You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Instantly share code, notes, and snippets.
Viktor Trón
zelig
free dom fighter, code artist
founder and architect of Swarm.
@ethereum OG, ex project lead at EF
@ethersphere founder
The purpose of this work is to have a comprehensive and modular network testing suite, which is able to drive
test harnesses for p2p network behaviour. This includes simulations as well as cluster tests on an actual network.
pss (bzz whispered) is a swarm network service offering incentivised internode messaging using kademlia based deterministic routing.
phase 0 comes with priorities and an easy to use api exposed to RPC. you can subscribe to messages and peers using geths new pub/sub (available via websockets and ipc).
Swarm kademlia routing implements an efficient unicast address based messaging system.
While whisper's architecture offers a nice trade-off between efficiency and anonimity, it is lacking the
case when strong anonimity is not required, but predictably low latency transfer is.
Public chatrooms, or convo between nodes that do not mind leaking this fact (the content is always safe due to end-to-end encryption).
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The Ethereum Sword = Swarm On-demand Retrieval Daemon
The Ethereum Sword = Swarm On-demand Retrieval Daemon
With this service enabled, you keep the Ethereum chain data in swarm, so your ethereum node can function as a flexible light client.
Sword leverages the new chain and state access layers to the core, to provide an on-demand retrieval plugin. Perfectly identical to the LES-based light client, SWORD provides integrity protected (merkle proof verified) on-demand access to the ethereum blockchain data. Chain data include blocks, transactions (maybe even block headers), receipts, state and contract storage. This means a fast user-experience that allows you to do anything a full archival node can without major compromise to security yet without ever running the VM or storing any particular part of the chain and state database.
SWORD is completely resistant to local storage or memory failures but requires network connectivity and a healthy swarm network with sufficient provision (enough nodes submitting, storing and serving chain data).
On the one hand a
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
GPU mining on MacOS. Tried on MacBook Pro Retina with NVIDIA GeForce GT750M. Only reaches a max of 700-900 KH/s which is only 0-15% better than CPU on 8 cores
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The Ethereum Swarm project: timeline of accomplishments and roadmap
The development of the distributed mass storage subsystem for Ethereum
named Swarm was kicked off in October 2014, shortly before Devcon 0 in
Berlin, where we presented the design principles, the basic network and
protocol architecture as well as the requirements that we aimed to
achieve. With the preliminary design finalized by the end of 2014,
implementation in Go language began in 2015.
In 2015, we built the foundations of Swarm, consisting of the
subsystems for distributing arbitrarily large files across the network
with the possibility of subsequent efficient retrieval and
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters