Since the recent changes in the SafeNet project are so large that they will most likely significantly reduce the requirements for energy consumption, it is worth starting a discussion about the energy efficiency of SN.
Important - The definition of performance and efficiency.
First of all, it should be noted that the issue is efficiency, not energy performance, and that is the fundamental difference - performance is how effectively a system can achieve its goal, while efficiency is how much resources are used to achieve that goal.
To determine energy efficiency, you need first understand what affects them - It can be assumed, that there will be three main elements:
1. How much energy will SafeNet use for its operating activities?
Operational activities of Safe Net means:
- maintaining data storage and transfer resources (hard drive capacity and bandwidth consumption),
- maintaining the necessary amount of data copies (data replication and deduplication),
- serverless network of distributed nodes operating on the basis of network consensus, based on a very efficient Proof-of-Resource mechanism (CPU power and sufficient bandwidth),
- a payment system based on Digital Bearer Certificates (DBC), ensuring fast, direct payments without the intermediation of a central mint (including network fees using Safe Network Token),
- automated, secure real-time software updates (with self-checking system to protect against malicious updates).
The estimation of the energy consumption necessary for SN operational activity, will be a basic component of the efficiency of the entire network.
2. Will SafeNet work as efficiently as ant colonies?
From the beginning, @Dirvine and the team intended to use the best solutions created by nature in the project, following the example of the most efficient creatures and organization, which are ants and ant colonies.
Currently, scientists agree in their studies that, apart from numerous unique features of ants, the efficiency of anthills is the result of… inactivity of the vast majority of ants according to the less is more principle or the Pareto principle.
Depending on the size of the colony, this number is from 60 to 80% of workers and is mainly related to the limited capacity of the tunnels, but also to the rotational organization of the teams’ work.
If it is possible to determine to what extent the SN could map the functioning of anthills, it will be possible to estimate the energy consumption related to the transfer of portions and data backups.
3. How much power consumption does network security require?
An integral element of SN is privacy and security, which by default includes:
- self-authentication of users (authentication data is never stored on the network),
- hiding the client’s IP address and encrypted communication throughout the network (from the first connection to the SN),
- division of files into parts, sending them to different locations and self-encryption (only having a data map allows you to read the file),
- multi-level encryption (used, for example, in direct messages or when creating a public profile),
and in addition, several other functionalities that overlap each other, increasing the level of network security.
Estimating the energy consumption necessary to achieve the main goal of the project (absolute privacy and data security) will show us the energy consumption of the security system.
However, this does not mean that this is the energy cost of security, because SN will inherently avoid many hacker attacks, and this also means saving energy that would be used to try to break security.
Examples of attacks that will be practically impossible or very difficult include:
- Sybil attack - distribution of nodes, encryption, hidden location and migration of portions as well as detection of malicious nodes makes the attack very expensive in terms of energy (and not only), and the larger the network, the more expensive,
- DDoS - an attack of many computers on the network would prove ineffective because there would be no central point of attack, and the cost of energy would be very significant,
- Man in the Middle - an attempt to forge the browser’s certificate will be impossible because the Safe browser is built into the system,
- Malware - a group of various programs that, similarly to a Brute Force attack, aims to identify data access data, damage system functionality, delete data, open the door to further attacks or block the computer, will have a very difficult task and will consume a lot of energy trying defeat security.
Of course, there are many more elements affecting the energy efficiency of SafeNet, such as energy consumption by various software languages (once @happybeing posted very interesting links to information on energy efficiency and I hope that he will bring them to the discussion).
So please correct me where I am wrong and I am asking for your ideas for estimating the energy consumption of the SN.