EPIC

Fungible P2P electronic cash

EPIC is a novel software implementation of the original Bitcoin Standard, updated to the most recent technologies. EPIC’s Rust-based Mimblewimble blockchain includes improvements in all of the attributes that are necessary to foster mass adoption.

Epic Cash is Howey compliant, designed to attain a score of “1” by the Crypto Rating Council. Epic Cash is 100% proof-of-work mined, with no special nodes.

With a hard limit on supply, Epic Cash, like BTC, is expected to function as a store of value. As a medium of exchange, however, both Epic Cash and BTC have a serious problem: their value, as measured in fiat, fluctuates wildly.

EPIC

Secure, scalable and decentralized

1

Secure

Full Nakamoto Consensus - 100% proof of work mined, no special nodes. Relying on technical, social, and game theoretical forces to maintain security as it does, the BTC network is the most secure system in existence. This is why the design of EPIC carries the structure over wholesale. The only changes made increase rather than degrade security, namely:
2

Freeman Proof of Work

The ability of the world to produce computation for BTC is bottlenecked and gated by the need to secure the appropriate hardware. Only latest-generation SHA256 ASICs can do the work necessary to earn the coins. In EPIC, any hardware will do. Today, you can plug in an old laptop and generate a 24/7 passive income mining 60% of the time on its CPU thanks to RandomX. If you have a graphics card, you can run it 38% of the time on ProgPow. EPIC mining is predominantly practiced on otherwise-idle equipment that would be underutilized, turning a cost center into a revenue generator that contributes directly to the bottom line.
3

Economic Attack Resistance (51% etc)

Game Theory - The Bitcoin design relies on the notion that a rational attacker would prefer to earn more money rather than less, which is usually the case. EPIC takes this to the next level in a number of ways. Specifically, because it uses a heterogeneous algorithm design, an attacker must successfully muster not just 51% of a single algorithm, but all of them. By needing to juggle many more moving parts, the risk/reward ratio of an attack is skewed in favor of the defender, requiring much more resources to attack successfully than would otherwise be the case.
4

Long & Short-Term Economic Security

Proponents of BTC maximalism argue that, thanks to the significant sunk costs invested in ASIC hardware that has no other use, that this lock-in will somehow cause people to keep mining when they otherwise wouldn’t. However, upon inspection this argument appears flawed. Irrespective of the hardware used to do it, rational miners will mine when they can earn more than $1 of coin for less than $1 worth of energy cost. This is because they are commercial operators engaged in the business of mining, for the purpose of earning a profit for shareholders. Contrast this with the nature of EPIC miners: people who have idle computing capacity they don't mind sharing with others to help secure the network. They weren't using the equipment anyway, and the coins earned are just a bonus. This is a much more sustainable and low-cost way to achieve a Bitcoin market structure.
5

Scalable

Full chain only 1.6GB. Even at BTC-level usage, data footprint is ~90% lower - 25GB vs 300+GB. By off loading computation to other general-purpose smart contract chains such as Ethereum, Polkadot, Solana, Kadena, and Tezos, as well as engaging distributed ledgers such as Stellar, the network possesses essentially infinite scalability.
6

Decentralized

Mining is currently spread across CPU, GPU, industrial ASIC today, proving out the multi-algorithm model in production. In future, mobile devices, AI TPU chips, set-top boxes, USB form factor mini-ASICs, and more can all be brought into service to help secure the network and distribute computation.