Ontology and DAD to build Blockchain Advertising Ecosystem

Today Ontology, a new distributed trust collaboration platform, declared its strategic coollaboration with blockchain digital advertising platform DAD
26 June 2018   1232

Both partners are aimed to co-create a blockchain-based internet advertisement platform for establishing a new advertising trust system. Ontology’s public chain basic services, high-performance customizable blockchain framework, smart contract tool SmartX, and other technologies will be implemented with the DAD advertising platform.

This will increase mutual trust amongst advertisers, online traffic, and customers. Also, Ontology scenarios such as human and object multi-factor identification and authentication, as well as distributed data collaboration and exchange, can set up comprehensive personal profiles, drive the improvement of precise injecting and targeting technology, and enable advertising information to reach people who really need it. Finally, this will further onboard data and make transactions more transparent, increase users’ sharing revenue, and ensure fair and reasonable advertising transactions.

Nowadays, the digital advertising industry is facing the lack of trust amongst participants, therefore, the demands for highly-effective advertising algorithms, strong anti-cheat systems, distributed ledgers, and data onboarding are pressing. The technologies that Ontology provide will effectively facilitate solutions to these pain points and boost the digital advertising industry with more efficiency and convenience; at the same time, this cooperation is a broader extension of Ontology’s real economy strategy. We look forward to shape a new blockchain internet ecosystem with DAD.
Jun Li
Founder, Ontology

DAD (Decentralized Advertising) is a new generation blockchain digital advertising platform. The firm have serviced more than 110,000 advertisers, including Baidu, Alibaba, Meitu, 360, Uber, Toutiao, Huobi, OKEx, Cobo Wallet, etc. With blockchain technology deeply reforming the advertising industry, it lets users take full control of their own data privacy and choose the advertisements they want to see. DAD also presents a token incentive scheme, which enables clients reap the benefits of their data usage and be 100% beneficiaries of advertising revenues.

Potentional Vulnerabilities Found in ETH 2.0

Least Authority have found potentional security issues in the network P2P interaction and block proposal system
26 March 2020   1026

Technology security firm Least Authority, at the request of the Ethereum Foundation, conducted an audit of the Ethereum 2.0 specifications and identified several potential vulnerabilities at once.

Least Authority said that developers need to solve problems with vulnerabilities in the network layer of peer-to-peer (P2P) interaction, as well as in the block proposal system. At the same time, the auditor noted that the specifications are "very well thought out and competent."

However, at the moment there is no large ecosystem based on PoS and using sharding in the world, so it is impossible to accurately assess the prospects for system stability.
Also, information security experts emphasized that the specifications did not pay enough attention to the description of the P2P network level and the system of records about Ethereum nodes. Vulnerability risks are also observed in the block proposal system and the messaging system between nodes.

Experts said that in the blockchains running on PoS, the choice of a new block is simple and no one can predict who will get the new block. In PoS systems, it is the block proposal system that decides whose block will fall into the blockchain, and this leads to the risk of data leakage. To solve the problem, auditors suggested using the mechanism of "Single Secret Leader Election" (SSLE).

As for the peer-to-peer exchange system, there is a danger of spam. There is no centralized node in the system that would evaluate the actions of other nodes, so a “malicious" node can spam the entire network with various messages without any special punishment. The solution to this problem may be to use special protocols for exchanging messages between nodes.