TECHNOLOGY

Merit believed whole-heartedly in the power of simplicity and making digital currency approachable to non-technical users. But that didn’t mean that we didn’t take the underpinning technology seriously. In fact, the most elegant and usable solutions are often the most challenging to build. From our approach to mining to our upcoming roadmap features, this section of the site covers the technical thinking behind some of the core concepts in Merit.

MINING

The Merit approach to mining was one of its core innovations. The design goals with the Merit mining system were as follows:

A more level playing field
Instead of favoring the financial and technical elite, Merit strove to allow people from any background to benefit.

Better for the planet
Instead of utilizing huge amount of power and producing large amount of heat, Merit strove to be just as secure while running cool and on less power.

Computer-Free
Instead of requiring users to have a personal computer, Merit strove to be truly accessible to all users worldwide, including those that only have smartphones.

To accomplish this, the Merit team invented Growth Mining. This new concept redefined how mining happens in a network: instead of only focusing on security, Merit mining covered both security and stewardship of the network. (For additional information around mining, read our Mining Primer here.)

To do this well, Merit considered a number of possible solutions.

CHANGING THE CONSENSUS ALGORITHM

First, the Merit team considered changing the consensus algorithm. This is the algorithm used by all the nodes on the network to choose to the winner of the ‘block generation’ award known as a Coinbase. (Different than the wallet/exchange provider with the same name.) The most common consensus-algorithm today is known as Proof-of-Work (PoW), which was introduced originally by Hashcash and later popularized by Bitcoin.

Proof-of-work involves all of the nodes on the network working to solve a computational puzzle. The difficulty of this computational exercise varies over time, and scales in proportion to the total compute power on the network at any given time. The first node to find a valid solution to this mathematical challenge earns the right to create the next block and earn the mining reward for it. This PoW approach helps to secure the blockchain by making it computationally expensive to falsify data. Furthermore, the more miners there are on the network, the lower the probability is that any one miner will win. Without being able to reliably win, a bad actor attempting to falsify data would be hard-pressed to meaningfully gain an advantage in the system.

There are a number of competing consensus algorithms adopted by other currencies, with the next most popular being Proof-of-Stake (PoS). Proof-of-Stake does not rely on computational puzzles to choose the creator of the next block. Instead, this node is chosen by a combination of their total wealth (in the form of the currency) and the amount of time they have held it. (Also known as Coin Age.)

The positives with Proof-of-Stake are largely related to it being less CPU-intensive, and thereby less power-hungry and better for the planet. The negatives are related to security and the vulnerabilities it creates on the blockchain. Because there is no technical cost to falsifying the data (like there is with Proof-of-Work), it is possible that a bad actor (with a large stake) could meaningfully impact the system negatively, even if they are economically incentivized not to do so.

Merit created a new approach to distributed consensus called Proof-of-Growth (PoG). Proof-of-Growth operated with similarities to Proof-of-Stake, but didn’t simply reward people for their own wealth. It instead, took into account a node’s impact in growing the network through bringing in new members to the community. In essence, it considered not only the amount of Merit a user had, but also the Merit that they helped to bring into the network by inviting new members.

CHALLENGES WITH CHANGING CONSENSUS

Digging deeply into changing the consensus algorithm yielded a number of significant challenges. First and foremost, the risks to security felt less than ideal. While it is true that users in PoS and PoG systems have an economic incentive not to hurt the currency, the notion of it being easier to attack the system was unacceptable to the Merit team. Relying on a bad actor to have rational motivations did not feel like enough. Further, a bad actor might be able to compromise the account of a good actor, and therefore gain a possible foothold from which to attack the network.

Perhaps the biggest criticism of Proof-of-Stake (and transitively, Proof-of-Growth), is the nothing-at-stake problem. This problem manifests when nodes in the system break into multiple factions, creating what is known as a “fork” of the blockchain. Typically, these forks exist temporarily until all the nodes reach consensus that one is more accurate and valid than the other. From an incentives point-of-view, miners have the highest expected value if they mine on both forks of a chain. This way, they will earn the reward no matter which fork wins out in the end. Because there is no computational cost in mining both chains, economically-interested miners could unknowingly perpetuate false data without knowing it.

