Transcription of 777 Interview with Borzalom: (All answers are CCR’s reiteration of what Borzalom has said)
CCR: Ok I want to thank you all very much for joining us for our first live session with Zoltan Sabo, aka Borzalom. This is the first live session of 777 with Borzalom. Borz is going to do his best to share his vision for XTRABYTES tonight with our community and we’re going to move right into it here, first I’m going to let Zoltan / Borzalom say hello; Zoltan please go ahead and say hello to everybody:
Borzalom: Hello everybody I’m here. Thank you.
Q1: What gives XBY value? Is it the platform where applications can be run or something else?
A: The original goal was data storage and as we move forward the goal expanded and now the new real value of XBY is a XBY based service/trading platform of different applications being able to utilize the services at XTRABYTES. So the future winners are going to be the trusted decentralized service providers as well as STATIC node owners and XBY is going to be the market for decentralized service providers. So that is the real big goal of what we are doing here now.
Q2: Explain the Proof of Signature (PoSIGN) consensus algorithm. What are its benefits over Proof of Work or Proof of Stake algorithms? Why is it desirable?
A: The first thing that he talked about here is that Proof of Signature is green, it’s a very environmentally friendly algorithm like Proof of Stake as many of you know. We talk a lot about this in the slack and also on the forum about the different size laptops for example or different computers that are needed to run a STATIC node. We have explained that you can use an older machine and it doesn’t take a lot of power. This very good because as he’s talking about the Proof of Work miners, for example, they’re very energy intensive and we are not. That’s a very important thing for people to realize; then he moved on to the security so Proof of Signature is much stronger and more secure than Proof of Work because each Proof of Signature miner is trusted and audited so in this sense it’s better for the business environment than Proof of Stake or proof of work where miners are unknown. XBY wants to be a real business solution. peers and miners have to be non-anonymous and we have to know who they are. That’s part of the trust factor that we have here at XBY, so all the static node miners are well known and they trust each other just like in the real business world … that’s a big key.
Q3: How do you envision DAPPS running on the XTRABYTES platform? And how does this relate to the US dollar price?
A: All application income will be XBY so if you use XTRABYTES applications, you’ll have to use XBY. This is creating a big internal demand and an internal economy so to speak which is going to make a very very strong XBY as we continue to grow. So why do you need XBY? Because you spend XBY on the XTRABYTES based applications and services. After you spend it, of course, you’re going to need it again and when you spend it you’re giving those XBY to the service providers and the STATIC owners. So its again creating that economy, that internal economy. Application developers and STATIC service providers, they’re going to turn around and use it themselves on perhaps something else. So again we go back to the business model aspect of all this and this is the reason why it’s a better business model here at XBY then what’s available with Ethereum or Bitcoin. As far as the US Dollar price goes Ethereum and Bitcoin depend on the US dollar price whereas XBY is independent of the US dollar because it’s all going to be an internal business.
Q4: How do the CORE modules relate to the DICOM … aren’t the CORE modules different and shouldn’t they be on a different level than the EXTERNAL modules?
A: The CORE modules and the EXTERNAL modules connect at the same level, the difference between them is that the connection is the actual connection itself between the modules. The core modules they know each other so the integration is deeper than the integration of the external modules. All core modules connect to each other. All core modules use functions of the core system and other core modules but the core modules never use the external modules functions. External modules use the other external module functions and core functions and the core module functions too so this is the difference. Another difference is the connection level between the modules; core modules sometimes use the direct connection to the core system, external modules only use the DICOM interface.
Q5: Can we get details on the security of the network, algorithms being used and encryption methods used? For example, will we be using SHA-256, SHA-512 or some other truncated version?
A: The hash and all other cryptographic key lengths are going to be easily changeable. They are changeable as it is now. We’re going to be providing a link, in fact, you can go to https://www.keylength.com/en/4 and there are many different suggestions. So for us, after the code is finished, he’s going to optimize the best methods and key lengths. Now, this not important because today 512 is secure, but tomorrow it won’t be secure. Technology is changing very fast, quantum computing is coming as well, and so he’s working on something and trying to stay ahead of the curve here and creating the code that is easily changeable so that if he needs to, the encryption methods and the key lengths can be changed. Cryptography is very difficult, not just key length is needed lots of other things like time stamping is also needed. He’s always going to use the top cryptographic techniques also. Decoding and encoding long cryptographic keys, this requires a lot of time so he wants to find the best compromises for all this. As we said, today the 256 bit key length is secure enough but even one security issue, one hack, and even the 4096 key length is potentially going to be crackable eventually. So this is where he is focusing and staying ahead of the curve here with the security technology.
Q6: Have you recruited any new developers and if so what are your long-term plans with them?
A: He wants to build a hierarchical but independent development team. More developers mean more decentralization. The best development team is one that controls and manages themselves without Borz. This is what he’s trying to do. Early on we had a small team starting but the project was not quite ready to take on new developers at that point at a serious level and in the coming days in fact, you’re going to hear a lot about what’s coming on Tuesday. So make sure you come out and tune in on Tuesday, that’s going to be another big day.
Q7: How do you see your role once a major dev is done? Will you move into a more vocal public role or focus on continued development etc.?
A: I will always focus on the development. My role is always going to be software development I don’t want to do anything else. This is what he does and what he’s comfortable with for obvious reasons. Borz believes we have a talented team here, a lot of talented people assembling at the management level and these people are going to take care of the public role and the way they feel what’s best for XTRABYTES and that’s all starting to come together here.
This concludes the 777 with Borzalom for October.