Authmen AMA in CryptoPHD community

Authmen
5 min readJan 29, 2021

Last night, Authmen was invited to have an AMA in CryptoPHD group. Samir, Authmen community volunteer leads, attended this AMA to introduce Authmen and Authmen liquidity mining to the group members.

The following is the recap of this AMA:

@TXinchun

#Authmen#CryptoPHD How is Authmen different from other decentralized storage projects?

Good question. As we all know, the decentralized storage market will be super huge in the future. At present, there are also many projects on the market. So it’s important to understand the differences between these projects.

According to the implementation logic, the projects represented by Filecoin, Arweave and Crust can be divided into the incentive layer of content-based file sharing network, while the projects represented by Sia and Storj are more inclined to share their hard disk space through incentive token.

Authmen is similar to other decentralized storage projects in that the server is controlled by non centralized service providers, which completely avoids the adverse impact of local interruption and denial of service attacks on stored files.In addition, users of these distributed storage projects can host files in a decentralized way, which can provide more relaxed storage services on the premise of ensuring file security.

Authmen pays more attention to the node’s trustworthiness, and is committed to building a trusted blockchain storage protocol.

Since distributed storage mainly depends on decentralized nodes, storage proof consensus algorithm is needed for spatial consensus. If the consensus algorithm is missing, it can not make other nodes trust, and can not solve the problems of whether the space of a node is enough to store data, whether the stored files or copies have been lost. By relying on the trusted technology of Trias to calculate the high-quality nodes, the Authmen network not only realizes efficient consensus, but also avoids the influence of human interference on DPOS, and increases the transparency and fairness of the system.

Let me introduce the advantages of Authmen:

Transparency: the storage mechanism is open and transparent.

2. Fairness: the workload and reward calculation of work nodes are protected by TEE, and the nodes need not worry that their workload will not be rewarded, and they can not get extra rewards through cheating.

3. Efficiency: the proof of storage capacity does not require the challenge of large amount of redundancy, nor does it need to store any meaningless data. Both computing and storage resources can be efficiently utilized.

4. Scalability: TEE supports complete computing, and has the potential of continuous development. Authmen ecosystem can achieve more powerful functions to ensure the development of evolution from storage consensus to computing consensus.

@Lucy31122738

In addition to mining rewards, data on the Authmen network can also bring value to us. Can you explain it in detail?

Data on the Authmen network can also bring value to users. It means users can manage, authorize and delete data through confidentiality contracts. Authmen will also provide a trading market where users can make a profit by collecting their own data. The demander will pay auth as the reward for using network resources and source data, while auth will pay the user who provides source data auth as the reward for providing data, and the miner will get auth as the reward for providing computing power. Both data miners and computational miners can get long-term benefits in the Authmen network.

In addition, we introduced NFT into Authmen ecology. Authmen NFT can exchange the actual storage space after the Authmen platform goes online and has the same liquidity as digital currency. Users who hold Authmen NFT can trade freely in NFT market. Users can also obtain liquid cash by pledging their Authmen NFT, which makes the use of funds more flexible.

@Crypto_OlaB

The biggest difference between Authmen and other NFT projects is that Authmen can quickly attract users by combining the elements of DeFi and adding usage scenarios to NFT. Why do you design it and what benefits it can bring us?

Authmen innovatively introduces NFT into liquidity mining. Users can mine in the mine pool through their own Authmen NFTs to obtain AUTH tokens. Different levels of NFTs have different mining efficiency.

Authmen NFT is a kind of computational NFT with actual storage as endorsement and cast by ERC-1155 standard. Users can obtain Authmen NFT by consuming AUTH, and destroy low-level NFT to obtain higher-level NFTs, so as to obtain more computing power and storage capacity.

Now Authmen liquiidty mining has officially started. Check out Authmen liquidity mining website to know more: app.auth.men

And here is a step by step tutorial for Authmen liquidity mining: https://authmen.medium.com/how-to-participate-in-authmen-liquidity-mining-4973d8e4cbc2

@whuzeng12

For any Crypto and blockchain projects and platforms. Security, scalability and interoperability are the most important factors. So, can you explain what technologies Authmen uses in its project to make union safe, extensible and interoperable?

Authmen adopts the three-layer computing power system based on Leviatom in Trias architecture, and the combination of TEE trusted computing and zero knowledge proof technology to complete the right confirmation and security protection of distributed storage data.

The trusted network constructed by Leviatom layer of Trias maintains a unique white list for each storage node, which can prevent the loading of abnormal programs and effectively block network security attacks. At the same time, HCGraph is a trusted computing technology based on heterogeneous TEE. With the help of Gossip protocol, a “trusted acquaintance” network is constructed between consensus nodes using different TEE technologies, and a “conspiracy default” model of global nodes is constructed to locate trusted nodes efficiently, which makes consensus more efficient and cost-effective.

At the same time, the TEE technology of Trias does not rely on a single category of hardware, so it has stronger compatibility. The use of TEE technology can verify and protect the whole life cycle of the computer running environment on the basis of the — 1 layer of the hardware root. At the same time, under the TEE security defense model of Trias, it becomes a new incentive oriented security model, which allows the defender to actively contribute the defense nodes and computing power of TEE, and get the corresponding advantage economic stimulation according to the defense contribution provided in the Trias security network. Through the trusted computing of Trias, multi-party, remote and heterogeneous data storage, sharing and computing can be realized under the premise of maintaining data ownership and privacy.

Through trusted computing, Authmen enables different TEE protocols to collect the latest status of neighboring nodes, check and record historical information, and propagate the results among other nodes through gossip protocol, and form a reputation network. It repeatedly selects “the most difficult point to lie” as its repeated function contract presentation, forming a robust and efficient running environment, and building a trusted computing based environment based on the blockchain distributed storage security network.

--

--