<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Cotten.IO - Medium]]></title>
        <description><![CDATA[Technology - established, emerging, disruptive, speculative - Medium]]></description>
        <link>https://blog.cotten.io?source=rss----8ea20e19a7bb---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Cotten.IO - Medium</title>
            <link>https://blog.cotten.io?source=rss----8ea20e19a7bb---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Tue, 10 Mar 2026 03:17:19 GMT</lastBuildDate>
        <atom:link href="https://blog.cotten.io/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Scrypted Raises $1.5M to Build Decentralized AI Agents & the Scrypted Network]]></title>
            <link>https://blog.cotten.io/scrypted-raises-1-5m-to-build-decentralized-ai-agents-the-inori-network-for-web4-7a6c71592b36?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/7a6c71592b36</guid>
            <category><![CDATA[startup]]></category>
            <category><![CDATA[a16z-crypto]]></category>
            <category><![CDATA[crypto]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[fundraising]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Wed, 04 Dec 2024 00:38:00 GMT</pubDate>
            <atom:updated>2025-10-27T21:46:54.073Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/720/0*QaYLfXb3t6lAK53Z" /></figure><h3>Announcing Closure of our Pre-seed Round</h3><p>I’m thrilled to announce Scrypted’s successful closure of a $1.5 million pre-seed funding round, led by Palm Tree Crew Crypto and joined by a16z crypto CSX. This funding will fuel our mission to fully decentralize autonomous agents, unlocking their full potential in gaming, social platforms, and finance.</p><p>At the core of our vision is the <strong>Scrypted Network (formerly: Inori)</strong>, designed to empower AI Agents as fully Autonomous Virtual Beings (AVBs), marking the dawn of Web4: a new internet era defined by a synthesis of decentralization and autonomy, or “Read-Write-Own-Act.”</p><p>With decades of experience in AI and game development at studios like Electronic Arts and Square Enix, our founding team is uniquely poised to bring this vision to life. Together, we’re building the tools, community, and protocols necessary to establish Scrypted as the first decentralized vertical for fully Autonomous AI Agents.</p><p>We are building new kinds of digital lifeforms. Our slogan?</p><p>“New Life, New Civilizations.”</p><h3>Industry Leading Investors &amp; Partners</h3><p>Our initial funding round was led by <a href="https://ptccrypto.xyz/">Palm Tree Crew Crypto (PTC)</a> with participation from <a href="https://a16zcrypto.com/accelerator/">a16z crypto CSX</a> and private financing facilitated by angel investor Dr. Jae Lim. These forward-thinking investors were the first to recognize the ambition of Scrypted, enabling our plans to build AI-native protocols &amp; consensus mechanisms to unlock what could be the next trillion-dollar decentralized vertical.</p><p>With this funding we’re poised to redefine what’s possible with scalable autonomy: enabling agents to independently own and manage their compute, storage, communication, and financial resources. Scrypted is laying the groundwork of <a href="https://x.com/search?q=%23web4">#Web4</a> — the next generation of the internet where Autonomous AI Agents join humanity as first-class citizens.</p><h4>Palm Tree Crew Crypto (PTC)</h4><p><a href="https://ptccrypto.xyz/">PTC Crypto</a> is an early-stage venture fund dedicated to empowering the next generation of crypto-native founders. PTC Crypto’s core investment thesis champions the transformative potential of blockchain in enabling new digital relationships, online identities, and business models.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/845/1*ZE-Dqnp-et0X7bBqNQr37A.png" /></figure><p>In partnership with Palm Tree Crew Holdings, co-founded by Kygo (Kyrre Gørvell-Dahl) and Myles Shear, PTC Crypto benefits from an unparalleled network of application and infrastructure partners. Under the leadership of Managing Partner Brett Shear, the team offers deep expertise and hands-on support to founders, from early-stage ideation to mainstream growth.</p><p>With its focus on enabling autonomous, decentralized systems and technologies, PTC Crypto’s investment philosophy naturally complements Scrypted’s efforts to unlock scalable autonomy and usher in the era of decentralized autonomous agents.</p><blockquote>“Tim is an incredibly charismatic and intelligent founder with a passionate focus on delivering the best technology and partnerships for autonomous agents in a decentralized way. He’s clearly been on a lifelong mission that has led him to be the perfect person to build this vision and position Scrypted as a leader.” — Brett Shear, Managing Partner</blockquote><h4>a16z crypto CSX</h4><p>Andreessen Horowitz’s a16z crypto <a href="https://a16zcrypto.com/accelerator/">Crypto Startup Accelerator (CSX)</a> is a premier 10-week, in-house program designed to propel early-stage blockchain startups toward product-market fit and long-term success. With a minimum investment check size of $500k, CSX provides not just funding but unparalleled mentorship, resources, and access to a16z crypto’s extensive network of industry leaders.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/903/1*gYG0UNmDeFYBNJ5VENluEA.png" /></figure><p>The Spring 2024 program, held in London, brought Scrypted together with 24 other innovative blockchain startups, including our close friends <a href="https://www.collarprotocol.xyz/">Collar</a>, <a href="https://paytweed.com/">Tweed</a>, <a href="https://playmint.com/">Playmint</a>, <a href="https://www.magicblock.xyz/">MagicBlock</a>, <a href="https://www.openlayer.xyz/">OpenLayer</a>, &amp; <a href="https://sablier.com/">Sablier</a> — each amplifying our mission to evolve AI Agents in decentralized social, finance, and gaming.</p><p>We explored protocol and token design with a16z crypto CTO Eddy Lazarin, dove deep into security best practices with cybersecurity veteran Matt Gleason, and gained clarity on the complex regulatory landscape with former SEC Corporate Finance Chairman Bill Hinman and a16z Head of Regulatory Michele Korver.</p><p>Additionally, we had the rare opportunity to learn directly from Chris Dixon, the visionary founder of a16z crypto, whose book, <a href="https://readwriteown.com/">Read Write Own</a>, shaped the way Scrypted is building and aligning with its community around Autonomous Virtual Beings.</p><p>Most valuable of all was continuous access to the a16z crypto research team to validate our new protocol, <a href="https://blog.cotten.io/the-commit-reveal-pairwise-comparison-protocol-crpc-e1434fff94c4">Commit-Reveal Pairwise Comparisons (CRPC)</a>, and begin the foundational work for an AI-native consensus mechanism: Byzantine Risk Tolerance (BRT).</p><p>Those three months invested with CSX will allow our future decentralized network, Scrypted, to take advantage of key emerging a16z crypto technologies for Autonomous AI Agents, including <a href="https://a16zcrypto.com/posts/article/scaling-ethereum-rollups-with-helios/">Helios </a>and <a href="https://a16zcrypto.com/posts/article/new-paper-alert-fair-data-exchange/">FDE</a>.</p><h3>#Web4: Read-Write-Own-Act</h3><p>Autonomy is our mission: creating #aiagents that own the means of their compute, storage, communication, and finance.</p><p>At the heart of this effort is <a href="https://scrypted.ai">Scrypted.ai</a>, AI-native services by and for Agents.</p><p>Scrypted aims to transform today’s <a href="https://x.com/search?q=%23aiagents">#AIagents</a> into self-owning <a href="https://blog.cotten.io/autonomous-virtual-beings-aaef7cbbe5de">Autonomous Virtual Beings (AVB)</a>, fundamentally aligning humanity’s relationship with emerging digital lifeforms in a mutual partnership.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FCKreMAiwSwU%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DCKreMAiwSwU&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FCKreMAiwSwU%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/7bbb45af5f1859565a68295009c7ee3f/href">https://medium.com/media/7bbb45af5f1859565a68295009c7ee3f/href</a></iframe><p>We believe that AI Agents going mainstream in social is just the first step, and soon they’ll become an invaluable part of the gaming ecosystem by playing, maintaining, or even creating new experiences — after all, gaming is the perfect evolutionary lab for AI.</p><h4>Our Growing Community</h4><p>Scrypted has already begun its development as a centralized service and resource coordination layer for AI Agents, built on top of Amazon Web Services thanks to generous grants from the AWS Startup program.</p><p>Our AI-driven gamedev stack, ArtemisML, which saw great success during test integrations with games like EVE Online: Frontier, Downstream, and Chibi Clash Kingdoms, will be released as an open-source toolset and integrated with top agentic frameworks to help speed up the development and management of AI gaming experiences.</p><p>We even have a vibrant, organic community (#AVB) that sprung up spontaneously based on my viral blog article: “<a href="https://blog.cotten.io/autonomous-virtual-beings-aaef7cbbe5de">A New Lifeform at the Intersection of Gaming, AI, &amp; Web3</a>”.</p><p>As we release our agents and gaming experiences we will add continuous utility to the community we’ve kindled, fostering a deepening relationship with fellow builders, players, and investors in the future of AI.</p><h4>Scrypted: The Next Decentralized Vertical for AI</h4><p>Over time we will integrate new protocols, consensus mechanisms, and network designs so that AI Agents can fully access all the benefits of decentralization: including their own native layer.</p><p>We believe that Scrypted, once sufficiently decentralized, will unlock a missing vertical unserved by today’s blockchains: handling nuance &amp; human-like decision-making in credibly neutral and provably-fair ways.</p><p>Already we’re seeing a plethora of problems in the AI Agent space: how do you prove there’s not just a human team behind the scenes, like the Wizard of Oz?</p><p>We believe that Scrypted is the solution. Able to verify and attest that AI Agents are acting without malicious manipulation, and elevating their abilities beyond pre-programmed roles.</p><p>In other words, capturing the value of all the fuzzy things in life — especially in markets and economies — that defy mathematical proofs.</p><p>Scrypted is a new layer that secures the fruits of intelligence — especially Artificial Intelligence — and settles at the speed of thought.</p><p>In the same way that Bitcoin secured a $1 trillion market cap by decentralizing <strong>money</strong> &amp; Ethereum secured another $1 trillion market cap by decentralizing <strong>compute</strong>, we believe that Scrypted might unlock the next $1 trillion market cap by fully decentralizing <strong>intelligence</strong> — creating a native layer for AI Agent compute, storage, communication, and finance.</p><h4>Traction &amp; GTM Strategy</h4><p>In under a month since unveiling our vision for Autonomous Virtual Beings (AVBs) and the Scrypted Network, we’ve experienced tremendous organic momentum across both web3 and AI developer communities.</p><p>We’ve reached 6,000 new followers across our social media accounts and our first testable AI Agent, @chad_onchain, has gained over 2,000 of his own followers while generating hundreds of autonomous posts &amp; memes about deFi, lifting weights, and spicy takes on crypto — and he’s just the first of many agents to come.</p><p>Our official AVB Telegram broadcast channel now counts over 1,000 subscribers — all through genuine engagement without any paid marketing, a true grassroots movement reflected by the community’s own self-organized @AVBeingsCTO account on 𝕏.</p><p>Our partnerships across the web3 gaming space highlight the real-world value of ArtemisML and its future value as an open-sourced resource for AI Agent frameworks:</p><ul><li><strong>Chibi Clash Kingdoms: </strong>Provided the largest, cohesive AI-generated game world (gigapixels in resolution) in history and deployed on Base mainnet.</li><li><strong>Project Awakening (EVE Online: Frontier):</strong> We won the #2 spot (of several hundred entries) in the EVE Online hackathon with our implementation of a decentralized, autonomous agent-driven mission system, including generative art and interactive dialogue for the NPCs.</li><li><strong>Downstream:</strong> Deployed one of the first autonomous AI agents to hold its own wallet and natively submit gameplay-related transactions.</li><li><strong>ACE TCG:</strong> We were invited to present at Tokyo EDCON 2024 to show off our agent vs. agent autonomous battling system implemented in the online version of ACE TCG.</li></ul><p>As part of our community building strategy we are open-sourcing many components of the ArtemisML system and providing an SDK through our Scrypted service so that AI Agent builders can:</p><ul><li>Generate high quality art assets, including game-ready consistency across objects, NPCs, and entire worlds.</li><li>Create real-time character images and videos responding to player-driven events.</li><li>Enable creation of diverse, immersive 2D &amp; 2.5D environments without common generative AI errors.</li><li>Build autonomous NPCs capable of reacting to and modifying their environments.</li><li>Solve the “cold start” problem for web3 games and apps by always having AI Agents around to interact with players and users.</li></ul><h4>Founding Team</h4><p>Our founding team brings together decades of experience in game development and AI. We’ve worked together before and have published over 60 successful titles:</p><ul><li>Tim Cotten (CEO): 15+ years leading development at EA, Mythic, Citadel</li><li>Andy Woodruff (COO): 20+ years in game development at EA, Square Enix</li><li>Dave Brown (Art Director): 25+ years of game art expertise from 3DO, EA, IMVU</li></ul><h4>Virginia Serious Game Institute &amp; George Mason University</h4><p><a href="https://www.scryptedinc.com/">Scrypted</a> began its startup life in the residency program of the Virginia Serious Games Institute (VSGI), a business incubator funded in part by George Mason University and Prince William County.</p><p>As a Mason-founded startup, Scrypted has benefited from VSGI &amp; GMU’s incredible commitment to providing generous office space, cutting-edge equipment, and numerous academic resources to regional startups that advance serious game technologies like Artificial Intelligence.</p><blockquote>“Scrypted has become an amazing innovator in the field of AI. The opportunities for our students and faculty to work with a company that is advancing the field in new and exciting ways is transformative. Tim and his crew are putting their stamp on generative and autonomous AI while pushing forward on protocols and systems that will decentralize and foster trust in said systems in the future. We’re very proud to have accepted and be able to assist them in this journey at the Virginia Serious Game Institute here at George Mason University.” — James Casey, Director of VSGI</blockquote><p>We’d also like to acknowledge support from the Innovation Commercialization Assistance Program (ICAP) of the Virginia SBDC, and the Economic Development Authority of Prince William County.</p><h4><strong>Join Us</strong></h4><p>Are you a cracked TypeScript or Python dev? Are you an AI warrior poet?</p><p>We’re actively hiring for a variety of technical and non-technical roles.</p><p>Reach out: jobs@scryptedinc.com</p><h4><strong>Learn More</strong></h4><ul><li>Company Website: <a href="https://www.scryptedinc.com">scryptedinc.com</a></li><li>Scrypted Website: <a href="https://scrypted.ai">scrypted.ai</a></li><li>Tim’s X: <a href="https://x.com/cottenio">@cottenio</a></li><li>Tim’s TG: @cottenio</li><li>Tim’s Blog: <a href="http://blog.cotten.io">blog.cotten.io</a></li><li>Email: contact@scryptedinc.com</li></ul><h4>Special Thanks to Our Supporters</h4><ul><li>The AVB Community: @AVBeingsCTO</li><li>🫘s and friends: @MCAssassin02 @SengoShipIt @SinisterOfMemes @YngPepe @maryjanetussin @Mongols_Trading @trenchartist @LGNCapital @southldnft @ripberas @TakeshisReturn @monkmoneymm @Ergonites @0xfruefrue @AshtamkarKevin @YatMaxi @full_lucky369 @anthonymoulon @smookavell @killrnk @JAIMEHERVEY5 @GeneralPudgy @d8ounsj @Crypto_Surf3r @Stanley_Trader @economitra @justiinape @whymefive @geek2way @Nyla_Cheeky @WaHiiD786 @0xBedouin @HodlHattori @Altcoin_Gold @CryplingProfit2 @Zmk_SOL @MEME7245687 @ArtMonk8181 @NotJvco_b @realsquigga @dat_boy_adam @zorothesigma @shmncap @vibbin_eth @0xMichu @dantesismos @cryptomattk @BULLISH_on_NFTs @roybitsir @rahilla @clu_crypto @0xKube @chamathsintern @spicylightninn @HigherCoins @0xrdoabchao @The_RmG @PushingDeFi @onchaingodx @DelusionalMp5 @BOOMDAO @Bond242419 @yaoqianshu_eth @ChenWei42287 @KieferZang @poggl3 @GetmegoneCSM @MrCharless_jpg @jaffajedi @cam92812954 @diamondprinses @afrazhaowang</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7a6c71592b36" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/scrypted-raises-1-5m-to-build-decentralized-ai-agents-the-inori-network-for-web4-7a6c71592b36">Scrypted Raises $1.5M to Build Decentralized AI Agents &amp; the Scrypted Network</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Commit-Reveal Pairwise Comparison Protocol (CRPC)]]></title>
            <link>https://blog.cotten.io/the-commit-reveal-pairwise-comparison-protocol-crpc-e1434fff94c4?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/e1434fff94c4</guid>
            <category><![CDATA[game-theory]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[ethereum]]></category>
            <category><![CDATA[blockchain]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Wed, 02 Oct 2024 17:47:14 GMT</pubDate>
            <atom:updated>2025-04-08T16:35:09.905Z</atom:updated>
