PANDA-MINER White Paper
PANDA-MINER White Paper
PANDA-MINER White Paper
1.3 USDT,TRX...............................................................................................................................8
2
Chapter V The PANDA Token Release....................................................................................33
4
3
Chapter I Birth Background Overview of the Project
Blockchain is to use block chain data structure to verify and store data, use
distributed node consensus algorithm to generate and update data, use
cryptography technology to ensure the security of data transmission and
access control, and use the intelligence composed of automated script
code. A new distributed infrastructure and computing paradigm that uses
contracts to program and manipulate data. At present, the blockchain is
called by many large institutions as a major breakthrough technology that
completely changes the business and even the operation mode of the
institution. In the fields of finance, Internet of Things, philanthropy, health
care, agriculture, supply chain and other fields, more and more enterprises
and institutions have begun to explore the application prospects of
blockchain in the industry, and plan a data circulation roadmap based on
blockchain technology.
Private chain: The access and exit permissions of each node are
controlled internally, usually for internal data management and auditing in
a specific organization.
5
2、 The characteristics of blockchain
characteristics:
Open, transparent and traceable: The written block content will be backed up
to each node, each node has the latest copy of the complete database and all
record information is public, and anyone can query it through the public
interface block data. Each transaction in the blockchain is solidified into the
block data through chain storage, and at the same time, all transaction records
of all blocks are processed by superimposed HASH digest processing through a
cryptographic algorithm, so it can be traced back to any transaction history.
6
1.2 Blockchain development trend
Blockchain will have a huge impact on the existing economy and society, and is
expected to reshape the form of human Internet activities. The recent
development trends of blockchain mainly include the following aspects:
First application model upgrade: In view of the balance between the security
of the public chain and the increasing transaction volume on the capacity of
the existing network, the application fields of the blockchain in the future will
be dominated by alliance chains, private chains or hybrid chains. The Bitcoin
model increases the maintenance cost of the blockchain network and is not
fully applicable for low-value, low-risk transactions. Taking into account the
improvement of efficiency and security, the future will be composed of
consortium chains, private chains, or a hybrid chain composed of consortium
chains and private chains.
7
The fifth asset digitization: In addition to transforming tangible assets in
society into digital smart assets for right confirmation, authorization and
real-time monitoring, blockchain can also be applied to intangible asset
management in society, such as intellectual property protection, domain name
management, Points management and other fields.
1.3USDT,TRX
(TRX) is the TRON coin. TRX coin is the official token that drives the TRON
network. TRON will serve as a universal credit platform for the global
entertainment network, marking users’ entertainment behavior through TRX,
and finally sharing the credit data with the entire TRON network. web
applications.
8
1.4 P A N D A m i n i n g
PANDA mining Invest in TRX and USDT to participate in DeFi lossless mining,
0 risk,The new blockchain data management and calculation model for stable
income improves the DeFi ecosystem. Through the total value produced by
each user node, liquidity node mining does not have any pre-mining and
incremental behavior of reservation and pre-mining, all ETH users provide chain
liquidity, all of which will be passed through smart contract nodes Perform
automatic lock-in of income. At present, you can participate in the mining of
the new generation of nodes according to the TRX and USDT you hold. At the
end of the total revenue earned through streaming node mining,The system
divides TRX and USDT tokens to wallet addresses specified by each user.
9
Chapter 2: About PANDA Company
The core members of PANDA company come from top Internet and financial
companies. The platform has a professional financial-grade transaction
structure and a self-developed high-concurrency memory matching transaction
engine, which is non-destructive DeFi financial management, zero risk, and high
-yield annualized rate, welcome global investors to join!
10
2.2 PA N D A Ce r t i f i c a t e an d Li c e n s e
Certificate
US company certificate
11
MSB
12
2.3 PANDA Advantage and Profit
Advantage
Most individual miners do not have the resources to build large mining
facilities with thousands of GPUs and ASICs. Mining pools allow miners to
combine their computing resources to increase their chances of mining a block.
If anyone in the pool successfully mines a block, the reward will be distributed
to everyone in the pool in proportion to the computing power they contributed
to the pool
13
This has caused many people to worry that the computing power is in the
hands of a few nodes, which greatly reduces the degree of decentralization and
contains risks. This is also a topic of frequent debate in some autonomous
communities. Some coins reject the participation of ASIC or even GPU by
adjusting the algorithm, just to ensure the decentralization of nodes.
