Zooko's Triangle
   HOME
*





Zooko's Triangle
Zooko's triangle is a trilemma of three properties that some people consider desirable for names of participants in a network protocol: * ''Human-meaningful:'' Meaningful and memorable (low-entropy) names are provided to the users. * ''Secure:'' The amount of damage a malicious entity can inflict on the system should be as low as possible. * ''Decentralized:'' Names correctly resolve to their respective entities without the use of a central authority or service. Overview Zooko Wilcox-O'Hearn conjectured that no single kind of name can achieve more than two. For example: DNSSec offers a human-meaningful, secure naming scheme, but is not decentralized as it relies on trusted root-servers; .onion addresses and bitcoin addresses are secure and decentralized but not human-meaningful; and I2P uses name translation services which are secure (as they run locally) and provide human-meaningful names - but fail to provide unique entities when used globally in a decentralised network withou ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Zooko's Triangle
Zooko's triangle is a trilemma of three properties that some people consider desirable for names of participants in a network protocol: * ''Human-meaningful:'' Meaningful and memorable (low-entropy) names are provided to the users. * ''Secure:'' The amount of damage a malicious entity can inflict on the system should be as low as possible. * ''Decentralized:'' Names correctly resolve to their respective entities without the use of a central authority or service. Overview Zooko Wilcox-O'Hearn conjectured that no single kind of name can achieve more than two. For example: DNSSec offers a human-meaningful, secure naming scheme, but is not decentralized as it relies on trusted root-servers; .onion addresses and bitcoin addresses are secure and decentralized but not human-meaningful; and I2P uses name translation services which are secure (as they run locally) and provide human-meaningful names - but fail to provide unique entities when used globally in a decentralised network withou ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Blockstack
Stacks, formerly Blockstack, is an open-source platform to enable smart contracts, DeFi, NFTs, and apps for Bitcoin. Stacks blockchain is a "layer" for Bitcoin similar to the Lightning Network. In addition to smart contracts, the Stacks project provides open-source software for authentication, and data storage. Design Concerns around internet privacy, security, and data breaches brought attention to the Stacks project. Software developers have used the Stacks software to build decentralized alternatives to popular services. Stacks (STX) token is the native cryptocurrency of the Stacks blockchain, which is used as gas fee for executing smart contracts and processing transactions. History Stacks project was originally started by Muneeb Ali and Ryan Shea as Blockstack. STX became the first SEC qualified token offering in 2019. Blockstack PBC, a company working on the Stacks technology, raised around $75 million through a mix of venture capital and token sales. The main Stacks ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Paul Crowley (cryptographer)
Paul Crowley may refer to: * Paul Crowley (footballer) (born 1980), Irish footballer * Paul Crowley (ice hockey) Paul Crowley (born December 26, 1955) is a Canadian former professional ice hockey winger who played in the World Hockey Association (WHA). Career Drafted in the tenth round of the 1975 NHL Amateur Draft by the Toronto Maple Leafs, Crowley was ... (born 1955), Canadian ice hockey player * Paul F. Crowley (born 1934), member of the Pennsylvania House of Representatives {{human name disambiguation, Crowley, Paul ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Marc Stiegler
Marc Stiegler (born 1 August 1954) is an American science fiction author and software developer. He co-authored ''Valentina: Soul in Sapphire'' (1984) with Joseph H. Delaney. The computer program, Valentina, was one of science fiction's earliest examples of sentient computer software, completely unlike mainframe AIs such as HAL and Colossus. Stiegler also wrote the short story "The Gentle Seduction", based on Vernor Vinge's ideas about a technological "singularity," the exponential growth of future technology that will drastically affect the human condition. The story's characters are augmented with molecular nanotechnology. The 'seducer' is the technology itself, and perhaps the programmers of the technology - the majority of mankind is more willing to swallow a pill that fixes one's back (this happens in the story) than take a pill that installs a computer in one's forehead (also from the story). He also realized that many humans do not have the mental fortitude to survi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

CAP Theorem
In theoretical computer science, the CAP theorem, also named Brewer's theorem after computer scientist Eric Brewer, states that any distributed data store can provide only two of the following three guarantees:Seth Gilbert and Nancy Lynch"Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services" ''ACM SIGACT News'', Volume 33 Issue 2 (2002), pg. 51–59. . ; Consistency: Every read receives the most recent write or an error. ; Availability: Every request receives a (non-error) response, without the guarantee that it contains the most recent write. ; Partition tolerance: The system continues to operate despite an arbitrary number of messages being dropped (or delayed) by the network between nodes. When a network partition failure happens, it must be decided whether to do one of the following: * cancel the operation and thus decrease the availability but ensure consistency * proceed with the operation and thus provide availability but risk i ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

