SlideShare a Scribd company logo
Curated Proof Markets &
Token-Curated Identities
in Ocean Protocol
Trent McConaghy
@trentmc0
#Data
#Incentives
Audio radar
1000x more data
The Unreasonable Effectiveness of Data
1000%
less
error!
Silo mo’ data
Mo’ accuracy
Mo’ $
Default incentive:
hoard the data
“Show me the incentive
and I will show you the outcome.”
-Charlie Munger
You can get people to do stuff
by rewarding them with tokens.
This is a superpower.
Change the
incentives!
Silo Pool mo’ data
Mo’ accuracy
Mo’ $
How to design?
Here’s a Process for Token Engineering
1. Formulate the problem. Objectives,
constraints, design space.
2. Try an existing pattern. If needed, try different
formulations or solvers.
3. Design new pattern?
Patterns (Building Blocks) for Token Design
• Curation
• Stake machines, curation markets
• Curated proofs markets, TCRs
• Proofs
• Bitcoin puzzle solving, Filecoin PoST, Steemit human
• Data availability, more
• Identity
• Reputation
• Governance / software updates
• Third-party arbitration
• …
Patterns (Building Blocks) for Token Design
• Curation
• Stake machines, curation markets
• This talk: Curated proofs markets, TCRs
• Proofs
• Bitcoin puzzle solving, Filecoin PoST, Steemit human
• This talk: Data availability, more
• Identity
• Reputation
• Governance / software updates
• Third-party arbitration
• …
Curated
Proofs Markets:
Formulation
Objective: maximize supply of relevant data
• We convert this objective to block rewards.
• Then, how about this reward:
“Reward making relevant data available when asked”
• But: How to know what’s relevant? Algorithms capture this poorly.
• Solution: leave it to the crowd. Let them put their money where
their mouth is! (Staking)
• Revised reward:
“Reward curating data (staking on it) + making it available”
Objective: maximize supply of relevant data
• Reward curating data (staking on it) + making it available
• New pattern: curated proofs market
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Expected
reward for user
i on dataset j
Dj = proofed popularity
= # times made dataset
available
Sij = predicted popularity
= user’s curation market
stake in dataset j
# tokens
during
interval
From AI data to AI services
Motivations:
• Privacy, so compute on-premise or decentralized
• Data is heavy, so compute on-premise
• Link in emerging decentralized AI compute
Objective function: Maximize supply of relevant services
=reward curating services + proving that it was delivered
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
proofed popularity
of service
predicted popularity
of service
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Sij = expected popularity =
stake in dataset j
Key block #1:
Curation market
Dj = actual popularity = #
downloads
Key block #2:
Proof of availability
(All other blocks are ancillary to these blocks)
Proofs
E(Rij) α log10(Sij) * log10(Dj) * T *Ri
Sij = predicted popularity =
stake in dataset j
Key block #1:
Curation market
Dj = actual popularity = #
downloads
Key block #2:
Proof of availability
(All other blocks are ancillary to these blocks)
Proof of Data Availability
Approach A: FileCoin Proof of Space-Time (PoST), though
that’s overkill
Approach B: TrueBit-style challenge-response:
1. I serve data to you
2. If you don’t think you got it, you challenge (with stake)
1. Randomly choose two actors to vet
2. Actors vote on whether served
3. If they agree that I served it, you lose stake
4. If they agree that I didn’t serve it , I lose stake
5. Else
More Proofs
With more proofs, more services!
Blob data
Availability
AI compute
Privacy
compute
Generalized
Proofs
Inter-
Operability
*Note: logos shown are examples and do not imply partnerships or integrations
General
compute,
prediction
Structured
data
Availability
Token Curated
Registry (TCR)
First, some attack vectors
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Some attack vectors
• Elsa & Anna Attack: Someone uploads popular content that
they don’t have rights to
• Data Escapes: People take data out of the system
• Curation Clones: Others create a new market for an existing
dataset
• Sybil Downloads: Someone (or a ring of buddies) downloads
a dataset they own >>1 times, to get >>rewards
How to approach?
Idea 1: network directly has legal arbitration
• Problem: it binds the network to jurisdictions (eek).
• Need to be permissionless and borderless!!
Idea 2: “sunny day tech, rainy day law”
• Core network itself has self-regulation by community.
Incentivize good acting. Zero sum  positive sum. 99% case.
• Higher levels can have arbitration tied to jurisdictions. 1% case
class TokenCuratedRegistry
def propose(data)
def challenge(proposal)
def vote(challenge)
TCR: a whitelist of good actors, curated by the actors themselves
New user B
proposes
for B to join 10 tokens
stake
by B
Existing user A
challenges
User status
A (Alice) “Challenger”
B (Bob) “New” +
“Proposed”
Mallory “OK”
Trent “OK”
10 tokens
stake
by A
class TokenCuratedRegistry
def propose(data)
def challenge(proposal)
def vote(challenge)
TCR: a whitelist of good actors, curated by the actors themselves
New user B
proposes
for B to join 10 tokens
stake
by B
Existing user A
challenges
User status
A (Alice) “Challenger”
B (Bob) “New” +
“Proposed”
Mallory “OK”
Trent “OK”
10 tokens
stake
by A
Concern:
High friction onboarding
7-28 day waiting period
class TokenCuratedRegistry
def vouch(data)
def challenge(proposal)
def vote(challenge)
TCR: a whitelist of good actors
“Trust is risk” for low-friction onboarding: vouch for others
Existing user
A vouches
for new user
B to join
10 tokens
stake by A,
B can run
away with it
anytime
User status
A (Alice) “Vouches”
B (Bob) “New”
Mallory “OK”
Trent “OK”
Some attack vectors
• Data Escapes: People take data out of the system
• Curation Clones: Others create a new market for an existing
dataset
• Elsa & Anna Attack: Someone uploads popular content that
they don’t have rights to
• Sybil Downloads: Someone (or a ring of buddies) downloads
a dataset they own >>1 times, to get >>rewards
Walk Through
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Curated Proof Markets & Token-Curated Identities in Ocean Protocol
Conclusion
AI  Data silos  data crisis.
Trent McConaghy
@trentmc0
A thoughtful token design
has thoughtful building blocks.
For Ocean, this includes:
• Curated Proofs Markets (CPMs)
• Token Curated Registry

