{"id":8691,"date":"2020-04-21T22:19:17","date_gmt":"2020-04-21T19:19:17","guid":{"rendered":"https:\/\/forklog.media\/?p=8691"},"modified":"2020-04-22T21:25:00","modified_gmt":"2020-04-22T18:25:00","slug":"what-holds-real-decentralization-back","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/what-holds-real-decentralization-back\/","title":{"rendered":"What Holds Real Decentralization Back"},"content":{"rendered":"<p><a href=\"https:\/\/www.facebook.com\/menaskop\">Vladimir Popov<\/a>, the founder of Synergis who had co-authored a <a href=\"https:\/\/books.google.com.ua\/books?id=WE3YDwAAQBAJ&amp;lpg=PP1&amp;ots=T7Po8cKtL3&amp;dq=Web%203.0.%20%D0%9D%D0%B0%D1%81%D1%82%D0%BE%D1%8F%D1%89%D0%B5%D0%B5%20%D0%B2%D1%87%D0%B5%D1%80%D0%B0%D1%88%D0%BD%D0%B5%D0%B3%D0%BE%20%D0%B7%D0%B0%D0%B2%D1%82%D1%80%D0%B0&amp;pg=PT2#v=onepage&amp;q=Web%203.0.%20%D0%9D%D0%B0%D1%81%D1%82%D0%BE%D1%8F%D1%89%D0%B5%D0%B5%20%D0%B2%D1%87%D0%B5%D1%80%D0%B0%D1%88%D0%BD%D0%B5%D0%B3%D0%BE%20%D0%B7%D0%B0%D0%B2%D1%82%D1%80%D0%B0&amp;f=false\">book<\/a> about Web 3.0, highlighted the principal problems of DPoS and LPoS algorithms, explained flaws in their architecture, and hypothesized about decentralized networks of the future. This is an adaptation of the original Russian-language <a href=\"https:\/\/forklog.com\/kosmicheskie-rakety-i-algoritmy-ili-chto-uderzhivaet-detsentralizatsiyu-v-zachatochnom-sostoyanii\/\">article<\/a> Vladimir wrote exclusively for ForkLog.<\/p>\n<p><!--more--><\/p>\n<h2>Concentration of Wealth<\/h2>\n<p>Many people still think that blockchain is about trust, although it was actually created with the goal of building a trustless environment in mind.<\/p>\n<p>The latest version of the Cardano client <a href=\"https:\/\/iohk.io\/en\/blog\/posts\/2020\/03\/23\/from-classic-to-hydra-the-implementations-of-ouroboros-explained\/\">does<\/a> certain things only if there are enough honest participants. What if there isn\u2019t? What if somebody wants to take over the system, no matter how expensive it is?<\/p>\n<p>Things like this have happened even within blockchain communities: EOS whales were <a href=\"https:\/\/www.reddit.com\/r\/ethereum\/comments\/8z2gor\/its_now_clear_eos_is_behind_sybil_attack_on\/\">attacking<\/a> Ethereum, Justin Sun <a href=\"https:\/\/forklog.com\/en\/to-the-coup-and-back-story-behind-steemit-communitys-failed-revolt\/\">tried<\/a> to take over Steem through Steemit, and so on.<\/p>\n<p>In my opinion, it can lead to grim consequences given the exponential growth. Currently, the cryptocurrency market is small, so it\u2019s about time to polish security at the <a href=\"https:\/\/en.wikipedia.org\/wiki\/OSI_model#Layer_architecture\">architecture level<\/a>.<\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/image2-88-e1587449962443.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8693 size-full\" src=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/image2-88-e1587449962443.png\" alt=\"The share of assets owned by the top 10 addresses in Bitcoin and Cardano\" width=\"819\" height=\"435\" srcset=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/image2-88-e1587449962443.png 819w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/image2-88-e1587449962443-300x159.png 300w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/image2-88-e1587449962443-768x408.png 768w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/image2-88-e1587449962443-470x250.png 470w\" sizes=\"auto, (max-width: 819px) 100vw, 819px\" \/><\/a><\/p>\n<p><i>The share of assets owned by the top 10 addresses in Bitcoin and Cardano<\/i><\/p>\n<p>Here is Cardano\u2019s <a href=\"https:\/\/adascan.net\/rich-list\/\">33.05%<\/a> against Bitcoin\u2019s 5.61%.<\/p>\n<p>Protection from the 51% attack has to do with the top 10, 20, 30, or so addresses. This is particularly prominent in <a href=\"https:\/\/eosflare.io\/whales\">EOS<\/a>.<\/p>\n<p>Of course, metrics like total supply, levels of network decentralization or distribution across nodes, number of users, etc. should be taken into account. But it doesn\u2019t change the nature of the problem.<\/p>\n<p>Another even more complicated fundamental question is the importance of considering different aspects of decentralization when building decentralized social networks.<\/p>\n<h2>Hard and Soft<\/h2>\n<p>If a cryptocurrency isn\u2019t prone to the 51% attack, it is centralized. The same goes for <a href=\"https:\/\/en.wikipedia.org\/wiki\/Sybil_attack\">Sybil attacks<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">This is a thought-provoking observation. \ud83e\udd14<\/p>\n<p>By definition, a decentralized cryptocurrency must be susceptible to 51% attacks whether by hashrate, stake, and\/or other permissionlessly-acquirable resources.<\/p>\n<p>If a crypto can&#39;t be 51% attacked, it is permissioned and centralized. <a href=\"https:\/\/t.co\/LRCVj5F0O1\">https:\/\/t.co\/LRCVj5F0O1<\/a><\/p>\n<p>&mdash; Charlie Lee \u24c2\ufe0f\ud83d\udd78\ufe0f (@SatoshiLite) <a href=\"https:\/\/twitter.com\/SatoshiLite\/status\/1082491687169998848?ref_src=twsrc%5Etfw\">January 8, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Despite the fact that blockchain can be instrumental in eliminating the threat of Sybil attacks on p2p networks (TOR-net, i2p, torrent networks, etc.), it remains vulnerable to such attacks itself.