Dagger renamed to Codex;

This commit is contained in:
Frederico Teixeira 2022-11-29 09:47:47 +01:00 committed by markspanbroek
parent 17bd2ded7e
commit 4e32d43787
1 changed files with 12 additions and 12 deletions

View File

@ -1,16 +1,16 @@
# Dagger project overview
# Codex project overview
> This documents outlines at a high level, what Dagger is; the problem it's attempting to solve and it's value proposition; as well as how it compares to similar solutions.
> This documents outlines at a high level, what Codex is; the problem it's attempting to solve and it's value proposition; as well as how it compares to similar solutions.
## Introduction
Peer to peer storage and file sharing networks have been around for quite a long time. They exhibit clear advantages in comparison to centralized storage providers such as scalability and robustness in the face of large scale network disruptions and have desirable censorship resistant properties. However, we've yet to see widespread adoption outside of a few niche applications.
Our intuition is that the lack of incentives, strong data availability, and persistence guarantees make these networks unsuitable for applications with moderate to high availability requirements. In other words, **without reliability at the storage layer it is impossible to build other reliable applications** on top of it. A more in depth overview of these observations can be found in the [incentives rationale](https://github.com/status-im/dagger-research/blob/main/incentives-rationale.md) document.
Our intuition is that the lack of incentives, strong data availability, and persistence guarantees make these networks unsuitable for applications with moderate to high availability requirements. In other words, **without reliability at the storage layer it is impossible to build other reliable applications** on top of it. A more in depth overview of these observations can be found in the [incentives rationale](https://github.com/status-im/codex-research/blob/main/incentives-rationale.md) document.
## Goals and Motivations
Dagger is our attempt at creating a decentralized storage engine that intends to improve on the state of the art by supplying:
Codex is our attempt at creating a decentralized storage engine that intends to improve on the state of the art by supplying:
- An incentivized p2p storage network with strong availability and persistence guarantees
- A resource restricted friendly protocol that can endure higher levels of churn and large amounts of ephemeral devices
@ -21,7 +21,7 @@ We follow the "less is more" principle and attempt to remove as much complexity
## High level network overview
Dagger consists of a p2p network of **storage, ephemeral, validator** and **regular** nodes.
Codex consists of a p2p network of **storage, ephemeral, validator** and **regular** nodes.
### Storage nodes
@ -39,7 +39,7 @@ Bandwidth incentives allow anyone to operate as an ephemeral node, profiting onl
### Regular nodes
Regular or client nodes, engage with other nodes to store, find and retrieve data from the network. Regular nodes constitute the lion share of the Dagger network and consume services offered by other nodes in exchange for payments. A regular node can also be an ephemeral node by caching previously consumed data that other nodes can retrieve from it. This allows nodes to offset some of the cost of participating in the network and it's expected to allow the majority of nodes to participate on an almost free basis after an initial entree fee - this last point is covered in more detail in a later section.
Regular or client nodes, engage with other nodes to store, find and retrieve data from the network. Regular nodes constitute the lion share of the Codex network and consume services offered by other nodes in exchange for payments. A regular node can also be an ephemeral node by caching previously consumed data that other nodes can retrieve from it. This allows nodes to offset some of the cost of participating in the network and it's expected to allow the majority of nodes to participate on an almost free basis after an initial entree fee - this last point is covered in more detail in a later section.
## Incentives structure
@ -91,7 +91,7 @@ Penalties and rewards allow verifying nodes to profit by monitoring and detectin
## Data availability and persistence
A core goal of the Dagger protocol is to enable data availability and persistence. In order to accomplish this, we rely on several complementary techniques:
A core goal of the Codex protocol is to enable data availability and persistence. In order to accomplish this, we rely on several complementary techniques:
- We use active verification to ensure data is available and retrievable
- We ensure that failures are detected and corrected early to prevent outages and keep previously agreed upon redundancy guarantees
@ -109,13 +109,13 @@ The main objective of the proofs are:
- Ensure that data is readily retrievable to prevent blackmailing and withholding attacks
## Interacting with the Dagger Network
## Interacting with the Codex Network
Any regular node that participates in the network needs to have an operational amount set aside in order to cover for bandwidth fees. This creates a barrier to entry however, we think it's a worthy tradeoff in order to maintain the security and health of the network. It's worth noting that any decentralized platform will have similar requirements and limitations. Bellow, we'll list some potential ways to workaround this in Dagger.
Any regular node that participates in the network needs to have an operational amount set aside in order to cover for bandwidth fees. This creates a barrier to entry however, we think it's a worthy tradeoff in order to maintain the security and health of the network. It's worth noting that any decentralized platform will have similar requirements and limitations. Bellow, we'll list some potential ways to workaround this in Codex.
### Subsidies or airdrops
Any application migrating or being built for a decentralized platform requires some operational capital to participate. Many projects workaround this by initially subsidizing potential users with small portions of their token. This are usually known as airdrops. Dagger can use a similar technique to allow first adopters to begin participating in the network.
Any application migrating or being built for a decentralized platform requires some operational capital to participate. Many projects workaround this by initially subsidizing potential users with small portions of their token. This are usually known as airdrops. Codex can use a similar technique to allow first adopters to begin participating in the network.
### Tit-for-tat settlements
@ -141,6 +141,6 @@ Any node can choose to provide services for free. Nodes can store and share arbi
## Closing Notes
To summarize, Dagger attempts to "untie the knot" of incentivized storage and allow many existing and future application to be built in a distributed manner. We're building Dagger to be reliable and predictable p2p storage infrastructure that will allow for many business and casual use cases. We accomplish data persistence and availability by introducing robust PoDP proofs which we supplement with error correction techniques. We use robust PoR schemes to prevent blackmailing and data withholding attacks and guarantee data is always retrievable. We provide reasonable workarounds to the "zero entry" problem without compromising the network's security.
To summarize, Codex attempts to "untie the knot" of incentivized storage and allow many existing and future application to be built in a distributed manner. We're building Codex to be reliable and predictable p2p storage infrastructure that will allow for many business and casual use cases. We accomplish data persistence and availability by introducing robust PoDP proofs which we supplement with error correction techniques. We use robust PoR schemes to prevent blackmailing and data withholding attacks and guarantee data is always retrievable. We provide reasonable workarounds to the "zero entry" problem without compromising the network's security.
Hopefully, this overview has clarified what Dagger is and what its main value proposition.
Hopefully, this overview has clarified what Codex is and what its main value proposition.