iExec RLC

What is iExec?

The whole world is excited about cloud computing right now, and for a good reason. There are so many amazing projects, apps, and services that have come to be thanks to cloud computing.

iExec is a solution that is taking cloud computing to the next level, by decentralizing it. essentially, this is all about making something that is already great, even better.

The idea behind iExec is to provide decentralized apps that run on the blockchain a scalable, easy to access and secure platform by making computing resources and data sets available. iExec is built on Ethereum smart contracts.

There is a lot of research that has gone into the iExec project regarding Desktop Grid computing. The Desktop Grid is also referred to as Volunteer Computing.

It is a scenario where users volunteer their underutilized computing resources to the internet, in the process making it possible to run humongous parallel applications that would in most cases be very expensive to run, especially since they would demand a supercomputer.

In order to meet the demands and challenges that come with this kind of technology, iExec is based on XtremWeb-HEP. This is an open source Desktop Grid software that is solid and has matured over the years.

Xtrem-HEP allows iExec to implement a number of features core to successfully seeing through the vision of decentralizing cloud computing, such as the availability of hybrid private/public infrastructure, deploying virtual images, supporting multiple users on the platform, fault tolerance, accountability, security, data management and so much more.

The internet, as we know it, is amazing. What iExec is doing, upon fruition, will make the internet even better. This is the next step in the internet revolution.

What is the problem that iExec Solves?

There have been a lot of challenges that do not just face the internet, but also blockchain computing since its inception some years back. Ethereum is one of the blockchain projects that has presented an innovative approach for running decentralized apps. Users on Ethereum are able to write smart contracts which are eventually run on the virtual machine.

With this in mind, it is possible to build and execute important services like crowdfunding, finance, insurance, investment and predicting trends in global markets. All of these are services that at the moment are centralized, and are under the control of the respective entities behind them.

Different blockchain projects have shown a lot of promise. However, most of these suffer from limited computing resources through which the decentralized apps can run.

Other than that, other challenges include a high latency protocol, inefficient virtual machines, and insufficient space. The fact is that over time, blockchain platforms will overcome these challenges. However, the demand for additional capabilities will keep increasing, and this poses serious questions on the feasibility of blockchain projects.

Other than the inherent blockchain challenges, there are also challenges that have plagued conventional computing infrastructure over the years. Let’s look at complete decentralization of apps, for example. The current cloud infrastructure is unable to meet the demands of these projects. Besides, there is already an outcry over the insufficient computing power through which scientific enterprises and power-hungry data industries can run large applications, and process large chunks of data.

This kind of computing power is only available through High-Performance Computing infrastructure (HPC) and the cloud. Unfortunately, these solutions are not affordable either.

This makes them a preserve of the very few who understand the structure and operation and can also afford them. This also effectively locks out innovative small businesses from being a part of the great internet revolution, because more often they do not have the experience, expertise and cannot afford to run HPC platforms.

Their only alternative is to work with the popular cloud infrastructure vendors like Amazon, who unfortunately are very expensive, especially when running applications and services that are resource intensive, such as GPU rendering.

Besides, operating a data center is a resource-intensive affair. You need a serious cooling system when running servers, which combined together, consume a lot of energy.

The ramifications of this will not just affect your balance sheet, but the impact on the environment is also obvious. Looking at such challenges, it is imperative that the cloud needs to be decentralized. By enabling blockchain technology on the cloud, we can also look forward to a low cost of infrastructure utilization.

How does iExec Solve the problem?

iExec plans to build a decentralized cloud infrastructure, through which they can support distributed applications based on the blockchain platform.

This will also make high-performance computing cost-effective, which is ideal for innovative small businesses and individuals who have in the past been somewhat locked out of experiencing the best of cloud computing. In essence, iExec is making cloud computing open to everyone.

By decentralizing the cloud base on the blockchain, entities and individuals are now able to experience affordable, secure and immediate access to some of the best computing infrastructure, giving them a competitive edge that they were lacking before.

The decentralized apps on iExec will be able to look for and make use of all the computing resources that are available at their disposal, including servers, datasets, and applications.

