betches6533 1.1.4 → 1.1.5
Sign up to get free protection for your applications and to get access to all the features.
- package/.gitpod.yml +10 -0
- package/.markdownlint.json +5 -0
- package/LICENSE.md +171 -0
- package/Makefile +34 -0
- package/README.md +92 -23
- package/betches6533/README.md +36 -0
- package/betches6533/package-lock.json +4900 -0
- package/betches6533/package.json +27 -0
- package/cd.yml +16 -0
- package/ci.yml +20 -0
- package/figure-1.svg +1 -0
- package/make.yml +94 -0
- package/metadata.yml +78 -0
- package/mk-pantry-accessible.sh +3 -0
- package/package.json +8 -31
- package/pull_request_template.md +9 -0
- package/release.yml +56 -0
- package/tea-main.zip +0 -0
- package/tea.csl +22 -0
- package/tea.yaml +10 -0
- package/white-paper.md +583 -0
- /package/{.eslintrc.json → betches6533/.eslintrc.json} +0 -0
- /package/{next.config.mjs → betches6533/next.config.mjs} +0 -0
- /package/{postcss.config.js → betches6533/postcss.config.js} +0 -0
- /package/{public → betches6533/public}/next.svg +0 -0
- /package/{public → betches6533/public}/vercel.svg +0 -0
- /package/{src → betches6533/src}/app/favicon.ico +0 -0
- /package/{src → betches6533/src}/app/globals.css +0 -0
- /package/{src → betches6533/src}/app/layout.tsx +0 -0
- /package/{src → betches6533/src}/app/page.tsx +0 -0
- /package/{tailwind.config.ts → betches6533/tailwind.config.ts} +0 -0
- /package/{tsconfig.json → betches6533/tsconfig.json} +0 -0
package/white-paper.md
ADDED
@@ -0,0 +1,583 @@
|
|
1
|
+
# Disclaimer
|
2
|
+
|
3
|
+
The information set out in this white paper is of a preliminary nature.
|
4
|
+
Consequently, neither the authors nor any of their respective affiliates assume any responsibility that the information set out herein is final or correct and each of the foregoing disclaims,
|
5
|
+
to the fullest extent permitted by applicable law, any and all liability whether arising in tort, contract or otherwise in respect of this white paper.
|
6
|
+
Neither this white paper nor anything contained herein shall form the basis of or be relied on in connection with or act as an inducement to enter into any contract or commitment whatsoever.
|
7
|
+
|
8
|
+
Nothing in this white paper constitutes an offer to sell or a solicitation to purchase any tokens discussed herein.
|
9
|
+
In any event, were this white paper to be deemed to be such an offer or solicitation, no such offer or solicitation is intended or conveyed by this white paper in any jurisdiction where it is unlawful to do so,
|
10
|
+
where such an offer or solicitation would require a license or registration, or where such an offer or solicitation is subject to restrictions.
|
11
|
+
In particular, any tokens discussed herein have not been, and, as of the date of issuance of this white paper, are not intended to be, registered under the securities or similar laws of any jurisdiction,
|
12
|
+
whether or not such jurisdiction considers such tokens to be a security or similar instrument and may not be offered or sold in any jurisdiction where to do so would constitute a violation of the relevant laws of such jurisdiction.
|
13
|
+
|
14
|
+
|
15
|
+
# License
|
16
|
+
|
17
|
+
The source code[^src] of this paper is available under the Creative Commons Attribution-ShareAlike 4.0 International[^cc] license.
|
18
|
+
|
19
|
+
[^src]: See: @sources
|
20
|
+
[^cc]: See: @cc
|
21
|
+
|
22
|
+
|
23
|
+
# Introduction
|
24
|
+
|
25
|
+
The Internet is predominantly composed of open-source projects and has been since its inception.
|
26
|
+
Over time, many of these projects have become foundational pieces upon which all future innovation is built.
|
27
|
+
And while fortunes have been made from it, open-source is mainly created and maintained without compensation.
|
28
|
+
|
29
|
+
We believe that the entirety of modern human endeavor has been stunted by relying on the smallest percentage of the world's engineers to choose between a salary or keeping the Internet running.
|
30
|
+
Open-source is a labor of love often hindered by a lack of meaningful economic incentives resulting in genuinely worthwhile projects never reaching their potential while others suffer from security issues due to the lack of incentives to maintain software throughout its lifecycle.
|
31
|
+
To fully realize our potential, we need a fair remuneration system for the open-source ecosystem that doesn’t fundamentally change how it is built or utilized.
|
32
|
+
|
33
|
+
Enterprises often wrap business models around open-source, generating revenue directly from the work of the benevolent developers while also relying on them to fix bugs as issues occur.
|
34
|
+
A great example is a recent incident involving a critical security vulnerability in Log4j, a package from the Apache Software Foundation that found its way across many commercial software and services employed by enterprises and governments.
|
35
|
+
In November 2021, a security researcher working for Alibaba Group Holding Ltd. reported vulnerability CVE-2021-44228[^1], which received the highest possible base score from the Apache Software Foundation.
|
36
|
+
Amit Yoran, Chief Executive of Tenable and founding director of the United States Computer Emergency Readiness Team (US-CERT), described this vulnerability as “the single biggest, most critical vulnerability of the last decade”[^2].
|
37
|
+
Panic ensued and the few volunteers who maintained this package came publicly under fire for the failure.
|
38
|
+
After addressing the outrage with a humble plea for fairness, systems got patched.
|
39
|
+
Enterprises and governments eventually realized that Log4j, a package used by a broad range of critical systems for two decades, was maintained by a few unpaid volunteers, the same unsung heroes who sprang into action despite abuse from the industry[^3] and worked tirelessly to address the vulnerability.
|
40
|
+
|
41
|
+
Sadly, Log4j is far from the only example.
|
42
|
+
core-js is downloaded 30 million times per week as the base of every Node.js application, yet it is also barely funded.
|
43
|
+
Recently several bitcoin core developers resigned, citing, among other reasons, a *lack of financial compensation* for their decision.
|
44
|
+
|
45
|
+
There have been multiple attempts at providing incentive structures, typically involving sponsorship and bounty systems.
|
46
|
+
Sponsorship makes it possible for consumers of open-source to donate to the projects they favor.
|
47
|
+
However, picture open-source as a tower of bricks where lower layers are long forgotten, but still maintained by dedicated engineers and relied upon by even more developers.
|
48
|
+
Only projects at the top of the tower are typically known and receive sponsorship.
|
49
|
+
This biased selection leads to essential bricks that hold up the tower attracting no donations, while favorites receive more than they need.
|
50
|
+
Bounties allow consumers of projects to propose payment for developers to build specific features, thus only remunerating projects for doing things not necessarily in their best interest.
|
51
|
+
And again, only rewarding favorites.
|
52
|
+
|
53
|
+
In this paper, we propose tea — a decentralized system for fairly remunerating open-source developers based on their contributions to the entire ecosystem and enacted through the tea incentive algorithm applied across all entries in the tea registry.
