vault backup: 2022-12-20 16:03:50

This commit is contained in:
Jet Hughes 2022-12-20 16:03:50 +13:00
parent 400a0e6fd9
commit 9e33c0913a
2 changed files with 5 additions and 3 deletions

View File

@ -27,7 +27,7 @@ How does a new node request to join the network. Would it be an off-chain applic
What if all of the nodes in the main network are validators? lobby > validators. then they all vote on adding new participants. But then they can all view documents that the applicants submit. Could be have some trusted third party check the documents? I think this the kind of thing we are trying to avoid so maybe not. Could we have some automatic system to check the documents? What if all of the nodes in the main network are validators? lobby > validators. then they all vote on adding new participants. But then they can all view documents that the applicants submit. Could be have some trusted third party check the documents? I think this the kind of thing we are trying to avoid so maybe not. Could we have some automatic system to check the documents?
Do we wan to limit the number of people who can join the chain. maybe a participant from the lobby is selected periodically, and then voted on. Maybe a set of participants are selected and voted on. What would this achieve? this would limit the number of application so that the system does not overload. prevents a person from effectively doing a DoS attack on the application process to prevent ligitamate people from applying. A DoS on the application process might also affect the usual activities of the network. Actually this wouldn't prevent a DoS on the application system. How can we stop a bad actor from sending in many applications? There could be some automatic sreening process which filters out applications that are not valid. Do we want to limit the number of people who can join the chain. maybe a participant from the lobby is selected periodically, and then voted on. Maybe a set of participants are selected and voted on. What would this achieve? this would limit the number of application so that the system does not overload. prevents a person from effectively doing a DoS attack on the application process to prevent ligitamate people from applying. A DoS on the application process might also affect the usual activities of the network. Actually this wouldn't prevent a DoS on the application system. How can we stop a bad actor from sending in many applications? There could be some automatic sreening process which filters out applications that are not valid.
# Remove Member # Remove Member
What happens if one participant turned bad and the other wanted to remove them from the group. Ssay we havea grup of 10 participants in a closed blockchain system using a CFT consensus algorithm Then they can be voted out so that their vote is desregarded and so they cant view or access data on the chain. what if they require access to decuments stored on-chain which they dont have local copies of. I guess they wuld have access to a stored copy of the blockchain on their node. But then would this chain be considered valid by oters. they dont store the actual document on the blockchain only a timestamped hash to prove they had that doc at this particular time. participats should keep local copies of documents. Can participants kick out the initiating authority? You would have some mechanism to ensure that they cant be kicked out. firstly there would have to be a vote to kick them out. unless they aren't actually needed. who are the people that look at the documents that are stored on the chain to check them. Some third party collectively employed by the group? the govt? maybe its required for each participant to sometimes go and check if other participants are being truthful. What happens if one participant turned bad and the other wanted to remove them from the group. Ssay we havea grup of 10 participants in a closed blockchain system using a CFT consensus algorithm Then they can be voted out so that their vote is desregarded and so they cant view or access data on the chain. what if they require access to decuments stored on-chain which they dont have local copies of. I guess they wuld have access to a stored copy of the blockchain on their node. But then would this chain be considered valid by oters. they dont store the actual document on the blockchain only a timestamped hash to prove they had that doc at this particular time. participats should keep local copies of documents. Can participants kick out the initiating authority? You would have some mechanism to ensure that they cant be kicked out. firstly there would have to be a vote to kick them out. unless they aren't actually needed. who are the people that look at the documents that are stored on the chain to check them. Some third party collectively employed by the group? the govt? maybe its required for each participant to sometimes go and check if other participants are being truthful.
@ -50,4 +50,4 @@ If someone uploads a document by accident that is sensitive, then the chain hard
what if someone found a security vulnerability in the code. would they exploit it? how to change the code. would there be a different process to normal code changes for something critical like this. within the blockchain wallets/accounts are linked to a real world identity. but i guess the person who found the vulnerability could easily (note the "person" is a member of an organisation who has access to the code) tell someone else who is not identifiable and have them exploit the vulnerability. how do organisations decide who has access to the code. if the person does not decide to try to exploit it, they have to bring it to the attention of others or try to fix it themselves. what if someone found a security vulnerability in the code. would they exploit it? how to change the code. would there be a different process to normal code changes for something critical like this. within the blockchain wallets/accounts are linked to a real world identity. but i guess the person who found the vulnerability could easily (note the "person" is a member of an organisation who has access to the code) tell someone else who is not identifiable and have them exploit the vulnerability. how do organisations decide who has access to the code. if the person does not decide to try to exploit it, they have to bring it to the attention of others or try to fix it themselves.
# Proposing Changes/Upgrades to the code or the goverance system # Proposing Changes/Upgrades to the code or the goverance system
How do the participants in the network proposed changes to the code or the system of governance? Could it work similar to the BIP/EIP systems?

View File

@ -124,3 +124,5 @@ Fooken worked.
`[2022-12-20 01:14:36.817516000][I][Irohad/Simulator]: Created block: Block: [hash=d77f03e3e5cdbb650b8092a0551d0360ff5e81c395db8e5c4334f0738077bb39, height=3, prevHash=6eeea45250c4df779bf34fa46753f24ccb15d9d730e1a3dd794eda9aeffb8486, createdtime=1671498876805, transactions=[Transaction: [hash=d0669901c2bb33cd69fe7573a888d77258f3f494c12e4f1185136de839d2c0ff, creatorAccountId=admin@test, createdTime=1671498871514, quorum=1, commands=[CallEngine: [type=83, caller=admin@test, callee=f205c4a929072dd6e7fc081c2a78dbc79c76070b, input=40c10f19000000000000000000000000f205c4a929072dd6e7fc081c2a78dbc79c76070b00000000000000000000000000000000000000000000000000000000000003e8]], batch_meta=(not set), reducedHash=Hash: [9e5640d660d7a9b224703a9f3f5513d1ef9b5f3db331d5bcc1b92edd229f443b], signatures=[Signature: [publicKey=313a07e6384776ed95447710d15e59148473ccfc052a681317a72a69f2a49910, signedData=53af285f82bb2bcf35288e5340d4da396304ea93f92caf7734d9aeadcffdc63a2c6ac31df2034cc462893310adb44252d82a85e23f9b0f02a444eb8df4b95e05]]]], signatures=[Signature: [publicKey=bddd58404d1315e0eb27902c5d7c8eb0602c16238f005773df406bc191308929, signedData=b544add45c65e932f8f1b18a36139b8fa7a198be3064de81e18d412cb8c565df9681feaf2ef1e53ca47522e6561afa3f11c8a7e84cadc04f5fe295df5d808d04]], rejected transactions=[]]` `[2022-12-20 01:14:36.817516000][I][Irohad/Simulator]: Created block: Block: [hash=d77f03e3e5cdbb650b8092a0551d0360ff5e81c395db8e5c4334f0738077bb39, height=3, prevHash=6eeea45250c4df779bf34fa46753f24ccb15d9d730e1a3dd794eda9aeffb8486, createdtime=1671498876805, transactions=[Transaction: [hash=d0669901c2bb33cd69fe7573a888d77258f3f494c12e4f1185136de839d2c0ff, creatorAccountId=admin@test, createdTime=1671498871514, quorum=1, commands=[CallEngine: [type=83, caller=admin@test, callee=f205c4a929072dd6e7fc081c2a78dbc79c76070b, input=40c10f19000000000000000000000000f205c4a929072dd6e7fc081c2a78dbc79c76070b00000000000000000000000000000000000000000000000000000000000003e8]], batch_meta=(not set), reducedHash=Hash: [9e5640d660d7a9b224703a9f3f5513d1ef9b5f3db331d5bcc1b92edd229f443b], signatures=[Signature: [publicKey=313a07e6384776ed95447710d15e59148473ccfc052a681317a72a69f2a49910, signedData=53af285f82bb2bcf35288e5340d4da396304ea93f92caf7734d9aeadcffdc63a2c6ac31df2034cc462893310adb44252d82a85e23f9b0f02a444eb8df4b95e05]]]], signatures=[Signature: [publicKey=bddd58404d1315e0eb27902c5d7c8eb0602c16238f005773df406bc191308929, signedData=b544add45c65e932f8f1b18a36139b8fa7a198be3064de81e18d412cb8c565df9681feaf2ef1e53ca47522e6561afa3f11c8a7e84cadc04f5fe295df5d808d04]], rejected transactions=[]]`
[[isolated scenarios#Adding a new member]] added some stuff. Idea of having a "lobby" subnetwork where people can apply, and have their documents checked, and where we can vote on them. [[isolated scenarios#Adding a new member]] added some stuff. Idea of having a "lobby" subnetwork where people can apply, and have their documents checked, and where we can vote on them.
[[isolated scenarios#Proposing Changes/Upgrades to the code or the goverance system]] I think I need to to some reading about the BIP/EIP system. from what I understand they are an off-chain system were