Chainfeeds Introduction:
If the blockchain system is the consciousness on the iceberg, then the sensor network represented by the bottom layer of DePIN is the subconscious under the iceberg. Now the challenge is, who is the spine and nerves of the distributed system? How do we build the spine and nerves? In this article, we will start with the small lessons of the development of the Internet of Things, build the development ideas of DePIN, and help builders better land.
Article Source:
https://mp.weixin.qq.com/s/NlK8oQpl9qF0Ooz7VUYj3w
Article author:
Foresight Ventures
View:
Foresight Ventures: DePIN should not be based on devices. Devices do not have horizontal scale capabilities. They should start with modules. The core of DePIN is PIN, and the core of PIN is the authorization code. We regard devices as a collection of sensor modules, and the PIN code of each sensor module is the permission for data access to the network, and also the authentication permission of PoPW. Only devices with access rights and recognized contributions can be called mining machines. Therefore, the core of the entire DePIN track is how to make the contribution of edge devices measurable, if the contribution of the same sensor of different devices can have consistent measurement. According to the different information transmission of traditional computers, the bus can be divided into three categories: data bus (Data Bus) for transmitting various data information; address bus (Address Bus) for transmitting various address information; control bus (Control Bus) for transmitting various control signals. The DePin bus will also have similar: as an identity credential for device access to the network. (Address Bus) as a PoPW credential for data verification. (Data Bus) as a means of device management. (Control Bus) a. Address BUS: Device DID (Dephy) b. Data BUS: Virtual Communication Layer + Sensor Network c. Control BUS: Cellular Management Module Since some Dephy projects have RWA attributes, they exist in the physical world and are related to real economic life. Therefore, more in-process management methods are needed to achieve autonomous risk control. There are two main implementation channels: First, through the management of cellular operator traffic, once a device violates the rules, the device can lose the PoPW mining rights from the traffic end, which is a more real-time management method compared to Slash. Second, buy out upstream resources through miners + resource pools. For example, a dealer has 100 number segment resources. When 30 of them involve risks, they may be punished with warnings of license revocation. Today, we will mix 30 resources with the resources of other dealers, buy out real resources (RWR) through miners, and control the resources through mixed number segments, so as to obtain as many resources as possible while ensuring the risks of upstream dealers. Replicate the Liquity model to various RW resources.
Content Sources





