Knoqnoq Forum: Everything You Want to Discuss, Most Discussed in India
Search
Reply: 4

The basic operating mode of DePIN.

[Copy link]

849

Threads

337

Posts

110K

Credits

Forum Veteran

Rank: 8Rank: 8

Credits
13671
Post time 26-3-2024 23:40:23 | Show all posts |Read mode
In most DePIN projects' incentive schemes, operators of hardware devices provide services externally and use this as leverage to claim rewards from the incentive system. For example, in Helium, network hotspots earn HNT rewards by providing signal coverage. However, before receiving incentives from the system, DePIN devices need to present evidence to prove that they have indeed exerted a certain "effort" as required.

Such evidence, used to prove that one has provided certain services or engaged in certain activities in the real world, is known as Proof of Physical Work (PoPW). In the protocol design of DePIN projects, physical work proof plays a crucial role, and various attack scenarios and corresponding countermeasures exist accordingly.

DePIN projects rely on blockchain to distribute incentives and allocate tokens. Similar to the public-private key system in traditional public chains, the identity verification process of DePIN devices also requires the use of public and private keys. The private key is used to generate and sign "physical work proofs," while the public key is used by the outside world to verify these proofs or serve as the identity tag (Device ID) of the hardware device.

In addition, it is not convenient to directly receive token rewards at the device's on-chain address. Therefore, DePIN projects often deploy a smart contract on-chain, which records the on-chain account addresses of different device holders, similar to a one-to-one or one-to-many relationship in a database. With this approach, the token rewards that off-chain physical devices should receive can be directly sent to the on-chain accounts of the device holders.

In the field of DePIN, anti-sybil can be attributed to "raising the cost of generating physical work proofs." Since the generation of physical work proofs depends on valid device identity information (private keys), simply raising the cost of obtaining identity information can prevent certain low-cost cheating behaviors that generate a large number of work proofs.

To achieve the above goals, a relatively effective solution is to allow DePIN device manufacturers to monopolize the generation permission of identity information, customize the devices, and input unique identity tags for each device. This is similar to having a government agency record the identity information of all citizens, and only those whose information can be found in the government agency's database are eligible to receive government subsidies.
Reply

Use magic Report

33

Threads

874

Posts

3909

Credits

Forum Veteran

Rank: 8Rank: 8

Credits
3909
Post time 27-3-2024 08:05:44 | Show all posts
The working mode is something worth exploring.
Reply

Use magic Report

58

Threads

1180

Posts

4469

Credits

Forum Veteran

Rank: 8Rank: 8

Credits
4469
Post time 27-3-2024 08:06:55 | Show all posts
It's important to understand the basic working mode here.
Reply

Use magic Report

305

Threads

1154

Posts

9841

Credits

Forum Veteran

Rank: 8Rank: 8

Credits
9841
Post time 27-3-2024 10:47:25 | Show all posts
The working mode of such things is too specialized.
Reply

Use magic Report

270

Threads

1658

Posts

110K

Credits

Forum Veteran

Rank: 8Rank: 8

Credits
10093
Post time 27-3-2024 10:47:26 | Show all posts
It's quite professional indeed.
Reply

Use magic Report

You have to log in before you can reply Login | Register

Points Rules

Quick Reply To Top Return to the list