|
54
|
+
|
55
|
+
![Simplified view of the tea steeping rewards system.](img/figure-1.svg)
|
56
|
+
|
57
|
+
$\parskip=0pt plus 1pt$
|
58
|
+
|
59
|
+
[^1]: Source: @nist
|
60
|
+
[^2]: Source: @reuters
|
61
|
+
[^3]: Source: @twitter
|
62
|
+
|
63
|
+
|
64
|
+
# Components
|
65
|
+
|
66
|
+
A software developer building an application needs four things: a browser, a terminal, an editor, and a package manager.
|
67
|
+
Of these four, the package manager is what controls the tooling and frameworks a developer needs to construct their product.
|
68
|
+
This layer is where we see the potential to change how open-source is remunerated.
|
69
|
+
|
70
|
+
## The Package Manager
|
71
|
+
|
72
|
+
The package manager knows what open-source software an application depends on to function, from the top of the tower to its base.
|
73
|
+
Every component and version essential to the application is known and recorded.
|
74
|
+
It knows that the top of the tower carefully selects its dependencies and that careful selection continues down.
|
75
|
+
The package manager is uniquely placed in the developer tool stack to enable automated and precise value distribution based on actual real-world usage.
|
76
|
+
|
77
|
+
We propose an immutable decentralized registry designed to distribute value based on an algorithm that determines each entry’s contribution to the system’s utility and health.
|
78
|
+
Value can enter the graph at apex points—apps and essential libraries—and be distributed to the dependencies of those apex points and their dependencies recursively since the registry knows the entire open-source graph.
|
79
|
+
|
80
|
+
Additionally, we believe that material information must be available via the package manager for developers to assess whether they can trust a package and its author.
|
81
|
+
This information may be based on reputation, community kudos, data retrieved from decentralized identity (DID[^4]) systems, other package managers, or incentive mechanisms that potentially rely on network participants putting economic value at risk.
|
82
|
+
|
83
|
+
We predict that tea’s combination of tools, information, and rewards will justly incentivize developers, helping stimulate the growth of open-source software and fostering innovation.
|
84
|
+
|
85
|
+
[^4]: See: @w3
|
86
|
+
|
87
|
+
## The Decentralized Registry
|
88
|
+
|
89
|
+
Every package manager has its own package registry duplicating the same metadata repeatedly.
|
90
|
+
It’s time there was a single, comprehensive and definitive registry designed and governed by the communities that depend on it.
|
91
|
+
This decentralized, immutable registry could provide security, stability and prevent
|
92
|
+
malevolent intent.
|
93
|
+
|
94
|
+
The Internet runs on tens of thousands of vital open-source components.
|
95
|
+
It’s remarkable that thus far, incidents caused by the removal of essential open-source infrastructure have been minimal.
|
96
|
+
The most famous was the removal of an NPM left-pad[^5] dependency in 2016, which cascaded into continuous integration and continuous deployment systems leaving developers high and dry for days.
|
97
|
+
This event demonstrated that the Internet itself is based on fragile systems of development.
|
98
|
+
Other examples involved active or intentional participation from the package maintainers sabotaging their popular packages (See colors.js, faker.js[^6], and node-ipc[^7]),
|
99
|
+
or bad actors looking to profit by pretending to help maintain packages and corrupting them to steal, for example, Bitcoin private keys (See event-stream[^8]),
|
100
|
+
or malicious packages with intentional misspelling errors, also known as typosquatting,
|
101
|
+
in the hope of tricking users into installing them, for example crossenv vs. cross-env NPM packages[^npmjsCrossenv].
|
102
|
+
|
103
|
+
Software integrity needs to be guaranteed as the industry progresses towards a future where digital assets are part of the software.
|
104
|
+
We cannot continue to leave ourselves vulnerable to malicious actors modifying the software.
|
105
|
+
|
106
|
+
Most tools that we call package managers cannot guarantee that these packages built into the apps and dApps are the unaltered open-source code published by their original authors.
|
107
|
+
Microsoft’s GitHub has found that 17% of vulnerabilities in software were planted for malicious purposes[^9], with some remaining undetected for extended periods (See Webmin 1.890[^10]).
|
108
|
+
|
109
|
+
A decentralized registry augmented by a reputation system and supported by economic incentives designed to expose bad actors and reward good actors may provide the guarantees developer communities have been looking for.
|
110
|
+
|
111
|
+
[^5]: Source: @theregister
|
112
|
+
[^6]: Source: @fossa
|
113
|
+
[^7]: Source: @lunasec
|
114
|
+
[^8]: Source: @github
|
115
|
+
[^npmjsCrossenv]: Source: @npmjsCrossenv
|
116
|
+
[^9]: Source: @zdnet
|
117
|
+
[^10]: Source: @threatpost
|
118
|
+
|
119
|
+
|
120
|
+
## The Storage System
|
121
|
+
|
122
|
+
Open-source packages deliver a broad range of functionality, some of which may be restricted or unwanted.
|
123
|
+
Encryption is an excellent example of that.
|
124
|
+
A critical use case for encryption is the support of individuals’ privacy across the globe.
|
125
|
+
Encryption, however, can also be used for nefarious purposes (see Phantom Secure, dismantled by law enforcement agencies in March 2018[^11]) or may be compromised to support law enforcement activities (See Operation Ironside (AFP), Operation Greenlight (Europol),
|
126
|
+
and Operation Trojan Shield (FBI)[^12] where the FBI operated an “encrypted” communication platform, AN0M, and convinced criminals to use their “encrypted” phones for secure communication).
|
127
|
+
|
128
|
+
Encryption’s broad applications have made it a perfect use case for open-source software and a great example that any solution that stores packages must be tamper-proof and censorship-resistant.
|
129
|
+
tea is a decentralized protocol that does not intend to filter or sanction packages based on their functionality.
|
130
|
+
While the tea governance may elect to remove proven malicious packages (see the governance section for more information), it is critical for the tea system to connect with multiple storage systems, including decentralized ones that demonstrate that a package is unaltered and correctly replicated.
|
131
|
+
Package maintainers may choose the storage system best suited for their need to store and distribute their packages securely.
|
132
|
+
|
133
|
+
[^11]: Source: @fbi
|
134
|
+
[^12]: Source: @europol
|
135
|
+
|
136
|
+
# Network Participants
|
137
|
+
|
138
|
+
tea’s mission is to empower open-source communities and ensure their contributors are supported as they create the tools that build the Internet.
|
139
|
+
In this white paper, we distinguish participants through their contributions.
|
140
|
+
Some may contribute code or verify contributed code.
|
141
|
+
Others may provide economic value to support developers and their reputation.
|
142
|
+
|
143
|
+
## Package Maintainers
|
144
|
+
|
145
|
+
Package maintainers must make sure their software continues to deliver increasing value as the industry evolves.
