FAQ

Common questions with direct answers. No marketing fluff.

Concept

Why not just use PKI?

PKI works and scales to billions of certificates (see public web PKI). But it has operational baggage that breaks down at IoT scale:

IronIP is a complementary layer, not a replacement. Application-layer auth (which often uses PKI-backed tokens) is still needed for authorization. IronIP just adds network-layer identity underneath, where PKI's operational cost is highest.

Does my device need a wallet?

No. The device stores ~1.2KB of BCA Parameters and performs SHA-256 hashes. That's it. No blockchain sync, no transaction signing, no UTXOs. See Bitcoin as Infrastructure for the wallet-ownership table.

Can constrained devices run this?

Yes, with a floor. Devices need:

This rules out 8-bit microcontrollers but comfortably fits everything from Cortex-M3 upward — which is most modern IoT silicon.

How is this different from SEND?

SEND (RFC 3971) uses CGA for address generation. CGA at meaningful security takes ~696 seconds per address. IronIP replaces CGA with a Bitcoin-anchored construction: same RFC role, same security property, but under 1ms per address. IronIP makes SEND actually viable. See IPv6 Extensions.

Bitcoin dependency

What if Bitcoin goes away?

You're depending on a third-party blockchain explorer (WhatsOnChain)

What's the failure mode when Bitcoin has issues?

Isn't the database the real source of truth, not Bitcoin?

The trust model has two distinct concerns, often conflated:

  1. "Is this identity authentic?" — Bitcoin is the source of truth. Block header, PoW, Merkle proofs all verifiable from on-chain data alone.
  2. "Where do I get the parameters?" — the database, or firmware, or a peer. These are distribution mechanisms, not trust sources. BCA Parameters are self-authenticating: if the 8-step verification passes, they're authentic.

If the database is lost, Bitcoin still has the anchor. The public key hash and Merkle root are recoverable from on-chain data. The only off-chain data is the modifier set, which travels with the device. So anchor + device = full recoverability.

Why not a private/consortium ledger?

Can you do this on BTC instead of BSV?

Yes. The construction is chain-agnostic. Trade-offs:

Security and compliance

Is this post-quantum?

The core construction uses SHA-256 (post-quantum secure under current understanding, with effective security halved to 128 bits against Grover's algorithm — still far beyond 89-bit ECDLP equivalent). It doesn't rely on ECDSA for verification of the BCA address itself — identity binding is hash-based via OP_RETURN.

Signed-request extensions (wallet liveness) do use ECDSA, so those would need post-quantum signature migration when the threat becomes real.

What about revocation?

Not currently built. On the roadmap as PushDrop Revocation — spend-to-revoke mechanism that makes revocation state globally consistent via Bitcoin UTXO state. Until then, revocation must happen at application layer.

How does an IronIP device pay for the services it uses?

Payment middleware is on the roadmap (Tier 6c). The vision pairs IronIP identity with BRC-103 peer-to-peer mutual authentication and BRC-29 payment channels: devices prove identity, establish authenticated sessions, and pay per-request or per-packet using BSV micropayments — all anchored to the same key that already establishes the device's network identity. Supports pay-per-API-call (HTTP 402 style), streaming pay-per-packet (payment channels), prepaid quotas, and tiered access combined with BRC-52 certificates. No accounts, no credit cards, no OAuth dance. The Bitcoin payment is the authorization.

What about FIPS 140-2 / 140-3?

See Compliance Notes for the detailed pathway.

Common Criteria certification impact?

BCA address generation and verification run outside the certified boundary of a CC EAL4+ secure element. The element exports a public key (as it does today); IronIP consumes that public key. No CC recertification is required for devices that add IronIP on top of an already-certified secure element.

Who would certify this?

Not yet applicable — IronIP is a research-stage implementation. For production deployment, independent security review at a top venue plus one or more reference customer deployments would typically precede formal certification. The primitives are standard (SHA-256, Merkle trees), so the certification gap is about the combination, not any individual component.

Scope and limitations

Does BCA solve source IP spoofing?

On private/controlled networks, yes. The network boundary is the trust boundary; spoofing requires physical or logical network access.

On public/shared networks, no — BCA proves the identity was registered, not this packet came from that device. Pair with IPsec or application-layer signing. See Known Limitations.

Does it replace cloud authentication?

No. IronIP is network-layer identity; cloud auth is application-layer authorization. Both are needed. IronIP makes the hardware token more valuable, not less — it becomes the root of a permanent, provider-independent identity that application auth can then build on.

Can I use this without AWS?

Yes. The 8-step verification has zero AWS dependencies. Standalone verifier script (scripts/standalone-verify.js) runs on any Node.js. Adapters for NGINX and Envoy operate without AWS. IronIP's AWS integration is for the demo deployment, not a requirement of the construction.

See also