Skip to content
Snippets Groups Projects

Compare revisions

Changes are shown as if the source revision was being merged into the target revision. Learn more about comparing revisions.

Source

Select target project
No results found
Select Git revision

Target

Select target project
  • communication/duniter-whitepaper
  • tykayn/duniter-whitepaper
  • tuxmain/duniter-whitepaper
3 results
Select Git revision
Show changes
Commits on Source (1)
Showing
with 1281 additions and 1443 deletions
No preview for this file type
No preview for this file type
No preview for this file type
......@@ -59,7 +59,7 @@ formula :
.. math::
:label: ud
UD(t+1) = UD(t) + c^2 \times {M(t) \over N(t)}
\mathit{UD}(t+1) = \mathit{UD}(t) + c^2 \times {M(t) \over N(t)}
Duniter is based on a decentralized Blockchain. This technical choice
allows irreversibility of transaction and uncensorability of trades and
......@@ -78,7 +78,7 @@ The informations are relevant for the v13 of the Duniter Protocol.
.. _state-of-the-art-bitcoin-case:
State of the art: Bitcoin case
-------------------------------
------------------------------
.. raw:: html
......@@ -94,7 +94,7 @@ technical aspects.
.. _monetary-creation-a-space-time-asymmetry:
Monetary creation of Bitcoin: a space-time asymmetry
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Space-time asymmetry refers to the relative access of individuals to
newly created money [#RTM]_. Concretely, most existing currencies (c. 2020)
......@@ -166,7 +166,7 @@ Trust principles, that will be exposed later.
.. _proof-of-work-mining-a-power-race:
Proof-of-Work mining: a power race
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In Bitcoin Model, the calculation and incentive principles cause a power
race: new Bitcoins are created for the owners of the most numerous,
......@@ -179,7 +179,7 @@ the participation of low-end hardware in the Duniter network, leading to
a better decentralization of blockchain validation.
What about Proof of Stake?
^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^
Proof of stake consensus algorythm was first introduced in 2012 [#PPCoin]_.
The basic principle is to allow the richest wallets to issue blocks,
......@@ -352,7 +352,7 @@ into few principles:
legitimate identity.
The aim of the WoT is to identify a blockchain account to a living
human. According to Lauterbach et.al [#CouchSurf]_, the strengh of a relationship
human. According to Lauterbach et al. [#CouchSurf]_, the strengh of a relationship
should be considered when building a vouch system. For this reason, the
Ğ1 Web of Trust rules are expressed in a licence stating what WoT
certifications are. A certification represents a strong human
......@@ -374,7 +374,7 @@ parameters individually, while Duniter sets rules for
the whole community in the block #0, and don't let users chose their particular parameters.
Why do we need a Web of Trust?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
There are two reasons we need it:
......@@ -459,7 +459,7 @@ communication network.
.. _graph-theory-vocabulary:
A few foundational concepts on graph theory: a bit of vocabulary
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- **Graph**: set of points -called ‘vertices’- joined by edges -called
paths/walks-.
......@@ -582,7 +582,7 @@ defining what a ‘referent member’ is:
.. math::
:label: referent_member
D \geq {CEIL (N^{-1} \over stepmax)}
D \geq {CEIL ({N^{-1} \over stepmax})}
As the size of the web will grow this number will grow too, meaning it will
take more certification issuances to become a referent member. The
......@@ -867,7 +867,7 @@ to allow one to certify at the end of every working week -five days-
instead of a whole calendar one.
Trust me now, trust me forever? (``sigValidity``, ``msValidity``)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
There would be two main drawbacks to a lifetime membership in the Ğ1’s
Web of Trust:
......@@ -1002,7 +1002,7 @@ consumption compared to BitCoin : an “ecological” PoW ?
.. _why-proof-of-work:
Why do we need Proof of Work?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Duniter nodes share a database as part of a p2p environment. The proof
of work (PoW) allows machines to synchronize with each other. In
......@@ -1051,7 +1051,7 @@ a privacy-first internet cube.
.. _how-does-duniter-pow-work:
How does it work?
~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~
.. _the-hash:
......@@ -1084,7 +1084,7 @@ blocktime creation by increasing itself if the creation interval drops
under ``avgGenTime`` and vice-versa.
How is difficulty applied?
'''''''''''''''''''''''''''
''''''''''''''''''''''''''
The numeric value of difficulty is taken from an array of possible
hashes out of all possible hashes. In DUBPv13 the hash of a block is its
......@@ -1186,7 +1186,7 @@ meaning that if there are fifteen members currently forging, the
member’s exclusion factor will drop down to one after five blocks.
What is intended by “the number of members forging”?
'''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''''''''''
We mean the number of members trying to create the next block. In
reality, there is no way to precisely know how many members are
......@@ -1399,13 +1399,13 @@ libre Currency can be issued thanks to the Universal Dividend.
More than that, Duniter proposes a new model for securing a Blockchain
in an efficient and decentralized way. Basing the security on a Web of
Trust with an individualised security makes the calculation rules more
fair. A side-effect of this choice is a network consisting mostly of
fair. A side effect of this choice is a network consisting mostly of
low-end computers, maintaining a good security and helping
decentralization of calculation.
The ultimate goal of Duniter project is to allow people to participate
in a libre economy, thanks to a libre currency. What is a libre economy
? The Relative Theory of Money defines it through four economic
in a libre economy, thanks to a libre currency. What is a libre economy?
The Relative Theory of Money defines it through four economic
liberties:
- The freedom to choose your currency system: because money should not
......@@ -1425,8 +1425,8 @@ get it, this is the goal: free economy through free currency.
.. _sources:
Sources :
---------
Sources
-------
.. [#Bitcoin]
Bitcoin Whitepaper, S.Nakamoto, 2008:
......
......@@ -15,6 +15,12 @@ div.clearer {
clear: both;
}
div.section::after {
display: block;
content: '';
clear: left;
}
/* -- relbar ---------------------------------------------------------------- */
div.related {
......@@ -328,8 +334,8 @@ p.sidebar-title {
font-weight: bold;
}
div.admonition, div.topic, pre, div[class|="highlight"] {
clear: both;
div.admonition, div.topic, blockquote {
clear: left;
}
/* -- topics ---------------------------------------------------------------- */
......@@ -338,7 +344,6 @@ div.topic {
border: 1px solid #ccc;
padding: 7px;
margin: 10px 0 10px 0;
overflow-x: auto;
}
p.topic-title {
......@@ -353,7 +358,6 @@ div.admonition {
margin-top: 10px;
margin-bottom: 10px;
padding: 7px;
overflow-x: auto;
}
div.admonition dt {
......@@ -378,6 +382,15 @@ div.admonition > :last-child {
margin-bottom: 0;
}
div.sidebar::after,
div.topic::after,
div.admonition::after,
blockquote::after {
display: block;
content: '';
clear: both;
}
/* -- tables ---------------------------------------------------------------- */
table.docutils {
......@@ -513,28 +526,31 @@ ol.upperroman {
list-style: upper-roman;
}
ol > li:first-child > :first-child,
ul > li:first-child > :first-child {
:not(li) > ol > li:first-child > :first-child,
:not(li) > ul > li:first-child > :first-child {
margin-top: 0px;
}
ol ol > li:first-child > :first-child,
ol ul > li:first-child > :first-child,
ul ol > li:first-child > :first-child,
ul ul > li:first-child > :first-child {
margin-top: revert;
:not(li) > ol > li:last-child > :last-child,
:not(li) > ul > li:last-child > :last-child {
margin-bottom: 0px;
}
ol > li:last-child > :last-child,
ul > li:last-child > :last-child {
margin-bottom: 0px;
ol.simple ol p,
ol.simple ul p,
ul.simple ol p,
ul.simple ul p {
margin-top: 0;
}
ol ol > li:last-child > :last-child,
ol ul > li:last-child > :last-child,
ul ol > li:last-child > :last-child,
ul ul > li:last-child > :last-child {
margin-bottom: revert;
ol.simple > li:not(:first-child) > p,
ul.simple > li:not(:first-child) > p {
margin-top: 0;
}
ol.simple p,
ul.simple p {
margin-bottom: 0;
}
dl.footnote > dt,
......@@ -677,6 +693,10 @@ pre {
overflow-y: hidden; /* fixes display issues on Chrome browsers */
}
pre, div[class|="highlight"] {
clear: both;
}
span.pre {
-moz-hyphens: none;
-ms-hyphens: none;
......
......@@ -86,7 +86,7 @@
</div>
<div class="footer" role="contentinfo">
&#169; Copyright 2020, Matograine.
Created using <a href="https://www.sphinx-doc.org/">Sphinx</a> 3.1.1.
Created using <a href="https://www.sphinx-doc.org/">Sphinx</a> 3.1.2.
</div>
</body>
</html>
\ No newline at end of file
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
......@@ -80,7 +80,7 @@
</div>
<div class="footer" role="contentinfo">
&#169; Copyright 2020, Matograine.
Created using <a href="https://www.sphinx-doc.org/">Sphinx</a> 3.1.1.
Created using <a href="https://www.sphinx-doc.org/">Sphinx</a> 3.1.2.
</div>
</body>
</html>
\ No newline at end of file
......@@ -80,7 +80,7 @@ will use a Web of Trust with specific rules. As the number of members
may evolve, the Universal Dividend has to be created according to the
formula:</p>
<div class="math notranslate nohighlight" id="equation-ud">
<span class="eqno">(1)<a class="headerlink" href="#equation-ud" title="Permalink to this equation"></a></span>\[UD(t+1) = UD(t) + c^2 \times {M(t) \over N(t)}\]</div>
<span class="eqno">(1)<a class="headerlink" href="#equation-ud" title="Permalink to this equation"></a></span>\[\mathit{UD}(t+1) = \mathit{UD}(t) + c^2 \times {M(t) \over N(t)}\]</div>
<p>Duniter is based on a decentralized Blockchain. This technical choice
allows irreversibility of transaction and uncensorability of trades and
identities. While inspired by Bitcoin, Duniter uses a Web of Trust and
......@@ -314,7 +314,7 @@ limited lifespan.</p></li>
legitimate identity.</p></li>
</ul>
<p>The aim of the WoT is to identify a blockchain account to a living
human. According to Lauterbach et.al <a class="footnote-reference brackets" href="#couchsurf" id="id13">7</a>, the strengh of a relationship
human. According to Lauterbach et al. <a class="footnote-reference brackets" href="#couchsurf" id="id13">7</a>, the strengh of a relationship
should be considered when building a vouch system. For this reason, the
Ğ1 Web of Trust rules are expressed in a licence stating what WoT
certifications are. A certification represents a strong human
......@@ -510,7 +510,7 @@ defining what a ‘referent member’ is:</p>
<dt><strong>Referent member</strong>:</dt><dd><p>Let D be the total of degrees of a member, and N the number of members.
