Q & A Community AMA of August 14th - The Summary
If you have any other exciting technical questions about Enigma, the team is looking forward to answer your questions. Here you have the possibility to create a thread for it. Developer Forum: https://forum.enigma.co/
Now you can find the questions answered by the team about our last AMA of August 14th.
If anything else changes, I'll update it. 1. Q: How many devs do you plan to hire by 2020? by Quant
A: At this point, we have an exceptional, tightly-knit team working at Enigma. We’ve worked really hard to find truly exceptional talent, and our goal is to continue this way. Our strategy going forward is not to hire for quantity, but rather for quality. We’re constantly looking for talent at the same caliber, and we are okay with having part-time trial periods with some of the candidates (to ensure they are a good fit).
Also, now that the protocol is out on testnet and the code is open, we encourage people to try and contribute to our codebase. That’s the surest way to get our attention and become involved. by Guy Zyskind 2. Q: Will SputnikVM support other EVM languages besides Solidity? by Professional-Kiwi
A: SputnikVM is an implementation of EVM, which means that SputnikVM supports any language that compiles to EVM bytecode. Our implementation around SputnikVM indeed targeted for Solidity ABI. We are not considering other EVM languages, but we are considering working with WebAssembly contracts. Some advantages of WebAssembly are:
3. Q: Could security vulnerabilities in Intel hardware compromise Enigma data? by Zed
- WASM is a compilation target for existing high-level programming languages like C++ or Rust
- WASM is becoming the virtual machine of choice for blockchains going forward
- EVM words are 256 bits, and do not map efficiently to 32/64 bit architectures by moria
A: Everything is possible in a rapidly moving environment, that said, we are building our architecture using severalsecurity layers that do not rely on a single point of failure in order to mitigate such case. For example, the use of MPCto perform different computations will eliminate the need for SGX in various cases. by isan-rivkin 4. Q: When will non ERC20 coins be able to implement the Enigma protocol? by fauxe
A: Enigma aims to be the go to privacy solution in the blockchain ecosystem. We are currently interoperable with Ethereum given the strong community and developer mindshare that is focused on Ethereum. It’s technically possible to have bridges with other blockchains (assuming the language smart contracts are written in compiles to bytecode that Enigma VM can understand). We are in conversation with several blockchain projects but there is no a concrete timeline. by Can Kisagun 5. Q: What criteria would each team member use to label a successful mainnet launch? by Brendan
A: A robust network that is able to support the needs of our partners (dApps) both short term and long term, one that can support continuous development of partnerships and success stories. Ethereum network is still very limited in the things it can achieve. For example the EVM cannot run operations with decimal points. Our vision is to enable concepts like data sovereignty and for that we need to plan the right network architecture. by Can Kisagun 6. Q: What projects/secret dapps is the Enigma team personally excited to see come to fruition?
Are there any projects or use cases in particular that the team members themselves are excited to see be developedonce Enigma is completed? I’m personally really excited by how advertising might be changed.
I would say that I am very excited to see organizations sharing secret data and computations.
For example, take 2 pharmaceutical companies. Company A has a dataset of molecules and test results. Company B is working on some new drug and needs to know if the molecules they want to use have done damage in the past.
They can share the data but:
Company A has a secret dataset it does not want to share all of their data.
On the other hand, Company B does not want to leak the molecules they are testing right now because it’s a secret drug.
In order to save lives and improve medicine, they could collaborate without revealing sensitive information.
A: On a more blockchain focused answer, I am very excited to see that private voting has picking up a lot of interest in the space. Governance is a arguably the biggest component of the decentralized future. Receiving very positive feedback from Token Curated Registry ecosystem and seeing our work being discussed in top governance projects such as Aragon is very exciting to us. These efforts usually lead to fruitful collaborations. Auctions is also an interesting component especially with NFTs becoming more and more popular in the ecosystem. These are applications one can build with the Enigma Testnet now! We are in conversation with major projects in these areas and appreciate more suggestions. by Can Kisagun 7. Q: Masternode Economics
- -A encrypts the dataset and passes it to a secret contract.
- -B encrypts the inputs (molecules they are exploring).