|
146
|
+
|
147
|
+
tea assumes that package creators maintain their work.
|
148
|
+
Package maintainers are pillars of open-source communities who need to be empowered and rewarded for their ongoing contributions.
|
149
|
+
A package maintainer may decide to discontinue their maintenance efforts or realize they cannot operate at a pace that matches the package users' expectations.
|
150
|
+
Package maintainers receive a non-fungible token (NFT) when they complete a package submission (see the maintainer NFT section for additional details).
|
151
|
+
This NFT is used to evidence their work and is the key that directs tea rewards.
|
152
|
+
The holder of a package’s NFT can transfer its ownership to another developer (or group of developers), thus making them maintainers of the package and recipients of any future rewards.
|
153
|
+
Similarly, a developer may decide to take on the role of package maintainer by forking the existing package and submitting a new one which they will maintain moving forward, thus becoming themselves both package creator and maintainer.
|
154
|
+
|
155
|
+
It is essential to provide developer communities with the right tools to determine which packages are being maintained and their past and present maintainers’ reputation and quality of work.
|
156
|
+
We’ve too often seen open-source work being tampered with and the efforts of many ruined by bad actors.
|
157
|
+
Although the work of these bad actors is largely discovered and remediated, it is often not until significant damage has been incurred through financial or data loss.
|
158
|
+
Take for example the EventStream npm package[^13] that was downloaded over 1.5 million times per week and relied upon by over 1,500 packages when a hacker managed to penetrate the open-source project,
|
159
|
+
gain the trust of its original author and modify EventStream to depend on a malicious package that would exfiltrate bitcoin wallet credentials to a third-party server\.
|
160
|
+
Although tools may help detect some of these attacks, they cannot always be relied upon, which creates an entire community dependent upon each other’s diligence and willingness to share their findings.
|
161
|
+
|
162
|
+
We propose introducing incentives via the tea token described in the tea token section, encouraging open-source communities to report their findings constructively, so package maintainers can address them before they are exploited.
|
163
|
+
|
164
|
+
[^13]: Source: @medium
|
165
|
+
|
166
|
+
## Package Users
|
167
|
+
|
168
|
+
Package users are software developers focused on solving a specific problem.
|
169
|
+
They often look in the open-source community for the tools they need to experiment quickly and iterate at very little to no cost, directly benefiting from the work of package creators and maintainers.
|
170
|
+
Traditionally, a subset may have chosen to support package maintainers through donations or other forms of remuneration; however, this has rarely been the case.
|
171
|
+
|
172
|
+
Sponsorship can be an effective system to support open-source development; however, remuneration does not typically extend to all dependencies.
|
173
|
+
This limitation benefits favorites and gets in the way of innovation and software building.
|
174
|
+
To strive as the foundation of software development, open-source must empower all developers, whether beginners or experts, across all layers in the tower.
|
175
|
+
|
176
|
+
tea’s purpose is to maintain the core values of open-source software while providing a decentralized system to remunerate package maintainers for their work.
|
177
|
+
To deliver on this mission, tea intends to develop — and incentivize others to develop — mechanisms for package users to support package maintainers through unique use cases of the tea token, as described in the tea token and future work and potential community effort sections.
|
178
|
+
|
179
|
+
## Package Supporters and Sponsors
|
180
|
+
|
181
|
+
In Web 2.0 and web3, package supporters have often been called “sponsors.” They are organizations or package users who use open-source software to build their commercial products, philanthropists looking to support the ecosystem, or entrepreneurs looking to fund teams to develop components of a larger system.
|
182
|
+
|
183
|
+
tea proposes to extend the communities of package supporters to the entire tea community, whether organizations, developers, users, or tech enthusiasts.
|
184
|
+
tea’s goal is to implement decentralized incentive mechanisms through unique use cases of the tea token for any member of the tea community to contribute to the perpetual sustainability and continuous growth of open-source.
|
185
|
+
Package supporters and sponsors are free to decide which packages or package maintainers they want to support based on their work, beliefs, or any criteria and metric that would influence their decision.
|
186
|
+
Additionally, the support provided by package supporters and sponsors will flow to each package’s dependencies, thus implicitly trusting the package maintainer to make good choices about their stack and using this information to contribute to their reputation.
|
187
|
+
|
188
|
+
Provided that the package maintainer offers such service, a package supporter and sponsor may receive a premium support level NFT in return, thus benefiting from accelerated SLAs or more flexible licensing.
|
189
|
+
Additionally, package supporters and sponsors may decide to support packages or package maintainers and automatically redirect all or a percentage of their rewards to incentivize teams to build new open-source software.
|
190
|
+
In other words, packages don’t need to exist for tea to start pouring in.
|
191
|
+
Nascent projects can be supported just as well as more mature ones, further incentivizing a constantly evolving open-source landscape.
|
192
|
+
|
193
|
+
## tea Tasters
|
194
|
+
|
195
|
+
As new packages or new versions of existing packages are released, the validity of the work needs to be provably demonstrated.
|
196
|
+
This information is critical for package users to decide whether or not to trust both the package and its maintainers.
|
197
|
+
With the tea protocol, this function is provided by the tea tasters.
|
198
|
+
|
199
|
+
tea tasters, typically, are experienced software developers willing to dedicate some of their time to check the claims associated with a package (functionality, security, semantic versioning[^14], license accuracy, etc.)
|
200
|
+
and stake both their reputation and economic value to demonstrate the outcome of their research and analysis and support their reviews.
|
201
|
+
tea tasters receive rewards for their diligence and efforts.
|
202
|
+
At tea, we call “steeping your tea” the action of locking tea tokens to support your reviews and receive rewards (or penalties) based on the consensus on the validity of your reviews.
|
203
|
+
|
204
|
+
Like package supporters, tea tasters can influence a package and package maintainer’s reputation; however, their impact is more significant given their role in validating a package’s security, functionality, and quality.
|
205
|
+
tea tasters will also need to build their reputation to support their claims.
|
206
|
+
The quality of their work and the economic value they put at risk as they steep their reviews combined with other external data sources will build each tea taster’s reputation, bringing more value to their work.
|
207
|
+
See the package reputation section for more details on the mechanisms used to influence a package and package maintainer’s reputation.
|
208
|
+
|
209
|
+
[^14]: See: @semver
|
210
|
+
|
211
|
+
# Protocol Overview
|
212
|
+
|
213
|
+
The design of a protocol to reward open-source contributions is mired with challenges.
|
214
|
+
Open-source software is by definition open to all and can, as a result, be subjected to misattribution, appropriation, or malicious tampering.
|
215
|
+
However, the open-source community has consistently demonstrated its willingness to highlight good actors and expose bad actors.
|
216
|
+
Historically, the energy spent reviewing and commenting on other developers’ contributions has been strictly voluntary, despite how time-consuming and crucial reporting and defending findings may be.
