SlideShare a Scribd company logo
1 of 41
Download to read offline
Curated Proof Markets &
Token-Curated Identities
in Ocean Protocol
Trent McConaghy
@trentmc0
#Data
#Incentives
Audio radar
1000x more data
The Unreasonable Effectiveness of Data
1000%
less
error!
Silo mo’ data
Mo’ accuracy
Mo’ $
Default incentive:
hoard the data
“Show me the incentive
and I will show you the outcome.”
-Charlie Munger
You can get people to do stuff
by rewarding them with tokens.
This is a superpower.
Change the
incentives!
Silo Pool mo’ data
Mo’ accuracy
Mo’ $
How to design?
Here’s a Process for Token Engineering
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing pattern. If needed, try different
formulations or solvers.
3. Design new pattern?
Patterns (Building Blocks) for Token Design
• Curation
• Stake machines, curation markets
• Curated proofs markets, TCRs
• Proofs
• Bitcoin puzzle solving, Filecoin PoST, Steemit human
• Data availability, more
• Identity
• Reputation
• Governance / software updates
• Third-party arbitration
• …
Patterns (Building Blocks) for Token Design
• Curation
• Stake machines, curation markets
• This talk: Curated proofs markets, TCRs
• Proofs
• Bitcoin puzzle solving, Filecoin PoST, Steemit human
• This talk: Data availability, more
• Identity
• Reputation
• Governance / software updates
• Third-party arbitration
• …
Curated
Proofs Markets:
Formulation
Objective: maximize supply of relevant data
• We convert this objective to block rewards.
• Then, how about this reward:
“Reward making relevant data available when asked”
• But: How to know what’s relevant? Algorithms capture this poorly.
• Solution: leave it to the crowd. Let them put their money where
their mouth is! (Staking)
• Revised reward:
“Reward curating data (staking on it) + making it available”
Objective: maximize supply of relevant data
• Reward curating data (staking on it) + making it available
• New pattern: curated proofs market
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Expected
reward for user
i on dataset j
Dj = proofed popularity
= # times made dataset
available
Sij = predicted popularity
= user’s curation market
stake in dataset j
# tokens
during
interval
From AI data to AI services
Motivations:
• Privacy, so compute on-premise or decentralized
• Data is heavy, so compute on-premise
• Link in emerging decentralized AI compute
Objective function: Maximize supply of relevant services
=reward curating services + proving that it was delivered
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
proofed popularity
of service
predicted popularity
of service
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Sij = expected popularity =
stake in dataset j
Key block #1:
Curation market
Dj = actual popularity = #
downloads
Key block #2:
Proof of availability
(All other blocks are ancillary to these blocks)
Proofs
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Sij = predicted popularity =
stake in dataset j
Key block #1:
Curation market
Dj = actual popularity = #
downloads
Key block #2:
Proof of availability
(All other blocks are ancillary to these blocks)
Proof of Data Availability
Approach A: FileCoin Proof of Space-Time (PoST), though
that’s overkill
Approach B: TrueBit-style challenge-response:
1. I serve data to you
2. If you don’t think you got it, you challenge (with stake)
1. Randomly choose two actors to vet
2. Actors vote on whether served
3. If they agree that I served it, you lose stake
4. If they agree that I didn’t serve it , I lose stake
5. Else
More Proofs
With more proofs, more services!
Blob data
Availability
AI compute
Privacy
compute
Generalized
Proofs
Inter-
Operability
*Note: logos shown are examples and do not imply partnerships or integrations
General
compute,
prediction
Structured
data
Availability
Token Curated
Registry (TCR)
First, some attack vectors
Some attack vectors
• Elsa & Anna Attack: Someone uploads popular content that
they don’t have rights to
• Data Escapes: People take data out of the system
• Curation Clones: Others create a new market for an existing
dataset
• Sybil Downloads: Someone (or a ring of buddies) downloads
a dataset they own >>1 times, to get >>rewards
How to approach?
Idea 1: network directly has legal arbitration
• Problem: it binds the network to jurisdictions (eek).
• Need to be permissionless and borderless!!
Idea 2: “sunny day tech, rainy day law”
• Core network itself has self-regulation by community.
Incentivize good acting. Zero sum  positive sum. 99% case.
• Higher levels can have arbitration tied to jurisdictions. 1% case
class TokenCuratedRegistry
def propose(data)
def challenge(proposal)
def vote(challenge)
TCR: a whitelist of good actors, curated by the actors themselves
New user B
proposes
for B to join 10 tokens
stake
by B
Existing user A
challenges
User status
A (Alice) “Challenger”
B (Bob) “New” +
“Proposed”
Mallory “OK”
Trent “OK”
10 tokens
stake
by A
class TokenCuratedRegistry
def propose(data)
def challenge(proposal)
def vote(challenge)
TCR: a whitelist of good actors, curated by the actors themselves
New user B
proposes
for B to join 10 tokens
stake
by B
Existing user A
challenges
User status
A (Alice) “Challenger”
B (Bob) “New” +
“Proposed”
Mallory “OK”
Trent “OK”
10 tokens
stake
by A
Concern:
High friction onboarding
7-28 day waiting period
class TokenCuratedRegistry
def vouch(data)
def challenge(proposal)
def vote(challenge)
TCR: a whitelist of good actors
“Trust is risk” for low-friction onboarding: vouch for others
Existing user
A vouches
for new user
B to join
10 tokens
stake by A,
B can run
away with it
anytime
User status
A (Alice) “Vouches”
B (Bob) “New”
Mallory “OK”
Trent “OK”
Some attack vectors
• Data Escapes: People take data out of the system
• Curation Clones: Others create a new market for an existing
dataset
• Elsa & Anna Attack: Someone uploads popular content that
they don’t have rights to
• Sybil Downloads: Someone (or a ring of buddies) downloads
a dataset they own >>1 times, to get >>rewards
Walk Through
Conclusion
AI  Data silos  data crisis.
Trent McConaghy
@trentmc0
A thoughtful token design
has thoughtful building blocks.
For Ocean, this includes:
• Curated Proofs Markets (CPMs)
• Token Curated Registry