By decentralizing the cloud, iExec will create new frontiers for investment through the aggressive use of the current infrastructure available.

This is possible because companies on iExec will be offering computer farms, storage, data provision centers, SaaS applications, web hosting and so much more, allowing businesses to engage one another without all the red tape that exists currently.

To tackle the energy concern with respect to air conditioning and running the servers, iExec is getting servers away from data centers.

This will eventually make access easier and affordable for users, and in the long run, a distributed cloud will help to decrease the environmental footprint that these data centers have been amassing over the years, and at the same time bring them as close to consumers and producers as possible.

All decentralized businesses are catered for. The following are some of the respective needs of such businesses that iExec takes into consideration:

  • Decentralized app providers should be able to perform their computations off the blockchain, on demand.
  • A drastic reduction in the cost of computing for decentralized apps by the app providers, through a reliable, robust and safe computing infrastructure.
  • Access to a wider market pool for data providers, especially when they integrate their products and services into the iExec marketplace
  • Increase ROI on existing infrastructure, and monetize underused computing resources by server providers.

What makes iExec better than the competitors?

iExec is offering several benefits that make it one of the best alternatives for anyone who is interested in cloud computing, without the traditional hindrances that have made cloud computing difficult to access.

Energy Consumption

Traditionally, data centers are very greedy when it comes to energy consumption. This doesn’t only apply to managing the servers, but also for cooling purposes. To address this challenge, iExec is moving servers away from data centers. A distributed cloud service therefore eventually will reduce the energy consumption.

Affordable

The cloud as it is right now is very expensive for small businesses. iExec is introducing a means of utilizing the underused computing resources, which makes sure that everyone has access to affordable cloud services. In fact, the current existing computing infrastructure should also benefit from new market frontiers, through which they can experience aggressive usage.

Resource Use

Decentralized apps are not resource intensive. Take an example where a smart contract should execute a resource intensive algorithm for a cryptographic function. iExec makes it easier for the smart contract to get access to a computer, and once it has executed the function, the payment is instant.

Organized Market Place

iExec is creating an organized marketplace where users are able to find any of the computing resources that they need. This particularly applies to those who are looking for new technology with affordable GPU usage.

Other than that, it is very easy to advertise computing resources to anyone who needs it. The situation at the moment is that the large cloud providers are the only ones who are able to attract and serve most users. Through iExec, however, even smaller cloud providers have a fair chance.

Service Quality

The provision of cloud services is done under an SLA (Service Level Agreement). This determines the conditions for correct use of computing resources. Vendors, for example, must guarantee quality services through measurable metrics which can be audited as proof of compliance with the SLA.

By design, the blockchain features resource use traceability, which makes it possible for providers and customers to ascertain that the SLA has been duly fulfilled. The SLA also explains the roles of each party, especially in terms of reporting faults, and payment for compensation should there be a breach in the SLA.

Easing Data Access

One of the benefits that iExec has over the competition is that it is bringing data as close to consumers and owners as possible. Through distributed cloud computing and shared resources, iExec is doing away with the need for expensive supercomputers. Individuals are now able to use basic computers, laptops, and even their smartphones to access whatever they need on the blockchain.

A distributed cloud means that processing intelligence is moving to where the data is. therefore, data movement is reduced, and in the process improving latency, quality of services rendered and latency.

How can iExec be categorized?

iExec is a decentralized cloud computing platform built on blockchain that offers a decentralized marketplace for cloud resources. It is an innovative space where users and entities are able to monetize their servers, applications and data sets.

What’s iExec’s vision on Security?

iExec offers security in the following levels:

  • Communication

It is expected that sensitive data might be exchanged within the network. For this reason, iExec uses XWHEP middleware to offer private communication through the TLS protocol. This identifies the communicating parties within the network and encrypts the communication messages. The TLS protocol uses an electronic key to encrypt all communication.

  • Authentication

To execute any command on iExec, you will require more than just connecting to the scheduler. Clients and workers must have valid credentials to enable the scheduler to identify them. the acceptable credential types on the server include login keys, X509 certificate, OpenId, and OAuth.

  • Authorization

Once authenticated on the server, users will acquire user rights. The user rights determine the level of authorization, which will either allow or deny the user the ability to execute their requested actions. Authorization is classified from most privileged (super_user) to least privileged (standard_user).

  • Access Rights

All objects on iExec have owners. Owners have full access to their objects by default. However, depending on the access rights to the objects, any user should have access to objects, even the ones they do not own. Access rights, therefore, can either deny or allow access to the objects that users are associated with.

  • Confinement

XWHEP authorizes all identities and access rights to objects. As a result, it also confines all the objects that it manages. A group of authorizations and access rights within XWHEP is referred to as a confinement. Jobs, data, and applications are confined, as are workers, clients and users.

Through confinement, distributed entities like workers and clients are allowed or denied read, write and execution access to the objects confined.

  • Data

Data is exchanged over the iExec network between servers, clients, and workers. The security protocol for data security is covered under communication security through TLS protocol and encryption.

Examples of iExec use cases/applications

iExec Marketplace

This is an open and global market fully driven by demand and supply for cloud services. Providers are able to define a price for the services they are offering, while users have access to computing resources on demand.

iExec SDK

The iExec SDK offers JS and CLI libraries through which developers should be able to overcome some of the scalability challenges inherent to Ethereum, thereby executing their services through iExec off-chain.

DApp Store

This is the store where all the decentralized apps on iExec are listed. Developers can use this to improve their visibility, monetize their apps, while users, on the other hand, are able to execute the apps that they need.

Data Wallet

Through this wallet, data providers should be able to monetize their decentralized assets on the market, supported by high-level security. This will help propel innovation and challenge disruptive ecosystems.

Resources

https://coincheckup.com/coins/iExec-RLC

https://iex.ec/

https://medium.com/iex-ec

https://steemit.com/@iexec

https://bitcointalk.org/index.php?topic=1746241.0

https://iex.ec/whitepaper/iExec-WPv3.0-English.pdf

Quantum Resistant Ledger

What is Quantum Resistant Ledger?

Private digital monies have been touted as the future of financial systems. To achieve this dream, one of the core ideas behind these monies is longevity.

However, for longevity, we must also ensure the digital signatures involved in the use of these monies is protected from all the risks that are associated with quantum computing attacks. This is where Quantum Resistant Ledger comes in.

Quantum Resistant Ledger is a unique value store that is built to be future-proof. It is a quantum value store that has a decentralized layer of communication. This is a secure layer that attempts to shore up the project from some of the challenges that cryptocurrencies are expected to face as a result of quantum computing.

Instead of using 256-bit ECDSA (elliptic curve digital signature algorithm) like most of the cryptocurrency projects currently do, Quantum Resistant Ledger uses a secure and peer-reviewed XMSS, Proof of Work (PoW) and there are plans underway to hard fork Cryptonight v7 to Proof of Stake (PoS).

What is the problem that Quantum Resistant Ledger Solves?

Quantum Resistant Ledger is all about privacy and mitigating security risks in the near future. At the moment, Bitcoin has not been exposed to quantum attacks. However, if this were to happen, a lot of people would suffer. Given the nature of computing and the advancements therein, it is only a matter of time before someone creates a quantum computer, one that can break the ECDSA.

It is important to mention that ECDSA is one of the most commonly used signature schemes in blockchain technology. It offers security and bolsters these projects against attacks. However, if it were to be breached, any ledgers existing would be vulnerable to attacks.

A normal computer is unable to break the ECDSA, however many brute force attacks are wielded. These computers do not have sufficient energy with which they can attempt and successfully guess a private key. However, through Shor’s algorithm, this is a possibility in the near future.

Quantum computers can use this algorithm and regenerate a private key from a public key. This is a serious concern, because almost if not more than half of all the Bitcoin addresses have their public keys revealed.

One of the reasons why this vulnerability is a serious matter is because whether you are using Ethereum or Bitcoin, the sender’s public key address is always stored and revealed in the blockchain.

This is why users are able to inspect the ledgers at any given time for transparency. These addresses, that were initially made visible for auditing purposes, might in the future become the one thing that puts blockchain projects and users at risk.

