{"id":7675,"date":"2021-04-01T06:27:54","date_gmt":"2021-04-01T03:27:54","guid":{"rendered":"https:\/\/esatoshi.club\/?p=7675"},"modified":"2021-04-01T06:44:21","modified_gmt":"2021-04-01T03:44:21","slug":"phala-network-x-satoshi-club-ama-recap-from-31th-of-march","status":"publish","type":"post","link":"https:\/\/satoshi-club.esipick.com\/index.php\/2021\/04\/01\/phala-network-x-satoshi-club-ama-recap-from-31th-of-march\/","title":{"rendered":"Phala Network x Satoshi Club AMA Recap from 31th of March"},"content":{"rendered":"\n<p>Welcome to another episode of our AMA\nseries. Today we are glad to tell you about the AMA session with our friends\nfrom <a href=\"https:\/\/t.me\/phalanetwork\">Phala Network<\/a>. <\/p>\n\n\n\n<p>Phala is a cloud computing network, which offers computing power comparable to existing cloud services, protects the privacy of managed programs and maintains the properties of a blockchain in being secure and trustless. The AMA took place on March 31 and our guest was <a href=\"https:\/\/t.me\/MarvinPunk\">@MarvinPunk<\/a> (Co-founder and CEO). <\/p>\n\n\n\n<p>The total reward pool was 500$ and was divided into three parts. In this AMA Recap we will try to summarize some of the most interesting points for you.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p><strong>PART 1, INTRODUCTION AND COMMUNITY QUESTIONS<\/strong><\/p>\n\n\n\n<p><strong>Mary | Satoshi Club<\/strong>:\nHello Satoshi Club! We are happy to announce our AMA session with Phala\nNetwork! Welcome to Satoshi Club.<\/p>\n\n\n\n<p><strong>D. | Satoshi Club<\/strong>:\nand our guest &#8211; @MarvinPunk from Phala Network! welcome! good to have you here!<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>Hi Satoshi Club!<\/p>\n\n\n\n<p><strong>Mary | Satoshi Club: <\/strong>Hello!\nWelcome here. How are you today?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>great! We successful running as a parachain.<\/p>\n\n\n\n<p><strong>Mary | Satoshi Club: <\/strong>Marvin,\ncould you please introduce yourself and tell us more about Phala Network.<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>sure, thanks! My name is Marvin, the co-founder &amp; CEO of\nPhala Network. I also run a decentralized fund called PAKA with other Polkadot\nProject founders. I was Senior Product Manager at Tencent &amp; Didi. I used to\nwork on the project facing million-users, and I personally good at business\nstrategy design, experience in design service, data-driven decision, and\nbusiness model.<\/p>\n\n\n\n<p>I spent a lot of time figuring out what blockchain\ntechnology in 2018, like POW, smart contracts, and Dapp were. During that period, I got\nto know lots of friends and made the first EOS account-switch contract with a\nUK friend. So that&#8217;s how I came into the crypto world.<\/p>\n\n\n\n<p>At the same time, Hang Yin did well at BTG\u2014\u2014a Bitcoin fork\nproject to fight miner-control projects like BCH or BSV. However, due to its\ntoo decentralization to make it better, he also tried to find a better way to\ndevelop his career. After discussion, we agreed to start a new project and\nthought web 3.0 might be a better choice, which&#8217;s the beginning of Phala\nNetwork.<\/p>\n\n\n\n<p><strong>D. | Satoshi Club: <\/strong>how\nmany people in total working at Phala?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): an<\/strong>d we got 4-5-part time mates.<\/p>\n\n\n\n<p><strong>Mary | Satoshi Club<\/strong>:\nWhen did you start Phala Network project? How much time passed from the idea to\nnowadays?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork):<\/strong> But we decided to solve this problem as well as develop the\nconfidential smart contract. According to friends \u2018introduction, we set a core\nteam soon, because we&#8217;ve known each other since we know each other in Olympic\ncomputer competition when we were teenagers. This&#8217;s the story of Phala and\nmyself.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">We&#39;re thrilled to announce Phala Network won the Parachain Slot Auction on Polkadot Rococo testnet, with our good friends <a href=\"https:\/\/twitter.com\/litentry?ref_src=twsrc%5Etfw\">@litentry<\/a> <a href=\"https:\/\/twitter.com\/DarwiniaNetwork?ref_src=twsrc%5Etfw\">@DarwiniaNetwork<\/a> <a href=\"https:\/\/twitter.com\/bifrost_finance?ref_src=twsrc%5Etfw\">@bifrost_finance<\/a> !