Light delayed Proof-of-work

Description of LdPoW Checkpointing mechanism

LdPoW is loosely based on the technology of dPoW created by KMD, the code is completely re-written by the Scala Team.

Essentially with dPoW, you checkpoint the daemons blocks onto another stronger chain (like Bitcoin). However, we didn’t want to “bloat” Bitcoin because we all in the team love Bitcoin and thought that dPoW was just too pollutive towards other networks. We then agreed that the idea of locking a lock with another lock is not the smartest idea, because if one lock becomes weaker than the other, it can create new vulnerabilities.

Deriving from the ideas of dPoW we figured we could probably do better. So we got to work on our own version of dPoW which doesn’t use any other blockchain. Instead, our variant (light dPoW) will use the same database as that of our own blockchain. This will be made possible by a system utilizing the Lightning Memory-Mapped Database (LMDB).

LMDB - Lightning Memory-Mapped Database

This database is incredibly fast and also simple at its core, and with this auxiliary database, we will store checkpoints for all other nodes in the network.

How will we trust these LdPoW nodes?

Every hard fork from the beginning the community will democratically elect 16 members from the community to run and maintain these nodes. Node operators are not required to own a single coin of Scala to run these nodes but should have expertise in the management of servers, and also a basic knowledge of blockchain technology.

In addition, because these nodes are able to be publically monitored, if they try to “cheat” in any way, their action is open to public acknowledgment, essentially undermining the validity of their own well being. And for the services provided by the maintainers of these light dPoW nodes, they will receive 90 blocks worth of rewards daily.