POSToken

About

POST Token Whitepaper

Section 08

Scalability & Security

POST Token is designed to scale from launch capacity to global postal infrastructure demands, ultimately supporting 600,000+ post offices and billions of annual transactions with enterprise-grade security.

Scalability Requirements

International Parcels

~150 million/year

Domestic Parcels

~100 billion/year

Money Transfers

~1 billion/year

Total Items

~400 billion/year

Transaction Requirements

Peak requirement

~30 billion transactions/day

Required TPS

~350,000 TPS sustained

With 10x headroom

~3.5 million TPS target

Scalability Roadmap

PhaseTimelineValidatorsTPS CapacityDaily CapacityBlock Time
Phase 1: LaunchYear 11921,00086M5 sec
Phase 2: RegionalYears 2-31,000+5,000430M3 sec
Phase 3: ShardingYears 4-51,000+50,0004.3B3 sec
Phase 4: Full ScaleYear 5+100,000+100,000+8.6B2 sec
Phase 1: Launch (Year 1)

192 validators (one per country), 5 second blocks, ~1,000 TPS, instant finality

Hardware: 32+ cores, 128 GB RAM, 4 TB NVMe SSD, 1 Gbps network

Phase 2: Regional Expansion (Years 2-3)

1,000+ validators, parallel transaction processing, BLS signature aggregation, state pruning

Regional validator clusters preparing for sharding

Phase 3: Sharding (Years 4-5)

4 regional shards (Americas, Europe, Asia Pacific, Africa/Middle East)

~12,500 TPS per shard, IBC protocol for cross-shard messaging

Phase 4: Full Scale (Year 5+)

Hierarchical sharding: Beacon chain → Region shards → Country shards → Post office nodes

100,000+ validators, 100,000+ TPS, 8.6 billion transactions/day

Performance Optimizations

Transaction Batching

Batch scans within time windows for 50x reduction in transactions

Individual: 100 scans → 100 transactions
Batched:    100 scans → 1 transaction (batch)

Time window: 5 seconds (1 block)
Max batch size: 1,000 scans
Efficiency: ~50x reduction

State Channels

For high-frequency merchant payments: 98% off-chain processing

Open channel: 1 on-chain TX
100 payments: Off-chain updates
Close channel: 1 on-chain TX

Result: 100 payments = 2 transactions
Savings: 98% reduction in load

Transaction Compression

  • Binary encoding (vs JSON): 70% size reduction
  • Signature aggregation: Multiple signatures → 1
  • Reference compression: Repeat data stored once

Example PoT Event: 850 bytes → 180 bytes (79% savings)

State Pruning

Active state: Last 90 days. Older data archived to IPFS.

YearWithout PruningWith Pruning
Year 1500 GB100 GB
Year 310 TB500 GB
Year 5100 TB2 TB

Five-Layer Security Model

Layer 1: Consensus

Tendermint BFT (2/3), 192-country distribution, stake slashing, instant finality

Layer 2: Cryptographic

Ed25519 signatures, SHA-256 hashing, BLS aggregation, HSM support

Layer 3: Smart Contract

CosmWasm sandboxing, formal verification, time-locked upgrades, audits

Layer 4: Application

API rate limiting, DDoS protection, input validation, penetration testing

Layer 5: Operational

Operator KYC/vetting, HSM at post offices, incident response plans

Consensus Security (Tendermint BFT)

Byzantine Fault Tolerance

  • Tolerates up to 1/3 malicious validators
  • Requires 2/3 + 1 honest validators for consensus
  • With 192 validators: 64 can be malicious, 128 must be honest

Finality Guarantee

  • Instant finality (no confirmations needed)
  • Once committed, block cannot be reverted
  • No orphan blocks or chain reorganizations

Slashing Conditions

OffensePenalty
Double signing100% stake slashed, permanent ban
Extended downtime0.1% per hour, max 5%
Censorship5% stake slashed, review
Governance attack100% slashed, permanent ban

Cryptographic Standards

Digital Signatures

AlgorithmEd25519 (EdDSA over Curve25519)
Key size256 bits
Security level128-bit equivalent

Signature Aggregation

AlgorithmBLS12-381
BenefitN signatures → 1 aggregated
Savings~48 bytes per signature

Hashing

AlgorithmSHA-256
Output256 bits
Use casesBlock hashes, Merkle trees, addresses

Encryption (at rest)

AlgorithmAES-256-GCM
Key managementHSM for validators
Use casesPrivate key storage, sensitive data

Attack Vector Analysis & Mitigation

51% Attack

Requires controlling 65+ country validators (2/3 of 192)

  • Each validator = sovereign national postal service
  • Coordinating 65 governments virtually impossible
  • Geographic distribution across all continents
Nakamoto Coefficient: 65 (vs Bitcoin ~4, Ethereum ~2)

Sybil Attack

Create many fake identities to gain influence

  • Validators must be UPU-recognized postal operators
  • One validator slot per country
  • Cannot create fake countries
  • KYC/verification for all operators

Double Spend

Spend same tokens twice

  • Instant finality prevents reorganizations
  • Transaction included = transaction final
  • No confirmation wait time
  • Mathematically impossible once committed

Oracle Manipulation

Feed false price data to manipulate PSDR peg

  • SDR rate from IMF (official source)
  • Multiple independent oracle providers
  • Rate change limits (max 5% per day)
  • 24-hour TWAP for settlement

Bug Bounty Program

SeverityDescriptionReward (USD)
CRITICAL
Direct fund theft, consensus break, chain halt$100,000-500,000
HIGH
Token inflation, governance bypass, data leak$25,000-100,000
MEDIUM
Denial of service, transaction manipulation$5,000-25,000
LOW
Information disclosure, UI vulnerabilities$1,000-5,000

In Scope

  • Core blockchain code
  • Smart contracts
  • Consensus mechanism
  • Cryptographic implementations
  • API endpoints

Audit Schedule

  • Pre-launch: 4 independent audits
  • Quarterly: Smart contract review
  • Bi-annual: Full protocol audit
  • Annual: Comprehensive security assessment

Section 8: Key Takeaways

Scalability Roadmap

  • Phase 1 (Y1): 192 validators, 1,000 TPS, 86M tx/day
  • Phase 2 (Y2-3): 1,000 validators, 5,000 TPS, 430M tx/day
  • Phase 3 (Y4-5): Sharding, 50,000 TPS, 4.3B tx/day
  • Phase 4 (Y5+): Hierarchical shards, 100,000+ TPS

Optimizations

  • Transaction batching: 50x reduction
  • State channels: 98% off-chain for payments
  • Compression: 79% size reduction
  • Pruning: 95% storage reduction

Security Layers

  • Layer 1: Consensus (Tendermint BFT, 192 validators)
  • Layer 2: Cryptographic (Ed25519, SHA-256, BLS)
  • Layer 3: Smart Contract (CosmWasm, audits)
  • Layer 4-5: Application & Operational security

Attack Mitigation

  • 51% attack: Requires 65+ countries (impossible)
  • Sybil: UPU-verified validators only
  • Double spend: Instant finality prevents
  • Bug bounty: Up to $500,000 for critical