- -The Secret-Contract performs the computation and returns the result. by isan_rivkin
Have the number of tokens or the economics/rewards for running/maintaining an active masternode beendetermined? by Brodie__mt
A: Enigma network has a staking model, which means worker nodes can stake ENG tokens to be selected for the next computation. The more ENG one stakes, the more likely she can be selected for the next computation and the more likely she will earn. We are doing a very thorough analysis, but currently specifics around reward allocation and threshold for different participants (special validating nodes) haven’t been determined yet. by Can Kisagun 8. Q: Is Enigma trying to get launch partners for Mainnet launch, and if so what types of projects? by Brendan
A: We have been focusing on developing building blocks that aims to enable dApps to achieve higher level ofdecentralization by privacy. We are focusing strongly on governance (voting), auctions and private TXs for the initial testnet. You can refer to this blog post for more information: https://blog.enigma.co/enigmas-building-blocks-a-foundation-for-decentralized-solutions-997dec2a5104 by Can Kisagun 9. Q: What are some examples of simple dAPP functionalities not possible without secret contracts? by Quant
A: Here are six written about in considerable detail: https://blog.enigma.co/solutions/home 7
Normally, with a smart contract, you need a few things. First, you need data; without data, functions besides basic mathematical operations are pretty meaningless. Next, you need an input and an output for the function to compute on the data. With a normal smart contract, you store the data on the contract (meaning it’s public), and then you input certain parameters for a function to compute on that available data and spit back an output. (for example, it could be a function that changes the data in a specific way based on the input parameters, and the new, modified dataset would be the output). Enigma enables the same exact thing, except instead of the data being stored in plain-text on the ethereum network, it is encrypted and stored in the enigma network. The nodes of the enigma network are structured to take an input, perform computations on the encrypted data, and generate the correct output without ever actually seeing the data itself. The party who provided the input parameters can be confident that the data was changed or the output was generated correctly, and then whoever has the decryption key can decrypt the data and see that any computations on the data were performed correctly even though the data was encrypted. So normally, the ethereum handles computations and
consensus. With Enigma, the Enigma network handles computation over encrypted data, and then Ethereum handles consensus based on the output of the computation. by inquirer
Adding to this, this write up just came out today…and helps explain things as well https://blog.enigma.co/enigmas-building-blocks-a-foundation-for-decentralized-solutions-997dec2a5104?gi=3a72ced8fccb by spoonza 10. Q: Does Enigma TEE offer any advantage or difference from Microsoft Coco Framework?
Isn’t that essentially the same asEnigma? What difference or advantage does Enigma have over it? by Quant
A: This isn’t about Microsoft in particular, but rather big companies in general - I’m often skeptic of large enterprises’ ability to innovate in meaningful ways. Through my own experience, as well as through common knowledge, it’s clear that that truly innovative protocols and products are often built in small, unstructured teams. I don’t believe that something as innovative as Blockchain can emerge directly from large, centralized entities. That said, I do find large corporations that maintain an open mind crucial for helping with adoption.
As to Coco specifically, like all other permissioned solutions it is tailored to ad-hoc enterprise deployments. This, to me, is the greatest ailment of the ‘enterprise DLT’ space, since for every possible consortium, a separate deployment is needed. This simply doesn’t scale. People want solutions that just work – and large organizations are no different. A public network is a a plug-and-play solution - and there’s no need for a separate deployment for each set of parties.
This is where Enigma differs the most (in addition to other technical areas). There will generally be one, permissionless and public network that everyone could connect to and use. by Guy Zyskind 11. Q: What will the TPS or transaction speed be like for Enigma?
Will it be rate limited by the blockchain it is on or by the size of the computation? Do you think in the futureresearch will improve the speed of computations on Enigma? by Quant
A: With projects like Enigma, there’s an interesting new notion of ‘effective TPS’, and not just practical TPS. I define effective TPS as the product of actual TPS the chain can handle times how much work each tx encapsulates. For example, when you think of solutions like Plasma, Payment and State Channels, you realize that they don’t require you to hit the chain every time, so every tx actually hides the work of many txs combined.
The same goes for Enigma - as most of the heavy lifting occurs without requiring synchronous chain interaction, you can get much better performance per transaction (e.g., x100 greater throughput is reasonable ball park figure).
In the current iteration - we’re focusing on exactly that. How to get much more per transaction than what you’re getting right now. For future iterations, we’re also working on our own fast blockchain implementation to directly allow for more TPS. These two together lead to much higher effective TPS than is possible today. by Guy Zyskind 12. Q: Will Enigma support shielded transactions on its blockchain via ZkSnarks or ZkStarks? by exapted
A: You will be able to achieve similar properties for hiding transactions (and much, much more) through issuing privacy tokens as I described here. https://blog.enigma.co/secret-icos-and-privacy-tokens-d77ed505514d
That said, we are very interested in different compact zero-knowledge techniques as they can make MPC computations more efficient, so it may very well be that these technologies will become integral to our blockchain and network in general. by Guy Zyskind 13. Q: Progress on sMPC
Have you already started devloping the sMPC or are you still in reserch phase? by Chewbaccapush
A: In addition to the academic work in the early days of Enigma, we have quite a bit of work done on MPC - mostly as a computation engine for enterprise use-cases. The next big steps are to finalize our improved runtime environment (based on WASM) and P2P layer, and then to retrofit our MPC work into an interpreter that can automatically ‘understand’ secret contracts. by Guy Zyskind 14. Q: How might the SEC rulling ENG tokens to be securities effect Enigma’s business model? by Zed
Enigma is working towards building a decentralized network that for the first time exhibits strong privacy guarantees. Our efforts are focused not on increasing the revenue of the company, but rather - the usage of our network. If our vision is truly met, then a good fraction of the world’s applications would be running on Enigma (ranging from small dApps to Enterprise loads), paying for the network’s work and security through ENG fees.
Based on what we’ve seen with other blockchains such as Bitcoin and Ethereum, securing a decentralized network via a cryptocurrency does not constitute a security - and we at Enigma (as well as our excellent legal advisors) share the same position. by Guy Zyskind 15. Q: Can we expect a new Roadmap? by Spoonza
A: Yes. We intend to continue communicating frequently and transparently with the community about our progress. Remember: we are an early-stage project on the cutting edge of decentralized tech with many research-heavy elements. We know where we are going, but many things about how we get there can and will change, including the partners that we build with. As we achieve success in growing our ecosystem, our roadmap is likely to shift as a result. Roadmaps are to be used as a guide - not as a blueprint. by Tor Bair 16. Q: How is testnet going? by Enigma (Communityuser)
A:Testnet was released as a self-contained docker network on June 30th mostly geared towards developers to get started developing secret contracts. A number of our launch partners are already using it to develop their pilot projects. We are responsive to a number of issues and pull requests that we have received from the community over the past month, and we are actively developing the next release of our network. In addition, we recently showed a code demo of secret voting in Token Curated Registry meetup in San Francisco at the end of August. We will shortly release sample code for private voting and sealed bid auctions. by Can Kisagun 17. Q: Enigma Technology Benefits
Why the world need Enigma’ Solutions? What are the benefits to use Enigma Technology? by Bill
A: Our Solutions Series focuses on practical, near-term applications for Enigma’s protocol: https://blog.enigma.co/solutions
In the long run, Enigma is looking to create an ecosystem of decentralized projects and applications enabled by our privacy protocol. Blockchains are severely limited by their inability to use private or sensitive data. By working with our partners to solve this critical limitation, Enigma hopes to turn decentralized applications from novelties into necessities. https://blog.enigma.co/enigmas-ambition-our-latest-roadmap-8d50107ad314
Some of the industries we’re interested in revolutionizing can be found here: https://blog.enigma.co/why-enigmas-privacy-protocol-will-power-our-decentralized-future-aedb8c9ee2f6 by Tor Bair 18.Q: Multiple Questions
- In the Enigma official video AMA, Guy said there will be staking pools but not in the first release. In which iteration (voyagevaliant/defiant) will pooling be possible?
- Is the team working on another enigma dapp besides catalyst and data marketplace?
- If there is an internet outage when I’m running a node, how much ENG would be slashed? Are there anything I can do to prevent the slashing? by Enigma ( Communityuser)
A: Multiple Answers
Zur Erkundung von Adressen und Transaktionen kannst du Block-Explorer verwenden, wie beispielsweiseetherscan.io und ethplorer.io. Weitere Information sind zu finden unter https://bloomzed.io/ . Bloomzed Token-Kurs Zcash is a digital currency with strong privacy features. Transact efficiently and safely, with low fees, while ensuring digital transactions remain private. Selectively disclose address and transaction details for information sharing, auditing or regulatory compliance. Bitcoin, Ethereum i svi kovanice iz Proof-of-Work-a su cen-tra-li-zed. Možete ga kvantificirati poslovnim subjektima (3-4) ili zemljama (1). To su najočitija, ali možete također kvantificirati centre putem hosting tvrtki (svi koriste AWS? Centralizirano), državljanima / fizičkim lokacijama izvršnih direktora i tako dalje. Dobivate ideju. ZED or small to medium sized MTOs that can't effectively compete with larger MTOs, ZED offers a robust Platform as a Service (PaaS) built on a By now, everyone knows that BItcoin is the first and longest running blockchain technology project. Since its advent, hundreds if not thousands of more blockchain projects have been launched. Some altcoins use the Bitcoin codebase, others don’t. Some have been around for years and are still running while some have died Have you ever wondered … Continue reading "Blockchain Projects List"
In this tutorial, I am explaining how to use the blockchain explorers of the popular blockchains (bitcoin, ethereum, nem) and what is the difference between them. Setting up a Block Explorer for your coin - Duration: 24:33. Aqua 22,444 views. ... Bitcoin Explained Lab 1: Block Chain Explorer - Duration: 3:42. Emeka aka On1 Productions 2,048 views. Blockr.io's purpose is to bring digital coins closer to the public. Digital coins are sometimes regarded as too magical and we'd like to change that. Anybody can open blockr.io's site and browse ... Bitsuft Block explorer Restful-API. World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote - Duration: 36:30. Cyber Investing Summit Recommended for you A Block explorer is a way of finding all transactions and blocking which ones are producing cryptocurrency, for example, if you sent bitcoins, with block explorer you can verify the transaction ...