diff --git a/docs/assets/how_dephy_works_2.png b/docs/assets/how_dephy_works_2.png new file mode 100644 index 0000000..5b8168b Binary files /dev/null and b/docs/assets/how_dephy_works_2.png differ diff --git a/docs/introduction.md b/docs/introduction.md index 771951b..9e6877b 100644 --- a/docs/introduction.md +++ b/docs/introduction.md @@ -4,39 +4,93 @@ outline: deep # Introduction -## How does DePHY work? +DePHY is a decentralized low-latency off-chain network for DePIN with verifiability and composability. -![How the DePHY network works](./assets/how_dephy_works.png) +## Why Web3 needs real-world + +- The physical and blockchain worlds exist as separate entities, yet there’s a critical interplace between them +- The virtual world needs real input + - The evolving landscape of software development is increasingly focused on creating applications that address real-world challenges + - A significant void exists in Web3 regarding authentic data sources that reflect real-world dynamics + - This disparity between the demand for real-world integrations and the current offerings in the Web3 space highlights a pressing need for bridging these two realms +- Revolutionizing economics through digital integration + - Historically, translating real-world actions into valuable digital assets or incentives has been a slow and complex process. + - The prevailing trend of data monopolization by centralized entities (often large corporations) underscores the need for a new economic model that leverages decentralized technologies. + +## Verifiability + +### How DePHY provide verifiability? + +- **DID (Device ID) Based on Trustzone-Optee** + - **Hardware Wallet-Level Security:** This feature mimics the security level of a hardware wallet, ensuring the highest security for device IDs. + - **Hardware-Level Authorization:** By implementing authorization directly at the hardware level, it significantly boosts security and reliability. + - **Authenticity of Data:** This system guarantees that the data collected is authentic, thereby enhancing trust in the data's integrity. + - **Bi-Directional Verifiability:** This allows for rapid detection and handling of cheating attempts, employing slashing mechanisms to maintain honesty in the network. +- **Building a trust chain from the hardware layer** + - **Root Secret in eFuse:** The root secret is securely embedded in eFuse, offering physical tamper-proofing and enhancing device security. + - **TrustZone Integration:** Ensures that all sensitive keys and function calls are securely protected at the hardware level, fortifying the system against unauthorized access. +- **Fully Decentralized Depin Data Access Points** + - **Decentralized P2P Network via Nostr:** Establishes a peer-to-peer network leveraging Nostr, promoting decentralized communication. + - **Decentralized Access to Off-Chain Physical Devices:** This is achieved through distributed Edge Servers, facilitating decentralized access and control over physical devices. +- **Our protocol enforces signing every message to ensure verifiability** + - **Prevention of Replay Attacks:** The protocol's design inherently guards against replay attacks, ensuring communication authenticity. + - **Remote Attestation Technology:** Supports Remote Attestation, validating that special firmware is operational in TrustZone, further affirming system integrity. + +### Proof of Action -DePHY is designed for building DePIN projects rapidly. +#### What is Proof of Action? -It provides: +TODO -- A decentralized off-chain network providing -- Bi-directional connectivity between the Web3 world(incl. oracles, Solana Programs, EVM contracts) and the physical world. -- Data determinism and verifiability with ZK-Proof. -- Rapid application development experience with composability and compatibility. +#### Why need Proof of Action? -## What is the most critical thing about DePin? +TODO + +## Composability + +### How DePHY provide composability? + +- **Standardized Embedded Interfaces, Providing Hardware Solutions:** + - **Universal Standard Services:** Interfaces like MQTT and HTTP are universally standardized, facilitating easy integration and communication. + - **Open-Source Reference Designs:** These designs are fully open-source, simplifying compatibility with various supply chains and promoting transparency. +- **Versatile Compatibility with Various Systems:** + - DePhy's technology is designed to be compatible with a wide range of systems, including advanced GPUs and X86 architectures, ensuring broad applicability and flexibility. +- **Robust Support for Arduino Open Source Hardware:** + - **Extensive Library of Open Source Sensors and Actuators:** With tens of thousands of options available, DePhy offers a rich repository of resources for development. + - **Vast Community of Developers and Resources:** The platform is supported by a large community of developers, along with a wealth of development samples, fostering a collaborative and resource-rich environment. + - **Rapid Device Assembly:** The system is designed for efficiency; you can build your DePin device in as little as 30 minutes, making it accessible even for those with limited technical expertise. + +## How does DePHY work? + +![How the DePHY network works](./assets/how_dephy_works.png) -### Verifiability +![How the DePHY network works 2](./assets/how_dephy_works_2.png) -- Soulbound DID for devices -- All messages are orderable in the network. -- All messages must be signed before publishing to the network to ensure its being traceable. -- Trust built on hardware level -- Oracle with ZK technology +- **DID of DePin Devices** + - **Unique Key Pairs for Each Device:** Every DePhy device is assigned a distinct and permanent pair of keys, ensuring a secure and unique digital identity. + - **Blockchain Integration for Identity Verification:** On the blockchain, each device is linked to a specific token. This token is crucial for confirming the device's identity and authenticating its communications with the blockchain network. +- Decentralized DePin Network Operating Off-Chain + - **MQTT Protocol for Streamlined Communication:** The network leverages the MQTT protocol, widely recognized in the IoT industry, to facilitate device communication. This choice significantly eases integration challenges and minimizes hardware demands. + - **NoStr Protocol for Enhanced Networking:** To meet the low latency demands of IoT, DePhy utilizes the NoStr protocol. This enables the network to achieve decentralization, flexible connectivity, effective message filtration and prepares the ground for incorporating payment systems in the future. + - **Diverse Nodes for a Robust Network:** The network's backbone is formed by "Archive Nodes." DePhy permits the integration of nodes serving various roles, such as data visualization, IoT device gateways, data oracles, and analytics, broadening the network's functionality. +- Through data Oracle network nodes, data reported by DePin devices can be submitted to the blockchain. Its validity can be verified through DePin DID. -### Composability and Compatibility +## Why DePhy can decentralized? -- Only commonly used technologies such as MQTT, HTTP, and Protobuf are used in the protocol. -- Fully open-source reference designs are provided. -- Arduino support: Take advantage of Arduino’s exuberant development resources. -- Streaming verifiable data with composable components(e.g., oracles, GPU resources, storage providers). +- Use edge endpoint to connect with DePin devices +- DePhy is based on the NoStr protocol that everyone can host nodes +- Fully open-source hardware design, no supplier binding +- Nostr network connects all edge servers and blockchain -## How does DePHY be Truly Decentralized? +# **What is the difference between other projects?** -- The DePHY Network uses NoStr as the transfer layer, an open and mature protocol for decentralized messaging. -- Oracles in DePHY are connected to the same network and share the same decentralized messaging protocol with devices. -- Everyone can deploy their Edge Brokers locally to allow Devices to join the network directly with IoT technologies like MQTT. -- We provide hardware reference designs that are fully open-source with commonly used components, and no supplier binding is required to develop hardware to work with DePHY. +| | DePhy | W3bstream | +| --- | --- | --- | +| Connection | decentralized | centralized | +| Edge server | Y | N | +| Data privacy | Y | N | +| Trustable Data | Y | N | +| Data rate | Could be lower than 100ms | More than 1s | +| Web3 control real-world | Y | N | +| Quickly hardware developing | Y | N | +| Tokennomic | Y | Y | \ No newline at end of file diff --git a/docs/public/avatar/nicholas_deng.jpg b/docs/public/avatar/nicholas_deng.jpg new file mode 100644 index 0000000..6176b7a Binary files /dev/null and b/docs/public/avatar/nicholas_deng.jpg differ diff --git a/docs/team.md b/docs/team.md index 0171299..4f0b25f 100644 --- a/docs/team.md +++ b/docs/team.md @@ -16,7 +16,7 @@ const members = [ // title: 'Creator', links: [ { icon: 'github', link: 'https://github.com/skysummerice' }, - { icon: 'linkedin', link: 'https://www.linkedin.com/in/%E5%96%86-%E7%8E%8B-0a99a038/' } + { icon: 'linkedin', link: 'https://www.linkedin.com/in/%E5%96%86-%E7%8E%8B-0a99a038/' }, ], desc: `