POST Token Whitepaper
Scalability & Security
POST Token is designed to scale from launch capacity to global postal infrastructure demands, ultimately supporting 600,000+ post offices and billions of annual transactions with enterprise-grade security.
Scalability Requirements
International Parcels
~150 million/year
Domestic Parcels
~100 billion/year
Money Transfers
~1 billion/year
Total Items
~400 billion/year
Transaction Requirements
Peak requirement
~30 billion transactions/day
Required TPS
~350,000 TPS sustained
With 10x headroom
~3.5 million TPS target
Scalability Roadmap
| Phase | Timeline | Validators | TPS Capacity | Daily Capacity | Block Time |
|---|---|---|---|---|---|
| Phase 1: Launch | Year 1 | 192 | 1,000 | 86M | 5 sec |
| Phase 2: Regional | Years 2-3 | 1,000+ | 5,000 | 430M | 3 sec |
| Phase 3: Sharding | Years 4-5 | 1,000+ | 50,000 | 4.3B | 3 sec |
| Phase 4: Full Scale | Year 5+ | 100,000+ | 100,000+ | 8.6B | 2 sec |
192 validators (one per country), 5 second blocks, ~1,000 TPS, instant finality
Hardware: 32+ cores, 128 GB RAM, 4 TB NVMe SSD, 1 Gbps network
1,000+ validators, parallel transaction processing, BLS signature aggregation, state pruning
Regional validator clusters preparing for sharding
4 regional shards (Americas, Europe, Asia Pacific, Africa/Middle East)
~12,500 TPS per shard, IBC protocol for cross-shard messaging
Hierarchical sharding: Beacon chain → Region shards → Country shards → Post office nodes
100,000+ validators, 100,000+ TPS, 8.6 billion transactions/day
Performance Optimizations
Transaction Batching
Batch scans within time windows for 50x reduction in transactions
Individual: 100 scans → 100 transactions Batched: 100 scans → 1 transaction (batch) Time window: 5 seconds (1 block) Max batch size: 1,000 scans Efficiency: ~50x reduction
State Channels
For high-frequency merchant payments: 98% off-chain processing
Open channel: 1 on-chain TX 100 payments: Off-chain updates Close channel: 1 on-chain TX Result: 100 payments = 2 transactions Savings: 98% reduction in load
Transaction Compression
- Binary encoding (vs JSON): 70% size reduction
- Signature aggregation: Multiple signatures → 1
- Reference compression: Repeat data stored once
Example PoT Event: 850 bytes → 180 bytes (79% savings)
State Pruning
Active state: Last 90 days. Older data archived to IPFS.
| Year | Without Pruning | With Pruning |
|---|---|---|
| Year 1 | 500 GB | 100 GB |
| Year 3 | 10 TB | 500 GB |
| Year 5 | 100 TB | 2 TB |
Five-Layer Security Model
Tendermint BFT (2/3), 192-country distribution, stake slashing, instant finality
Ed25519 signatures, SHA-256 hashing, BLS aggregation, HSM support
CosmWasm sandboxing, formal verification, time-locked upgrades, audits
API rate limiting, DDoS protection, input validation, penetration testing
Operator KYC/vetting, HSM at post offices, incident response plans
Consensus Security (Tendermint BFT)
Byzantine Fault Tolerance
- Tolerates up to 1/3 malicious validators
- Requires 2/3 + 1 honest validators for consensus
- With 192 validators: 64 can be malicious, 128 must be honest
Finality Guarantee
- Instant finality (no confirmations needed)
- Once committed, block cannot be reverted
- No orphan blocks or chain reorganizations
Slashing Conditions
| Offense | Penalty |
|---|---|
| Double signing | 100% stake slashed, permanent ban |
| Extended downtime | 0.1% per hour, max 5% |
| Censorship | 5% stake slashed, review |
| Governance attack | 100% slashed, permanent ban |
Cryptographic Standards
Digital Signatures
| Algorithm | Ed25519 (EdDSA over Curve25519) |
| Key size | 256 bits |
| Security level | 128-bit equivalent |
Signature Aggregation
| Algorithm | BLS12-381 |
| Benefit | N signatures → 1 aggregated |
| Savings | ~48 bytes per signature |
Hashing
| Algorithm | SHA-256 |
| Output | 256 bits |
| Use cases | Block hashes, Merkle trees, addresses |
Encryption (at rest)
| Algorithm | AES-256-GCM |
| Key management | HSM for validators |
| Use cases | Private key storage, sensitive data |
Attack Vector Analysis & Mitigation
51% Attack
Requires controlling 65+ country validators (2/3 of 192)
- Each validator = sovereign national postal service
- Coordinating 65 governments virtually impossible
- Geographic distribution across all continents
Sybil Attack
Create many fake identities to gain influence
- Validators must be UPU-recognized postal operators
- One validator slot per country
- Cannot create fake countries
- KYC/verification for all operators
Double Spend
Spend same tokens twice
- Instant finality prevents reorganizations
- Transaction included = transaction final
- No confirmation wait time
- Mathematically impossible once committed
Oracle Manipulation
Feed false price data to manipulate PSDR peg
- SDR rate from IMF (official source)
- Multiple independent oracle providers
- Rate change limits (max 5% per day)
- 24-hour TWAP for settlement
Bug Bounty Program
| Severity | Description | Reward (USD) |
|---|---|---|
CRITICAL | Direct fund theft, consensus break, chain halt | $100,000-500,000 |
HIGH | Token inflation, governance bypass, data leak | $25,000-100,000 |
MEDIUM | Denial of service, transaction manipulation | $5,000-25,000 |
LOW | Information disclosure, UI vulnerabilities | $1,000-5,000 |
In Scope
- Core blockchain code
- Smart contracts
- Consensus mechanism
- Cryptographic implementations
- API endpoints
Audit Schedule
- Pre-launch: 4 independent audits
- Quarterly: Smart contract review
- Bi-annual: Full protocol audit
- Annual: Comprehensive security assessment
Section 8: Key Takeaways
Scalability Roadmap
- Phase 1 (Y1): 192 validators, 1,000 TPS, 86M tx/day
- Phase 2 (Y2-3): 1,000 validators, 5,000 TPS, 430M tx/day
- Phase 3 (Y4-5): Sharding, 50,000 TPS, 4.3B tx/day
- Phase 4 (Y5+): Hierarchical shards, 100,000+ TPS
Optimizations
- Transaction batching: 50x reduction
- State channels: 98% off-chain for payments
- Compression: 79% size reduction
- Pruning: 95% storage reduction
Security Layers
- Layer 1: Consensus (Tendermint BFT, 192 validators)
- Layer 2: Cryptographic (Ed25519, SHA-256, BLS)
- Layer 3: Smart Contract (CosmWasm, audits)
- Layer 4-5: Application & Operational security
Attack Mitigation
- 51% attack: Requires 65+ countries (impossible)
- Sybil: UPU-verified validators only
- Double spend: Instant finality prevents
- Bug bounty: Up to $500,000 for critical