More Related Content

PDF
Tokens, Complex Systems, and Nature
PDF
Tokens and Complex Systems
PDF
Data, AI, and Tokens: Ocean Protocol
PDF
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
PDF
Token Design as Optimization Design
PDF
Blockchains for AI [With New Applications]
PDF
Towards a Practice of Token Engineering
PDF
Data, AI, and Tokens: Ocean Protocol
Tokens, Complex Systems, and Nature
Tokens and Complex Systems
Data, AI, and Tokens: Ocean Protocol
[Energy/abundance edition] Nature 2.0: The Cradle of Civilization Gets an Upg...
Token Design as Optimization Design
Blockchains for AI [With New Applications]
Towards a Practice of Token Engineering
Data, AI, and Tokens: Ocean Protocol

What's hot (15)

PDF
Towards an AI Commons
PDF
Ocean Protocol: New Powers for Data Scientists
PDF
Energy Data Access Management with Ocean Protocol
PDF
Opportunities for Genetic Programming Researchers in Blockchain
PDF
The Evolution of Blue Ocean Databases, from SQL to Blockchain
PDF
The Web3 Data Economy: Ocean Protocol
PPTX
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...
PPTX
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
PDF
Beyond Online PDFs
PDF
Big data analytics 1
PDF
Approximate "Now" is Better Than Accurate "Later"
PPTX
Philosophy of Deep Learning
PDF
Building and Using a Knowledge Graph to Combat Human Trafficking
PPTX
A brief history of "big data"
PPTX
A Big Data Timeline
Towards an AI Commons
Ocean Protocol: New Powers for Data Scientists
Energy Data Access Management with Ocean Protocol
Opportunities for Genetic Programming Researchers in Blockchain
The Evolution of Blue Ocean Databases, from SQL to Blockchain
The Web3 Data Economy: Ocean Protocol
DN 2017 | A New Data Economy with Power to the People | Trent McConaghy | B...
DN2017 | From Big Data to Smart Data | Kirk Borne | Booz Allen Hamilton
Beyond Online PDFs
Big data analytics 1
Approximate "Now" is Better Than Accurate "Later"
Philosophy of Deep Learning
Building and Using a Knowledge Graph to Combat Human Trafficking
A brief history of "big data"
A Big Data Timeline
Ad

Similar to Curated Proof Markets & Token-Curated Identities in Ocean Protocol (20)

