Authmen: NFT + DeFi, make AUTH more valuable

Cryptophd
8 min readJan 29, 2021

On January 28, an exciting AMA of the Authmen project was held in the CryptoPHD Official community. All the members of the community warmly welcomed Authmen’s arrival and showed great interest in the project. Many questions were raised on the spot, and professional and lively discussions were held there. Here’s the recap of AMA:

Host: We are delighted to have you here today. Now there’s a lot of people with questions for #Authmen. Can you please give us an introduction about Authmen?

Samir: Sure. Authmen is a trusted blockchain storage protocol. It is a new storage scheme based on the distributed idea of blockchain. It mainly solves the problems of data storage and data flow. Using trusted blockchain technology distributed high availability, open and transparent, tamper proof, information security and other technical characteristics, to build information security tamper proof and traceability system.

Host: Great! Now, for Part 2, Let’s go to the Twitter Questions! We have 4 twitter questions for you.

Question 1 from Twitter User @@TXinchun

#Authmen#CryptoPHD How is Authmen different from other decentralized storage projects?

Samir: Good question. As we all know, the decentralized storage market will be super huge in the future. At present, there are also many projects on the market. So it’s important to understand the differences between these projects.

According to the implementation logic, the projects represented by Filecoin, Arweave and Crust can be divided into the incentive layer of a content-based file sharing network, while the projects represented by Sia and Storj are more inclined to share their hard disk space through incentive token.

Authmen is similar to other decentralized storage projects in that the server is controlled by non centralized service providers, which completely avoids the adverse impact of local interruption and denial of service attacks on stored files. In addition, users of these distributed storage projects can host files in a decentralized way, which can provide more relaxed storage services on the premise of ensuring file security.

Authmen pays more attention to the node’s trustworthiness, and is committed to building a trusted blockchain storage protocol.

Since distributed storage mainly depends on decentralized nodes, storage proof consensus algorithm is needed for spatial consensus. If the consensus algorithm is missing, it can not make other nodes trust, and can not solve the problems of whether the space of a node is enough to store data, whether the stored files or copies have been lost. By relying on the trusted technology of Trias to calculate the high-quality nodes, the Authmen network not only realizes efficient consensus, but also avoids the influence of human interference on DPOS, and increases the transparency and fairness of the system.

Let me introduce the advantages of Authmen:

Transparency: the storage mechanism is open and transparent.

2. Fairness: the workload and reward calculation of work nodes are protected by TEE, and the nodes need not worry that their workload will not be rewarded, and they can not get extra rewards through cheating.

3. Efficiency: the proof of storage capacity does not require the challenge of large amount of redundancy, nor does it need to store any meaningless data. Both computing and storage resources can be efficiently utilized.

4. Scalability: TEE supports complete computing, and has the potential of continuous development. Authmen ecosystem can achieve more powerful functions to ensure the development of evolution from storage consensus to computing consensus.

Question2 from Twitter User @@Lucy31122738

In addition to mining rewards, data on the Authmen network can also bring value to us. Can you explain it in detail?

Samir: Data on the Authmen network can also bring value to users. It means users can manage, authorize and delete data through confidentiality contracts. Authmen will also provide a trading market where users can make a profit by collecting their own data. The demander will pay auth as the reward for using network resources and source data, while auth will pay the user who provides source data auth as the reward for providing data, and the miner will get auth as the reward for providing computing power. Both data miners and computational miners can get long-term benefits in the Authmen network.

In addition, we introduced NFT into Authmen ecology. Authmen NFT can exchange the actual storage space after the Authmen platform goes online and has the same liquidity as digital currency. Users who hold Authmen NFT can trade freely in NFT market. Users can also obtain liquid cash by pledging their Authmen NFT, which makes the use of funds more flexible.

Question3 from Twitter User @Crypto_OlaB

The biggest difference between Authmen and other NFT projects is that Authmen can quickly attract users by combining the elements of DeFi and adding usage scenarios to NFT. Why do you design it and what benefits it can bring us?

Samir: Authmen innovatively introduces NFT into liquidity mining. Users can mine in the mining pool through their own Authmen NFTs to obtain AUTH tokens. Different levels of NFTs have different mining efficiency.

Authmen NFT is a kind of computational NFT with actual storage as endorsement and cast by ERC-1155 standard. Users can obtain Authmen NFT by consuming AUTH, and destroy low-level NFT to obtain higher-level NFTs, so as to obtain more computing power and storage capacity.