14
Profit
15
Chapter 3: PANDA scenarios for application
The PANDA system has Turing completeness, and the central database opens
all data through API interface. PANDA system will be built to accommodate all
exchanges, exchange platforms, and applications. It contains digital assets,
mainstream virtual currency trading platform, electronic exchange platform
sweep payment, global mall, etc. It is a block ecological platform that takes
landing new energy application solutions as the core and realizes the landing of
other offline physical industry applications and online circulation transactions by
extending new energy industry.
Comparing the security, yield and stability of various platforms through contract
evaluation, it is always the choice for users.
Choose the best platform to implement the mining strategy to help users obtain
higher returns.
Revenue logic: Monitor and compare key indicators such as security dynamics,
yields, and liquidity of each platform.
All mining reward tokens are automatically converted into the principal
deposited by the user to realize automatic reinvestment in mining, the maximum
16
3.2 PANDA Yield treasure
24-hour trading market: The digital asset trading market is open 24 hours a day,
which is the most obvious difference between the stock market and the digital asset
trading market, and it is also the most troublesome difference for ordinary investors,
because the market can not rest, but people cannot stop. rest.
1. Data
3. Alpha Discovery
4. Alpha Combination
5. Portfolio Construction
6. Trading
The success of the strategy requires ensuring that each step of the process is
successful, as shown in the following diagram:
17
3.3 NFT mortgage lending
As we all know, the liquidity of NFT assets is the core pain point of the industry,
and the liquidity solution is the KA (Killer Application) of the entire industry. A mature
NFT asset solution needs to address both NFT asset pricing and settlement (clearing).
In the current PANDA system, through NFT mortgage lending, combined with the De
Fi income aggregation protocol, it helps any two users on the platform to interact
directly without a third party to complete the NFT and asset pricing, settlement, and
Through the combination with the De Fi protocol, it helps users to obtain the double
return of NFT loan interest and asset liquidity income on the PANDA platform.
18
3.4 PANDA Smart Account and One-Click Borrowing
De Fi Smart Account (DSA), is an up grade able smart contract account. Users can
manage assets that exist in multiple lending agreements through a smart account.
When you use the PANDA lending zone agreement, you need to create a Defi
smart account first. Each account is unique, and the default manager is the creator's
wallet address. Users can create multiple Smart Accounts. Users can add/remove new
managers for smart accounts to suit more application scenarios.
1. One-click deposit and loan: Complete the deposit and loan operations in one
transaction.
3. Leverage strategy: When you judge that the price of your collateral will rise,
you can choose to buy more collateral by adding leverage to gain more income.
4. De-leveraging strategy: Quickly convert your collateral into debt assets and
repay debts through strategies to reduce the risk of account liquidation.
5. Replacing the collateral: Exchange the current collateral for other collateral to
obtain a higher mortgage rate or deposit income.
6. Debt replacement: Convert the current debt tokens to other debt tokens in
one transaction to obtain lower borrowing costs and higher mining returns.
19
3.5 PANDA Token exchange
The transaction function can realize rapid exchange between assets, that is, after
users create a smart account, they only need to deposit one token to obtain other
tokens through the transaction function.
All transactions are done through mainstream DEX protocols. The platform does
not charge any transaction fees except that the DEX agreement itself needs to charge
transaction fees.
This difference between the current market price and the expected fill price is
called price impact. Since AMM calculates the current market price based on the ratio
of the two token reserves, this market price only shows the marginal token price that
AMM wants. In reality, however, traders typically buy and sell multiple tokens at once,
each costing more than the previous, creating a price impact.
(2) Slippage
The offset of the price in the trade pair between trade submission and execution,
this slippage setting is used in all trade/swap operations including strategies. For the
safety of our users, we do not allow more than 10% slippage.
20
Chapter 4 Technical Scheme
4.1Design Principles
The technical design program is organized around four main design principles.
Compatibility principle
Protocol layer: In this layer, it represents the core content of the blockchain.
That is, the underlying technology generally referred to in the market today. It
includes the structure of data storage, consensus algorithm, encryption mechanism,
network communication protocol and so on. All of these contents are wrapped to
this layer as operations, and upper-layer calls are provided in the form of APIs or
services.
Extension layer: The extension layer is similar to the V layer in the traditional
MVC architecture and handles part of the business logic. Smart contracts are built
on this layer. Therefore, at this layer, we can extend blockchain technology to
various scenarios through smart contracts, such as AI artificial intelligence, VR/AR,
IoT <IOT>, ERP/MES, big data <Bigdata>, cloud Platform <Cloud> can be
implemented here.
