diff --git a/Getting Started/Setup Nodes.md b/Getting Started/Setup Nodes.md index 4020d7f..8b8322b 100644 --- a/Getting Started/Setup Nodes.md +++ b/Getting Started/Setup Nodes.md @@ -4,5 +4,6 @@ This section will guide you through the process of setting up and configuring yo **Please note:** -

⚠️ This documentation is under active development. Please check back frequently for updates.

-
\ No newline at end of file +
+⚠️ This documentation is under active development. Please check back frequently for updates. +
diff --git a/Mesh Architecture/Cognito Nodes.md b/Mesh Architecture/Cognito Nodes.md index bc240f6..0a5477f 100644 --- a/Mesh Architecture/Cognito Nodes.md +++ b/Mesh Architecture/Cognito Nodes.md @@ -22,10 +22,10 @@ CNs operate the sophisticated machine learning models that constitute the Cognit CNs require significantly more computational power (GPU/high-core CPU) than SNs due to the demanding nature of running constant GNN inference, and a significant $QOG Collateral Stake ### Acquisition -Regarding availability or acquisition, the method for acquiring and operating a Cognito Node, whether through a direct license sale, a free software model requiring only the QOG collateral stake, or a decentralized auction/lottery—remains under active discussion and will be determined based on optimal economic and security scaling models. However, the requirement for a significant $QOG Collateral Stake for participation is immutable. +Regarding availability or acquisition, the method for acquiring and operating a Cognito Node, whether through a direct license sale, a free software model requiring only the $QOG collateral stake, or a decentralized auction/lottery—remains under active discussion and will be determined based on optimal economic and security scaling models. However, the requirement for a significant $QOG Collateral Stake for participation is immutable. ### Consensus -CNs operators are bound by the Proof-of-Reputation (PoR) Mechanism +CNs operators are bound by the Proof-of-Reputation (PoR) Mechanism.
diff --git a/Mesh Architecture/Nodes Consensus Mechanism.md b/Mesh Architecture/Nodes Consensus Mechanism.md index bff93d1..24393ca 100644 --- a/Mesh Architecture/Nodes Consensus Mechanism.md +++ b/Mesh Architecture/Nodes Consensus Mechanism.md @@ -9,9 +9,9 @@ Sentinel Nodes are incentivized by reputation, not capital stake. The Proof-of-R Beyond immediate rewards, the network employs a Proof of Reputation (PoR) system to build long-term trust and grant preferential network access to consistently reliable nodes. ### Reputation Score -TheEvery Sentinel (SN), Cognito (CN), and Validator Node (VN) maintains a dynamic, on-chain Reputation Score based on their historical performance: +Every Sentinel (SN), Cognito (CN), and Validator Node (VN) maintains a dynamic, on-chain Reputation Score based on their historical performance: -- `SNs:` Assessccuracy and latency of raw data submission. +- `SNs:` Assess accuracy and latency of raw data submission. - `CNs:` Accuracy and non-deviation of QSS generation from the network median. @@ -22,7 +22,7 @@ Nodes with high PoR scores are granted preferential access to high-reward tasks, ## Proof of Security (PoS) -Due to `CNs` critical role in generating signals, the operators are bound under a rigorous Proof-of-Security (PoS) consensus mechanism, requiring a substantial Collateral Stake in the **$QOG** token. This stake serves two purposes: +Due to the critical role of `CNs` in generating signals, the operators are bound under a rigorous Proof-of-Security (PoS) consensus mechanism, requiring a substantial Collateral Stake in the **$QOG** token. This stake serves two purposes: - **Sybil Resistance:** It prevents malicious actors from overwhelming the network with bad data or false signals. @@ -45,4 +45,4 @@ In addition to signal validation, `VNs` are the primary mechanism for decentrali - **Threat Genome Management:** The inclusion or exclusion