matched the consensus over time. It's a verifiable history, not an opinion.
Together, they form a "human proof of work." An attacker can't flood the system with money because they'd also need a lengthy, high-reputation history that money alone can't produce.
Problem 1: How to Call for Help and Prove It's Real
In a trustless network, a prank call is an attack vector. Bitaid makes false alerts economically irrational.
The problem: A genuine emergency needs to be distinguishable from noise without a central dispatcher.
The solution: A three-tiered economic offer that acts as a credibility filter. When you need help, you put up three separate pots of money:
- Deposit: A small, refundable stake that screams "I'm serious." If the alert is a hoax, you lose it.
- Bounty: An immediate payment for any responder who shows up and documents the scene, regardless of outcome. It covers their presence.
- Outcome Reward: A larger sum held in escrow, released only by a jury if the problem is actually resolved.
It's like a reverse auction for safety. Your deposit is the entrance fee to a secure bidding floor. The bounty is the minimum bid that gets someone to come to your location. The outcome reward is the full contract payment, paid only upon proven delivery of the result.
Problem 2: How Responders Find You, Privately
Broadcasting an emergency publicly is a privacy and security disaster.
The problem: Real-time, geofenced peer discovery without a central server that can log, censor, or be shut down.
The solution: Encrypted, low-bandwidth gossip routed over anonymity networks like Tor. Your call for help doesn't go to a dispatcher; it whispers through nearby peers. Only responders within your physical radius see it, and no central node knows who asked for help.
This is a short-range, encrypted whisper network in a crowded stadium. Your message hops from person to person, readable only by those who are both nearby and holding the right cryptographic key ring. A shout on the public PA system (a central server) is impossible; only the local, encrypted huddle hears it.
Problem 3: How Roles Emerge and Stay Honest
In a chaotic scene, someone needs to intervene, someone needs to record, and someone needs to judge. But there's no boss to appoint these people.
The problem: Self-selected, permissionless roles with asymmetric responsibility, all kept accountable by economics.
The solution: A tiered system of bonded professional licenses. Each role requires you to lock up a bond of a different size, proportionate to the responsibility you hold. Your reputation then qualifies you for influence.
- Caller: Posts the smallest bond (~$0.50). This is just enough to deter spam. It's like a refundable ID check to enter the system.
- Responder: Posts a substantial bond (~$1,000). This person physically shows up, so they have serious skin in the game. Their bond is at risk if they use excessive force or act in bad faith.
- Juror: Posts the largest bond (~$10,000). They decide outcomes. The accountability is two-layered: isolated dissent incurs a per-case penalty (2× to 4× the typical reward) deducted from their bond. Full bond seizure is reserved for confirmed collusion or fraud, proven by a massive independent panel reviewing the evidence.
- Archivist: Posts a moderate bond. They are custodians of evidence, penalized if they lose or corrupt the data.
Think of this as a tiered insurance and licensing system. You don't apply for a job. You obtain a license by putting up the required security deposit — a performance bond. A caller has a minimal license like a library card; a responder has a heavy license like a commercial driver's insurance policy. A juror has the highest liability insurance: honest mistakes cost a fraction, but a proven fraud record revokes the license entirely and burns the whole bond. It's self-policing professional certification.
Problem 4: How to Resolve Disputes Without a Court
Who judges the judges? The jury system itself must be immune to manipulation.
The problem: A fair, Sybil-resistant jury selection that can't be bought or gamed.
The solution: A closed, merit-based jury pool with a competitive, backtesting-driven entry process. You can't simply buy a seat. When a juror slot opens, candidates compete by retroactively judging a set of old, resolved cases. The candidate whose "shadow verdicts" most closely match the known correct outcomes wins the seat. Two-thirds of every active jury must come from this rep-qualified pool, making it staggeringly expensive to infiltrate with coordinated bad actors.
Once seated, jurors are not locked in forever. They serve ongoing cases but face a 90-day exit hold if they choose to leave, and they can be ejected for inactivity. Their ongoing votes are constantly monitored: if 40% of later reviewers disagree with their original verdict, the case is flagged for urgent re-review by a massive panel (100× the bond mass). Only an 80% supermajority can confirm fraud and trigger seizure.
It's a blind, competitive civil service exam for a supreme court seat. A vacancy appears only when there's real caseload demand. Aspiring judges don't campaign; they pay a non-refundable fee to take a brutal test grading historical cases without knowing the official verdicts. Only the candidate with the highest score gets the seat. Buying hundreds of fake test-takers would cost a fortune and still can't beat a single honest expert who consistently scores perfectly. And once seated, a judge can't just vanish after a bad ruling — their bond is held for months, and any suspicious verdict can be reviewed by an enormous, randomly-selected panel of their peers.
Problem 5: Evidence That Can't Be Destroyed
Footage of an incident is the ultimate truth, and the first thing a bad actor will try to suppress.
The problem: Tamper-proof, immutable evidence commitment before anyone can censor the footage.
The solution: The Bitaid Content-Addressed Evidence Network (BCAEN). Responders livestream footage directly to incentivized archival nodes. Crucially, the unique cryptographic fingerprint (hash) of the video is broadcast over the gossip network before the upload completes. This means the "existence proof" is irrevocably public before any censor can act. The archivists have a financial duty to retrieve and store every chunk of data for which they have a hash.
Picture an unsealable public vault with a time-stamped receipt. The responder starts shoving a long film reel into a pneumatic tube. The moment the first frame enters, a machine instantly notarizes the film's unique molecular signature and projects that receipt onto a massive, public, indestructible screen. Even if someone blows up the tube, the receipt is forever proof that the evidence existed, and the paid archivists at the other end are obligated to recover and store every single frame that corresponds to that signature.
Problem 6: How the System Keeps Score Without a Central Ledger
All the bonds, verdicts, and reputation updates constitute a complex global state. Someone needs to track it.
The problem: A globally consistent, tamper-proof state machine without launching a new blockchain.
The solution: Bitcoin-anchored state. Every significant event — a verdict, a bond adjustment, a reputation update — is cryptographically committed to a specific Bitcoin transaction or block. To know the current state, any node simply replays this log of anchor proofs from the Bitcoin chain. Bitaid inherits Bitcoin's security and finality for free; it's a meta-protocol living atop the world's most secure ledger.
This is like a pyramid where every new block is a stone layer laid on top of all the previous ones. Each layer is mortared in place by an enormous expenditure of energy — proof-of-work. To change a single entry in an old layer, you would have to tear down and rebuild every layer above it, redoing all that energy expenditure. As the pyramid grows, this becomes physically and economically impossible. Bitaid simply carves its own small notations into the side of each new layer — inheriting the pyramid's immutability without having to quarry a single stone itself.
The Final Picture
All these pieces snap together to form the world's first decentralized, real-time spot market for emergency response. The caller's three-tiered offer broadcasts a real-time price signal. Responders, rationally weighing the bounty and outcome reward against their own bond and risk, self-select to accept the mission. The market clears in seconds, with no central dispatcher, no 911 operator, and no institution that can be coerced or corrupted.
It's a protocol that doesn't ask for permission. It simply provides a coordination fabric for the ancient human instinct to help — turning good intentions into a verifiable, economically sound, and entirely trustless reality.
For protocol engineers, economists, and cryptographers.
Technical specification — v4.1
Bitaid — A Peer-to-Peer Private Civil First Responder Protocol
Open protocol. No rights reserved.