A member is said to be ‘referent’ if and only if:</p>
<div class="math notranslate nohighlight" id="equation-referent-member">
<span class="eqno">(3)<a class="headerlink" href="#equation-referent-member" title="Permalink to this equation"></a></span>\[D \geq {CEIL (N^{-1} \over stepmax)}\]</div>
<span class="eqno">(3)<a class="headerlink" href="#equation-referent-member" title="Permalink to this equation"></a></span>\[D \geq {CEIL ({N^{-1} \over stepmax})}\]</div>
<p>As the size of the web will grow this number will grow too, meaning it will
take more certification issuances to become a referent member. The
number of certifications needed to become a member shouldn’t change.</p>
......@@ -1188,12 +1188,12 @@ libre Currency can be issued thanks to the Universal Dividend.</p>
<p>More than that, Duniter proposes a new model for securing a Blockchain
in an efficient and decentralized way. Basing the security on a Web of
Trust with an individualised security makes the calculation rules more
fair. A side-effect of this choice is a network consisting mostly of
fair. A side effect of this choice is a network consisting mostly of
low-end computers, maintaining a good security and helping
decentralization of calculation.</p>
<p>The ultimate goal of Duniter project is to allow people to participate
in a libre economy, thanks to a libre currency. What is a libre economy
? The Relative Theory of Money defines it through four economic
in a libre economy, thanks to a libre currency. What is a libre economy?
The Relative Theory of Money defines it through four economic
liberties:</p>
<ul class="simple">
<li><p>The freedom to choose your currency system: because money should not
......@@ -1212,7 +1212,7 @@ water source in a desert) so no more is available to the others. Now you
get it, this is the goal: free economy through free currency.</p>
</div>
<div class="section" id="sources">
<span id="id23"></span><h2>Sources :<a class="headerlink" href="#sources" title="Permalink to this headline"></a></h2>
<span id="id23"></span><h2>Sources<a class="headerlink" href="#sources" title="Permalink to this headline"></a></h2>
<dl class="footnote brackets">
<dt class="label" id="bitcoin"><span class="brackets"><a class="fn-backref" href="#id3">1</a></span></dt>
<dd><p>Bitcoin Whitepaper, S.Nakamoto, 2008:
......@@ -1361,7 +1361,7 @@ R.I.M.Dunbar, Journal of Human Evolution, 1992</p>
</ul>
</li>
<li><a class="reference internal" href="#conclusion">Conclusion</a></li>
<li><a class="reference internal" href="#sources">Sources :</a></li>
<li><a class="reference internal" href="#sources">Sources</a></li>
</ul>
</li>
</ul>
......@@ -1399,7 +1399,7 @@ R.I.M.Dunbar, Journal of Human Evolution, 1992</p>
</div>
<div class="footer" role="contentinfo">
&#169; Copyright 2020, Matograine.
Created using <a href="https://www.sphinx-doc.org/">Sphinx</a> 3.1.1.
Created using <a href="https://www.sphinx-doc.org/">Sphinx</a> 3.1.2.
</div>
</body>
</html>
\ No newline at end of file
\relax
\providecommand\hyper@newdestlabel[2]{}
\@nameuse{bbl@beforestart}
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
\global\let\oldcontentsline\contentsline
......@@ -105,11 +106,11 @@
\newlabel{index:id16}{{4.6.6}{16}{Rule of the time period between two certification issuances. (\sphinxstyleliteralintitle {\sphinxupquote {sigPeriod}})}{subsection.4.6.6}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.7}Expiry of a certification issuance (\sphinxstyleliteralintitle {\sphinxupquote {sigWindow}})}{16}{subsection.4.6.7}\protected@file@percent }
\newlabel{index:expiry-of-a-certification-issuance-sigwindow}{{4.6.7}{16}{Expiry of a certification issuance (\sphinxstyleliteralintitle {\sphinxupquote {sigWindow}})}{subsection.4.6.7}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.8}Lifespan of a \IeC {\textquoteleft }pending\IeC {\textquoteright } identity (\sphinxstyleliteralintitle {\sphinxupquote {idtyWindow}})}{16}{subsection.4.6.8}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.8}Lifespan of a ‘pending’ identity (\sphinxstyleliteralintitle {\sphinxupquote {idtyWindow}})}{16}{subsection.4.6.8}\protected@file@percent }
\newlabel{index:lifespan-of-a-pending-identity-idtywindow}{{4.6.8}{16}{Lifespan of a ‘pending’ identity (\sphinxstyleliteralintitle {\sphinxupquote {idtyWindow}})}{subsection.4.6.8}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.7}Details on some of the WoT\IeC {\textquoteright }s peculiarities at the genesis block}{16}{section.4.7}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.7}Details on some of the WoTs peculiarities at the genesis block}{16}{section.4.7}\protected@file@percent }
\newlabel{index:details-on-some-of-the-wots-peculiarities-at-the-genesis-block}{{4.7}{16}{Details on some of the WoT’s peculiarities at the genesis block}{section.4.7}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.8}Why these rules and application cases in the \IeC {\u G}1}{16}{section.4.8}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.8}Why these rules and application cases in the Ğ1}{16}{section.4.8}\protected@file@percent }
\newlabel{index:why-these-rules-and-application-cases-in-the-g1}{{4.8}{16}{Why these rules and application cases in the Ğ1}{section.4.8}{}}
\newlabel{index:id17}{{4.8}{16}{Why these rules and application cases in the Ğ1}{section.4.8}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.1}Distance and maximum size}{16}{subsection.4.8.1}\protected@file@percent }
......@@ -125,13 +126,13 @@
\newlabel{equation:index:SybilSize50}{{4.6}{18}{Distance and maximum size}{equation.4.8.6}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.2}Time is our friend}{18}{subsection.4.8.2}\protected@file@percent }
\newlabel{index:time-is-our-friend}{{4.8.2}{18}{Time is our friend}{subsection.4.8.2}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces size of the WoT according to sigPeriod and stepAttackers}}{19}{figure.4.5}\protected@file@percent }
\newlabel{index:id28}{{5}{19}{size of the WoT according to sigPeriod and stepAttackers}{figure.4.5}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces size of the WoT according to sigPeriod and stepAttackers}}{18}{figure.4.5}\protected@file@percent }
\newlabel{index:id28}{{5}{18}{size of the WoT according to sigPeriod and stepAttackers}{figure.4.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.3}Trust me now, trust me forever? (\sphinxstyleliteralintitle {\sphinxupquote {sigValidity}}, \sphinxstyleliteralintitle {\sphinxupquote {msValidity}})}{19}{subsection.4.8.3}\protected@file@percent }
\newlabel{index:trust-me-now-trust-me-forever-sigvalidity-msvalidity}{{4.8.3}{19}{Trust me now, trust me forever? (\sphinxstyleliteralintitle {\sphinxupquote {sigValidity}}, \sphinxstyleliteralintitle {\sphinxupquote {msValidity}})}{subsection.4.8.3}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.4}Keeping the pools free of information glut (\sphinxstyleliteralintitle {\sphinxupquote {idtyWindow}}, \sphinxstyleliteralintitle {\sphinxupquote {sigWindow}}, \sphinxstyleliteralintitle {\sphinxupquote {msWindow}})}{19}{subsection.4.8.4}\protected@file@percent }
\newlabel{index:keeping-the-pools-free-of-information-glut-idtywindow-sigwindow-mswindow}{{4.8.4}{19}{Keeping the pools free of information glut (\sphinxstyleliteralintitle {\sphinxupquote {idtyWindow}}, \sphinxstyleliteralintitle {\sphinxupquote {sigWindow}}, \sphinxstyleliteralintitle {\sphinxupquote {msWindow}})}{subsection.4.8.4}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.5}Avoiding single members from \IeC {\textquoteleft }knowing too many people\IeC {\textquoteright } (\sphinxstyleliteralintitle {\sphinxupquote {sigStock}})}{20}{subsection.4.8.5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.5}Avoiding single members from knowing too many people (\sphinxstyleliteralintitle {\sphinxupquote {sigStock}})}{20}{subsection.4.8.5}\protected@file@percent }
\newlabel{index:avoiding-single-members-from-knowing-too-many-people-sigstock}{{4.8.5}{20}{Avoiding single members from ‘knowing too many people’ (\sphinxstyleliteralintitle {\sphinxupquote {sigStock}})}{subsection.4.8.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.6}Avoiding locking minorities (\sphinxstyleliteralintitle {\sphinxupquote {xpercent}})}{20}{subsection.4.8.6}\protected@file@percent }
\newlabel{index:avoiding-locking-minorities-xpercent}{{4.8.6}{20}{Avoiding locking minorities (\sphinxstyleliteralintitle {\sphinxupquote {xpercent}})}{subsection.4.8.6}{}}