Further, because there is no significant computational cost to create blocks in PoS systems, there are other possible vulnerabilities. Malicious actors could generate a chain of blocks that is far ahead of the current block height (by millions of blocks, even). Without proper safegaurds in place, the other nodes may go along with this being the longest valid chain. While proponents of PoS algorithms argue that the chance of attack in these systems is still very small, any level of additional risk over PoW was concerning to the Merit team.

Finally, Proof-of-Growth could have fuzzy consensus problems, especially in extreme race conditions. Because PoG goes much further than simply taking into account one members coin-age, deciding on who should create the next block can get tricky when large amounts of Merit are moved from account to another. Say, for example, that one user sends 1,000,000 MRT from one account (referred by Miner A) to another account (referred by Miner B), if that transaction has not yet propagated to all nodes on the network, they may disagree about which Miner has the right to create the block.

Merit created a proof-of-concept of the Proof-of-Growth algorithm. The early simulations, testing, and discourse within the team, led us to strive for a better approach.

GROWTH MINING: THE BEST OF BOTH WORLDS

After building more than one prototype, running simulations, and thinking critically about how to construct a fair system, the Merit team found that the most robust solution would be to combine the power of Proof-of-Work with a robust mechanism of rewarding ambassadors for growing the network. The driving principle here was the notion that we did not need to compromise security in order to provide better incentives than PoW mining does.

The secret here was to continue to use Proof-of-Work as the standard for high-security and scalability, while changing the way that rewards get distributed in each block.

REWARDING THE TWO MOST IMPORTANT BEHAVIORS

The power of this approach was that Merit could reward those who were most impactful to the growth of the network while maintaining an inclusive reward ecosystem. The key here was to understand that PoS and PoW fundamentally incentivize different things. PoW incentivized users to get as much compute power as they could, which helped to make the network more secure and resilient to attacks. PoS, on the other hand, incentivized users to buy as much of the currency as they could and hold it.

Either approach could make a credible argument that its incentive system is better for the overall community. Merit believed that, ultimately, both of these core sets of incentives was good for the community. Any good ecosystem wants to have both very high-security as well as stewards who help make the community better through their actions. One should not come at the expense of the other.

FAIRNESS, WHILE PRESERVING OPENNESS TO ALL

As a result, only the wealthiest would earn the large mining reward. The obvious challenge with this approach is the dynamic of the rich getting richer. The compound effect here is that the wealthiest people can simply pull away from the pack, making it very difficult for regular members of community to earn any kind of reward.

The Merit approach worked to incentivize both security and stewardship, all while rewarding more users in the process and making the playing field more level. With Merit, the creator of the each block was chosen based on finding the winning solution to a cryptographic puzzle (Proof-of-Work). The cryptographic puzzle was based on an innovative algorithm that was more friendly to users with normal PCs, instead of favoring those with large data centers and application specific hardware. The mining reward was split between the miner and selected ambassadors, allowing many people to earn a reward each block.

Ambassadors were chosen based on who helped to grow the Merit network the most. This selection was done as a lottery each period, with the most impactful ambassadors essentially earning more tickets to the lottery. This lottery-based approach helped to provide great community-focused incentives, while still ensuring that even modest growth activity was rewarded.

TOP-NOTCH SAFETY

The power of utilizing proof-of-work was that Merit never sacrificed safety in order to create these powerful new rewards.

Whereas in Proof-of-Stake, the winner of the block is chosen by their amount and age of wealth (stake), Merit chose the creator of the block based on winning the cryptographic puzzle through Proof-of-Work. As such, Merit got to enjoy the most powerful approach to securing a blockchain, while rewarding stewardship and growth of the community.

