Main Page
Jump to navigation
Jump to search
Introduction
- Why blockchain singularity (cybersecurity, ownership and web3, etc.)
- High-level architecture (subnets, boundary nodes, http gateways)
- A blockchain is not a blockchain
- Vision, current state, and outlook
Chapter 1: ICP as a distributed systems protocol (would be same for ICP and Utopia)
- “The traditional blockchain part”
- P2P / Replica HTTP interface / State transfer
- Consensus
- Subnet protocol/version upgrades
- Chain-key cryptography
- Core platform protocols: BLS
- NIDKG
- Random beacon
- Certification (this also covers how clients can verify)
- Random tape
- Chain-key signing: ECDSA & Schnorr & EdDSA
- IDKG
- Threshold ECDSA
- Threshold Schnorr
- On-chain encryption: vetKeys
- Core platform protocols: BLS
- Subnet state and state sync (catch-up package within a subnet; cosmic glitches)
- Canister programming model / execution environment
- Actor model, asynchronous messaging, cycles
- Update methods and query methods
- Principals and ownership
- Scheduling (incl. DTS)
- Resource management (cycles, reservations)
- Canister snapshots, immutable storage, heartbeats, timers …
- Query calls
- Runtime
- Web assembly
- System API (including management canister)
- Subnet architecture, scaling
- Cross-subnet communication (incl. stream signatures)
- Subnet creation
- Registry (for topology management)
- Node swaps
- Subnet deletion
- Catch-up package from registry (subnet recovery)
- Integrations (aka. talking to the rest of the world)
- Bitcoin integration
- HTTP outcalls
- Internet Identity protocol
- Boundary nodes
- Routing
- Caching
- Rate-limiting
- Replicated query calls
- The Internet Computer and the Internet (or browsers)
- HTTP gateways
- Serving the web
- DNS
- Alternatives: proxy
Chapter 2: ICP as a permissionless DAO-controlled platform
- Genesis
- Governance and ICP tokenomics
- Ledger
- Governance
- CMC
- Exchange rate canister
- Node providers, rewards, …
- Subnet rental
- Open Internet Services and economies
- Introduction to OIS and DAOs
- SNS
Chapter 3: Security
- Security by protocol actions and end-to-end governance
- DoS attacks and friends
- DDoS attacks from the evil Internet
- (DoS) attacks from canisters
- Web application security model
- Security from statistics
- Replica
- HTTP gateways
- Deterministic decentralization
Chapter 4: Software architecture
- Host OS
- Guest OS architecture
- SELinux isolation
- Replica
- Runtime isolation
- CSP isolation
- Orchestrator
- A/B software upgrades
Chapter 5: Application level
- II front end
- NNS front-end dapp
- Ethereum integration
- ckTokens
- Oisy
- Orbit
- Internetcomputer.org website
- Dashboard
- Websockets
Chapter 6: Programming the Internet Computer
- Motoko
- Azle
- Rust CDK
- Kybra
To upload your logo, make sure your dimensions are at most 155px by 155px. Upload it at Wiki.png.
For more info on how to get started with your wiki, visit the MyWikis Help Center.
For more info on how to use MediaWiki, visit our help pages.