......@@ -145,7 +146,7 @@
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Why do we need Proof of Work?}{21}{section.5.1}\protected@file@percent }
\newlabel{index:why-do-we-need-proof-of-work}{{5.1}{21}{Why do we need Proof of Work?}{section.5.1}{}}
\newlabel{index:why-proof-of-work}{{5.1}{21}{Why do we need Proof of Work?}{section.5.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Only members can \IeC {\textquotedblleft }mine\IeC {\textquotedblright }}{22}{section.5.2}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Only members can “mine”}{22}{section.5.2}\protected@file@percent }
\newlabel{index:only-members-can-mine}{{5.2}{22}{Only members can “mine”}{section.5.2}{}}
\newlabel{index:id21}{{5.2}{22}{Only members can “mine”}{section.5.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}How does it work?}{22}{section.5.3}\protected@file@percent }
......@@ -167,7 +168,7 @@
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}Understanding \sphinxstyleliteralintitle {\sphinxupquote {exFact}}, the exclusion factor}{23}{subsection.5.4.1}\protected@file@percent }
\newlabel{index:understanding-exfact-the-exclusion-factor}{{5.4.1}{23}{Understanding \sphinxstyleliteralintitle {\sphinxupquote {exFact}}, the exclusion factor}{subsection.5.4.1}{}}
\newlabel{index:the-exclusion-factor}{{5.4.1}{23}{Understanding \sphinxstyleliteralintitle {\sphinxupquote {exFact}}, the exclusion factor}{subsection.5.4.1}{}}
\@writefile{toc}{\contentsline {subsubsection}{What is intended by \IeC {\textquotedblleft }the number of members forging\IeC {\textquotedblright } ?}{24}{subsubsection*.5}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{What is intended by the number of members forging?}{24}{subsubsection*.5}\protected@file@percent }
\newlabel{index:what-is-intended-by-the-number-of-members-forging}{{5.4.1}{24}{What is intended by “the number of members forging”?}{subsubsection*.5}{}}
\@writefile{toc}{\contentsline {subsubsection}{Current window}{24}{subsubsection*.6}\protected@file@percent }
\newlabel{index:current-window}{{5.4.1}{24}{Current window}{subsubsection*.6}{}}
......@@ -187,8 +188,8 @@
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{index:conclusion}{{6}{27}{Conclusion}{chapter.6}{}}
\newlabel{index:id22}{{6}{27}{Conclusion}{chapter.6}{}}
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Sources :}{29}{chapter.7}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Sources}{29}{chapter.7}\protected@file@percent }
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{index:sources}{{7}{29}{Sources :}{chapter.7}{}}
\newlabel{index:id23}{{7}{29}{Sources :}{chapter.7}{}}
\newlabel{index:sources}{{7}{29}{Sources}{chapter.7}{}}
\newlabel{index:id23}{{7}{29}{Sources}{chapter.7}{}}
This is makeindex, version 2.15 [TeX Live 2019/dev] (kpathsea + Thai support).
This is makeindex, version 2.15 [TeX Live 2020] (kpathsea + Thai support).
Scanning style file ./python.ist.......done (7 attributes redefined, 0 ignored).
Scanning input file dunitertechnicaldescription.idx...done (0 entries accepted, 0 rejected).
Nothing written in dunitertechnicaldescription.ind.
......
\BOOKMARK [0][-]{chapter.1}{\376\377\000I\000n\000t\000r\000o\000d\000u\000c\000t\000i\000o\000n}{}% 1
\BOOKMARK [0][-]{chapter.2}{\376\377\000S\000t\000a\000t\000e\000\040\000o\000f\000\040\000t\000h\000e\000\040\000a\000r\000t\000\040\000:\000\040\000B\000i\000t\000c\000o\000i\000n\000\040\000c\000a\000s\000e}{}% 2
\BOOKMARK [1][-]{section.2.1}{\376\377\000M\000o\000n\000e\000t\000a\000r\000y\000\040\000c\000r\000e\000a\000t\000i\000o\000n\000\040\000o\000f\000\040\000B\000i\000t\000c\000o\000i\000n\000\040\000:\000\040\000a\000\040\000s\000p\000a\000c\000e\000-\000t\000i\000m\000e\000\040\000a\000s\000y\000m\000m\000e\000t\000r\000y}{chapter.2}% 3
\BOOKMARK [1][-]{section.2.2}{\376\377\000P\000r\000o\000o\000f\000-\000o\000f\000-\000W\000o\000r\000k\000\040\000m\000i\000n\000i\000n\000g\000\040\000:\000\040\000a\000\040\000p\000o\000w\000e\000r\000\040\000r\000a\000c\000e}{chapter.2}% 4
\BOOKMARK [0][-]{chapter.2}{\376\377\000S\000t\000a\000t\000e\000\040\000o\000f\000\040\000t\000h\000e\000\040\000a\000r\000t\000:\000\040\000B\000i\000t\000c\000o\000i\000n\000\040\000c\000a\000s\000e}{}% 2
