Main Page

From Book
Jump to navigation Jump to search

Introduction

  1. Why blockchain singularity (cybersecurity, ownership and web3, etc.)
  2. High-level architecture (subnets, boundary nodes, http gateways)
  3. A blockchain is not a blockchain
  4. Vision, current state, and outlook

Chapter 1: ICP as a distributed systems protocol (would be same for ICP and Utopia)

  1. “The traditional blockchain part”
    1. P2P / Replica HTTP interface / State transfer
    2. Consensus
    3. Subnet protocol/version upgrades
  2. Chain-key cryptography
    1. Core platform protocols: BLS
      1. NIDKG
      2. Random beacon
      3. Certification (this also covers how clients can verify)
      4. Random tape
    2. Chain-key signing: ECDSA & Schnorr & EdDSA
      1. IDKG
      2. Threshold ECDSA
      3. Threshold Schnorr
    3. On-chain encryption: vetKeys
  3. Subnet state and state sync (catch-up package within a subnet; cosmic glitches)
  4. Canister programming model / execution environment
    1. Actor model, asynchronous messaging, cycles
    2. Update methods and query methods
    3. Principals and ownership
    4. Scheduling (incl. DTS)
    5. Resource management (cycles, reservations)
    6. Canister snapshots, immutable storage, heartbeats, timers …
    7. Query calls
  5. Runtime
    1. Web assembly
    2. System API (including management canister)
  6. Subnet architecture, scaling
    1. Cross-subnet communication (incl. stream signatures)
    2. Subnet creation
    3. Registry (for topology management)
    4. Node swaps
    5. Subnet deletion
    6. Catch-up package from registry (subnet recovery)
  7. Integrations (aka. talking to the rest of the world)
    1. Bitcoin integration
    2. HTTP outcalls
  8. Internet Identity protocol
  9. Boundary nodes
    1. Routing
    2. Caching
    3. Rate-limiting
    4. Replicated query calls
  10. The Internet Computer and the Internet (or browsers)
    1. HTTP gateways
    2. Serving the web
    3. DNS
    4. Alternatives: proxy

Chapter 2: ICP as a permissionless DAO-controlled platform

  1. Genesis
  2. Governance and ICP tokenomics
    1. Ledger
    2. Governance
    3. CMC
    4. Exchange rate canister
    5. Node providers, rewards, …
    6. Subnet rental
  3. Open Internet Services and economies
    1. Introduction to OIS and DAOs
    2. SNS

Chapter 3: Security

  1. Security by protocol actions and end-to-end governance
  2. DoS attacks and friends
    1. DDoS attacks from the evil Internet
    2. (DoS) attacks from canisters
  3. Web application security model
  4. Security from statistics
    1. Replica
    2. HTTP gateways
  5. Deterministic decentralization

Chapter 4: Software architecture

  1. Host OS
  2. Guest OS architecture
    1. SELinux isolation
    2. Replica
      1. Runtime isolation
      2. CSP isolation
    3. Orchestrator
  3. A/B software upgrades

Chapter 5: Application level

  1. II front end
  2. NNS front-end dapp
  3. Ethereum integration
  4. ckTokens
  5. Oisy
  6. Orbit
  7. Internetcomputer.org website
  8. Dashboard
  9. Websockets

Chapter 6: Programming the Internet Computer

  1. Motoko
  2. Azle
  3. Rust CDK
  4. Kybra

To upload your logo, make sure your dimensions are at most 155px by 155px. Upload it at Wiki.png.

For more info on how to get started with your wiki, visit the MyWikis Help Center.

For more info on how to use MediaWiki, visit our help pages.