Beruflich Dokumente
Kultur Dokumente
The Road
Ahead
So whats left?
Umm, no.
Privacy
All info on world computer is public
Creating Ethereum but with privacy is hard, carries
very serious efficiency and complexity tradeoffs,
and possibly impossible under an economic
security model (cant prove the miners arent all
talking to the NSA, so you cant reliably
disincentivize such behavior)
But we can develop specific solutions for large
Who cares?
Financial institutions (incl private/consortium chains)
Ordinary users (who want privacy of their coin
transaction history, identity data, etc)
Decentralized financial applications (non-privacy may
lead to market manipulation opportunities)
Lack of privacy makes censorship easier, which
makes attacks easier
How do we do it?
Digital assets: linkable ring-signature + additively
homomorphic value encryption (ozcoin style), ZKSNARKs
N-party smart contracts: state channels, Hawk
Voting: linkable ring-signature
Data storage: plain old encryption (ECIES works
well w/ existing ethereum crypto), secret sharing
Scalability
Problem: every node processes every transaction.
This means the network can never be more
powerful than a single node
Just increasing block size carries centralization
tradeoffs (5 nodes in data centers, etc)
Scalability
Solution path 1: lightning networks / state
channels (eg. Raiden)
Solution path 2: sharding (Ethereum 2.0)
Essentially, create a network that can survive with
no full nodes at all
Each computer stores/processes at most ~0.11% of the state/transactions
Scalability
Casper (PoS)
How I usually describe proof of stake: virtual
mining
Casper: improved consensus algorithm based on
consensus by bet
Idea: bonded validators make transactions called
bets that give them profit in some histories at
the expense of loss in other histories
Casper (PoS)
This process converges, and over time one history
becomes favored
Finality: of validators stake their entire deposits
on one particular history, losing all funds in other
histories
Efficiency
VM efficiency
WebAssembly VM
Block times
Casper by-block consensus
Merkle tree proof efficiency
EIP 104, tree structure changes
Abstraction
Currently, there are 2 types of accounts: externally
owned accounts (EOAs) and contracts
All EOAs use ECDSA + sequence numbers as a
security mechanism
EIP 101: reduce to one type of account, put security
mechanisms into EVM code
Transactions come from zero address, user accounts