<br>Thanks to our supporting voters, Phala and our community look 100% ready to be a Parachain on Kusama\uff01 <a href=\"https:\/\/t.co\/lU9fMBgeSU\">pic.twitter.com\/lU9fMBgeSU<\/a><\/p>&mdash; Phala Network (@PhalaNetwork) <a href=\"https:\/\/twitter.com\/PhalaNetwork\/status\/1376926222601478144?ref_src=twsrc%5Etfw\">March 30, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p><strong>Q1 from Telegram user\n@meml97<\/strong><\/p>\n\n\n\n<p><em>While reading about\nyour project, I saw that Phala is well known for being one of the most\nimportant, if not the #1 security project for Polkadot that currently exists.\nBut as we know, there are other really good projects that aims to provide\nsecurity to the Polkadot Ecosystem as well, so, what do you think are the\nbiggest advantages Phala has over all these other competitors that puts it as\nthe #1 security project for this ecosystem?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork):<\/strong> It\u2019s quite a big question. For now, there are 3 types of privacy\nprotocols in the world. ZK-knowledge based, MPC based and TEE based And of\ncourse, there are mixer as Tornado. But Phala is not quite similar with them:\nPhala is a private computation cloud. This means it offers generalized compute\nat a public cloud scale, with a property of base-layer privacy \u2014 i.e. users\u2019\ntransactions are not publicly revealed. <\/p>\n\n\n\n<p>It combines a p2p network of computing hardware+software\nwith a blockchain that is needed for additional security and order. Yet all\ncomputer operations on Phala are trustless even without a blockchain, which\nmeans there is no centralized executioner or data controller, but the\nscalability (throughput) is similar to centralized server infrastructure. You\ncan run arbitrary programs on Phala, both autonomous like smart contracts, or\njust \u201cregular\u201d code that can be updated and maintained once it\u2019s released on\nthe network.<\/p>\n\n\n\n<p>Thus Phala can accommodate any type of program, combining\nthe best of Web2 and Web3 under one roof. It offers significant innovation to\nboth, as it brings trustless privacy to centralized apps or public cloud\nscalability and generalized privacy to DApps.<\/p>\n\n\n\n<p><strong>Mary | Satoshi Club: <\/strong>Can\nyou call Phala privacy solution?<\/p>\n\n\n\n<p><strong>D. | Satoshi Club: <\/strong>so\nPhala Network is pioneering project in its way?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork)<\/strong>: But there\u2019s also a third dimension to Phala: it creates an\ninfrastructure for massive-scale data exchange between parties that don\u2019t need\nto trust each other.<\/p>\n\n\n\n<p><a href=\"https:\/\/medium.com\/phala-network\/phala-transparent-and-private-global-computation-cloud-2d80c70ad1e9\">https:\/\/medium.com\/phala-network\/phala-transparent-and-private-global-computation-cloud-2d80c70ad1e9<\/a><\/p>\n\n\n\n<p><strong>Q2 from Telegram user\n@Arisabela<\/strong><\/p>\n\n\n\n<p><em>One of the use cases\nexposed on your website for your technology is artificial intelligence and\nhealthcare, I\u2019m involved in the healthcare world and also an enthusiastic of\nblockchain technologies, I wonder how you can combine the different components\nof your TEE to the health services, specifically for medical records and\nreal-time statistics?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork)<\/strong>: Very ingesting question. We think one of the most valuable use\ncase is target on sensive data: Health profile, for example. For now, you can\u2019t\ngive the healthy data to any 3rd party, even they can promote on analyzing for\nyour health or illness. Because after you give some bionology data to others,\nit is very dangerous for whom will use this. <\/p>\n\n\n\n<p>That\u2019s why even AI process so well, but Doctors still can\u2019t\nget real breakthrough in artificial intelligence medicine<\/p>\n\n\n\n<p><strong>Mary | Satoshi Club: <\/strong>What\nis your solution?