Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 3 additions & 2 deletions Getting Started/Setup Nodes.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,5 +4,6 @@ This section will guide you through the process of setting up and configuring yo

**Please note:**

<div style="padding: 1.5rem; border: 1px solid var(--vp-c-divider); border-radius: 8px; text-align: center; text-decoration: none; background-color: var(--vp-c-bg-soft);"> <p style="margin: 0; border: none; font-weight: bold;">⚠️ This documentation is under active development. Please check back frequently for updates.</p>
</div>
<div style="padding: 1.5rem; border: 1px solid var(--vp-c-divider); border-radius: 8px; text-align: center; text-decoration: none;">
⚠️ This documentation is under active development. Please check back frequently for updates.
</div>
4 changes: 2 additions & 2 deletions Mesh Architecture/Cognito Nodes.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,10 +22,10 @@ CNs operate the sophisticated machine learning models that constitute the Cognit
CNs require significantly more computational power (GPU/high-core CPU) than SNs due to the demanding nature of running constant GNN inference, and a significant $QOG Collateral Stake

### Acquisition
Regarding availability or acquisition, the method for acquiring and operating a Cognito Node, whether through a direct license sale, a free software model requiring only the QOG collateral stake, or a decentralized auction/lottery—remains under active discussion and will be determined based on optimal economic and security scaling models. However, the requirement for a significant $QOG Collateral Stake for participation is immutable.
Regarding availability or acquisition, the method for acquiring and operating a Cognito Node, whether through a direct license sale, a free software model requiring only the $QOG collateral stake, or a decentralized auction/lottery—remains under active discussion and will be determined based on optimal economic and security scaling models. However, the requirement for a significant $QOG Collateral Stake for participation is immutable.

### Consensus
CNs operators are bound by the Proof-of-Reputation (PoR) Mechanism
CNs operators are bound by the Proof-of-Reputation (PoR) Mechanism.

<div style="display: flex; flex-wrap: wrap; gap: 1rem; margin-top: 1rem; margin-bottom: 1rem;">
<a href="./Nodes%20Consensus%20Mechanism#proof-of-security-pos" style="flex: 1 1 250px; padding: 1rem; border: 1px solid var(--vp-c-divider); border-radius: none; text-align: center; text-decoration: none; background-color: var(--vp-c-bg-soft);">
Expand Down
8 changes: 4 additions & 4 deletions Mesh Architecture/Nodes Consensus Mechanism.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ Sentinel Nodes are incentivized by reputation, not capital stake. The Proof-of-R
Beyond immediate rewards, the network employs a Proof of Reputation (PoR) system to build long-term trust and grant preferential network access to consistently reliable nodes.

### Reputation Score
TheEvery Sentinel (SN), Cognito (CN), and Validator Node (VN) maintains a dynamic, on-chain Reputation Score based on their historical performance:
Every Sentinel (SN), Cognito (CN), and Validator Node (VN) maintains a dynamic, on-chain Reputation Score based on their historical performance:

- `SNs:` Assessccuracy and latency of raw data submission.
- `SNs:` Assess accuracy and latency of raw data submission.

- `CNs:` Accuracy and non-deviation of QSS generation from the network median.

Expand All @@ -22,7 +22,7 @@ Nodes with high PoR scores are granted preferential access to high-reward tasks,

## Proof of Security (PoS)

Due to `CNs` critical role in generating signals, the operators are bound under a rigorous Proof-of-Security (PoS) consensus mechanism, requiring a substantial Collateral Stake in the **$QOG** token. This stake serves two purposes:
Due to the critical role of `CNs` in generating signals, the operators are bound under a rigorous Proof-of-Security (PoS) consensus mechanism, requiring a substantial Collateral Stake in the **$QOG** token. This stake serves two purposes:

- **Sybil Resistance:** It prevents malicious actors from overwhelming the network with bad data or false signals.

Expand All @@ -45,4 +45,4 @@ In addition to signal validation, `VNs` are the primary mechanism for decentrali

- **Threat Genome Management:** The inclusion or exclusion of certain threat identifiers or data sources.

- **Reward Parameters:** Adjustments to the proportional rewards distributed to `VNs`. `SNs` and `CNs`.
- **Reward Parameters:** Adjustments to the proportional rewards distributed to `VNs`, `SNs`, and `CNs`.
10 changes: 5 additions & 5 deletions Mesh Architecture/Proof of Defensive Value (PoDV).md
Original file line number Diff line number Diff line change
Expand Up @@ -13,20 +13,20 @@ PoDV operates on the principle that a node's value is determined by the "Defense
The PoDV mechanism follows a four-stage lifecycle for every intelligence contribution:

### 1. Data Attribution (The Sentinel Phase)
When a Sentinel Node (`SN`) identifies a mempool anomaly or a suspicious contract interaction, it signs the data packet with its unique ZK-IDN. This creates an private immutable "Contribution Link."
When a Sentinel Node (`SN`) identifies a mempool anomaly or a suspicious contract interaction, it signs the data packet with its unique ZK-IDN. This creates a private immutable "Contribution Link."

- **Novelty Scoring:** The system checks if the data is unique. The first SN to report a specific threat vector receives a "First-Responder Multiplier." which boost the operator's reputation.

### 2. Cognitive Synthesis (The Cognito Phase)
Cognito Nodes (`CN`) pull raw data packet from the Mesh and run it through `qognet`'s GNN-based AI models. To prove "Defensive Value," the `CN` must submit a Predictive Hypothesis (e.g., "This transaction will result in a $2M drainage of Pool X via Re-entrancy").
Cognito Nodes (`CN`) pull raw data packets from the Mesh and run it through `qognet`'s GNN-based AI models. To prove "Defensive Value," the `CN` must submit a Predictive Hypothesis (e.g., "This transaction will result in a $2M drainage of Pool X via Re-entrancy").

- **Computation Proof:** The `CN` proves provides a succinct proof that the AI inference was executed correctly on the provided data.
- **Computation Proof:** The `CN` provides a succinct proof that the AI inference was executed correctly on the provided data.

### 3. Validation Finality & Consensus (The Validator Phase)
Validator Nodes (`VN`) cross-reference the Cognito Hypothesis against the current blockchain state.

- **Verification:** If the simulation confirms the threat, the `VN` signs a Defensive Signal.
- **Finality:** Once 67% of stake-weighted `VNs` agrees, the signal is finalized, and the Qognet Safety Score (QSS) is updated globally.
- **Finality:** Once 67% of stake-weighted `VNs` agree, the signal is finalized, and the Qognet Safety Score (QSS) is updated globally.

### 4. Value Settlement (The Reward Phase)
Once the "Defense" is finalized (or the simulated exploit is prevented), the PoDV algorithm calculates the rewards:
Expand All @@ -42,6 +42,6 @@ Once the "Defense" is finalized (or the simulated exploit is prevented), the PoD

| Component | Defensive Value Contribution | Primary Reward Metric |
| :--- | :--- | :--- |
| **Sentinel** | Sensory Data / First Response | Data Novelty, Reputation, uptime & Latency |
| **Sentinel** | Sensory Data / First Response | Data Novelty, Reputation, Uptime & Latency |
| **Cognito** | Predictive Intelligence | Hypothesis Accuracy & Compute Proof |
| **Validator** | Integrity & Finality | Consensus Participation & Uptime |
2 changes: 1 addition & 1 deletion Mesh Architecture/Sentinel Nodes.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Anybody can be an SN operator, but they need internet access, and a device to jo

### Consensus

SNs operators are bound by the Proof-of-Reputation (PoR) Mechanism
SNs operators are bound by the Proof-of-Reputation (PoR) Mechanism.

<div style="display: flex; flex-wrap: wrap; gap: 1rem; margin-top: 1rem; margin-bottom: 1rem;">
<a href="./Nodes%20Consensus%20Mechanism#proof-of-reputation-por" style="flex: 1 1 250px; padding: 1rem; border: 1px solid var(--vp-c-divider); border-radius: 8px; text-align: center; text-decoration: none; background-color: var(--vp-c-bg-soft);">
Expand Down
6 changes: 3 additions & 3 deletions Mesh Architecture/Slashing Mechanisms.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,18 +12,18 @@ The following conditions trigger automatic slashing penalties:
If a Validator Node votes to finalize a Defensive Signal that is later proven incorrect or a false positive (e.g., if the signal causes an unnecessary circuit breaker without a threat being present), the staking collateral of the voting VNs is slashed.

