Helium Profile picture
14 Oct, 10 tweets, 3 min read
The other day we shared a thread on the 5 types of work a Hotspot can perform to mine $HNT. Today we take a look at the work of a Challenger in Proof-of-Coverage (PoC).
Challenges are used by PoC to validate wireless coverage. As a Challenger, your Hotspot is chosen by the network to create a challenge, or encrypted multi-layer packet, over the Internet.
The challenge process begins with the Challenger selecting an initial target Hotspot, followed by a group of Hotspots known by the @helium blockchain to be within range of each other as a result of RF witnessing.
These Hotspots are given a multi-layer packet (think an “envelope of envelopes”) that only they can decrypt to prove they are providing legitimate wireless coverage.
The Challenger could be anywhere in the world and does not need to be co-located near other Hotspots. Challenge requests occur every 120 blocks, and if the consensus group accepts the challenge transaction as being valid, the challenge proceeds.
One very cool thing about public key cryptography is that data can be encrypted for decryption by a specific recipient while only knowing the recipient's public key. This allows the Challenger to encrypt each layer of the packet specifically for only certain Hotspots to decrypt.
The Challenger delivers this multi-layered packet via the Internet #p2p network to the first Hotspot in the challenge path.
Once Challengees and Witnesses broadcast and receive the layers of the packet via RF, they send proof they decrypted their layer of the packet back to the Challenger. The Challenger then bundles the receipts together and submits them to the consensus group to be rewarded in $HNT.
The role of the Challenger is similar to something like the role of a client in the @filecoin network. In that case, the client is asking a miner for proof that the file they are storing is still being stored.
In the case of Helium, the Challenger is asking the miners on the network to prove they are still creating network coverage that can be used by devices.

🎙To learn more, listen to this great podcast episode on PoC with @armanhotspot and @amirhaleem: bit.ly/3iStuMR.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Helium

Helium Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @helium

12 Oct
How exactly do Hotspots mine $HNT? You asked. We answer.

The amount of $HNT Hotspots mine depends on the type of “work” they perform based on the value to the network. This validation of network contribution is accomplished by a new work algorithm called Proof-of-Coverage (PoC).
There are 5 types of work a Hotspot can participate in:

1. PoC CHALLENGER: Hotspots are chosen by the network to issue “challenges”, or encrypted messages, over the Internet to a target group of Hotspots. Challenges are used by PoC to validate wireless coverage.
2. PoC CHALLENGEE: Hotspots validate nearby wireless coverage by broadcasting challenges received from challengers using Radio Frequency (RF). The amount of $HNT each Hotspot earns depends on whether any of these RF broadcasts are received by other nearby Hotspots.
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!