GNU Name System
GNUnet is a software framework for decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery, resource allocation, communication over many transports (such as TCP, UDP, HTTP, HTTPS, WLAN and Bluetooth) and various basic peer-to-peer algorithms for routing, multicast and network size estimation. GNUnet's basic network topology is that of a mesh network. GNUnet includes a distributed hash table (DHT) which is a randomized variant of Kademlia that can still efficiently route in small-world networks. GNUnet offers a " F2F topology" option for restricting connections to only the users' trusted friends. The users' friends' own friends (and so on) can then indirectly exchange files with the users' computer, never using its IP address directly. GNUnet uses Uniform resource identifiers (not approved by IANA, although an application has been made). GNUnet URIs consist of two major parts: the module and the module ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Petname
Petname systems are naming systems that claim to possess all three naming properties of Zooko's triangle - global, secure, and memorable. Software that uses such a system can satisfy all three requirements. Such systems can be used to enhance security, such as preventing phishing attacks. Unlike traditional identity systems, which focus on the service provider, Petname systems are decentralized and designed to facilitate the needs of the enduser as they interact with multiple services. History Though the Petname model was formally described in 2005 by Mark Stiegler, the potential of the system was discovered by several people successively. Examples * '' The GNU Name System (GNS)'' – a decentralized alternative to DNS based on the principle of a petname system * ''CapDesk'' – a distributed desktop environment * ''Petname Tool'' (discontinued browser extension) – There was a browser extension available for Firefox Mozilla Firefox, or simply Firefox, is a free and open- ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Handshake Protocol
A handshake is a globally widespread, brief greeting or parting tradition in which two people grasp one of each other's like hands, in most cases accompanied by a brief up-and-down movement of the grasped hands. Customs surrounding handshakes are specific to cultures. Different cultures may be more or less likely to shake hands, or there may be different customs about how or when to shake hands.Fist bump can pound out flu transmission
__TOC__


History

The handshake may have originated in as a demonstration of peaceful intent, since it shows that the hand holds no weapon. Another possibility is that it originated as ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Ethereum Name Service
Ethereum is a decentralized, open-source blockchain with smart contract functionality. Ether (Abbreviation: ETH; sign: Ξ) is the native cryptocurrency of the platform. Among cryptocurrencies, ether is second only to bitcoin in market capitalization. Ethereum was conceived in 2013 by programmer Vitalik Buterin. Additional founders of Ethereum included Gavin Wood, Charles Hoskinson, Anthony Di Iorio and Joseph Lubin. In 2014, development work began and was crowdfunded, and the network went live on 30 July 2015. Ethereum allows anyone to deploy permanent and immutable decentralized applications onto it, with which users can interact. Decentralized finance (DeFi) applications provide a broad array of financial services without the need for typical financial intermediaries like brokerages, exchanges, or banks, such as allowing cryptocurrency users to borrow against their holdings or lend them out for interest. Ethereum also allows users to create and exchange NFTs, which are uni ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Monero (cryptocurrency)
Monero (; ISO 4217#Unofficial codes for cryptocurrencies, Abbreviation: XMR) is a decentralized cryptocurrency. It uses a public distributed ledger with privacy-enhancing technologies that obfuscate transactions to achieve anonymity and fungibility. Observers cannot decipher addresses trading monero, transaction amounts, address balances, or transaction histories. The protocol is open source and based on CryptoNote, a concept described in a 2013 white paper authored by Nicolas van Saberhagen. The cryptography community used this concept to design Monero, and deployed its mainnet in 2014. Monero uses ring signatures, zero-knowledge proofs, "stealth addresses", and IP address–obscuring methods to obfuscate transaction details. These features are baked into the protocol, though users can optionally share view keys for third-party auditing. Transactions are validated through a Cryptocurrency mining, miner network running RandomX, a proof-of-work algorithm . The algorithm issues n ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer network of nodes. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional client–server model in which the consumption and supply of resources are divided. While P2P systems had previously been used in many application domains, the architecture was popularized by the file sharing system Napster, originally released in 1999. The concept has inspired new structures and philosophies in many areas of human interaction. In such social contexts, peer-to-peer as a meme refers to the egalitarian so ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]