21
Application layer: The application layer is oriented to end users. For those
who have been exposed to virtual currency, various "electronic wallets" belong to
this layer. However, in practical applications, due to the limitations of blockchain
technology itself. The development of the application layer should not only meet
the needs of users, but also take into account the logic and technical requirements
of the extension layer and the protocol layer. This leads to a blockchain
development project that will require more complex teamwork.
From the above architecture, it can be found that the blockchain technology
may have different programming languages and independent computing
logic in each architecture layer. At the same time, it is necessary to cooperate with
the encryption algorithm requirements of the business itself, etc., which will form a
complex cooperation process. Behind it, a complete business logic is required to
meet the real needs of the market.
The PoW consensus mechanism represented by Bitcoin and Ethereum can well
ensure the security of the blockchain system in the decentralization scenario. The
51% computing power attack threshold makes the saboteur need to pay a huge
price. However, the energy consumption caused by the calculation in the PoW
mechanism is too large, especially for the public chain with huge ecological volume,
which seriously violates the concept of new energy and also increases the cost of
business operation.
Some new public chains propose to replace the PoW mechanism with the PoS
consensus mechanism, which essentially determines the mining difficulty based on
the coin value or coin-day value owned by the node. Shorten, improve
performance, reduce energy waste, such as the POS consensus mechanism for
betting on consensus results in the Ethereum Casper proposal.
22
- consensus by large mining pools than the PoW and PoS mechanisms. The
DPoS consensus mechanism has been verified to be reliable and efficient after
a long period of operation on some public chains.
The PANDA main chain has completed the architectural design work,
which is determined to be written in C + + language and uses STL and
Boost as the underlying development library, supports Linux and Windows
platforms, and adopts SHA256 digest algorithm and ECC encryption algorithm.
The core data is stored and smart contracts are executed in a
decentralized way, and the trustworthiness of data and contract fulfillment is
guaranteed by the technology of blockchain synthesis.
23
At the same time, PANDA will adopt an appropriate chain
coordination mechanism to effectively ensure the effective and reliable transfer
of consensus and value among the internal parallel chains and with other public
chains.
Computational sidechains
In PANDA, the Computational Sidechain (CSC) has a DSC-like structure, also linked
by hashes, and also contains block headers, transaction sets, PANDA
network contracts, and data distribution. Transactions still use the Merkle tree
structure. The client sends a computational request to the network, and the
request propagates through the network.. When a task is completed, the working
node sends an acknowledgement to the Computational Sidechain (CSC) to update
the task status and receive a reward.
Solvers and verifiers in the Computational Sidechain (CSC) will load code and
data into the PANDA Virtual Machine (DVM) and execute the code in the PANDA
Virtual
24
Machine (DVM), which includes parallel computing tasks and verification tasks. A
node that computes a sidechain (CSC) needs:
Check whether the data and code related to the task are valid;
In the PANDA blockchain network: the "main chain" constitutes the backbone
of information, and information is exchanged between different parent
chains through link-by-link protocols. At the same time, a main chain carries
different isomorphic sub-chains, and these sub-chains are distributed
ledger implementations of a vertical field or multiple clusters of different
industries. The communication between sub-chains is realized by the cross-chain
communication protocol. Through the sharding of the blockchain, the
transaction processing capability of the blockchain system is improved. Compared
with a single blockchain system, the chain cluster system can increase the
transaction processing capacity linearly by connecting multiple sub-chains.
Transaction requests enter different sub-chains through the allocation of chain
routes, which can effectively avoid centralized requests for one sub-chain. In
addition, we can deploy clusters with different numbers of nodes of
homogeneous sub-chains on the link route. For
25
homogeneous chains, clusters with multiple nodes will have relatively high security,
and clusters with fewer nodes will have higher processing speed. quick. In addition,
according to different requirements such as the number of nodes, geographical
location, business classification, etc., different chain clusters are deployed, and
requests are distributed to suitable clusters for processing according to different
needs, which helps the chain network to deploy flexibly according to business
needs and provides users with higher quality. blockchain services.
2、 Distributed storage
News reports of data breaches over the past few years have shown us that
between 2005 and 2017, the frequency of such breaches increased by as much as
10 times. The process of distributed storage protecting data makes data leakage
more complex than the methods currently used in data centers. In the
PANDA platform, the concept of Decentralized Storage Network (DSN) is
introduced. Data network aggregated storage served by multiple independent
storage providers and self-coordinates to provide data storage and data retrieval
to clients. Based on blockchain technology, all data is sharded before being sent
to tenants of hard drive space (or users), each shard being sent to a separate
node. Even if someone had the key, it was already hard to find all the pieces. and
even if several shards disappear, archives can still be retrieved and new shards
redistributed. Storj tries to keep data safe even if many farming nodes are
compromised. Assuming that will happen sooner or later, developers are now
taking the system to heart. This also makes PANDA's download storage speed at
least 10 times faster than normal.
26
3. Consensus mechanism - POC
The modular design of PANDA supports the replacement and plugging of all
core functional modules including the consensus mechanism. The main chain
adopts the credit consensus mechanism POC (Proof-Of-Credit) by default.
Anyone can participate in the blockchain network, each device can act as a node,
and each node is allowed to obtain a complete copy of the database. Based
on a consensus mechanism, the nodes jointly maintain the entire blockchain
through competitive computing. If any node fails, the remaining nodes can still
work normally.
4. Smart contracts
27
like Javascript. These bytecodes do guide the functionality of the blockchain so that
code can easily interact with it, such as transferring cryptocurrency and recording
events. The execution of the code is automatic: either it executes successfully, or all
state changes are undone. This is important because it avoids situations where the
contract is partially executed (for example, in a security purchase transaction, the
security owner has transferred the security, but the cryptocurrency payment
transfer has failed). This is especially important in a blockchain environment, as
there is no way to undo the bad consequences of an execution error (and there is
simply no way to reverse a transaction if the adversary doesn't cooperate).
Blockchain-based smart contracts can not only take advantage of the low-cost
and high-efficiency advantages of smart contracts, but also avoid malicious
behaviors that interfere with the normal execution of contracts. Write the smart
contract into the blockchain in a coded form, and use the blockchain technology to
achieve traceable, transparent and non-tamperable data storage, reading and
execution processes. In addition, the state machine system constructed by the
consensus algorithm of the blockchain can make smart contracts run efficiently.
(4) For smart contracts that interact with external data of the blockchain system,
the influence of external data sources should be limited to the scope of the smart
contract and should not affect the overall operation of the blockchain system.
28
5. Sandbox and Seccomp
6. Transaction
The PANDA system has a built-in transaction abstraction layer, and almost
all functions of the core system are built on transactions, such as transfers,
voting, application stores, deposits and withdrawals, etc. Sidechains themselves
can also implement their own different types of transactions. The difference
between transactions is mainly the transaction type and the asset. The data
structure of the basic transaction is as follows, and the extension part will be
stored in different asset tables according to different types.
29
-In voting transactions, for example, a votes entity is ates to a underlying
transaction by transaction id.
7. Grading Nodes
At the same time, asymmetric encryption of public and private key pairs is also
used in the blockchain to build trust between nodes. The asymmetric encryption
algorithm consists of a corresponding pair of unique keys (that is, the public key
and the private key). Anyone who knows the user's public key can use the user's
public key to encrypt the information and achieve secure information interaction
with the user. Due to the dependency between the public key and the private key,
only the user who holds the private key can decrypt the information, and any
30
unauthorized user or even the sender of the information cannot decrypt the
information. The encryption function component has the following functions:
The encryption algorithm should have the ability to resist cracking, and the
security of the encryption algorithm should be reviewed regularly, and if necessary,
the encryption algorithm with higher computational complexity for cracking
should be adopted.
9. Asymmetric encryption
The elliptic curve encryption algorithm has a great potential for development
in smart terminal applications due to its small key length, high security
performance, and low time-consuming of the entire digital signature, such as
31
handheld computers, mobile phones, etc., which can have better performance . In
the network, the ECC algorithm also ensures the real-time performance of its
collaborative work. The use of the ECC algorithm to encrypt data with a high level
of sensitivity (such as keys) can meet the requirements of large data volumes in
terms of speed, and has high security. Ensure the security of the system well.
32
Chapter 5, The PANDA Token Release
◎ Distribution plan:
5% : DAO (5000W)
33
5.3 Regulatory mechanism
34
- Chapter 6: Team and Development
35
Marketing and Public Relations Committee, ecological development and
community building have always been the core work of PANDA. Under
the supervision of the Finance Committee, the Committee will use the initial
funds and the digital asset income obtained from community operations to
carry out marketing promotion and business cooperation. More Incorporate
potential partners into the ecological scope to promote sustainable
ecological development. The committee will also be responsible for all
outreach and public relations operations.
Finance and Personnel Management Committee, responsible for the use and
review of foundation funds, personnel recruitment and salary management,
daily operating cost management, etc.