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork):<\/strong> But, this is a typical case in multi-party data computing\nissue\u2014\u2014which is the best case for TEE-blockchain. Phala will launch a data analysing\nplatform named Web3 Analytics. Empowered by TEE technology that runs on a\npublic privacy cloud of Phala, W3A is a tool that runs the data analysis in TEE\nnodes and outputs only the results to the authorized parties.<\/p>\n\n\n\n<p>Those computations are done in parallel by hundreds and even\nthousands of nodes in the near future. For comparison, just one Phala-connected\nTEE can process orders of magnitude more data and computations than all of\nEthereum by replacing decentralized consensus with trust-minimized hardware.&nbsp; In Web3 Analytics, user data is end-to-end\nencrypted between the user\u2019s browser and the backend (a confidential smart\ncontract on Phala\u2019s trustless software), and the encrypted data will be stored\nin a decentralized storage network, connected to Phala (think Filecoin).<\/p>\n\n\n\n<p>The encryption key is only accessible by its owner and the\nsmart contract itself that runs inside the trusted execution enclave (i.e. is\ninaccessible by any external party). By design, the raw personal data is only\nread and processed by the smart contract, and will not be output from the TEE\nwithout the permission of its owner.<\/p>\n\n\n\n<p><strong>Mary | Satoshi Club: <\/strong>When\ndo you plan to launch your data analysing platform?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork):<\/strong> we already win a grant for Web3 Analytics from Web3 foundation,\nbeing hard working on that. The launch time will be July.<\/p>\n\n\n\n<p><strong>D. | Satoshi Club: <\/strong>gotcha.\nso you aiming to add some privacy layer to any data in the cloud?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork):<\/strong> good idea! For now, GCP and Azure have its privacy cloud. But\nthere is no permissonless cloud, and there is no such cloud can verify results\nby trustless<strong>.<\/strong><\/p>\n\n\n\n<p><strong>Q3 from Telegram user\n@AugusS7<\/strong><\/p>\n\n\n\n<p><em>I understand that the\nconfidential data is totally isolated, which provides a guarantee to the\nmembers since only authorization actions are allowed to be able to use the\ndata, but could you really define what those \u201cauthorization actions\u201d that must\nbe fulfilled would be? Are they unique or are there several actions to select?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork):<\/strong> Phala Network provides a global private computation cloud. It can\nbe used as a platform for confidential smart contracts. They differ from\n\u201ctraditional\u201d contracts on networks like Ethereum in that Phala smart contracts\nrun inside a special hardware enclave in a CPU, i.e. Trusted Execution\nEnvironment(TEE).<\/p>\n\n\n\n<p>The program running inside TEE is highly isolated, using its\nhardware-encrypted RAM. A malicious attacker can neither read the data in the\nmemory without authorization (i.e. a cryptographic key that is stored inside\nthe same TEE, only visible to the device itself and not external hardware or\nsoftware it interacts with) nor manipulate the program to produce any\nunintended behavior. <\/p>\n\n\n\n<p><strong>&nbsp;Mary | Satoshi Club: <\/strong>Does anyone in the\nindustry use this methods? Except Phala?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork):<\/strong> Generally speaking, WASM and even EVM can be executed in the TEE\nenvironment. So confidential contracts are very easy to program. Oasis Labs,\nand Secret Network.<\/p>\n\n\n\n<p><strong>Q4 from Telegram user\n@Indomiekuy<\/strong><\/p>\n\n\n\n<p>Can you share with us how is Phala\u2019s mining mechanism, I\nread that Phala using NPoS system for consensus instead of using PoW, what is\nthe different consensus NPoS and PoW? And for part of mining it said \u2018coming\nsoon\u2019, can you tell us what coin will be available for mining? It\u2019s kind of\nBTC\/ETH?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>easy to go version: Phala mining mechanism is what you can called\n\u201cProof of CPU\u201d how does that happen? Because of TEE. The earliest mining\nmachine of Bitcoin is the personal computer, and on Jan 3rd,2019, Satoshi\nNakamoto mined the first-50 BTC by his personal computer. Also, in The\nBig Bang Theory\u300b\uff0cSheldon\nmined some BTC by using Howard\u2019s old computer. After that, we found that GPU\uff08Graphics\nProcessing Unit) has high coincidence in computing power and mining\ncomputation, the amount of GPU in 1 graphics card equals dozens of CPU, which\ncan improve mining efficiency substantially. <\/p>\n\n\n\n<p>Many cryptocurrency assets, including BTC, ETH, DOGE are\nusing PoW\n(Proof of Work) algorithm as their consensus algorithm. PoW general refers\nto computing equipment find random numbers through Brute-force attack. <\/p>\n\n\n\n<p><strong>&nbsp;<\/strong>So when it comes to CPU\uff0cit\nalways meets with these 2 questions \uff1a<\/p>\n\n\n\n<p>&#8211; As a general computation unit, the CPU chip consists of\nthe branch prediction unit\uff0cstore unit and many other branch modules\uff0cwhich\nare not the optimal solution of PoW.<\/p>\n\n\n\n<p>&#8211; CPU is not good at parallel computing because of its\ndesign, it can only run for dozens of tasks one-time, however, what PoW need is\nthe computing power of solving the parallel problem.<\/p>\n\n\n\n<p><strong>D. | Satoshi Club: <\/strong>so\nwe need to have a good PC to participate in mining?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>The design of Bitcoin by Satoshi is &#8220;vote with their CPU\npower&#8221;. So, a PoW-based crypto asset, with its growing well known, there&#8217;s\nno doubt that it will have a process of CPU mining &#8211; GPU mining &#8211; ASIC mining,\nand this is the inevitable result of the PoW consensus algorithm.<\/p>\n\n\n\n<p>In the design of Phala Network, it chooses the architecture\nof detaching consensus and computation to achieve:<\/p>\n\n\n\n<p>&#8211; In the consensus part, Phala can achieve trustless within\nthe NPoS system and sharing Polkadot&#8217;s safety instead of by using PoW.<\/p>\n\n\n\n<p>&#8211; In the computation part, because each TEE is\nnon-byzantine, TEE workers can guarantee the trust computation under the\nassumption of safety. Furthermore, the similar sharing economy module and PHA\nmining mechanism can incentive TEE Workers to sign up on Phala Network as well\nas keeping online even complete the specified computation tasks.<\/p>\n\n\n\n<p><strong>Mary | Satoshi Club: <\/strong>Only\nPC?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>yes! only PC, Asic and GPU can NEVER mint PHA <a href=\"https:\/\/wiki.phala.network\/en-us\/docs\/poc3\/\">https:\/\/wiki.phala.network\/en-us\/docs\/poc3\/<\/a>\nFor more info, please read our docs<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"729\" height=\"451\" src=\"https:\/\/esatoshi.club\/wp-content\/uploads\/Phala2.jpg\" alt=\"\" class=\"wp-image-7680\" srcset=\"https:\/\/satoshi-club.esipick.com\/wp-content\/uploads\/Phala2.jpg 729w, https:\/\/satoshi-club.esipick.com\/wp-content\/uploads\/Phala2-300x186.jpg 300w\" sizes=\"(max-width: 729px) 100vw, 729px\" \/><\/figure>\n\n\n\n<p><strong>D. | Satoshi Club: <\/strong>is\nit possible to build a mining rig special for PHA mining?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>Phala will distribute 700 million PHA through TEE Mining. The\ntotal supply of mining rewards will be fixed without extra issuance and mining\nrewards will dwindle as time passes. Welcome to mint!<\/p>\n\n\n\n<p><strong>Q5 from Telegram user\n@johana0012<\/strong><\/p>\n\n\n\n<p><em>Phala exposes the\nfollowing: \u201cIf someone wants to obtain the passwords, they will have to break\nPhala\u2019s TEE network, which would mean simultaneously attacking the TEE mining\nnodes and the gatekeeper nodes scattered all over the world, all at once. This\nis virtually impossible \u201c. Technology is renewed by leaps and bounds on a daily\nbasis. Do not trust it. Have you studied the possibility of making adjustments\nto your technology to accommodate improvements in future security? Do you carry\nout security tests?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>Our threat model partially assumes the TEE manufacturer can be\ntrusted. This is reasonable. First, they don\u2019t know how their hardware will be\nused and thus cannot plan the attack ahead of time, significantly reducing the\nrisks.<\/p>\n\n\n\n<p>Second, if affected by the so-called zero-day attacks, other\napplications running on this CPU (outside of the TEE) are generally at risk. Also,\nwe have seen actual hardware exploits of TEEs come in the past &#8211; so far mostly\ntheoretical and coming from computer science researchers. Fortunately, those\nvulnerabilities can usually be mitigated in a few ways.<\/p>\n\n\n\n<p>It&#8217;s common to think software vulnerabilities are patchable\nwhile hardware vulnerabilities are not. This is not always the case. CPU can be\npatched by microcode updates. Given specific design of Intel&#8217;s SGX TEE\narchitecture, most of the vulnerabilities can be fixed. Suppose the\nvulnerability requires physical access to exploit it, as some other papers\nsuggest, miners may be able to steal data from the confidential contract.<\/p>\n\n\n\n<p><strong>D. | Satoshi Club: <\/strong>so\neverything is secure? and how about audits? did you pass or planning to do any?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>It\u2019s pretty hard to do audit for Phala, because you can only\naudit it for blockchain, but you can\u2019t audit off-chain part, which is the\ncomputation layer, because off-chain part of Phala is based by TEE trust.<\/p>\n\n\n\n<p>However, if more than one replica exists, multiple TEEs will\ntry to commit the updated smart contract states back to the blockchain. In this\ncase, there will be a simple on-chain voting process. We require a simple\nmajority to \u201cfinalize\u201d the states. By adding replications to TEE-based\nexecution of smart contracts that otherwise don&#8217;t require them for enhancing\ntrust properties, we maintain a fall-back security model similar to Polkadot&#8217;s\nvalidator-based security. The attacker must control a sufficient amount of\nminers to break the correctness, even if SGX\u2019s security model is completely\nbroken.<\/p>\n\n\n\n<p>Finally, we are planning to add support to other TEE\nhardware, such as AMD SEV and Arm TrustZone. If other chip manufacturers jump\ninto the race to eliminate Intel&#8217;s hegemony in this nascent hardware space, we\nwill be quick to adopt them as well to ensure reliability of Phala and\nresistance to any exploits.<\/p>\n\n\n\n<p><strong>Q6 from Telegram user\n@h1drX<\/strong><\/p>\n\n\n\n<p><em>In Phala Network, each\ncontract (c.) Is associated with a symmetric key called the Contract Key (k).\nContract keys are generated by Gatekeepers within pRuntime. Can you explain how\nthese keys work and what is their use in Phala Network?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork): <\/strong>Remote Attestation proves that a certain code (measured by the\nhash of the code), optionally with some customized data generated by the code,\nis running inside an up-to-date genuine Intel SGX enclave.<\/p>\n\n\n\n<p><strong>D. | Satoshi Club<\/strong>:\nby the way is it possible to implement a fork in the Phala&#8217;s network in case if\nthings go really bad? to prevent consequences of attack or something?<\/p>\n\n\n\n<p><strong>Marvin (Phala\nNetwork):<\/strong> Remote Attestation is a basic building block for confidential\nsmart contracts. But it&#8217;s not very useful if we cannot establish an end-to-end\nsecure communication channel between a user and TEE. Yes, and it\u2019s not a fork\u2026.\nBlockchain based on Substrate can update by democracy vote! It can happen\neveryday for update, Intel SGX, the only TEE currently supported by Phala, also\nprovides a Secret Provisioning protocol to solve the problem elegantly. By\nadopting the Secret Provisioning protocol, a chain of trust from the user to\npRuntime can be established: <\/p>\n\n\n\n<ol><li>The\nblockchain has the hash of the canonical pRuntime code.<\/li><li>pRuntime\nruns the remote attestation protocol, gets a report with the data: hash of the\nattested code (pRuntime itself); and the public key of an ephemeral identity\nkey pair.<\/li><li>The\nRA report is submitted to the blockchain and validated on-chain.