Trias AMA Summary with Decentralized Club ✔️

Dear, Community_

Welcome to our community on t.me/decentralized_club Telegram group’s AMA. We really appreciate all your support. There were really good and thoughtful questions that were asked. For those who missed our AMA, this blog post is for you :)

✔️Introduction with Trias :👉

Trader(BILLY):
Q1. Can you guys introduce yourself and also briefly tell us what is TRIAS about?

Anbang:
Hi Everybody! I’m Anbang Ruan, the Founder/CEO of Trias.

I have spent more than 10 years in academia (Univeristy of Oxford, and Peking University, China) with my research focus on Cybersecurity

including Trusted Computing (TEE/SGX), Cloud security, Operating System security, and cryptography.

I worked as the Research Associate in Trusted Cloud from the Oxford e-Research Center (OeRC), University of Oxford.

And currently also serving as the deputy director and the chief scientists of the Trusted Computing Lab in Peking University (the PKUSSM-OCTA lab), and the Trusted Computing Lab in Tsinghua University (the TsinghuaDelta-OCTA lab).

Trader(BILLY):
Buddy, you have a wealth of experience!

Anbang:
Thanks!

With Trias, we are building a “layer -1” trustworthy computing network for the public chains by using TEE + Graph algorithms.

This will allow us to achieve high performance consensus while preserving high level of security and robustness.

Trias unlocks more possibilities when we use this “layer -1” foundation to implement general purpose computations, such a SaaS.

Trader(BILLY):
Sounds like you got a winning combination!

Anbang:
In fact in Trias’s architecture, we call it the Decentralised Software-as-a-Service, the DSaaS.

The main difference between DSaaS and SaaS is, obviously, with the “D”, Decentralized. Just like the difference between DApp and App.

We use the “Decentralized” methodology to help solving the “Trust Issues”.

for companies, they need to ensure that their business logics are implemented and executed correctly and their business data, especially, customer data, are not abused or leaked;

for auditors, they need a much more efficient, effective and cost-saving methods to inspect any data-accesses violations instantaneously;

for end-users they need to be sure that their interactions with the SaaS provided by a third-party is trustworthy and reliable.

Certainly, the current concept of DApp may incorporate the DSaaS’s definition.

But what we would like to emphasize with this new terminology is that:

we cannot build a large-scale industry-ready enterprise application with the existing tech

for example: we cannot implement the entire SaleForce on Ethereum.

We need a new tech

And that why we are building Trias.

Trader(BILLY):
So, basically one of the reasons that TRIAS came out was because of the limitations faced in Ethereum

Q2. As me moved into 2020, what is TRIAS planning to achieve in Q1 this year?

Anbang:
At the end of last year, we have launched a China-only Trias Mainnet v1.0.

It is a permissioned version with a focus on bringing on large-scale enterprise applications in Mainland China onto the Mainnet.

We have formed strategic collaborations with 12 large enterprise from different industries.

The news will come out later this month.

In Q1 this year, we will bring on-line one of the most significant use case:

a DSaaS implementing the industrial-internet platform for a substation industry in Chongren County in Jiangxi Province

We have recently published some news regarding this case in our channel.

We will also start our franchiser/franchisee model to replicate this use case in the south-east asia countries.

At the end of last year, we have published the first version of this token model

this is a joint work with our economics advisor from Oxford, Proj Hanqing Jin.

Trader(BILLY):
This news is Gold standard

Anbang:
We are currently updating this model, with a few months’ experience and feedbacks from our Chinese partners.

Our staking/buying-back/burning token model will be initiated.

Trader(BILLY):
Token holders should pay notice

Anbang:
Thanks. More news will come. With named collaboration companies.

Trader(BILLY):
Q3. How many use cases has TRIAS built and functional at the moment?

