Protocol First, People Second
Oyster is the new paradigm for the internet economy that breaks the stalemate between advertisers and ad blockers. Website owners add the one line Oyster code to their site HTML to turn their visitors into treasure hunters that search for Oyster Pearls: the PRL token. Treasure hunting means a visitor’s browser performs light Proof of Work micro-puzzles that discover embedded PRL in the encrypted data maps of uploaded files. Storage users spend PRL to reliably and anonymously store their data as website visitors’ browsers maintain the retention of such data whilst hunting for the spent PRL.
Bruno block is maintaining anonymity to preserve the decentralisation of the project.
“People refer to me as an initial reference point for the functionality and nuances of the independently defined protocol. If I were to be compromised via coercion, it could inflict too much damage on the project during it’s infancy.”
Robust, Redundant Data Storage
Dual Ledger Integration
Treasure Hunting Algorithm
Zero Knowledge, Anonymous Storage
Open Source, Extendable, & Auditable
Intrinsic Storage-Pegged Value
Oyster Protocol Team
Oyster Protocol Q&A from IOTA Slack, Telegram & Bitcointalk answered by BRUNO BLOCK
2) even if a manual snapshot occurs, the Oyster Broker nodes would not implement the snapshot until the data is re-attached on the other side of the data reset.
3) Ultimate worst case scenario is that Oyster ‘hardforks’ and runs its own Tangle with it’s own rules.
Q. I have a question about what plans are in place to ensure file integrity while being stored on the tangle is it simply stored encrypted in full? if so, what kind of restrictions does that place on storage size cap?
A. There are embedded checksums in the data per IOTA transaction, so the data is checked on a part by part basis. Also the entire file is checksummed as a whole if the whole thing is retrieved, a checksum for the whole file is stored in the data part represented by the genesis hash.
Q. … i’m assuming that the js oneliner you have on your website performs some check that one is actually mining?i.e. what is to prevent someone from simply `curl`ing a webpage.
A. There will be an option for users to disable mining if they dont want it, which will trigger the website owners policy which may or may not block the content otherwise there is no need to monitor mining and who does what, everything is done on a best-effort basis.
Q. How do you communicate to users that this is happening and that they want to let you use their CPU/GPU? I know that the pirate bay did something like this just a few weeks ago for alt coin mining. A lot of people where very unhappy about this and felt it was very invasive. How do you ask the users if they want to opt in or not? I assume that there will be an option not to allow the site to use your computer? Otherwise you are forced to not use the site if you don’t want this to happen?
Q. If a user chooses not to opt in, what would their website experience look like? Would it still have adds then?
A. If a user chooses to opt out, the custom policy of the website owner is activated. For example, a website owner might tolerate a maximum of 20% of visitors opting out. The website owner can choose to either allow a warning notice to be displayed, display the content anyways, or disable access completely. Custom interactions can be setup on the visitors side too, for example they can opt out of all Oyster mining or add a whitelist that allows contributions to specific websites despite the general opt out.
Q. how will the resources of the computer be evaluated and used? For example if I am on a mobile device vs a desktop how will the website determine how much resources each can provide? And how will you ensure that the users experience is smooth since, depending on how much resources the website uses the computer might start to slow down.
A. There is no reliable technical way to tell the difference between internet connection types such as unlimited broadband or a limited phone data plan. However general internet speed can be deduced via tracking the average latency of connections with other nodes, which helps the algorithm deduce what it’s running on. Overall the Oyster protocol has been optimized to consume as little bandwidth as possible, this is mentioned in the whitepaper. It is reasonable to expect that bandwidth wise it would be around the same as loading image and light video advertisements. CPU can also be evaluated with JS, I’ve done it before for a project a long time ago. It essentially has a loop and if a delay starts occurring for each cycle it knows that the device is being pushed too hard. Therefore upper limits can be hardcoded to ensure the mining never disrupts any user experience.
Q. If 1 PRL = 1 GB/year of data storage, does it mean that an increase in the value of PRL becomes undesirable?
A. It means that once the network is live and retaining data (after the crowdsale), the value of PRL remains very stable and doesn’t go down or up by huge factors. This means that the opportunity to use PRL as an investment vehicle is now, since buying it later will be the investment equivalent of buying a hard drive (it will remain very consistent in price). Investing in PRL now (especially with the presale) means you are buying a token that is intrinsically pegged to a commodity, but at a fraction of that commodity’s price. This is a very strong formula for investors to make a huge profit whilst helping to jumpstart the network topology.
It’s very different from other coins as it is a protocol-function to pump and dump the coin initially, as it will always calibrate to storage prices as long as the network is running. The initial pump gives initial value to PRL, so that it is coveted by website owners who react by installing the Oyster code on their website (to earn PRL). This in turn spawns web nodes that go treasure hunting, hence retaining the data on the Tangle. Whales can dump the coin afterwards all they want, it will always self-correct back to storage prices because 1 PRL = 1GB/1 Year. This rate is hardcoded in the protocol and cannot change. This is the reason that huge bonuses have been assigned to the presale.
I just wrote about this on the Oyster blog, please read it and refer to the volleyball analogy to understand what I’m explaining: https://medium.com/oysterprotocol/intrinsic-storage-pegged-value-447d970f6d69