Sort:  
There are 4 pages
Pages

Hi, @taskmaster4450le,

This post has been voted on by @darkcloaks because you are an active member of the Darkcloaks gaming community.


Get started with Darkcloaks today, and follow us on Inleo for the latest updates.

Rather than designing movements around its robotic structure, Clone first replicated human anatomy and then enabled natural motion using artificial muscles. The result is strikingly realistic—almost uncanny in its resemblance to the human body.

Building on its expertise, Clone Robotics has now developed a humanoid designed to walk naturally. This is achieved through Clone’s move from rigid actuators to soft, water-powered artificial muscles, aiming for more human-like movement.

Advanced artificial muscles
Clone Robotics plans to advance humanoid robotics with its artificial muscle technology, Myofiber. It animates the skeleton by attaching musculotendon units to anatomically precise points on the bones.

These monolithic units eliminate tendon failures and mimic the desirable traits of mammalian skeletal muscles, such as a response time under 50ms, over 30 percent unloaded contraction, and at least 2.2 pounds (1 kilogram) of contraction force for a 3-gram muscle fiber.

According to the firm, Myofiber is the only artificial muscle capable of achieving such power, speed, and efficiency.

The Clone’s skeleton includes all 206 bones of the human body, with minor bone fusions, and features fully articulated joints, artificial ligaments, and connective tissues.

Queries in Cosmos are unable to cryptographically authenticate the querier’s identity; Secret Network solves this by allowing contracts to have an encrypted viewing key that is used to validate the identity of the caller. This viewing key allows for decryption of a range of associated data for any given address. Secret Contracts allowance feature lets accounts designate a portion of their balance to other accounts. This is similar to the allowance feature of ERC-20 contracts, enabling other contracts to manage a portion of the addresses balance. To avoid leaking data, Secret Contracts can enforce constant length messages via padding. The output of transactions can include the following: callbacks to another contract call, a contract init, staking transactions, votes on proposals, instructions for sending funds from the contract’s wallet, an error section, and a data section of free-form bytes to be interpreted by the client or dApp with added support for additional types in the future

Secret Contract State Encryption
While executing a function call inside a TEE of a node as part of a transaction, the Secret Contract code can call the following functions: write_db(field_name, value), read_db(field_name), and remove_db(field_name). Collectively, Secret Contracts’ state is stored on-chain inside a key-value store. As such, the field name remains constant between calls. The encryption key for the functional calls uses HKDF-SHA256 from the consensus state IKM, field name, and the contract key. Additional data can also be employed to prevent leaking information about the same value written to the same key at different times. Contract keys are the combination of a signer id as well as an authenticated contract key.

The goal of the contract key is to give each Secret Contract a unique and unforgeable encryption key. As a property, unforgeable is imperative to making sure malicious validators are unable to locally encrypt transactions with their own encryption key and then decrypt the resulting state with the fake key. Additionally, each contract must be unique in order to make sure the state of two contracts with identical code are different.

When a contract is initialized from a validator node – inside the node’s TEE, a contract key is derived using HMAC-SHA256 from the signer id as well as the authentication key. An authentication key is derived using HKDF from an HKDF salt in addition to an IKM that consists of the concatenation of the consensus state IKM and the signer id. Any time a contract execution is called, the contract key of the Secret Contract is sent to every validator node of the network. Upon receiving the contract key, an assertion/check is made to make sure the received contract key matches the expected value.

Theoretical Attacks
Evaluating potential attack vectors is integral to the formation of a protocol that is designed to be the fundamental privacy layer for all blockchain protocols. It is important to note that the majority of theoretical attacks that occur on TEEs (SGX in particular) happen within research labs. In reality, common attack vectors occur through implementation faults that leverage holes in protocol design. Similar to other protocols, decentralization helps secure the network’s consensus layer against Byzantine attacks. As a starting point examining non-consensus layer attacks, these were assumptions made during the design of the Secret Network protocol.

(1) Each node is untrusted and is run by a malicious host

(2) Each node is equipped with a secure enclave (SGX) that can execute code/data in a trusted manner such that the data cannot be observed or manipulated by the host

(3) Assumed PKI (Public Key Infrastructure) and cryptographic primitives are secure (signatures, encryption, etc.)

(4) Assumed there is shared consensus in the Secret Network

Here is a list of compiled theoretical attacks:

(1) Deanonymizing with ciphertext byte count

(2) Two contracts with the same contract key deanonymize state

(3) Transaction replay attack

(4) Search-to-decision millionaire problem

(5) Partial storage rollback during contract runtime

(6) Transaction output data leakage

(7) TEE vulnerability enabling a Byzantine node to acquire the consensus seed from the enclave

Governance
Because Secret Network uses the Cosmos SDK, there is a heavy crossover between other Cosmos protocols and Secret Network with both the design and implementation of governance. Current Secret Network governance parameters, which are subject to change, are as follows:

Deposit period – 1 week Voting period – 1 week Minimum deposit amount – 1000 SCRT Quorum – 33.4% Threshold – 50% Veto – 33.4%

There are five stages to on-chain governance proposals with Secret Network: submission, deposits, voting, tallying, and implementation. Submission can be done by any user, with the caveat that nothing is broadcasted on-chain until a proposal reaches the minimum deposit amount. This is in place to protect the network from proposal spam. Anyone can contribute to the deposit minimum. If the proposal does not reach the minimum deposit threshold, deposits are refunded. If the proposal is approved or if the proposal is rejected but not vetoed, the deposits will automatically be refunded to the respective proposal depositors. Critical to note is that if a proposal is vetoed with a supermajority, deposits are burned. Upon reaching the minimum deposit required, a one week voting period begins. During this timeframe, bonded SCRT holders are able to cast their vote with one of four options – yes, no, no with veto, and abstain.

Only bonded tokens can participate in Secret Network governance; this encourages users to bond their tokens to the network, which is an essential part of securing the network. Voting power is measured in terms of bonded SCRT. Delegators inherit the vote of the validator they are delegated to unless the delegator casts their own vote (which automatically overwrites the validator’s voting decision). Tallying the results of a proposal vote can result in an accepted proposal if the following requirements are met: quorum, threshold, and no veto. The quorum requirement programmatically checks that more than 33.4% of total bonded tokens participated in the vote by the end of the one week voting period.

The threshold requirement programmatically checks that more than 50% of tokens that participated in the vote, after exclusion of abstain votes, voted in favor of the proposal. The no veto requirement confirms that less than 33.4% of bonded tokens that participated in the vote, after exclusion of abstain votes, vetoed the proposal. Finally, the code the proposal wishes to modify is altered by developers of the network and implemented during the next hard fork of the network – the updated version of the protocol then gets pushed to all nodes supporting the network.

Tokenomics
Secret Network leverages inflation, block rewards, and staking to incentivize SCRT holders and validators to bond their tokens to the network. The less supply that is in circulation, the more difficult it is for a Byzantine actor to successfully execute a Byzantine attack against the Secret Network consensus layer. In addition, in order to drive adoption of the protocol, a generous inflation rate helps pull users, developers, and stakers into the network with the understanding that the inflation rate can be modified in the future through a governance proposal. Secret Network has a variable inflation rate that ranges from 7% – 15% based on the ratio of bonded to unbonded SCRT in relation to the target goal % bonded rate which is 67%. Secret Network has a twenty-one day unbonding period, with a circulating supply of approximately 70 million SCRT and a total supply of approximately 190 million SCRT.

Validator nodes can charge a commission rate on delegated SCRT. Currently, the commission rate floor is 0%, with a maximum rate of 20%. The commission rate of validators is only capable of changing by up to 1% every twenty-four hours. Separate from commission rate, there are two additional sets of fees on earned block rewards: the community fee (2%) and the Secret Foundation fee (15%). The annual approximate ROI for Secret Network staking ranges between 22% to 27% depending on the validator of choice. The community fee gets pulled from all block rewards and is sent to a pool of funds known as the Community Pool. This pool is used to help fund on-chain governance proposals that help advance the Secret Network ecosystem and protocol. No single entity owns these funds; they are governed in a completely decentralized fashion, empowering the community to voice their opinions and help shape the identity of Secret Network.

The Secret Foundation is an organization dedicated to building, researching, and scaling open-source, privacy-centric technologies for the public good. The Secret Foundation helps establish efficient and effective governance practices for the community and the Foundation itself. Additionally, it produces educational content and supports a range of committees that are helping empower individuals and projects created organically within the Secret Network community. The foundation uses its block reward fees to aggressively expand the Secret Network ecosystem which includes direct support for valuable community contributors.

Use Cases
Secret Contracts allow developers to create contracts with control over what subsets of data are encrypted. Due to the completely transparent nature of public blockchains, there has never been a protocol that allows for granular control over data transparency as with the Secret Network protocol. The first proof-of-concept use case to rise to the surface was SafeTrace. SafeTrace is a privacy-preserving contact tracing application that leverages the TEEs of Secret Network to enable summarization of sensitive data, individual high-risk interaction awareness, and data set research empowerment without ever exposing an individual’s private data. Computations are run within an SGX enclave, with summary results as output – safeguarding against any single individual’s data sovereignty being abused. Next came simple Secret dApps such as SecretPoker and rock-paper-scissors.

This allows users to play against each other with assurance that no one is able to front-run data or modify decision making due to data that should not be publicly visible within a game environment. Next, the SNIP-20 standard was created which enabled the creation of private, fungible tokens using Secret Contracts. Combining the programmability of ERC-20s with the privacy of Zcash or Monero, Secret Tokens unlock important use cases and create new value. This allowed tokens not native to Secret Network to be able to gain wrapped privacy properties enabled by Secret Contracts using IBC. Examples of SNIP-20 tokens were secretEthereum, secretDai, secretLink, secretMKR, etc. Secret Auctions are another Secret Contract created in 2020. When a user interacts with an exchange, individuals should be able to query multiple OTC exchanges for their price, and then execute the trade based on the best price.

Throughout this entire process, OTC desks shouldn’t know each other’s bids. If the OTC exchanges are aware of each other’s bids then there is potential for collusion against the user. Secret Actions use Secret Contracts to hide this type of vulnerable data in a neutral and programmatic fashion – creating a neutral program that can be trusted by mutually distrustful and privacy-aware entities. Secret Auctions have the potential to turn into Secret Dark Pools which would be a significant contribution to the DeFi ecosystems of the blockchain domain. PadLock helps artists monetize creative work via the decentralized web. Users can buy or sell access to exclusive content hosted on IPFS and Filecoin. The app will generate unique encryption and decryption keys and store them in the encrypted state of a privacy-preserving smart contract on Secret Network.

In other words, PadLock uses Secret Contracts to enable programmatic contract interactions that unlock access control via decryption of viewing keys. Secret Non-Fungible Tokens (NFTs) will allow for the creation of NFTs that have verifiable ownership of goods and experiences without ever exposing the underlying owner or their data – all made possible with Secret Contracts. Secret Automated Market Makers (AMMs) will help prevent front-running, a problem that has plagued DeFi since its inception. Due to the public nature of blockchains, front-running attacks happen all the time. Because users can see transactions in the mem-pool and their corresponding gas prices before a block is mined, it is easy for attackers to submit a transaction with a higher gas price, which would result in their own transaction being mined first.

The result is an unfairly executed bid or ask with the foreknowledge of the incoming trade – resulting in arbitrage profit due to the modification of supply and demand on a microscale that ultimately the user has to pay for. Because a Secret AMM would keep the mempool private, front-running would be impossible by default.

The use cases of Secret Network will conceivably impact every domain impacted by blockchain. Healthcare, finance, banking, governance, communications, media, supply-chain, voting, identity-fraud, key-access control, exchanges, IoT & mesh networks, forecasting and data set analytics, music and entertainment, real-estate, insurance, wills and inheritance, charity, credit histories, crowdfunding, publishing, gaming, gambling, and messaging. Secret Network protocol leveraging TEEs is the programmable privacy de-facto standard for contract development for the future of Web 3.0.

There are 4 pages
Pages