-
Notifications
You must be signed in to change notification settings - Fork 452
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lab goal: "Distributed Trust Design" #3571
Comments
The Internet is sick. We need a formula for Trust and Truth. Our cure needs to prove itself and work on a large scale. A killer application is needed to bring "distributed trust design" to a wide audience. Options to further explore:
|
Let me try to put your point a little bit more Martin Luther way 😁 : " I envision a world where all the knowledge produced by humanity is available to everyone for free. Knowledge is power. No greedy corporations with their opaque algorithms or governments with their power-hungry politicians decide what information they feed you. Only you decide what you get. It is your natural right that is with you from birth till your last gasp. What, when, and why to watch, listen and read. Any other outcome is a covered-up agression against you. You decide what knowledge you share and with whom you share it, on your conditions. And by knowledge I mean everything: news, songs, movies, books, pictures, designs... Everything. In the world I envision, there is no price for knowledge. It is just there for everyone to use, as the air is there free for everyone to breathe and the sea is there free for everyone to swim in. And if someone tries to pollute your air, you immediately see the smoke trail and trace it back to the offender. There are no "social networks" in that world. The Internet is the social Network, just as it was at its wake, and as it was envisioned by its creators. This Network constantly generates trust between its peers, facilitating democratic self-organizational process at all levels. People actually get into the Network to make friends. Contrast that with how we use our current "social" networks to shun the old enemies and compete in the exhausting race for social approvement (who gets more "likes"?) And mind you, the Network I envision is not fragile. It is anti-fragile. Every strike against it eventually makes it more resilent. Surviving a battle, platoon's trust between brothers-in-arms become stronger. Collective action based on mutual trust brought humanity to its glory. During the 20th century mutual mistrust almost resulted in our species extinction. If we want to prove ourselves as truly sentient beings, if our ancestors' lives and sacrifices and hopes still mean something to us - the time to act is now. Hope something like this manifesto will be a nice fit for some hacker-ish news-site publication. This kind of things is good at selling stuff to people, I've heard 😉 |
We now have a basic design which may be implemented in 2019 and deployed to understand the fundamental of engineering online trust. First "coherent framework to transform mutually non-trusting people into trustworthy online communities of arbitrary size". It is based on the following principles.
My first draft of a layered "incremental trust growth algorithm". It is a three-step defense against various known attacks:
|
I have been reading many papers this week on trust design as well as Seuken et al.'s work paper attesting the impossibility of preventing Sybil attacks. I have doubts on accepting his impossibility result as our guideway, because:
Let me briefly explain them in a very very rough way, for the ones who have not read the paper: Independence of disconnected agents: Existence or inexistence of any other node at any time does not affect the trust relation between two nodes. (e.g. My trust score for TU Delft does not depend how many universities there are in the world) Symmetry (They call it anonymity here): Trust scores depend only on what you have done but not your identity. (If A and B do the same work, they will have the same trust score from me.) Single-report responsiveness: Trust scores may be affected by a single report about the agent. (If I do not know anything about you, I will believe the first thing I heard about you) Misreport proofness: If you want to consume work from me, I neglect all your reports about the others. Yes, only a system which satisfies all the above assumptions is proven to be open to sybil-attack. On the same work paper, they attacked the third assumption (single-report responsiveness), claiming that "The only property that we can reasonably relax for the design of useful accounting mechanism is the single-report responsiveness property". However, I suppose we can attack other assumptions too, and in fact, what Johan wrote in the previous post and what we have discussed during the last weeks in the lab require the relaxation of some of this constraints. In short, we can present a new model based on / derived from 'accounting mechanism' (which would automatically invalidate the impossibility result) and do our own theoretical analysis. And I have a sense that we can prevent or limit the effects of sybil attacks. I have some immature ideas about that but they need to be formalized more before being opened to your discussions. |
I will summarize my thoughts on our trust research below. However for the actual collection of my notes, see here. The eventual aim of our lab is to generalize the trust notion. Due to our practical way of thinking throughout the lab, we tend to define and interpret trust according to our technical lab problem, which I'd call designing decentralized, accountable and anonymous P2P file transfer systems. I think, to model and abstract our problem without completely generalizing it would be a good initial step for us. I present below what I come up with through literature.
I suggest to analyze the dimensions of trust in our problem and detect the interdependencies between them. Then we come up with a complex model which outputs a node's trust 1) for all his neighbors, and 2) in each dimension. We can then attack the misbehaviors by updating our sub-models and tuning our parameters during simulations. To generalize accordingly, the steps towards designing a problem-specific trust function would be:
The steps above actually give what I plan to do for the next sprints. Any comment, correction, suggestion is appreciated. |
Very related Blockchain + Trust: |
AFAIK, NEM uses a variant of PageRank called NCDRank. |
MIT is now also doing some initial work in our domain. Still at the early idea stage and no concrete steps towards implementation and community building. https://www.trust.mit.edu/projects
Especially the last bit of writing on social capital is vastly superior marketing compared to our work. With Delft+Harvard+Berkley we only came up with "Work Accounting Mechanisms" 10 years earlier. Ai. |
Trust is what the Internet always needed, but never had. We are trying to solve this problem directly and have little competition. Very few team work on this because it is so hard, no solution is in sight, and profit-making models are problematic. TUDelft seems to be the only (academic) entity focused on building running code for the public infrastructure of identity&trust. Strong identities are a critical building block for trust. We aim to provide legal certainty around identities, digital signatures and multi-party signed contracts. Trust is a difficult to define concept. We place trust in agreements. However, a business contract is nothing more than a promise enforceable in court. Bitcoin never succeeded because it is based on the "closed world assumption". Smart contracts are dumb if they can not interact with the legacy analog world and legal system. Before we have any smartness in smart contracts we need to integrate well known concepts such as: legal certainty, counterparty risk, investment durability, shifting business models, changes in existing laws, etc. Governance is vital: who actually owns and controls everything? Maintenance ability is a cardinal requirements, both in short term and quantum-proof hashing in the far future. |
Genealogical identity systemOne solution to the trust problem could be "genealogical bootstrap", where users issue certificates to other users forming lineages. Every user will have one (or two, or several) "parents" who certified the creation of his account (essentially giving him the birth certificate). This will make it easy to distinguish Sybil regions. In this system, you will only crawl subtrees of your family tree. You can ask other people for peers with the specific chain of predecessors. We can run two bootstrap certifying instances (Adam and Eve 😉) and only give certificates to real people who ask for it. Then, these people can give other people certificates, etc. ExampleWhen you want a "birth certificate" you create your private key and send it to one of your parents, say, Adam. Adam then "proposes" to whomever he wants to procreate with, say, Eve (or maybe the child selects both parents instead). Then, Adam sends to Eve the proposal to sign his block. They both sigh it and put on their TrustChains. Then, the child gets the certificate. Note that Eve can reject the offer if Adam looks suspicious to her 😉. This system has some interesting properties. For instance, it naturally rejects inbreeding, because the progeny of close-relatives pairing has shorter paths to the most recent common ancestor (MRCA), which makes it more vulnerable in case MRCA is found to become corrupted. So, the system promotes diversity of connections. In a sense #4481 is a particular case of this system, where instead of a tree we use the Internet traffic exchange graph. But #4481 looks more like bacterial asexual reproduction system which is more about producing clones. From this point of view, @grimadas's accountability protocol #4719 looks like a horizontal gene transfer, and double spend detection system is analogous to CRISPR. Applications
Remind that all highly complex organisms use sexual reproduction... |
@ichorid Could you expand upon how the genealogical identity system is different from PGP's web of trust? |
|
Problem: Trust is too generic to "sell". One of the hard things about getting adoption for Key usage: global file system early USENIX work from nearly 30 years ago, Internet sharing. NFS was used to unify different FTP sites 30 years ago. Now the IPFS people are trying to create a unified hash space with the native ⨎,
|
What is our 2025 or 2026 objective?
|
Rules of thumb of Trust DesignAs one of the main goals for the lab is to build infrastructure to foster cooperation, I thought it would be useful to know insights from the social sciences. These are very useful when designing any feature/algorithm that deals with humans. There were many experimental and theoretical studies on the behavioural game theory, which models players as bounded rational. Although classical games (Prisoners Dilemma, Social Dilemmas, Trust and Ultimatum games) are useful models, Nash equilibrium is a only limited predictor of reality. Here are insights and heuristic s took from an excellent paper: Prisoners DilemmaPeople cooperate more than predicted in PD, but why?