It is very easy to assume that it is only Bitcoin that is vulnerable to this probability of quantum attacks. However, that is not true. All the other blockchain ledgers that use elliptic curve cryptography to append signatures to the transactions are at risk.

This means almost all the cryptocurrency projects are at risk. It is important to mention at this juncture that the risk is too high, that if only 10 – 20% of all the addresses remain in ECDSA, then it is very easy to steal the money in them, sending the ledger value to zero, if the attacker has a quantum computer.

How does Quantum Resistant Ledger Solve the problem?

One of the biggest challenges that face cryptocurrency and the world of computing as we know it, is privacy. There are different inferences that are used to address this.

In some spheres, privacy is all about obfuscating IP addresses through the Tor protocol, while other projects use different methods to achieve this. More often, the transactions are set up in such a manner that it becomes nearly impossible to trace them. Others, like ZClassic and ZCash, use zero-knowledge proof, while some like Monero, make the balances unclear.

The consensus is that each project deals with privacy in a different way, to meet their inherent needs. Quantum Resistant Ledger uses Zk-Stark.

This is a procedure that makes transactions quantum resistant. It is possible because the private transactions are reduced to roughly 400-500 kilobytes. This is a size that is too big to reasonably be included in a block. It is worth noting that the average bitcoin transaction is less than 300 bytes in size.

Each transaction in Quantum Resistant Ledger is around 2.1kilobytes. Therefore, unless the limit is set in such a way that each block handles one transaction, it is virtually impossible to handle this. Besides, this would end up being a very expensive transaction, costing hundreds of dollars to complete.

Taking this into consideration, and the fact that the EU is already wading into the controversial area about privacy through legislation, it is highly unlikely that implementing this expensive concept will be done. instead, Quantum Resistant Ledger aims to create a chain that can be used by governments and businesses without worrying about whether or not their use of the chain is legal.

The team at Quantum Resistant Ledger is working hard to make sure that the ecosystem is as friendly as possible so that independent forks on the chain can become part and parcel of the system created.

What makes Quantum Resistant Ledger better than the competitors?

There are several reasons why owning a Quantum Resistant Ledger would be a brilliant idea in this age and time, especially when compared with other crypto projects out there.

There are plans to integrate a governance and/voting system based on PoS for regular hard fork upgrades. Quantum Resistant Ledger is currently using an algorithm that selects blocks according to the closest hash of reveal hashes that have already been published from the validator stakes. This is one of the features that makes Quantum Resistant Ledger resistant to collusion and gaming, and at the same time offers protection against Sybil state attacks, and from block withholding, a technique that is often used by irresponsible miners.

Quantum Resistant Store of Value

While Quantum Resistant Ledger might not be easy to understand for those who lack the inept knowledge of cryptocurrency, the issue of a store of value is one that most people would easily appreciate. When you are building your portfolio of cryptocurrencies, it is always a good idea to make sure that you diversify your portfolio. This is simple financial knowledge. It helps your portfolio stay safe amidst uncertain market scenarios.

It is only prudent for you to have something that would stand the test of time, even when the worst possible scenario unfolds. Other than that, even if you are not diversifying your portfolio, you have to look at this from the perspective of an investment. You need an investment that is secure, and this is what Quantum Resistant Ledger offers.

Quantum Resistant Token (QRT)

These are the tokens that are created for use and transferred on the Quantum Resistant Ledger blockchain. These tokens are created in such a manner that they take on all the security qualities that are associated with the Quantum Resistant Ledger blockchain. They, therefore are quantum resistant.

Developers who will be using Quantum Resistant Ledger in the near future will no longer have to worry about quantum threats challenging the security of the tokens they use in and for their projects. The QRT, like any other tokens that are used in different projects, must only be accessed through Quantum Resistant Ledger.

The Merkle Tree

This is an inverted tree that computes the parent nodes by hashing the linking of child sibling nodes to the root. Because of this, it is easier to prove the existence of a node through cryptography, by simply computing the root.

In order to make this system more secure, Quantum Resistant Ledger extended the number of OTS key pairs that are available for use, especially if the tree is a hypertree, made up of several Merkle trees.

Ephemeral Data Messaging Layer

Ephemeral plays an important role in the Quantum Resistant Ledger ecosystem, championing functionality, integrations and more importantly, bringing a lot of users on board. Most people would easily mistake the role of Ephemeral in the Quantum Resistant Ledger project. However, it serves as a utility that makes things easier.

One-Time Signatures

The OTS is an important part of the Quantum Resistant Ledger ecosystem, especially when it comes to security. The question that has been asked by a lot of people is why the same OTS cannot be used to sign more than one message, and herein lies the security function

Quantum Resistant Ledger uses XMSS to sign all transaction messages that are issued before valid transactions are generated. The OTS algorithm is written such that it can only be used to sign one message with one key.

If the key were to sign two different messages, an attacker gets the chance to create an authentic signature for a third message that you would never have signed. As a result, with this message, the attacker is able to create a transaction you do not know about and have it approved. Because of this reason, users are often advised to track all their OTS keys and make sure they use different keys for different transactions.

How can Quantum Resistant Ledger be categorized?

Quantum Resistant Ledger is a security blockchain platform. It encrypts data that is shared across it through quantum computing. The encryption and security methods that are currently in use in most of the blockchain projects are expected to be obsolete and vulnerable within a few years. What Quantum Resistant Ledger is providing is a stable solution for the future.

What’s Quantum Resistant Ledger’s vision on Security?

Just like privacy, security is a major concern for projects like Quantum Resistant Ledger that deal with private monies. There are lots of algorithms that are in use to keep Quantum Resistant Ledger as secure as possible. These are algorithms that have been used successfully in public key cryptography in the past.

One good example is ECDSA, which has been used in Bitcoin. The idea behind ECDSA is on the assumption that a unique logarithm problem when applied over carefully selected groups, does not offer a credible and/or reliable solution.

However, through tried and tested methods, there is proof that with the right power, a quantum computer has the capacity to use an algorithm and generate a private key. This is done by scanning all feasible solutions to the public address and creating a simultaneous superposition.

One of the most secure post-quantum algorithms, eXtended Merkle Signature Scheme (XMSS) is used in Quantum Resistant Ledger. XMSS employs a one-time signature scheme (OTS), which allows the key to sign only one message.

To do this, the OTS keys are only generated as and when they are needed. As a result of this, XMSS is one of the most secure algorithms, especially because message attacks tend to forge algorithms and keys, but XMSS is unforgeable.

Examples of Quantum Resistant Ledger use cases/applications

Mobile Application

The mobile app is currently available. This model is designed to build upon aesthetic designs that had been proposed earlier on. Some of the core functions of this mobile app include support for Kyber &Dilithium which are necessary for ephemeral messaging, Shasha that supports the sha3 hash function, and QRLlib, which is the core library for the Quantum Resistant Ledger.

Other than these functionalities, Quantum Resistant Ledger is also built to support communication between native code like Java for Android devices and Objective-C for iOS devices, and through bridges, communicate with react-native languages like JavaScript.

Improvement Proposals

Quantum Resistant Ledger is primed for security and privacy. In line with this, upon the launch of the main network, maintaining a secure and stable ecosystem is important for any links or integration that would result in changes felt across the network or changes of a significant nature.

Quantum Resistant Ledger has QRL Improvement Proposals (QIPs) in place to address this. These protocols are all about checks and balances.

Media Monitoring

When using Quantum Resistant Ledger, it is possible to stay abreast with all information regarding Quantum Resistant Ledger or anything else concerning quantum computing and any advancements in the field.

Bisq.network

To bring the functionality of Quantum Resistant Ledger closer to everyone, it is important that the token is listed on exchanges. In light of this, Quantum Resistant Ledger has been trying to partner with different exchanges to enable them to list the main network coin. This would make work easier for interpersonal trades.

Resources

https://coincheckup.com/coins/Quantum-Resistant-Ledger

https://theqrl.org/

https://www.medium.com/the-quantum-resistant-ledger/

https://theqrl.org/faq

https://github.com/theQRL/Whitepaper/blob/master/QRL_whitepaper.pdf