We also need a detailed explanation of why we can trust blackbytes cannot be duplicated.
The fact that they are not on a ledger and therefore transparent makes it suspicious to many and it is a very sensible question that needs to be answered in a FAQ
Can anyone provide it?
For an in-depth answer, read
Hiding entire content of on-chain transactions.
For more common questions about Blackbytes, read
Byteball: Blackbytes FAQ.
But hey, by all means, try to duplicate Blackbytes, test the system if you don't trust it