PDF
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
PDF
Curation Markets #ethbuenosaires
PDF
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
PPTX
[DSC Europe 23][Cryptica] Aleksandar_Damjanovic_Token_Engineering_Unveiling_t...
PDF
Better Information with Curation Markets
PDF
WorkerRep: Building Trust on Crowdsourcing Platform Using Blockchain
PDF
Decentralized Markets for Data and Artificial Intelligence
PPTX
Curation Markets TokenWork
PPTX
Trust in the age of blockchain
PDF
Decentralized AI Draper
DOCX
.Net projects 2011 by core ieeeprojects.com
PPTX
Security in the AI and Web3 era - Veramine
PDF
Blockchain recent artciles in 2020
PDF
Crypto Token Economy Design for Disruptive BM
PDF
Identity & trust in Monitored Spaces
ODP
Crypto Law
PDF
Cryptomania! The Byzantine Generals Leave Their Garden
PDF
Blockchains for trusted data and unstoppable code
PDF
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
PDF
Initial Commons Offering for Integral Blockchain
Blockchain EXE #10:Ocean ProtocolとBigchainDB: 分散型データエコシステムの実現(Dimitri De Jong...
Curation Markets #ethbuenosaires
The Token Engineering Process - Blockchain Futurist Conference 2018 - FansUnite
[DSC Europe 23][Cryptica] Aleksandar_Damjanovic_Token_Engineering_Unveiling_t...
Better Information with Curation Markets
WorkerRep: Building Trust on Crowdsourcing Platform Using Blockchain
Decentralized Markets for Data and Artificial Intelligence
Curation Markets TokenWork
Trust in the age of blockchain
Decentralized AI Draper
.Net projects 2011 by core ieeeprojects.com
Security in the AI and Web3 era - Veramine
Blockchain recent artciles in 2020
Crypto Token Economy Design for Disruptive BM
Identity & trust in Monitored Spaces
Crypto Law
Cryptomania! The Byzantine Generals Leave Their Garden
Blockchains for trusted data and unstoppable code
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Initial Commons Offering for Integral Blockchain
Ad

Recently uploaded (20)

PPTX
TLE Review Electricity (Electricity).pptx
PDF
STKI Israel Market Study 2025 version august
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
What is a Computer? Input Devices /output devices
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
1. Introduction to Computer Programming.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Modernising the Digital Integration Hub
PPTX
Tartificialntelligence_presentation.pptx
PPTX
The various Industrial Revolutions .pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TLE Review Electricity (Electricity).pptx
STKI Israel Market Study 2025 version august
Web App vs Mobile App What Should You Build First.pdf
A comparative study of natural language inference in Swahili using monolingua...
What is a Computer? Input Devices /output devices
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
1. Introduction to Computer Programming.pptx
A novel scalable deep ensemble learning framework for big data classification...
Assigned Numbers - 2025 - Bluetooth® Document
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Hindi spoken digit analysis for native and non-native speakers
NewMind AI Weekly Chronicles – August ’25 Week III
Modernising the Digital Integration Hub
Tartificialntelligence_presentation.pptx
The various Industrial Revolutions .pptx
Getting started with AI Agents and Multi-Agent Systems
observCloud-Native Containerability and monitoring.pptx
Programs and apps: productivity, graphics, security and other tools
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Curated Proof Markets & Token-Curated Identities in Ocean Protocol

