|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|An open source cybersecurity protocol for syncing decentralized graph data.|
|Graph Node||2,420||5 hours ago||370||apache-2.0||Rust|
|Graph Node indexes data from blockchains such as Ethereum and serves it over GraphQL|
|Orbit||370||a year ago||6||gpl-3.0||Python|
|Blockchain Transactions Investigation Tool|
|Ethereum Graph Debugger||319||18 days ago||21||gpl-3.0||TypeScript|
|Ethereum solidity graph plain debugger. To have the whole picture when debugging.|
|Graph Ts||211||a month ago||4||apache-2.0|
|TypeScript/AssemblyScript library for writing mappings for The Graph|
|Kotal||163||2 days ago||3||February 01, 2023||10||apache-2.0||Go|
|Blockchain Kubernetes Operator|
|Blockchain2graph||135||2 years ago||39||gpl-3.0||Java|
|Blockchain2graph extracts blockchain data (bitcoin) and insert them into a graph database (neo4j).|
|Blockchain3d||90||a year ago||mit||C#|
|Open-source 3D and VR Blockchain Visualisations|
|Blocks. An online drag-and-drop smart contract builder.|
|Bitcoingraph||50||7 years ago||3||other||Python|
|A Python library for exploring the Bitcoin transaction graph.|
The programs present in this repository are used to simulate the Trustchain technology described in this paper and are built with the OMNeT++ simulation framework.
The goal of these simulations is to study and evaluate a better defence system against double-spending attack.
The simulations and the results collected will be used to write and defend my master thesis at TuDelft.
This is one of the networks used to perform behavioural analyses with super connected nodes. (Based on the Watts Strogatz model.)
The Trustchain is a protocol for a share interconnected data structure with enormous potential, it is designed to record transactions among strangers without central control, and it is able to support high transaction volumes.
This system is highly scalable while maintaining stable performance independent of the numbers of active users, which is hard to achieve in traditional blockchain structure where there is a unique shared ledger.
(Bitcoin can achieve between 3.3 and 7 transactions per second, the Visa system does maximum 24,000 transacions/s and the protocol described here has no theoretical limit 😮.)
This is enabled by a network composed of individual semi-independent ledger (every node has it's own) and rules that define how these are constructed.
A transaction between two parties creates a new element in both the participant’s ledger and this new element contains some pieces of information including but not limited to the value of transaction itself, details of the previous element in the ledger and signatures of both the parties.
A double spending attack allows the attacker to utilize resources already consumed before, allowing him to fraud two or more node with the same resource set.
Let's consider a real-world example to better understand the problem.
You decide to go to a restaurant to order a pizza 🍕 worth 10 euro, you pay in cash and the note goes into the shop's cash desk. Now by no means you can spend that note somewhere else that day. This constriction is easy to understand in the real world, but in Trustchain things are a bit different, here using many parallel ledgers it is possible to double spent your 10 euro somewhere else multiple times before being caught by a cashier, which can take quite some time.
This is possible because the defence system against these attacks is not very effective. The key idea is that soon or later an adversarial node will enter in contact with a node that has knowledge of his previous transactions, in such a situation attempting a double spending attack will result in failure. In a low-entropy transactions system, behaviour such as this can take a long time before being detected and this can result in chains correction increasingly complicated.
Like in any good idea, there are weak points that need to be addressed and re-enforced in order for it to become a commercially approved technology.
With this project, I want to approach one of the biggest weaknesses on Trustchain with the goal of finding a better solution for it because I believe that there are a lot of potential in this technology.👍
Attack and malicious node definition doc