E3T NETWORK
Infrastructure

CONSENSUS
Protocol

  • E3 platform will employ the ‘Proof-of-Authority’ (PoA) method as its consensus protocol.

  • PoA consensus does not require nodes to spend computational resources, in contrast to PoW consensus.

  • PoA consensus has much higher transaction rates and higher tolerance to compromised and malicious nodes as compared to PoW consensus.

  • E3 platform will be a ‘Permissioned Blockchain Network’, where only nodes of approved members of E3Hubs can validate transactions and approve new blocks.

  • For greater security, the PoA consensus protocol will rely on sophisticated authentication technology to ensure only approved E3 members have permission to access the E3 Blockchain network.

PROOF OF AUTHORITY
Benefits

  • Saves electricity power.

  • Eliminates the need to invest into large numbers of ‘Miners’ servers.

  • Increase the transaction speed tremendous compared to Proof-of-Work.

  • Better security since only members can access the network.

  • The algorithm in the smart contract will select members with the greatest authority to validate the blocks. Which means instead of selecting the most worthy validator based on monetary value (Proof-of-Stake), Proof-of-Authority selects based on the identity of the member and his/her position in the network. These are people who are most concerned of the well being of the network and therefore most worthy to validate the blocks.

E3T MAPPING
Token Distribution

E3 Wallet
Participating events, trade within wallet, payment usage, transfer between users with our AES encrypted and secured e-wallet.
Development
Our development includes project market place for e3t holders to participate in venturing into good businesses.
Wide Circulation
Our token will be circulated to Universities, colleges, corporate companies, entrepreneurs, etc.
Talent Market Place
Enabling professionals in the community to share their product and services.

TRANSACTION
The Hashing Process

When a User A transfer E3T to User B, this transaction will be hashed with SHA3-256 and stored in a candidate block.
When all the transactions in the candidate block have been verified, the candidate becomes a validated block.
This block will then be appended to the E3T Private Blockchain.

BLOCKCHAIN
How Immutability Works?​

Each ‘Block’ contains a series of transactions. It begins with the ‘Genesis’ block with its original hash. When a new block comes in, it will be linked to the hash of the previous block, while having its own hash. This repeats as another new block is appended to the blockchain. It will be linked to the previous block’s hash, creating a ‘Chain’ of blocks.

Any changes in the blocks will make the entire chain of blocks behind invalid and only valid chains are copied to all nodes in the network.
Therefore invalid chain will be rectified automatically by the rest of the nodes with the valid chain.

E3T blockchain architecture employs the PoA consensus protocol where the blocks will be validated by the chosen validator nodes, instead of using ‘Miners’ like the PoW consensus protocol.

CYBERSECURITY
How To Ensure It?

Further minimising 51% network attack
Proof-of-Authority : Only trusted individuals will get to validate blocks as their identity is put on at stake, they are incentivised to not conduct any malicious activity.
Additional Layer of validator selection:
  • To be further defined by their ‘worthiness’ based on their contribution into the E3hubs ecosystem.
  • To include a time duration for each validator to be replaced with other validator with similar ‘worthiness’ in a cyclical manner to ensure true democracy and decentralisation.
Other Challenges:
Despite the precautionary steps we will take to ensure security in E3T Blockchain network, the risks of malicious infiltration still remains. Spyware, keyloggers trojans and other malwares gain entrance into the network through individual nodes belong to members, especially when they turn it off and use it to access other websites, where they can get infected before re-connecting and spreading the infection to the network. To overcome this, we will incorporate our cybersecurity systems that includes anti-virus, anti-spyware software and 24×7 network monitoring.
Close Menu