![]() With the help of our community and the HNT incentive mechanism, we have created a useful global network. Helium’s mission has always been to build a global contiguous network. Transcribed: In response to recent comments in the discord diy-packet-forwarder channel, I am compelled to address the conversation surrounding network gaming and denylists (or “black lists”), and what’s being done about it. Regardless, this is a useful community-organized project and there is overlap between this effort and what’s been undertaken by Helium, Inc. For example, how can you programmatically establish that a location is “impossible”? While many of these indicators may be descriptive, the Suspots project doesn’t appear to be open source, and there are no technical descriptions provided for some indicators. These indicators include: TX_SCALES, PERFECT_LAYOUT, SIMILAR_WITNESS_LIST, LONG_WITNESS, RSSI_SNR_ODDITIES, IMPOSSIBLE_LOCATION, WALLET_ONLY, CUSTOM_FIRMWARE, SIMILAR_IP, HIGH_REWARDS, NO_LISTEN, NO_RESPONSE_MAPPER, NO_WITNESSES, and OTHER. The website Suspots provides a summary of indicators of suspicious network activity. As you might imagine, this type of system was not implemented at the start, and there can still be false positives. ![]() It can be easy to identify flagrant cheaters just by using data on the blockchain. Though they might be asserted in the Arctic Circle, maybe they’re all actually running inside someone’s bedroom in a small town in the United States. However, what if a malicious user owns multiple hotspots and spoofs them all in the same place? Especially a place in which there are no genuine, legitimately asserted hotspots. This article by Hans is the most thorough source material and includes real-life examples of spoofing. When you assert your hotspot’s location for the first time, you are convinced to choose an accurate location.Through this “beaconing” system, coverage is proved. Buying a new antenna because it potentially increases your earnings is not gaming.Īlmost all gaming revolves around the practice of spoofing. Gaming can be defined as any interaction with the Helium network that is dishonest or harmful. Though there are many other terms that could be used to classify specific behaviors, this article will use “gaming” as the catch-all term. Imagine deciding that a project is feasible due to asserted Helium hotspot coverage just to find out that some crucial hotspots have spoofed locations. Also, this can affect the implicit trust in the network. Since there is a fixed amount of rewards distributed via PoC each month, each and every hotspot that is gaining more rewards than it deserves is decreasing rewards for everyone else. Gaming, spoofing, hacking, and all types of bad behavior harm the network. This is most often performed by a bad actor looking to enrich themself. We’re talking about abusing or exploiting the protocol and reward mechanism(s). When we discuss network gaming, we aren’t talking about people playing video games using LoRaWAN. This system is known as Proof-of-Coverage (PoC).Īs the network has grown and awareness of this project has increased, there have been an increasingly large number of cheaters. ![]() The Helium network is a massive decentralized LoRaWAN® network that compensates those who host physical hotspots by rewarding them with Helium tokens, or $HNT.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |