Author

Topic: [ANN] | DUSK Network | Privacy-oriented blockchain for Digital Securities! - page 167. (Read 145658 times)

full member
Activity: 1260
Merit: 102
If you need URDU translation. Then PM me plz.
sr. member
Activity: 742
Merit: 250
Any Bounties ?

We will roll out our bounty programme in the coming weeks, stay tuned!

This is a great news.
I really hope there will be many interesting bounty campaign will be opened, at least there are social media bounty so that I could join.
copper member
Activity: 474
Merit: 21
In order for this 100% anomine transaction to occur, should both use the same DUSK technology? For example, I use Dusk as an email service, I send an email, will the message be 100% anonymous until I reach the recipient?

Yes! you can read more about it Here.
copper member
Activity: 474
Merit: 21
Any Bounties ?

We will roll out our bounty programme in the coming weeks, stay tuned!
sr. member
Activity: 700
Merit: 250
I myself prefer a fast and anonymous transaction over the other aspect.
I think from those 2 things we could get our safety at the same time, cause the one who know the transaction is us.
hero member
Activity: 756
Merit: 500
Do you plan for any crowdsale (ico) ? or its just private sale ?!
full member
Activity: 378
Merit: 107
A lot of technical information, many strong people in cryptography. Honestly, it is very difficult to understand the technical description of the project, but this is for those who do not understand. Cool project.
jr. member
Activity: 140
Merit: 1
Powered by the Dusk Blockchain, the Dusk Network layer aims to provide a next-generation, cryptographically secure way to perform secure audio, video and data streaming between two distinct nodes on the network.
sr. member
Activity: 1204
Merit: 252
In order for this 100% anomine transaction to occur, should both use the same DUSK technology? For example, I use Dusk as an email service, I send an email, will the message be 100% anonymous until I reach the recipient?
full member
Activity: 1260
Merit: 102
copper member
Activity: 474
Merit: 21
SBA* in a Nutshell

What is the Dusk Network?

The Dusk Network is a decentralized infrastructure focused on providing the sweet-spot between privacy and transparency in payments, communication and asset ownership transfers. It departs from consensus mechanisms like PoW/PoS, which are poorly suited for privacy, to introduce a new privacy-oriented consensus mechanism called Segregated Byzantine Agreement. Dusk is a new blockchain that provides true privacy and a fast and a secure streaming mechanism called Secure Tunnel Switching (STS), all powered by a privacy-oriented cryptocurrency: DUSK.

In this introductory series we aim to take a look at specific aspects of the Dusk Network and explain them in a nutshell. In this article we will look at Dusk’s consensus mechanism, called Segregated Byzantine Agreement, or SBA*. SBA* is a new consensus algorithm vastly more efficient than proof-of-work or proof-of-stake, and it was engineered to provide the best possible trade-off between security, efficiency and flexibility.

For a detailed description of SBA* please refer to the whitepaper.

The mechanics behind SBA*
SBA* uses existing ideas like Cryptographic Sortition(lottery), and combines it with concepts like stealth time-locked transactions to implement simple but secure communication that can be audited. SBA* makes use of a few different types of actors in the network to reach consensus:
  • 1. (super)Nodes. These are points in the network that facilitate transactions. They compete with each other for the generating and proposing blocks. These are computationally very light tasks, and a node will not require high computational power, or a big stake.
  • 2. Provisioners. These are nodes that have committed a certain minimum stake to the Dusk Network and take care of more intensive tasks such as block verification, voting, and notarization (VVN operations). These types of nodes are non-transactional.

By splitting tasks based on intensity and relaying them to transaction and non-transactional nodes the network’s speed greatly increases, whilst decreasing the chance of a partitioned network, and guaranteeing a higher availability of the network. Using SBA* there is no chance of an unintended fork of the blockchain, meaning there will be no doubt about what the main branch is. This translates into the appealing property of achieving transaction “finality” as soon as consensus is reached for a block.

