EOS is not a blockchain, it’s a glorified cloud computing service

A blockchain testing company claims it has found something quite shocking: EOS EOS, a blockchain protocol that was worth $4 billion a few months ago, may not actually be a blockchain.

In a new experiment, benchmarking firm Whiteblock concluded that the EOS token (and its RAM market) is essentially a cloud service for computation – and is built on an entirely centralized premise. As such, it lacks some of blockchain’s most fundamental aspects, like immutability.

The tests were commissioned by major blockchain entity ConsenSys, to establish metrics for benchmarking base-layer blockchain protocols.

“Through practical testing and experiments in a controlled laboratory setting, this research provides a thorough and objective model of [EOS’] design, performance, and economics in order to present a reference for the blockchain community,” declares the paper, which Whiteblock shared directly with Hard Fork.

Whiteblock built a replica of EOS to destroy

EOS differs from Ethereum and Bitcoin in lots of ways, but especially in how it decides who should be the ones to validate blocks and reap the rewards for doing so.

Unlike Proof-of-Work blockchains, which allow anyone to contribute to powering the network, EOS selects who should process transactions (block producers) through a complicated voting process called Delegated Proof-of-Stake.

During these elections, each EOS token held equates to one vote, meaning that those who hold lots of EOS have more say in who controls the network.

So, to conduct this experiment, Whiteblock ran a replica of EOS which it claims works the very same way as the real thing.

“It runs the exact same software. The block producers within the Whiteblock environment perform the same functions a block producer would perform in the main net,” Zak Cole, Whiteblock’s chief technology officer told Hard Fork. “We provision nodes within a controlled test environment, configure the network conditions between these nodes in order to emulate real-world performance, and automate their process and actions so we can observe their behavior and measure their performance in a deterministic manner.”

Whiteblock initially began testing their copy of the EOS blockchain in September. The tests took place in an isolated environment and continued for two months.

The firm describes EOS as more of a network that provides promises for computational resources, stored in a “blackbox,” for users to access. Even more damning, it says the entire EOS system is built on a flawed, centralized model.

“EOS is not a blockchain, rather a distributed homogeneous database management system, a clear distinction in that their transactions are not cryptographically validated,” Whiteblock argues. “EOS block producers are highly centralized and users can only access the network using block producers as intermediaries. Block producers are a single point of failure for the entire system.”

EOS is not exactly fast and could be controlled by cartels

A large chunk of the paper is dedicated to proving there is no proper protocol for preventing block producers from colluding to maintain their role as block producers, with little protection against bad actors forming cartels to crash the entire network.

As such, the report indicates EOS suffers from consensus failures with no Byzantine Fault Tolerance (BFT), leaving the network open to being controlled by rogue, colluding members.

For a blockchain to have BFT, the network must be able to withstand system failures that result from situations related to a mathematical puzzle called the Byzantine Generals’ Problem. If it cannot, bad actors are theoretically able to process false transactions, so BFT relates to the reliability of a blockchain.

“Conceptually, it is impossible for EOS to implement Byzantine Fault Tolerance. A true BFT system would not be susceptible to cartels forming in the system, [but] […] cartels are easily formed in EOS, therefore negating any effort to claim BFT.”

In particular, the researchers note the primary threat to EOS’ integrity is the Sybil attack, which involves bad actors muscling other network contributors out of being able to process transactions altogether by creating fake identities, and using them to initiate spam and DDoS attacks.

“This is in fact a large vulnerability in the system as fraudulent users are essentially able to create malicious accounts much faster than the block producers are able to come to consensus [on which accounts to exclude],” Whiteblock warns. “This further proves the high level of centralization that exists in the EOS network and the tremendous power these block producers possess.”

The report then states that block producers do not actually process transactions based on any consensus algorithm, instead confirming transactions in a “mechanical fashion,” with no formal verification of the validity of transactions being processed.

To which effect, Whiteblock’s benchmarks revealed that the amount of transactions able to be processed by EOS is significantly lower than initially claimed in marketing materials, never exceeding 250 transactions per second (TPS), even with optimal settings like zero latency and packet loss.

It must be mentioned that other testers have previously benchmarked the speed of the EOS network. The general belief is that the current maximum throughput of EOS is around 4,000 TPS.

The EOS whitepaper declares it perfectly possible that EOS would one day scale to process millions of transactions per second.

“During tests with real world conditions of 50 [milliseconds] of round trip latency and 0.01 percent packet loss, performance dropped below 50 TPS, putting the system in close proximity to the performance that exists in Ethereum,” Whiteblock claims.