Social DilemmasCan be viewed as an expansion for PD as n-player game. This extension has allowed identifying a number of interesting challenges:
Ways to solve the dilemmas:
The main incentives for defection are greed and fear, with greed being predominant.
One way to solve the dilemma is to create a superordinate group identity. Intergroup conflict also increases intragroup cooperation.
Altruistic punishment encourages collective cooperation. Relatively small punishments only decrease cooperation, might induce revenge and decrease interpersonal trust.
Might not be as effective as punishment.
Different labels affect cooperation: Take some (harvesting) is more cooperative than Give some(donating).
Trustees felt obligated to reciprocate when trustors showed high levels of trust (for example, sending a lot of money). |
... DRAFT ....Current status of our civilisationOnce upon a time it was believed that the internet would lead to greater equality. Today we are less naive and see the real impact. The Internet eroded unity, wealth, privacy and security. Once upon a time it was believe that our time was special and we witnessed the end of history. We now see the continued centralisation of our economies with monopolies that only increase in size and power. The dystopian vision that megacorporations would run the work has been replace with Wall Street steering our global economy. Within the industrial age we see a systemic move towards less competition in an increasing number of markets. Once upon a time monopolies where rare. Now most digital markets have huge profits with winner-takes-all dynamics, Predatory pricing, monopoly formation, buy&eliminate competition, and market failure in general. Piketty showed that income from wealth is greater then income from labor. Systemic bias towards the elite. Inter-generational wealth is on the rise, https://hbr.org/2014/04/pikettys-capital-in-a-lot-less-than-696-pages Ref1 ref2 ref3 Outlook of our civilisationRobot economy will further amplify inequality. Climate change may be the next upcoming financial crisis, great depression level. Will require trillions of investments. "Climate change-induced migration and violent conflict", https://doi.org/10.1016/j.polgeo.2007.05.001 The new generation of citizens, those who have been born this year will face a radical transformation. Newly born citizens will see future technology beyond self-driving cars with access to space which is currently still "astronomic expensive". The Space Economy is emerging and expected to further amplify-the-amplification of centralisation. Single winner within the whole raw resource economy. https://doi.org/10.1016/j.actaastro.2019.05.009, also https://asteroidminingcorporation.co.uk/aep-1 Alternatives to extractive capitalismEconomic principle for any economic activity, scales to any size. Alternative economic principle for the global economy.
Steps toward the first Economic transformation. Music industry, scientific publication and movie industry are vulnerable. This industry is expected to transform coming decades further into a live experience economy. Expect more meet-the-vlogger, liver performances, theme parks and ocean cruises with a theme (e.g. Disney++). Explore an isolated microeconomy with "existential freedom" that serves as a training ground for alternatives to capitalism by employing large-scale collaboration between individuals.Economic system with democratic governance, no central authority. No fantasy project, real governance, running code with Blockchain, AI, and democratic voting mechanism which does away with winner-takes-all systemic bias in capitalism. Operating by selling privacy-as-a-service and using this income for self-maintenance. Feature incorruptible saints, alternatives to faltering institutions. compliance-by-design. Bronze age of our "Democratic Economy"... (Thnx @qstokkink). Introduce a Bitcoin-operated DAO economy around arts&sciences. Early resultsOperational voting system (content likes), Operational ledger, MusicDAO, etc. |
Lots of related work is appearing, similar to our Trustchain.
|
This comment was marked as spam.
This comment was marked as spam.
Trust also relies on the underlying technology. Be ahead of the curve. Space-Efficient and Noise-Robust Quantum Factoring by MIT shows quantum-resiliency is nice to have. For instance, by seeing if the overhead is acceptable of SPHINCS+ solution. Huge change to IPv8. |
overall aim of the lab for coming 10 years.
We now have the ability to create trust with software, as shown by Ebay, AirBnB, and Uber. Key is the star rating mechanism. We want to generalize this. Our audacious ambition is to establish a new scientific field, we call Distributed Trust Design.
Distributed Trust Design provides a coherent framework to transform mutually non-trusting people into trustworthy online communities of arbitrary size, that have a process for democratic decision-making, the ability to punish those who freeride on the community or are dishonest in order to manage a marketplace, govern a resource sustainably, schedule activities, or achieve a common purpose in general.
Underlying issues:
The text was updated successfully, but these errors were encountered: