Alice DAO - How it works

Ok, let me provide where the data came from. Otherwise, it can’t really be trusted, I suppose.

The first proposal 134701 was made 2025-01-07, 7:24:04 PM UTC (taken from the dashboard)

The thread was made a few minutes earlier Alice sns dao manifesto - #9 by wpb
When you add .json to the URL you get all the info [Alice sns dao manifesto]

You can load it in a json viewer
image

The thread wasn’t about you @wpb I just included you, because of you being the opposition in previous proposals. The goal is to make Alice great again

I need to watch goodfellas again such a good movie.

yeah one of the best ever

1 Like

Running an under-specced node is likely to be discovered pretty quickly. There are trustworthy metrics (that go through consensus) and non-trustworthy metrics on the nodes, and DFINITY and possibly some other NPs are actively monitoring nodes for signs of poor performance.

So yeah… having low-quality nodes would be a lot of work (to fake all the metrics) and for some things even isn’t possible - such as for the trustworthy metrics, where performance of a node gets evaluated by its the peers.

I’ve been telling this and I will keep telling this no matter what others say. TEE is not a silver bullet. TEE has been broken multiple times in the past, and will be broken again, especially given sufficient financial incentive. So TEE raises the bar, nothing more and nothing less. It also severely increases the operational complexity. So that has to be carefully evaluated and taken into account.

5 Likes

But much of the the funds are not lost yet, so why not try and repurpose them.

There is a hole in your thinking

Been meaning to respond to this for a while. I don’t think that anyone that is wanting access to TEE’s thinks that they are a silver bullet for everything. I understand why security experts, computer science PhD’s, And extremely smart people would be wary of them. The fact of the matter is that, in general, the enterprise world considers them to be"good enough", And in general, using them is considered to To check all kinds of boxes around due diligence and adequate security protocols, according to all kinds of regulatory restrictions across the globe. There’s literally billions of dollars waiting to be deployed onto the tech that figures them out.

In addition, we use TEEs for internet identity all the time. Why are those enclaves OK but others aren’t? Complexity? Probably so. But still, making them available and using them for critical infrastructure are two very different things.

The sooner we get them, the sooner we can start competing outside of Web2 where the infrastructure and tooling out competes what we have for the IC.

This is totally not relevant to the current conversation, but whenever I see this TEE aren’t perfect discussion I think it’s worth bringing up that they are likely good enough for a lot of application.

5 Likes