Understanding the Mechanics of NEO

Dive deep into the structure, function, and principles that drive the New Economic Order (NEO) blockchain.

Blockchain Structure

NEO’s blockchain is built on a foundation of Proof of Trust (PoT). This ensures integrity and trust through a decentralized ledger where each transaction creates its own Root of Trust.

  • Each transaction forms a cryptogenetic pair of blocks—one from each participant—which serves as the fundamental Root of Trust.
  • Hashes are derived from the transaction data, timestamps, and the private cryptographic signatures of both parties.
  • The blockchain is structured as a decentralized web of validated interactions rather than a single, linear chain, allowing trust to propagate naturally between peers.

How Twin Transactions Work

NEO transactions follow a Twin Block model, where every transaction results in two interlinked blocks—one from each participant. These 'Twin Blocks' validate each other through cryptographic signatures, ensuring transaction integrity. This model prevents forgery by requiring each participant to sign their block using their own private key, which can then be verified with their public key.

Every participant in the network has a cryptographic key pair:

  • Private Key: A secret key that only the owner knows, used to sign transactions.
  • Public Key: A key derived from the private key, used by others to verify the owner's signature.

Step 1: Twin Block Generation

The transaction process begins when one party (the Initiator) creates a block and the counterparty (the Responder) generates its twin. Each block is uniquely signed using the creator’s private key, ensuring authenticity.

  • One node (e.g., Alice) initiates a transaction by creating an Initiate Block containing a transaction hash, her private cryptographic signature, and a Twin Pair ID.
  • The counterparty (e.g., Bob) generates a Response Block, independently verifying the transaction using his own private key and referencing Alice’s Twin Pair ID.

Step 2: Twin Block Validation

Once both twin blocks are created, they undergo mutual verification. Each participant checks that the other's block was signed with the correct private key by using the associated public key. If verification fails, the transaction is rejected.

  • The twin blocks are cross-referenced using the Twin Pair ID.
  • Both blocks must match in core transaction data but have unique cryptographic signatures based on each party’s private key.
  • If a mismatch occurs, the transaction is incomplete and invalid.

Step 3: Synchronization and Network Propagation

After validation, the twin blocks are broadcast to the network. Other nodes can verify the signatures independently, ensuring transparency and preventing tampering. Because each block is cryptographically linked, any modification to one twin would immediately invalidate the transaction.

  • Once validated, the Twin Blocks are broadcast to the network for transparency.
  • Other nodes recognize and store the Twin Blocks, ensuring redundancy and consistency.

Trust System and Edge Cases

Offline Transactions

Transactions can occur offline. In such cases, the twin blocks are stored locally on both nodes. When reconnected to the network, these blocks synchronize and are validated. If discrepancies arise, the transaction remains unverified until reviewed by independent auditors or validated through further interactions in the network.

Stale or Conflicting Transactions

When a block is created by any user, it is immutable and forms a new branch on the ledger. The only verification that a transaction occurred is the presence of its twin cryptogenetic block, signed by both parties. If two conflicting versions of a transaction exist, third-party auditors—independent nodes in the network—can review the twin blocks and determine which, if any, are valid. If verified, they can stamp the transaction as trusted, increasing the credibility of both parties involved. Over time, nodes that accumulate verified transactions with diverse participants build a stronger reputation in the network.

Fraud Prevention

Fraud cannot be entirely eliminated, but it can be mitigated through decentralized verification. Since each transaction consists of cryptogenetic twin blocks signed by both parties, fraud is only possible if both parties collude. However, the credibility of nodes is built over time based on transaction history. If a transaction is ever disputed, independent third-party auditors can review the signatures and confirm authenticity.

If Alice and Bob engage in fraudulent behavior, their transaction history will signal suspicious activity. Nodes evaluating trust consider a participant’s **broader transaction network**—nodes that interact with many different parties and maintain a record of verified transactions naturally gain higher trust. Fraudulent actors, isolated in a closed loop of self-validating transactions, will find it difficult to gain trust in the broader network.

To further strengthen trust, a third-party Audit Block may be introduced. This allows an independent node to review the transaction and verify its authenticity, reinforcing the credibility of both participants.

Fraud can still occur between two colluding parties, but their transaction history speaks for itself. If Alice and Bob engage in fraudulent behavior, their activity will appear suspicious to others. Nodes evaluating trust will consider a participant's broader transaction network—highly interconnected nodes with diverse, validated transactions signal stronger reliability.

Future Potential

The NEO blockchain is designed to scale and adapt. Its Proof of Trust model can power diverse applications:

  • IoT Integration: Securely connect and synchronize IoT devices.
  • Supply Chain Transparency: Track goods and ensure authenticity.
  • Decentralized Finance (DeFi): Facilitate trust-based financial agreements.

Key Features

  • Offline Capability: Transactions can occur even without an internet connection.
  • Conflict Resolution: Transactions are reviewed by independent third-party auditors, who verify cryptogenetic twin blocks and stamp valid transactions, reinforcing trust.
  • Tamper Resistance: Immutable hashes ensure data integrity.

Share how NEO’s Proof of Trust is reshaping decentralized systems!