\BOOKMARK [1][-]{section.2.1}{\376\377\000M\000o\000n\000e\000t\000a\000r\000y\000\040\000c\000r\000e\000a\000t\000i\000o\000n\000\040\000o\000f\000\040\000B\000i\000t\000c\000o\000i\000n\000:\000\040\000a\000\040\000s\000p\000a\000c\000e\000-\000t\000i\000m\000e\000\040\000a\000s\000y\000m\000m\000e\000t\000r\000y}{chapter.2}% 3
\BOOKMARK [1][-]{section.2.2}{\376\377\000P\000r\000o\000o\000f\000-\000o\000f\000-\000W\000o\000r\000k\000\040\000m\000i\000n\000i\000n\000g\000:\000\040\000a\000\040\000p\000o\000w\000e\000r\000\040\000r\000a\000c\000e}{chapter.2}% 4
\BOOKMARK [0][-]{chapter.3}{\376\377\000D\000u\000n\000i\000t\000e\000r\000s\000\040\000B\000l\000o\000c\000k\000c\000h\000a\000i\000n}{}% 5
\BOOKMARK [1][-]{section.3.1}{\376\377\000S\000p\000a\000m\000\040\000c\000o\000u\000n\000t\000e\000r\000m\000e\000a\000s\000u\000r\000e\000s}{chapter.3}% 6
\BOOKMARK [1][-]{section.3.2}{\376\377\000S\000c\000a\000l\000i\000n\000g}{chapter.3}% 7
\BOOKMARK [0][-]{chapter.4}{\376\377\000D\000u\000n\000i\000t\000e\000r\000\040\000W\000e\000b\000\040\000o\000f\000\040\000T\000r\000u\000s\000t}{}% 8
\BOOKMARK [1][-]{section.4.1}{\376\377\000B\000a\000s\000i\000c\000\040\000P\000r\000i\000n\000c\000i\000p\000l\000e\000s}{chapter.4}% 9
\BOOKMARK [1][-]{section.4.2}{\376\377\000W\000h\000y\000\040\000d\000o\000\040\000w\000e\000\040\000n\000e\000e\000d\000\040\000a\000\040\000W\000e\000b\000\040\000o\000f\000\040\000T\000r\000u\000s\000t\000\040\000?}{chapter.4}% 10
\BOOKMARK [1][-]{section.4.2}{\376\377\000W\000h\000y\000\040\000d\000o\000\040\000w\000e\000\040\000n\000e\000e\000d\000\040\000a\000\040\000W\000e\000b\000\040\000o\000f\000\040\000T\000r\000u\000s\000t\000?}{chapter.4}% 10
\BOOKMARK [1][-]{section.4.3}{\376\377\000T\000h\000e\000\040\000i\000m\000p\000o\000r\000t\000a\000n\000c\000e\000\040\000o\000f\000\040\000h\000a\000v\000i\000n\000g\000\040\000o\000u\000r\000\040\000o\000w\000n\000\040\000c\000e\000r\000t\000i\000f\000i\000c\000a\000t\000i\000o\000n\000\040\000s\000y\000s\000t\000e\000m}{chapter.4}% 11
\BOOKMARK [1][-]{section.4.4}{\376\377\000A\000\040\000f\000e\000w\000\040\000f\000o\000u\000n\000d\000a\000t\000i\000o\000n\000a\000l\000\040\000c\000o\000n\000c\000e\000p\000t\000s\000\040\000o\000n\000\040\000g\000r\000a\000p\000h\000\040\000t\000h\000e\000o\000r\000y\000\040\000:\000\040\000a\000\040\000b\000i\000t\000\040\000o\000f\000\040\000v\000o\000c\000a\000b\000u\000l\000a\000r\000y}{chapter.4}% 12
\BOOKMARK [1][-]{section.4.4}{\376\377\000A\000\040\000f\000e\000w\000\040\000f\000o\000u\000n\000d\000a\000t\000i\000o\000n\000a\000l\000\040\000c\000o\000n\000c\000e\000p\000t\000s\000\040\000o\000n\000\040\000g\000r\000a\000p\000h\000\040\000t\000h\000e\000o\000r\000y\000:\000\040\000a\000\040\000b\000i\000t\000\040\000o\000f\000\040\000v\000o\000c\000a\000b\000u\000l\000a\000r\000y}{chapter.4}% 12
\BOOKMARK [1][-]{section.4.5}{\376\377\000D\000e\000f\000i\000n\000i\000t\000i\000o\000n\000\040\000o\000f\000\040\000t\000h\000e\000\040\000D\000u\000n\000i\000t\000e\000r\000\040\000W\000e\000b\000\040\000o\000f\000\040\000T\000r\000u\000s\000t}{chapter.4}% 13
\BOOKMARK [1][-]{section.4.6}{\376\377\000E\000x\000p\000l\000o\000r\000i\000n\000g\000\040\000t\000h\000e\000\040\000r\000u\000l\000e\000s\000\040\000b\000e\000h\000i\000n\000d\000\040\000a\000\040\000D\000u\000n\000i\000t\000e\000r\000\040\000W\000e\000b\000\040\000o\000f\000\040\000T\000r\000u\000s\000t}{chapter.4}% 14
\BOOKMARK [1][-]{section.4.7}{\376\377\000D\000e\000t\000a\000i\000l\000s\000\040\000o\000n\000\040\000s\000o\000m\000e\000\040\000o\000f\000\040\000t\000h\000e\000\040\000W\000o\000T\040\031\000s\000\040\000p\000e\000c\000u\000l\000i\000a\000r\000i\000t\000i\000e\000s\000\040\000a\000t\000\040\000t\000h\000e\000\040\000g\000e\000n\000e\000s\000i\000s\000\040\000b\000l\000o\000c\000k}{chapter.4}% 15
\BOOKMARK [1][-]{section.4.8}{\376\377\000W\000h\000y\000\040\000t\000h\000e\000s\000e\000\040\000r\000u\000l\000e\000s\000\040\000a\000n\000d\000\040\000a\000p\000p\000l\000i\000c\000a\000t\000i\000o\000n\000\040\000c\000a\000s\000e\000s\000\040\000i\000n\000\040\000t\000h\000e\000\040\001\036\0001}{chapter.4}% 16
\BOOKMARK [0][-]{chapter.5}{\376\377\000P\000r\000o\000o\000f\000\040\000o\000f\000\040\000W\000o\000r\000k\000\040\000w\000i\000t\000h\000\040\000p\000e\000r\000s\000o\000n\000a\000l\000\040\000d\000i\000f\000f\000i\000c\000u\000l\000t\000y}{}% 17
\BOOKMARK [1][-]{section.5.1}{\376\377\000W\000h\000y\000\040\000d\000o\000\040\000w\000e\000\040\000n\000e\000e\000d\000\040\000P\000r\000o\000o\000f\000\040\000o\000f\000\040\000W\000o\000r\000k\000\040\000?}{chapter.5}% 18
\BOOKMARK [1][-]{section.5.1}{\376\377\000W\000h\000y\000\040\000d\000o\000\040\000w\000e\000\040\000n\000e\000e\000d\000\040\000P\000r\000o\000o\000f\000\040\000o\000f\000\040\000W\000o\000r\000k\000?}{chapter.5}% 18
\BOOKMARK [1][-]{section.5.2}{\376\377\000O\000n\000l\000y\000\040\000m\000e\000m\000b\000e\000r\000s\000\040\000c\000a\000n\000\040\040\034\000m\000i\000n\000e\040\035}{chapter.5}% 19
\BOOKMARK [1][-]{section.5.3}{\376\377\000H\000o\000w\000\040\000d\000o\000e\000s\000\040\000i\000t\000\040\000w\000o\000r\000k\000\040\000?}{chapter.5}% 20
\BOOKMARK [1][-]{section.5.3}{\376\377\000H\000o\000w\000\040\000d\000o\000e\000s\000\040\000i\000t\000\040\000w\000o\000r\000k\000?}{chapter.5}% 20
\BOOKMARK [1][-]{section.5.4}{\376\377\000P\000e\000r\000s\000o\000n\000a\000l\000i\000s\000e\000d\000\040\000d\000i\000f\000f\000i\000c\000u\000l\000t\000y}{chapter.5}% 21
\BOOKMARK [0][-]{chapter.6}{\376\377\000C\000o\000n\000c\000l\000u\000s\000i\000o\000n}{}% 22
\BOOKMARK [0][-]{chapter.7}{\376\377\000S\000o\000u\000r\000c\000e\000s\000\040\000:}{}% 23
\BOOKMARK [0][-]{chapter.7}{\376\377\000S\000o\000u\000r\000c\000e\000s}{}% 23
......@@ -137,7 +137,7 @@ will use a Web of Trust with specific rules. As the number of members
may evolve, the Universal Dividend has to be created according to the
formula:
\begin{equation}\label{equation:index:ud}
\begin{split}UD(t+1) = UD(t) + c^2 \times {M(t) \over N(t)}\end{split}
\begin{split}\mathit{UD}(t+1) = \mathit{UD}(t) + c^2 \times {M(t) \over N(t)}\end{split}
\end{equation}
Duniter is based on a decentralized Blockchain. This technical choice
allows irreversibility of transaction and uncensorability of trades and
......@@ -455,7 +455,7 @@ legitimate identity.
\end{itemize}
The aim of the WoT is to identify a blockchain account to a living
human. According to Lauterbach et.al %
human. According to Lauterbach et al. %
\begin{footnote}[7]\sphinxAtStartFootnote
Surfing a Web of Trust, Reputation and Reciprocity on
CouchSurfing.com, D.Lauterbach, H.Truong, T.Shah, L.Adamic:
......@@ -735,7 +735,7 @@ defining what a ‘referent member’ is:
Let D be the total of degrees of a member, and N the number of members.
A member is said to be ‘referent’ if and only if:
\begin{equation}\label{equation:index:referent_member}
\begin{split}D \geq {CEIL (N^{-1} \over stepmax)}\end{split}
\begin{split}D \geq {CEIL ({N^{-1} \over stepmax})}\end{split}
\end{equation}
As the size of the web will grow this number will grow too, meaning it will
take more certification issuances to become a referent member. The
......@@ -1599,13 +1599,13 @@ libre Currency can be issued thanks to the Universal Dividend.
More than that, Duniter proposes a new model for securing a Blockchain
in an efficient and decentralized way. Basing the security on a Web of
Trust with an individualised security makes the calculation rules more
fair. A side\sphinxhyphen{}effect of this choice is a network consisting mostly of
fair. A side effect of this choice is a network consisting mostly of
low\sphinxhyphen{}end computers, maintaining a good security and helping
decentralization of calculation.
The ultimate goal of Duniter project is to allow people to participate
in a libre economy, thanks to a libre currency. What is a libre economy
? The Relative Theory of Money defines it through four economic
in a libre economy, thanks to a libre currency. What is a libre economy?
The Relative Theory of Money defines it through four economic
liberties:
\begin{itemize}
\item {}
......@@ -1633,7 +1633,7 @@ water source in a desert) so no more is available to the others. Now you
get it, this is the goal: free economy through free currency.
\chapter{Sources :}
\chapter{Sources}
\label{\detokenize{index:sources}}\label{\detokenize{index:id23}}
......
