Will there be some spam protection in place?
yep, its inherent to how the proof of reputable observation consensus algorithm works
here is a good quote from Ryle way back (somewhat paraphrased): “We are using this technology of hierarchical blocks, or bundles of data, to reinforce observations across the network which is stored directly within the chain. This enables us to understand the history of how transactions were observed, how they merged together with other transactions, where they flowed through on the network. The hypergraph stores all the signatures of the nodes that are participating which allows us to reconstruct a history detailing how the blocks were formed, where they were formed, and how they spread across the network which provides context as to why the data bundle proposal was chosen as the most representative block in the network. This allows us to visualize the relationships between data and how the network self-organizes based on democratic principles and trust. Nodes are using probabilistic facilitator selection based on the previous history of the chain and node reputation to determine who should take their mem pool and package it together into a new bundle proposal. The nodes are incentivized through rewards to send these bundles to the peer that they think is the best representation of the network state. This creates a structure out of these self-assembly rules which maximizes trust and reputation. Nodes are incentivized to avoid spamming the network through the same facilitator selection mechanism and minimizes the number of peers involved in gossiping messages which mitigates the issues of creating a densely concentrated network which is not distributed optimally. Over time the messages gradually accumulate and all the nodes measure trust to determine which peer is best to make the next proposal of the network state. This becomes the accepted checkpoint on the directed acyclic graph. “Taking linear blocks is just a simplification of a larger and more complex data structure that already exists which other DAG based protocols fail to capture or leverage into their design by not taking into account who the peers they are talking to are. Constellation’s Proof of Reputable Observation (PRO) algorithm decomposes it’s graph structure into a simple set of rules that allow a self-governing structure to autonomously form which creates the most secure and scalable network technically possible.”
Обсуждают сегодня