<\/p>\n<p>PoS projects always reach the conclusion that today there can be about a thousand of supernodes or other similar units. There are 21 block producers in EOS with 72 on the waiting list, there are 100 validators in Cosmos, and so on.<\/p>\n<p>Under normal conditions, these few may be more effective than hundreds of thousands of miners or tens of thousands of full nodes. But the work isn\u2019t always normal and stable, the system isn\u2019t always protected. This is the basis for Nassim Taleb\u2019s black swan and antifragility theories. It works equally well in medicine, education, and technology.<\/p>\n<p>What if the network throughput, as it is represented in many DPoS and LPoS systems, will deviate to an extent greater than the one accounted for by the protocol? What if Facebook with its half a million servers would migrate to EOS, Cosmos, Cardano, or Ethereum? Would any p2p network hold up to such load?<\/p>\n<p>We\u2019ve already seen how networks failed not because of problems with architecture, but because of <a href=\"https:\/\/twitter.com\/eosnewyork\/status\/1015819381425758208\">trivial hardware bugs<\/a>. In the case of Ripple and Moneygram, the load can be <a href=\"https:\/\/xrpcharts.ripple.com\/#\/metrics\">monitored online<\/a>.<\/p>\n<p>Studying the cases, I\u2019ve come to a simple but bitter conclusion: we are still hoping that maths will prevail over the real physical world. This isn\u2019t the case. What do Facebook and Telegram do to scale further when the software is at its limits? They buy hardware and \u201cexpand\u201d the network capabilities that way.<\/p>\n<h2>What About P2P?<\/h2>\n<p>First of all, there are no cheap servers and the problems left unsolved by Golem and others will be coming back. Among those, dealing with high latency, which is extremely important for decentralized social networks (DSN), and replacing failed hardware are top priorities.<\/p>\n<p>Then, even if everything goes as planned, the approval from \u2154 of the voters will be needed. It will take time. If there is no approval, ideological problems arise.<\/p>\n<p>Finally, all of the available solutions (moving to the Dapp level, introducing sidechains, etc.) have their own problems with centralization and trust. This diverges from the trustless environment blockchain is meant for.<\/p>\n<p>Problems with hardware are related to the software-based limit on network effectiveness and the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Network_effect\">network effect<\/a> coefficient. According to Metcalfe\u2019s law, \u201cthe effect of a telecommunications network is proportional to the square of the number of connected users of the system.\u201d Therefore, the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Network_effect\">network effect<\/a> coefficient is exponential and all the related problems will eventually explode.<\/p>\n<p>The problem gets more complicated when all levels of decentralization and distribution are considered in terms of:<\/p>\n<ul>\n<li>the number of users<\/li>\n<li>their ownership shares<\/li>\n<li>nodes<\/li>\n<li>miners<\/li>\n<li>developers.<\/li>\n<\/ul>\n<p>Let\u2019s take the numbers similar to those of the Bitcoin network:<\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/Group-237-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8692 size-large\" src=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/Group-237-2-1024x150.jpg\" alt=\"What Holds Real Decentralization Back\" width=\"1024\" height=\"150\" srcset=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/Group-237-2-1024x150.jpg 1024w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/Group-237-2-300x44.jpg 300w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/Group-237-2-768x112.jpg 768w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/Group-237-2-1536x225.jpg 1536w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/Group-237-2-2048x300.jpg 2048w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/04\/Group-237-2-470x69.jpg 470w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>It is apparent that an attack aimed at mining pools isn\u2019t a good idea, considering the mining difficulty and the prices for S17+ and S19. Looking for bugs akin to the epic bug in The DAO would be more reasonable. The weakest link is the centralized solutions that use p2p networks to profit.<\/p>\n<p>Another way is not to destroy, but to harness the resource, whether it\u2019s a mining malware or <a href=\"https:\/\/www.trustnodes.com\/2019\/01\/21\/virus-targeting-bitcoin-miners-spreading-in-china\">ransomware<\/a> targeting ASIC operators.<\/p>\n<p>In this regard having more tokens has a positive effect on the capabilities of a decentralized or a distributed network.<\/p>\n<p>Atomic swaps, decentralized applications, and sidechains all aim to increase the general stability and interconnection.