-
Notifications
You must be signed in to change notification settings - Fork 451
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
decentralised non-profit payment services #4044
Comments
For this 2nd meeting, please understand deeply:
plus read prior Martijn PSD2 code and otp code |
Please talk to me to get access to this code. Also, please give your GitHub username so we can assign you to the ticket/add you to the relevant GitHub teams. |
Please read all articles in Stannet his issue, especially "Harvard hitting time" paper: #2805 (comment) |
Ok! |
[ |
https://www.forbes.com/sites/geraldfenech/2018/11/23/blockchain-3-0-and-coti-next-generation-technology-without-mining/amp/ |
as discussed; recommended reading https://scholar.google.com/scholar?q=sybil+attack+attack+edges. Sybelinfer, sybillimit, Sybilguard, Sybildefender, etc. |
link to 8000 fake twitter accounts and .zip download idea of always duplicating last N trustchain records of your counterparty (n=20 or so). More advanced version is using deterministic assigned witnesses which have backup. System load is reduced when only requiring peer lookup, instead of block replication and lookup; thus simply asking 20 counter-parties and 20 witnesses is sufficient. |
Preventing forks is already being worked on: Tribler/py-ipv8#349 |
Somewhat related paper: Secure multiparty PageRank algorithm for collaborative fraud detection Collaboration between ING, ABN AMRO, TNO and CWI. Their work got accepted in FC'19. |
1000^4 problem. 90% offline churn issue. idea discussed: integrate block discovery, trust calculations, and transactions. |
DISCLAIMER: This is merely an improvement upon PageRank and does not claim to be sybil-resistant, solve double spending or forking problems, or calculates a perfect reliable trustworthiness (but neither does PageRank). Abstract Most of the time* it acquires the same result as the PageRank algorithm would converge to if ran for an infinite number of random walks. The algorithm is truly distributed and only requires interaction between the requesting and supplying party. It furthermore only requires interaction when a party tries to initiate a transaction with another party. The algorithm comes at the cost of an average runtime-complexity of O(E[degree]) and an average space-complexity of O(E[degree]2)**. The algorithm can be easily adapted to be equivalent to the results of the PageRank algorithm with four-hop random walks. TL;DR: A short video explaining the algorithm can be found here A more detailed description of the algorithm can be found here *The exact conditions required for which the score is incorrect are described in the section ‘Accuracy’ **Please be aware that E[degree] is the average number of unique one-hop neighbors, and not the total amount of blocks you created with your neighbors. At the moment of writing we had acces to 4.000.000 blocks. In the graph created with these blocks the nodes had an average degree of 41 with a 95th percentile being 75 or lower. |
Check-and-drop storage policy |
Progress meeting notes:
|
attached you'll find the Adobe After Effects project. |
Current thesis idea: the generic everything-included Trustchain framework. Enterprise grade? 10 ECTS worth of 1 thesis chapter draft called related work then please problem description. |
as requested I published the experimental repository, I've also created some documentation which serves both documentation of code as well as design decisions/ideas. |
Plan de campagne for the coming days:
Goal is to do some preliminary performance analysis |
Quick update on storage experiments Redis (with persistence):
redis read/write performance is constant with respect to dB size (as long as it fits in RAM) SQLlite writes:
SQLite random reads
|
quick update on Trustchain experiment
At this rate we can create 1541 blocks/second, and verify 1397 blocks/second. (This is without the communication overhead, which will dominate the creation and verification times for sure). |
Big ambitions:
|
Attached you'll find one of the documents discussed this meeting. |
Please order something like 3 different of these Android hardware devices and we'll give you a full refund. http://m.handheldposterminal.com/sale-9883763-handheld-touch-screen-pos-terminal-wireless-credit-card-machine-with-sim-card.html? |
This is the first draft of a more formal description of my fair witness selection protocol. Both content related and style related comments are highly appreciated. Fair Witness Selection Protocol - draft 1 Abstract: |
|
Some formal comments on the first draft:
|
Comments:
Experimental progress:
ToDo:
|
Progress of thesis chapters and coding:
|
Link to thesis: Link |
Progress of thesis meeting:
|
Some optimizations have been done on the communication protocol, reducing the best-case message count from 6 to 3. With this optimization the maximum achievable throughput is now increased from 634 to 861 transactions per second (a 36% increase!). |
@JetseBrouwer it might be interesting to see how throughput is affected when one chooses a random transaction counterparty. |
@devos50 If the counterpart is chooses at random there is exists a possibility that it's already busy. The probability of the other party being free increases if they all use a random back off time, this backof time however results in nodes sitting idle. The maximum I've reached with random partners so far was 920 tx/s but which significantly more nodes (this was before certain optimization tho). Tomorrow I'll arrange some new test results! |
True, but this is probably closer to a realistic workload. It is of course still interesting to explore the upper transaction throughput in the situation where transaction counterparties are fixed and pre-determined. I also wonder about the impact of the transaction size on throughput and (global) communication cost. Might be worth exploring, depending on your scope and time left 👍 |
meeting minutes:
|
When formalizing the protection against forking and block withholding attacks I found out, that fwsp is even more effective against these attacks. Excerpt from thesis: |
To have a cleaner demonstration, I've created a new repo, with only the required material and a manual on how to get things running: |
Current thesis .PDF from overleaf: Please add:
|
Overall thesis judgement: |
Remarks on
|
Please make this more prominent somehow (your's in green/bold, bigger): Table 5.1: Scalability of different solutions compared to this work ***About the thesis procedure***After going through it today. This is solid thesis content and suitable for a scientific article. nice! Note that for top-grades it is required to have a scientific article draft. It need to be polished to a level that it is ready to be submitted for publication. Example of prior IEEE 2-column formatted papers from the lab: https://arxiv.org/search/?query=pouwelse |
Thesis story line for micro-meeting: |
solid outline! 5min conclusion is bit long, would move some time to 'results'. |
Hello, I am struggling to find the up-to-date code for this project. Where is the repo currently located? |
Thesis finished on 10 Januari 2020 🎉 |
Trustchain resilience:
offline, non-bank Eurotokens.
The text was updated successfully, but these errors were encountered: