About - Eä Mining Federation

Once upon a time, miners could work in solo mining mode. With the exponential increase in complexity, their work in solo mode has become extremely risky.

This predetermined for them actually mandatory participation in joint mining on centralized pools. Both options have their advantages and disadvantages.


Disadvantages of working in a centralized pool:

Block holding
(block hiding)
Different amount of remuneration
in different pools
Decision delay,
leading to damage to the pool
Understatement of payments
of ordinary miners
Retention of the block commission by the pool
to distribution participants of only newly issued coins for the found block among participants
Dominance of big players
and their private agreements with pool owners on special conditions and the resulting risks of injustice for small and medium-sized pool participants

The main advantage of solo mining is fairness - the correspondence of the reward to the work done. The advantage of centralized pools is the stability of the income received.

With the advent of the Eä blockchain, miners have a new unique opportunity - combining the advantages of solo mining with the advantages of working in a pool.


Disadvantages of Solo Mining

The main disadvantage of solo mining is the low probability of finding a block and getting a reward.

Advantages

Blockchain Eä creates a transparent and comfortable ecosystem for miners.

Justice
Blockchain Eä returns the mining and cryptocurrency market to the original idea of equality based on decentralization. We consider this the main and most important value of participating in Blockchain Eä. People barely believe in justice, because they see that at some point in any market, one way or another, large players begin to dominate and dictate their unspoken rules. Blockchain Eä is changing this practice and working towards a civilizational shift towards equality and fairness through the power of blockchain technology.
Transparency
A distinctive feature of Blockchain Eä is the fixation in the blockchain for each miner of all the potential solutions he has found that can become a block. This ensures absolute fairness in the calculation of remuneration.
Anonymity
Blockchain Eä is a network of anonymous pools. Unlike most centralized pools, working on someone else's pool or deploying your own does not require anyone's permission, consent, registration, or the provision of any personal data. It is enough to set up your miners on an already existing pool on the network or deploy your own personal node directly near the working equipment.
Benefit
The decentralized network of self-sustaining pools does not charge any fees. According to the consensus adopted by the participants, the network distributes the transaction percentage and thereby motivates the participants themselves for their contribution to maintaining the operation of the network and for good luck in finding the block. Everyone can claim and receive additional income for their active life position in the network.

Solution Architecture

All network nodes are independent entities. Not all nodes are involved in generating templates for work, but a small part of them. They publish them online with constant updates.
When creating their local work, each miner includes in it a link to all the current shares that he saw at that moment.
If a share has a complexity higher than that given by consensus, then it becomes the basis for a "snapshot" header that stores all other shares mentioned in it in the pool chain.
The length of the chain is not limited by the protocol, it starts from the genesis and ends at infinity.
Deduplication is applied to the chain to reduce the amount of stored and transmitted data. Full synchronization is required for node operation.
The chain of snapshots is organized so that an arbitrary third party can rebuild and recheck the solutions for all the shares mentioned in them. Snapshots refer to their ancestors, just like blocks do in the Bitcoin chain.

Network Diagram

Creating And Distributing Templates

Network rules:

  • New templates are sent to all nodes.
  • Each node collects the found solutions into a block.
  • Each node selects the appropriate Proof of Work difficulty for its block.
  • Once such a Proof of Work hash is found, this block is sent to the network to all nodes.
  • Nodes accept a block only if all decisions in it are correct and fully verified.
  • Nodes express their agreement with the new data by working on creating the next block in the chain and using the hash of the previous block and the new template as a basis.
Template created
by this node
Template created
by this node
Block found
this miner
nodes/pools
miners
templates that the node makes

The longest chain will always be considered correct, and the nodes will work to lengthen it. If two nodes simultaneously publish different versions of the next block, then one of the other nodes will receive one version earlier, and someone else. In this case, the nodes will work on the node that was received first, but keeping the other branch of the chain in case it becomes longer. The final decision will come as soon as a Proof of Work is received for a new block that will continue any of the branches, and those nodes that were working on the disputed branch of the chain will switch to the correct one.

PPLNS Accrual System
With A Window Length Of 7 Days

The element of luck (chance) of the pool is important in the short term and levels out in the long run.

Therefore, it is important that miners remain active participants in the network for as long as possible. To do this, the network uses a smoothed proportional distribution PPLNS (Pay Per Last N Shares) with a window length of 7 days in the past from the current time, the most efficient for both the pool and stable miners. The participant's payment is calculated as a proportion of the sum of the products of all his shares, multiplied by their complexity, stored in the network's blockchain for the last seven days relative to all the saved shares of all participants, multiplied by their complexity. Payments occur after the pool (node) finds the next block.

BTC blocks
EÄ Blocks
History
Present
Future
History
Present
Future
After finding the block by us - payments to all miners
Previously recorded work is taken into account
Recorded work in EA, but does not count
Speed
The current implementation allows you to check snapshots at a rate of approximately 300 per second on a MacBook Pro M1, which is approximately 20,000 times faster than the average snapshot rate. That is, the complete verification of the work solved by the network in 1 year will take approximately 1 hour.}
Storage
A rough estimate of the minimum average chain growth rate would be 35-50 gigabytes per year. The presence of a complete chain in the public domain allows you to run the PPLNS calculator at any selected time interval, and not just in the present. You can see what distribution of the reward was and between whom, at an arbitrary moment in the past.
Security
The architecture of the solution implies the technological separation of the P2P working network of nodes and the interface stratum. This makes it impossible to attack from outside, including the “man in the middle”, namely, from the hashrate theft scheme, in which the attacker intercepts the miner’s shares and presents them as his own in order to steal payouts.

Security

Critical solution nodes provide high availability against any th/reat or attack on the network.

P2P
DB
Work
Stratum
P2P
DB
Work
Stratum
Connector/Bridge

Архитектура решения подразумевает технологическое разделения P2P рабочей сети нод и стратум интерфейса

P2P
P2P
Chain
Work
PORT
Work
Solutions
Stratum
Worker
Worker
Worker
Worker

To increase the level of information security, a digital signature management solution was implemented similar to the work of certification centers.

The traditional pooling model maintains a level of confidentiality where only the parties involved and a trusted intermediary have access to information. The need to publicly announce all transactions precludes this method, but privacy can still be maintained by keeping the public keys anonymous. Public information will be that someone has found a hash, but no information linking a particular hash to a particular person.

Conclusion

Eä Mining Network is a collaborative mining system that is not based on trust. The construction of the structure began with a description of the main problems of centralized pools. We have solved this problem by means of a peer-to-peer network and a Proof of Work scheme to record the public history of all the shares found. Attempts to attack the network, without having most of the resources of the network, to change old records, become computationally impracticable. The network is reliable in its unstructured simplicity. All nodes work independently with little coordination among themselves. They do not need to be identified, as the messages are not routed to any specific location, and are delivered only following the "least cost" principles.