Perhaps what was most exciting about this innovative approach to mining was that it laid a foundation for even more powerful incentives. Because the Merit network was invite-only, and the blockchain kept track of each user’s invites, the positive impact of each member was known to the others in the community. The Merit protocol could be hardened further by utilizing this information to break ties or resolve disputes about valid chains, adding an even more significant layer of security atop the already robust PoW approach.

CUCKOO CYCLE: A GAME CHANGING APPROACH TO POW

Not only did Merit innovate by incentivizing both traditional miners securing the network as well as ambassadors who help to grow the network, it innovated in the way that work was proven by security-focused miners.

It used the Cuckoo Cycle as its Proof-of-Work algorithm. Cuckoo powerfully combines a memory-bound algorithm with graph-theoretic Proof-of-Work. There are many benefits to being memory-bound, and perhaps chief among them is the impact on our planet. Unlike a CPU-bound algorithm that would require maxing out the capacity of a CPU, creating more heat and utilizing a lot of electricity, a memory-bound approach only requires enough compute power to saturate the memory of a machine. This results in less power consumption, less heat dissipation, and more accessibility to individual miners who are not part of large corporate initiatives.

Perhaps the most powerful part of cuckoo is that it retains this memory-bound graph-theory approach, all while preserving high-speed verification. In other words, the graph-theoretic proofs take a significant amount of time to find, yet are verified nearly instantly by other peers on the network. This is perfectly suited to the Proof-of-Work use case.

CPU-bound approaches, which currently comprise the supermajority of PoW systems today, have seen a technological arms race in recent years. Top miners have build large data centers and have funded the production of super-powered application-specific chips for these intense computational exercises. These innovations, while increasing the total security of their respective PoW systems, come at the expense of individual miners without multimillion dollar budgets to procure this kind of hardware.

From a mathematical perspective, proofs take the form of a length 42 cycle in a bipartite graph with N nodes and N/2 edges, with N scalable from millions to billions and beyond. This makes verification trivial (and fast): compute the 42x2 edge endpoints with one initialising blake2b and 84 very cheap siphash-2-4 hashes, check that each endpoint occurs twice, and that you come back to the starting point only after traversing 42 edges. This happens to make Cuckoo Cycle, unlike Hashcash, relatively immune from Grover’s quantum search algorithm.

There has yet to be any kind of ASIC for a memory-bound Proof-of-Work approach. And, our hope was that such an ASIC would not yield a significant advantage over a normal system because commodity hardware is already quite well-suited for a memory-bound approach. This, combined with the power of growth mining, served to create a more level playing field in the Merit ecosystem. Miners could earn Merit without a huge investment in hardware. And, in the case of ambassadors, no hardware was even required to earn rewards.

Vaults

Safety was a critical pillar of the Merit community. To create a digital currency that is approachable by real people, Merit needed to provide non-experts with a way to keep their money safe. The primary challenge to accomplish this was the decentralized nature of digital currencies. The core design goals of the vaulting protocol were as follows:

Preserving the Power of Decentralization - The perceived safety that we’ve come to expect from traditional currencies and banks comes in the form of a central source of power that will make things right. While relying on a similar dynamic would have made vaulting easier-to-implement, it would have broken the integrity of a truly decentralized system.

Being Easy to Use - One of the most challenging things about cryptocurrency today is how difficult the best-practices of security and safety are to implement. Even for technical experts.

Practical, but Optional - One of the most freeing things about digital currencies is that they put the user back in control of their own money. Merit aimed to preserve that freedom, while providing users with the ability to enhance their security if they choose to.

The Foundation for More - While vaults were a powerful security feature in their own right, they could be the foundation for so much more. Merit believed that many practical personal and business applications to currency could stem from the building blocks of Vaults.

X

Merit is invite-only. You can apply for an invite below and get an answer from the Merit Community in less than 15 minutes.

- or -

Already have an invite? Get one of our easy-to-use wallets below!