Phases of the consensus mechanism
SBA* foresees different subsequent cyclic phases:
  • 1. Block Generation Sortition — nodes participate in sortition(lottery) to acquire the right to broadcast a block proposal.
  • 2. Default Block Generation Sortition — run by Provisioners in parallel to the Block Generation Sortition. They will propose a default empty block, in case consensus is not reached on the proposed block.
  • 3. Validation — run by a subset of Provisioners called Verifiers. Verifiers confirm the legitimacy of the block proposal and its proposing candidate. If everything was done correctly they will sign the proposed block, otherwise they will sign the default block proposed by the provisioners.
  • 4. Voting — a number of rounds each of which run by a different subset of Provisioners called Voters. Once consensus is reached on the block it can be notarised and added to the chain. If consensus is not reached they will vote to add an empty block.
  • 5. Notarisation — the Voters which reached voting consensus on the pre-block are called Notaries. Their public key is added to the pre-block and they play the role of Verifiers in the next block’s Validation phase. The pre-block is then turned into an official block by the Notaries.


Sortition
VVN Operations are conceptually easy to grasp, and relatively self-explanatory. They merely explain how a proposed block is tested and potentially added to the blockchain. The sortition mechanism that plays a big part in the first stages of SBA* however is worth spending a bit more time on.

A node that wishes to participate in the sortition (and become a Block Generation candidate)is first required to lock an arbitrary amount of DUSK. A time-locked transaction is a special transaction where the output is un-spendable for a predetermined period of time. In order to participate to the Sortition lottery for proposing a block, the candidate performs a time-locked transaction toward a Stealth Address. Such a transaction is indistinguishable from the normal others. After completing this transaction the candidate receives a lottery outcome, think along the lines of a lotto number, and gossips this to the rest of the network.

After all participating nodes (candidates) have gossiped their lottery outcomes to the provisioners, a winner is selected that can propose a pre-block. In case no nodes participate in a certain round the default block generated by the provisioners will be used. The big benefit of how SBA* combines sortition with gossip is that nothing needs to be known about the stakes, identity, or balances of the candidates, whilst still allowing for an audit of candidate’s honesty. The likelihood of a winning sortition outcome depends on a weight correlated to the amount of DUSK committed by a node. Proof of blind bid (SBA*) renders it statistically and economically disadvantageous for an actor to attempt bad behaviour, since he would risk losing his stake.

Rewards
In addition to finalizing a block onto the chain, Notaries are also responsible for a secondary procedure which generates the block rewards through a set of coin-base transactions, essentially minting new DUSK. This new DUSK will be sent to the address of the Block Generator(the successful lottery candidate). Provisioners do not gain their reward by winning sortition, but rather gain a fixed ROI at the end of a block. This ROI is also a coin-base transaction and is awarded to all provisioners, not just those who took part in this specific block committee(those performing VVN operations).

Counterintuitively, the rewards paid are inversely proportional to the staked amount (i.e. bigger stakes get proportionally less rewarded, in respect to smaller stakes). This measure is novel and to our knowledge not a viable option outside of the Dusk Blockchain. The motivation is twofold. Together with preventing the ‘’rich get richer’’ scheme, the intention is to create a counter position between power (intended as the capability to influence block generation by being selected as part of the Block Committee) and money (intended as the financial benefit acquired from running Provisioners). Considering that SBA* is already protected from Sybil attack by making it probabilistically disadvantageous to dilute a stack into several balances, similarly, by reversing the proportion between rewards and stake, the system prevents financially motivated participants to benefit from organizing themselves into few Provisioner pools at the expense of decentralization. Centralized pools are in our opinion a highly undesirable property of a good network.

The block rewards, together with the provisioner’s ROI, will form the DUSK network’s inflation rate. You can read more on the DUSK network’s economy in upcoming articles focused specifically on how the whole network will operate economically. However, incentives will align with decentralization and early adoption.

