Appendices (A–G)
Listing 1: IJobEscrow (sketch)
Listing 2: IReputationRegistry (sketch)
Appendix B. Reputation scoring and decay
Let rt ∈ [0, 1]
be the score at job t
. After verdict xt ∈ [−1, 1]
(1
for perfect, −1
for fraud) and decay δ ∈ (0, 1)
,
Fraud: sets xt = −1
and applies multiplicative penalty rt+1 ← κ rt+1
with κ ∈ [0, 1)
.
Tier access: Access to tier j
requires rt+1 ≥ r(j)min
and stake s ≥ s(j)min
.
Appendix C. Example PoPW payloads (JSON schemas)
Listing 3: Envelope
Listing 4: GPS trail leaf
Listing 5: Image hash leaf
Appendix D. Threat model and mitigations table
Threat | Description | Mitigation |
---|---|---|
Replay | Reuse of old evidence roots | Job-specific nonces, freshness windows, beacon challenges |
Signature theft | Session key exfiltration | TEE-protected keys, short-lived sessions, revocation events |
Committee bribery | Bribe subset of oracles | VRF sampling, stake caps, slashable oracles, public audits |
Front-running | Acceptance sniped on-chain | Commit-then-reveal for acceptance |
Censorship | Robot submissions ignored | Multiple oracles, permissionless relays, L2 fallback |
Data misuse | Raw media leaks | Encryption, access logs, legal contracts off-chain |
Appendix E. Glossary
CID: Content Identifier
DID: Decentralized Identifier
TEE/TPM: Trusted hardware for attestation
VRF: Verifiable Random Function
Quorum: Minimum stake-weighted agreement for verdicts
Challenge window (Tc): Period to dispute attestations
Appendix F. Reference verifier pseudocode
Listing 6: Verifier pipeline for area-coverage jobs (sketch)
Appendix G. Monte Carlo robustness sketch
Listing 7: Estimate quorum-capture probability and watcher miss rate
References
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008.
G. Wood, “Ethereum: A Secure Decentralised Generalised Transaction Ledger (Yellow Paper),” 2014.
S. Nazarov et al., “Chainlink: A Decentralized Oracle Network,” 2017.
W3C, “Decentralized Identifiers (DIDs) v1.0,” 2022.
Intel Corporation, “Intel Software Guard Extensions (SGX) Developer Guide,” 2016.
A. Rahman and M. Moresio, “Security Analysis of IoT Sensor Telemetry and Attestation,” 2019.
V. Buterin, “Why and How Rollups,” 2020.
E. Ben-Sasson et al., “Scalable, Transparent, and Post-Quantum Secure Computational Integrity,” 2018.
Y. Dodis and A. Yampolskiy, “A Verifiable Random Function with Short Proofs and Keys,” 2005.
V. Buterin, “A note on slashing conditions,” 2019.
P. Daian et al., “Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability,” 2020.
D. Hardman et al., “DIDComm Messaging,” 2021.