of certain threat identifiers or data sources. -- **Reward Parameters:** Adjustments to the proportional rewards distributed to `VNs`. `SNs` and `CNs`. \ No newline at end of file +- **Reward Parameters:** Adjustments to the proportional rewards distributed to `VNs`, `SNs`, and `CNs`. \ No newline at end of file diff --git a/Mesh Architecture/Proof of Defensive Value (PoDV).md b/Mesh Architecture/Proof of Defensive Value (PoDV).md index 15cdecd..b6efcda 100644 --- a/Mesh Architecture/Proof of Defensive Value (PoDV).md +++ b/Mesh Architecture/Proof of Defensive Value (PoDV).md @@ -13,20 +13,20 @@ PoDV operates on the principle that a node's value is determined by the "Defense The PoDV mechanism follows a four-stage lifecycle for every intelligence contribution: ### 1. Data Attribution (The Sentinel Phase) -When a Sentinel Node (`SN`) identifies a mempool anomaly or a suspicious contract interaction, it signs the data packet with its unique ZK-IDN. This creates an private immutable "Contribution Link." +When a Sentinel Node (`SN`) identifies a mempool anomaly or a suspicious contract interaction, it signs the data packet with its unique ZK-IDN. This creates a private immutable "Contribution Link." - **Novelty Scoring:** The system checks if the data is unique. The first SN to report a specific threat vector receives a "First-Responder Multiplier." which boost the operator's reputation. ### 2. Cognitive Synthesis (The Cognito Phase) -Cognito Nodes (`CN`) pull raw data packet from the Mesh and run it through `qognet`'s GNN-based AI models. To prove "Defensive Value," the `CN` must submit a Predictive Hypothesis (e.g., "This transaction will result in a $2M drainage of Pool X via Re-entrancy"). +Cognito Nodes (`CN`) pull raw data packets from the Mesh and run it through `qognet`'s GNN-based AI models. To prove "Defensive Value," the `CN` must submit a Predictive Hypothesis (e.g., "This transaction will result in a $2M drainage of Pool X via Re-entrancy"). -- **Computation Proof:** The `CN` proves provides a succinct proof that the AI inference was executed correctly on the provided data. +- **Computation Proof:** The `CN` provides a succinct proof that the AI inference was executed correctly on the provided data. ### 3. Validation Finality & Consensus (The Validator Phase) Validator Nodes (`VN`) cross-reference the Cognito Hypothesis against the current blockchain state. - **Verification:** If the simulation confirms the threat, the `VN` signs a Defensive Signal. -- **Finality:** Once 67% of stake-weighted `VNs` agrees, the signal is finalized, and the Qognet Safety Score (QSS) is updated globally. +- **Finality:** Once 67% of stake-weighted `VNs` agree, the signal is finalized, and the Qognet Safety Score (QSS) is updated globally. ### 4. Value Settlement (The Reward Phase) Once the "Defense" is finalized (or the simulated exploit is prevented), the PoDV algorithm calculates the rewards: @@ -42,6 +42,6 @@ Once the "Defense" is finalized (or the simulated exploit is prevented), the PoD | Component | Defensive Value Contribution | Primary Reward Metric | | :--- | :--- | :--- | -| **Sentinel** | Sensory Data / First Response | Data Novelty, Reputation, uptime & Latency | +| **Sentinel** | Sensory Data / First Response | Data Novelty, Reputation, Uptime & Latency | | **Cognito** | Predictive Intelligence | Hypothesis Accuracy & Compute Proof | | **Validator** | Integrity & Finality | Consensus Participation & Uptime | \ No newline at end of file diff --git a/Mesh Architecture/Sentinel Nodes.md b/Mesh Architecture/Sentinel Nodes.md index 7592a04..cd59d26 100644 --- a/Mesh Architecture/Sentinel Nodes.md +++ b/Mesh Architecture/Sentinel Nodes.md @@ -19,7 +19,7 @@ Anybody can be an SN operator, but they need internet access, and a device to jo ### Consensus -SNs operators are bound by the Proof-of-Reputation (PoR) Mechanism +SNs operators are bound by the Proof-of-Reputation (PoR) Mechanism.