......@@ -29,19 +29,19 @@
\contentsline {subsection}{\numberline {4.6.5}Rule of limited supply of active certifications (\sphinxstyleliteralintitle {\sphinxupquote {sigStock}})}{15}{subsection.4.6.5}%
\contentsline {subsection}{\numberline {4.6.6}Rule of the time period between two certification issuances. (\sphinxstyleliteralintitle {\sphinxupquote {sigPeriod}})}{16}{subsection.4.6.6}%
\contentsline {subsection}{\numberline {4.6.7}Expiry of a certification issuance (\sphinxstyleliteralintitle {\sphinxupquote {sigWindow}})}{16}{subsection.4.6.7}%
\contentsline {subsection}{\numberline {4.6.8}Lifespan of a \IeC {\textquoteleft }pending\IeC {\textquoteright } identity (\sphinxstyleliteralintitle {\sphinxupquote {idtyWindow}})}{16}{subsection.4.6.8}%
\contentsline {section}{\numberline {4.7}Details on some of the WoT\IeC {\textquoteright }s peculiarities at the genesis block}{16}{section.4.7}%
\contentsline {section}{\numberline {4.8}Why these rules and application cases in the \IeC {\u G}1}{16}{section.4.8}%
\contentsline {subsection}{\numberline {4.6.8}Lifespan of a ‘pending’ identity (\sphinxstyleliteralintitle {\sphinxupquote {idtyWindow}})}{16}{subsection.4.6.8}%
\contentsline {section}{\numberline {4.7}Details on some of the WoTs peculiarities at the genesis block}{16}{section.4.7}%
\contentsline {section}{\numberline {4.8}Why these rules and application cases in the Ğ1}{16}{section.4.8}%
\contentsline {subsection}{\numberline {4.8.1}Distance and maximum size}{16}{subsection.4.8.1}%
\contentsline {subsection}{\numberline {4.8.2}Time is our friend}{18}{subsection.4.8.2}%
\contentsline {subsection}{\numberline {4.8.3}Trust me now, trust me forever? (\sphinxstyleliteralintitle {\sphinxupquote {sigValidity}}, \sphinxstyleliteralintitle {\sphinxupquote {msValidity}})}{19}{subsection.4.8.3}%
\contentsline {subsection}{\numberline {4.8.4}Keeping the pools free of information glut (\sphinxstyleliteralintitle {\sphinxupquote {idtyWindow}}, \sphinxstyleliteralintitle {\sphinxupquote {sigWindow}}, \sphinxstyleliteralintitle {\sphinxupquote {msWindow}})}{19}{subsection.4.8.4}%
\contentsline {subsection}{\numberline {4.8.5}Avoiding single members from \IeC {\textquoteleft }knowing too many people\IeC {\textquoteright } (\sphinxstyleliteralintitle {\sphinxupquote {sigStock}})}{20}{subsection.4.8.5}%
\contentsline {subsection}{\numberline {4.8.5}Avoiding single members from knowing too many people (\sphinxstyleliteralintitle {\sphinxupquote {sigStock}})}{20}{subsection.4.8.5}%
\contentsline {subsection}{\numberline {4.8.6}Avoiding locking minorities (\sphinxstyleliteralintitle {\sphinxupquote {xpercent}})}{20}{subsection.4.8.6}%
\contentsline {subsection}{\numberline {4.8.7}Spam protection with (\sphinxstyleliteralintitle {\sphinxupquote {msPeriod}})}{20}{subsection.4.8.7}%
\contentsline {chapter}{\numberline {5}Proof of Work with personal difficulty}{21}{chapter.5}%
\contentsline {section}{\numberline {5.1}Why do we need Proof of Work?}{21}{section.5.1}%
\contentsline {section}{\numberline {5.2}Only members can \IeC {\textquotedblleft }mine\IeC {\textquotedblright }}{22}{section.5.2}%
\contentsline {section}{\numberline {5.2}Only members can “mine”}{22}{section.5.2}%
\contentsline {section}{\numberline {5.3}How does it work?}{22}{section.5.3}%
\contentsline {subsection}{\numberline {5.3.1}The hash (aka digest)}{22}{subsection.5.3.1}%
\contentsline {subsection}{\numberline {5.3.2}The common difficulty}{22}{subsection.5.3.2}%
......@@ -49,9 +49,9 @@
\contentsline {subsubsection}{The Nonce}{23}{subsubsection*.4}%
\contentsline {section}{\numberline {5.4}Personalised difficulty}{23}{section.5.4}%
\contentsline {subsection}{\numberline {5.4.1}Understanding \sphinxstyleliteralintitle {\sphinxupquote {exFact}}, the exclusion factor}{23}{subsection.5.4.1}%
\contentsline {subsubsection}{What is intended by \IeC {\textquotedblleft }the number of members forging\IeC {\textquotedblright } ?}{24}{subsubsection*.5}%
\contentsline {subsubsection}{What is intended by the number of members forging?}{24}{subsubsection*.5}%
\contentsline {subsubsection}{Current window}{24}{subsubsection*.6}%
\contentsline {subsubsection}{exFact and the personalised difficulty}{24}{subsubsection*.7}%
\contentsline {subsection}{\numberline {5.4.2}The handicap}{25}{subsection.5.4.2}%
\contentsline {chapter}{\numberline {6}Conclusion}{27}{chapter.6}%
\contentsline {chapter}{\numberline {7}Sources :}{29}{chapter.7}%
\contentsline {chapter}{\numberline {7}Sources}{29}{chapter.7}%