Anbang:
Currently we have had three applications:

a Trias-based Insider Threat Prevention System,

which will be used by a large bank to protect more than 5,000 nodes (virtual machines) in their private data center by the end of this year;

the first batch of deployment will start at the end of this month

with the scale of around 1000 nodes.

secondly, a Trias-based information auditing system, which will be used among multiple securities companies and auditing organizations;

this work started in Q2 last year

we firstly worked with Soochow Securities

a listed top securities company in China.

and the second stage was a joint Proof-of-Concept with Shanghai Stock Exchange’s information technology company

that was accomplished in the second-half last year

starting this year

we will be building a multi-securities-companies use case

to implement the Trias-based auditing service with the Stock Exchange company.

Trader(BILLY):
Trias is already proving to the industry its mettle with the above use cases.

Anbang:
The third one, is the Trias-based ERP/CRM system along with a supply-chain finance service

this is the use that we have been working on in the Chongren County I mentioned above

it will serve the local substation industry (the key equipment for the national electricity grid)

the system is targeting at serving more than 100 companies in the local industry

Many of the news have been released in our Medium channel.

More details of our customers and the use cases will be released gradually, due to regulatory or business issues.

Trader(BILLY):
My final question before quiz round

Q4. Finally, how do you plan to protect TRY token value which will help put token holders mind in peace?

Anbang:
In short: to increase the utility of TRY.

The current business model for Trias is:

we sell Trias-enabled information systems directly, (currently in Mainland China, where we have the best connection)

and then build it as replicatable use cases, in outside-China-area, with the helps from our collaborators by using TRY.

typically, our collaborators (the Trias Alliance Companies) can then copy and sell the system in their countries or regions, as long as they stake certain level of TRY

after they managed to sell the product (in any currency they are willing or allowed accept), they will share a bit profit by giving back certain amount of TRY for incubating more projects, or by burning the TRY directly

so as long as more applications are building, more usage scenarios are creating,

countries and regions around the world may keep copying and distributing Trias DSaaS, more staking, burning, ecosystem investing will happen.

round and round.

This business-oriented usage for TRY, the franchiser/franchisee model, will help a DSaaS developer to replicate it product around the world.

This is the main focus of our token utility strategy for this year.

it will also expands the reach and use cases of Trias’s network and DSaaS applications.

it helps to acquire more big customers.

with more needs to explore.

The second step, after we have released the Prometh framework, a model for paying software components development / testing / verifying / distributing will be developed.

this will provide tools for developers to build more DSaaS to meet the needs of the already-on-the-mainnet customers.

more utility of TRY will be created.

and finally, with the Leviatom network, TRY will be further used for sharing computing resource,

implementing remote attestation / verifications to the computing nodes, and broadcasting / routing the trustworthy information among the networks.

so basics, for our visions, TRY lives in the circulation of executing, developing and managing software services, the DSaaS.

we looking at at least three years’ of incremental business development, software development, and infrastructure development plan

with more and more utility added to TRY

and meanwhile, with the franchisee and franchiser model

the more DSaaS are replicated or distributed, more TRY will be burnt

More value will be added to TRY

This is why we believe in its long-term increasing value.

⏩ Quiz Round Questions & Answers 🌠

Trader(BILLY):
1.Which of the following is NOT the correct description of Trias?
A: TriasForce is a DSaaS product, in which ‘D’ stands for ‘Dominated’
B: TriasForce has been implemented on many clients over different industries
C: Trias’ token TRY can be used to purchase computing infrastructure in the ecosystem
D: Private and consortium chains can be part of Trias ecosystem

Oleg Znahar:
b

Sergey:
с

Vladimir Pleskun:
В

Karim Melko:
a

Hambi crypto:
C

VyachCrypto:
a

slim err:
d

Liudmila Liudkovski:
D

K K:
i saw the correct answer!

Trader(BILLY):
Who is correct? @kelin1107

K K:
anyone else give it a TRY

A is the correct one!

D stands for Decentralized

Trader(BILLY):
2.Which client has already implemented Trias blockchain technology?

A: a large game engine
B: a Japanese exchange
C: a Chinese securities company
D: a Chinese pharmaceutical firm

maranatha:
B

C

zafer metin:
C

Oleg Znahar:
a

maranatha:
A

Kun Amyl:
a

maranatha:
D

Nagan Prosky:
d

Hambi crypto:
D

Danail Stefanov:
D

VyachCrypto:
b

Sarung Khan:
A

slim err:
b

Vladimir Pleskun:
A

Liudmila Liudkovski:
C

Rejaaaaaaaa:
D

Khoidarelest:
D

David Azuki:
D

Trader(BILLY):
@kelin1107 any correct answer??

K K:
C is the right answer!

Trader(BILLY):
3.Which of the following is NOT the correct description of Trias Economy?
A: All three layers, Leviatom, Prometh and MagCarta, have token economics
B: Software distributors can stake to join as franchisees of TriasForce
C: Trias has a PoW mining mechansim
D: Open-source community is part of Trias

Fred Dimaz:
C

Hãy gọi tôi là Dương:
A

kt Butterfly:
A

fafafifi | CRET CM:
D

PHAM TAN:
D

Anti_Virus | smugloris.crypto:
B

Ms Thao:
D

YAK:
D

David Azuki:
D

maranatha:
D

T L:
a

Oleg Znahar:
a

Raden:
_

Kun Amyl:
b

Aryani Purnama 7539:
C

Hambi crypto:
B

Sarung Khan:
b

Putri Anggraeni:
A

Shiva-:
A

Antimo21 | Not Italian Name. Sorry😅:
A

zafer metin:
C

Sergey:
с

Jerry Anggara | Alisha Kanya Ahalya•√:
C

Athar Razka:
D

Danail Stefanov:
D

Khoidarelest:
D

VyachCrypto:
c

Cris Tony:
a

FOREST™:
A

Dec:
A

Himalay dev Singh:

June Harmory:
d

slim err:
c

CryptoKids:
D

LuongLee:
A

Mocca:
B

Microbyte Trader:
C

Aldilan (aku suka lia):
A

Trader(BILLY):
@kelin1107 Please say the correct answer!

4.Which of the following is NOT the correct description of Trias’ achitecture?
A: Prometh can serve as the ‘’-1’ Layer for other public chains
B: Trias is composed of three layers
C: Leviatom uses TEE technology and HCG algorithm
D: Developers can develop DApps on MagCarta

PHAM TAN:
D

Anti_Virus | smugloris.crypto:
B

IkyNulil:
D

Raden:
D

Rejaaaaaaaa:
A

Ms Thao:
D

Cris Tony:
D

Antimo21 | Not Italian Name. Sorry😅:
D

maranatha:
A

Kun Amyl:
b

Shiva-:
A

Oleg Znahar:
d

zafer metin:
C

Mocca:
D

Aryani Purnama 7539:
D

Hà:
B

rrheyy:
B

Vladimir Pleskun:
Св

Sarung Khan:
a

kt Butterfly:
B

LuongLee:
A

Hãy gọi tôi là Dương:
A

fafafifi | CRET CM:
B

VyachCrypto:
a

Hambi crypto:
d

尺ムノズズひ | nERD:
D

FOREST™:
D

Nagan Prosky:
c

Bandot Peter:
C

EllKay:
D

Resty Cesz:
A

David Azuki:
A

Athar Razka:
A

Maa:
B

Sergey:
В

Danail Stefanov:
C

Putri Anggraeni:
B

K K:
A is the right one! Leviatom is the -1 layer for public chains!

Trader(BILLY):
Last question coming up.. Thanks @kelin1107 for the quick responses.

Last one is fill in the blanks and does not contain any options.

5.The token name of Trias is ____ and it is trading on _

Answer like text1, text2

Hà:
TRY

BIKI
.

T L:
Try,kucoin

Resty Cesz:
TRY
BITMART

Aryani Purnama 7539:
TRY kucoin

Ms Thao:
TRY , Kucoin Bitmax

Bụt Ra đê Rồi Đừng hỏi:
try

Himalay dev Singh:
TRY, BITHUMB, ETORO, KUCOIN

Jerry:
tri and chain x kucoin

尺ムノズズひ | nERD:
Try kucoin

Rejaaaaaaaa:
TRY, Kucoin

Microbyte Trader:
TRY, BITHUMB, ETORO, KUCOIN

Mocca:
Try

Lee:
Try,kucoin

Shiva-:
Try
Kucoin

Hãy gọi tôi là Dương:
TRY kucoin

K K:
TRY, Kucoin is the correct answer!

🐧Community ask Questions by Twitter ✔️

Trader(BILLY):
1. @cyrptoforest In your ecosystem there are 3 layers: Leviatom, Prometh and MagCarta. Could you please explain what roles do they play in Trias Ecosystem ?

Anbang:
Trias is designed with a three-layer architecture targeting at building and supporting a DSaaS.

Leviatom is an integration of Trusted Execution Environments (TEEs) and Graph to achieve correct execution of general-purpose software. It implements a Heterogeneous Consensus Graph (HCG) algorithm, which combines heterogeneous TEE technologies (TPM, TXT, Intel SGX, ARM TrustZOne, etc.) and graph computing algorithms (similar to Hashgraph or DAGs).

Heterogeneous TEEs allow Leviatom to identified misbehaving nodes rapidly while eliminating the dependency on any single technology’s provider, e.g. Intel SGX-based consensus requires a strong dependency on Intel’s centralised online verification service.

Meanwhile, HCG’s small-world-theory-based gossip protocol significantly reduces the redundant TEE verifications, while preserving a scalable and robust web-of-trust.

With HCG, Leviatom easily achieves more 100,000 tps for a single shard, while defending near 90% malicious collaborative attacks.

The Leviatom system builds a global-span trusted computing infrastructure which ensure the genuine executions of ANY given compiled codes. This includes all the legacy codes.

All the nodes actually forms a “social network”, which allows the gossips of whether a node is “good” or “bad” to be quickly disseminated. A misbehaving node is identified very quickly within Leviatom network.

Prometh, a combination of formal verification and DevSecOps methodologies to achieve traceable and verifiable general-purpose software development. Prometh genuinely records the critical information for a piece of software’s entire lifecycle on blockchain-based storage.

It further encourages the community to applies formal verification and DevSecOps methodologies to enforce automatic or manual examinations or verifications on the recorded information.

This helps deducing the genuine properties of the software, which ensures any piece of software only implement intended behaviours.

The Prometh system builds a traceable software building framework. It utilizes distributed ledgers to track and trace any piece of binary codes back to all the source codes and building configurations, intermediate binary object and the trustworthiness of their building environment.

It helps identifying the misbehavior within each piece of software. It ensures a given software will behave as expected.

MagCarta, a consensus-oriented programming paradigm to achieve embed and self-defined consensus strategy for high-order enterprise DApps (the DSaaS). It schedules Prometh applications on Leviatom computing network to achieve high-order enterprise application logic.

With MagCarta, DApps can implement their embed consensus algorithm and ledger structure, and choose their strategy to reward the computing infrastructures (Leviatom) of software components (Prometh) contributors.

It is a service orchestration and management platform. It connects the “good” software built by Prometh together, and distributes them to the “good” nodes in the Leviatom network.

It then chains and track the data flow through these software and nodes.

Hence Trias creates a software service with: verifiable software components, verifiable computing resource, and verifiable data flow among them.

For example, to run an entire CRM or ERP system on blockchain, we genuine have three (extremely simplified) ways:

1 we link all the machines into a Leviatom network;

2. we recompile/rebuilt all the CRM/ERP with Prometh framework;

3. we configure and deploy the Prometh-built CRM/ERP on Leviatom network with MagCarta.

Trader(BILLY):
2. @DustyLoooza Dr.ANBANG RUAN,@triaslab founder said,by building a ROOT OF TRUST(R.O.T),any applications can build a trust relationship efficiently. now, Can you name a 2-application Relationship that(may) contradict each other? Why ROT is important?

Anbang:
In social life, the Root-of-Trust is an entity or idea that you trust by default.

From this entity, you deduce transitive trust to other entities or ideas:

from the Root-of-Trust, you deduce whether you can trust a third entity or idea, and from the newly trusted entity or idea, you deduce further trustworthiness for more entities or ideas.

The Root-of-Trust is the root, upon which you build trust to everything around your world.

It can be some social institutes, governments, parties, religions, norms, ideology, or some persons, figures …

In the cyberspace, in order to trust a machine, and the software running inside it, we also need a root-of-trust.

Genuinely, as software is relatively easy to be tampered with, we cannot trust a software vouching for the trustworthiness of another software.

Therefore, one strand of research is to implant a trusted hardware to act as the root-of-trust for a particular machine.

This hardware will genuinely record all the software components loaded in the machines in sequence.

It will ensure that only “good” software is loaded by “good” software, and the first “good” software to load the entire loading sequence (usually the boot-loader of an operating system) will be loaded by the trusted hardware itself.

Therefore, since a hardware is much harder to be hacked into than a software, it can be a good candidate to root your trust into machines: to be a root-of-trust.

This is basic idea of the TEE technologies, including the SGX and TPM hardware chips. Which is used extensively in our network.

Trader(BILLY):
3. @BClestiano Secondly, in terms of the selection of nodes that execute its code, although the selection of supernodes themselves is based on ‘trust’, this design is still a centralized method. Again, how are you going to address this?

Anbang:
Continuing my previous explanations on the Root-of-Trust:

to trust the software running on a machine equipped with a TPM/SGX capability

With this capability:

we only need to firstly trust the hardware (the TPM/SGX itself), and then talk to the hardware to get the genuinely status of the software recorded inside it

Therefore, in order to trust a machine running a consensus algorithm (the consensus node), we only need to equipped the machine/node with a Root-of-Trust (the hardware chip).

However, there are still doubts: 1) what if the Root-of-Trust is still broken, it is still possible that hardware being hacked and tampered with, 2) what if thousands of verifying requests to the Root-of-Trust of a node are initiated at a same time.

This is the problem that we aim to solve with the Heterogenous Consensus Graph (HCG) algorithm, the core in our Leviatom network architecture.

The term “heterogenous” indicates “different and multiple root-of-trust”. Therefore, instead of trusting a single trusted hardware, we build a network of nodes equipping with trusted hardware, having them to examine each other regularly.

All these nodes work together to act as a “virtual” root-of-trust for the entire network, we call this kind of root-of-trust the decentralized root-of-trust (dRoT).

I firstly introduced the dRoT idea in the ICICS’2019 last year

an academic conference in Trustworthy Computing

The strength of the dRoT is determined by the topology of nodes connecting together. This is calculated by graph algorithms.

Therefore, the nodes constructing the dRoT are entirely selected by graph algorithms, and with the dynamics of the nodes’ communicating patterns, the super nodes are changing all the time.

This solves the two issues: broken hardware root-of-trust, and a single-point-of-failure (when all others contacting a target node at a same time).

It also solves the issue you raised: the dynamic node selection eliminates the centralized selection method used by other consensus techniques.

Trader(BILLY):
4. @Jerry_Anggara Trias adds a mechanism similar to “a reputation” in terms of consensus mechanism. What does Trias hopes to solve problems?

Anbang:
The reputation value in Trias is the value indicating the strength of its decentralized root-of-trust.

It means: how can we trust the machine, even without contacting it’s trusted hardware. The reputation value of a node is calculated from the frequency of the node’s trusted hardware being examined by different nodes.

It is determined from: the number of the inspecting nodes, the inspecting frequency of each node, the inspecting relationship among the nodes, and the nodes’ own reputation value.

In short, the higher the reputation value, the more frequently the node is inspected by more diverse and higher reputable nodes.

This means the node with a higher reputation value’s misbehaviours will be identities more shortly, and spread much wider.

The higher reputation value indicates the higher trustworthiness.

A few of my previous papers illustrated the basic algorithms:

[1] RepCloud: Attesting to Cloud Service Dependency
Anbang Ruan and Andrew Martin. In IEEE Transactions on Services Computing
[2] NeuronVisor: Defining a Fine-grained Cloud Root-of-Trust
Anbang Ruan and Andrew Martin. In Proceedings of The 6th International Conference on Trustworthy Systems (InTrust 2014). Dec, 2014.
[3] RepCloud: Achieving Fine-grained Cloud TCB Attestation with Reputation Systems
Anbang Ruan, Andrew Martin. Proceeding of STC’11 The Sixth ACM Workshop on Scalable Trusted Computing. Chicago, IL, USA, Oct. 2011.

More info can be found in our white paper: https://www.trias.one/whitepaper

Trader(BILLY):
5. @Radj07605271 Companies that already deploy another security system in their platform, will they be able to deploy the trias security system? If yes, how did you manage to manage the problem of interopenality?

Anbang:
Yes, definitely. As I have introduced: Trias works at a lower level of computer systems, the trusted hardware layer

It connects trusted hardware of each machine to build a decentralized root-of-trust to vouch for the trustworthiness of all the software components loaded on all the connected machines.

These software components also includes the software implementing different security systems.

So Trias works with most security systems, and we do not only protect the application systems, but also the security systems themselves. This is a hardened method for ensuring information system security.

In fact, the insider threat prevention system to be deployed over 5,000 virtual machines in a large bank, is an implementation of Trias capability.

✍️ ⏩Telegram live Questions answered by Trias : ✔️

Fadang:
Why does Trias use Ethereum Blockchain?

Is there any future plan to make Trias own chain?

Anbang:
Short answer: we are not using Ethereum, but we are holding Ethereum, and we can hold more. Trias is a layer “-1” solution. It runs one layer below the consensus layer by enforcing a network/graph of trusted computing hardware with the HCG. Therefore, it holds large-scale decentrlized applications as its dapps. (We call it DSaaS in our words). In this case, other blochchains, including ethereum, can also run as a DSaaS on top of Trias. With the underlying dRoT, we can actually harden the upper layer blockchains, and make it run much faster.

Dalmasca Blockchain:
is there any plan to make mining or staking program for Trias?

Anbang:
We have had a test-round of staking last year, in conjunction with our publication of our first version of the token model. As we our last second-half year’s business development, we have refined our model. we will release a updated version very soon. A series of staking rounds will be initiated soon.

尺ムノズズひ | nERD:
How will you introduce TRIAS to a non crypto user? What are the utilities of TRIAS?

Anbang:
Whenever you have doubts in trusting computing devices, you will have to have an infrastructure helping you to ensure that the device you are interacting with will behave as expected. You will pay the ecosystem enabled by this infrastructure with TRY, and get compensated when any incidents happens by TRY.

Kambing:
According to you how much time will it take for TRIAS to get into mainstream adoption and execute all the plans set for this project?

Anbang:
Building a public chain is an extremely hard task. building a public chain with real use case is even harder. Different from what has been carried out and proven not (until now) successful, Our strategy is to choose a reverse direction: instead of releasing a public chain first then wait for the ecosystem to grow, we build our ecosystem first by building large-scale real use cases, and then release our publicly available mainnet. This will save our much time, because we are getting real customers need from day one.

kt Butterfly:
Trust is very important in Business. What makes investors,
customers and users feel safe when working with TRIAS?

Anbang:
The best way is to create revenue. It proves the utility of our technology. The satisfactory of our customers. and It keep our development going without requiring rounds and rounds of investments. I think this brings trust.

✔️Thanks to all of our Community Fans✔️

Have a Great Day🍁

Edited by : 🌿DK✍️

Decentralized Club

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Decentralized Club

Decentralized Club

🎉Welcome 🎉 We are a community who eats, sleeps and drinks crypto 😉 Contact👇@cryptoTALK01 @UniqueBoyDK for AMA and project promotions♻️ decentralizedclub.net