Bitcoin is currently capable of processing up to 7 TPS, and Ethereum can process around 20.

Whiteblock says EOS doesn’t use cryptography

According to Cole, EOS stores all data related to transactions in a kind of table designed by lead EOS brain Dan Larimer, called a Chainbase.

When EOS network confirms transactions, Whiteblock claims block producers are simply cross-referencing new transactional data against this table, rather than confirming their legitimacy with cryptography.

The firm says EOS transactions only happen due to block producers updating the data stored in the underlying Chainbase, rather than cryptographically verified changes to the state of the underlying blockchain, as is the case with Ethereum.

“All of these actions operate in an environment that lacks cryptographic validation of the contracts and transactions,” says the research. “EOS is fundamentally the same as a centralized cloud computing architecture [client/server] without the fundamental components of a blockchain or peer-to-peer network.”

Having network participants validate transactions by checking a special table has consequences. Not only is it unusual for a cryptocurrency, it affords developers practically infinite amounts of “undos,” meaning EOS transactions can be reversed by those with access (such as block producers).

Indeed, there have already been cases of reversed transactions and frozen EOS accounts.

“The ability to undo history (or anything for that matter) related to state is a notion that directly conflicts with the essential definition of what can be considered a blockchain, which is characterized by immutability of data,” Cole concluded.

Except it does, just differently

Hard Fork reached out to many EOS block producers for comment. At print time, most representatives declined to comment, noting they are awaiting the publication of the full report.

One source, an EOS dApp developer, did say that Whiteblock’s interpretation of how EOS validates transactions was particularly “weird.”

The source explained that Chainbase is just a method of storing real-time information, like in folders or files. In this case, EOS stores data pertaining to transactions in a Chainbase, which it places in a central location (similar to a Bitcoin full node).

Block producers then validate the transactions using cryptography, writing confirmed transactions into a blockchain as part of the process.

Chainbases are really meant to optimize EOS performance, as they allow EOS to store data in RAM, which it then uses to produce blocks quickly.

This would suggest that EOS is actually using cryptography after all, contradicting Whiteblock’s conclusions.

A look behind the curtain

It should be pointed out that ConsenSys, which commissioned Whiteblock, is heavily invested in the Ethereum blockchain ecosystem, the primary competitor to EOS. It describes itself as a “venture production studio” that focuses on the development of Ethereum-powered platforms.

And if this whole thing is not strange enough – EOS was actually borne on the Ethereum blockchain, starting out as an ERC-20 token.

But after Block.one launched the EOS mainnet in June to become its own blockchain, many Ethereum tokens have since made the switch – Everipedia is one, which is managed by Larry Singer, the co-founder of Wikipedia.

It should also be said that EOS is no stranger to controversy. The launch of its mainnet was nightmarish, the whole process lasting more than a week, with block producers failing to agree on whether EOS was ready to go live all on its own.

Since EOS has been fully operational, Block.one has paid over $400,000 to freelance security researchers for discovering critical flaws in code that weren’t fixed in time for the launch.

In any case, ConsenSys says it will use Whiteblock’s findings to develop comprehensive reports, which it will deliver to partners, including Ledger Capital, Bo Shen, Enterprise Ethereum Alliance, Microsoft, and Google. Academic institutions like MIT, USC, and Duke have reportedly committed to contributing resources to round out the research.

Extra-curiously, one of the listed partners, Bo Shen, is actually co-founder of Bitshares, an autonomous blockchain organization developed by Dan Larimer and released in 2014.

The research continually highlighted architectural resemblances between Dan Larimer’s Bitshares system and EOS – particularly the ability to revert state and make changes all the way back to the genesis block.

Whiteblock has allowed Hard Fork to publish the study, which includes a thorough representation of its methodology alongside detailed test results. The full report can be accessed from this link,

For those that remain unconvinced, the firm also states it will livestream the EOS benchmark tests in November.

Funnily enough, you can even RSVP here.

Published November 1, 2018 — 13:00 UTC

Be the first to comment

Leave a Reply

Your email address will not be published.


*


Privacy Policy

WideBitcoin.com is committed to safeguarding your privacy. Contact us at if you have any questions or problems regarding the use of your Personal Data and we will gladly assist you.

By using this site or/and our services, you consent to the Processing of your Personal Data as described in this Privacy Policy.

Table of Contents

  1. Definitions used in this Policy
  2. Data protection principles we follow
  3. What rights do you have regarding your Personal Data
  4. What Personal Data we gather about you
  5. How we use your Personal Data
  6. Who else has access to your Personal Data
  7. How we secure your data
  8. Information about cookies
  9. Contact information

Definitions

Personal Data – any information relating to an identified or identifiable natural person.
Processing – any operation or set of operations which is performed on Personal Data or on sets of Personal Data.
Data subject – a natural person whose Personal Data is being Processed.
Child – a natural person under 16 years of age.
We/us (either capitalized or not)

Data Protection Principles

We promise to follow the following data protection principles:

  • Processing is lawful, fair, transparent. Our Processing activities have lawful grounds. We always consider your rights before Processing Personal Data. We will provide you information regarding Processing upon request.
  • Processing is limited to the purpose. Our Processing activities fit the purpose for which Personal Data was gathered.
  • Processing is done with minimal data. We only gather and Process the minimal amount of Personal Data required for any purpose.
  • Processing is limited with a time period. We will not store your personal data for longer than needed.
  • We will do our best to ensure the accuracy of data.
  • We will do our best to ensure the integrity and confidentiality of data.

Data Subject’s rights

The Data Subject has the following rights:

  1. Right to information – meaning you have to right to know whether your Personal Data is being processed; what data is gathered, from where it is obtained and why and by whom it is processed.
  2. Right to access – meaning you have the right to access the data collected from/about you. This includes your right to request and obtain a copy of your Personal Data gathered.
  3. Right to rectification – meaning you have the right to request rectification or erasure of your Personal Data that is inaccurate or incomplete.
  4. Right to erasure – meaning in certain circumstances you can request for your Personal Data to be erased from our records.
  5. Right to restrict processing – meaning where certain conditions apply, you have the right to restrict the Processing of your Personal Data.
  6. Right to object to processing – meaning in certain cases you have the right to object to Processing of your Personal Data, for example in the case of direct marketing.
  7. Right to object to automated Processing – meaning you have the right to object to automated Processing, including profiling; and not to be subject to a decision based solely on automated Processing. This right you can exercise whenever there is an outcome of the profiling that produces legal effects concerning or significantly affecting you.
  8. Right to data portability – you have the right to obtain your Personal Data in a machine-readable format or if it is feasible, as a direct transfer from one Processor to another.
  9. Right to lodge a complaint – in the event that we refuse your request under the Rights of Access, we will provide you with a reason as to why. If you are not satisfied with the way your request has been handled please contact us.
  10. Right for the help of supervisory authority – meaning you have the right for the help of a supervisory authority and the right for other legal remedies such as claiming damages.
  11. Right to withdraw consent – you have the right withdraw any given consent for Processing of your Personal Data.

Data we gather

Information you have provided us with
This might be your e-mail address, name, billing address, home address etc – mainly information that is necessary for delivering you a product/service or to enhance your customer experience with us. We save the information you provide us with in order for you to comment or perform other activities on the website. This information includes, for example, your name and e-mail address.

Information automatically collected about you
This includes information that is automatically stored by cookies and other session tools. For example, your shopping cart information, your IP address, your shopping history (if there is any) etc. This information is used to improve your customer experience. When you use our services or look at the contents of our website, your activities may be logged.

Information from our partners
We gather information from our trusted partners with confirmation that they have legal grounds to share that information with us. This is either information you have provided them directly with or that they have gathered about you on other legal grounds. See the list of our partners here.

Publicly available information
We might gather information about you that is publicly available.

How we use your Personal Data

We use your Personal Data in order to:

  • provide our service to you. This includes for example registering your account; providing you with other products and services that you have requested; providing you with promotional items at your request and communicating with you in relation to those products and services; communicating and interacting with you; and notifying you of changes to any services.
  • enhance your customer experience;
  • fulfil an obligation under law or contract;

We use your Personal Data on legitimate grounds and/or with your Consent.

On the grounds of entering into a contract or fulfilling contractual obligations, we Process your Personal Data for the following purposes:

  • to identify you;
  • to provide you a service or to send/offer you a product;
  • to communicate either for sales or invoicing;

On the ground of legitimate interest, we Process your Personal Data for the following purposes:

  • to send you personalized offers* (from us and/or our carefully selected partners);
  • to administer and analyse our client base (purchasing behaviour and history) in order to improve the quality, variety, and availability of products/ services offered/provided;
  • to conduct questionnaires concerning client satisfaction;

As long as you have not informed us otherwise, we consider offering you products/services that are similar or same to your purchasing history/browsing behaviour to be our legitimate interest.

With your consent we Process your Personal Data for the following purposes:

  • to send you newsletters and campaign offers (from us and/or our carefully selected partners);
  • for other purposes we have asked your consent for;

We Process your Personal Data in order to fulfil obligation rising from law and/or use your Personal Data for options provided by law. We reserve the right to anonymise Personal Data gathered and to use any such data. We will use data outside the scope of this Policy only when it is anonymised. We save your billing information and other information gathered about you for as long as needed for accounting purposes or other obligations deriving from law, but not longer than 1 year.

We might process your Personal Data for additional purposes that are not mentioned here, but are compatible with the original purpose for which the data was gathered. To do this, we will ensure that:

  • the link between purposes, context and nature of Personal Data is suitable for further Processing;
  • the further Processing would not harm your interests and
  • there would be appropriate safeguard for Processing.

We will inform you of any further Processing and purposes.

Who else can access your Personal Data

We do not share your Personal Data with strangers. Personal Data about you is in some cases provided to our trusted partners in order to either make providing the service to you possible or to enhance your customer experience. We share your data with:

Our processing partners:

  • facebook.com
  • google.com
  • bing.com
  • twitter.com
  • pinterest.com

Our business partners:

  • facebook.com
  • google.com
  • bing.com
  • twitter.com
  • pinterest.com

Connected third parties:

  • facebook.com
  • google.com
  • bing.com
  • twitter.com
  • pinterest.com

We only work with Processing partners who are able to ensure adequate level of protection to your Personal Data. We disclose your Personal Data to third parties or public officials when we are legally obliged to do so. We might disclose your Personal Data to third parties if you have consented to it or if there are other legal grounds for it.

How we secure your data

We do our best to keep your Personal Data safe. We use safe protocols for communication and transferring data (such as HTTPS). We use anonymising and pseudonymising where suitable. We monitor our systems for possible vulnerabilities and attacks.

Even though we try our best we can not guarantee the security of information. However, we promise to notify suitable authorities of data breaches. We will also notify you if there is a threat to your rights or interests. We will do everything we reasonably can to prevent security breaches and to assist authorities should any breaches occur.

If you have an account with us, note that you have to keep your username and password secret.

Children

We do not intend to collect or knowingly collect information from children. We do not target children with our services.

Cookies and other technologies we use

We use cookies and/or similar technologies to analyse customer behaviour, administer the website, track users’ movements, and to collect information about users. This is done in order to personalize and enhance your experience with us.

A cookie is a tiny text file stored on your computer. Cookies store information that is used to help make sites work. Only we can access the cookies created by our website. You can control your cookies at the browser level. Choosing to disable cookies may hinder your use of certain functions.

We use cookies for the following purposes:

  • Necessary cookies – these cookies are required for you to be able to use some important features on our website, such as logging in. These cookies don’t collect any personal information.
  • Functionality cookies – these cookies provide functionality that makes using our service more convenient and makes providing more personalised features possible. For example, they might remember your name and e-mail in comment forms so you don’t have to re-enter this information next time when commenting.
  • Analytics cookies – these cookies are used to track the use and performance of our website and services
  • Advertising cookies – these cookies are used to deliver advertisements that are relevant to you and to your interests. In addition, they are used to limit the number of times you see an advertisement. They are usually placed to the website by advertising networks with the website operator’s permission. These cookies remember that you have visited a website and this information is shared with other organisations such as advertisers. Often targeting or advertising cookies will be linked to site functionality provided by the other organisation.

You can remove cookies stored in your computer via your browser settings. Alternatively, you can control some 3rd party cookies by using a privacy enhancement platform such as optout.aboutads.info or youronlinechoices.com. For more information about cookies, visit allaboutcookies.org.

We use Google Analytics to measure traffic on our website. Google has their own Privacy Policy which you can review here. If you’d like to opt out of tracking by Google Analytics, visit the Google Analytics opt-out page.

Read more about cookies on our Cookie Policy

Contact Information

email: [email protected]

Changes to this Privacy Policy

We reserve the right to make change to this Privacy Policy.

You can configure your Internet browser, by changing its options, to stop accepting cookies completely or to prompt you before accepting a cookie from the website you visit. If you do not accept cookies, however, you may not be able to use all portions of the WideBitcoin Websites or all functionality of the Services.

Please note that disabling these technologies may interfere with the performance and features of the Services.

You may also disable cookies on the WideBitcoin Sites by modifying your settings here:

Visitor comments may be checked through an automated spam detection service.

Last Update: May 25, 2018