quartz/content/notes/veracity-summary.md
2023-02-24 18:53:52 +09:00

2.4 KiB

title tags
veracity-summary

Plan

  • Major points
    • reading
      • process
      • main findings
    • scenarios
    • solidity contract
      • thoughts leading up to it
      • what I think it would have been
    • what I got implemented
      • default contract

Aim

The aim of this project was to consider aspects of a closed public permissioned blockchain. Currently some believe there is an issue with current permissioned blockchains in that they are not sifficiently decentralised. On the other hand open permissionless blockchains such as Bitcoin are cumbersome to use due to their need for an associated cryptocurrency.

Process

Stage 1 - understand blockchain and read general literature

Stage 2 - test Hayden's system from last year

Stage 3 - read papers similar to what we are trying to accomplish

Stage 4 - evaluate select scenarios that coild arise with the proposed system, considering how existing technology could be sed and how we could adapt it

Stage 5 - (incomplete) test out ideas for the proposed system in a small scale environment

Scenarios

Solidity Contract

Near the end of the project before my break I had decided to try to test the Add New Participant scenario. I decided to do this by making a smart contract that would run on the Iroha Blockchain. I could use the Hyperledger Burrow integration to run a smart contract in the Ethereum Virtual Machine, which could interact with Iroha.

This contract would be called when a new member ==how would it be called?== needed to be added to the chain. When it was called it would wait ==for what amount of time?== for all ==(or some percentage of)== existing voting members to vote on whether to accept the new member. Based on the outcome of the vote, the contract would then either reject the applicant or add them to the chain. ==how to add?==

Security Issues

%%Three tier system

This Idea occured when considering the possibility of a Dos attack on the chain targeted at the system of adding new participants. By creating numerous request to join the chain, the voting system would become inundated with request and legitamate applicants would be ==hidden?==.

The propsed three tier system consists of an application "lobby", a set of non-voting participants, and a set of voting participants.er system consists of an application "lobby", a set of non-voting participants, and a set of voting participants. %%