2015-09-28

Pondering Proof of Importance

Recently, I listened to a Let's Talk Bitcoin podcast discussing NEM (New Economy Movement), a new Crypto 2.0 system. So far, I was unable to receive any detailed overview of it for the Crypto Comparison Chart, but one feature that stands out as unique to NEM is their Proof of Importance mining algorithm. Lets have a look at how it holds up in comparison to what is already out there.

Proof of Importance


The detailed overview can be found in NEM's Technical Reference document. In general, it looks like a variation of Proof of Stake that gives extra weight to accounts that are actively transacting with a lot of other accounts. The actual equations as to how the weight is calculated and how it affects who will be selected as a miner is detailed over several pages of the document.

The downside of putting extra weight on transactions between accounts on the network is that the system can be easily gamed, at least until we solve the "one-identity-per-person" problem. Creating accounts and sending transactions around is trivial, and figuring out the exact method of getting the maximum return to game the algorithm is only a matter of time. Even the document itself demonstrated that an attacker performing a sybil attack can boost their importance by about 10% in comparison to someone that just holds onto their tokens:




So all in all, the system rewards those that hold the tokens moderately. Shared wallets, exchanges and payment processors would be examples of businesses that would receive proportionally more bang for their buck as it were, but a highly-optimized attacker can still beat out the quasi-random transactions of the above businesses by always performing the optimal transactions.

Conclusions


The sybil attack vulnerability of NEM reminds me of the old problem faced by Bitcoin mining pools back in 2011 - pool hopping. If a system allows any attacker to gain an advantage over honest players in the system, the algorithm needs to be changed.

As for the rest of the NEM system - I haven't yet had the time to explore it too deeply, but it also seems to suffer from the problem of being easy to front run by the miners (or harvesters as they appear to be called in NEM).

5 comments:

  1. Why don't you regard CryptoNote as Crypto 2.0?

    ReplyDelete
    Replies
    1. Haven't heard of it before. It looks a bit like Dash - Crypto 1.0 currency focused on anonymous transfers of the native currency. Does it allow users to create their own currencies as well?

      Delete
    2. Actually, CryptoNote has nothing in common with Dash.

      Dash is a Bitcoin fork, based on CoinJoin, and CryptoNote is a completely different, non-bitcoin based tech. CryptoNote implements ring signatures and stealth addresses that allow for untraceable payments and unlinkable transactions. Would be glad to hear your thoughts on this tech maybe some time.

      PS
      The first comment is mine

      Delete
  2. Nice blog. While I agree there is an optimal spending pattern for boosting PoI, this spending pattern is in part based on the actions of others. And circling around funds back to oneself is actually harmful to one's account in most cases.

    No person has come forward claiming they have gamed POI, but since the formulas are well documented and transaction graph known on the blockchain, sooner or later somebody will reach the optimal method. I don't really consider this gaming POI as much as it is fine tuning it. Even with the best method possible to maximize benefits there is no exponential games.

    ReplyDelete
  3. Fees make gaming POI harder. Just raise fees, and reward uncles... and gaming becomes difficult.

    ReplyDelete