How to learn more about Dusk Network
The Dusk Network is a project coordinated by the Dusk Foundation. We are a decentralized ecosystem entirely focused on providing the perfect trade-off between privacy and transparency. Dusk protects privacy and fits regulations in payments, communications and asset transfers.

Please consider joining us at the following media:
copper member
Activity: 474
Merit: 21
The Anonymous Network Layer explained
What is the Dusk Network?
The Dusk Network is a decentralized infrastructure focused on providing the sweet-spot between privacy and transparency in payments, communication and asset ownership transfers. It departs from consensus mechanisms like PoW/PoS, which are poorly suited for privacy, to introduce a new privacy-oriented consensus mechanism called Segregated Byzantine Agreement. Dusk is a new blockchain that provides true privacy and a fast and a secure streaming mechanism called Secure Tunnel Switching (STS), all powered by a privacy-oriented cryptocurrency: DUSK.

In this introductory series we aim to take a look at specific aspects of the Dusk Network and explain them in a nutshell. In this article we will look at Dusk’s Anonymous Network Layer, a gossip oriented communication tier inspired by I2P. The Dusk ANL serves to enable full privacy for its decentralized network, and we will explain some of its components in this article.

For a detailed description of The Dusk ANL please refer to the whitepaper.

What is the Dusk Anonymous Network Layer for?
In the vast majority of blockchain implementations, network communication protocols limit themselves to just embracing the privacy standards we have in place today for our daily internet needs: TCP/IP, UDP, SSL for encrypting communication channels to name a few. These protocols are necessary to interconnect network devices on the internet, or as a communications protocol in a private network.

While this can be considered acceptable for centralized environments or platforms where user privacy is not the main proposition, the privacy requirements established with the Dusk network impose the adoption of technology offering a much higher level of privacy protection. To achieve this goal, Dusk is enabling full anonymity over its decentralized network by integrating an advanced, custom bi-directional routing, fully compatible with I2P’s Garlic-Routing technology for all its networking communications, but extending the underlying protocol not only for the deployment of additional functionality (such as fully anonymous file transfer) but also for allowing the default anonymous gossip protocol which powers the entire Dusk network.

The proposed architecture has been designed to make it computationally infeasible for an eavesdropper to tell apart Dusk related traffic from other network activities. Additionally, it should be very hard for any network node to associate a transaction with the IP address of the original initiator.

How does it work?
Dusk’s ANL is inspired by and compatible with I2P’s Garlic Routing technology. Garlic routing generally refers to two things; Layered encryption, and the bundling of messages together. Garlic routing was in turn inspired by ‘Onion Routing’ (TOR). It is relevant to briefly start at the beginning to explain the decision made for the Dusk Network. Onion Routing is a technique that builds paths (tunnels) through a series of peers. Messages are encrypted a number of times, sent through the tunnel, and each peer in the tunnel strips away a layer of encryption and finds just the information it needs to send it onwards. The message and its routing instructions are only fully exposed at the end of the tunnel, once all the (onion) layers have been peeled back. Garlic routing is conceptually similar, but bundles messages together, which makes it more efficient, and makes it more difficult to track a single message if you are insistent on exposing a communication’s intended endpoint.

The Dusk Network uses a more advanced version which roughly works as follows:
  • 1. Alice and Bob want to transact/communicate.
  • 2. Alice and Bob are a node or connect to a node.
  • 3. The node connects to a Voucher Seeder, and obtains a signed list of active nodes.
  • 4. The node chooses a node from the list to act as an entry tunnel to the Dusk Network, thus bootstrapping Alice’s connection.


  • 1. Alice’s Entry Tunnel forwards non-repliable packets to the Dusk Address of other nodes.
  • 2. These nodes gossip the data further to other nodes until the message is propagated far enough through the network to reach Bob’s Exit Tunnel.
  • 3. Bob receives the transaction/communication.


The Dusk Approach
Compared to similar solutions, the Dusk approach offers the following benefits:
  • 1. Makes use of packet routing, instead of circuit routing. This means transparent load balancing of all networking message across peers, instead of a single tunnel.
  • 2. Multiple packets are joined together in inconspicuous messages, making it exponentially difficult for an attacker to expose network communications.
  • 3. True decentralization: it uses a distributed directory to have an overview of the network, as opposed to relying on a centralized bulletin board.
  • 4. Uni-directional tunnels guarantee that incoming and outgoing traffic is kept decoupled; a measure engineered to enhance transmission unlinkability through data stream separation.


Conclusion
The ANL’s chief concern is to hide the identities of our transactors, most notably their IP Addresses. Many current privacy blockchains don’t have an IP obfuscation feature, and the implementation of Garlic Routing together with a gossip protocol ensures that a sender’s IP address will never be reconstructed.

How to learn more about Dusk Network
The Dusk Network is a project coordinated by the Dusk Foundation. We are a decentralized ecosystem entirely focused on providing the perfect trade-off between privacy and transparency. Dusk protects privacy and fits regulations in payments, communications and asset transfers.

member
Activity: 135
Merit: 11
Hello DUSK Network Team,
            Congratulations! There is excellent news for you. Your ICO DUSK Network is now listed on one of the most prominent ICO listing (ICO Calendar) -  CoinDelite.com
           
            Your project has been reviewed and rated by our experts and has got a rating of 3.5 out of 5. You can request edit access or write to us to claim any changes.
           
            Your rating widget code is available at https://coindelite.com/widgets.
           
            Our Telegram channel has 100k plus subscribers (https://t.me/coindelite); you may want to share your ICO there and promote your ICO.  To get in touch with us, you may write to us at [email protected] or contact Garry on Telegram (@Garry_x).
           
            Best wishes,

            Team CoinDelite
       
copper member
Activity: 474
Merit: 21
Dusk in a Nutshell
The Dusk Network is a decentralized infrastructure focused on providing the sweet-spot between privacy and transparency in payments, communication and asset ownership transfers. It departs from consensus mechanisms like PoW/PoS, which are poorly suited for privacy, to introduce a new privacy-oriented consensus mechanism called Segregated Byzantine Agreement. Dusk is a new blockchain that provides true privacy and a fast and a secure streaming mechanism called Secure Tunnel Switching (STS), all powered by a privacy-oriented cryptocurrency: DUSK.

This means that we are building the first blockchain enabled platform that allows for streaming, file transfer and storage, and video/audio conferencing, all paid in crypto and fully decentralized, unsurveilled, and uncensorable. Our roadmap focuses on three main use cases; payments, digital asset transfer, and p2p communication. Especially in the asset transfer area Dusk aims to be the first platform to reconcile the requirements set out by both businesses and individuals with regulatory auditability requirements. This means that our confidentiality and privacy ecosystem will become the perfect, compliant, launching pad for Security Token Offerings (STO’s).

Besides technical innovations Dusk Network is a project that will deliver according to a strict project schedule, combining decades of IT delivery experience. The Dusk Network’s research and development is coordinated through the Dusk Foundation, a non-profit foundation that focuses exclusively on delivering the Dusk Network, and the academic, humanitarian, and commercial benefits it brings. Read our whitepaper Here.

The Dusk Network consists of three layers:

1 — DUSK Anonymous Network Layer

A gossip oriented communication tier inspired by I2P.

2 — Segregated Byzantine Agreement

A novel privacy-oriented consensus algorithm vastly more efficient than PoW or PoS. Powered by Proof of Blind Bid.

3 — Secure Tunnel Switching

A protocol allowing cryptocurrency payments for time-unbound and fast data transmission.



(Dusk Network’s three layers.)

We conceived the Dusk Network to be the first unrestricted and fully distributed communication network that does not compromise high data-rate transmission capabilities with the security and anonymity of its peers.

The system features a new consensus algorithm vastly more efficient than proof-of-work or proof-of-stake called Segregated Byzantine Agreement, and built on top of a low-latency gossip network which utilizes non-repliable datagram and garlic routing in order to prevent IP Address propagation.

Finally, the Dusk Network is complemented with an off-online file transfer mechanism and with realtime Dusk payment channel to enable undetectable and fast peer-to-peer data communication through a technique we call Secure Tunnel Switching.

Why Dusk?
The very existence of freedom of expression, access to cultural heritage, information pluralism and economic liberty depends on the availability of a mean of communication capable of guaranteeing uncontrolled exchange of information and messages.

The Dusk Network was conceived for this purpose: to provide its peers with an unsurveilled and unstoppable network infrastructure that grants them the possibility to communicate freely while safeguarding their identities.

Everything within Dusk Network is skewed toward decentralization, privacy and communication efficiency: from the anonymous transport layer which solves IP tracking to the Secure Tunnel Switching protocol which allows efficient data transmission paid for through a blockchain-based digital cash called DUSK.



Use Cases
The Dusk Network solves the problem of secure data transfer, low-latency transmissions and paying for time-unbound communications with cryptocurrencies. This enables a sweet spot between transparency and privacy, and enables the decentralization of:

  • Payments
  • Digital Asset Transfer (STO’s)
  • P2P Communication (Confidential Streaming)
This means that the Dusk Platform can function as an infrastructure for a decentralized service like Netflix, WhatsApp, YouTube, or a communication protocol for a drone fleet, a service where whistleblowers can safely communicate, a platform where cultural or political censorship is impossible, or the place where a business seeks to tokenize its equity without having to go through an arduous IPO process where the costs outweigh the benefits.

Conclusion
The Dusk Foundation is leading the R&D and delivery of the Dusk Network, a new blockchain that uses several technical advancements to deliver an ecosystem laser focused on providing the best trade off between privacy and transparency per use case.

Content Series
Learn more about the Dusk Network through one of our introductory series.

Dusk Network Intro Series
  • Dusk in a Nutshell
  • Anonymous Network Layer (TBA)
  • SBA* in a Nutshell (TBA)
  • Secure Tunnel Switching (TBA)

Privacy & Cryptography Intro Series
  • The Startup Dream; STO’s vs. ICO’s (TBA)
  • Privacy and Fungibility (TBA)
  • A brief introduction to cryptography in blockchain (TBA)

Dusk Foundation Intro Series
  • Introduction to the Dusk Foundation (TBA)
copper member
Activity: 474
Merit: 21
Another great article about DUSK!

"Dusk Foundation Launches the First Communication Network That Is Secured by Privacy-Oriented Cryptocurrency"

Read more Here!
copper member
Activity: 474
Merit: 21
Thanks everyone for your support! Make sure to join our Telegram channel to never miss out on any new developments (will also post here of course Smiley )
member
Activity: 266
Merit: 10
Great project, I'm Lucky to be a part of this project.
newbie
Activity: 224
Merit: 0
A serious project and a serious approach to implementation. The project can create a focal point in its field and change the whole market. I hope honesty and transparency will be shown not only in the early stages of your development. I join you!
newbie
Activity: 135
Merit: 0
This is a promising project. I participated in some of your bonuses. Hope for the success of your ICO. Thank you
newbie
Activity: 148
Merit: 0
ABSTRACT
In order to satisfy a broad set of data transfer scenario, the Dusk network adds an additional layer of security to the IP protocol suite (used mostly in a peer-to-peer fashion). Through the adoption of a mix of established strategies and novel techniques, the Dusk network has been conceived specifically to protect the privacy of the communicating peers from any form of eavesdropping while satisfying a variety of challenging use cases varying from fast communication (e.g. voice calls) to large data transfer (e.g. file transmission). Dusk circumvents the notorious unreliability of crowd-sourced infrastructures by embedding economic incentives into the core mechanism of the network itself. Such incentives are designed to encourage peers to partake in the network in a permission-less, anonymous and private fashion
Jump to: