<<  >> (p.1965)
    Author Topic: NXT :: descendant of Bitcoin - Updated Information  (Read 2761752 times)
    chanc3r
    Sr. Member
    ****
    Offline Offline

    Activity: 952
    Merit: 253



    View Profile
    March 02, 2014, 11:02:20 AM
     #39281

    Not sure how one guy would be in charge of three INDEPENDENT gateways. This is what I have been saying. We need to find three different, independent, separate, not the same guy, gateway operators.

    That is not possible. You cannot formally prove that.

    In addition to my post about implementing a public audit website for gateways (don't know if that's useful)

    Can we limit risk also by limiting the volume of assets traded per gateway cluster - forcing the addition of gateways to process more (a risk based limit rather than a technical CPU/Network based limit) ?
    e.g. each gateway can provide trust for up to X million of an asset so the trading volume for that asset is NGateways*X, if the volume is higher then you would not be able to deposit though the gateway to AE

    This also means that someone knows if they run a gateway the volume is such that their node has to be involved and they will get some income and the existing gateway owners will want the additional node and will sign it into the cluster because they need the capacity.

    You still have 3 way voting but then its 3 way voting between N gateways, the voting should be pseudorandom as all gateways should trust all others and we can similarly monitor signing behaviour - each gateway block should be identifying which nodes sign. One suspicious pattern would be if there is a locked pattern of signing between 3 colluding nodes this would be picked up.

    The gateway block chain can be picked up from any of the nodes as it has to be common across all gateways doesn't it so they could not hide this signing patter which would be necessary to collude...

    So if you have 4,5,10 gateway operators the only way a fraud could be totally hidden would be if more and more people colluded unless of course someone acquires or is secretly all of these operators.

Page 1964
Viewing Page: 1965