More Related Content

What's hot

Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsTrent McConaghy
 
Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolTrent McConaghy
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainTrent McConaghy
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainTrent McConaghy
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolTrent McConaghy
 
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...
DN 2017 |  A New Data Economy with Power  to the People | Trent McConaghy | B...DN 2017 |  A New Data Economy with Power  to the People | Trent McConaghy | B...
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...Dataconomy Media
 
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen HamiltonDN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen HamiltonDataconomy Media
 
Big data analytics 1
Big data analytics 1Big data analytics 1
Big data analytics 1gauravsc36
 
Approximate "Now" is Better Than Accurate "Later"
Approximate "Now" is Better Than Accurate "Later"Approximate "Now" is Better Than Accurate "Later"
Approximate "Now" is Better Than Accurate "Later"NUS-ISS
 
Philosophy of Deep Learning
Philosophy of Deep LearningPhilosophy of Deep Learning
Philosophy of Deep LearningMelanie Swan
 
Building and Using a Knowledge Graph to Combat Human Trafficking
Building and Using a Knowledge Graph to Combat Human TraffickingBuilding and Using a Knowledge Graph to Combat Human Trafficking
Building and Using a Knowledge Graph to Combat Human TraffickingCraig Knoblock
 
A brief history of "big data"
A brief history of "big data"A brief history of "big data"
A brief history of "big data"Nicola Ferraro
 
A Big Data Timeline
A Big Data TimelineA Big Data Timeline
A Big Data TimelineBig Cloud
 

What's hot (15)

Towards an AI Commons
Towards an AI CommonsTowards an AI Commons
Towards an AI Commons
 
Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data Scientists
 
Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean Protocol
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in Blockchain
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to Blockchain
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean Protocol
 
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...
DN 2017 |  A New Data Economy with Power  to the People | Trent McConaghy | B...DN 2017 |  A New Data Economy with Power  to the People | Trent McConaghy | B...
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...
 
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen HamiltonDN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
 
Beyond Online PDFs
Beyond Online PDFs Beyond Online PDFs
Beyond Online PDFs
 
Big data analytics 1
Big data analytics 1Big data analytics 1
Big data analytics 1
 
Approximate "Now" is Better Than Accurate "Later"
Approximate "Now" is Better Than Accurate "Later"Approximate "Now" is Better Than Accurate "Later"
Approximate "Now" is Better Than Accurate "Later"
 
Philosophy of Deep Learning
Philosophy of Deep LearningPhilosophy of Deep Learning
Philosophy of Deep Learning
 
Building and Using a Knowledge Graph to Combat Human Trafficking
Building and Using a Knowledge Graph to Combat Human TraffickingBuilding and Using a Knowledge Graph to Combat Human Trafficking
Building and Using a Knowledge Graph to Combat Human Trafficking
 
A brief history of "big data"
A brief history of "big data"A brief history of "big data"
A brief history of "big data"
 