<\/li><li>The\nblockchain compares the hash from the RA report (implies: the participant is a\ncanonical pRuntime in that TEE)<\/li><li>The\nidentity public key is registered on the blockchain (implies: only the current\npRuntime has control over this identity key).<\/li><\/ol>\n\n\n\n<p>As a result, as long as a message is signed by the identity\nkey, it must be produced by the registered pRuntime. Users can further\nestablish a TLS-like connection to a pRuntime with its registered public key.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p><strong>PART 2, TELEGRAM COMMUNITY LIVE\nQUESTIONS<\/strong><\/p>\n\n\n\n<p>The\nchat was open for 120 seconds; a lot of questions were posted by Satoshi Club\ncommunity. Our guest chose some of them. <\/p>\n\n\n\n<p><strong>Q1 from Telegram User @lahkoklu<\/strong><\/p>\n\n\n\n<p><em>Does Phala Network have a past\nstaking product where can I stake with the best or high apr to stake?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network):<\/strong> first winner:&nbsp; we have a staking system for TEE worker, but\nwe need to wait after Kusama slot auction, and Phala can run as a parachain.<\/p>\n\n\n\n<p><strong>Q2 from Telegram User @cengizhantekin<\/strong><\/p>\n\n\n\n<p><em>I see &#8220;interoperability&#8221;\nand &#8220;cross-chain&#8221; features exist in Phala, which are very critical\nfor a network. So which blockchains will you be serving with these features and\nwithin what period of estimated time?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network): <\/strong>2nd Winner: Polkadot and Kusama\nnetwork are our first target, and Acala Network, Literntry, Moonbeam, Plasm and\nALL parachains: it\u2019s pretty easy to serve Substrate chains as parachain for us.\nRead this: <a href=\"https:\/\/medium.com\/phala-network\/phala-and-acala-unveil-the-first-ever-cross-chain-demo-on-the-rococo-testnet-12033d90b460\">https:\/\/medium.com\/phala-network\/phala-and-acala-unveil-the-first-ever-cross-chain-demo-on-the-rococo-testnet-12033d90b460<\/a>\n<\/p>\n\n\n\n<p><strong>Q3 from Telegram User @meml97<\/strong><\/p>\n\n\n\n<p><em>&nbsp;I saw that some of the products Phala offers to its users are two things called \u201cDarkpool\u201d and \u201cDarkWallet\u201d, but it intrigued me the fact that you presented them on your website together, do they function as one single product, why? Can you explain us more about these products and why are they \u201cDark\u201d? What differences this DarkPool and DarkWallet have if we compare them to a normal Pool or a regular Wallet?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network):<\/strong> <strong>3rd winner<\/strong>:\nDark Wallet: An on-chain wallet that enables assets on any parachain to be\nconverted into \u201cinvisible\u201d assets. Because there will be so many\nparachain-assets on Kusama and Polkadot, privacy protection for users is a\nnecessary point. Users on any parachain like Acala, Reef, Literntry can easily\ntransfer their assets to Phala Network, and deposit their tokens into the Dark\nWallet. Thanks to XCMP offered by Polkadot, this can be done in a\npermissionless way, even without a single line of code change on the other\nparachain side. Whenever some assets are deposited to the Dark Wallet, all the\ntransfer transactions are e2e encrypted, and will not be identified as a\n\u201ctransfer\u201d transaction on block explorer. The blockchain only has the\nunreadable cipher. <a href=\"https:\/\/medium.com\/phala-network\/introducing-phala-dark-wallet-the-seed-of-the-age-of-blockchain-privacy-463c43a283c5\">https:\/\/medium.com\/phala-network\/introducing-phala-dark-wallet-the-seed-of-the-age-of-blockchain-privacy-463c43a283c5<\/a>\n<\/p>\n\n\n\n<p><strong>Q4 from Telegram User @marketingrentable<\/strong><\/p>\n\n\n\n<p><em>How does Phala Network manage to\ncombine scalability, interoperability and composability to interact with other\nblockchains, in an environment that provides security and speed in\ntransactions?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network):<\/strong> 4th winner: As we mentioned before,\nPhala is a TEE-blockchain hybrid architecture based on Substrate. But so far,\nall the TEE protocols lack the foundation of composability-interoperability. As\nwe know, composability-interoperability is the most important precondition of\nthe DeFi ecosystem in Ethereum, however, Phala, according to a creative design,\ncompleted the comparability-interoperability between contracts, even the\nblockchains. Phala is not based on Byzantine, and the trustless is guaranteed\nby the trustless hardware, but the single hardware cannot achieve availability\nand state-consistency.<\/p>\n\n\n\n<p>If you cut\noff the power, the hardware must be out of work; Multiple trusted computing\nnodes need to interact, and the unclear sequence of code execution will result\nin double-spending, which does not satisfy state consistency. So, we need to\nsolve these two problems with blockchain technology. That is to let everybody\ndownload data without permission by storing the status data on-chain. Beneath\nthis consensus computing, each node can get the status with consistency. In 1\nsentence, we are born with the ability to cross-chain. The Phala contract is\nparallelism, and it should cooperate with the interoperability protocol between\nsmart contracts to accomplish comparability, and we are Compatible with\nmultiple cross-chain methods.<\/p>\n\n\n\n<p><strong>Q5 from Telegram User @Rosane1a8<\/strong><\/p>\n\n\n\n<p><em>As a privacy Network, what data and\nprocesses can be untraceable with the use of Phala Network?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network)<\/strong>: 5th winner: all kinds of data\u2014\u2014onchain data and off-chain\ndata. For example, Web3 Analytics connects data providers: websites and\napplications, their users, or other data owners on the internet, like smart\ndevices or stand-alone databases &#8211; with different analytics tools\/products. Its\ncore feature is to allow end-to-end channels that output results of analysis\nwithout revealing the input data. It differentiates from Google Analytics in\nthat it\u2019s more generalized by allowing 3rd party data consumers or analytic\nservice providers to define their purpose themselves while verifying this\nsoftware is not used to spy after the data providers.<\/p>\n\n\n\n<p><strong>Q6 from Telegram User @Elise_04<\/strong><\/p>\n\n\n\n<p><em>What is the advantage of Phala\nNetwork during this time of pandemic? Do you have plans to develop an oracle in\nline with Health Care industries that could help combat and or even eliminate\nthe rising numbers of COVID-19 cases?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network)<\/strong>: 6th winner: Very interesting question. I think that in the\nepidemic scenario, the blockchain has the effect of &#8220;enhancing\ntracking&#8221;. However, this technology is a double-edged key. If it does not\ncooperate with the role of &#8220;protecting privacy&#8221;, it will become a\nterrible result! It&#8217;s not that we are worried about privacy, so we don&#8217;t want\nto collect everyone&#8217;s data to help prevent the epidemic. With reference to some\nmeasures taken by Apple and Google, we believe that it is possible to track the\nepidemic records reasonably without revealing the secrets of the people.<\/p>\n\n\n\n<p>For example,\nthrough Phala&#8217;s Web3 Analytics, users can personally manage their trip data.\nThe user&#8217;s data is encrypted, and the decryption capability is only possible\nwith the user&#8217;s signature. The decryption process is executed in Phala&#8217;s TEE\nminer machine, and no module can spy on the execution process of the TEE.<\/p>\n\n\n\n<p><strong>Q7 from Telegram User @Sumione<\/strong><\/p>\n\n\n\n<p><em>Do you have any native tokens of\nPhala network where could I buy??<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network)<\/strong>: 7th winner: yes, for now $PHA is ERC20, you can go to\nBinance, Huobi and Uniswap for PHA.<\/p>\n\n\n\n<p><strong>Q8 from Telegram User @Xusuo<\/strong><\/p>\n\n\n\n<p><em>I see that Phala already developed a\nnew lending protocol name with \u2018Worker-Nodes\u2019 for borrowing required Can you\nshare with us the result? PHA on stake. Have you already test and success\nimplement it?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network):<\/strong> 8th winner:&nbsp; in every stage of Phala testnet, we launch a\nmining campaign. On POC-2, we attracted more than 1000 full nodes joining\nPhala; on Poc-3, we attracted more than 2500+ TEE hardware in the competition.\nBecause we prepared the easy-to-join network, clear docs, and have friendly\nmoderators, miners can join mining at very low cost. This helped us build a\nvery strong and active miner community<\/p>\n\n\n\n<p><strong>Q9 from Telegram User @Airborne19<\/strong><\/p>\n\n\n\n<p><em>PRIVACY APPLICATIONS is one of the\nthings that phala users can created&#8230;can you please tell me what kind of\nPRIVACY APPLICATIONS we can create through the network?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network):<\/strong> 9th winner: we did a hackathon\nbefore, it turns out that there are so many kinds of PRIVACY APPs can be built\non Phala! Please take a look: <a href=\"https:\/\/medium.com\/phala-network\/what-kinds-of-privacy-applications-can-be-created-on-phala-e129d15b70d0\">https:\/\/medium.com\/phala-network\/what-kinds-of-privacy-applications-can-be-created-on-phala-e129d15b70d0<\/a>\n<\/p>\n\n\n\n<p><strong>Q10 from Telegram User @azrayeni<\/strong><\/p>\n\n\n\n<p><em>I see mining is available on Phala so\nwhere can I get the TEE-compatible required hardware?<\/em><\/p>\n\n\n\n<p><strong>Marvin (Phala Network): <\/strong>10th winner: you can test follow the\ndoc : <a href=\"https:\/\/wiki.phala.network\/en-us\/docs\/poc3\/1-1-hardware-configuration\/\">https:\/\/wiki.phala.network\/en-us\/docs\/poc3\/1-1-hardware-configuration\/<\/a>\n<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p><strong>PART 3, QUIZ AND INFO<\/strong><\/p>\n\n\n\n<p>As usual, for the third part, Satoshi\nClub Team asked the chat 4 questions about Phala Network. A\nlink to a Quiz form was sent into the chat. Participants had 10 minutes to\nanswer. 300$ were distributed between the winners. <\/p>\n\n\n\n<p><strong>For more information and future AMAs, join our Social Media\nchannels: <\/strong><\/p>\n\n\n\n<p>English Telegram\ngroup: <a href=\"https:\/\/t.me\/Satoshi_club\">https:\/\/t.me\/Satoshi_club<\/a>\n<\/p>\n\n\n\n<p>Russian Telegram\ngroup: <a href=\"https:\/\/t.me\/satoshi_club_ru\">https:\/\/t.me\/satoshi_club_ru<\/a>\n<\/p>\n\n\n\n<p>Spanish Telegram\ngroup: <a href=\"https:\/\/t.me\/satoshi_club_spanish\">https:\/\/t.me\/satoshi_club_spanish<\/a>\n<\/p>\n\n\n\n<p>Telegram Channel:\n<a href=\"https:\/\/t.me\/satoshi_club_channel\">https:\/\/t.me\/satoshi_club_channel<\/a>\n<\/p>\n\n\n\n<p>Website: <a href=\"https:\/\/esatoshi.club\/\">https:\/\/esatoshi.club\/<\/a><\/p>\n\n\n\n<p>Twitter:\n<a href=\"https:\/\/twitter.com\/esatoshiclub\">https:\/\/twitter.com\/esatoshiclub<\/a>&nbsp; <\/p>\n\n\n\n<p><strong>Our Partners: <\/strong> <\/p>\n\n\n\n<p>Phala Network Official: <a href=\"https:\/\/t.me\/phalanetwork\">https:\/\/t.me\/phalanetwork<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to another episode of our AMA series. Today we are glad to tell you about the AMA session with our friends from Phala Network. Phala is a cloud computing network, which offers computing power comparable to existing cloud services, protects the privacy of managed programs and maintains the properties of a blockchain in being [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":7676,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[],"_links":{"self":[{"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/posts\/7675"}],"collection":[{"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/comments?post=7675"}],"version-history":[{"count":2,"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/posts\/7675\/revisions"}],"predecessor-version":[{"id":7681,"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/posts\/7675\/revisions\/7681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/media\/7676"}],"wp:attachment":[{"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/media?parent=7675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/categories?post=7675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/satoshi-club.esipick.com\/index.php\/wp-json\/wp\/v2\/tags?post=7675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}