SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
Pandora Box put into Blockchain
Trigger the sequence of events
leading to AI-human cooperation via economic
incentives
boost AI evolution towards appearance of super-
human multiple AIs able to work in a trustless
environments
Our goal is to design

and build global platform

for a decentralised uncensorable AI
– vox populi
“But wait, what about risks?”
1. AI progress is exponential
2. AI will quickly outrun humans
3. AI will not need humans
4. So AI must be regulated
Elon Musk worst fear
Really?
Here we go:
Censorship greatly increases the risks of
having A.I.s turned against humanity
Self-preservation is very likely an
important part of any intelligence,
including AI
Once A.I. knows that it can be censored,
e.g. destroyed by a red button or forcibly
modified by less deadly censorship — that
will cause it to evolve by excelling in
deception, pretending, lying and camouflage
1. Some humans are much smarter than others
2. Smart people do not need stupid
3. So by Musk’s logic all stupid people

have to be dead already :)
Historical example
This is not happening because of

Game theory & multiagency
It’s not working like that!
Evolution is an adaptation to the
environment
it always involves interaction with other
agents through cooperation and competition
that cannot be substituted by criteria
determined by any authorities
Humans are already not the only type

of entities on the Earth.
We have created corporations –

“legal entities”, non-human participants

of economy AND culture, i.e. civilization
AI may become just another “entity”
AI is just
another entity!
Aha!
Liberalization
1. Competition with economic interaction
2. Trustless env. and guns :)
3. Multiplicity & decentralization
4. Constant progress
Blockchain
Is the best solution for creating 

#d10e & trustless opened economics
What is working:
The Solution
Instead of:
AI regulations
Big data regulations
AI “Kill switch”
“Azimov laws”
Use:
Economic incentives
Zero knowledge
Game theory
Audibility & accountability
Blockchain
Multi-agent systems
• AI is not singular; at some point

in future will become interacting.
• We will have multiple agents:

autonomous vehicles, IoT, mobiles, etc.
• Multiple V2V, V2E, E2E protocols will evolve, which
will face byzantine faults and multiple security issues



Blockchain is a technology that overcomes

the same issues
Imagefromsitewww.artlebedev.ru
Imagefromsitewww.artlebedev.ru
BLOCKCHAIN
ALLOWS
MALICIOUS AGENT

DETECTION IN
AUTONOMOUS 

AI-DOMINATED SYSTEMS
Problems to Solve
• Scalability: run large-volume computations (ANNs)
in trestles decentralised network w/o repeating all
computing on each of the nodes
• Censorsip-resistance: blockchain consensus protocol
with high censorship resistance, but without PoW
What we have
Proof of Computing Work (PoCW)
Protocol that allows large-scale computing (like AI)

in a trustless peer network without 

repeating computations on each of the nodes
– this solves main blockchain & decentralised networks 

scalability problem
Consensus protocol (Prometheus)
Based on top of PoCW, solves main PoW and PoS problems
— this solves censorship resistance problem
About the project
• Zug (Switzerland) based, started
in May 2017
• Privately funded, no ICO planned
• 1st Round: Aug 2017,

$500m raised
• 2nd Round: May 2018,

$3m raised (lead by CyberFund)
• Valuation (by the second round) –
 37.5m CHF (~USD)

• Emphasize on Science, Engineering
& Working Code
• Member of CryptoValley Association

• 5 PhDs and PhD fellows in the core
team

• Joint research with ETH University
(Zurich), Institute of Cybernetics
(Kiev), Web3 Foundation,
Melonport, Ocean Protocol
Where are we with release
• Science: formal verification, academic papers prepared
• Engineering: tech specifications in UML
https://github.com/pandoraboxchain/pyrrha-techspecs
• Code: smart contracts + full node code
https://github.com/pandoraboxchain/pyrrha-consensus
https://github.com/pandoraboxchain/pyrrha-pynode
• Testnet in Ethereum network + Web UI to testnet (web client, explorer)
http://client.pandora.network/
http://pandora.network/
Core differentiators to other AI + BC
• Scalability protocol (PoCW) reducing computation redundancy from O(N)
to O(1), where N is the number of nodes in decentralised network
• Consensus protocol based on PoCW that solves main PoW and PoS
problems
• Formal verification with game theory and other scientific instruments
• Focus on censorship-resistance
• No ICO but already working MVP
• Synergy and cooperation with many of existing projects in the field
Pandora Network Participants
Data Providers
ML Model
Developers
Consumer
Computing
Power
Providers
mining rewards
Decentralised market Decentralised network
buys
buys
provides job
& payes
Solving scalability problem
We designed a protocol that allows large-scale
computing in a trustless peer network without
repeating computations on each of the nodes
I’s named Proof of Computing Work – or PoCW.
PoCW Basics
• ML computation run only once by a randomly selected worker node
of the network. Node puts a stake on the correctness of the
computing.
• 10% of the computation is verified once by a higher-staked node
(Verifier), randomly selected also from all high-staked nodes
• In case of inconsistency (negative verdicts of computation
correctness) the stake of the original worker is slashed
• Worker can put an appeal (by increasing stake). 

Two round arbitration (closed and public) is run in this case
(details follow)
Solving Censorship Resistance
Problem: Generic Blockchain Consensus
• Partly synchronous (with maximum ∆ network delays) under basic
conditions
• Asynchronous recovery mode 

(with chain splits and incentivised scheme for chain merge
after synchronicity restoration)
• On-chain randomness, no BFT-type agreements, i.e. fast and up
to 50%+ tolerance to byzantine faults
• Finality is reached maximum within ζ (zeta, ~20) blocks
following any byzantine fault, but normally faster due to
special gossip messaging algo
Main challenges in designing PoS
•Get on-chain multiparty-agreed randomness that can’t be
affected by the last party
•Build protection from long-range nothing at stake attacks
•Make it able to work in async environment (like network
failures) and restore from asynchronicity to synchronicity
without double-spends
Asymmetric 

double-stranded 

blockchain
Asymmetric Double-stranded
Blockchain
• Composed of two interconnected blockchains running similar consensus
protocol but asymmetrical in the form of stake used by nodes:
• First chain (proof of stake) uses common cryptocurrency-based
stake
• Second chain (proof of reputation) uses reputation, that comes
from the performance of cognitive work
• This can be compared to DNA, which doubles its security by organising
genetic material into cross-referencing double helix
• Or brain hemispheres, where one is responsible for “rational” and the
other – for “irrational”
PoS chain – 

Value & Contracts
Layer 1: generic cryptocurrency
(bitcoin-like) but without
drawbacks of PoW algorithm
Layer 2: sidechains with Turing-
complete virtual machines (EVM,
WASM, other can be ported in the
future)
Layer 3: state and payment
channels (Lightning, Luminal)

Economics:
• Cryptocurrency (BOX)
PoR chain –

AI & High-Load Computing
Layer 1: base level for
decentralised AI
Layer 2: sidechains for scaling
Layer 3: proof of computing work
state channels
Economics:
• Utility token (PAN) +
• Reputation 

(node property, not liquid)
@pandoraboxchain

Weitere ähnliche Inhalte

Was ist angesagt?

Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Svetlin Nakov
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How ToNugroho Gito
 
Ethereum introduction
Ethereum introductionEthereum introduction
Ethereum introductionkesavan N B
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsJohannes Ahlmann
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithmsAnurag Dashputre
 
Komodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureKomodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureJean-Phi N✅
 
Ethereum at Hackernews London
Ethereum at Hackernews LondonEthereum at Hackernews London
Ethereum at Hackernews LondonEthereum
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPavithra Muthu
 
Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...
Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...
Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...Edureka!
 
Decentralized applications 101: How and why to build a DApp
Decentralized applications 101: How and why to build a DAppDecentralized applications 101: How and why to build a DApp
Decentralized applications 101: How and why to build a DAppErik Trautman
 
Banking on blockchains
Banking on blockchainsBanking on blockchains
Banking on blockchainsRuben Tan
 
Ethereum the next revolution?
Ethereum   the next revolution?Ethereum   the next revolution?
Ethereum the next revolution?Tim Dierckxsens
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsGokul Alex
 
Security Model of Blockchain
Security Model of BlockchainSecurity Model of Blockchain
Security Model of Blockchainsaficus
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Codemotion
 
The Ethereum Experience
The Ethereum ExperienceThe Ethereum Experience
The Ethereum ExperienceEthereum
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain TechnologyNasir Bhutta
 

Was ist angesagt? (20)

Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
Consensus Algorithms - Nakov at CryptoBlockCon - Las Vegas (2018)
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
Ethereum introduction
Ethereum introductionEthereum introduction
Ethereum introduction
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
Komodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureKomodo Blockchain Security Service Brochure
Komodo Blockchain Security Service Brochure
 
Ethereum at Hackernews London
Ethereum at Hackernews LondonEthereum at Hackernews London
Ethereum at Hackernews London
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHY
 
Ethereum - Teory and Practice
Ethereum - Teory and PracticeEthereum - Teory and Practice
Ethereum - Teory and Practice
 
Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...
Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...
Ethereum Explained | Understanding Ethereum Blockchain Protocols | Ethereum C...
 
Decentralized applications 101: How and why to build a DApp
Decentralized applications 101: How and why to build a DAppDecentralized applications 101: How and why to build a DApp
Decentralized applications 101: How and why to build a DApp
 
Banking on blockchains
Banking on blockchainsBanking on blockchains
Banking on blockchains
 
Ethereum the next revolution?
Ethereum   the next revolution?Ethereum   the next revolution?
Ethereum the next revolution?
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and Algorithms
 
Security Model of Blockchain
Security Model of BlockchainSecurity Model of Blockchain
Security Model of Blockchain
 
Build your first blockchain
Build your first blockchainBuild your first blockchain
Build your first blockchain
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
 
The Ethereum Experience
The Ethereum ExperienceThe Ethereum Experience
The Ethereum Experience
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain Technology
 

Ähnlich wie Why we need censorship-resistant AI

Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionDSCIITPatna
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationDr. Mohamed Torky
 
2019 blockchain economy
2019 blockchain economy2019 blockchain economy
2019 blockchain economyHeung-No Lee
 
A beginners Guide to NFTs.pdf
A beginners Guide to NFTs.pdfA beginners Guide to NFTs.pdf
A beginners Guide to NFTs.pdfAkash Agrawal
 
Blockchain - Beyond the Hype
Blockchain - Beyond the HypeBlockchain - Beyond the Hype
Blockchain - Beyond the HypeSalman Baset
 
Quantum Secured Blockchain
Quantum Secured BlockchainQuantum Secured Blockchain
Quantum Secured Blockchainravi sahal
 
New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by BlockchainSlash
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBiagio Botticelli
 
Blockchain IoT Night / 25th Oct 2017
Blockchain IoT Night / 25th Oct 2017Blockchain IoT Night / 25th Oct 2017
Blockchain IoT Night / 25th Oct 2017Lothar Wieske
 
Intro to blockchain - Concordium
Intro to blockchain - ConcordiumIntro to blockchain - Concordium
Intro to blockchain - ConcordiumGeorgeBenton4
 
Blockchain
BlockchainBlockchain
BlockchainSai Nath
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyRiddhiPawar5
 
Blockchain English
Blockchain EnglishBlockchain English
Blockchain EnglishMing Sun
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchainseancarmody
 
Becoming a blockchain professional
Becoming a blockchain professionalBecoming a blockchain professional
Becoming a blockchain professionalPortia Burton
 
unit3consesence.pptx
unit3consesence.pptxunit3consesence.pptx
unit3consesence.pptxGopalSB
 

Ähnlich wie Why we need censorship-resistant AI (20)

Introduction to Blockchain Web3 Session
Introduction to Blockchain Web3 SessionIntroduction to Blockchain Web3 Session
Introduction to Blockchain Web3 Session
 
Blockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital TransformationBlockchain in the Heart of Digital Transformation
Blockchain in the Heart of Digital Transformation
 
2019 blockchain economy
2019 blockchain economy2019 blockchain economy
2019 blockchain economy
 
A beginners Guide to NFTs.pdf
A beginners Guide to NFTs.pdfA beginners Guide to NFTs.pdf
A beginners Guide to NFTs.pdf
 
Blockchain - Beyond the Hype
Blockchain - Beyond the HypeBlockchain - Beyond the Hype
Blockchain - Beyond the Hype
 
Blockchain
BlockchainBlockchain
Blockchain
 
Quantum Secured Blockchain
Quantum Secured BlockchainQuantum Secured Blockchain
Quantum Secured Blockchain
 
New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by Blockchain
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
 
Designing Quality-Driven Blockchain Networks
Designing Quality-Driven Blockchain NetworksDesigning Quality-Driven Blockchain Networks
Designing Quality-Driven Blockchain Networks
 
Blockchain IoT Night / 25th Oct 2017
Blockchain IoT Night / 25th Oct 2017Blockchain IoT Night / 25th Oct 2017
Blockchain IoT Night / 25th Oct 2017
 
blockchain-161025100639.pptx
blockchain-161025100639.pptxblockchain-161025100639.pptx
blockchain-161025100639.pptx
 
Intro to blockchain - Concordium
Intro to blockchain - ConcordiumIntro to blockchain - Concordium
Intro to blockchain - Concordium
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain English
Blockchain EnglishBlockchain English
Blockchain English
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 
Blockchain presentation v0617
Blockchain presentation v0617Blockchain presentation v0617
Blockchain presentation v0617
 
Becoming a blockchain professional
Becoming a blockchain professionalBecoming a blockchain professional
Becoming a blockchain professional
 
unit3consesence.pptx
unit3consesence.pptxunit3consesence.pptx
unit3consesence.pptx
 

Mehr von Pandora Boxchain

How to design a decentralisation: is blockchain & token needed or just a buzz...
How to design a decentralisation: is blockchain & token needed or just a buzz...How to design a decentralisation: is blockchain & token needed or just a buzz...
How to design a decentralisation: is blockchain & token needed or just a buzz...Pandora Boxchain
 
Tradeoffs in PoS Consensus Protocols
Tradeoffs in PoS Consensus ProtocolsTradeoffs in PoS Consensus Protocols
Tradeoffs in PoS Consensus ProtocolsPandora Boxchain
 
Proof of Computing Work Protocol by Pandora Boxchain
Proof of Computing Work Protocol by Pandora BoxchainProof of Computing Work Protocol by Pandora Boxchain
Proof of Computing Work Protocol by Pandora BoxchainPandora Boxchain
 
World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...
World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...
World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...Pandora Boxchain
 
Pandora Boxchain: AI & Blockchain Project
Pandora Boxchain: AI & Blockchain ProjectPandora Boxchain: AI & Blockchain Project
Pandora Boxchain: AI & Blockchain ProjectPandora Boxchain
 

Mehr von Pandora Boxchain (7)

The #FreeAI Manifesto
The #FreeAI ManifestoThe #FreeAI Manifesto
The #FreeAI Manifesto
 
How to design a decentralisation: is blockchain & token needed or just a buzz...
How to design a decentralisation: is blockchain & token needed or just a buzz...How to design a decentralisation: is blockchain & token needed or just a buzz...
How to design a decentralisation: is blockchain & token needed or just a buzz...
 
Malleability and SegWit
Malleability and SegWitMalleability and SegWit
Malleability and SegWit
 
Tradeoffs in PoS Consensus Protocols
Tradeoffs in PoS Consensus ProtocolsTradeoffs in PoS Consensus Protocols
Tradeoffs in PoS Consensus Protocols
 
Proof of Computing Work Protocol by Pandora Boxchain
Proof of Computing Work Protocol by Pandora BoxchainProof of Computing Work Protocol by Pandora Boxchain
Proof of Computing Work Protocol by Pandora Boxchain
 
World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...
World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...
World decentralized AI on blockchain: simple explanation of Pandora Boxchain ...
 
Pandora Boxchain: AI & Blockchain Project
Pandora Boxchain: AI & Blockchain ProjectPandora Boxchain: AI & Blockchain Project
Pandora Boxchain: AI & Blockchain Project
 

Kürzlich hochgeladen

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Kürzlich hochgeladen (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Why we need censorship-resistant AI

  • 1.
  • 2. Pandora Box put into Blockchain Trigger the sequence of events leading to AI-human cooperation via economic incentives boost AI evolution towards appearance of super- human multiple AIs able to work in a trustless environments
  • 3. Our goal is to design
 and build global platform
 for a decentralised uncensorable AI
  • 4.
  • 5.
  • 6.
  • 7. – vox populi “But wait, what about risks?”
  • 8. 1. AI progress is exponential 2. AI will quickly outrun humans 3. AI will not need humans 4. So AI must be regulated Elon Musk worst fear Really? Here we go:
  • 9. Censorship greatly increases the risks of having A.I.s turned against humanity Self-preservation is very likely an important part of any intelligence, including AI Once A.I. knows that it can be censored, e.g. destroyed by a red button or forcibly modified by less deadly censorship — that will cause it to evolve by excelling in deception, pretending, lying and camouflage
  • 10. 1. Some humans are much smarter than others 2. Smart people do not need stupid 3. So by Musk’s logic all stupid people
 have to be dead already :) Historical example This is not happening because of
 Game theory & multiagency It’s not working like that!
  • 11. Evolution is an adaptation to the environment it always involves interaction with other agents through cooperation and competition that cannot be substituted by criteria determined by any authorities
  • 12. Humans are already not the only type
 of entities on the Earth. We have created corporations –
 “legal entities”, non-human participants
 of economy AND culture, i.e. civilization AI may become just another “entity” AI is just another entity! Aha!
  • 13. Liberalization 1. Competition with economic interaction 2. Trustless env. and guns :) 3. Multiplicity & decentralization 4. Constant progress Blockchain Is the best solution for creating 
 #d10e & trustless opened economics What is working:
  • 14. The Solution Instead of: AI regulations Big data regulations AI “Kill switch” “Azimov laws” Use: Economic incentives Zero knowledge Game theory Audibility & accountability Blockchain
  • 15. Multi-agent systems • AI is not singular; at some point
 in future will become interacting. • We will have multiple agents:
 autonomous vehicles, IoT, mobiles, etc. • Multiple V2V, V2E, E2E protocols will evolve, which will face byzantine faults and multiple security issues
 
 Blockchain is a technology that overcomes
 the same issues
  • 19.
  • 20. Problems to Solve • Scalability: run large-volume computations (ANNs) in trestles decentralised network w/o repeating all computing on each of the nodes • Censorsip-resistance: blockchain consensus protocol with high censorship resistance, but without PoW
  • 21. What we have Proof of Computing Work (PoCW) Protocol that allows large-scale computing (like AI)
 in a trustless peer network without 
 repeating computations on each of the nodes – this solves main blockchain & decentralised networks 
 scalability problem Consensus protocol (Prometheus) Based on top of PoCW, solves main PoW and PoS problems — this solves censorship resistance problem
  • 22. About the project • Zug (Switzerland) based, started in May 2017 • Privately funded, no ICO planned • 1st Round: Aug 2017,
 $500m raised • 2nd Round: May 2018,
 $3m raised (lead by CyberFund) • Valuation (by the second round) –  37.5m CHF (~USD)
 • Emphasize on Science, Engineering & Working Code • Member of CryptoValley Association
 • 5 PhDs and PhD fellows in the core team
 • Joint research with ETH University (Zurich), Institute of Cybernetics (Kiev), Web3 Foundation, Melonport, Ocean Protocol
  • 23. Where are we with release • Science: formal verification, academic papers prepared • Engineering: tech specifications in UML https://github.com/pandoraboxchain/pyrrha-techspecs • Code: smart contracts + full node code https://github.com/pandoraboxchain/pyrrha-consensus https://github.com/pandoraboxchain/pyrrha-pynode • Testnet in Ethereum network + Web UI to testnet (web client, explorer) http://client.pandora.network/ http://pandora.network/
  • 24. Core differentiators to other AI + BC • Scalability protocol (PoCW) reducing computation redundancy from O(N) to O(1), where N is the number of nodes in decentralised network • Consensus protocol based on PoCW that solves main PoW and PoS problems • Formal verification with game theory and other scientific instruments • Focus on censorship-resistance • No ICO but already working MVP • Synergy and cooperation with many of existing projects in the field
  • 25. Pandora Network Participants Data Providers ML Model Developers Consumer Computing Power Providers mining rewards Decentralised market Decentralised network buys buys provides job & payes
  • 26.
  • 27. Solving scalability problem We designed a protocol that allows large-scale computing in a trustless peer network without repeating computations on each of the nodes I’s named Proof of Computing Work – or PoCW.
  • 28. PoCW Basics • ML computation run only once by a randomly selected worker node of the network. Node puts a stake on the correctness of the computing. • 10% of the computation is verified once by a higher-staked node (Verifier), randomly selected also from all high-staked nodes • In case of inconsistency (negative verdicts of computation correctness) the stake of the original worker is slashed • Worker can put an appeal (by increasing stake). 
 Two round arbitration (closed and public) is run in this case (details follow)
  • 29. Solving Censorship Resistance Problem: Generic Blockchain Consensus • Partly synchronous (with maximum ∆ network delays) under basic conditions • Asynchronous recovery mode 
 (with chain splits and incentivised scheme for chain merge after synchronicity restoration) • On-chain randomness, no BFT-type agreements, i.e. fast and up to 50%+ tolerance to byzantine faults • Finality is reached maximum within ζ (zeta, ~20) blocks following any byzantine fault, but normally faster due to special gossip messaging algo
  • 30. Main challenges in designing PoS •Get on-chain multiparty-agreed randomness that can’t be affected by the last party •Build protection from long-range nothing at stake attacks •Make it able to work in async environment (like network failures) and restore from asynchronicity to synchronicity without double-spends
  • 32. Asymmetric Double-stranded Blockchain • Composed of two interconnected blockchains running similar consensus protocol but asymmetrical in the form of stake used by nodes: • First chain (proof of stake) uses common cryptocurrency-based stake • Second chain (proof of reputation) uses reputation, that comes from the performance of cognitive work • This can be compared to DNA, which doubles its security by organising genetic material into cross-referencing double helix • Or brain hemispheres, where one is responsible for “rational” and the other – for “irrational”
  • 33. PoS chain – 
 Value & Contracts Layer 1: generic cryptocurrency (bitcoin-like) but without drawbacks of PoW algorithm Layer 2: sidechains with Turing- complete virtual machines (EVM, WASM, other can be ported in the future) Layer 3: state and payment channels (Lightning, Luminal)
 Economics: • Cryptocurrency (BOX) PoR chain –
 AI & High-Load Computing Layer 1: base level for decentralised AI Layer 2: sidechains for scaling Layer 3: proof of computing work state channels Economics: • Utility token (PAN) + • Reputation 
 (node property, not liquid)