Reputation on the Blockchain

  • Collusion — Shilling Attack, where malicious nodes submit dishonest feedback and collude with each other to boost their own ratings or bad-mouth non-malicious nodes
  • Reputation Cashing — Agents cashing in on their good reputation to carry fraudulent transactions with higher gain
  • Strategic Deception — Establishing initial trust for new agents more dynamically (using reputation on other networks, feedback from agents that they have transacted with)
  • Faking Identity — Agents faking identities within social impact networks to steal disbursed, charitable resources
  • Align agent incentives across the network and test that incentive framework many times before deployment
  • Always incorporate of stake disincentives to put a cost of malicious behavior (through which transacting agents must stake a certain amount of capital in escrow until the transaction has been confirmed to be complete on both sides)
  • Develop a strong, statistics based reputation engine that can incorporate some level of machine learning in future iterations
  • Develop a scalable, decentralized reputation score propagation method so that the network can store historically informed reputation scores across all nodes, or so that nodes are enabled to inquire about reputation information via other nodes that have transacted with the agent in question
  • Consensys — Civil: Civil is a news media micro-economy in which journalists are directly incentivized by their readers to produce honest, reliable content. There are also news evaluator agents ensuring that the content is in fact, real. The total incentives reaped in from the work developed is divided and distributed to all contributors, from the evaluators to the authors. Dynamic, rememberable reputation is a critical platform need for Civil, as the integrity of the network relies on incentivized goodwill of the participating agents — otherwise, there is no value proposition of maintaining the integrity of the fourth estate.
  • United Nations — Blockchain Against Hunger: The UN’s refugee voucher disbursement blockchain project is one of the foremost production-ready proof-of-concepts within the broader blockchain market. Of course, the project is still operating on a private parity chain, and once the network is opened to a public blockchain, so that the UN can utilize the platform across refugee populations and participating vendors, identity security and agent reputation will be critical to ensure that resources aren’t transacted fraudulently.
  • Consensys — Virtue Poker: Virtue Poker is a P2P decentralized poker platform built on ethereum. Many of the forms of cheating on virtual poker platforms are avoidable with the implementation of reliable identity and reputation management systems. The same issues we discussed earlier, like agent collusion and multi-accounting are also readily available to malicious actors within this space.
  • Transaction Manager: The Transaction Manager consists of four components: (1) the trust value output from the Trust Evaluation Engine, (2) the transaction proof exchange component, (3) designated nodes on the overlay network, and (4) feedback admission control. The trust value output is used to make trust decisions (to transact with or to not transact with) before calling the transaction execution component. The transaction proof exchange (execution) component is responsible for generating and exchanging transaction proofs. Once the transaction is completed, feedbacks are manually entered by the transacting users. This feedback is routed to the designate nodes on the overlay network for decentralized storage through a decentralized overlay protocol (eg. DHT based). The designated nodes only invoke their data storage service admit a feedback if it passes the feedback admission control, where fake transactions are detected.
  • Trust Evaluation Engine: Whenever a node n wants to transact with another node m, it calls the Trust Evaluation Engine to perform a trust evaluation of node m. It collects feedback about node m from the network through an overlay protocol and aggregates them into a trust value.
  • Feedback Data Storage Service: The feedback storage service is responsible for storing reputation and trust data on the overlay network securely, including maintaining replicas for feedbacks and trust values. TrustGuard builds their storage service on top of PeerTrust. It is also responsible for the feedback admission control transaction detection logic.
  • The beta reputation system uses beta probability density functions to combine feedback and derive reputation ratings. It incorporates detailed mathematical implementations to attend to feedback weight, given the transacting agent (discounting), scalable feedback collection, and ‘forgetting,’ through which the system acknowledges that old feedback may not always be relevant for the actual reputation rating, because the agent may change its behaviour over time.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Robert Greenfield IV

Robert Greenfield IV

CEO of Umoja Labs, Former Head of ConsenSys Social Impact, @Goldman Alum, @Cisco Alum, @TFA Alum, Activist, Intense Autodidact