Enhancing AI Security | Züs Debrief October 25, 2023

Tiago Souza
October 26, 2023
News & Updates
Enhancing AI Security Züs Debrief October 25, 2023
Enhancing AI Security Züs Debrief October 25, 2023

Cloud Cover AMA | Enhancing AI Security:

Join us for Ecclesia #26, happening tomorrow, October 26th, at 9 AM PST. Saswata will be providing updates on the Active Set redeployment and the next strategic steps for the Mainnet launch. We encourage you to bring your questions and share your insights beforehand on our Discord or Telegram channels. Your active participation plays a crucial role in our community, especially during these pivotal times. Do not miss out on the opportunity to be a part of the conversation! See you at Ecclesia #26! Continue reading to learn how at Züs, we are committed to Enhancing AI Security. A secure and equitable digital ecosystem free from the risks of monopolization and misuse.

Storm of the Week:

Enhancing AI Security with Züs

As AI and machine learning continue to revolutionize industries, they also bring about new cybersecurity challenges, particularly concerning data integrity. Züs, our decentralized storage network, addresses these challenges head-on by distributing and securing data across multiple locations, mitigating the risks of breaches and attacks prevalent in centralized storage systems.

Our platform’s additional security features, such as proxy re-encryption and immutability, ensure that only authorized individuals can access the data and protect the data’s integrity, even if compromised. This is crucial for maintaining the reliability of AI models, as highlighted in a Cointelegraph article discussing the dystopian risks of AI centralization.

At Züs, we are committed to fostering a secure and equitable digital ecosystem, ensuring that the transformative power of AI is harnessed responsibly and safely, free from the risks of monopolization and misuse.

Züs 3-Layer of Security

1. Fragmentation: Strength in Distribution

Züs begins its security protocol with fragmentation, breaking down your data into smaller fragments and distributing them across a decentralized network. This method ensures no single point of failure, providing robust protection against potential threats and breaches.

2. Proxy Re-Encryption: Controlled and Secure Sharing

The second layer introduces proxy re-encryption, a sophisticated method that allows data to be shared privately and directly between parties in a decentralized manner. This ensures that only the intended recipient, with the right credentials, can access the data and reconstruct the fragmented file. Meanwhile, the sender retains full control of its access.

3. Immutability: Ensuring Data Integrity

The final layer is immutability. Once data is stored on the Züs network, you can make it immutable. Then, it becomes tamper-proof, ensuring its integrity from the moment it’s saved, unaltered. This layer of protection ensures the highest level of data integrity, making it an indispensable asset for AI systems dependent on authentic and unaltered information. With Züs, your data isn’t just secure; it is set in digital stone.

Blockchain Updates: 

In the past week, the blockchain team diligently worked on evaluating and enhancing various aspects of the blockchain protocol, addressing issues related to miners’ health statuses, fixing multiple, Cypress test failures, and improving both web streaming and DEX deployment functionalities. Below is a detailed report:

Block Finality Analysis: 

The team rigorously analyzed two crucial aspects of block finality: steady block finality and block finality.

  • Steady Block Finality is the consistent timeframe between the last finalized block and the current finalized block.
  • Block Finality represents the duration from a block’s creation to its finalization.

A revised understanding was established: block finality is equivalent to five times the steady state finality. This is due to the requirement for two blocks’ confirmation and the network’s capacity to generate blocks three rounds ahead of the latest finalized block (LFB).

Miners State Health and Test Fixes

The team resolved issues concerning the miners’ state health pending status. This was accomplished with the implementation of PR #2879. Furthermore, numerous Cypress test failures were addressed, enhancing the overall stability of the system.

Ongoing Issues and Enhancements: 

The team observed issues with the Vult app during chaos tests, specifically related to file and directory operations. Investigation and resolution efforts are currently underway. Concurrently, improvements were made to the DEX deployment and web streaming transcode processes, aiming for optimal performance.

Functionality for Buying Native ZCN

Discussions and work progressed on integrating the functionality to purchase native ZCN via ERC tokens within web applications. This is facilitated by the integration of the Bancor contract, and the team aims to complete this integration in the upcoming week.

Core PRs Merged: 

Numerous PRs were successfully merged, contributing to the overall enhancement of the system:

  • PR #2867 – Balance fix was applied.
  • PR #2887 – Resolved an issue with challenge rewards.
  • PR #2885 – Generated a fix for challenge generation.
  • PR #2878 – Implemented unit tests for rollback allocation tokenomics.
  • PR #2889 – Addressed challenges on sprint.
  • PR #2879 – Fixed miners state health status.
  • PR #2877 – Updated conductor tests workflows to include input in manual runs.
  • PR #2894 – Fixed challenges count.
  • Additional enhancements and fixes were also implemented in the gosdk and blobber repositories.

Conclusion and Next Steps: 

The blockchain team made substantial progress last week, overcoming challenges and making significant enhancements to the network. As we move forward, the team remains committed to ensuring the optimal performance, security, and functionality of the blockchain protocol. Stay tuned for more updates and improvements in the coming weeks.

Latest Articles
Tiago Souza
December 20, 2024

In light of recent research into the security of end-to-end encrypted cloud storage systems, it’s becoming increasingly clear that while many services claim to offer privacy, few can truly deliver on that promise. A recent paper, End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem (source), analyzed five major E2EE cloud storage providers and […]