-
Cryptocurrencies
-
Exchanges
-
Media
All languages
Cryptocurrencies
Exchanges
Media
A new generation of smart contract operating platform, development framework, and collaborative ecology that supports native applications on all platforms (server, PC, mobile, Internet of Things, etc.), TRIAS aims to define a new generation of full-platform public chain system and build a trustworthy Intelligent autonomous computing devices (Trustworthy and Reliable intelligent Autonomous Systems) make people trust machines.
Successful tokenomics considers monetary theory, financial economics, international macroeconomics and game theory. Trias builds a unified, sustainable tokenomics around the technology, building on interpretations of traditional economies.
We believe that a solid token economy foundation requires a currency to drive economic activity, and various economic mechanisms and policies to stimulate and maintain economic activity and meet the requirements of economic agents. In Trias, we take current SaaS to the next level with blockchain and smart contracts.
We invented DSaaS and developed the economics of DSaaS to increase productivity and reduce the cost of virtual operating system and application software services.
Leviatiom Community
In the Leviatom network, the first-tier computing power nodes dig out the third Layer computing power nodes, and repeated verification with continuous high frequency to ensure that the target node is always in a credible state. The first layer of computing power nodes is the foundation of the Leviatom network, especially in the initial stage of network construction, the scale and activity of the first layer of nodes will determine the robustness of the network. Therefore, it will be possible for the first-tier nodes to mine new Tokens through such "safety verification or mining". The second layer of computing power nodes realizes the aggregation, transfer, and routing of the computing power credibility of the entire network. They will also receive Token rewards for this contribution. The third-tier nodes execute the applications distributed by MagCarta. If the result is correct, they will have the opportunity to obtain the reward Token defined by MagCarta Consensus. Since the execution rights of the third-tier nodes are obtained by the first and second-tier nodes through contribution computing, storage, and bandwidth, the third-tier nodes will use part of the Tokens obtained to actively reward some nodes that participate in mining or dissemination.
Prometh Community
In order to realize the traceable construction and automatic security analysis of the application program, the Prometh framework also needs to call on the power of the community to contribute to the program by contributing computing power and security verification programs. Security endorsement. Therefore, in the initial stage of the construction of the Prometh system, it is also necessary to use the mining mechanism to motivate volunteers. Specifically, it allows developers or security analysts to have the opportunity to obtain newly generated Tokens when implementing automated analysis and testing procedures for security verification on software source code (or intermediate binary files). At the same time, since Prometh cannot guarantee that complex native applications are flawless, its strong auditing and trusted traceability system can help potential vulnerabilities be discovered within a limited time and achieve accountability. Therefore, the executor of the program (that is, the third-level computing power node of Leviatom) can turn part of the income into insurance and deposit it in the insurance contract. The insurance contract can be used to reward a security analysis program that finds a program loophole in the Prometh ecosystem, and can be used to compensate Leviatom nodes that have suffered losses due to running a Prometh program with potential loopholes. Therefore, the insurance model is mainly for data and computing power providers, who can choose to convert part of the revenue into insurance while gaining income, so as to make up for the security of local data or computing power platforms caused by loopholes that are not discovered in time risk. The Token in the insurance contract can also be used as a reward for vulnerability discoverers, thereby constructing a virtuous cycle of cyberspace security ecology.
MagCarta Community
The MagCarta contract realizes the payment for the Leviatom computing power and the Prometh program by specifying PRICE_STRATEGY in its Consensus call. This transaction method will become the main driving force for Token circulation after the mining is over.
Efficient consensus (100,000-level TPS):TRIAS can quickly locate the "most difficult point to lie" in the entire network, and distribute smart contract programs for a small number of these points. Therefore, by using the heterogeneous consensus algorithm of trusted computing, the TRIAS blockchain fundamentally reduces and optimizes the consensus process and node costs, and improves the consensus speed. In the case of the same node size and computing power, the consensus speed of TRIAS will reach 5000-10000 times of the current consensus speed of Ethereum, which can meet most of the current application scenarios of enterprise information transmission and communication, and has high concurrency for enterprise-level commercial use ability;
Highly stable (against nearly 90% of computing power attacks): The current block chain defense method adopts a strategy of winning by quantity and increasing the cost of the attacker. The effect of this method It has been proven to be stronger than traditional data security. But even if the blockchain achieves 51% attack resistance, there is still a great chance of being successfully attacked. For example, ransomware-like automated worm attacks can self-replicate, spread, and continuously latent APT (Advanced Persistent Threat) attacks at high speed. If the number of nodes in the blockchain is not enough, the cost of being destroyed is still acceptable if the consensus speed of the Internet environment exceeds the propagation speed of automatic attacks. TRIAS uses the small-world network algorithm among the consensus nodes to build a trust network based on the TEE trusted verification relationship. The cost of "lying" for any node on the network almost requires more than 90% of the nodes in the entire network to cooperate with lying at the same time. Therefore, compared with traditional blockchain networks that cannot resist 51% attacks, TRIAS can resist nearly 90% of malicious computing power attacks;
Unlimited expansion (less than 1% cross-shard communication overhead): Each node in TRIAS can participate in multiple shards, each node can participate in all aspects of the transaction, and Get the corresponding benefits. The trusted value of each node in TRIAS will be used as one of the sharding bases that it can participate in, rather than simply relying on state fragmentation. In the case of maximizing security, it can accurately communicate across fragments, and perform efficient and reliable unlimited public chain expansion;
Native applications (supports trusted calls to native applications on all platforms): With the support of the TEE environment, machines connected to the entire network can elect high-level A trusted execution environment, and supervise the credit calls of native applications. Under this framework, applications on all platforms can realize trusted calls from source code to application life cycle on the chain;
High-level paradigm (supporting complex smart contract collaboration mode): At present, most of the blockchain technologies are mainly aimed at financial transactions, and such underlying data structures are difficult to adapt to the current mainstream Streaming high-performance data applications in artificial intelligence and big data scenarios cannot be directly described. The TRIAS blockchain adopts a decoupled blockchain smart contract paradigm description structure, which can directly convert the mainstream high-level paradigm into the blockchain paradigm in a unified manner, so that users can implement various mainstream applications. Paradigm description.
Zero porting (supporting zero refactoring porting of native applications on all platforms): The current smart contract adopts a new language or a high-level language such as C++ for encapsulation , providing an API to allow users to rewrite the program execution process that cannot be tampered with. This approach makes it very difficult for current users to upload their existing applications to the chain. Through the combination of trusted computing and DevSecOps, TRIAS starts from the software source code stage, and conducts consensus traceable on-chain analysis and storage of evidence for each change behavior. Under the smart contract framework of TRIAS, existing programs can directly interact with the chain, and the environment in which smart contracts run is like the relationship between containers and programs, so that native applications on all platforms can be seamlessly connected to the TRIAS system.
Trusted data source (credible collection and on-chain of off-chain data): Based on trusted computing technology, the access of external chain equipment and data access is in the traditional mining Based on the way of software or wallet access, the measurement and verification of trusted computing for the user's entire operating environment is carried out to ensure that the state of the user's operating environment is verified and verified in 7X24 hours, even if there is 1 byte of non-white When the list changes, the behavior and nodes of its untrusted external chain can be found, which solves the problem of low access destruction cost of the existing blockchain technology. TRIAS limits the trustworthiness of the source of output by restricting trusted devices to generate chain data sources to ensure the trusted state of data generation and the standard TAG attributes added in subsequent processing. In the entire TRIAS ecosystem, there are many forms of data collection. Through the interface of TRIAS or the non-tamperable standard process of CLIENT, the legality and accuracy of the data in the process of transmission and uplink are guaranteed. At the same time, the strict protection of data privacy ensures the integrity of the transmission process. Safe and reliable. After the data is approved, it will be dumped to the corresponding multi-copy nodes, and the TXID and the current data status will be recorded, so as to trace back and call the formation of the audit, so that the data is convenient to use, and will not be easily leaked and illegally used and spread;
Zero data exchange (private data collaborative processing without data sharing): The pain point of existing data collaborative computing is that it is difficult to guarantee the security and privacy of the data of all parties involved. Current cryptography-based methods, such as zero-knowledge proofs, secure multi-party computation, and homomorphic encryption, all have significant application limitations. TRIAS uses the reverse approach to solve security problems: exchanging programs instead of exchanging data. When multiple parties implement collaborative computing, the two parties first connect to Leviatom to build a unified trusted computing power platform, and then distribute the data processing program developed based on Prometh to the trusted computing power platform of the data owner. MagCarta implements a higher-level programming method, calculation of benefits based on the contributions of all parties, and an insurance model for hedging risks. TRIAS thus realizes multi-party collaborative computing where data never leaves the user's computer room.
Green mining (mining with security verification):Based on HCGraph technology, TRIAS calculates the trusted value of all nodes in the entire network in real time, cools down and removes untrusted nodes, and builds a Security is a computing power system, replacing mining with security verification. Different smart contracts can choose nodes with different credibility values to run according to their own economic capabilities and security needs, and the nodes will gain benefits, avoiding meaningless waste of resources and computing power;
Insurance system (insurance is a security service):TRIAS introduces an insurance system to hedge risks that may arise during the execution of smart contracts, such as 0-day vulnerabilities in basic software. Smart contracts can use Token to purchase insurance according to their own risk tolerance, and when a security risk occurs, they can obtain claims.
*The above content is organized by YouToCoin official. If reprinted, please indicate the source.