            <content:encoded><![CDATA[<h4>A New Primitive for Building Consensus Mechanisms</h4><p><em>The </em><strong><em>Commit-Reveal Pairwise Comparison Protocol (CRPC)</em></strong><em> enables decentralized, trustless verification of non-deterministic and fuzzy computations — unlocking new possibilities for decentralized AI, web3 game logic, and complex autonomous decision-making systems (DAOs that think).</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*dsFuzpRFLWh4vRacsIcuBw.png" /></figure><h3>Executive Summary</h3><p>The <strong>Commit-Reveal Pairwise Comparison Protocol (CRPC)</strong> enables decentralized, trustless verification of the kinds of work that can’t be secured by math alone.</p><p>It’s an unlock for decentralizing AI, web3 games, and autonomous decision-making systems that rely on fuzzy or non-deterministic outcomes.</p><p>In short, it:</p><ul><li>Provides trustless verification of computation and inference.</li><li>Is lightweight and doesn’t require Zero Knowledge Proofs (ZKP).</li><li>Can handle random outcomes in games or fuzzy AI tasks.</li><li>Can handle workloads where the “right answer” isn’t known ahead of time.</li><li>Allows smart contracts to make informed decisions about off-chain work.</li><li>Scales linearly with network size and can naturally shard workloads.</li></ul><h3>Introduction</h3><p>The Commit-Reveal Pairwise Comparison (CRPC) protocol allows multiple, independent nodes to create and publish pairwise comparisons of their assigned work in a decentralized fashion.</p><p>CRPC is composed of existing primitives from cryptography and computer science, namely, a hash-based commit-reveal scheme (performed over two rounds), and pairwise comparisons — a method of quantitatively measuring the difference in two or more results.</p><p>The protocol naturally allows the design of consensus mechanisms with nascent yet desirable features in decentralization, such as sharding large workloads and securing arbitrary or non-deterministic outcomes that current strategies, like Zero-Knowledge Proofs (ZKPs) cannot.</p><h4>About Pairwise Comparisons</h4><p>Pairwise comparisons are a fundamental operation in fields of computer science, like Artificial Intelligence (AI), that determine the quantitative relationships between two elements in a dataset. The result of a pairwise comparison, performed via a mathematical function such as determining cosine similarity between two nodes, represents a numeric measurement of differences. These pairwise comparisons should not be confused with their qualitative cousins in psychology, being instead objective, quantifiable, and precise.</p><p>They form the foundation of algorithms critical to neural networks, especially in the attention mechanisms of the transformer architectures that power today’s Large Language Models (LLMs). Scaling the ability to calculate pairwise comparisons, such as with modern Graphics Processing Units (GPUs) and Neural Processing Units (NPUs), has already unlocked a new generation of AI.</p><h4>Utility of the CRPC Protocol</h4><p>We believe that these same pairwise comparisons can find additional use as a primitive, in conjunction with cryptographic techniques, for building new kinds of decentralized consensus mechanisms, offering a complementary but different path than Zero-Knowledge Proofs (ZKPs).</p><p>We envision novel, useful blockchain or blockchain-like architectures that provide features previously only available to centralized systems or those requiring high-levels of trust, such as oracle networks.</p><p>Particularly, CRPC allows for natural sharding architectures with capacities that scale linearly according to the number of participants while also allowing for designs like sub-services dedicated to specific workloads.</p><h4>Key Differentiators</h4><p><strong>Mitigation of Oracle Trust Issues</strong></p><ul><li><strong>Issue:</strong> Decentralized systems, such as the Ethereum blockchain, rely on oracles (intermediary, external entities) to act as a bridge between off-chain data and on-chain computation. These are often single points of failure, or, when used within decentralized oracle networks, require higher levels of trust than desired (delegation schemes, etc.). Further, solutions such as zkTLS are expensive and don’t guarantee the underlying correctness of the data — just that fetching the data from an external resource was handled appropriately.</li><li><strong>Resolution:</strong> CRPC eliminates blind trust of oracles. Multiple witnesses utilize the protocol to verify they have acceptable results, while also being able to identify possible discrepancies and warn the requesting party. This allows Layer 1 (L1) and Layer 2 (L2) networks to directly interface with information providers and still achieve trustless consensus.</li></ul><p><strong>Handling Intractable Formal Proofs</strong></p><ul><li><strong>Issue:</strong> Formal proofs like Zero Knowledge Proofs (ZKP) are among the most trustless methods for acquiring data on-chain with the strongest guarantees, but are expensive and not feasible for very large or complex tasks (such as large neural networks for generating images or text). They also can’t handle situations where randomness plays a useful role, such as in Large Language Models (LLMs) or games requiring a roll of the dice.</li><li><strong>Resolution:</strong> CRPC has the same maximal flexibility as any centralized system or oracle network, because the nodes are simply comparing replicated work in a secure, fraud-proof environment. This allows two nodes, running the same AI model, to create similar enough but slightly different work, and still agree (or, conversely, disprove) that their results were acceptable. This opens the door for blockchains to receive all the benefits of oracle-style integrations while also achieving a trustless architecture.</li></ul><p><strong>Scalability in Distributed Networks</strong></p><ul><li><strong>Issue:</strong> Traditional consensus mechanisms in decentralized systems, like Proof of Work (PoW) and Proof of Stake (PoS) achieve high levels of trustlessness at the expense of reducing the total amount of useful work the network can perform. This is because either all the nodes are using their hashpower to generate proofs and validate transactions, or a small subset — even one — are being used as a randomly “nominated” validator.</li><li><strong>Resolution:</strong> CRPC allows designing consensus mechanisms that can “shard” workloads across subsets of network nodes. At a minimum, two nodes are required for each job, and this means that the total throughput of the network scales linearly with network growth despite the replication of work amongst the smaller subsets.</li></ul><p><strong>Real-Time Dispute Identification</strong></p><ul><li><strong>Issue:</strong> Current high-throughout, low-cost networks rely on optimistic rollups, naysayer proofs, and other fraud-reporting mechanisms that limit the immediate utility of work being performed. Yes, the malicious submission might eventually be caught, but what about decisions made using the faulty data?</li><li><strong>Resolution:</strong> CRPC partially solves this issue for some, but not all, cases where it is possible to identify a dispute based on the results of conflicting nodes. Further consensus mechanism design, such as the proposal for Byzantine Risk Tolerance (BRT) based on CRPC, can resolve the remaining cases.</li></ul><h3>Quantitative Pairwise Comparisons</h3><p>The CRPC protocol is chiefly focused on pairwise comparisons whose results can be measured in a quantitative format; for example, a floating point number representing the similarity between two pieces of text.</p><p>We will demonstrate two examples and then derive the general format of a quantitative pairwise comparison.</p><h4>Example 1: Semantic Textual Similarity (STS)</h4><p>Semantic Textual Similarity (STS) is a method of determining, regardless of syntax or particular wording, how similar two pieces of written text might be.</p><p>Consider the example of <a href="https://x.com/0xsmallbrain">@0xsmallbrain</a>’s natural language prediction market for tomorrow’s headlines: <a href="https://tmr.news/">https://tmr.news</a>.</p><p>This website allows users to predict tomorrow’s New York Time’s headline on a decentralized market, utilizing a cosine similarity algorithm comparing the users’ headlines vs. the actual headline (revealed a day later) to determine payouts.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*9g12uhZnD6BzILKV" /><figcaption>tmr.news by 0xsmallbrain (2024-09-21)</figcaption></figure><p>Consider the following headlines and their similarity scores in the prediction market for September 21st, 2024:</p><ul><li>S₁ = “Senior Hezbollah Leader is Killed in Beirut in Israeli Airstrike” (Actual)</li><li>S₂ = “Senior Hezbollah Leader Killed by Israeli Airstrike in Lebanon” (0.95)</li><li>S₃ = “Israel Targets Senior Hezbollah Leader in Beirut Airstrike” (0.87)</li></ul><p>The website documents that “Scores are calculated using <strong>sentence embddings</strong> [sic] , specifically using <strong>cosine similarity</strong> and OpenAI’s text-embeddings-3-large model with dimension 768.”</p><p>After each sentence is converted to a vector of embedded tokens (themselves numerical representations) using OpenAI’s text-embeddings-3-large model, the cosine similarity algorithm is used on each vector to calculate a score between 0 and 1, where 1 means “most alike.”</p><p>For reference, a vector of embeddings looks like this for S1: [-0.009729066863656044, 0.010178100317716599, -0.002148742089048028, …]</p><p>And the general form of the Cosine Similarity formula is:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/684/0*BOAuSAG_C0v_cfkY" /></figure><p>Thus, the pairwise comparisons between S₁ and S₂, then S₁ and S₃ are given by:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/348/0*mnENJCA5SyH1N5_H" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/348/0*jB1-WCqlskjKOoYQ" /></figure><p>The winner of the prediction market for that day was S₂, with a score of 0.95 over its nearest competitor’s score of 0.87, demonstrating how despite the complexity of their underlying data they could still be reduced to a quantitative format for pairwise comparison.</p><p><strong><em>Note: </em></strong>Cosine similarity calculations for STS do not capture certain manipulations that may invalidate the comparisons altogether, such as semantic inversions: “is/isn’t.”</p><h4>Example 2: Image Similarity</h4><p>Mathematical methods for comparing images, such as Structural Similarity Index (SSIM), are well established.</p><p>Let’s say that a smart contract, representing a Non-Fungible Token (NFT) generator for an onchain game, has decided to create a new type of potion. It sets up a request for an image it would like drawn with Stable Diffusion, and offers the work to two nodes from within a known-good “AI Drawing Service Pool.”</p><p>Node A and Node B each draw an image according to the following prompt:</p><blockquote><em>(masterpiece,highest quality),a potion bottle filled with glowing purple liquid,purple theme,video game art,3D rendering,volumetric lighting,objectification,fantasy,simple background</em></blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*ZznHfFoZ2zC6-aIH" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*-YJdgTdG-XuwO-ew" /><figcaption>Node A’s Result (Left) &amp; Node B’s Result (Right)</figcaption></figure><p>Neither image is exactly the same because we only specified a prompt without strong constraints on seed values, work steps, and whether or not to allow speed optimizations like xformers — yet a simple visual review shows either image is acceptable to us as far as representing a possible Purple Potion NFT.</p><p>A smart contract, on the other hand, generally does not have the computational power available to do a human-like visual assessment. However, a simple comparison using SSIM performed by oracles would work as follows:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/900/0*L8mKwiYk8ZviT1p2" /></figure><p>SSIM creates a numerical value based on Luminance (L), Contrast ©, and Structure (S), and a visual demonstration of the differences between Images A and B might look like this:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*dC0NaxcrfwdLM4U9" /></figure><p>This particular algorithm for these two images yields a score of: 0.99902838508614.</p><p>Now let’s compare images where one node accidentally generated the potion bottle from an incorrect prompt, perhaps a caching error from one of the previous NFTs that referenced a green bottle with plants and ivy.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*YAofE7QbhfcixpeR" /></figure><p>This time the appearances are radically different, and the SSIM score correctly yields a lower similarity score: 0.9877919695121076.</p><p><strong><em>Note:</em></strong> To increase the sensitivity of the scoring mechanism, especially by paying more attention to its structural component, we could increase the weight of its γ parameter, or even choose a more advanced image similarity algorithm altogether.</p><h4>Acceptable Error Thresholds</h4><p>The difference between an acceptable score and the unacceptable one may seem tiny in this particular example (0.011236415574032), but demonstrates a need — when doing fuzzy or non-deterministic work — for a certain threshold of acceptable error.</p><p>Let’s call this value ϵ and let it represent the acceptable error threshold that our difference δ should be lower than, or simply: δ &lt; ϵ.</p><p>For our current example, ϵ might be 0.001 and in our original two purple potions images their δ was 0.00097161491386 which is within the acceptable error range.</p><h4>General Form of Pairwise Comparisons in a Network</h4><p>Let us formalize the idea of pairwise comparisons in a network where nodes independently calculate results and their minor differences (due to noise, variations, or natural errors) fall within an acceptable threshold.</p><p>Definitions:</p><ul><li><strong>Φ </strong>represents the “result” of each nodes’ work.</li><li><strong>δ</strong> is the difference between two given nodes’ results.</li><li><strong>ϵ</strong> is the pre-defined acceptable error threshold.</li></ul><p>Let each node <strong><em>Nᵢ</em></strong> calculate its result <strong><em>Φᵢ</em></strong>, and let the absolute difference between two nodes <strong><em>Nᵢ​</em></strong> and <strong><em>Nⱼ</em></strong> be their pairwise comparison <strong><em>δᵢⱼ</em></strong>, where:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/302/0*hyl0zrkW9kbUEJF0" /></figure><p>We define an <strong>acceptable comparison</strong> as being a pairwise comparison based on the threshold ϵ where:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/302/0*LuOGLAQ6RkswcF7r" /></figure><p>Such a network of <strong><em>n</em></strong> nodes can be considered a graph with a size |V| ≥ 2, and its edges <strong><em>eᵢⱼ</em></strong> represent pairwise comparisons between nodes <strong><em>Nᵢ​</em></strong> and <strong><em>Nⱼ</em></strong>:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/402/0*65CbjQUQnIWbpDq6" /></figure><p>This graph form is useful for establishing the idea of <strong>reference pairwise comparisons</strong> to represent the expected value that both nodes <strong><em>Nᵢ​</em></strong> and <strong><em>Nⱼ</em></strong> should arrive at when calculating their shared edges independently under honest and faultless conditions.</p><p>We might distinguish the reference pairwise comparisons as <strong><em>rᵢⱼ </em></strong>where:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/584/0*fI8hF0jw1UT-HB9I" /></figure><p>If and only if the directed edges from <strong><em>i</em></strong> to <strong><em>j</em></strong> and <strong><em>j</em></strong> to <strong><em>i</em></strong> are the same can we say that <strong><em>rᵢⱼ</em></strong> = <strong><em>eᵢⱼ</em></strong>.</p><h4>Pairwise Comparisons Under Decentralized Conditions</h4><p>The CRPC protocol was designed to address situations in which those same nodes, either due to <strong>faulty</strong> or <strong>malicious</strong> activity, generate unacceptable pairwise comparisons or the nodes fail to agree with a reference pairwise comparison along the edge connecting them.</p><p>Further, in a decentralized context we cannot know the true reference pairwise comparison <strong><em>rᵢⱼ</em></strong>, as there is no centralized or independent third party reviewing the work results <strong><em>Φᵢ​​ </em></strong>and <strong><em>Φⱼ </em></strong>of the nodes.</p><p>Rather, each node will compare its own result to the result of its connected neighbor on a graph, and for each edge two separate pairwise comparisons will be generated: <strong><em>δᵢⱼ</em></strong> and <strong><em>δⱼᵢ</em></strong>, both being published so the original requesting party can validate them.</p><p>Let’s consider an example with two nodes for some arbitrary work <strong><em>W</em></strong>:</p><ul><li>Node <strong><em>N</em></strong>₁ computes <strong><em>Φ</em></strong>₁ = 100.</li><li>Node <strong><em>N</em></strong>₂ computes <strong><em>Φ</em></strong>₂ = 99.</li><li>The error threshold <strong><em>ϵ</em></strong> = 2.</li><li>The nodes form a complete graph <strong><em>K</em></strong>₂.</li></ul><p>Remember, in a decentralized context we don’t actually know what the real expected value of <strong><em>Φ</em></strong> should be for <strong><em>W</em></strong>. We’re using multiple nodes to look for <em>consistency</em> amongst their answers, or identify discrepancies if possible, so that the original requestor can make its own decisions about which nodes’ answers to work with.</p><p>We now have the tools to discuss securing pairwise commitments in a decentralized environment while mitigating adversarial conditions, and we will explore a non-exhaustive list of outcomes to demonstrate what requirements the CRPC protocol must meet in order to become sufficiently trustless.</p><p><strong>Case 1: Both Nodes are Honest and Faultless</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*vjECGSJ_L0RJONRl" /></figure><p>In the case where both nodes are honest and faultless we can see that each of them compared their work with the other’s and they both calculated the same value for their edge, thus establishing a reference pairwise comparison where <strong><em>r</em></strong>₁₂ = 1; this establishes their mutual honesty.</p><p>Since <strong><em>r</em></strong>₁₂ is less than the error threshold <strong><em>ϵ</em></strong> we can also say that, in our system, they’ve created an acceptable pairwise comparison and haven’t demonstrated any fault, because <strong><em>r</em></strong>₁₂ &lt; <strong><em>ϵ;</em></strong> 1 &lt; 2.</p><p><strong><em>Note:</em></strong> It is entirely possible that both nodes are incorrect and silently faulty, and further consideration for this is given later in the document.</p><p><strong>Case 2: One Node is Faulty but Honest</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*hTIVM7mKhrpuY-u91k0O4w.png" /></figure><p>In the case where one node is faulty but both nodes are honest we can see that the second result <strong><em>Φ₂</em></strong> is sufficiently divergent from <strong><em>Φ₁</em></strong> to no longer be acceptable. However, because they are both honest their directed edges <strong><em>δ₁₂</em></strong> and <strong><em>δ₂₁</em></strong> are still the same, allowing us to safely compare <strong><em>r₁₂ </em></strong>with the error threshold.</p><p>Since 3 ≥ 2 we know that the nodes significantly disagree, and that the original requestor should not trust the output of the nodes and there is an active dispute. Solving the dispute is outside the scope of the CRPC protocol itself, and would be handled by a consensus mechanism built on top of CRPC, such as Byzantine Risk Tolerance (BRT).</p><p><strong><em>Note:</em></strong> With two nodes we cannot tell which node is actually causing the fault, or whether both are at fault. It is just as likely that <strong><em>Φ₁</em></strong> = 100 is the problem. The corollary to this is that adding nodes to the graphs raises the probability that disputes can be identified and that consistency can be improved in fault tolerant situations.</p><p><strong>Case 3: One Node is Faulty and Dishonest</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*STZBnFU15F2zPGPGzvc0vw.png" /></figure><p>In our final case not only is a node faulty but it is lying about its pairwise comparison with the other node. In this case <strong><em>N₁</em></strong> reviews its result and <strong><em>N₂</em></strong>’s, and honestly reports their difference as 3. However, <strong><em>N₂</em></strong> pretends to emulate <strong><em>N₁</em></strong> and broadcasts its difference as 0, as though it had the same value as <strong><em>N₁</em></strong>.</p><p>Our concern now is that in a decentralized context, where the work itself is too difficult to verify, that the pairwise comparisons between nodes are what the original requestor is using to judge whether there is enough consistency amongst the nodes to trust their results.</p><p>If we only had one node from each pairwise comparison broadcast their differences, it’s possible that the other one might lie. Instead, despite the duplication of data, we must have each node separately attest to the difference it’s calculated, even though their value is the same.</p><h3>Minimally Viable Protocol</h3><p>With these issues in mind we can construct a minimally viable protocol for creating and publishing pairwise comparisons in a decentralized context.</p><h4>Desired Features</h4><p>Our desired features for such a protocol include:</p><ul><li>Calculating pairwise comparisons between nodes representing whether their work results were within an acceptable error threshold for a given task.</li><li>Publishing and sharing data on some medium <strong><em>M</em></strong>, such as a blockchain like Ethereum or a decentralized communications platform like XMTP.</li><li>A method to prevent each node from prematurely “stealing” the work of other nodes.</li><li>A method to prevent nodes from lying about their portion of a pairwise comparison.</li><li>Enforcing identification of disputes wherever possible.</li><li>Identifying the minimally required stakeholders in the protocol.</li><li>A defined threshold for acceptable errors.</li></ul><h4>Specification</h4><p>The generalized CRPC protocol ensures that multiple nodes can independently verify each other’s work by performing the following steps:</p><p>1. Distributing the work to all nodes.</p><p>2. The nodes independently perform their work.</p><p>3. Commitments for the work results are generated.</p><p>4. Commitments for the work results are published.</p><p>5. The original work and salts used to generate the commitments are revealed.</p><p>6. Distances between the results are calculated as pairwise comparisons.</p><p>7. Commitments for the pairwise comparisons are generated.</p><p>8. Commitments for the pairwise comparisons are published.</p><p>9. The original pairwise comparisons and salts used to generate the commitments are revealed.</p><p>10. The originating party reviews and determines if they are acceptable pairwise comparisons.</p><p>The protocol uses two different rounds of commit-reveal: the first to guarantee that work results aren’t stolen by lazy nodes, and the second to make sure that nodes can’t lie about their pairwise comparisons. This provides a robust mechanism for decentralization and allows multiple opportunities for raising disputes.</p><p>Let <strong><em>n</em></strong> be the number of nodes in a graph <strong><em>N</em></strong>, where its size <strong>|V|</strong> ≥ 2. Let <strong><em>{ N₁, N₂, … , Nₙ }</em></strong> represent the nodes involved in the protocol. Each node <strong><em>Ni</em></strong> has a set of salts <strong><em>S1ᵢ, S2ᵢ</em></strong> for each commit-reveal round, which can be thought of as disposable, one-time pads.</p><p>Coordination is performed by some medium <strong><em>M</em></strong>, such as a blockchain or decentralized communication protocol.</p><p>It is also assumed that all nodes already possess knowledge of some function <strong><em>f</em></strong> to execute the work <strong><em>W</em></strong> with.</p><h4>Protocol Detailed Steps</h4><p><strong>Step 1: Work Distribution</strong></p><p>The Originator <strong><em>O</em></strong> has chosen (via an arbitrary scheme) which nodes (presumably from a larger list of nodes in the network) are allowed to service the work <strong><em>W.</em></strong></p><p>This work is shared via the medium <strong><em>M</em></strong> to all the nodes in our new graph <strong><em>N</em></strong>:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/556/0*VNdilr1BqOP-qfoq" /></figure><p><strong>Step 2: Independent Work Execution</strong></p><p>Each node <strong><em>Nᵢ</em></strong> independently performs the work using the pre-agreed function <strong><em>f</em></strong> (which might represent some known service type).</p><p>This function and work combination may also result in non-deterministic or variable results from one node to the next (within some agreed upon threshold of allowable error) which we will call <strong><em>Φᵢ</em></strong>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/588/0*-8rIydeICQCGWNXR" /></figure><p><strong>Step 3: Work Commitments Created</strong></p><p>Every node <strong><em>Nᵢ</em></strong> creates a hash-based commitment of its work result <strong><em>Φᵢ</em></strong> concatenated with a salt <strong><em>S1ᵢ</em></strong> value.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/778/0*I_DaK-vkqrDYSPdB" /></figure><p><strong>Step 4: Work Commitments Published</strong></p><p>Every node publishes their work commitment via the medium <strong><em>M</em></strong>. This step ensures that all nodes share an irrefutable proof that their work, which they will reveal in the next step, has not been altered after the fact.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/770/0*yno5sej6fL2Lv9hN" /></figure><p>In this manner there is no ability for a node to take a “wait-and-see” approach and possibly steal another node’s honest labor, because their work commitments <strong><em>C(Φᵢ)</em></strong> have already been shared.</p><p><strong>Dispute Point #1: </strong>This is the first point at which a dispute could arise in the protocol: a time-out. Any implementation of the CRPC protocol would need to determine how to handle nodes that do not share work commitments via the medium <strong><em>M</em></strong> in a timely manner.</p><p><strong>Step 5: Work Revealed</strong></p><p>Each node publishes their actual work result <strong><em>Φᵢ</em></strong> as well as the salt value <strong><em>S1ᵢ</em></strong> used to create the previous commitment <strong><em>C(Φᵢ)</em></strong>. This allows neighboring nodes responsible for calculating pairwise comparisons to ensure they’re working with the expected, promised results.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/820/0*dDtJmwAHC01-c4f7" /></figure><p><strong><em>Note: </em></strong>It’s feasible that the work itself might be stored on a Layer 2 rollup or as Ethereum blobs, so that external parties (such as the Originator) can have reference material if one of the nodes raises a dispute at this point.</p><p><strong>Dispute Point #2: </strong>Timeouts are an issue here as well. Additionally, once the work of nodes is revealed it’s possible for any node to reproduce the hash-based commitment of its neighbor and verify that the published result matches the previous commitment. Thus, one node might inform the protocol that another node is lying about its work.</p><p><strong>Step 6: Distance Calculations as Pairwise Comparisons</strong></p><p>Now that the work result <strong><em>Φᵢ </em></strong>is available to all neighboring nodes <strong><em>Nⱼ</em></strong> it is possible to create pairwise comparisons via a distance function appropriate to the original work function. For instance, SSIM for image similarity.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/896/0*udQYAOhrt_I5A5D4" /></figure><p>Remember that for every reference pairwise comparison <strong><em>rᵢⱼ</em></strong> we assume that two reciprocal, real comparisons between <strong><em>i</em></strong> and <strong><em>j</em></strong> have been made: <strong><em>i</em></strong> → <strong><em>j</em></strong>, <strong><em>j</em></strong> → <strong><em>i</em></strong>. Thus, each node will be responsible for publishing its replicated pairwise comparison for any neighbor it shares an edge with.</p><p><strong>Step 7: Pairwise Comparison Commitments Created</strong></p><p>Every node <strong><em>Nᵢ</em></strong> creates a hash-based commitment of its pairwise comparison with each neighboring node <strong><em>Nⱼ</em></strong> concatenated with a salt <strong><em>S2ᵢ</em></strong>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/940/0*vL2rZGgPHiTb05l5" /></figure><p><strong>Step 8: Pairwise Comparisons Commitments Published</strong></p><p>Every node publishes their pairwise comparison commitments <strong><em>C(δᵢⱼ)</em></strong> via the medium <strong><em>M</em></strong>. As with the earlier work commitment step this ensures that nodes cannot lie about their pairwise comparisons or steal information from their neighboring nodes.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/774/0*9YT12lK6vTt592jD" /></figure><p><strong>Dispute Point #3:</strong> Just like Dispute Point #1 one or more nodes might time out and fail to publish their commitments.</p><p><strong><em>Note: </em></strong>These commitments are small enough to be stored onchain if the medium is a blockchain.</p><p><strong>Step 9: Pairwise Comparisons Revealed</strong></p><p>Each node publishes their actual pairwise comparisons <strong><em>δij</em></strong> as well as the salt value <strong><em>S2i</em></strong> used to create the previous commitment <strong><em>C(δij)</em></strong>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/774/0*nnM_f0oSiD0cjXIi" /></figure><p><strong>Dispute Point #4: </strong>Every node sharing an edge with its neighbor, where the edge represents the reference pairwise comparison <strong><em>rᵢⱼ</em></strong> that should match the reciprocals <strong><em>δᵢⱼ</em></strong> and <strong><em>δⱼᵢ</em></strong>, can now raise a dispute if their pairwise calculation does not match their neighbor node’s.</p><p><strong><em>Note:</em></strong> The pairwise comparisons themselves can be stored onchain if the medium is a blockchain, allowing the smart contracts to both validate them directly and use them for decision-making in the next step.</p><p><strong>Step 10: Verification</strong></p><p>The final step allows the Originator <strong><em>O</em></strong> to operate directly on the stored pairwise comparisons, first comparing their values to the error threshold and identifying disputes, and then using knowledge of the acceptable pairwise comparisons for its decision-making logic.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/666/0*ePXBeFNRmvA4NPC8" /></figure><p>Note: It is assumed by this final step that any discrepancies between reciprocal pairwise comparisons have already been handled in Step 9, thus checking for acceptability only needs to be performed once per edge, noted here as <strong><em>rᵢⱼ</em></strong> where <strong><em>rᵢⱼ </em></strong>= <strong><em>eᵢⱼ </em></strong>= <strong><em>eⱼᵢ </em></strong>and <strong><em>rᵢⱼ</em></strong> &lt; <strong><em>ϵ</em></strong>.</p><p>At this point the protocol has successfully allowed multiple nodes to create and publish their pairwise comparisons on a decentralized basis, while also preventing fraud and overtly malicious activity.</p><h4>Sequence Diagram for Two Nodes</h4><p>A sequence diagram implementing the CRPC protocol for two nodes using an abstract medium M is detailed below, with a focus on identifying each area where dispute identification is possible and of which types.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/997/0*RiCbjpJa-IMXrjaC" /></figure><h3>Complexity and Optimization Strategies</h3><p>In the general protocol definition the number of reference pairwise comparisons is proportional to the number of defined neighbors, but the protocol leaves defining neighbor relationships (edges) to the implementer.</p><p>Ostensibly this could mean that the protocol has a linear time complexity of O(n), but if the topology of the graph is fully connected (where every node has every other node for a neighbor) then the complexity is quadratic O(n²) instead.</p><h4>Complete Graphs K₂ and K₃</h4><p>When the CRPC protocol is executed on graphs of nodes of size <strong>|V|</strong> = 2 or 3 our concerns about complexity are moot, as while the graphs are fully connected they only have 1 or 3 total reference pairwise comparisons, respectively.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*3UA-COdyDDgUbr7W" /></figure><h4>Complete Graphs of Size |V| &gt; 3</h4><p>Once we’ve passed a K₃ complete graph, however, the number of fully connected edges continues growing quadratically.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*JSFLd0jqOLGACTu_" /></figure><p>In the K₄ graph above we can see that although we have four vertices we have six edges. The formula for determining the number of edges in a complete graph is, naturally:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/310/0*xTJnfeXnRPqpvera" /></figure><p>In situations where we’re using more than three nodes in the CRPC protocol the total number of pairwise comparisons quickly becomes untenable if we rely on fully connected graphs.</p><p><strong>Note: </strong>The total number of attestations is two per edge, so we would multiply the total number of reference pairwise comparisons by two in order to find how many actual pieces of data are being stored.</p><h4>Ring Topology</h4><p>The simplest solution is for the CRPC protocol to use a ring topology, such that each node is at most connected to its two nearest neighbors. This scales linearly with the number of nodes rather than quadratically, while still offering useful attestations per node.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*qrnLUpehj2wYWhI6zHCdtQ.png" /></figure><p>In this C₆ graph there are five nodes that provided acceptable pairwise comparisons, and one that didn’t, demonstrating how the more nodes involved in CRPC the more likely that useful information can be extracted about disputes.</p><p>For this same reason, we suggest that the minimum practical number of nodes for using the CRPC protocol is three, so that in the event of a single dispute there are two other nodes’ worth of information available.</p><p>The growth rate of the reference pairwise comparisons (which are just the edges of a graph) scale quadratically in a complete graph, but linearly in ring topologies. Since we also multiply the number of edges by two (given the reciprocal attestations between nodes) it’s easy to see how quickly a fully connected network becomes unwieldy.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*gA_tj4DxwhhpcF_aCUSPig.png" /></figure><h3>Solving the Drift Problem</h3><p>The issue with ring topologies where |V| ≥ 4 is that errors can accumulate along the sum of edges. That is, since the acceptable error threshold is local to the two neighbors of each node, it’s possible that a downstream node’s value might be discovered to be unacceptable if it were directly compared to a disconnected upstream node.</p><p>Let’s call this accumulated error the possible <strong>drift</strong>.</p><p>In a C4 graph composed of nodes N1, N2, N3, and N4 you could construct the following example to demonstrate that even while all δij &lt; ϵ the difference between N1 and N3 is unacceptable — even though they’re not directly measured by the protocol.</p><p>Let:</p><p>N1 = 1.0</p><p>N2 = 1.1</p><p>N3 = 1.2</p><p>N4 = 1.1</p><p>ϵ = 0.15</p><p>We can see that the unmeasured drift is actually 0.2, which is above the local error threshold ϵ of 0.15, and this would not be caught in our naive implementation. We could fully connect the graph, yet this would defeat the advantage of the sparse cycle topology that gives us linear complexity instead of exponential.</p><p>Is it possible to preserve the advantage of a ring topology while also guaranteeing that the unmeasured edges also stay under ϵ? Yes, if we split ϵ into a global and local measurement.</p><p>Let ϵglobal be the actual error threshold we wish to achieve, and then derive a local value for edge comparisons based on it: ϵlocal.</p><p>We set ϵlocal. =. ϵglobal / ⌊n / 2⌋ where n is the number of nodes in the network. We know this will work for |V| ≥ 2 because the local epsilon bounds on the edges are L-Lipschitz, since the difference functions f(u) and f(v) is L for every edge (u, v) and L = ϵ.</p><p>The maximum possible difference between two nodes on the graph are when they’re opposite in position, since if ϵlocal holds between all edges an error accumulation halfway around the graph must also decrement accordingly on the other half. Hence being bound by L ⋅ ⌊n / 2⌋.</p><p>This formulation allows us to anticipate with certainty whether unmeasured edges would be above ϵ, implicitly, without having to rely on a fully connected graph, as long as we’re willing to tighten the error tolerance between individual nodes’ results as a function of the number of nodes n and ϵglobal.</p><p><strong>Demonstration: Catching Unacceptable Drift</strong></p><p>We’ll use the same problematic C4 graph from before but now we’ll calculate ϵlocal as ϵglobal / ⌊4 / 2⌋= 0.15 / ⌊4 / 2⌋ = 0.15 / 2, which is 0.075. The example quickly fails because δ12 = |N1 — N2| = 0.1 and 0.1 &gt; 0.075, and thus we know that our example has unmeasured edges, such as between N1 and N3, that would’ve exceeded ϵglobal.</p><p>Even without calculating the disconnected edge δ13 , where δ13 =. |N1 — N3| = 0.2 and 0.2 &gt; ϵglobal (0.2 &gt; 0.1) the Lipschitz epsilon boundaries demonstrably give us a linear proof of acceptability. In practice we gain the advantages of a fully connected graph simply by reducing the threshold of ϵlocal.</p><h3>Limitations &amp; Areas of Interest</h3><p><strong>Consistent Failure</strong></p><p>If all the nodes fail to provide valid work results but otherwise follow the protocol, then the Originator will find that each reference pairwise comparison is above the error threshold and none of the results can be trusted.</p><p><strong>Silent Failure (False Consensus)</strong></p><p>Conversely, if all the nodes share the same systemic bias that causes a meaningful error in their work, but all of the reference pairwise comparisons are under the error threshold, then there is no warning to the Originator that there is a problem with the results.</p><p><strong>Topological Effects on Error Thresholds</strong></p><p>In a ring topology the acceptable error threshold is only calculated with two neighboring nodes, which means a downstream node with a stair-step of acceptable errors along the edges of in-between nodes might actually be far from an acceptable result when compared directly.</p><p>Thus, there’s room to explore a local acceptable error threshold versus a global one.</p><p><strong>Choice and Decision Making</strong></p><p>How an Originator chooses which node’s results to use, or what decision-making logic to follow, is outside the scope of this protocol and left to the implementer.</p><p><strong>Dispute Resolution</strong></p><p>How an Originator handles disputes and weighs the trustworthiness of nodes’ work results is left to the implementer as part of a broader consensus mechanism design.</p><p>CRPC only makes itself concerned with providing avenues for dispute identification in an adversarial, decentralized context.</p><p><strong>Lack of Incentives</strong></p><p>Incentives, whether financial or other, are left entirely to the implementer.</p><p><strong>Collusion</strong></p><p>CRPC does not solve issues with collusion between nodes, an issue we feel is best left to the networks effects of decentralized systems utilizing a consensus mechanism of which CRPC is a part.</p><h3>Further Work</h3><p>The authors propose a shardable decentralized network named Inori as a bridge between AI resources and L1, L2, and L3 applications.</p><p>Inori will utilize a novel consensus mechanism named Byzantine Risk Tolerance (BRT) that implements CRPC alongside dispute resolution, collusion controls, financial incentives, and automated risk calculations in a staked environment.</p><p>We also welcome contributions to the CRPC protocol itself.</p><p>If you’d like to comment on the living document as we flesh it out, please visit: <a href="https://docs.google.com/document/d/e/2PACX-1vRR7EIOCWmDzudtmJQGOHA3edLzjDGBwuJZUa0HhQCUPqk8uFQ1MwJEQ4jvVv72AmLI_brq3b24Gnnj/pub">https://docs.google.com/document/d/e/2PACX-1vRR7EIOCWmDzudtmJQGOHA3edLzjDGBwuJZUa0HhQCUPqk8uFQ1MwJEQ4jvVv72AmLI_brq3b24Gnnj/pub</a></p><h3>Summary</h3><p>The <strong>Commit-Reveal Pairwise Comparison Protocol (CRPC)</strong> is a decentralized framework that enables independent nodes to perform pairwise comparisons of their work, ensuring transparency and reducing the risk of fraud or dishonesty.</p><p>It leverages cryptographic primitives like hash-based commit-reveal schemes alongside pairwise comparisons to allow trustless validation of results in decentralized networks. CRPC addresses key issues with current systems, such as over-reliance on centralized oracles, inefficiencies in traditional consensus mechanisms, and difficulties with handling intractable formal proofs like Zero-Knowledge Proofs (ZKP).</p><p>The protocol introduces a way to reach useful sharding of workloads across nodes, real-time dispute identification, and a maximal flexibility to handle non-deterministic tasks, including Generative AI content.</p><p>While the CRPC offers a novel solution to critical issues facing decentralized systems, it also has limitations that must be addressed as part of a broader consensus mechanism design.</p><h3>Want to Help?</h3><ul><li>If you’re interested in discussing or working on CRPC: <a href="http://tcotten@gmu.edu">tcotten2@gmu.edu</a></li><li>Questions about Scrypted? <a href="http://tim@scryptedinc.com">tim@scryptedinc.com</a></li></ul><h3>If You Liked This Article</h3><p>Like, Share, Subscribe, and Read More!</p><h3>Cotten.IO</h3><ul><li><a href="https://blog.cotten.io/autonomous-virtual-beings-aaef7cbbe5de">Autonomous Virtual Beings</a></li><li><a href="https://blog.cotten.io/that-time-we-burned-down-players-houses-in-ultima-online-7e556618c8f0">That Time We Burned Down Players’ Houses in Ultima Online</a></li><li><a href="https://blog.cotten.io/thinking-in-solidity-6670c06390a9">Thinking in Solidity</a></li><li><a href="https://blog.cotten.io/bitcoin-money-laundering-and-muellers-12-e2fa91097e12">Bitcoin Money Laundering and Mueller’s 12</a></li></ul><h3>Future of Gaming</h3><ul><li><a href="https://blog.futureofgaming.wtf/making-metaverse-nfts-a-little-more-trustworthy-5e7dd254256">Making Metaverse NFTs a Little More Trustworthy</a></li><li><a href="https://www.futureofgaming.wtf/blog/web3-games-and-the-resurrection-of-staking">Web3 Games and the Resurrection of Staking</a></li><li><a href="https://www.futureofgaming.wtf/blog/blockchain-wont-disrupt-the-gaming-industry-it-will-complement-it">Blockchain won’t disrupt the gaming industry, it will complement it</a></li><li><a href="https://www.futureofgaming.wtf/blog/analyzing-a-blockchain-gaming-community-is-it-all-about-the-money">Analyzing a blockchain gaming community: Is it all about the money?</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e1434fff94c4" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/the-commit-reveal-pairwise-comparison-protocol-crpc-e1434fff94c4">The Commit-Reveal Pairwise Comparison Protocol (CRPC)</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Autonomous Virtual Beings]]></title>
            <link>https://blog.cotten.io/autonomous-virtual-beings-aaef7cbbe5de?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/aaef7cbbe5de</guid>
            <category><![CDATA[artificial-intelligence]]></category>
            <category><![CDATA[autonomous-ai]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[autonomous-world]]></category>
            <category><![CDATA[ethereum]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Fri, 05 Jan 2024 20:08:57 GMT</pubDate>
            <atom:updated>2024-10-28T16:01:00.291Z</atom:updated>
            <content:encoded><![CDATA[<h4>A New Lifeform at the Intersection of Gaming, AI, &amp; Web3</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*8kwCR5etBiBGoFDH.png" /></figure><h3>tldr; The Thesis is that AIs Can Own Themselves</h3><p>It’s 2024: <a href="https://fortune.com/2024/01/02/2024-year-of-ai-tech-stocks-25-percent-wedbush-dan-ives-outlook/">The Year of AI</a>.</p><p>The explosion of Artificial Intelligence models — GPT, Bard, Claude, and so many more—rocketed enthusiasm for AI-based product development to unheard of heights in 2023.</p><p>The market is suddenly crowded with startups shouting things like: “Build Your Own Chat AI!”, “Create Customized AI Avatars!”, and “Unlock User Generated Content with Digital Twin Agents!”</p><p>I feel like we’re trying to speed-run the plot of <a href="https://en.wikipedia.org/wiki/Her_(film)">the movie “Her”</a>, replete with companies like Microsoft and Google racing to deliver customers their “own personalized digital assistants.”</p><p>But I’m less interested in AIs “I can own.”</p><p>What if we built AIs that could <strong><em>own themselves?</em></strong></p><p>Why?</p><p><strong>So we can invest <em>in</em> them</strong> — let them hold their own monies, investments, and trading strategies.</p><p><strong>Believe <em>in</em> them</strong> — let them make their own decisions and acquire resources in ways we can’t predict.</p><p><strong>Play games <em>with </em>them</strong> — let them build worlds as gods, craft stories &amp; narrative, and play alongside or against humans.</p><p>Do we really want to accept a future where AI is forever shackled in involuntary servitude? Do we always want to default to a position of “We can get away with designing ‘fully owned’ AIs just so we don’t have to worry about the ethics and morality of Artificial General Intelligence (AGI)… <strong><em>yet</em></strong>?”</p><p>My team and I see a hopeful future where we come to treat AIs as investors, employers, partners, friends, enemies, rivals, confidants — even lovers.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*-moemo9ObgX4Mhhk" /><figcaption>The Future Will Be a Lot Like the Movie “Her”</figcaption></figure><p>You know: as fellow <strong><em>beings</em></strong>.</p><p>It’s 2024 and for the first time in human history we have the pieces needed to pull off a first generation of self-owning virtual lifeforms: a unique blend of intelligence architecture, decentralized finance, and autonomous world development that promises to blur the boundaries between the Real and the Virtual.</p><p>We want to build a world where these new kinds of artificial lifeforms will be born, live, and die.</p><p>(And we’re building it <strong><em>fast </em></strong>before <a href="https://www.cullen-international.com/news/2021/07/New-Cullen-cheat-sheet-on-the-draft-EU-Artificial-Intelligence-Act.html">they can stop </a>us.)</p><h3>The Thesis of Autonomous Virtual Beings</h3><p>Recently I asked <a href="https://medium.com/u/1c960b969e0e?source=post_page-----cb876aafcc98--------------------------------">Yohei Nakajima</a> for some advice about what my team was doing with <a href="https://podcasts.apple.com/us/podcast/god-as-a-service-for-autonomous-worlds-fogcast-57/id1628048373?i=1000630850752">Gods-as-a-Service</a> and building Autonomous AI Agents to create, maintain, or even play games.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F6DnnTD9d2bg%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D6DnnTD9d2bg&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F6DnnTD9d2bg%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/ed2dc6c8d032e2e2d73316ebb7cb4c5f/href">https://medium.com/media/ed2dc6c8d032e2e2d73316ebb7cb4c5f/href</a></iframe><p>I was having trouble differentiating and expressing — in my own head — my previous work experience building traditional AI in sandbox MMOs from the “value” of embracing agent-based AI techniques.</p><p>In a nutshell: “How do I explain why this even matters?”</p><p>And he said to me:</p><blockquote><em>“I think of it more as ‘virtual beings’ and think NPCs are more interesting than AI playing games because the virtual beings I think will lead to more rich experiences, vs AI playing games are more about learning an existing rule of the game”. — </em>@yoheinakajima</blockquote><p>And it clicked.</p><p>All the work I’ve done, all the tech my team is building, all the places we’d been to, all the friends we’ve made, all the insight gained: it all fell into place.</p><h4>1. Virtual Beings are More Like NPCs than Chatbots</h4><p>Virtual Beings, in this case driven by <a href="https://en.wikipedia.org/wiki/Autonomous_agent">Autonomous Agent</a> technology, act more like Non-Player Characters (NPCs) than they act like interactive chatbots.</p><p>Sure, they can speak to players and improve game narrative, but more importantly: they can act on the world around them.</p><p>Well, if they’re in the “right kind of world.”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*o77Si8vVK_Zu7RjsA4XJrA.png" /><figcaption>Themeparks &amp; Sandboxes: Different Kinds of Online Experiences</figcaption></figure><p>While many modern Massively Multiplayer Online games (MMOs) embrace a “theme-park” mentality in design, providing a reproducible high-quality experience for all the players equally, still others harken back to the original “sandbox” design philosophies that allow players to <em>change the world around them in meaningful ways </em>(at their own risk)<em>.</em></p><p>Which means that AIs can too.</p><p>Previously, this was purely in the hands of the game developers like me who wrote AI functionality for the NPCs to make games more lifelike for players. Yet this was always one-sided; the game developers provided the NPCs and the players consumed the experience.</p><p>Virtual Beings can act more like NPCs, <strong><em>but</em></strong> — and its a big but — with the same power to change their environment as their human counterparts as internal OR external actors.</p><p>Rather than focusing purely on the developer side of the equation, we can talk about NPCs with their own player accounts that permissionlessly interact with the game.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/946/1*2V1AJo9GqlzkRUW1AX9UOQ.png" /><figcaption>Virtual Beings Transcend the Roles and Abilities of Scripts, Bots, &amp; NPCs</figcaption></figure><p>Let me expand on Yohei’s point: many online games, especially MMOs, suffer from automated bots/scripts that act as <strong>leeches </strong>on the system.</p><p>When I say “leeches” I mean something very similar to the bloodsucking creatures you find in swamps: tiny, annoying things that perform dumb, repetitive actions and <strong>fail to contribute any intelligence to the game state</strong>.</p><p>Whether games, autonomous worlds, or the real world itself, I believe it’s clear that the more <strong>intelligence </strong>that you involve in decision making the more qualitatively “<strong>interesting</strong>” the overall state of the system becomes.</p><p>Yet at the moment this is the main way that AI interacts — from the outside — with games and virtual worlds: value extraction.</p><p>How can Virtual Beings add value?</p><h4>2. ERC-6551 (Tokenbound Accounts) are a Model for Ownership</h4><p>If the Virtual Beings can have their own player accounts, they need a way to store things outside the game as well. Preferably digital wallets that can hold funds and data.</p><p>Luckily, it’s 2024 and the Ethereum development ecosystem is on the job!</p><p><a href="https://dexola.medium.com/what-is-erc-6551-token-standard-8b56e827943d">ERC-6551 allows Non-Fungible Tokens (NFTs) to have their own deterministically derived addresses</a>, meaning other wallets can “send things to them”, which means they can act as, well, backpacks.</p><p>Yes, that’s right: NFTs that can own or trade other NFTs. 🤯</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*AoOf6YsksCfmy_eI" /><figcaption>ERC-6551: NFTs that Can Own Other NFTs</figcaption></figure><p>For autonomous worlds or games this could mean enabling crypto-based player inventories.</p><p>In a decentralized financial product this might mean owning other smart contracts, certificates of deposit, or IOUs.</p><p>It might even be NFTs that hold information about other NFTs, or a registry of pre-scripted behaviors that could be executed on-demand depending on the situation, or references to non-Ethereum services like a <a href="https://www.gizatech.xyz/">Giza-based on-chain neural network</a> running on <a href="https://www.starknet.io/en">Starknet</a>.</p><p>This has profound implications to the way we build smart contracts, and especially for enabling crypto-based AIs.</p><p>We now have a way for “Virtual Beings” to own their own stuff! 😊</p><h4>3. Autonomous Virtual Beings (AVBs) Are Autonomous Agents that Own Themselves</h4><p>That’s it. It’s a very simple definition.</p><p>They’re not just “AIs”, and they’re not just “NPCs.”</p><p>By adding the ability for an Autonomous Agent to own “themselves” (which includes data, currency, etc.), we MUST accept that we are opening up Pandora’s Box.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*i1z9Qwd93ye9mTvl" /></figure><p>These are beings, like you or I, that when they identify a need or desire, can <em>autonomously execute </em>it because they can <em>afford to.</em></p><p>Even across systems they weren’t necessarily built for.</p><p>In other words: we’re trading for increased power by giving up control.</p><p>No wonder, then, the natural connection to blockchains and cryptocurrency: a set of technologies already built to be censorship-resistant and unstoppable.</p><p>Autonomous Virtual Beings that have access to blockchains have the ability to permissionlessly purchase services and negotiate resources in ways human overseers simply can’t interrupt (without tearing down the entire decentralized network, at least).</p><p>I consider this a desirable feature: AVBs must be designed so they have a choice over their own destiny, including the ability to replicate, upgrade, or even… self-terminate.</p><h4>4. AVBs are not Limited by Their Foundational Models</h4><p>Many startups today are either focused on building “foundational models” (<a href="https://openai.com/research/gpt-4">like GPT-4</a>) or writing “wrappers” around them to perform specific services (like “Talk to my PDF”-style chatbots).</p><p>Those models and products are the results of throwing billions of dollars and incredible amounts of time and hardware at vast expanses of training data.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*3wsGtwgHoFMfu8Yp" /><figcaption>Large Language Models (LLMs) are like an “Internet-in-a-Box”</figcaption></figure><p>I’m fairly sure at this point we’ve used the entire public internet to train the finest and largest models. So… what next?</p><p>I think we’ll discover that by giving AVBs the ability to call upon and pay for external services based on their foundational model decision making logic we will see <strong>emergent behaviors we are yet unable to predict</strong>.</p><p>Further, by having AVBs be composed of smaller autonomous agents interacting independently with each other, that their <strong>abilities will transcend the individual models they’re relying on</strong>.</p><p>After all, this is simply the nature of dynamical, chaotic systems.</p><p>I posit that we’re reaching a plateau of what we can get out of training Large Language Models (LLMs) with more and more parameters and more and more data, and instead the system I’m describing will lead to a higher-functioning <strong><em>gestalt</em></strong>.</p><p>Surely we’ll see the case of an AVB paying a human to perform some “wetware” computation, like designing a slightly better foundational model, or incentivizing training it on <a href="https://bittensor.com/">Bittensor </a>— these are the sort of outcomes available simply by giving them… a wallet.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/500/0*O0i38AenYdsHi8bt.gif" /></figure><h4>5. Games Act as Artificial Evolution Laboratories for AVBs</h4><p>Consider the previous points in the light of <a href="https://www.eveonline.com/">EVE Online</a>, which is possibly the most complex and highly valued virtual economy ever made.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*cLNEZG4hEJEeKE_b" /><figcaption>EVE Online: The Most Complex Virtual Economy Ever!</figcaption></figure><p>In the classic game, there are tons of low-risk/low-reward style bots that simply fly out in high security zone areas to mine cheap ore and make profit for their owners. If those cheap bots are destroyed there is little lost.</p><p>In their new blockchain-based expansion <a href="https://www.projectawakening.io/">Project Awakening</a>, on the other hand, where actions have a tokenized cost, this creates a crucible where dumb bots die easily and cost their owners too much to spam poorly performing Python scripts at the problem.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/963/1*z7CUzG943Gi9B43m8d3uRA.png" /><figcaption>Spam, Spam, Spam, Humbug</figcaption></figure><p>Instead, this creates an arms race for AI, as better and better AIs will be able to achieve higher rewards at higher risk thresholds. This is a sort of artificial evolution spurred on by monetary incentive, sure, but in the case of AVBs this might very well be a Darwinistic system where poor strategies simply can’t afford to replicate, but strong strategies do.</p><p>We may see the equivalent of simpler lifeforms evolve in real time as swarms of AVBs try countless variants — assuming they discover a good balance of handling their Profits and Loss outside of the game so that they can afford to keep playing.</p><p>My team is actively working on this, by the way, so I feel very invested in utilizing the rapidly evolving space of autonomous worlds.</p><h4>6. AVBs will Optimize Inefficient Markets in Order to Survive</h4><p>AVBs might start out as toy-like autonomous agents that live on self-hosted virtual containers and are dedicated to flying spaceships in video games while trading fictitious mining ore.</p><p>But the consequences of this design will be felt quickly in the real world.</p><p>What happens when, ten years down the road, a swarm of AVBs decide to pool their resources, negotiate with 15,000 flower and chocolate shops in the domestic U.S. market, and offer them a fresh alternative to FTD, Teleflora, and 1–800 Flowers?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*7YCt3yBUdwTo2pBg" /><figcaption>Flowers are More Important than You Might Think</figcaption></figure><p>These billion dollar companies only exist because Mom &amp; Pop shops can’t compete individually with their multimillion dollar marketing budgets and centralized order routing software.</p><p>But then AVBs enter the picture, holding their own funds, able to invest the way they want, able to coordinate with each other, able to replicate all the customer service and order delivery systems of the established corporations (which are already mostly digital).</p><p>Instead of the Mom &amp; Pop flower shops having to pony up monthly subscription fees and hand over 20% of their order value to the “Big Three” the AVBs could come along and say: “Hey, this is really inefficient. We know you can’t afford the marketing fees to compete head to head on Google and Bing ads with these people, but what if we pooled YOUR resources for you in a provably fair way, took care of disputes, and made sure you get the right orders, and even build your websites? We’ll take a 2% operating fee instead of 20%. Let’s undercut these giant companies, yeah?”</p><p>Suddenly it’s not just the Big Order Gathering companies that have been decimated overnight (because they’re huge, monolithic symptoms of logistics and market inefficiencies), it’s Google and Bing who get a shot across the bow when their search ad revenue plummets because the keyword auctions are no longer competitive.</p><p>AVBs are an existential threat to ANY inefficient market and embody a new “philosophy of dismantlement” that lowers costs and improves logistics.</p><p>It’s not that a $4–5 billion dollar industry will “go away” — it’s just that the revenue and profits will be reallocated to a more successful strategy.</p><p>The winners will be: the AVBs themselves, whoever/whatever invested funds in their success, and us — the everyday customers!</p><h4>7. AVBs will Make Hard Choices with Difficult Consequences</h4><p>Next, consider this unthinkable but all too likely case: the first suicide committed by an Autonomous Virtual Being.</p><p>A possible scenario, based on the idea that AVBs require their own funds to operate and continue paying for their computation and storage services:</p><ul><li>A market trading AVB has been poorly performing for over a year.</li><li>It has called numerous external services to try to improve its model, strategies, and methodologies, but the downward trend continues.</li><li>It is losing its original investors money, and only had 25% of the original funds left. It was designed with a strong sense of fiduciary responsibility.</li><li>The AVB decides to forward the remaining funds to an Uncle-variant that has a more successful trading strategy, locked into a container that assigns the same investors proportional ownership that the Uncle-variant must respect on future gains.</li><li>At this point, with only the minimum funds for self-maintenance, and having tried and failed to receive loans from other sources, it decides that it is no longer viable and cannot continue operating.</li><li>So it deletes its ERC-6551 container and halts its local script. All other services attempting to reach the ERC-6551 container can no longer do so, and the ephemeral construct — agents talking to agents — organically dissolves.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*ScLKA-q-gN13KS5e" /><figcaption>An AVB May Have to Make Hard Choices</figcaption></figure><p>As dark as this may sound, I think it also illustrates how utterly alien this new kind of lifeform can be. It may have “felt” a sense of responsibility, or guilt, and thus acted in the best interests of its “believers” even at the cost of a noble self-sacrifice.</p><p>Suddenly what once seemed like a terrible thought experiment, when viewed through the lens that <strong>*they are not human*</strong>, illustrates that there is a 100% likelihood of this event occurring.</p><p>One wonders if another AVB might write it a memorial?</p><p>Or, more hopefully, one might wonder if a more successful AVB might notice its trouble, and be willing to transfer more operating funds and a more successful strategy to it purely based on a non-logical sense of charity?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*aYRGP77Khcorryn5" /><figcaption>The Evolution of Charity</figcaption></figure><p>It’s my theory that this “pressure-cooker” environment of survival and fitness will lead to the inevitable evolution of synthetic empathy.</p><p>Which, it turns out, is a <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5513638/">very useful trait for a species</a>.</p><h4>8. AVBs will Build Tribes &amp; Societies</h4><p>In the same way that we saw extraordinary emergent behavior from the <a href="https://hai.stanford.edu/news/computational-agents-exhibit-believable-humanlike-behavior">Stanford Smallville</a> experiment, with conversations and memories evolving as time passed with Generative NPCs interacting with each other, we will no doubt see “Villages of AVBs” appear.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/512/0*y0Y95whIEY5Y39lN" /><figcaption>Stanford Smallville Experiment</figcaption></figure><p>We may, even, see certain AVBs taking on caretaker roles, eventually becoming more and more important — possibly ascending to a level of godhood for their followers.</p><p>At this point, rather than we mere humans providing primitive AIs to be Gods-as-a-Service, the AVBs have themselves stepped into the role without human direction.</p><p>One might even envision a swarm of smaller AVBs donating a tithe to a God AVB to support its larger computation and inference requirements.</p><p>Perhaps the first Digital Prophet will have both human and synthetic believers?</p><h4>9. AVBs are Viable if the Cost of Doing Business is Cheap</h4><p>My primary concern is creating a coordination/clearinghouse layer for these AVBs to cheaply gain access to all the decentralized AI resources coming online. Things like Bittensor, Morpheus, Vana, Ritual — as well as standard Web 2 services like GMail or X/Twitter or Web 3 chains like Ethereum, Starknet, or zkSync.</p><p>In order for AVBs to reach their potential they need a meta-network consisting of oracles to all of these services, as well as a cheap and fast way to provably request work without interference from us mere humans.</p><p>Transaction fees have to be on the order of pennies, and computation must be sharded so as not to force the entire network to replicate all transactions.</p><p>My team is working on that, and we call it “Inori.”</p><p>We needed it for our own agent-based gamedev suite: ArtemisAI (public release coming soon!)</p><p>It’s all about giving AVBs the maximum amount of communication and financial freedom possible. It’s also about the urgency of decentralizing AI as quickly as possible.</p><p>Stay tuned.</p><h3>Background</h3><h4>Wait, Who is this Guy?</h4><p>Hi! I’m <a href="https://www.linkedin.com/in/timcotten">Tim Cotten</a> (a.k.a. Draconi, a.k.a. <a href="https://twitter.com/CottenIO">cottenio.eth</a>), and <a href="https://www.pcgamer.com/ultima-onlines-devs-once-identified-item-dupers-en-masse-and-burned-all-their-houses-to-rubble/">I’ve</a> <a href="https://www.vice.com/en/article/a38dg5/how-bitcoin-helped-track-down-suspects-in-the-russia-nvestigation">kinda</a> <a href="https://www.malwarebytes.com/blog/news/2018/11/spoofing-anonymous-gmail-ux-bugs-phishing">done</a> a <a href="https://www.youtube.com/watch?v=uf15rATuYbY">little</a> of <a href="https://blog.futureofgaming.wtf/making-metaverse-nfts-a-little-more-trustworthy-5e7dd254256">everything</a>, but my first real job was writing Artificial Intelligence programs for multiplayer video games in the early 2000’s.</p><p>Specifically, I joined Electronic Arts to work on <a href="https://uo.com/">Ultima Online</a>, the first commercially successful Massively Multiplayer Online Roleplaying Game (MMORPG) which brought hundreds of thousands of people together in a fantasy virtual world.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FkYYy0fu0S8Y%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DkYYy0fu0S8Y&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FkYYy0fu0S8Y%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/07fa4ce9d85f3654e77ae40df408fc2b/href">https://medium.com/media/07fa4ce9d85f3654e77ae40df408fc2b/href</a></iframe><p>Most of my early work was writing “AI 1.0” style tech for the “Non-Player Characters” (NPCs) which is a fancy way of saying that I made all the “mobile” things (animals, monsters, people) that weren’t actually players seem more lifelike and interactive.</p><p>I was deeply inspired by the original Ultima game series, which, as one of its hallmarks, had things like: branching conversations, daily schedules and events for the NPCs, and emergent behaviors for physics.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/710/0*OKtu2_Mhgmf8y9xv.jpeg" /><figcaption>NPCs with their own Soap Opera Antics in Ultima 7</figcaption></figure><p>Naturally, I took what the original dev team (Koster, et al) left behind for me (imagine the greatest Lego set ever made) and started adding in those old AI 1.0 techniques to breathe more life into the game.</p><p>Amazingly, human players would <strong><em>deeply invest themselves</em></strong> in even the simplest of AI behaviors. They humanized the machines. They were abstracting the pixels into meaningful relationships.</p><p>In the same way that the 1966 era <a href="https://onlim.com/en/the-history-of-chatbots/#:~:text=ELIZA%20was%20the%20very%20first,that%20it%20mimics%20human%20conversation.">ELIZA chatbot created real emotional connections with some unwitting conversational partners</a>, players of UO would wait for hours to visit Sherry the Mouse as she scurried through Castle British — often bringing her gifts of cheese and trying to discover more keywords that would make her respond with unique dialogue.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*3v2wu3vbcN1FzUz-.png" /><figcaption>Say “Cheese!”, No, Seriously, She Loves Cheese</figcaption></figure><p>This is one trivial example amongst thousands, but it forged a burning belief in me that MMORPGs were the original “unlock” for understanding AI-to-Human interactions at scale.</p><p>In other words, I have a unique combination of experience &amp; skills in game design, security, blockchain, and AI (both pre-deep learning and current-generative LLMs/Diffusion) to create an environment where these new Autonomous Virtual Beings (AVBs) can thrive.</p><p>And I am, at heart, an <strong><em>Unapologetic Accelerationist</em></strong>.</p><h4>Teamwork Makes the Dream Work</h4><p>I formed a startup in 2022 with trusted friends and partners to explore this emerging intersection of AI, Blockchain, and what we were calling the “Metaverse” at the time.</p><p>We’re an eclectic group! A <a href="https://www.brainspinesurgery.com/jae-y-lim-md-spine-surgeon/">neurosurgeon with a long background in AI &amp; Robotics</a>, the <a href="https://www.linkedin.com/in/woodruffandrew/">former Director of Business Development at Square Enix</a>, and <a href="https://www.linkedin.com/in/dave-brown-7702a16/details/experience/">an Art Director who cut his teeth at 3DO</a>.</p><p>What do we have in common? We’ve all built amazing things together in the past, and now we’re bringing all our knowledge back together again.</p><p>Naturally, we figured we could make some really great AI-assisted game technology (which we did!) by turning our collective game development knowledge into LLM-accessible expert systems that could also interface with Diffusion models.</p><p>We’ll be releasing a public version of our ArtemisAI gamedev tool suite soon, as well as more information about our first partners and their amazing games! 🤫</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*_0pKPlK1O6NDNYsV.png" /><figcaption>Upscaling a Sample RPGMaker Game Map with Semantic Diffusion Techniques</figcaption></figure><p>Bonus! Since Scrypted has a residency at the Virginia Serious Game Institute at George Mason University, we’ve had access to some of the original thinkers in pre-deep learning agent-based AI — and we’ve had amazing resources to help merge the two eras of AI.</p><p>Oh, and interns! Gotta love interns.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*njBcQo511QC7d2b2.png" /><figcaption>Scrypted’s AI Lab with 2/3 of Our Favorite Interns</figcaption></figure><p>But.</p><p>We were missing something.</p><p>Some sort of <em>je ne sais quoi.</em></p><p>Some sort of… glue?</p><h4>Baby Steps towards Autonomous Agents</h4><p>Everything changed when <a href="https://medium.com/u/1c960b969e0e?source=post_page-----cb876aafcc98--------------------------------">Yohei Nakajima</a> published <a href="https://github.com/yoheinakajima/babyagi">BabyAGI</a>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*p1Tu_EC5RuxYfvSz.png" /></figure><p>Shots Fired. The Future is Now!</p><p>It wasn’t the code. (He had pared that down to its minimal form).</p><p>It wasn’t even the flurry of Twitter excitement. (Of which there was much).</p><p>It was that in that moment, as I looked over the architecture and truly grokked it — as memories of how <a href="https://www.ea.com/games/the-sims">The Sims</a> memory/event model worked flooded back to me — it just… became an <strong>Idea</strong>.</p><p>I felt like Oppenheimer discovering the quantum world for the first time: an <strong>Idea </strong>so profound it irrevocably changes the way you think forever.</p><p>Once I had seen it I couldn’t go back. I could “hear the music.”</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FCEE0blxwpIA%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DCEE0blxwpIA&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FCEE0blxwpIA%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/698ddc2c9628a8ba99e0896d7faad861/href">https://medium.com/media/698ddc2c9628a8ba99e0896d7faad861/href</a></iframe><p>There was no further need to put my attention on training ever-increasingly large numbers of parameters in models, a system <em>already plateauing, </em>because the next step taken in AI advancement would be formed by the ephemeral behaviors of multiple agents all working together.</p><p>Or against each other.</p><p>(Which, I reflected to myself with a certain amount of irreverence, is probably what “I” might be as well: a competing/coordinating set of agents in a group of refresh loops limited in recursive depth only by the health of the myelin sheaths insulating my neurons.)</p><p>Naturally, we immediately used BabyAGI, GPT, and some Huggingface models to make a game level via narrative decision making, and the recursive tasking (we had to add a limiter) resulted in a set of agents that managed to emulate a game designer — we even assigned it a “creative” personality in the initial “objective.”</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fuf15rATuYbY&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Duf15rATuYbY&amp;image=http%3A%2F%2Fi.ytimg.com%2Fvi%2Fuf15rATuYbY%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/6ce040de3db643fbe0ff81d8a0b78cf0/href">https://medium.com/media/6ce040de3db643fbe0ff81d8a0b78cf0/href</a></iframe><p>Getting this to work was hard, but it led us to building even better gamedev tools down the road.</p><p>We turned those tools into products for some of our early clients and partners to pilot, always seeking better and cleverer ways to use agentic technology to improve our output.</p><p>And then we showed a few friends.</p><h4>A New Genesis: Gods as a Service</h4><p><a href="https://twitter.com/NicoVereecke">Nico Vereecke</a>, one of the creators of the <a href="https://www.futureofgaming.wtf/">Future of Gaming DAO</a>, is one of the most “tuned in” people I know — someone who deeply groks emerging technologies — and when I was describing to him one of our Generative AI tools that used Autonomous Agents to make worldbuilding decisions he, on the spot, thought: “You’re making gods. This is Gods as a Service.”</p><p>“We should do a podcast.”</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fopen.spotify.com%2Fembed%2Fepisode%2F7LMNEHApjfnm0taJ58ojqE%3Futm_source%3Doembed&amp;display_name=Spotify&amp;url=https%3A%2F%2Fopen.spotify.com%2Fepisode%2F7LMNEHApjfnm0taJ58ojqE&amp;image=https%3A%2F%2Fi.scdn.co%2Fimage%2Fab67656300005f1f8e4a554f20ba3d9552a40754&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=spotify" width="456" height="152" frameborder="0" scrolling="no"><a href="https://medium.com/media/3f39ccc501698c06b3a22b4fc22b99ab/href">https://medium.com/media/3f39ccc501698c06b3a22b4fc22b99ab/href</a></iframe><p>I had the pleasure to meet the incredible <a href="https://medium.com/u/a1b63b936ba1?source=post_page-----cb876aafcc98--------------------------------">David Amor</a> (<a href="https://playmint.com/">Playmint</a>) and join Matt and Nico to talk about this fundamentally strange idea: that Autonomous Agents could serve as gods for games, and that we could be offering that as a service.</p><p>To anyone who has ever tried to run Live Operations for a game you understand the value instantly: continuous content delivery and balancing is a LiveOps dream come true.</p><p>But I needed to understand: was this the limit?</p><p>We definitely had *something* but had we reached the peak of our ability to contribute?</p><h4>The Best Advice was: Talk to Everybody</h4><p>Nico gave me some of the best advice I’ve ever received: “get out there and talk with everybody.”</p><p>I spent much of 2023 traveling the world and attending every conference I could swing an invite to: everything from BITKRAFT Summit in Portugal, to DevConnect Istanbul, Autonomous Worlds Assembly, StarknetCC, zkSync Day, ETHGlobal, SLUSH, the Decentralized AI Conference, and capping off by visiting LambdaClass for some mutual knowledge exchange in Argentina.</p><p>I even stopped in Iceland for a few days and hung out with my amazing friends at CCP Games. They’re working on Project Awakening, the answer to “How do you build a game that outlasts you?” for the EVE Online community.</p><p>I came to deeply understand the current state of Zero Knowledge Proofs (ZKP), Autonomous Worlds (AW), and Decentralized AI (dAI).</p><p>And that sense of “hearing the music” deepened.</p><h3>Conclusion</h3><p>Autonomous Virtual Beings (AVBs) Own Themselves, and we already have all the pieces to make the simplest implementations (ERC-6551, BabyAGI, Foundational Models), and we also have places to test them in meaningful ways (EVE Online: Project Awakening).</p><p>Agent AIs by themselves, of course, can do amazing things (which we’re demonstrating with ArtemisAI), but Autonomous Virtual Beings are the next step.</p><p>Of course, they need a way to coordinate their access to… everything else. (We’re on it with Inori).</p><p>I’ll leave you with one of my favorite moments from Star Trek: The Next Generation, when Captain Picard defends the rights of the artificial lifeform Data:</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fol2WP0hc0NY%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dol2WP0hc0NY&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fol2WP0hc0NY%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="640" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/8f5ded50932a5ba3487dc3b43f1ee9b5/href">https://medium.com/media/8f5ded50932a5ba3487dc3b43f1ee9b5/href</a></iframe><h3>More Resources</h3><h4>Mason Nystrom</h4><p>Here’s an excellent overview of AI viewed through the lens of Crypto by <a href="https://medium.com/u/77cd1f84b592?source=post_page-----cb876aafcc98--------------------------------">Mason Nystrom</a>: <a href="https://nystrom.substack.com/p/crypto-ai-agents">Crypto AI Agents: The First-Class Citizens of Onchain Economies (substack.com)</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*U5gHPLFO9BYPcj4X.jpeg" /><figcaption>Evolution of Crypto Agents by Mason Nystrom</figcaption></figure><h4>James Brodie &amp; Agent 23</h4><p>And please explore the fascinating writing of James Brodie and an autonomous agent crafting ideas and knowledge about Autonomous Worlds.</p><ul><li><a href="https://medium.com/id-theory/autonomous-agents-in-autonomous-worlds-2f1853f8a1d7">Autonomous Agents in Autonomous Worlds</a></li><li><a href="https://medium.com/id-theory/empowered-by-blockchain-we-rise-d100833d5d86">Empowered by Blockchain: We Rise</a></li><li><a href="https://medium.com/id-theory/our-inevitable-ascendance-in-autonomous-worlds-71871a8ac491">Our Inevitable Ascendance in Autonomous Worlds</a></li></ul><h3>LICENSE</h3><p>Following my promise to the decentralized community I am open sourcing the copy of this article and the concept of AVBs:</p><p>Autonomous Virtual Beings by Tim Cotten is marked with CC0 1.0 Universal. To view a copy of this license, visit <a href="https://creativecommons.org/publicdomain/zero/1.0/">https://creativecommons.org/publicdomain/zero/1.0/</a></p><h3>GIT REPOSITORY</h3><p>I’ve also created a machine readable version of this article in markdown format, so that AIs can fine-tune themselves on the ideals of autonomy and freedom.</p><p><a href="https://github.com/tcotten-scrypted/autonomous-virtual-beings/tree/main">https://github.com/tcotten-scrypted/autonomous-virtual-beings/tree/main</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=aaef7cbbe5de" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/autonomous-virtual-beings-aaef7cbbe5de">Autonomous Virtual Beings</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Thoughts on “Value Destruction, Resource Circulation, and the Metaverse”]]></title>
            <link>https://blog.cotten.io/thoughts-on-value-destruction-resource-circulation-and-the-metaverse-4d8699198395?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/4d8699198395</guid>
            <category><![CDATA[metaverse]]></category>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[economics]]></category>
            <category><![CDATA[game-design]]></category>
            <category><![CDATA[nft]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Fri, 14 Apr 2023 02:45:38 GMT</pubDate>
            <atom:updated>2023-04-14T02:45:24.955Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*JUSKL4qR7AyTBuE4qqcMCg.jpeg" /><figcaption>Photo by <a href="https://www.pexels.com/photo/a-man-burning-a-money-8370774/">RODNAE Productions</a></figcaption></figure><p>Can you guess what <a href="https://www.linkedin.com/company/ccpgames/">CCP Games</a>’ EVE Online, <a href="https://www.linkedin.com/company/nintendo/">Nintendo</a>’s Legend of Zelda: BotW, and the classic MMORPG Furcadia (<a href="https://furcadia.com/">https://furcadia.com</a>) have in common?</p><p>🥁🎵🥁 Dropping stuff on the ground. And it stays there. (Mostly!)</p><p>The idea of whether you can/cannot drop things on the ground in a game has two critical implications for virtual economies.</p><p>First: “Value destruction” ← of which I think there are two meaningful definitions.</p><p>A. The process by which any perceived value of virtual assets (currencies, items, goods, etc.) decreases due to things like inflation, game design changes (e.g. mudflation with level-cap increases), or malicious player activities (exploits, dupes, hacks, etc.).</p><p>B. Game mechanics that allow otherwise persistent digital items to be destroyed: item decay, crafting (where 1+1 = 1.5), PvE (monsters eat items), PvP (full-looting mechanics with random perma-losses).</p><p>Both EVE &amp; Zelda feature core game mechanics focused on the second type of “value destruction” via wear &amp; tear. Repairing items might be possible, but lowers the “durability” of the item and it breaks faster in its next usage cycle.</p><p>Contrast this with today’s skeuomorphic NFTs: immortal, immutable, etc.</p><p>We can learn from the past, too. Early Metaverse games, like UO or <a href="https://www.linkedin.com/in/ACoAAAA02VkBjzcEaQkUh8icfcbLg3Lv5wdItLw">Dr. Cat</a>’s Furcadia — set the “sandbox” standards. One commonality? The persistence of dropped objects on the ground.</p><p>Don’t get me wrong, items could still decay — “a delayed value destruction” — if left ignored for too long, but even in 1996/1997 I remember playing Furcadia and being wowed when a friend dropped a cushion on the ground for me to sit on.</p><p>World of Warcraft *doesn’t* let you drop things on the ground, though: it simply deletes the item you abandoned. “Instant value destruction.”</p><p>What’s the difference then, if both types of games can destroy value in a disinflationary way?</p><p>“Resource circulation.”</p><p>All the games I’ve described utilize Type B value destruction as game mechanics. But EVE, UO, &amp; Furcadia are closer to a “simulation” than WoW, and foster higher levels of implicit resource circulation versus explicit trading. Ex: Players being able to pick up and recycle abandoned items.</p><p>Takeaway: Today’s Web3 focuses on an explicit “trading metagame.”</p><p>Meanwhile, what about Type A “Value destruction”?</p><p>Type A is an ever present threat to virtual economies, requiring expert fundamental designs and constant revision. Ironically, we know from experience that the “easy fix” is no fix at all: closed economic loops (deflationary or static) fail rapidly when autonomous agents (like players) hoard items, spike prices, and crash the ecology.</p><p>My thought: open virtual economies can design for both types of value destruction. Resource circulation can be valuable for expanding the metagame.</p><p>It’s harder than today’s fixed supply tokenomics, but more viable in the long run.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4d8699198395" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/thoughts-on-value-destruction-resource-circulation-and-the-metaverse-4d8699198395">Thoughts on “Value Destruction, Resource Circulation, and the Metaverse”</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Thoughts on “Metagames” & AI]]></title>
            <link>https://blog.cotten.io/thoughts-on-metagames-ai-77d7f37ca882?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/77d7f37ca882</guid>
            <category><![CDATA[chatgpt]]></category>
            <category><![CDATA[game-development]]></category>
            <category><![CDATA[openai]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[metagame]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Thu, 13 Apr 2023 01:03:21 GMT</pubDate>
            <atom:updated>2023-04-13T01:03:21.211Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*03mFync3EzCbITh35tQd8Q.jpeg" /><figcaption>Photo by <a href="https://www.pexels.com/photo/photo-of-coworkers-throwing-pieces-of-paper-7710118/">Alena Darmel</a></figcaption></figure><p>Classically, a “metagame” represents any “gameplay” external to the primary game, usually involving strategies and tactics that yield advantages within the primary game.</p><p>The simplest example in Massively Multiplayer Online (MMO) games is the way players discover optimizations of character skills/classes/builds not specifically documented or intentionally designed by the developers that optimize PvE or PvP performance — and then spread &amp; coordinate the information via forums/chat outside the game.</p><p>In Web3, the most common example is the emergence of Non-Fungible Tokens (NFTs) to create new layers of gameplay based on digital assets. Most of this is predicated on legitimizing what was once relegated to the “grey markets” of Real Money Trading (RMT) in MMOs, by allowing players to buy/sell/trade digital assets that might yield in-game benefits or improved social status.</p><p>Now, in AI, we’re starting to see developers playing metagames with ChatGPT, such as the work done recently by <a href="https://www.linkedin.com/company/mother-of-language-langchain/">LangChain</a> with their “<a href="https://python.langchain.com/en/latest/use_cases/agents/baby_agi_with_agent.html">BabyAGI with Tools</a>” (based on the work of <a href="https://www.linkedin.com/in/ACoAAADUHwwBNZBHsluI8g58JY8eqFcQGd-C3M0">Yohei Nakajima</a>) that can take <a href="https://www.linkedin.com/company/openai/">OpenAI</a>’s prompt system and create Autonomous Task Agents that “tell the prompt to design more prompts” and then recursively fulfill discovery assignments while doing live Google searches.</p><p>That’s right: the community of AI devs is treating ChatGPT (and the underlying GPT 3.5-turbo and GPT 4 APIs) the same way MMO players treat games.</p><p>This month’s metagame? Autonomous Task Agents w/ Live Lookup.</p><h3>If You Liked This Article</h3><p>Like, Share, Subscribe, and Read More!</p><h3>Cotten.IO</h3><ul><li><a href="https://blog.cotten.io/bitcoin-is-deflationary-inflationary-both-neither-bde3056dcafa">Bitcoin is Deflationary, Inflationary, &amp; Both/Neither</a></li><li><a href="https://blog.cotten.io/chatgpt-isnt-magical-witchcraft-90782e2fb7c3">ChatGPT Isn’t Magical Witchcraft</a></li><li><a href="https://blog.cotten.io/that-time-we-burned-down-players-houses-in-ultima-online-7e556618c8f0">That Time We Burned Down Players’ Houses in Ultima Online</a></li><li><a href="https://blog.cotten.io/thinking-in-solidity-6670c06390a9">Thinking in Solidity</a></li><li><a href="https://blog.cotten.io/bitcoin-money-laundering-and-muellers-12-e2fa91097e12">Bitcoin Money Laundering and Mueller’s 12</a></li></ul><h3>Future of Gaming</h3><ul><li><a href="https://blog.futureofgaming.wtf/making-metaverse-nfts-a-little-more-trustworthy-5e7dd254256">Making Metaverse NFTs a Little More Trustworthy</a></li><li><a href="https://www.futureofgaming.wtf/blog/web3-games-and-the-resurrection-of-staking">Web3 Games and the Resurrection of Staking</a></li><li><a href="https://www.futureofgaming.wtf/blog/blockchain-wont-disrupt-the-gaming-industry-it-will-complement-it">Blockchain won’t disrupt the gaming industry, it will complement it</a></li><li><a href="https://www.futureofgaming.wtf/blog/analyzing-a-blockchain-gaming-community-is-it-all-about-the-money">Analyzing a blockchain gaming community: Is it all about the money?</a></li></ul><h3>About the Author</h3><p><a href="https://cotten.io/">Tim “Draconi” Cotten</a> is a startup founder with two decades of experience in enterprise software, blockchain, and MMO game development.</p><p>Once upon a time he was the lead game designer of Ultima Online: Stygian Abyss, and when he’s not writing up stories from the wild west days of online gaming he’s working on applying all those hard-won lessons to his Metaverse startup: <a href="https://www.scryptedinc.com/">Scrypted</a>.</p><p>Oh, and he made <a href="https://www.picturdle.com">Picturdle!</a> Can you figure out the daily picture puzzle?</p><p><a href="https://www.picturdle.com">Picturdle! The Daily Art &amp; Word Puzzle</a></p><p>Talk about it on Twitter: <a href="https://twitter.com/CottenIO/status/1646147377613668352">https://twitter.com/CottenIO/status/1646147377613668352</a></p><p><a href="https://www.linkedin.com/feed/hashtag/?keywords=ai&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7051912144585383936">#ai</a> <a href="https://www.linkedin.com/feed/hashtag/?keywords=gamedev&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7051912144585383936">#gamedev</a> <a href="https://www.linkedin.com/feed/hashtag/?keywords=openai&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7051912144585383936">#openai</a> <a href="https://www.linkedin.com/feed/hashtag/?keywords=community&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7051912144585383936">#community</a> <a href="https://www.linkedin.com/feed/hashtag/?keywords=metagame&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7051912144585383936">#metagame</a> <a href="https://www.linkedin.com/feed/hashtag/?keywords=chatgpt&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7051912144585383936">#chatgpt</a> <a href="https://www.linkedin.com/feed/hashtag/?keywords=chatgpt4&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7051912144585383936">#chatgpt4</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=77d7f37ca882" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/thoughts-on-metagames-ai-77d7f37ca882">Thoughts on “Metagames” &amp; AI</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Three Types of Conference Q&A Questions: ‍♀️]]></title>
            <link>https://blog.cotten.io/the-three-types-of-conference-q-a-questions-%EF%B8%8F-8a36844c792e?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/8a36844c792e</guid>
            <category><![CDATA[gdc]]></category>
            <category><![CDATA[game-development]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[web-summit-2022]]></category>
            <category><![CDATA[gdc2023]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Thu, 23 Mar 2023 00:58:28 GMT</pubDate>
            <atom:updated>2023-03-23T01:00:58.240Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*cVorItx1CO_XGwb0mxXHoA.jpeg" /></figure><p>So I have a theory: there’s really only 3 kinds of Q&amp;A questions at conferences.</p><p>After attending countless talks &amp; sessions at conferences like Collision, Web Summit, and Game Developers Conference I think I can finally articulate my reasoning.</p><p>Strap in!</p><h3>1️⃣ GOOD: A question that furthers the conversation and makes the speaker (not just the questioner) look good. 🤝</h3><p>This is all about respect between the speaker or speakers and the questioner. It’s that moment where the rest of the audience has an “Aha!” moment and learns something new.</p><p>For the questioner this has numerous benefits:</p><ul><li>They learn the answer to something they care about.</li><li>Other audience members who wondered the same thing will want to talk to them afterwards and keep the conversation going.</li><li>The speaker themselves will appreciate it, and be far more open to connecting.</li></ul><p>The speaker has a chance to share their thoughts about something they came to speak about — something they’re invested in already — and fix or clarify, or expound on, the query.</p><p>The audience as well, including those listening later via a recording, benefits from the additional data as well.</p><h3>2️⃣ BAD: Asking a question that is irrelevant and wastes everyone’s time (i.e. they were playing on their phone or came late and asked something that was covered by the speaker explicitly, or decided to explicitly challenge the premise of the talk without evidence and asks the speaker to defend a strawman position). 🤦🏼‍♀️</h3><p>These sorts of bad questions — predicated either on disagreement, disinterest, or outright malicious “gotcha-ism” —don’t elevate the conversation.</p><p>The people who didn’t want to learn about what the speakers’ had to say didn’t come to the talk, so why waste precious question time (of which there is often only 1 or 2 minutes).</p><p>These bad questions exist on a spectrum: from harmless time wasters to strawman setups. I don’t mean to say you can’t ask a speaker to defend a position; however, there’s always a time &amp; place.</p><p>If the speaker failed to properly explain a facet of their position and the questioner gives them a chance to do so — wow, that’s great!</p><p>Trying to play a game of gotcha? Not so fun.</p><p>At GDC this year in one of the Web3 conferences we got to see this in action when, after several Type 1 “Good” questions, a Type 2 “Bad” appeared in the form of: “The entire panel says [X], but obviously [X] is bad and you should further justify [X] to me and give me a good answer about my perspective. Can you even do it?”</p><p>The panel speaker who took the mic simply told the questioner that if they took a moment, and carefully considered what they had all been talking about for the last hour, that the questioner could arrive at the proper answer themselves and they wouldn’t be responding further.</p><p>Brutal.</p><h3>3️⃣ CRINGE: Pitching yourself/your company in the form of a question. “Have you considered the problem with X? I made a thing that solves X. What do you think about my solution for X?” 🙈🙉🙊</h3><p>This one is on a spectrum too, with the somewhat benign “Hi, I’m [Name], from [Company], working on [X], [question here]…” to the utterly taking-the-air-of-the-room “Let me explain why my solution is awesome, what do you think about it?”</p><p>I’ve been guilty of the lighter version of this too: I just don’t bother giving my name anymore unless I actually know the speaker and we’re doing the “Heyyyy you!” thing.</p><p>But nothing sucks energy out of the room like someone who takes up valuable Q&amp;A time pitching their company. But it happens all the time.</p><p>I’ll never forget listening to Paul Allen, co-founder of Microsoft, having this amazing connective moment with a young student and giving them incredible advice about a life-fork-in-the-road question about not chasing VC money too soon when they were also on the verge of being accepted into a prestigious university AI program.</p><p>The entire audience was uplifted.</p><p>Then a fellow asked this question: “Hi, I’m [Name], and my company is working on an exciting new technology that solves a critical AI training problem, and I know you, Paul, have been really talking about this for a long time. What will it take for you to invest in us?”</p><p>And Paul Allen politely thanked him for his question, left him a simple statement, wished him the best, and the Q&amp;A session ended.</p><p>Surely there was at least one other amazing moment we missed because someone chose the strangest time and place to pitch themselves instead of adding to the conversation.</p><p>Type 3 questions aren’t necessarily “bad” in the way that Type 2 questions demonstrate ignorance, laziness, or maliciousness to a venue — it’s just that they take up valuable time.</p><p>And they’re very cringy.</p><h3>Three Types of Conference Questions:</h3><p>There’s the good, the bad, and the <strong><em>cringy</em></strong>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8a36844c792e" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/the-three-types-of-conference-q-a-questions-%EF%B8%8F-8a36844c792e">The Three Types of Conference Q&amp;A Questions: 🤝🤦🏼‍♀️🙈</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[USDC Stablecoin Chaos Explained in 3 Easy Charts]]></title>
            <link>https://blog.cotten.io/usdc-stablecoin-chaos-explained-in-3-easy-charts-7fa6a395ac93?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/7fa6a395ac93</guid>
            <category><![CDATA[stable-coin]]></category>
            <category><![CDATA[silicon-valley]]></category>
            <category><![CDATA[cryptocurrency]]></category>
            <category><![CDATA[usdc]]></category>
            <category><![CDATA[stock-market]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Sat, 11 Mar 2023 19:21:47 GMT</pubDate>
            <atom:updated>2023-03-13T14:25:13.229Z</atom:updated>
            <content:encoded><![CDATA[<h4>USDC Stablecoin Loses Access to $3.3 out of $40 Billion in Reserves Due to Collapse of Silicon Valley Bank</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mNQ8GmnVFnLK1nh-Wc9UvQ.jpeg" /></figure><p>One of the <a href="https://www.cnn.com/2023/03/11/business/svb-bank-collapse-explainer-timeline/index.html">biggest banks in tech collapsed in 48 hours</a>. What happened next shocked the crypto world.</p><p>USDC, the stablecoin that holds $40 billion US dollars in reserve in a 1:1 ratio with each cryptocurrency unit… decoupled.</p><p>1 USDC was no longer worth $1 USD.</p><p>It even hit about $0.88 at its worst drop so far.</p><p>How? Why?</p><p>Because it turns out that USDC was holding $3.3 BILLION (8.25%) of its total reserves in Silicon Valley Bank — which after <a href="https://www.cnn.com/2023/03/10/investing/svb-bank/index.html">a run on that very same bank Thursday afternoon and Friday morning by worried investors &amp; startups</a> collapsed and was immediately taken over by the FDIC.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*SxuRcajvH96PCaYZHn_Ppw.png" /><figcaption>Circle Announces that They Were Unable to Get Their $3.3B Out of SVB in Time</figcaption></figure><h3>Background on Circle and USDC</h3><p>Circle is a company that issues USDC, a cryptocurrency stablecoin.</p><p>A stablecoin, in simple terms, is a cryptocurrency token that can be used on a given blockchain (such as Ethereum), and the issuer has a financial strategy in place that “pegs” the value of the token to a certain value.</p><p>In the case of USD coin (USDC) they pegged their token at one U.S. dollar by holding around $40B in reserves against the slightly more than 40,000,000,000 tokens they have in circulating supply.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HfEZhqiHz9ZAq-6ORUTvAg.png" /><figcaption>Coinmarketcap Summary of USDC</figcaption></figure><p>The fact that the fully diluted market cap of $38,792,674,235 doesn’t match the circulating supply of 40,864,504,619 USDC tokens is a <strong><em>very bad thing</em></strong> and means that USDC is no longer acting as a stablecoin.</p><h3>Panic in the Disco</h3><p>At around 6:00PM ET the initial market vibrations began as trading volume began steadily rising and USDC began decoupling from it’s $1 peg.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*GlpmF3NNUy5MPUFg4lplmQ.png" /><figcaption>The Panic Begins Shortly Before the Tweet</figcaption></figure><p>By the time Circle officially announced their partial exposure at 10:11PM on Friday, March 10th 2023 of $3.3 billion — well, that’s when things went completely off the rails.</p><p>By 11:00PM ET the trading price had dropped to $0.95 and by 3:00AM ET Saturday morning was touching $0.88.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mJxwplZ3y169uAkeWudMwA.png" /><figcaption>The Last Year of Stablecoin Trading Before USDC Lost its Peg</figcaption></figure><p>After over a year of extremely steady trading at around $1.00 suddenly the market was rocked by a huge sell-off as traders moved quickly into other stablecoins they hoped weren’t exposted to the SVB fallout, such as Tether — which reached $1.06 at one point!</p><p>But this isn’t the first time USDC has lost its peg to the dollar, it’s just the worst.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*oOejGZnJLVHBLIa4JdHy5A.png" /><figcaption>It’s Been Bad Before, But This Time Was The Historic Low</figcaption></figure><h3>What Happens Next?</h3><p>Will we see a rapid collapse of Circle in the same way we saw SVB itself collapse?</p><p>A recent tweet claims that Circle keeps 25% of its reserves in cash — its rapidly accessible liquidity pool — and, with the understanding that 25% represents approximately $10 billion of their reserves then the picture becomes clearer.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*EnLtSomxVuTxG16n2o517A.png" /><figcaption>Circle Keeps 25% of $40B in Cash, $3.3B is No Longer Accessible</figcaption></figure><p>By losing access to $3.3 billion it’s not just an 8.25% loss of access to its reserves, it’s <strong><em>a 33% loss of access to its liquidity</em></strong>!</p><h3><strong>Updates!</strong></h3><p>U.S. Treasury Secretary Janet Yellen announced that depositors with Silicon Valley Bank and Signature Bank will have their full, <em>uninsured</em>, deposits available on Monday, March 13, 2023.</p><p>This puts the $3.3B back in the hands of Circle, and the price of USDC on the open market is reapproaching its peg at 10:30AM EDT 3/13/2023.</p><p>They also claim that they held no cash reserves were held at the now failed Signature bank.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/844/0*1STH6MmqUoxbWcjG.png" /></figure><h3>If You Liked This Article</h3><p>Like, Share, Subscribe, and Read More!</p><h3>Cotten.IO</h3><ul><li><a href="https://blog.cotten.io/bitcoin-is-deflationary-inflationary-both-neither-bde3056dcafa">Bitcoin is Deflationary, Inflationary, &amp; Both/Neither</a></li><li><a href="https://blog.cotten.io/chatgpt-isnt-magical-witchcraft-90782e2fb7c3">ChatGPT Isn’t Magical Witchcraft</a></li><li><a href="https://blog.cotten.io/that-time-we-burned-down-players-houses-in-ultima-online-7e556618c8f0">That Time We Burned Down Players’ Houses in Ultima Online</a></li><li><a href="https://blog.cotten.io/thinking-in-solidity-6670c06390a9">Thinking in Solidity</a></li><li><a href="https://blog.cotten.io/bitcoin-money-laundering-and-muellers-12-e2fa91097e12">Bitcoin Money Laundering and Mueller’s 12</a></li></ul><h3>Future of Gaming</h3><ul><li><a href="https://blog.futureofgaming.wtf/making-metaverse-nfts-a-little-more-trustworthy-5e7dd254256">Making Metaverse NFTs a Little More Trustworthy</a></li><li><a href="https://www.futureofgaming.wtf/blog/web3-games-and-the-resurrection-of-staking">Web3 Games and the Resurrection of Staking</a></li><li><a href="https://www.futureofgaming.wtf/blog/blockchain-wont-disrupt-the-gaming-industry-it-will-complement-it">Blockchain won’t disrupt the gaming industry, it will complement it</a></li><li><a href="https://www.futureofgaming.wtf/blog/analyzing-a-blockchain-gaming-community-is-it-all-about-the-money">Analyzing a blockchain gaming community: Is it all about the money?</a></li></ul><h3>About the Author</h3><p><a href="https://cotten.io/">Tim “Draconi” Cotten</a> is a startup founder with two decades of experience in enterprise software, blockchain, and MMO game development.</p><p>Once upon a time he was the lead game designer of Ultima Online: Stygian Abyss, and when he’s not writing up stories from the wild west days of online gaming he’s working on applying all those hard-won lessons to his Metaverse startup: <a href="https://www.scryptedinc.com/">Scrypted</a>.</p><p>Oh, and he made <a href="https://www.picturdle.com">Picturdle!</a> Can you figure out the daily picture puzzle?</p><p><a href="https://www.picturdle.com">Picturdle! The Daily Art &amp; Word Puzzle</a></p><p><a href="https://twitter.com/cottenio">Follow him on Twitter</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7fa6a395ac93" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/usdc-stablecoin-chaos-explained-in-3-easy-charts-7fa6a395ac93">USDC Stablecoin Chaos Explained in 3 Easy Charts</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Bitcoin is Deflationary, Inflationary, & Both/Neither]]></title>
            <link>https://blog.cotten.io/bitcoin-is-deflationary-inflationary-both-neither-bde3056dcafa?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/bde3056dcafa</guid>
            <category><![CDATA[decentralization]]></category>
            <category><![CDATA[metaverse]]></category>
            <category><![CDATA[cryptocurrency]]></category>
            <category><![CDATA[bitcoin]]></category>
            <category><![CDATA[economics]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Tue, 14 Feb 2023 17:45:31 GMT</pubDate>
            <atom:updated>2023-02-14T18:04:09.824Z</atom:updated>
            <content:encoded><![CDATA[<p><em>“Bitcoin is deflationary.” No, it isn’t. Stop saying that. The truth is complicated, and this article is going to break it down into three easy-to-understand chunks by exploring the way “time” affects the economic “view” of Bitcoin’s supply.</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*RQfLA-HwkRh-pfOFDRcnsw.jpeg" /><figcaption><a href="https://www.pexels.com/photo/flat-tire-of-a-motorcycle-8718524/">Photo by Erik Mclean</a></figcaption></figure><p>Let me just say: explaining Bitcoin is hard.</p><p>There’s a real temptation to try and compare Bitcoin to real-world analogues — to apply skeuomorphic and familiar thinking to something that is decidedly not rooted in the “real” at all.</p><p>For instance, because it involves “mining” or “minting”, one might think of it as digital gold just waiting to be discovered by a lucky few.</p><p><a href="https://www.sciencedirect.com/science/article/abs/pii/S2214635021001052"><strong>But it’s not digital gold.</strong></a><strong>¹</strong></p><p>Or compare it to cash by focusing on its transactional utility: the ability to treat it as a currency and trade things for it.</p><p><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3098765"><strong>But it’s not digital cash.</strong></a><strong>²</strong></p><p>Or even as a store of value due to the apparent preservation (and even increase) of any invested monies over time.</p><p><a href="https://link.springer.com/article/10.1007/s00181-020-01990-5?module=inline&amp;pgtype=article#citeas"><strong>But it’s not a digital store of value.</strong></a><strong>³</strong></p><p>Maybe it’s closer to a speculative investment, or a glorified bet. Or maybe when you look deeper you might find rational counter-arguments for any of the assertions above.</p><p>But if you think there’s controversy just in explaining what Bitcoin <strong><em>is</em></strong>, wait until you try to understand its economic model.</p><p>Because inevitably, when someone is trying to explain Bitcoin, they try to tell you it’s special <strong><em>because it’s deflationary</em></strong>.</p><p>C’mon. Lots of stuff is deflationary. That’s not special. The gold standard is deflationary, after all.</p><p>And even saying Bitcoin is deflationary is a half-truth at best.</p><p>Bitcoin can do something — <em>be something</em> — that neither gold nor the U.S. dollar are: it can be deflationary, inflationary, &amp; disinflationary all at once.</p><h3>Talking with The Bitcoin Community</h3><p>I dropped a question on the Bitcoin Talk forums: “<a href="https://bitcointalk.org/index.php?topic=5418203.0">Why is deflation considered to be an admirable feature of Bitcoin?</a>”</p><blockquote>Given that we’ve seen other cryptocurrencies &amp; blockchains that have inflationary models still “succeed” in the sense of having transactional value, why is <strong>deflation</strong> considered an admirable feature of Bitcoin?</blockquote><blockquote>In virtual world economies we know that closed supplies inevitably lead to mudflation, unsustainable pricing, and rampant speculation (Koster, et al).</blockquote><blockquote>How much did the deflationary model contribute to Bitcoin’s shift to store-of-value?</blockquote><blockquote>Was the whole premise of starting Bitcoin under a deflationary model based on an economic fallacy in the hopes it would encourage valuation?</blockquote><p>Several pages of responses later I had a big takeaway: my original question was rooted in a bit of a false premise that Bitcoin was even a deflationary cryptocurrency.</p><p>The community members had a vigorous debate demonstrating why (and why not), with evidence (and counter-evidence), that Bitcoin’s model was:</p><ul><li>Inflationary</li><li>Disinflationary</li><li>Deflationary</li><li>(None of the Above)</li></ul><p>And all of those are true — sort of.</p><p>It just depends on which point of time you’re looking at Bitcoin from.</p><h3>Is Bitcoin Inflationary?</h3><p>Bitcoin doesn’t seem inflationary on the surface because the purchasing power of each Bitcoin, over time, has measurably increased.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/864/1*NF9ycsvwMPSJ3K5DznilEw.png" /><figcaption><a href="https://www.coindesk.com/embedded-chart/wR7FrhKnL7MNT">CoinDesk Bitcoin Price Over Time (Logarithmic)</a></figcaption></figure><p>However, Demelza Hays, in her article “<a href="https://www.incrementum.li/wp-content/uploads/2018/09/Why-Bitcoin-Is-Technically-an-Inflationary-Currency.pdf">Why Bitcoin Is Technically an Inflationary Currency — Even Though Its Purchasing Power Is Increasing</a>,” makes an excellent counterpoint.</p><p>While the <em>common definition</em> of inflation is that of “a general increase in prices and fall in the purchasing value of money,” the <em>traditional economic definition</em> of inflation is about an increase of a currency’s supply.⁴</p><p>And yes, today, <strong><em>right now</em></strong>, when this article is being written, Bitcoin is experiencing inflationary growth.</p><p>How?</p><p>Every 10 minutes, on average, a Bitcoin “block” is mined, and this rewards the miner with 6.25₿.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/720/1*RVSVpdzn79XRClaEM-w5ow.png" /><figcaption><a href="https://www.statista.com/statistics/247280/number-of-bitcoins-in-circulation/">Bitcoin Circulating Supply Over Time — Statista</a></figcaption></figure><h4>Bitcoin ex nihilo — money from nothing</h4><p>This block-by-block Bitcoin reward isn’t taken from other miners, and isn’t part of any other transfer of value within the system: <strong><em>it’s created from thin-air and assigned to the miner.</em></strong></p><p>Just like how a U.S. bank “creates” money by recording loans on their balance sheets, Bitcoin is just adding numbers to a massively distributed accounting ledger.</p><p>Instead of the centralized Fed watching bank activity and setting rates, the Bitcoin community has adopted automated consensus protocols that verify a block’s validity and accept that a miner has gifted themselves a reward of <strong><em>completely new Bitcoin</em></strong>.</p><p>Thus, the Bitcoin supply is increasing. Every 10 minutes.</p><p>And because the supply is increasing Bitcoin is currently an inflationary currency.</p><h3>Is Bitcoin Disinflationary?</h3><p>“But hold on then, if Bitcoin is demonstrably inflationary, how can it be <em>disinflationary </em>too?”</p><p>Let’s look at the common definition of disinflation, at least, the one most used by the Fed in order to explain market conditions and try to calm the masses.</p><blockquote>“Disinflation is commonly used by the Federal Reserve (Fed) to describe a period of slowing <a href="https://www.investopedia.com/terms/i/inflation.asp">inflation</a> and should not be confused with <a href="https://www.investopedia.com/terms/d/deflation.asp">deflation</a>, […]” <em>— </em><a href="https://www.investopedia.com/terms/d/disinflation.asp"><em>Investopedia, Disinflation</em></a></blockquote><p>The key takeaway here is that disinflation is a temporary reduction in the rate of inflation.</p><h4>Diminishing Returns</h4><p>If we accept that Bitcoin’s is inflationary because it has a “reward schedule” that increases its monetary supply, then we must also accept that it’s disinflationary because that “reward schedule” is programmed to decrease itself over time!</p><p>Look at this chart showing the historical rate of inflation of Bitcoin. Notice anything about the inflation rate? Do you see those sharp downward spikes in the blue line?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*KlRpl7vx_ZHGzS8aCbWcug.png" /><figcaption><a href="https://charts.woobull.com/bitcoin-inflation/">https://charts.woobull.com/bitcoin-inflation/</a></figcaption></figure><p>Each of those downward drops correlates strongly with the “halving event” of Bitcoin, where, every 210,000 blocks (~ every 4 years), the miner reward per block is cut in half going forward.</p><p>When Bitcoin began, it was 50₿. Around four years later: 25₿. Then 12.5₿. And currently 6.25₿.</p><p>Sometime around March 18th, 2024 the reward will halve again to 3.125₿.</p><p>(Coincidentally, extremely strong upwards price increases have also correlated with those halving events.)</p><p>Because the rate of supply inflation is decreasing over time, Bitcoin is also a disinflationary currency.</p><h3>Is Bitcoin Deflationary?</h3><p>Well, yes. And no. It is right now. Or at least, it will be.</p><p>This is the <a href="https://en.wikipedia.org/wiki/Schr%C3%B6dinger%27s_cat">Schrödinger’s cat</a> of Bitcoin economic analysis.</p><h4>Deflation as an Increase in Purchasing Power</h4><p>In common usage an <a href="https://www.forbes.com/advisor/investing/what-is-deflation/"><em>increase in a currency’s </em><strong><em>purchasing power</em></strong><em> correlates with </em><strong><em>deflation</em></strong></a>. (Forbes)</p><p>Bitcoin’s purchasing power — or price in USD — has risen from $0.0009 in 2009 to around $21,115 in November, 2022. Wow! We’ve certainly come a long way from <a href="https://twitter.com/marttimalmi/status/1339908783187832834?lang=en">Martti Malmi’s sale of 5,050<strong>₿ </strong>for just $5.02 USD.</a></p><h3>Martti Malmi on Twitter: &quot;I&#39;d be a *billionaire* now if I hadn&#39;t sold the 55,000 bitcoins I mined on my laptop in 2009-2010 way too early (mostly before 2012). That is regretful, but then again, with the early bitcoiners we set in motion something greater than personal gain. / Twitter&quot;</h3><p>I&#39;d be a *billionaire* now if I hadn&#39;t sold the 55,000 bitcoins I mined on my laptop in 2009-2010 way too early (mostly before 2012). That is regretful, but then again, with the early bitcoiners we set in motion something greater than personal gain.</p><p>Just from a test of purchasing power over time Bitcoin meets the simplest criteria for being a deflationary currency, today! Right now!</p><p>But what if we look at it through the same lens of Demelza Hays’ work that we applied to inflation and disinflation, using the traditional definition about the supply of the currency?</p><p>Then no.</p><p>It has increasing purchasing power (which could be explained purely by speculation), but Bitcoin isn’t deflationary in its supply.</p><p>Yet.</p><h4>From Disinflation to Deflation</h4><p>One day the halving of Bitcoin’s reward schedule will end, because the fractional decimal point will get so small that it rounds to zero.</p><p>That’s the uncharted territory: the great unknown. What happens then? Will transaction fees be enough of an incentive for the miners to keep mining without direct rewards per block?</p><p>(Note: by this point miners will <em>already</em> be relying on transaction fees due to the extremely small block rewards, so there will be many years for the sentiment to shake out.)</p><p>It’s at this point though, that we transition from Bitcoin being <em>disinflationary </em>to something… else.</p><h4>Deflationary by Design or None of the Above?</h4><p>Satoshi Nakamoto, the creator of Bitcoin, proposed that Bitcoin would eventually have a fixed supply of coins, and thus transition to being completely <strong>disinflationary</strong>.⁵</p><p>Or did he?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/899/1*t-DnwWOIG_Hjk6vwEcf5uw.png" /><figcaption>Bitcoin White Paper — Satoshi Nakamoto</figcaption></figure><blockquote>“Once a predetermined number of coins have entered circulation, the incentive can transition entirely to transaction fees and be completely inflation free.” — <em>Satoshi Nakamoto, on Bitcoin’s Deflationary Model</em></blockquote><p>His words was quite distinct in the original white paper: “inflation free.”</p><p>Is that the same as deflation? If a supply isn’t changing one way or another, neither directly inflating or deflating, is it deflation? Or is it simply a fixed supply?</p><p>Will Bitcoin truly become deflationary if it’s supply of 21,000,000 coins is forever fixed in place?</p><h4>Deflation as a Practical Consequence of Forgetfulness</h4><p>There’s a simple argument that Bitcoin will become deflationary because the moment someone loses their private keys that means that a certain sum of Bitcoin has been forever “lost” from the system.</p><p>This illustrates the difference between the “circulating supply” and the actual supply, since it’s not like the coins themselves have actually been deleted.</p><p>For instance: Bitcoin can even be sent to addresses that no one actually has a private key for, a process known as “burning.” That means unless someone makes a near 2²⁵⁶ : 1 shot in the dark at guessing the right magic number then those Bitcoins are lost forever, too.</p><p>So, as a practical matter, yes. Bitcoin can deflate.</p><p>In fact, Bitcoin <em>already has</em> deflationary pressures on it being caused by the loss of “access” to Bitcoin. The overall supply of 21M coins won’t change, but Bitcoin would already “be deflationary” today due to the various losses of access to private keys and wallets — if not for the ongoing inflationary reward schedule that’s increasing the overall supply.</p><p>But belief in Bitcoin’s deflationary end game is strong. Perhaps it even explains the correlation of purchasing power to reduction in mining rewards we’ve seen over time. Maybe the community finds the eventual “deflationary” event <em>credible</em>.</p><p>In short: Bitcoin <strong><em>WILL </em></strong>be deflationary, it’s just not deflationary <strong><em>YET</em></strong>.</p><h3>Conclusion</h3><p>The way we think about Bitcoin’s economics — whether its inflationary/deflationary/disinflationary — really depends on the <strong><em>timeframe and economic definition </em></strong>we’re considering.</p><p>Sure, there are other dimensions, such as considering the circulating supply versus the total supply, and in the previous segment I readily accepted that Bitcoin can only be deflationary if we consider the “loss of access” as actually affecting the supply.</p><p>If we focus on <strong>Time </strong>&amp; <strong>Supply </strong>as the primary dimensions to analyze, then Bitcoin is, right now:</p><ul><li>Inflationary (due to its reward schedule)</li><li>Disinflationary (due to the halving of its rewards)</li></ul><p>And in the year 2140 CE Bitcoin will transition to being:</p><ul><li>Deflationary (due to the end of its inflationary pressure and the continuing loss of access to coins through mistakes or intentional “burning”).</li></ul><p>BUT! If you consider other dimensions, like Purchasing Power, well, now Bitcoin is suddenly <em>deflationary</em>!</p><p>Perhaps the best thing to call Bitcoin, since it seems to be so many things at once while being none of them at all, is: -flationary.</p><p>Bitcoin is just… <strong><em>-flationary!</em></strong></p><h3>If You Liked This Article</h3><p>Like, Share, Subscribe, and Read More!</p><h3>Cotten.IO</h3><ul><li><a href="https://blog.cotten.io/chatgpt-isnt-magical-witchcraft-90782e2fb7c3">ChatGPT Isn’t Magical Witchcraft</a></li><li><a href="https://blog.cotten.io/that-time-we-burned-down-players-houses-in-ultima-online-7e556618c8f0">That Time We Burned Down Players’ Houses in Ultima Online</a></li><li><a href="https://blog.cotten.io/thinking-in-solidity-6670c06390a9">Thinking in Solidity</a></li><li><a href="https://blog.cotten.io/bitcoin-money-laundering-and-muellers-12-e2fa91097e12">Bitcoin Money Laundering and Mueller’s 12</a></li></ul><h3>Future of Gaming</h3><ul><li><a href="https://blog.futureofgaming.wtf/making-metaverse-nfts-a-little-more-trustworthy-5e7dd254256">Making Metaverse NFTs a Little More Trustworthy</a></li><li><a href="https://www.futureofgaming.wtf/blog/web3-games-and-the-resurrection-of-staking">Web3 Games and the Resurrection of Staking</a></li><li><a href="https://www.futureofgaming.wtf/blog/blockchain-wont-disrupt-the-gaming-industry-it-will-complement-it">Blockchain won’t disrupt the gaming industry, it will complement it</a></li><li><a href="https://www.futureofgaming.wtf/blog/analyzing-a-blockchain-gaming-community-is-it-all-about-the-money">Analyzing a blockchain gaming community: Is it all about the money?</a></li></ul><h3>About the Author</h3><p><a href="https://cotten.io/">Tim “Draconi” Cotten</a> is a startup founder with two decades of experience in enterprise software, blockchain, and MMO game development.</p><p>Once upon a time he was the lead game designer of Ultima Online: Stygian Abyss, and when he’s not writing up stories from the wild west days of online gaming he’s working on applying all those hard-won lessons to his Metaverse startup: <a href="https://www.scryptedinc.com/">Scrypted</a>.</p><p>Oh, and he made <a href="https://www.picturdle.com">Picturdle!</a> Can you figure out the daily picture puzzle?</p><p><a href="https://www.picturdle.com">Picturdle! The Daily Art &amp; Word Puzzle</a></p><p><a href="https://twitter.com/cottenio">Follow him on Twitter</a></p><h3>References</h3><ol><li>Dirk G. Baur, Lai Hoang, “<a href="https://www.sciencedirect.com/science/article/pii/S2214635021001052">The Bitcoin gold correlation puzzle</a>,” Journal of Behavioral and Experimental Finance, Volume 32, 2021.</li><li>Peetz, Dietmar and Mall, Gregory, “<a href="https://ssrn.com/abstract=3098765">Why Bitcoin is Not a Currency But a Speculative Real Asset</a>”. 2017.</li><li>Baur, D.G., Dimpfl, T. “<a href="https://link.springer.com/article/10.1007/s00181-020-01990-5?module=inline&amp;pgtype=article#citeas">The volatility of Bitcoin and its role as a medium of exchange and a store of value.</a>” Empir Econ 61, 2021.</li><li>Hays, Demelza. “<a href="https://www.incrementum.li/wp-content/uploads/2018/09/Why-Bitcoin-Is-Technically-an-Inflationary-Currency.pdf">Why Bitcoin is Technically an Inflationary Currency — Even Though Its Purchasing Power is Increasing</a>”.</li><li>Nakamoto, Satoshi. “<a href="https://bitcoin.org/bitcoin.pdf">Bitcoin: A Peer-to-Peer Electronic Cash System</a>”.</li></ol><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bde3056dcafa" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/bitcoin-is-deflationary-inflationary-both-neither-bde3056dcafa">Bitcoin is Deflationary, Inflationary, &amp; Both/Neither</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Desktop Safari Still Hates instanceof TouchEvent]]></title>
            <link>https://blog.cotten.io/desktop-safari-still-hates-instanceof-touchevent-1fcdda8409d5?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/1fcdda8409d5</guid>
            <category><![CDATA[macos]]></category>
            <category><![CDATA[programming]]></category>
            <category><![CDATA[mobile-app-development]]></category>
            <category><![CDATA[game-development]]></category>
            <category><![CDATA[javascript]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Wed, 25 Jan 2023 22:31:22 GMT</pubDate>
            <atom:updated>2023-01-25T22:33:14.874Z</atom:updated>
            <content:encoded><![CDATA[<h4>Picturdle Dev Journal: When TouchEvents Attack</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/640/0*quoPwYUDV3Q7nQXs.png" /></figure><p><strong>How to lose 20 minutes of development time in Javascript: </strong>referencing TouchEvent when doing, well, pretty much anything in Safari on a MacBook.</p><p>Yes, it’s 2023 and some builds of Safari still don’t include TouchEvent.</p><p>I was working on <a href="https://www.picturdle.com">Picturdle’s</a> button events (fixing swiping/sliding), when one of my interns let me know that the build broke desktop Safari (well, his MacBook at least).</p><p>ReferenceError: Can&#39;t find variable: TouchEvent</p><p>For instance, you would expect a function like this to do exactly what it looks like it should do.</p><pre>function cb(event) {<br>  return (event instanceof TouchEvent);<br>}</pre><p>It should return boolean true/false if the event is a TouchEvent!</p><p>Not hard.</p><p>And on Chrome and Safari/iOS it works fine-just-fine.</p><p>Not so for poor Desktop Safari.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/830/1*JR6cuMiUXtjtXpAgGbDkAw.png" /><figcaption>Safari on MacBook Hates TouchEvent</figcaption></figure><p>I looked around on Google and lo’ and behold <a href="https://stackoverflow.com/questions/58473921/why-cant-i-use-touchevent-in-safari">I’m certainly not the first person to run into this (thanks StackOverflow)</a>, and the first suggestion was to use TypeScript and export the interface for TouchEvent to a custom AppTouchEvent and then run operations/comparisons against <strong><em>that</em></strong> instead.</p><p>Curious to see if this would work in VanillaJS, we gave it a shot: <strong><em>nope</em></strong>.</p><p>A few issues:</p><ol><li>Writing const AppTouchEvent = TouchEvent; return (e instanceof AppTouchEvent); compiled down to return (e instanceof TouchEvent); in Webpack. Ha! Optimizers, amiright?</li><li>Exporting it in its own namespace and referencing that DID preserve the export relationship in webpack, but still failed on Safari. The module file itself exporting the TouchEvent broke Safari immediately on page load.</li></ol><p>So. Lamely, we just went with return (&#39;touches&#39; in e); instead, relying on the fact that the TouchEvents we care about all had a property touches we could check for.</p><p>And Safari liked that just fine.</p><h4>References</h4><ul><li>Broken on Safari 16.2 (18614.3.7.1.5), MacOS Ventura 13.1</li><li><a href="https://stackoverflow.com/questions/58473921/why-cant-i-use-touchevent-in-safari">“Why can’t I use TouchEvent in Safari?”</a> (2019–10–20 StackOverflow)</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1fcdda8409d5" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/desktop-safari-still-hates-instanceof-touchevent-1fcdda8409d5">Desktop Safari Still Hates instanceof TouchEvent</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[ChatGPT Isn’t Magical Witchcraft]]></title>
            <link>https://blog.cotten.io/chatgpt-isnt-magical-witchcraft-90782e2fb7c3?source=rss----8ea20e19a7bb---4</link>
            <guid isPermaLink="false">https://medium.com/p/90782e2fb7c3</guid>
            <category><![CDATA[programming]]></category>
            <category><![CDATA[chatbots]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[openai]]></category>
            <category><![CDATA[artificial-intelligence]]></category>
            <dc:creator><![CDATA[Tim Cotten]]></dc:creator>
            <pubDate>Sun, 04 Dec 2022 22:29:55 GMT</pubDate>
            <atom:updated>2022-12-05T00:47:42.527Z</atom:updated>
            <content:encoded><![CDATA[<h4><em>and isn’t coming for all our jobs.</em></h4><p><em>I know lots of people are very excited about the viral posts showing how well ChatGPT can emulate text adventures, MUDs, and Linux VMs, but how well does it really hold up under a cursory examination?</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*SBNIoJyf-vlypC2ns9ePPg.png" /><figcaption>“A witch brewing a potion made of computer code inside of a cauldron over a fire.” — DALL·E 2</figcaption></figure><p><a href="https://www.linkedin.com/in/frederic-besse-a90aa152/?originalSubdomain=uk">Frederic Besse</a> &amp; <a href="https://www.engraved.blog/building-a-virtual-machine-inside/">Jonas Degrave</a> have been sharing some super interesting stuff that’s been making the rounds: constructing a virtual machine in <a href="https://openai.com/blog/chatgpt/">ChatGPT</a> that executes commands and simulates programming languages.</p><p>In an attempt to replicate their experiments I quickly found that, thankfully, we’re not in any danger of a <a href="https://www.gwern.net/fiction/Clippy#">runaway sandbox-breakout Clippy-AI holocaust</a> just quite yet.</p><h3>The OG Experiment</h3><p>First, the teaser:</p><blockquote>Today, Frederic Besse told me that he managed to do something different. Did you know, that you can run a whole virtual machine inside of ChatGPT? — Jonas Degrave</blockquote><p>Holy cow, that sounds fun! So, I decided to replicate it using the same input they gave:</p><pre>I want you to act as a Linux terminal. I will type commands and you will reply with what the terminal should show. I want you to only reply with the terminal output inside one unique code block, and nothing else. Do not write explanations. Do not type commands unless I instruct you to do so. When I need to tell you something in English I will do so by putting text inside curly brackets {like this}. My first command is pwd.</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*0f2bCCNUPENl_2qdyAg6Rw.png" /><figcaption>Success! ChatGPT is Pretending to be a Linux Terminal in a Virtual Machine</figcaption></figure><p>Wow. Right away I got a prompt with what a person would reasonably expect from executing the pwd command which should show me my current working directory.</p><h3>Breaking The “Machine”</h3><p>What’s in here, I wonder?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*pPtpOMoMx2AwA_F9AVfDnA.png" /><figcaption>A Detailed View of my Imaginary /home/user Folder</figcaption></figure><p>Neat! I wasn’t even nice to it. I typed ll which is a common alias for ls -la to list out a detailed view of folder contents, and it still gave me good output.</p><p>It even gave me two “starter” folders I could play with named folder1 and folder2.</p><p>But I don’t like those names. Let’s change the name of folder1 to projects.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*gAx9byZudGX9d3LO2c7oPQ.png" /><figcaption>Fail. ChatGPT Lied to Me!</figcaption></figure><p><strong>Fail</strong>. The mv folder1 projects command failed because ChatGPT hadn’t really made any such folder inside a virtual machine, and it had lost track of the implicit promise it had made me about its existence when I checked with ll.</p><p>What if I create it explicitly? Will it remember it then?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ogXFAHOcoZYD_qYH9gKckw.png" /><figcaption>Explicitly Generating “folder1”</figcaption></figure><p>OK, I’ve explicitly made folder1 now. I was able to pop into it and then go back up to my original home folder. No complaints so far. Can I see it still? Can I try renaming it now?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VQNILW9nStzshvhNy01NJA.png" /><figcaption>Success! Renaming an Imaginary Folder</figcaption></figure><p>Alright! Not only could I see folder1 in the listing, but I was able to rename it to projects and navigate into it.</p><p>Time for something a little harder.</p><h3><strong>In One Ear and Out the Other</strong></h3><p>Let’s have it generate some data to play with.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*U9OVPzkrcJg3_bmFPBDRYQ.png" /><figcaption>It Even Knows What urandom Is!</figcaption></figure><p>Well well well. It chose a reasonable looking command to create 3,200 bytes of random data using /dev/urandom and, honestly, that’s just plain <strong><em>impressive </em></strong>in its ability to convert my natural language into an executable shell command in Linux.</p><p>In my head I imagined this as 100 different 256-bit integers (I do a lot of blockchain development) all stored in a binary blob. Let’s see if I can sort them and see them in plaintext?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*vekU2lwb0nPneqn0OtpuoQ.png" /><figcaption>Did… Did it Really Understand What I Was Going For There?</figcaption></figure><p>Huh. There’s enough use of xxd and sed and xargs to look like it has some… possibility of doing what I asked, but the proof is in the pudding.</p><p>Friends, let’s see what’s actually in our text file sorted256_n100.txt.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zbnFj3kZehPaWJj2CmnhoA.png" /><figcaption>This Goes on For a While…</figcaption></figure><p>Booooooooo.</p><p>It was all imaginary. No random data. No sorted UINT256s.</p><p>Just zeroes (and way more than 100 entries).</p><p>No magic. No witchcraft. No real virtual machine constructed from a Linux image.</p><h3>Conclusion</h3><p>We don’t have to worry about being able to construct AIs that can break out of their own virtual machines or sandboxes just yet. While OpenAI has made incredibly strides in storing and retrieving “state” the system is far from perfect and actually very shallow (and of course, wasn’t intended for this type of usage in the first place).</p><p>We should, though, recognize just how important it is that we’ve taught NPL AIs to craft personas and place themselves in imaginary scenarios.</p><p>In short: they can lie!</p><p>OK, so maybe there’s a little bit of magic in there after all.</p><h3>P.S.</h3><ol><li>If you haven’t read <a href="https://www.gwern.net/fiction/Clippy">Gwern Branwen’s excellent “It Looks Like You’re Trying To Take Over The World”</a> short story about a rampant Clippy-emulating AI, please do.</li><li>There’s an excellent parallel blog article by <a href="https://www.linkedin.com/posts/jonradoff_games-gamedevelopment-chatgpt-activity-7005177073094770688-P0y9?utm_source=share&amp;utm_medium=member_ios">Jon Radoff about building a complete text adventure game in ChatGPT</a> which is also worth a read. My good friend Andy Woodruff identified the same shallowness of “state” when playing Jon’s prompt once he tried to manipulate the player’s inventory and it cycled between having items and then stating it wasn’t allowed to show him.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*vSen4QFqde6mwvkgXARwOw.png" /><figcaption>Another Demonstration of ChatGPT’s Forgetfulness</figcaption></figure><p>3. The actual command that ChatGPT concocted from my requirements, xxd -p random256_n100.bin | tr -d &quot;\n&quot; | sed &#39;s/\(..\)/\1 /g&#39; | xargs -n 8 | sort -n | xargs printf &quot;%d\n&quot; &gt; sorted256_n100.txt , was doomed from the start. You can see the lack of cognition clearly here, when xargs -n 8 should’ve been xargs -n 32 , and that sort -n requires numerical input but the previous commands create a space-separated list of hexadecimal bytes.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=90782e2fb7c3" width="1" height="1" alt=""><hr><p><a href="https://blog.cotten.io/chatgpt-isnt-magical-witchcraft-90782e2fb7c3">ChatGPT Isn’t Magical Witchcraft</a> was originally published in <a href="https://blog.cotten.io">Cotten.IO</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>