Steps to Powning (password owning)
- User puts images in the import folder
- The import process takes the jpegs and stack files and breaks them into single stack files. These are placed in the Suspect folder. The original files are moved to the Imported folder for reference(A). If the files are malformed, they are moved to trash (B).
- The Authenticity Detection process is run on each note in the suspect folder. They are moved from the drive to RAM one at at time so only one coin will be lost if the power goes out or the process is interpreted.
- The coin’s information is sent to the RAIDA and a pass / fail is returned.
- If the coin does not fail any RAIDA nodes, it is moved to the Bank. If a minority of RAIDA say it is Counterfeit then it is moved to Fracked folder. If a majority of RAIDA say it is counterfeit it is moved to the Counterfeit folder. If there are less than 16 RAIDA that respond, the coin is put back in the Suspect folder and be detected again later. The suspect folder is usually checked when the program starts to see if there are unfinished coins that need to be detected. The detection process will also look in the suspect folder the next time the user imports coins. If coins are fracked, a background process will fix them with the RAIDA and put them in the Bank.
- The CloudCoin in the Bank folder are all authentic and perfect. When it is time to spend the coins that will be exported. Exporting removes the files from the bank and puts them in the export folder. During the export of jpg files, image templates are drawn from the template file. These templates can be customized.
- The files in the export folder should be sent to where you want them to go and then deleted. If you do not delete them, you may accidentally try to spend them again and they will be counterfeit