Now Authmen liquiidty mining has officially started. Check out Authmen liquidity mining website to know more: app.auth.men

And here is a step by step tutorial for Authmen liquidity mining: https://authmen.medium.com/how-to-participate-in-authmen-liquidity-mining-4973d8e4cbc2

Medium (https://authmen.medium.com/how-to-participate-in-authmen-liquidity-mining-4973d8e4cbc2)

How to participate in Authmen Liquidity Mining

The highly anticipated Authmen liquidity mining has officially launched at 12:00 UTC today. The following is the tutorial for…

Question 4 from Twitter User @whuzeng12

For any Crypto and blockchain projects and platforms. Security, scalability and interoperability are the most important factors. So, can you explain what technologies Authmen uses in its project to make union safe, extensible and interoperable?

Samir: Authmen adopts the three-layer computing power system based on Leviatom in Trias architecture, and the combination of TEE trusted computing and zero knowledge proof technology to complete the right confirmation and security protection of distributed storage data.

The trusted network constructed by Leviatom layer of Trias maintains a unique white list for each storage node, which can prevent the loading of abnormal programs and effectively block network security attacks. At the same time, HCGraph is a trusted computing technology based on heterogeneous TEE. With the help of Gossip protocol, a “trusted acquaintance” network is constructed between consensus nodes using different TEE technologies, and a “conspiracy default” model of global nodes is constructed to locate trusted nodes efficiently, which makes consensus more efficient and cost-effective.

At the same time, the TEE technology of Trias does not rely on a single category of hardware, so it has stronger compatibility. The use of TEE technology can verify and protect the whole life cycle of the computer running environment on the basis of the — 1 layer of the hardware root. At the same time, under the TEE security defense model of Trias, it becomes a new incentive oriented security model, which allows the defender to actively contribute the defense nodes and computing power of TEE, and get the corresponding advantage economic stimulation according to the defense contribution provided in the Trias security network. Through the trusted computing of Trias, multi-party, remote and heterogeneous data storage, sharing and computing can be realized under the premise of maintaining data ownership and privacy.

Through trusted computing, Authmen enables different TEE protocols to collect the latest status of neighboring nodes, check and record historical information, and propagate the results among other nodes through gossip protocol, and form a reputation network. It repeatedly selects “the most difficult point to lie” as its repeated function contract presentation, forming a robust and efficient running environment, and building a trusted computing based environment based on the blockchain distributed storage security network.

During the AMA, the members also asked many questions, and the guests gave detailed answers:

“Community support is one of the biggest aspects of a project’s success. Most projects have programs that interact with their users. Do you have any special plans to attract and expand the community and improve the user experience?

Yes, the power of the community is very strong and important. In the near future, I will help recruit a group of volunteers from all over the world for Authmen to help the project expand and grow faster. ”

Are you partnering with any big exchange? What problems is your token going to solve.”

Now that Authmen has launched Uniswap, I think it needs to be determined by the market development of other exchanges. Not long ago, Authmen was invited to become a member of the Heco alliance(Huobi ecosystem). It may be possible to launch Huobi in the future, but this has not been decided yet.

“What unique technology does Authmen use to separate it from its competitors, and could you give us some details about the Authmen block.”

As I said before, Authmen adopts the three-layer computing power system based on Leviatom in Trias architecture, and the combination of TEE trusted computing and zero knowledge proof technology to complete the right confirmation and security protection of distributed storage data.

These technologies make Authmen:

1. More efficient and secure storage

2. Real tamper proof technology

3. Wider application scenarios

4. Trusted storage node

“I’m interesting with your NFTs design also its value, Can you please share how to get one of these NFT? And also is it possible to create NFTs from Authmen platform?”

thanks for your attention to Authmen NFT. 😊

Authmen NFT is a kind of computational NFT with actual storage as endorsement and cast by ERC-1155 standard. Users can obtain Authmen NFT by consuming AUTH, and destroy low-level NFT to obtain higher-level NFTs, so as to obtain more computing power and storage capacity.

There are 2 ways to Authmen NFT :

Method 1

Users can use special NFT incubated by Trias token (TRY) to participate in mining, and participants can lock in 2000000 Trias token (TRY) for 30 days to get a free auth-1 NFTs for mining.

Method 2

Users acquire an AUTH-1 NFTs by consuming 60 AUTH acquired by purchase or airdrop.

Both methods can then consume low-level NFTs and auth to obtain higher-level NFTs with greater computational power (see the above table for details).

For earning profit from Authmen NFT, you can participate Authmen liquidity mining: app.auth.men

Join us now

Telegram: https://t.me/CryptoPHD

Twitter: https://twitter.com/CryptoPHD_DeFi

Medium: https://cryptophd.medium.com/

--

--