SlideShare a Scribd company logo
1 of 41
Download to read offline
Curated Proof Markets &
Token-Curated Identities
in Ocean Protocol
Trent McConaghy
@trentmc0
#Data
#Incentives
Audio radar
1000x more data
The Unreasonable Effectiveness of Data
1000%
less
error!
Silo mo’ data
Mo’ accuracy
Mo’ $
Default incentive:
hoard the data
“Show me the incentive
and I will show you the outcome.”
-Charlie Munger
You can get people to do stuff
by rewarding them with tokens.
This is a superpower.
Change the
incentives!
Silo Pool mo’ data
Mo’ accuracy
Mo’ $
How to design?
Here’s a Process for Token Engineering
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing pattern. If needed, try different
formulations or solvers.
3. Design new pattern?
Patterns (Building Blocks) for Token Design
• Curation
• Stake machines, curation markets
• Curated proofs markets, TCRs
• Proofs
• Bitcoin puzzle solving, Filecoin PoST, Steemit human
• Data availability, more
• Identity
• Reputation
• Governance / software updates
• Third-party arbitration
• …
Patterns (Building Blocks) for Token Design
• Curation
• Stake machines, curation markets
• This talk: Curated proofs markets, TCRs
• Proofs
• Bitcoin puzzle solving, Filecoin PoST, Steemit human
• This talk: Data availability, more
• Identity
• Reputation
• Governance / software updates
• Third-party arbitration
• …
Curated
Proofs Markets:
Formulation
Objective: maximize supply of relevant data
• We convert this objective to block rewards.
• Then, how about this reward:
“Reward making relevant data available when asked”
• But: How to know what’s relevant? Algorithms capture this poorly.
• Solution: leave it to the crowd. Let them put their money where
their mouth is! (Staking)
• Revised reward:
“Reward curating data (staking on it) + making it available”
Objective: maximize supply of relevant data
• Reward curating data (staking on it) + making it available
• New pattern: curated proofs market
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Expected
reward for user
i on dataset j
Dj = proofed popularity
= # times made dataset
available
Sij = predicted popularity
= user’s curation market
stake in dataset j
# tokens
during
interval
From AI data to AI services
Motivations:
• Privacy, so compute on-premise or decentralized
• Data is heavy, so compute on-premise
• Link in emerging decentralized AI compute
Objective function: Maximize supply of relevant services
=reward curating services + proving that it was delivered
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
proofed popularity
of service
predicted popularity
of service
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Sij = expected popularity =
stake in dataset j
Key block #1:
Curation market
Dj = actual popularity = #
downloads
Key block #2:
Proof of availability
(All other blocks are ancillary to these blocks)
Proofs
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Sij = predicted popularity =
stake in dataset j
Key block #1:
Curation market
Dj = actual popularity = #
downloads
Key block #2:
Proof of availability
(All other blocks are ancillary to these blocks)
Proof of Data Availability
Approach A: FileCoin Proof of Space-Time (PoST), though
that’s overkill
Approach B: TrueBit-style challenge-response:
1. I serve data to you
2. If you don’t think you got it, you challenge (with stake)
1. Randomly choose two actors to vet
2. Actors vote on whether served
3. If they agree that I served it, you lose stake
4. If they agree that I didn’t serve it , I lose stake
5. Else
More Proofs
With more proofs, more services!
Blob data
Availability
AI compute
Privacy
compute
Generalized
Proofs
Inter-
Operability
*Note: logos shown are examples and do not imply partnerships or integrations
General
compute,
prediction
Structured
data
Availability
Token Curated
Registry (TCR)
First, some attack vectors
Some attack vectors
• Elsa & Anna Attack: Someone uploads popular content that
they don’t have rights to
• Data Escapes: People take data out of the system
• Curation Clones: Others create a new market for an existing
dataset
• Sybil Downloads: Someone (or a ring of buddies) downloads
a dataset they own >>1 times, to get >>rewards
How to approach?
Idea 1: network directly has legal arbitration
• Problem: it binds the network to jurisdictions (eek).
• Need to be permissionless and borderless!!
Idea 2: “sunny day tech, rainy day law”
• Core network itself has self-regulation by community.
Incentivize good acting. Zero sum  positive sum. 99% case.
• Higher levels can have arbitration tied to jurisdictions. 1% case
class TokenCuratedRegistry
def propose(data)
def challenge(proposal)
def vote(challenge)
TCR: a whitelist of good actors, curated by the actors themselves
New user B
proposes
for B to join 10 tokens
stake
by B
Existing user A
challenges
User status
A (Alice) “Challenger”
B (Bob) “New” +
“Proposed”
Mallory “OK”
Trent “OK”
10 tokens
stake
by A
class TokenCuratedRegistry
def propose(data)
def challenge(proposal)
def vote(challenge)
TCR: a whitelist of good actors, curated by the actors themselves
New user B
proposes
for B to join 10 tokens
stake
by B
Existing user A
challenges
User status
A (Alice) “Challenger”
B (Bob) “New” +
“Proposed”
Mallory “OK”
Trent “OK”
10 tokens
stake
by A
Concern:
High friction onboarding
7-28 day waiting period
class TokenCuratedRegistry
def vouch(data)
def challenge(proposal)
def vote(challenge)
TCR: a whitelist of good actors
“Trust is risk” for low-friction onboarding: vouch for others
Existing user
A vouches
for new user
B to join
10 tokens
stake by A,
B can run
away with it
anytime
User status
A (Alice) “Vouches”
B (Bob) “New”
Mallory “OK”
Trent “OK”
Some attack vectors
• Data Escapes: People take data out of the system
• Curation Clones: Others create a new market for an existing
dataset
• Elsa & Anna Attack: Someone uploads popular content that
they don’t have rights to
• Sybil Downloads: Someone (or a ring of buddies) downloads
a dataset they own >>1 times, to get >>rewards
Walk Through
Conclusion
AI  Data silos  data crisis.
Trent McConaghy
@trentmc0
A thoughtful token design
has thoughtful building blocks.
For Ocean, this includes:
• Curated Proofs Markets (CPMs)
• Token Curated Registry

More Related Content

What's hot

Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsTrent McConaghy
 
Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolTrent McConaghy
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainTrent McConaghy
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainTrent McConaghy
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolTrent McConaghy
 
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...
DN 2017 |  A New Data Economy with Power  to the People | Trent McConaghy | B...DN 2017 |  A New Data Economy with Power  to the People | Trent McConaghy | B...
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...Dataconomy Media
 
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen HamiltonDN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen HamiltonDataconomy Media
 
Big data analytics 1
Big data analytics 1Big data analytics 1
Big data analytics 1gauravsc36
 
Approximate "Now" is Better Than Accurate "Later"
Approximate "Now" is Better Than Accurate "Later"Approximate "Now" is Better Than Accurate "Later"
Approximate "Now" is Better Than Accurate "Later"NUS-ISS
 
Philosophy of Deep Learning
Philosophy of Deep LearningPhilosophy of Deep Learning
Philosophy of Deep LearningMelanie Swan
 
Building and Using a Knowledge Graph to Combat Human Trafficking
Building and Using a Knowledge Graph to Combat Human TraffickingBuilding and Using a Knowledge Graph to Combat Human Trafficking
Building and Using a Knowledge Graph to Combat Human TraffickingCraig Knoblock
 
A brief history of "big data"
A brief history of "big data"A brief history of "big data"
A brief history of "big data"Nicola Ferraro
 
A Big Data Timeline
A Big Data TimelineA Big Data Timeline
A Big Data TimelineBig Cloud
 

What's hot (15)

Towards an AI Commons
Towards an AI CommonsTowards an AI Commons
Towards an AI Commons
 
Ocean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data ScientistsOcean Protocol: New Powers for Data Scientists
Ocean Protocol: New Powers for Data Scientists
 
Energy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean ProtocolEnergy Data Access Management with Ocean Protocol
Energy Data Access Management with Ocean Protocol
 
Opportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in BlockchainOpportunities for Genetic Programming Researchers in Blockchain
Opportunities for Genetic Programming Researchers in Blockchain
 
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to BlockchainThe Evolution of Blue Ocean Databases, from SQL to Blockchain
The Evolution of Blue Ocean Databases, from SQL to Blockchain
 
The Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean ProtocolThe Web3 Data Economy: Ocean Protocol
The Web3 Data Economy: Ocean Protocol
 
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...
DN 2017 |  A New Data Economy with Power  to the People | Trent McConaghy | B...DN 2017 |  A New Data Economy with Power  to the People | Trent McConaghy | B...
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...
 
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen HamiltonDN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
 
Beyond Online PDFs
Beyond Online PDFs Beyond Online PDFs
Beyond Online PDFs
 
Big data analytics 1
Big data analytics 1Big data analytics 1
Big data analytics 1
 
Approximate "Now" is Better Than Accurate "Later"
Approximate "Now" is Better Than Accurate "Later"Approximate "Now" is Better Than Accurate "Later"
Approximate "Now" is Better Than Accurate "Later"
 
Philosophy of Deep Learning
Philosophy of Deep LearningPhilosophy of Deep Learning
Philosophy of Deep Learning
 
Building and Using a Knowledge Graph to Combat Human Trafficking
Building and Using a Knowledge Graph to Combat Human TraffickingBuilding and Using a Knowledge Graph to Combat Human Trafficking
Building and Using a Knowledge Graph to Combat Human Trafficking
 
A brief history of "big data"
A brief history of "big data"A brief history of "big data"
A brief history of "big data"
 
A Big Data Timeline
A Big Data TimelineA Big Data Timeline
A Big Data Timeline
 

Similar to Curated Proof Markets & Token-Curated Identities in Ocean Protocol

Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...blockchainexe
 
Proffer Blockchain Hackathon $17K+ prizes | Launch Presentation
Proffer Blockchain Hackathon $17K+ prizes | Launch PresentationProffer Blockchain Hackathon $17K+ prizes | Launch Presentation
Proffer Blockchain Hackathon $17K+ prizes | Launch PresentationAnshul Bhagi
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...CS, NcState
 
A search engine in a world of events and microservices - SF Pot @Meetic
A search engine in a world of events and microservices - SF Pot @MeeticA search engine in a world of events and microservices - SF Pot @Meetic
A search engine in a world of events and microservices - SF Pot @MeeticmeeticTech
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)Jae-Yun Kim
 
Blockchain the solution to internet voting
Blockchain the solution to internet votingBlockchain the solution to internet voting
Blockchain the solution to internet votingStanislaw Baranski
 
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUniteThe Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUniteMatt Lockyer
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInKrishnaram Kenthapadi
 
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03) Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03) Young Suk Ahn Park
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273Abutest
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273Abutest
 
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...Abhay Prakash
 
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...Edge AI and Vision Alliance
 
Token btlcoin btlcoin
Token btlcoin btlcoinToken btlcoin btlcoin
Token btlcoin btlcoinbtlcoin token
 
Portfolio_JenniHawk
Portfolio_JenniHawkPortfolio_JenniHawk
Portfolio_JenniHawkJenniHawk
 
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Alexandre Sieira
 
Mining social data
Mining social dataMining social data
Mining social dataMalk Zameth
 

Similar to Curated Proof Markets & Token-Curated Identities in Ocean Protocol (20)

How to verify computation in the blink of an eye
How to verify computation in the blink of an eyeHow to verify computation in the blink of an eye
How to verify computation in the blink of an eye
 
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
 
Proffer Blockchain Hackathon $17K+ prizes | Launch Presentation
Proffer Blockchain Hackathon $17K+ prizes | Launch PresentationProffer Blockchain Hackathon $17K+ prizes | Launch Presentation
Proffer Blockchain Hackathon $17K+ prizes | Launch Presentation
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
 
A search engine in a world of events and microservices - SF Pot @Meetic
A search engine in a world of events and microservices - SF Pot @MeeticA search engine in a world of events and microservices - SF Pot @Meetic
A search engine in a world of events and microservices - SF Pot @Meetic
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
Blockchain the solution to internet voting
Blockchain the solution to internet votingBlockchain the solution to internet voting
Blockchain the solution to internet voting
 
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUniteThe Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedIn
 
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03) Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
Blockchain 101, Enabler of Cryptocurrencies - v1.0en (2021/03)
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273A
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273A
 
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
IJCAI 2015 Presentation: Did you know?- Mining Interesting Trivia for Entitie...
 
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
“Reinforcement Learning: a Practical Introduction,” a Presentation from Micro...
 
Bot or Not
Bot or NotBot or Not
Bot or Not
 
BDACA1516s2 - Lecture7
BDACA1516s2 - Lecture7BDACA1516s2 - Lecture7
BDACA1516s2 - Lecture7
 
Token btlcoin btlcoin
Token btlcoin btlcoinToken btlcoin btlcoin
Token btlcoin btlcoin
 
Portfolio_JenniHawk
Portfolio_JenniHawkPortfolio_JenniHawk
Portfolio_JenniHawk
 
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
 
Mining social data
Mining social dataMining social data
Mining social data
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Curated Proof Markets & Token-Curated Identities in Ocean Protocol

  • 1. Curated Proof Markets & Token-Curated Identities in Ocean Protocol Trent McConaghy @trentmc0
  • 4. 1000x more data The Unreasonable Effectiveness of Data 1000% less error!
  • 5. Silo mo’ data Mo’ accuracy Mo’ $ Default incentive: hoard the data
  • 6. “Show me the incentive and I will show you the outcome.” -Charlie Munger
  • 7. You can get people to do stuff by rewarding them with tokens. This is a superpower.
  • 8. Change the incentives! Silo Pool mo’ data Mo’ accuracy Mo’ $
  • 9. How to design? Here’s a Process for Token Engineering 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing pattern. If needed, try different formulations or solvers. 3. Design new pattern?
  • 10. Patterns (Building Blocks) for Token Design • Curation • Stake machines, curation markets • Curated proofs markets, TCRs • Proofs • Bitcoin puzzle solving, Filecoin PoST, Steemit human • Data availability, more • Identity • Reputation • Governance / software updates • Third-party arbitration • …
  • 11. Patterns (Building Blocks) for Token Design • Curation • Stake machines, curation markets • This talk: Curated proofs markets, TCRs • Proofs • Bitcoin puzzle solving, Filecoin PoST, Steemit human • This talk: Data availability, more • Identity • Reputation • Governance / software updates • Third-party arbitration • …
  • 13. Objective: maximize supply of relevant data • We convert this objective to block rewards. • Then, how about this reward: “Reward making relevant data available when asked” • But: How to know what’s relevant? Algorithms capture this poorly. • Solution: leave it to the crowd. Let them put their money where their mouth is! (Staking) • Revised reward: “Reward curating data (staking on it) + making it available”
  • 14. Objective: maximize supply of relevant data • Reward curating data (staking on it) + making it available • New pattern: curated proofs market E(Rij) α log10(Sij) * log10(Dj) * T *Ri Expected reward for user i on dataset j Dj = proofed popularity = # times made dataset available Sij = predicted popularity = user’s curation market stake in dataset j # tokens during interval
  • 15. From AI data to AI services Motivations: • Privacy, so compute on-premise or decentralized • Data is heavy, so compute on-premise • Link in emerging decentralized AI compute Objective function: Maximize supply of relevant services =reward curating services + proving that it was delivered E(Rij) α log10(Sij) * log10(Dj) * T *Ri proofed popularity of service predicted popularity of service
  • 16. E(Rij) α log10(Sij) * log10(Dj) * T *Ri Sij = expected popularity = stake in dataset j Key block #1: Curation market Dj = actual popularity = # downloads Key block #2: Proof of availability (All other blocks are ancillary to these blocks)
  • 18. E(Rij) α log10(Sij) * log10(Dj) * T *Ri Sij = predicted popularity = stake in dataset j Key block #1: Curation market Dj = actual popularity = # downloads Key block #2: Proof of availability (All other blocks are ancillary to these blocks)
  • 19. Proof of Data Availability Approach A: FileCoin Proof of Space-Time (PoST), though that’s overkill Approach B: TrueBit-style challenge-response: 1. I serve data to you 2. If you don’t think you got it, you challenge (with stake) 1. Randomly choose two actors to vet 2. Actors vote on whether served 3. If they agree that I served it, you lose stake 4. If they agree that I didn’t serve it , I lose stake 5. Else
  • 21. With more proofs, more services! Blob data Availability AI compute Privacy compute Generalized Proofs Inter- Operability *Note: logos shown are examples and do not imply partnerships or integrations General compute, prediction Structured data Availability
  • 24.
  • 25. Some attack vectors • Elsa & Anna Attack: Someone uploads popular content that they don’t have rights to • Data Escapes: People take data out of the system • Curation Clones: Others create a new market for an existing dataset • Sybil Downloads: Someone (or a ring of buddies) downloads a dataset they own >>1 times, to get >>rewards
  • 26. How to approach? Idea 1: network directly has legal arbitration • Problem: it binds the network to jurisdictions (eek). • Need to be permissionless and borderless!! Idea 2: “sunny day tech, rainy day law” • Core network itself has self-regulation by community. Incentivize good acting. Zero sum  positive sum. 99% case. • Higher levels can have arbitration tied to jurisdictions. 1% case
  • 27. class TokenCuratedRegistry def propose(data) def challenge(proposal) def vote(challenge) TCR: a whitelist of good actors, curated by the actors themselves New user B proposes for B to join 10 tokens stake by B Existing user A challenges User status A (Alice) “Challenger” B (Bob) “New” + “Proposed” Mallory “OK” Trent “OK” 10 tokens stake by A
  • 28. class TokenCuratedRegistry def propose(data) def challenge(proposal) def vote(challenge) TCR: a whitelist of good actors, curated by the actors themselves New user B proposes for B to join 10 tokens stake by B Existing user A challenges User status A (Alice) “Challenger” B (Bob) “New” + “Proposed” Mallory “OK” Trent “OK” 10 tokens stake by A Concern: High friction onboarding 7-28 day waiting period
  • 29. class TokenCuratedRegistry def vouch(data) def challenge(proposal) def vote(challenge) TCR: a whitelist of good actors “Trust is risk” for low-friction onboarding: vouch for others Existing user A vouches for new user B to join 10 tokens stake by A, B can run away with it anytime User status A (Alice) “Vouches” B (Bob) “New” Mallory “OK” Trent “OK”
  • 30. Some attack vectors • Data Escapes: People take data out of the system • Curation Clones: Others create a new market for an existing dataset • Elsa & Anna Attack: Someone uploads popular content that they don’t have rights to • Sybil Downloads: Someone (or a ring of buddies) downloads a dataset they own >>1 times, to get >>rewards
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 41. AI  Data silos  data crisis. Trent McConaghy @trentmc0 A thoughtful token design has thoughtful building blocks. For Ocean, this includes: • Curated Proofs Markets (CPMs) • Token Curated Registry