  • 1. Curated Proof Markets & Token-Curated Identities in Ocean Protocol Trent McConaghy @trentmc0
  • 4. 1000x more data The Unreasonable Effectiveness of Data 1000% less error!
  • 5. Silo mo’ data Mo’ accuracy Mo’ $ Default incentive: hoard the data
  • 6. “Show me the incentive and I will show you the outcome.” -Charlie Munger
  • 7. You can get people to do stuff by rewarding them with tokens. This is a superpower.
  • 8. Change the incentives! Silo Pool mo’ data Mo’ accuracy Mo’ $
  • 9. How to design? Here’s a Process for Token Engineering 1. Formulate the problem. Objectives, constraints, design space. 2. Try an existing pattern. If needed, try different formulations or solvers. 3. Design new pattern?
  • 10. Patterns (Building Blocks) for Token Design • Curation • Stake machines, curation markets • Curated proofs markets, TCRs • Proofs • Bitcoin puzzle solving, Filecoin PoST, Steemit human • Data availability, more • Identity • Reputation • Governance / software updates • Third-party arbitration • …
  • 11. Patterns (Building Blocks) for Token Design • Curation • Stake machines, curation markets • This talk: Curated proofs markets, TCRs • Proofs • Bitcoin puzzle solving, Filecoin PoST, Steemit human • This talk: Data availability, more • Identity • Reputation • Governance / software updates • Third-party arbitration • …
  • 13. Objective: maximize supply of relevant data • We convert this objective to block rewards. • Then, how about this reward: “Reward making relevant data available when asked” • But: How to know what’s relevant? Algorithms capture this poorly. • Solution: leave it to the crowd. Let them put their money where their mouth is! (Staking) • Revised reward: “Reward curating data (staking on it) + making it available”
  • 14. Objective: maximize supply of relevant data • Reward curating data (staking on it) + making it available • New pattern: curated proofs market E(Rij) α log10(Sij) * log10(Dj) * T *Ri Expected reward for user i on dataset j Dj = proofed popularity = # times made dataset available Sij = predicted popularity = user’s curation market stake in dataset j # tokens during interval
  • 15. From AI data to AI services Motivations: • Privacy, so compute on-premise or decentralized • Data is heavy, so compute on-premise • Link in emerging decentralized AI compute Objective function: Maximize supply of relevant services =reward curating services + proving that it was delivered E(Rij) α log10(Sij) * log10(Dj) * T *Ri proofed popularity of service predicted popularity of service
  • 16. E(Rij) α log10(Sij) * log10(Dj) * T *Ri Sij = expected popularity = stake in dataset j Key block #1: Curation market Dj = actual popularity = # downloads Key block #2: Proof of availability (All other blocks are ancillary to these blocks)
  • 18. E(Rij) α log10(Sij) * log10(Dj) * T *Ri Sij = predicted popularity = stake in dataset j Key block #1: Curation market Dj = actual popularity = # downloads Key block #2: Proof of availability (All other blocks are ancillary to these blocks)
  • 19. Proof of Data Availability Approach A: FileCoin Proof of Space-Time (PoST), though that’s overkill Approach B: TrueBit-style challenge-response: 1. I serve data to you 2. If you don’t think you got it, you challenge (with stake) 1. Randomly choose two actors to vet 2. Actors vote on whether served 3. If they agree that I served it, you lose stake 4. If they agree that I didn’t serve it , I lose stake 5. Else
  • 21. With more proofs, more services! Blob data Availability AI compute Privacy compute Generalized Proofs Inter- Operability *Note: logos shown are examples and do not imply partnerships or integrations General compute, prediction Structured data Availability
  • 25. Some attack vectors • Elsa & Anna Attack: Someone uploads popular content that they don’t have rights to • Data Escapes: People take data out of the system • Curation Clones: Others create a new market for an existing dataset • Sybil Downloads: Someone (or a ring of buddies) downloads a dataset they own >>1 times, to get >>rewards
  • 26. How to approach? Idea 1: network directly has legal arbitration • Problem: it binds the network to jurisdictions (eek). • Need to be permissionless and borderless!! Idea 2: “sunny day tech, rainy day law” • Core network itself has self-regulation by community. Incentivize good acting. Zero sum  positive sum. 99% case. • Higher levels can have arbitration tied to jurisdictions. 1% case
  • 27. class TokenCuratedRegistry def propose(data) def challenge(proposal) def vote(challenge) TCR: a whitelist of good actors, curated by the actors themselves New user B proposes for B to join 10 tokens stake by B Existing user A challenges User status A (Alice) “Challenger” B (Bob) “New” + “Proposed” Mallory “OK” Trent “OK” 10 tokens stake by A
  • 28. class TokenCuratedRegistry def propose(data) def challenge(proposal) def vote(challenge) TCR: a whitelist of good actors, curated by the actors themselves New user B proposes for B to join 10 tokens stake by B Existing user A challenges User status A (Alice) “Challenger” B (Bob) “New” + “Proposed” Mallory “OK” Trent “OK” 10 tokens stake by A Concern: High friction onboarding 7-28 day waiting period
  • 29. class TokenCuratedRegistry def vouch(data) def challenge(proposal) def vote(challenge) TCR: a whitelist of good actors “Trust is risk” for low-friction onboarding: vouch for others Existing user A vouches for new user B to join 10 tokens stake by A, B can run away with it anytime User status A (Alice) “Vouches” B (Bob) “New” Mallory “OK” Trent “OK”
  • 30. Some attack vectors • Data Escapes: People take data out of the system • Curation Clones: Others create a new market for an existing dataset • Elsa & Anna Attack: Someone uploads popular content that they don’t have rights to • Sybil Downloads: Someone (or a ring of buddies) downloads a dataset they own >>1 times, to get >>rewards
  • 41. AI  Data silos  data crisis. Trent McConaghy @trentmc0 A thoughtful token design has thoughtful building blocks. For Ocean, this includes: • Curated Proofs Markets (CPMs) • Token Curated Registry