diff --git a/Mesh Architecture/Slashing Mechanisms.md b/Mesh Architecture/Slashing Mechanisms.md index 3a2566c..7f01291 100644 --- a/Mesh Architecture/Slashing Mechanisms.md +++ b/Mesh Architecture/Slashing Mechanisms.md @@ -12,18 +12,18 @@ The following conditions trigger automatic slashing penalties: If a Validator Node votes to finalize a Defensive Signal that is later proven incorrect or a false positive (e.g., if the signal causes an unnecessary circuit breaker without a threat being present), the staking collateral of the voting VNs is slashed. ### Data Tampering/Deviation -If Sentinel Nodes submit demonstrably manipulated or low-quality data, or if Cognito Nodes generate a QSS that deviates significantly from the cryptographically verified majority, if it's a `CN` operator, the staking collateral ofir stake is immediately penalized, if it's `SN` operator there node lose reputation. +If Sentinel Nodes submit demonstrably manipulated or low-quality data, or if Cognito Nodes generate a QSS that deviates significantly from the cryptographically verified majority, if it's a `CN` operator, their staking collateral is immediately penalized; if it's an `SN` operator, their node loses reputation. ## The Slashing Rate -The slashing rate is set to be aggressively, 50% of the collateral stake for consensus errors to make the economic cost of manipulation significantly outweigh any potential gain, reinforcing the security posture of the network. The goal is to enforce trustless behavior through quantifiable cryptoeconomic risk. +The slashing rate is set to be aggressive: 50% of the collateral stake for consensus errors to make the economic cost of manipulation significantly outweigh any potential gain, reinforcing the security posture of the network. The goal is to enforce trustless behavior through quantifiable cryptoeconomic risk. ## Other "Negative Value" Guardrail To prevent "Ghost Reporting" (submitting fake threats to farm rewards), PoDV implements strict penalties: - **False Positives:** If a node repeatedly flags legitimate transactions as threats, its Reputation Score drops, leading to lower reward tiers. -- **Malicious Collusion:** If a Validator signs an objectively false signal, 50% of its stake is slashed immediately +- **Malicious Collusion:** If a Validator signs an objectively false signal, 50% of its stake is slashed immediately. - **Inactivity/Downtime:** Validator Nodes are expected to maintain high availability. Prolonged or frequent downtime beyond a specified threshold will result in a proportional slashing of their staked collateral. This ensures the network's continuous operation and responsiveness. - **Double-Signing:** Any attempt by a Validator Node to sign two different blocks or states at the same height will result in an immediate and severe slashing of their stake, typically 100%. This is a critical security measure to prevent forks and maintain consensus integrity. - **Invalid State Transitions:** If a Validator Node proposes or votes on an invalid state transition that violates the protocol rules, their stake will be slashed. This ensures all network participants adhere to the defined protocol logic. \ No newline at end of file diff --git a/Mesh Architecture/Validator Nodes.md b/Mesh Architecture/Validator Nodes.md index 5a4947f..b6a9eb6 100644 --- a/Mesh Architecture/Validator Nodes.md +++ b/Mesh Architecture/Validator Nodes.md @@ -25,7 +25,7 @@ To acquire and activate a qognet VN, paticipants must obtain a spec VNs are bound and secured by a strict Proof-of-Stake (PoS) model.
- +

Nodes Consensus Mechanisms

diff --git a/Qognet Intelligence Ecosystem/Qognet Mesh.md b/Qognet Intelligence Ecosystem/Qognet Mesh.md index 4cdf236..84c6169 100644 --- a/Qognet Intelligence Ecosystem/Qognet Mesh.md +++ b/Qognet Intelligence Ecosystem/Qognet Mesh.md @@ -6,6 +6,6 @@ It represents the resilient interconnectivity layer, bridging the gap between ra ## How It Works -Unlike traditional centralized clusters, the Mesh functions as a self-healing, peer-to-peer lattice nodes. By leveraging a gossip-based protocol, the Mesh ensures that threat signatures identified by a single node propagate across the global network in milliseconds. +Unlike traditional centralized clusters, the Mesh functions as a self-healing, peer-to-peer lattice of nodes. By leveraging a gossip-based protocol, the Mesh ensures that threat signatures identified by a single node propagate across the global network in milliseconds. This lateral data sharing creates a "herd immunity" effect: once an anomaly is detected in one region, the entire ecosystem’s firewall parameters update instantly. The Qognet Mesh is the physical manifestation of collective security. \ No newline at end of file diff --git a/introduction/Key Architectural Pillars.md b/introduction/Key Architectural Pillars.md index 9474adf..a638bf7 100644 --- a/introduction/Key Architectural Pillars.md +++ b/introduction/Key Architectural Pillars.md @@ -9,7 +9,7 @@ To successfully pivot the security paradigm from reaction to prediction, Qognet Security is a race against the clock. Our DePIN Mesh is a global network of specialized nodes that communicate at sub-second speeds. Using resilient protocols, we ensure that threat signals reach every corner of the network instantly. We make sure the defense moves as fast as the attack. 3. **Future-Proof Security (Quantum-Ready)** - We aren’t just building for today; we’re building for the next twenty years. Qognet integrates Quantum-Resistant Cryptography and Zero-Knowledge Identity to ensure that our network and your data stays secure even as computers get more powerful. We provide a foundation that won’t collapse as technology evolves. + We aren’t just building for today; we’re building for the next twenty years. Qognet integrates Quantum-Resistant Cryptography and Zero-Knowledge Identity to ensure that our network and your data remains secure even as computers get more powerful. We provide a foundation that won’t collapse as technology evolves.
@@ -18,4 +18,4 @@ To successfully pivot the security paradigm from reaction to prediction, Qognet
-By combining these three, Qognet is built to be the mandatory backbone for the future of decentralized finance. \ No newline at end of file +By combining these three, Qognet is built to be the mandatory backbone for the future of decentralized finance. diff --git a/introduction/The Problem.md b/introduction/The Problem.md index 7bdd1df..abe0369 100644 --- a/introduction/The Problem.md +++ b/introduction/The Problem.md @@ -11,7 +11,7 @@ The Reactive Model (The Old Way) Current security is "post-mortem." It relies on ## The Proactive Approach: Defensive Intelligence -Qognet replaces the Reactive Model with Proactive Approach through Defensive Intelligence. We replace the failed reactive model with a cognitive, preemptive layer powered by the Qognet AI Core. By leveraging sophisticated Graph Neural Networks (GNNs) and a distributed, real-time data mesh, Qognet moves beyond code analysis to achieve continuous, behavioral risk assessment. This unique capability allows Qognet to identify the subtle precursors of an attack, such as anomalous transaction sequencing, sudden liquidity shifts, or unusual flash loan activity, long before the malicious transaction is finalized. +Qognet replaces the Reactive Model with a Proactive Approach through Defensive Intelligence. We replace the failed reactive model with a cognitive, preemptive layer powered by the Qognet AI Core. By leveraging sophisticated Graph Neural Networks (GNNs) and a distributed, real-time data mesh, Qognet moves beyond code analysis to achieve continuous, behavioral risk assessment. This unique capability allows Qognet to identify the subtle precursors of an attack, such as anomalous transaction sequencing, sudden liquidity shifts, or unusual flash loan activity, long before the malicious transaction is finalized. ## The Essential Difference Legacy Reactive System is designed to document failure after the fact, the Qognet Proactive Approach is designed to anticipate, signal, and prevent failure in real-time. By moving the point of defense from forensic analysis to preemptive intelligence, Qognet provides the necessary anticipatory layer to safeguard the integrity and stability of the entire decentralized economy. \ No newline at end of file diff --git a/introduction/overview.md b/introduction/overview.md index d98740c..b2cf2dd 100644 --- a/introduction/overview.md +++ b/introduction/overview.md @@ -26,4 +26,4 @@ The Qognet ecosystem is composed of highly integrated, modular products: Our mission is to infuse decentralized networks with a layer of Cognition, the ability to sense, analyze, predict, and act autonomously against threats. -Qognet aims to be the invisible, always-on security neural network intelligence protecting assets across all major blockchain. By creating a unified, self-healing, and proactive defensive spine, we reduce systemic risk and unlock the next wave of capital inflow into the decentralized economy. +Qognet aims to be the invisible, always-on security neural network intelligence protecting assets across all major blockchains. By creating a unified, self-healing, and proactive defensive spine, we reduce systemic risk and unlock the next wave of capital inflow into the decentralized economy.