Infinity Nodes

Secure-nodes, passive-income, no-inflation

Infinity Nodes are a first of its kind of burn-collateralized nodes that receive monetary incentives for running their hardware and hosting files. They are thebackbone of the IDS network.

Similar to how other Blockchains work, the main SINOVATE chain relies upon nodes dispersed across the globe without concern for borders or jurisdiction. Each nodehosts a copy of the main SIN Blockchain.

InfinityNodes use a custom deterministic reward algorithm secured by Schnorr signatures for node validation. They provide bespoke functions such as controlling inflation and storing data that regular nodes cannot deliver.

  1. Schnorr based Multi-Signature signing scheme (MuSig)
  2. Provably fair and openly verifiable fully deterministic node rewards
  3. Inflation control with a burn-to-run node ecosystem
  4. Fully on-chain node registration and servicing
  5. Decentralized Autonomous Organisation (DAO) with node democracy
  6. Node incentives ensure sustainability





Blockchain-based File Transfer Protocol (bFTP)

A novel protocol for interacting with IDS:
We built the IDS network around deterministic Infinity Nodes, a fundamental shift in the network, from a Legacy Masternodes-like architecture (DASH, pre-DIP0003) to a new consensus system.

Using Schnorr signatures, we can reach levels of on-chain security and speed never seen before. This is important as nodes are required to be available at all time for future IDS dCloud applications, and enforcing new checks on-chain, openly and verifiably by all, is the basis of a decentralized system.

With bFTP, we plan on extending Infinity Nodes capabilities so that each becomes an open datapoint for storage. The procedure for this will include a fee for allocated space paid by the user for the hosting period. Fees are burnt, and a signed message from the burn address is used for authenticating over bFTP. Once the node has verified how much SIN the user has burnt, the bFTP protocol allows pushing data directly to the node. At this point, the stored information is now safely available on an Infinity Node.

For redundancy, Infinity Nodes organize and distribute the data among themselves, following a deterministic “score” system based on the hash of the data and the node’s public key.

To retrieve data from IDS, a user re-authenticates over bFTP to any of the nodes holding a redundant copy of the data and then the deterministic scoring algorithm quickly locates the data.