### Data Tampering/Deviation
If Sentinel Nodes submit demonstrably manipulated or low-quality data, or if Cognito Nodes generate a QSS that deviates significantly from the cryptographically verified majority, if it's a `CN` operator, the staking collateral ofir stake is immediately penalized, if it's `SN` operator there node lose reputation.
If Sentinel Nodes submit demonstrably manipulated or low-quality data, or if Cognito Nodes generate a QSS that deviates significantly from the cryptographically verified majority, if it's a `CN` operator, their staking collateral is immediately penalized; if it's an `SN` operator, their node loses reputation.

## The Slashing Rate

The slashing rate is set to be aggressively, 50% of the collateral stake for consensus errors to make the economic cost of manipulation significantly outweigh any potential gain, reinforcing the security posture of the network. The goal is to enforce trustless behavior through quantifiable cryptoeconomic risk.
The slashing rate is set to be aggressive: 50% of the collateral stake for consensus errors to make the economic cost of manipulation significantly outweigh any potential gain, reinforcing the security posture of the network. The goal is to enforce trustless behavior through quantifiable cryptoeconomic risk.

## Other "Negative Value" Guardrail

To prevent "Ghost Reporting" (submitting fake threats to farm rewards), PoDV implements strict penalties:

- **False Positives:** If a node repeatedly flags legitimate transactions as threats, its Reputation Score drops, leading to lower reward tiers.
- **Malicious Collusion:** If a Validator signs an objectively false signal, 50% of its stake is slashed immediately
- **Malicious Collusion:** If a Validator signs an objectively false signal, 50% of its stake is slashed immediately.
- **Inactivity/Downtime:** Validator Nodes are expected to maintain high availability. Prolonged or frequent downtime beyond a specified threshold will result in a proportional slashing of their staked collateral. This ensures the network's continuous operation and responsiveness.
- **Double-Signing:** Any attempt by a Validator Node to sign two different blocks or states at the same height will result in an immediate and severe slashing of their stake, typically 100%. This is a critical security measure to prevent forks and maintain consensus integrity.
- **Invalid State Transitions:** If a Validator Node proposes or votes on an invalid state transition that violates the protocol rules, their stake will be slashed. This ensures all network participants adhere to the defined protocol logic.
2 changes: 1 addition & 1 deletion Mesh Architecture/Validator Nodes.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ To acquire and activate a <code>qognet</code> VN, paticipants must obtain a spec
VNs are bound and secured by a strict Proof-of-Stake (PoS) model.

<div style="display: flex; flex-wrap: wrap; gap: 1rem; margin-top: 1rem; margin-bottom: 1rem;">
<a href="./Nodes%20Consensus%20Mechanism##proof-of-stake-and-economic-security" style="flex: 1 1 250px; padding: 1rem; border: 1px solid var(--vp-c-divider); border-radius: none; text-align: center; text-decoration: none; background-color: var(--vp-c-bg-soft);">
<a href="./Nodes%20Consensus%20Mechanism#proof-of-stake-and-economic-security" style="flex: 1 1 250px; padding: 1rem; border: 1px solid var(--vp-c-divider); border-radius: none; text-align: center; text-decoration: none; background-color: var(--vp-c-bg-soft);">
<h4 style="margin: 0; border: none;">Nodes Consensus Mechanisms</h4>
</a>
</div>
Expand Down
2 changes: 1 addition & 1 deletion Qognet Intelligence Ecosystem/Qognet Mesh.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,6 @@ It represents the resilient interconnectivity layer, bridging the gap between ra

## How It Works

Unlike traditional centralized clusters, the Mesh functions as a self-healing, peer-to-peer lattice nodes. By leveraging a gossip-based protocol, the Mesh ensures that threat signatures identified by a single node propagate across the global network in milliseconds.
Unlike traditional centralized clusters, the Mesh functions as a self-healing, peer-to-peer lattice of nodes. By leveraging a gossip-based protocol, the Mesh ensures that threat signatures identified by a single node propagate across the global network in milliseconds.

This lateral data sharing creates a "herd immunity" effect: once an anomaly is detected in one region, the entire ecosystem’s firewall parameters update instantly. The Qognet Mesh is the physical manifestation of collective security.
4 changes: 2 additions & 2 deletions introduction/Key Architectural Pillars.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ To successfully pivot the security paradigm from reaction to prediction, Qognet
Security is a race against the clock. Our DePIN Mesh is a global network of specialized nodes that communicate at sub-second speeds. Using resilient protocols, we ensure that threat signals reach every corner of the network instantly. We make sure the defense moves as fast as the attack.

3. **Future-Proof Security (Quantum-Ready)**
We aren’t just building for today; we’re building for the next twenty years. Qognet integrates Quantum-Resistant Cryptography and Zero-Knowledge Identity to ensure that our network and your data stays secure even as computers get more powerful. We provide a foundation that won’t collapse as technology evolves.
We aren’t just building for today; we’re building for the next twenty years. Qognet integrates Quantum-Resistant Cryptography and Zero-Knowledge Identity to ensure that our network and your data remains secure even as computers get more powerful. We provide a foundation that won’t collapse as technology evolves.

<div style="display: flex; flex-direction: column; gap: 1rem; margin-top: 1rem; margin-bottom: 1rem;">
<a href="../Quantum%20Future-Proofing/Quantum-Ready%20Architecture" style="padding: 1.5rem; border: 1px solid var(--vp-c-divider); border-radius: 8px; text-align: center; text-decoration: none; background-color: var(--vp-c-bg-soft);">
Expand All @@ -18,4 +18,4 @@ To successfully pivot the security paradigm from reaction to prediction, Qognet
</div>


By combining these three, Qognet is built to be the mandatory backbone for the future of decentralized finance.
By combining these three, Qognet is built to be the mandatory backbone for the future of decentralized finance.
2 changes: 1 addition & 1 deletion introduction/The Problem.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ The Reactive Model (The Old Way) Current security is "post-mortem." It relies on

## The Proactive Approach: Defensive Intelligence

Qognet replaces the Reactive Model with Proactive Approach through Defensive Intelligence. We replace the failed reactive model with a cognitive, preemptive layer powered by the Qognet AI Core. By leveraging sophisticated Graph Neural Networks (GNNs) and a distributed, real-time data mesh, Qognet moves beyond code analysis to achieve continuous, behavioral risk assessment. This unique capability allows Qognet to identify the subtle precursors of an attack, such as anomalous transaction sequencing, sudden liquidity shifts, or unusual flash loan activity, long before the malicious transaction is finalized.
Qognet replaces the Reactive Model with a Proactive Approach through Defensive Intelligence. We replace the failed reactive model with a cognitive, preemptive layer powered by the Qognet AI Core. By leveraging sophisticated Graph Neural Networks (GNNs) and a distributed, real-time data mesh, Qognet moves beyond code analysis to achieve continuous, behavioral risk assessment. This unique capability allows Qognet to identify the subtle precursors of an attack, such as anomalous transaction sequencing, sudden liquidity shifts, or unusual flash loan activity, long before the malicious transaction is finalized.

## The Essential Difference
Legacy Reactive System is designed to document failure after the fact, the Qognet Proactive Approach is designed to anticipate, signal, and prevent failure in real-time. By moving the point of defense from forensic analysis to preemptive intelligence, Qognet provides the necessary anticipatory layer to safeguard the integrity and stability of the entire decentralized economy.
2 changes: 1 addition & 1 deletion introduction/overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,4 +26,4 @@ The Qognet ecosystem is composed of highly integrated, modular products:

Our mission is to infuse decentralized networks with a layer of Cognition, the ability to sense, analyze, predict, and act autonomously against threats.

Qognet aims to be the invisible, always-on security neural network intelligence protecting assets across all major blockchain. By creating a unified, self-healing, and proactive defensive spine, we reduce systemic risk and unlock the next wave of capital inflow into the decentralized economy.
Qognet aims to be the invisible, always-on security neural network intelligence protecting assets across all major blockchains. By creating a unified, self-healing, and proactive defensive spine, we reduce systemic risk and unlock the next wave of capital inflow into the decentralized economy.