A Big Data Timeline
A Big Data TimelineA Big Data Timeline
A Big Data Timeline
 

Similar to Curated Proof Markets & Token-Curated Identities in Ocean Protocol

Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...blockchainexe
 
Proffer Blockchain Hackathon $17K+ prizes | Launch Presentation
Proffer Blockchain Hackathon $17K+ prizes | Launch PresentationProffer Blockchain Hackathon $17K+ prizes | Launch Presentation
Proffer Blockchain Hackathon $17K+ prizes | Launch PresentationAnshul Bhagi
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...CS, NcState
 
A search engine in a world of events and microservices - SF Pot @Meetic
A search engine in a world of events and microservices - SF Pot @MeeticA search engine in a world of events and microservices - SF Pot @Meetic
A search engine in a world of events and microservices - SF Pot @MeeticmeeticTech
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)Jae-Yun Kim
 
Blockchain the solution to internet voting
Blockchain the solution to internet votingBlockchain the solution to internet voting
Blockchain the solution to internet votingStanislaw Baranski
 
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUniteThe Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUniteMatt Lockyer
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInKrishnaram Kenthapadi
 
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03) Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03) Young Suk Ahn Park
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273Abutest
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273Abutest
 
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...Abhay Prakash
 
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...Edge AI and Vision Alliance
 
Token btlcoin btlcoin
Token btlcoin btlcoinToken btlcoin btlcoin
Token btlcoin btlcoinbtlcoin token
 
Portfolio_JenniHawk
Portfolio_JenniHawkPortfolio_JenniHawk
Portfolio_JenniHawkJenniHawk
 
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Alexandre Sieira
 
Mining social data
Mining social dataMining social data
Mining social dataMalk Zameth
 

Similar to Curated Proof Markets & Token-Curated Identities in Ocean Protocol (20)

How to verify computation in the blink of an eye
How to verify computation in the blink of an eyeHow to verify computation in the blink of an eye
How to verify computation in the blink of an eye
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
 
Proffer Blockchain Hackathon $17K+ prizes | Launch Presentation
Proffer Blockchain Hackathon $17K+ prizes | Launch PresentationProffer Blockchain Hackathon $17K+ prizes | Launch Presentation
Proffer Blockchain Hackathon $17K+ prizes | Launch Presentation
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
 
A search engine in a world of events and microservices - SF Pot @Meetic
A search engine in a world of events and microservices - SF Pot @MeeticA search engine in a world of events and microservices - SF Pot @Meetic
A search engine in a world of events and microservices - SF Pot @Meetic
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
Blockchain the solution to internet voting
Blockchain the solution to internet votingBlockchain the solution to internet voting
Blockchain the solution to internet voting
 
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUniteThe Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedIn
 
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03) Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273A
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273A
 
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
 
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
 
Bot or Not
Bot or NotBot or Not
Bot or Not
 
BDACA1516s2 - Lecture7
BDACA1516s2 - Lecture7BDACA1516s2 - Lecture7
BDACA1516s2 - Lecture7
 
Token btlcoin btlcoin
Token btlcoin btlcoinToken btlcoin btlcoin
Token btlcoin btlcoin
 
Portfolio_JenniHawk
Portfolio_JenniHawkPortfolio_JenniHawk
Portfolio_JenniHawk
 
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
 
Mining social data
Mining social dataMining social data
Mining social data
 

Recently uploaded

Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Curated Proof Markets & Token-Curated Identities in Ocean Protocol

  • 1. Curated Proof Markets & Token-Curated Identities in Ocean Protocol Trent McConaghy @trentmc0
  • 4. 1000x more data The Unreasonable Effectiveness of Data 1000% less error!
  • 5. Silo mo’ data Mo’ accuracy Mo’ $ Default incentive: hoard the data
  • 6. “Show me the incentive and I will show you the outcome.” -Charlie Munger
  • 7. You can get people to do stuff by rewarding them with tokens. This is a superpower.
  • 8. Change the incentives! Silo Pool mo’ data Mo’ accuracy Mo’ $
  • 9. How to design? Here’s a Process for Token Engineering 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing pattern. If needed, try different formulations or solvers. 3. Design new pattern?
  • 10. Patterns (Building Blocks) for Token Design • Curation • Stake machines, curation markets • Curated proofs markets, TCRs • Proofs • Bitcoin puzzle solving, Filecoin PoST, Steemit human • Data availability, more • Identity • Reputation • Governance / software updates • Third-party arbitration • …
  • 11. Patterns (Building Blocks) for Token Design • Curation • Stake machines, curation markets • This talk: Curated proofs markets, TCRs • Proofs • Bitcoin puzzle solving, Filecoin PoST, Steemit human • This talk: Data availability, more • Identity • Reputation • Governance / software updates • Third-party arbitration • …
  • 13. Objective: maximize supply of relevant data • We convert this objective to block rewards. • Then, how about this reward: “Reward making relevant data available when asked” • But: How to know what’s relevant? Algorithms capture this poorly. • Solution: leave it to the crowd. Let them put their money where their mouth is! (Staking) • Revised reward: “Reward curating data (staking on it) + making it available”
  • 14. Objective: maximize supply of relevant data • Reward curating data (staking on it) + making it available • New pattern: curated proofs market E(Rij) α log10(Sij) * log10(Dj) * T *Ri Expected reward for user i on dataset j Dj = proofed popularity = # times made dataset available Sij = predicted popularity = user’s curation market stake in dataset j # tokens during interval
  • 15. From AI data to AI services Motivations: • Privacy, so compute on-premise or decentralized • Data is heavy, so compute on-premise • Link in emerging decentralized AI compute Objective function: Maximize supply of relevant services =reward curating services + proving that it was delivered E(Rij) α log10(Sij) * log10(Dj) * T *Ri proofed popularity of service predicted popularity of service
  • 16. E(Rij) α log10(Sij) * log10(Dj) * T *Ri Sij = expected popularity = stake in dataset j Key block #1: Curation market Dj = actual popularity = # downloads Key block #2: Proof of availability (All other blocks are ancillary to these blocks)
  • 18. E(Rij) α log10(Sij) * log10(Dj) * T *Ri Sij = predicted popularity = stake in dataset j Key block #1: Curation market Dj = actual popularity = # downloads Key block #2: Proof of availability (All other blocks are ancillary to these blocks)
  • 19. Proof of Data Availability Approach A: FileCoin Proof of Space-Time (PoST), though that’s overkill Approach B: TrueBit-style challenge-response: 1. I serve data to you 2. If you don’t think you got it, you challenge (with stake) 1. Randomly choose two actors to vet 2. Actors vote on whether served 3. If they agree that I served it, you lose stake 4. If they agree that I didn’t serve it , I lose stake 5. Else
  • 21. With more proofs, more services! Blob data Availability AI compute Privacy compute Generalized Proofs Inter- Operability *Note: logos shown are examples and do not imply partnerships or integrations General compute, prediction Structured data Availability
  • 24.
  • 25. Some attack vectors • Elsa & Anna Attack: Someone uploads popular content that they don’t have rights to • Data Escapes: People take data out of the system • Curation Clones: Others create a new market for an existing dataset • Sybil Downloads: Someone (or a ring of buddies) downloads a dataset they own >>1 times, to get >>rewards
  • 26. How to approach? Idea 1: network directly has legal arbitration • Problem: it binds the network to jurisdictions (eek). • Need to be permissionless and borderless!! Idea 2: “sunny day tech, rainy day law” • Core network itself has self-regulation by community. Incentivize good acting. Zero sum  positive sum. 99% case. • Higher levels can have arbitration tied to jurisdictions. 1% case
  • 27. class TokenCuratedRegistry def propose(data) def challenge(proposal) def vote(challenge) TCR: a whitelist of good actors, curated by the actors themselves New user B proposes for B to join 10 tokens stake by B Existing user A challenges User status A (Alice) “Challenger” B (Bob) “New” + “Proposed” Mallory “OK” Trent “OK” 10 tokens stake by A
  • 28. class TokenCuratedRegistry def propose(data) def challenge(proposal) def vote(challenge) TCR: a whitelist of good actors, curated by the actors themselves New user B proposes for B to join 10 tokens stake by B Existing user A challenges User status A (Alice) “Challenger” B (Bob) “New” + “Proposed” Mallory “OK” Trent “OK” 10 tokens stake by A Concern: High friction onboarding 7-28 day waiting period
  • 29. class TokenCuratedRegistry def vouch(data) def challenge(proposal) def vote(challenge) TCR: a whitelist of good actors “Trust is risk” for low-friction onboarding: vouch for others Existing user A vouches for new user B to join 10 tokens stake by A, B can run away with it anytime User status A (Alice) “Vouches” B (Bob) “New” Mallory “OK” Trent “OK”
  • 30. Some attack vectors • Data Escapes: People take data out of the system • Curation Clones: Others create a new market for an existing dataset • Elsa & Anna Attack: Someone uploads popular content that they don’t have rights to • Sybil Downloads: Someone (or a ring of buddies) downloads a dataset they own >>1 times, to get >>rewards
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 41. AI  Data silos  data crisis. Trent McConaghy @trentmc0 A thoughtful token design has thoughtful building blocks. For Ocean, this includes: • Curated Proofs Markets (CPMs) • Token Curated Registry