Offline Value
Ghost Protocol enables value to exist in physical form, independent of network connectivity, stored on devices that can be transferred hand-to-hand like cash.
The Pattern
Offline value works as follows:
-
Commit value. You create a commitment representing specific value and record it on-chain.
-
Store the secret. You store the secret on a physical device: a smart card, a hardware token, an NFC chip, or any secure storage medium.
-
Transfer physically. You give the physical device to someone else. They now possess the secret and thus the value.
-
Redeem online. Eventually, the holder connects to the network and reveals the commitment to claim the value.
What This Provides
Offline value has properties that digital-only systems cannot match:
No connectivity required. The value exists in the device. Transfers happen without any network access.
Physical possession. Whoever holds the device holds the value. This creates intuitive ownership semantics.
Censorship resistance. No network means no one can block or reverse the transfer.
Gift economy. Value can be given as physical gifts, embedded in objects, or hidden for discovery.
How It Works
The physical device contains:
- The commitment reference (which commitment this value corresponds to)
- The secret needed to reveal it
- Optionally, metadata about the value (amount, token type)
When you transfer the device, you transfer all of this information. The recipient does not need to trust you; they can verify the commitment on-chain when they have connectivity.
Trust during the offline period depends on the security of the physical device and the relationship between parties.
Categories of Use
Offline value enables many categories of applications:
Physical currency. Cards or tokens that carry value and can be exchanged without infrastructure.
Stored value cards. Gift cards or prepaid cards that work even when systems are down.
Bearer instruments. Bonds, vouchers, or tickets embedded in physical objects.
Secure backup. Cold storage of value in physical form, isolated from network attacks.
Developing regions. Value transfer in areas with limited or unreliable connectivity.
Security Considerations
Offline value introduces unique security considerations:
Device security. If someone can extract the secret from the device, they can steal the value. The device must be tamper-resistant.
Double-spending window. During the offline period, the sender could theoretically reveal the commitment before the recipient. The recipient accepts this risk until they verify on-chain.
Loss and damage. If the device is lost or destroyed, the value is lost. Physical security matters.
Verification delay. You cannot instantly verify that value is valid without connectivity. You trust the device until you can check.
The Trade-Off
Offline value trades convenience for connectivity independence:
You gain the ability to transfer value without networks, but you accept the risks of physical custody and delayed verification.
This is appropriate for:
- Situations where connectivity is unavailable or unreliable
- Use cases where physical handoff is preferable to digital transfer
- Scenarios where the ceremony of physical exchange matters
It is less appropriate when instant verification is required or when physical security is difficult to maintain.
Implementation
Ghost Protocol does not mandate a specific physical form. Value can be stored on:
- NFC cards (tap to transfer)
- Hardware security modules
- Secure enclaves in phones (if offline capable)
- Paper (QR codes containing encrypted secrets)
- Any medium that can securely store a few hundred bytes
The protocol provides the commitment mechanism. The physical implementation is a design choice.