Transcription of 777 Interview with Borzalom: (All answers are CCR’s reiteration of what Borzalom has said)
CCR: Ok I want to thank you all very much for joining us for our first live session with Zoltan Sabo, aka Borzalom. This is the first live session of 777 with Borzalom. Borz is going to do his best to share his vision for XTRABYTES tonight with our community and we’re going to move right into it here. First, I’m going to let Zoltan / Borzalom say hello; Zoltan please go ahead and say hello to everybody:
Borzalom: Hello everybody. I’m here. Thank you.
Q1: What gives XBY value? Is it the platform where applications can be run or something else?
A: The original goal was originally conceived as relating to data storage. However, this goal expanded as we moved forward and we now see that the real value of XBY is as an XBY-based service/trading platform. One where different applications can utilize XTRABYTES’ services. So the future winners are going to be the trusted decentralized service providers as well as STATIC node owners. And XBY is going to be the market for these decentralized service providers. So that is an important goal and what we’re presently seeking to accomplish.
Q2: Explain the Proof of Signature (PoSIGN) consensus algorithm. What are its benefits over Proof of Work or Proof of Stake algorithms? Why is it desirable?
A: The first thing that Borzalom emphasized is that our Proof of Signature is green. It’s a very environmentally-friendly algorithm, like Proof of Stake as many of you know. We discussed this in Slack and on the forum, especially as it relates to the different size laptops, for example, or different computers needed to run a STATIC node. We have explained that you can use an older machine as STATIC nodes don’t require a lot of power.
This is very helpful, as he’s talking about the Proof of Work miners, for example, noting that they’re very energy intensive and we are not. That’s a very important thing for people to realize; he also discussed security and how Proof of Signature is so much stronger and more secure than Proof of Work (as each Proof of Signature miner is trusted and audited). So in this respect, Proof-of-Signature is better for the business environment than Proof of Stake or Proof of Work, where miners are unknown.
XBY wants to be a real business solution, especially in those situations where the peers and miners must be known and not anonymous. That’s part of the trust factor that we have here at XBY, so all the STATIC node miners are well-known and they trust each other just like in the real business world … that’s a big key.
Q3: How do you envision DAPPS running on the XTRABYTES platform? And how does this relate to the US dollar price?
A: All application income will be XBY, so if you use XTRABYTES applications, you’ll have to use XBY. This will create tremendous internal demand and an internal economy, so to speak, which will make XBY very very strong and able to grow.
So why would you need XBY? Because you’ll be spending XBY on XTRABYTES-based applications and services. After you spend it, of course, you’re going to need it again and when you spend it you’re giving those XBY-tokens to the service providers and STATIC node owners. So its again generating that economy, that internal economy. DApp developers and STATIC service providers, they’re going to turn around and use it themselves on perhaps in some other way.
So again, we go back to the business model aspect of all this and this is the reason why it’s a better business model here at XBY then what’s available with Ethereum or Bitcoin. As far as the US Dollar price goes, Ethereum and Bitcoin depend on the US dollar price whereas XBY is independent of the US dollar as it’s all going to be an internal business.
Q4: How do the CORE modules relate to the DICOM … aren’t the CORE modules different and shouldn’t they be on a different level than the EXTERNAL modules?
A: The CORE modules and the EXTERNAL modules connect at the same level, the difference between them is that the connection is the actual connection itself between the modules. The core modules, they know each other so they will be more deeply integrated into the system than any external modules. All core modules will connect to each other and have the capacity to use core system functions as well as other core module functions.
However, the core modules will never use external modules functions. External modules may use other external module functions and core functions and the core module functions too so this is a major difference. Another difference is the connection level between these modules; core modules will sometimes use direct connections to the core system, whereas external modules will only use the DICOM interface.
Q5: Can we get details on the security of the network, algorithms being used and encryption methods used? For example, will we be using SHA-256, SHA-512 or some other truncated version?
A: The hash and all other cryptographic key lengths are going to be easily changeable. They are changeable as it is now. We’re going to be providing a link as well. In fact, you can go to https://www.keylength.com/en/4 and view the many different suggestions that exist. So for us, after the code is finished, Borzalom will find the best methods and optimal key lengths to go with it.
Now, this is not all that important today because SHA-512 is secure. But tomorrow it won’t be secure. Technology is changing very fast, quantum computing will soon be coming as well, and so he’s working on how to meet those challenges. He is trying to stay ahead of the curve here by creating a code that is easily changeable. One that allows for the encryption methods and the key lengths to be quickly changed if necessary.
Cryptography is very difficult, as it’s not just the key length that is needed but lots of other things like time stamping is needed as well. Borzalom is always going to use the top cryptographic techniques available. Decoding and encoding long cryptographic keys, this requires a lot of time. So he wants to find the best compromise for all this. As we said, today the 256-bit key length is secure enough but even one security issue, one hack, and even the 4096-key length will be in danger of being cracked. So this is where Borzalom is focusing his efforts. He is staying ahead of the curve here with regards to security technology.
Q6: Have you recruited any new developers and if so what are your long-term plans with them?
A: He wants to build a hierarchical but independent development team. More developers mean more decentralization. The best development team is one that controls and manages themselves without Borz. This is what he’s trying to do. Early on we had a small team starting but the project was not quite ready to take on new developers at that point at a serious level and in the coming days in fact, you’re going to hear a lot about what’s coming on Tuesday. So make sure you come out and tune in on Tuesday, that’s going to be another big day.
Q7: How do you see your role once a major dev is done? Will you move into a more vocal public role or focus on continued development etc.?
A: I will always focus on the development. My role is always going to be software development I don’t want to do anything else. This is what he does and what he’s comfortable with for obvious reasons. Borz believes we have a talented team here, a lot of talented people assembling at the management level and these people are going to take care of the public role and the way they feel what’s best for XTRABYTES and that’s all starting to come together here.
This concludes the 777 with Borzalom for October.