|
217
|
+
|
218
|
+
We intend to create a trustless distribution platform for applications secured by reputation and financial incentives, as we believe adequate rewards for open-source contributions cannot succeed without both a reputation system and the ability for members of the community to communicate their findings and support (or dissent) for a package or the work of a developer.
|
219
|
+
|
220
|
+
We must provide developers with tools to access and contribute to this reputation system.
|
221
|
+
Tools that include simple visual and programmable access to the version and reputation of all dependencies within their packages.
|
222
|
+
A clear understanding of which community members support each package and how many tea tokens they are steeping will contribute to the reputation of each package, just as how much a package maintainer is steeping their work communicates how much they stand behind their work.
|
223
|
+
These combined data points will help inform a reputation system for all community members and facilitate choice.
|
224
|
+
As the EventStream package hack was not conducted through the package itself, but via one of its dependencies, visibility across all layers of dependencies will be vital to building this trustless system.
|
225
|
+
However, considerations such as computation and transaction (“gas”) costs will need to take priority as the system is designed and built.
|
226
|
+
|
227
|
+
Our goal is to reward both Web 2.0 and web3 developers.
|
228
|
+
The intricacies and specifics of each stack make it so that tracking installations and uninstallations of packages could easily fall victim to one or more bad actors.
|
229
|
+
That includes “buying” installations to artificially inflate numbers.
|
230
|
+
An even worse scenario would be introducing fundamental changes to the nature of open-source software by creating unnecessary friction with license keys or other deployment tracking mechanisms.
|
231
|
+
To provide the broadest coverage, we believe that rewards mustn’t rely on a simplistic notion of tracking installations or uninstallations, but rather on incentive mechanisms that encourage the submission of quality packages and the reporting of nefarious or high-risk packages.
|
232
|
+
Lastly, many packages rely on common dependencies.
|
233
|
+
For example, Lodash has 151,209 dependents[^15] while chalk has 78,854 dependents[^16] or Log4js has 3,343 dependents[^17].
|
234
|
+
As more packages are created using the same dependencies, how do we ensure that incentives are distributed fairly and equitably?
|
235
|
+
How do we ensure that the most utilized dependencies are rewarded without starving new or emerging packages and developers?
|
236
|
+
How do we ensure that the incentive system does not end-up steering developers away from niche languages to centralize them where incentives are better?
|
237
|
+
But also, as developers, how do we identify packages with the most dependents to build alternatives - leaner, more efficient, better-coded versions of these packages?
|
238
|
+
At tea, we believe that the lack of incentive has impeded the evolution of open-source software.
|
239
|
+
Supported by the right economic incentives and rewards, more developers will be in a position to build, improve and augment open–source software for the betterment of the world.
|
240
|
+
Only then will the tea token be able to represent the total value of open-source software.
|
241
|
+
|
242
|
+
[^15]: Source: @npmjsLodash
|
243
|
+
[^16]: Source: @npmjsChalk
|
244
|
+
[^17]: Source: @npmjsLogFourjs
|
245
|
+
|
246
|
+
## Package Submission
|
247
|
+
|
248
|
+
The submission of a package release requires multiple transactions to occur atomically.
|
249
|
+
Specifically, the package maintainer must:
|
250
|
+
|
251
|
+
* Register the package (and its semantic version) with the decentralized registry.
|
252
|
+
* Upload the package into the decentralized storage system for resilience, censorship resistance, and ease of distribution.
|
253
|
+
* Contribute to the package’s reputation and trustworthiness by *steeping* tea tokens.
|
254
|
+
|
255
|
+
Failure of any one of the three operations will result in the protocol reverting to its previous state, thus eliminating any evidence of the submission.
|
256
|
+
|
257
|
+
When a package is successfully submitted, the package maintainer will receive a maintainer NFT to evidence their work and contribution to open-source.
|
258
|
+
The package maintainer may transfer the steeping rewards associated with the maintainer NFT to a third party.
|
259
|
+
However, the reputation associated with the creation and maintenance of the asset will remain with the package maintainer, so their reputation can be affected over time.
|
260
|
+
As the reputation of any member of the tea community reaches key milestones, they may be granted access to elevated parts of the protocol or receive accelerated rewards, as decided by the tea governance.
|
261
|
+
For more details on the maintainer NFT, see the maintainer NFT section.
|
262
|
+
|
263
|
+
### Dependencies Analysis
|
264
|
+
|
265
|
+
Package dependencies can run deep, as each package often has both dependents and dependencies.
|
266
|
+
To provide a simple methodology that rewards all developers who have contributed to open-source software while keeping the creation of the dependencies tree quick and computationally efficient, we propose to verify only first-level dependencies upon submission of a package.
|
267
|
+
|
268
|
+
This design is driven by the hypothesis that each dependency is itself a package that was independently submitted to the tea tree.
|
269
|
+
In doing so, each of its dependencies can be mapped, and if its dependencies have dependencies themselves, those will be mapped at the time the dependency package is submitted.
|
270
|
+
|
271
|
+
![Dependencies analysis diagram.](img/figure-3.svg){#fig:dep-analysis}
|
272
|
+
|
273
|
+
|
274
|
+
In @fig:dep-analysis, the submission of package A triggers an analysis of runtime dependencies 1 through n and build dependencies 1 through n, while runtime dependencies 1.1 through 1.n and build dependencies 1.1 through 1.n were analyzed when package B was submitted.
|
275
|
+
We will apply the same methodology for incentive distribution as the steeped tokens are distributed across all dependencies, thus recursively steeping the packages listed as dependencies (see @fig:steeping-rewards).
|
276
|
+
|
277
|
+
![Steeping rewards distribution across dependencies.](img/figure-2.svg){#fig:steeping-rewards}
|
278
|
+
|
279
|
+
|
280
|
+
Versioning and conflicting dependencies are significant challenges, and troubleshooting them can turn into massive time drains.
|
281
|
+
To address this, we propose each package be subject to a comprehensive dependency scan upon submission so we can ensure that the package complies with the following rules for semantic version ranges.
|
282
|
+
|
283
|
+
* Packages may only constrain their dependencies to a major version, though the start of the range can be any valid semantic version (e.g., >=5.2.1 <6).
|
284
|
+
* If a dependency is upgraded to a more recent major version, tea may require that the package’s major version be increased.
|
285
|
+
* Similarly, if a dependency is upgraded to a more recent minor version, tea may require that the package’s minor version be increased.
|
286
|
+
* If a new dependency is added, tea may require that the package’s minor version be increased.
|
287
|
+
|
288
|
+
Considering the unnecessary effort imposed upon any package user when the above rules are transgressed, we propose that a portion of the tea token steeped by the package maintainer be slashed to reflect their lack of due diligence.
|
289
|
+
If a developer forces everyone to juggle their cups, someone will spill some tea.
|
290
|
+
Since the dependency scan is expected to occur at submission, we should note that no steeping from package supporters and sponsors or tea tasters will have happened.
|
291
|
+
|
292
|
+
## Package & Package Maintainer Reputation
|
293
|
+
|
294
|
+
Package maintainers must contribute to their package’s reputation and trustworthiness by steeping tea tokens.
|
295
|
+
However, a reputation system that relies solely on the author’s economic contribution does not provide sufficient user protection and can be subject to Sybil attacks, where a single individual creates multiple representations of themselves to leave a large volume of positive reviews on their work,
|
296
|
+
tricking users into believing their work was reviewed and approved by many.
|
297
|
+
|
298
|
+
Several methodologies are available to prevent Sybil attacks, some of which are described by Nitish Balachandran and Sugata Sanyal in “A Review of Techniques to Mitigate Sybil Attacks”[^18].
|
299
|
+
As tea is a decentralized protocol, using a trust certification system that relies on a centralized certificate issuance authority would be contrary to its core.
|
300
|
+
We propose to focus on decentralized approaches to Sybil attack mitigation and, more specifically, on methodologies that rely on a large group of network participants incentivized to assess and publicly represent the reputation of each package and its maintainer.
|
301
|
+
|
302
|
+
Similar to the production of blocks on a proof-of-stake blockchain, where non-producing nodes can validate the work of others and, when necessary, highlight a violation of the rules of the network, which leads to a penalization of the bad actor through slashing (destruction of a portion of their stake),
|
303
|
+
we propose a system whereby third-parties (aka tea tasters) would be able to review packages produced by package maintainers and be economically incentivized to behave in the best interest of the open-source software community and its users as well as recognize good behavior and penalize bad behavior.
|
304
|
+
This system must be both Sybil resistant and prevent large token holders from materially influencing the protocol or the reputation of specific packages.
|
305
|
+
We believe this approach to be more aligned with open-source, providing a more fertile substrate to foster adoption and trust, and ultimately facilitate the growth of tea.
|
306
|
+
|
307
|
+
[^18]: Source: @arxiv
|
308
|
+
|
309
|
+
## Package Review by Third Parties
|
310
|
+
|
311
|
+
The review of packages by third parties is an essential component of reputation building, however, third-party review has its own set of unique threats including the aforementioned Sybil attacks.
|
312
|
+
|
313
|
+
Blockchain technology, and more explicitly staking, offers a unique opportunity for tea to tackle this challenge.
|
314
|
+
Although wallet addresses may be available in infinite quantities, this is not the case with tea tokens, whose initial supply is expected to be 10 billion.
|
315
|
+
Additionally, each action performed by developers, such as submitting packages, verifying packages, or steeping them, will contribute to their reputation, thus creating a unique profile each developer can use to both contribute to the tea community and participate in tea’s governance.
|
316
|
+
|
317
|
+
By requiring third-party reviewers to steep tea tokens and incur the risk of losing a portion of their steeped tokens should they turn out to behave against the interest of the network or be a bad actor, third parties can provide additional credence to a package and receive a reward, in the form of tea tokens.
|
318
|
+
|
319
|
+
We also propose extending the reputation system to the third parties who perform the independent verification of packages - the tea tasters.
|
320
|
+
The completion of a positive review will require two operations to occur atomically:
|
321
|
+
|
322
|
+
* The submission of the code review, signed by the tea taster and publicly accessible to all members of the community, along with
|
323
|
+
* The act of steeping “for” the package (vs. “against” the package), to substantiate their review.
|
324
|
+
|
325
|
+
The completion of a negative review that includes one or more critical vulnerabilities will require the tea tasters first to contact the package maintainer using a messaging protocol to notify them of the vulnerability and allow them to address the issue in a timely fashion.
|
326
|
+
Upon expiry of the governance-defined period allocated to the package maintainer to address their vulnerability or as the corrected package becomes available, the same messaging protocol will be used to notify all users and testers of this package (including dependents) that a vulnerability has been identified,
|
327
|
+
and hopefully addressed, so they know to update their application or dependencies.
|
328
|
+
To disincentivize wasting developers’ time, communication between the tea tasters and package maintainers will require the tea tasters to steep tea tokens.
|
329
|
+
|
330
|
+
Upon completing both operations, the tea tasters will receive an NFT as evidence of their work on the specific package and package version.
|
331
|
+
The accumulation of NFTs combined with the steeping ratio of each of the packages reviewed and information extracted from external systems will inform a tea taster’s reputation.
|
332
|
+
As their reputation reaches key milestones, tea tasters may earn access to elevated parts of the protocol or accelerated rewards, as decided by the tea governance.
|
333
|
+
|
334
|
+
## Outdated or Corrupt Packages
|
335
|
+
|
336
|
+
tea’s mission is to reward contributors and participants in the open-source communities; however, rewards must be commensurate with the efforts deployed by package maintainers and tea tasters.
|
337
|
+
Under-maintained, outdated, or corrupted packages are clear indications of package maintainers not living up to the community’s expectations or not delivering on the trust and support impressed upon them through the steeping of packages.
|
338
|
+
Another manifestation of outdated packages may be the continued use of a legacy language or legacy version of multi-version languages.
|
339
|
+
Packages remaining outdated or corrupt for too long indicate that tea tasters need to review package maintainers’ work regularly and consistently.
|
340
|
+
|
341
|
+
tea tasters are critical members of the open-source communities in that their reviews and associated claims can steer package users towards or away from packages.
|
342
|
+
To ensure that reviews can be trusted on an ongoing basis, we propose a mechanism whereby outdated or corrupted packages may see a portion of their steeped tokens sent to the tea tasters who were first to recognize the lack of maintenance of any package.
|
343
|
+
|
344
|
+
Any negative review which outlines a flaw such as a zero-day vulnerability or the use of an outdated dependency and remains open past a grace period defined by governance should be considered a failure on the part of the package maintainer.
|
345
|
+
They have not completed the task they were entrusted with and rewarded for.
|
346
|
+
The same can be said for package supporters and sponsors who staked their reputation on the work of delinquent package maintainers and received rewards for it, but failed to identify the lack of maintenance or elected to continue to support the package regardless.
|
347
|
+
|
348
|
+
As packages gain in popularity and usage, with more applications and potentially mission-critical systems depending on them, we must incentivize developers to discreetly report flaws to the package maintainer and package maintainers to address such flaws before they can be exploited.
|
349
|
+
Consequently, we propose that any outdated or corrupted package which is subject to one or more evidenced negative reviews and remains in such state past the governance-defined grace period see a portion of its steeped tokens be slashed regardless of their origin (package maintainer, package supporters, and sponsors or prior tea tasters),
|
350
|
+
while another portion is sent to the tea tasters who submitted the negative reviews.
|
351
|
+
Distribution to all tea tasters could be based on the age of their review and the number of tea tokens they steeped for their review.
|
352
|
+
|
353
|
+
## Maintainer NFT
|
354
|
+
|
355
|
+
Upon successful submission of a package, the package maintainer will receive an NFT to evidence their work and contribution.
|
356
|
+
The holder of this NFT will automatically receive all rewards associated with the package.
|
357
|
+
Package maintainers may transfer maintenance ownership over a package to another package maintainer by simply transferring the package’s NFT.
|
358
|
+
Successful transfer of the NFT will lead to the new owner automatically receiving future package rewards.
|
359
|
+
|
360
|
+
An important part of reputation building relies on the frequency and quantity of quality package submissions.
|
361
|
+
The NFT delivered to package maintainers as evidence of their work may be used by the reputation system to update a package maintainer’s reputation and give them access to elevated parts of the protocol, as decided by the tea governance.
|
362
|
+
However, to prevent attack vectors, such as community members buying their reputation, the transfer of the maintainer NFT will not result in a transfer of reputation.
|
363
|
+
Reputation must remain directly associated with a specific developer’s work and must not be transferable.
|
364
|
+
|
365
|
+
# tea Token
|
366
|
+
|
367
|
+
## Securing the Network
|
368
|
+
|
369
|
+
While many blockchains may appear as effective and secure infrastructure solutions to support tea’s objectives, we believe that careful consideration must be given to the technology stack upon which the tea system is built.
|
370
|
+
|
371
|
+
Scalability, cost-effectiveness, ESG, and third-party extensibility are important design considerations that a tea-sovereign proof-of-stake system could better serve.
|
372
|
+
In proof-of-stake, node operators and network participants stake economic value in the form of the chain’s native token to increase the system’s security.
|
373
|
+
Node operators and network participants receive rewards for the successful production of blocks that comply with the rules of the network and include accurate transaction information.
|
374
|
+
Inactivity (aka node down) or malicious/incorrect activity are penalized by destroying a fraction of the staked tokens through slashing.
|
375
|
+
|
376
|
+
A proof-of-stake system powered by the tea token will allow tea token holders to contribute to the system’s security by *staking* tea and support open-source developers by *steeping* tea.
|
377
|
+
We're fully aware economic factors may prevent some developers from staking or steeping tea; as such, staking and steeping will be available for as little as a leaf, the smallest denomination of tea representing one one-hundred-millionth ($10^{-8}$) of a tea.
|
378
|
+
|
379
|
+
Both applications of the tea token serve vital functions in the support and growth of the open-source ecosystem.
|
380
|
+
Staking tea will ensure that the tea system continues to operate securely, so all network participants can submit and access packages to review them, integrate them into their application, etc.
|
381
|
+
In contrast, the steeping of tea will support tea’s goal of providing tools for all network participants to support and use packages that meet quality and dependability requirements, as formulated by the tea community through their support and dissent of each package.
|
382
|
+
Care will be taken when defining and implementing staking and steeping parameters so one does not become parasitic on the other.
|
383
|
+
|
384
|
+
## Incentives and Penalties
|
385
|
+
|
386
|
+
As discussed earlier, there can be strong incentives for bad actors to compromise open-source software.
|
387
|
+
The majority of the Internet’s critical infrastructure is running on open-source, and the race to find exploits and other vulnerabilities is on.
|
388
|
+
At tea, we believe that package maintainers are not the ones that should be blamed (although they often are).
|
389
|
+
|
390
|
+
tea protocol incentives fix this through a fair and equitable incentive distribution.
|
391
|
+
A package like Lodash with over 151k dependents is a pillar of open-source development, and its maintainer deserves to be rewarded proportionally.
|
392
|
+
However, a reward system built solely on the number of dependents would prevent innovators from disrupting these monopolies unless they are sufficiently funded by third parties or have already accumulated enough resources to self-fund.
|
393
|
+
This approach would likely lead to a shrinking number of contributors, resulting in the polar opposite of what tea is about.
|
394
|
+
|
395
|
+
tea’s goal is to represent the value of open-source software and, in doing so, foster its growth by empowering its participants with the resources they need to pursue their passion unencumbered.
|
396
|
+
The tea incentive distribution system needs to carefully consider the steeping ratio of each package and adjust each package’s incentive accordingly.
|
397
|
+
To reduce the risk of a small number of packages used as dependencies across many applications collecting the majority of steeping rewards, we will leverage the research produced by the web3 Foundation[^19] for the Polkadot proof-of-stake-based rewards mechanism.
|
398
|
+
We may further adjust the implementation and its variables based on the results of practical experiments.
|
399
|
+
|
400
|
+
As a package steep approaches a governance-defined optimum steeping ratio, its steeping rewards ratio will decrease progressively.
|
401
|
+
When a package exceeds its optimum steeping ratio, the steeping rewards ratio will decrease sharply to de-incentivize package supporters and tea tasters from further steeping highly steeped packages.
|
402
|
+
This design could allow lesser steeped packages to become more attractive to both package supporters and tea tasters.
|
403
|
+
It may also incentivize experienced developers to build alternatives to highly-steeped packages, creating an opportunity for the tea community to balance supporting existing software and promoting innovation.
|
404
|
+
The steeping ratio will be calculated using the circulating supply in its initial design.
|
405
|
+
The tea community may alter this design to improve the system’s scalability further.
|
406
|
+
Let $\chi$ be the steeping ratio across all packages.
|
407
|
+
It represents the total number of tea tokens steeped by package maintainers, package users, package supporters and sponsors, and tea tasters divided by the total tea token supply.
|
408
|
+
Given how many open-source packages are available today and their expected growth, $\chi$ will always be a very small value between $0$ and $1$.
|
409
|
+
|
410
|
+
Let $\psi$ be the staking ratio.
|
411
|
+
It represents the total number of tea tokens staked by any network participant to secure the network.
|
412
|
+
|
413
|
+
Let $\chi_{ideal}$ be the steeping ratio we would like each package to attain for a fair distribution of rewards across all packages and their dependencies.
|
414
|
+
The value of $\chi_{ideal}$ must be updated as new packages are added to the decentralized registry, and dependencies are created.
|
415
|
+
To determine the best value for $\chi_{ideal}$, we will use a popularity bell curve updated at the start of each reward cycle.
|
416
|
+
|
417
|
+
Let $\tau = \tau(\chi)$ be the annual steeping interest rate distributed to all tea community members who steep tea tokens to support open-source developers.
|
418
|
+
In other words, $\tau(\chi)$ corresponds to the steeping reward received over a year by a community member that steeps tea tokens for the entire year.
|
419
|
+
|
420
|
+
Let $\gamma = \gamma(\psi)$ be the annual staking interest rate distributed to all node operators and network participants who stake tea tokens to secure the network.
|
421
|
+
In other words, $\gamma(\psi)$ corresponds to the staking reward received over a year by a community member that stakes tea tokens for the entire year.
|
422
|
+
|
423
|
+
Let $\delta$ be the annual inflation directed at the network treasury.
|
424
|
+
$\delta$ may vary as external factors affect the token supply.
|
425
|
+
|
426
|
+
We consider the annual steeping reward rate as a function of $\chi$ and the annual staking reward rate as a function of $\psi$.
|
427
|
+
|
428
|
+
* $\tau(\chi)$ corresponds to the incentive for people to steep a package.
|
429
|
+
As $\chi$ increases, fewer rewards $\tau(\chi)$ are needed.
|
430
|
+
* $\gamma(\psi)$ corresponds to the incentive for people to stake the network.
|
431
|
+
As $\psi$ increases, fewer rewards $\gamma(\psi)$ are needed to secure the network.
|
432
|
+
|
433
|
+
The annual inflation $I$ will be equivalent to $(\tau + \gamma + \delta)$ and calculated as follows:
|
434
|
+
|
435
|
+
$$
|
436
|
+
I = \frac{\textrm{token supply at the end of the year} - \textrm{token supply at the beginning of the year}}{\textrm{token supply at the beginning of the year}} = (\tau + \gamma + \delta)
|
437
|
+
$$
|
438
|
+
|
439
|
+
The contribution to inflation of $\tau_{\textsc{all}}$ (incentive distributed to all package steepers) and $\gamma_{\textsc{all}}$ (incentive distributed across all contributors to the network security) should be weighed to ensure that the system incentivizes the optimal steeping/staking ratio.
|
440
|
+
|
441
|
+
As we focus on the incentives distributed across all package steepers, we determine that
|
442
|
+
$\tau_{\textsc{all}}$
|
443
|
+
is a function of the steeping ratio $\chi$ and therefore
|
444
|
+
$\tau_{\textsc{all}}(\chi) = \chi \cdot \tau(\chi)$.
|
445
|
+
From our previous analysis, we can see that
|
446
|
+
$\tau_{\textsc{all}}(\chi_{ideal}) = \chi_{ideal} \cdot \tau_{ideal}$.
|
447
|
+
Since the goal is to reach a state where
|
448
|
+
$\chi = \chi_{ideal}$
|
449
|
+
, rewards
|
450
|
+
$\tau_{ideal}(\chi)$
|
451
|
+
should be maximal at that value.
|
452
|
+
|
453
|
+
Let $\tau_{ideal} = \tau(\chi_{ideal})$
|
454
|
+
be the reward rate delivered by the network at the ideal scenario where
|
455
|
+
$\chi = \chi_{ideal}$.
|
456
|
+
|
457
|
+
Let $\tau_{0}$ be the limit of $\tau_{\textsc{all}}(\chi)$ as $\chi$ goes to zero when no members of the tea community steep any packages.
|
458
|
+
The value of $\tau_{0}$ should be close to zero but not zero to incentivize early adopters.
|
459
|
+
As suggested by the web3 Foundation’s research, we propose that:
|
460
|
+
|
461
|
+
* the inflation function grows linearly between $\chi = 0$ and $\chi = \chi_{ideal}$, and
|
462
|
+
* it decay exponentially between $\chi = \chi_{ideal}$ and $\chi = 1$.
|
463
|
+
|
464
|
+
We chose a similar exponential decrease for $\tau_{\textsc{all}}(\chi)$ because it implies an exponential decrease of $\tau(\chi)$, and we want rewards to fall sharply beyond $\chi_{ideal}$ to prevent a single package from receiving all the rewards.
|
465
|
+
|
466
|
+
The decay is defined so that the inflation rate decreases by at most 50% when $\chi$ shifts $d$ units to the right of $\chi_{ideal}$ – i.e.
|
467
|
+
$\tau_{\textsc{all}}(\chi_{ideal} + d) \geq \tau_{\textsc{all}} \cdot 0.5$.
|
468
|
+
|
469
|
+
We propose the following interest rate and inflation rate functions, which depend on the parameters $\chi_{ideal}$, $\tau_{ideal}$, $\tau_{0}$ and $d$.
|
470
|
+
|
471
|
+
\begin{align*}
|
472
|
+
&\tau_{\textsc{all}}(\chi) = \tau_{0} + (\tau_{\textsc{all}}(\chi_{ideal}) - \tau_{0})\frac{\chi}{\chi_{ideal}}\enspace\textrm{for}\;0 < \chi \leq \chi_{ideal} \\
|
473
|
+
&\tau_{\textsc{all}}(\chi) = \tau_{0} + (\tau_{\textsc{all}}(\chi_{ideal}) - \tau_{0}) \cdot 2^{(\chi_{ideal}-\chi)/d}\enspace\textrm{for}\;\chi_{ideal} < \chi \leq 1
|
474
|
+
\end{align*}
|
475
|
+
|
476
|
+
Just as good actors need to be rewarded; bad actors need to be identified and penalized.
|
477
|
+
Open-source software provides many opportunities for bad actors to create pain points and reputational risks for an entire community of developers.
|
478
|
+
From the misappropriation of work to the alteration and redistribution of software packages, or the injection of nefarious code, the war between good and bad actors goes on, often with well-funded bad actors who see the contamination of open-source packages as an opportunity to benefit financially.
|
479
|
+
The downside has been relatively minimal, with packages potentially banned from digital shelves or subjected to a poor reputation.
|
480
|
+
|
481
|
+
We propose introducing a slashing mechanism to establish a more material downside that directly affects bad actors’ economic value.
|
482
|
+
As tea tasters evaluate and analyze the code in newly submitted packages, we suggest tea tasters receive the tools and incentives to pinpoint and highlight nefarious code so package users can be made aware of the risks, and package maintainers, package supporters, and sponsors are penalized for submitting or supporting nefarious code.
|
483
|
+
To that extent, for all evidenced negative reviews performed per the network rules and which have been addressed by the package maintainer within the governance-defined period, the package maintainer should not incur any penalty contrary to the package supporters and sponsors or the tea tasters who provided a positive review of the package in question.
|
484
|
+
For negative reviews performed per the network rules and that the package maintainer has not addressed within the governance-defined period, a fraction of the tokens steeped by the package maintainer, the package supporters and sponsors, and previous tea tasters will be slashed.
|
485
|
+
Another fraction will be locked into an insurance pool controlled by the tea governance.
|
486
|
+
The tea governance will establish policies and rules in close collaboration with the community to distribute the pool’s contents to those affected by vulnerabilities.
|
487
|
+
The protocol will distribute a third fraction of the steeped tokens across all tea tasters who contributed to the negative review and steeped against the package, based on the number of tea tokens they steeped “against” the package and how long their tokens have steeped.
|
488
|
+
In other words, the sooner one or more tea tasters identify and report the flaw according to the rules of the network, the higher the reward they will get for supporting safe and productive open-source development.
|
489
|
+
|
490
|
+
To prevent community members from randomly voting “against” highly steeped packages hoping to receive the majority of any penalty, all tea tokens steeped “against” will not be rewarded with inflation and may be subject to a decay mechanism, thus reducing their value over time.
|
491
|
+
|
492
|
+
[^19]: Source: @web3
|
493
|
+
|
494
|
+
|
495
|
+
# Governance
|
496
|
+
|
497
|
+
Governance is critical to the development, sustainability, and adoption of any distributed system.
|
498
|
+
|
499
|
+
We propose that tea includes on-chain governance where all tea token holders can suggest and vote on changes to critical parameters weighted by token ownership and reputation.
|
500
|
+
These parameters could include inflation, transaction fees, staking rewards, steeping rewards, or optimum steeping ratio.
|
501
|
+
This functionality will ensure that critical parameters can evolve and be optimized over time by members of the tea community.
|
502
|
+
We anticipate governance will launch with a simple structure and progressively expand as the tea system matures, facilitating adoption and ensuring progressive decentralization.
|
503
|
+
|
504
|
+
Some system parameters may not be subject to governance or support high-frequency changes to reduce the attack surface represented by governance.
|
505
|
+
A progressive transition of parameters to open, decentralized governance will ensure the stability and predictability of the system.
|
506
|
+
|
507
|
+
|
508
|
+
# Third-Party Extensibility
|
509
|
+
|
510
|
+
As we build the initial tools to ignite the long-overdue support of the open-source communities, we believe part of our mission is to ensure that third parties can extend the overall toolset.
|
511
|
+
In addition to providing the infrastructure for developers to build extensions to the protocol, including new ways to innovate and further the support of open-source developers, our plans include the potential for other package managers to contribute to the protocol.
|
512
|
+
The dreams and efforts of open-source developers have built the innovation that supports our everyday life.
|
513
|
+
We look forward to discovering the new uses and extensions for tea proposed by the tea community.
|
514
|
+
|
515
|
+
|
516
|
+
# Future Work and Potential Community Efforts
|
517
|
+
|
518
|
+
As the tea system matures, we foresee the community deciding and contributing to alterations and extensions of the tea system through governance.
|
519
|
+
Below are some ideas that we believe may inspire some.
|
520
|
+
|
521
|
+
## tea Wholesalers
|
522
|
+
|
523
|
+
Open-source software communities are vibrant and constantly looking to innovate and deliver value.
|
524
|
+
This dedication and altruism lead to the constant building of new software and packages, each one pulling dependencies.
|
525
|
+
As a result, we anticipate the dependencies map to evolve constantly, leading to frequent changes to the steeping ratio and rewards.
|
526
|
+
In the future, the tea community may propose the development of a system designed to dynamically monitor the steeping ratio for each package and rebalance how package supporters steep their tokens based on their own criteria.
|
527
|
+
|
528
|
+
## Royalties on Package Transfer
|
529
|
+
|
530
|
+
We recognize that package maintainers may decide to transfer their steeping rewards stream to one or more developers.
|
531
|
+
The governance of such transfer must remain the decision of the package maintainer and their partners, with no interference from tea.
|
532
|
+
Tools will need to be provided for such transfer to be total or partial (perhaps through only a portion of the steeping rewards being redirected to one or more developers, while the remaining rewards continue to flow to the original package maintainer)
|
533
|
+
and for the steeping rewards to flow through a single account controlled by a single network participant, multiple network participants, or automatically distributed across multiple accounts using static or dynamic ratios.
|
534
|
+
|
535
|
+
## Rewards Distribution Across Multiple Maintainers
|
536
|
+
|
537
|
+
The maintenance of a package can rely on the work of one more team of developers.
|
538
|
+
Before steeping rewards start to flow, teams should consider automating the distribution of steeping rewards amongst themselves.
|
539
|
+
How the distribution occurs must be decided by the maintainers themselves, as they are in the best position to evaluate who contributed and how they should be rewarded.
|
540
|
+
|
541
|
+
To accomplish that, each team (or teams) could set up their own decentralized autonomous organization (DAO) and either automate the distribution of rewards or deploy more complex systems to determine the adequate rewards distribution based on external factors such as a vote from all DAO members,
|
542
|
+
or time-based distributions based on continuous contribution, successful completion of bounties, etc.
|
543
|
+
|
544
|
+
## Handling Package “Forks”
|
545
|
+
|
546
|
+
We believe that forks are essential and largely under-utilized.
|
547
|
+
Forks can be an effective tool for developing packages that compete in functionality, performance, security, and even attention.
|
548
|
+
As useful as they may be, forks must recognize the original efforts.
|
549
|
+
Through future work or potential contributions, the tea community may enhance the system to require forks to be declared, perhaps even detected when a package is submitted.
|
550
|
+
Undeclared forks revealed by tea tasters may result in a portion of the steeped tokens being slashed, transferred to the original package maintainer, and sent to the tea tasters who revealed the fork.
|
551
|
+
|
552
|
+
## Runtime vs. Build Dependencies
|
553
|
+
|
554
|
+
tea may not distinguish build dependencies from runtime dependencies when distributing steeping rewards at launch.
|
555
|
+
However, provided the tea community feels strongly about making such a distinction, the tea community may propose enhancements to the steeping rewards distribution algorithm to account for the criticality of each dependency and their contribution to the value of the packages that depend upon them.
|
556
|
+
These proposals would be voted upon and implemented based on the community’s decision.
|
557
|
+
|
558
|
+
## Usage-based Remuneration
|
559
|
+
|
560
|
+
As more applications are built using packages registered with tea, the community may augment the reward algorithm so that allocation may be influenced by external attested datasets such as usage.
|
561
|
+
This update to the rewards mechanism could allow for a higher allocation of tea token rewards to flow towards packages with the highest usage while still respecting the constraints of the steeping ratio described in the tea token section.
|
562
|
+
Package maintainers could use a similar approach to distribute steeping rewards across their dependencies based on the transparent logic of their choice.
|
563
|
+
Note that all information used to affect the distribution of rewards across packages and dependencies in the tea system will need to be provably reliable.
|
564
|
+
|
565
|
+
|
566
|
+
# Acknowledgments
|
567
|
+
|
568
|
+
This white paper would not exist without the support and dedication of many teaophiles.
|
569
|
+
The authors would like to acknowledge Josh Kruger, Jadid Khan, and Jacob Heider for their contribution to the tokenomics and the many discreet individuals who volunteered their time to provide feedback on the contents of this document.
|
570
|
+
|
571
|
+
$\parskip=0pt plus 1pt$
|
572
|
+
|
573
|
+
# Glossary of Terms
|
574
|
+
|
575
|
+
| Term | Definition |
|
576
|
+
|------|------------|
|
577
|
+
| Leaf | The smallest denomination of the tea token. A leaf corresponds to one one-hundred-millionth ($10^{-8}$) of a tea. |
|
578
|
+
| Slashing | The action of penalizing steepers or stakers in response to behavior contrary to the network rules. |
|
579
|
+
| Staking | The action of locking tea tokens to secure the proof-of-stake network upon which the tea system is built. |
|
580
|
+
| Steeping | The action of locking tea tokens to support your claim and receive rewards (or penalties) based on the consensus on the validity of your claim. |
|
581
|
+
|
582
|
+
|
583
|
+
# References
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|