<\/p>\n<h2>Supernode Hypothesis and Advantages of Thinking In Advance<\/h2>\n<p>In some blockchains like Bitcoin, Ethereum, and their forks, any user can set up a full node and check everything themselves. In this case, there are protection mechanisms like <a href=\"https:\/\/eprint.iacr.org\/2019\/1440.pdf\">Winkle<\/a>, which is a second-level client-driven validation where each client adds the hash of the previous block to the transaction they sign.<\/p>\n<p>If a regular user can\u2019t do it, they have to trust supernodes. In this case, you won\u2019t be needing 51% to pull off a destructive Sybil attack on the system, but much less.<\/p>\n<p>The number of attacks will never be infinite, but it will be inversely proportional to the number of supernodes.<\/p>\n<p>This scenario with compromised supernodes aiming to harm the system may look too far-fetched, but there are real examples to look at:<\/p>\n<ul>\n<li>The first computer viruses weren\u2019t making any profit but were disrupting all sorts of systems. Simply because some people wanted to test their skills in creating something \u201cliving.\u201d<\/li>\n<li>At the peak of the ICO hype, about 10% of the offerings were getting hacked. Except for a few cases of exploiting bugs and vulnerabilities of the blockchain, most attacks involved hacking the administrator\u2019s computer, phishing, social engineering, etc.<\/li>\n<\/ul>\n<p>It is quite possible to attack sophisticated high-tech systems through promotive ones.<\/p>\n<p>Here lies the main problem with building decentralized networks: we see a node as something abstract, while it is still a PC sitting somewhere or even a virtual server running the software, which is how between 25% and 60% of all Ethereum nodes <a href=\"https:\/\/thenextweb.com\/hardfork\/2019\/09\/23\/ethereum-nodes-cloud-services-amazon-web-services-blockchain-hosted-decentralization\/\">work<\/a>. We talk about buying out, reserving, or leasing a share of the network capacity forgetting about the limitation and discrepancies at the <a href=\"https:\/\/thenextweb.com\/hardfork\/2019\/09\/23\/ethereum-nodes-cloud-services-amazon-web-services-blockchain-hosted-decentralization\/\">physical level<\/a>.<\/p>\n<p>Therefore we get the next conclusion. In PoW systems the hardware-based scaling is built-in algorithmically in a form of mining difficulty. Although new ASICs and GPUs aren\u2019t directly influencing the number of nodes, nobody would create a large pool without setting up full nodes, so the correlation is direct. In DPoS and LPoS systems, this ratio relies on trust and is a vulnerable aspect of such networks and a debated topic.<\/p>\n<p>This leads to the notion that the next step of decentralization is to make supernodes and regular users as equal as possible. Have a smartphone? You can be a miner, a node, a validator, an oracle, etc.<\/p>\n<p>Meanwhile, I am still confident that such a transition will only work if the paradigm changes from subjective to transactional reputation: you did something useful, you get a rating. Passports, biometric verification, and similar things look more like digital slavery than an increase in the extent of decentralization.<\/p>\n<p>To model the future of DSN, we have to understand that PoW and PoS have architectural limits on the extent to which they can be decentralized.<\/p>\n<p>While on the transport, session, presentation, and application levels of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/OSI_model#Layer_architecture\">OSI model<\/a> things are progressing, there are lots of questions related to the physical, channel, and network levels. This means that the main problem remains: there\u2019s a killswitch allowing governments, internet providers, etc. to technically kill our access to the lower node, pool, and so on. Wi-Fi, 5G, and mesh-networks give only conceptual solutions and there aren\u2019t many actual implementations.<\/p>\n<p><b>Follow us on\u00a0<\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b>\u00a0and\u00a0<\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b>\u00a0and join our\u00a0<\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b>\u00a0to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vladimir Popov, the founder of Synergis who had co-authored a book about Web 3.0, highlighted the principal problems of DPoS and LPoS algorithms, explained flaws in their architecture, and hypothesized about decentralized networks of the future. This is an adaptation of the original Russian-language article Vladimir wrote exclusively for ForkLog.<\/p>\n","protected":false},"author":6,"featured_media":8694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[198],"tags":[275,130,1085,535],"class_list":["post-8691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-opinion","tag-consensus","tag-decentralization","tag-dpos","tag-pos"],"aioseo_notices":[],"amp_enabled":true,"views":"1086","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=8691"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8691\/revisions"}],"predecessor-version":[{"id":8696,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8691\/revisions\/8696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/8694"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=8691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=8691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=8691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}