Worked for Apple, SGI, Microsoft and Google and other companies
36
Daniel Richard Technical Director of PANDA
Founder and leader of the public agency "Prime Stream" (business structure,
formulation of financial regulations)
DataTrails(parameter);
37
jackson wesley PANDA technology developer
PANDA will strive for the implementation of energy projects by negotiating PPP
or other forms of energy project cooperation with regulatory authorities.
Investors
38
invest in the construction of equipment such as energy monitoring micro-stations
and energy management platforms of the project through virtual/actual funds.
After the related equipment joins the PANDA global green energy
ecological operation, the continuously generated Token can allow equipment
investors to obtain the corresponding virtual asset returns, and the PANDA
global green energy ecology can realize virtual asset cashing through
repurchase. With the implementation of more and more new energy
projects of the Ministry of Supervision, the emergence of enough IoT
monitoring devices in the entire PANDA global green energy ecological chain in
the ecosystem can make the system more stable and effective, and make the
exchange of funds more efficient. for convenience.
39
Chapter 7 Disclaimer
Nothing in this white paper constitutes legal, financial, business or tax advice
and you should consult your own legal, financial, commercial or other professional
advisors before engaging in any activity related to this.
This white paper is for general informational purposes only and does not
constitute a prospectus, an offer document, an offer of securities, a solicitation of
investment or any offer to sell any product, item or asset, whether digital or
otherwise. The following information may not be exhaustive and does not imply
any element of contractual relevance.
No part of this White Paper constitutes and will not constitute any offer by the
Foundation, the Distributors and any sales team (as defined in this Agreement), nor
shall the content of the White Paper be relied upon by any contractual and
investment decision Dependent base.
By accessing and using this white paper or any of its contents, you provide the
Foundation, its affiliates and your team with the following warranties:
40
In any decision to purchase PANDA, you have not relied on any
statement contained in this white paper;
You will voluntarily assume the costs and ensure compliance with all legal,
regulatory requirements and restrictions applicable to you (as the case may be);
You acknowledge, understand and agree that PANDA may have no value,
neither guarantee nor represent any value and circulation properties, and cannot
be used for speculation-related investments;
Neither the Foundation nor its affiliates nor team members are responsible or
liable for the value, transferability, liquidity of PANDA, and any market that
provides PANDA through third parties or otherwise;
You acknowledge, understand and agree that if you are a citizen, national,
resident (tax or otherwise relevant), residence or green card holder of a geographic
region or country that meets the following conditions, you will not be eligible to
purchase any Eligibility for PANDA:
The Foundation and the team do not and do not intend to make any
representations, warranties and commitments to any entity or individual, and
hereby disclaim any responsibility (including but not limited to the content of this
white paper and the accuracy of the content of any other materials published by
the Foundation) integrity, timeliness and reliability). To the maximum extent
permitted by law, the Foundation, related entities and service providers shall not be
liable for any use of the contents of the white paper, related materials published by
the Foundation, and related contents presented in other forms (including but not
limited to any errors or omissions). content) arising out of tort, contract disputes or
other forms of indirect, special, incidental, indirect or other damages (including but
not limited to any liability arising from breach of contract or negligence, any loss of
revenue and profit and loss of use and data). Potential purchasers should carefully
consider and evaluate all risks and uncertainties (including financial, legal and
41
uncertain risks) associated with the sale, foundation, distributors and teams.
The information provided in this white paper is for community discussion only
and is not legally binding. No one is obliged to enter into any contracts and binding
legal commitments for the acquisition of PANDA, and other than that, this white
paper will not accept any virtual currency or other forms of payment. PANDA's
sale and purchase agreement and long-term continuing holding of PANDA is
subject to a separate set of terms or a purchase agreement (as the case may
be) containing relevant terms and conditions, which are provided to you separately
or available on the website. In the event of any inconsistency between these Terms
and Conditions and this Whitepaper, these Terms and Conditions shall prevail.
Regulators have not reviewed or approved any of the information set out in
this white paper, and there is nothing in the laws, regulatory requirements and rules
of any jurisdiction that states that it is or will be required to do so. The publication,
distribution or dissemination of this white paper does not imply that the
requirements or rules of applicable laws.
42
express or implied) for the consequences or events arising from and arising from
revisions to these forward-looking statements after that date. Show).
The use of any company or platform name or trademark herein (other than in
connection with the Foundation or its affiliates) does not imply any affiliation with
or endorsement by these third-party platforms and companies. The specific
companies and platforms mentioned in this white paper are for informational and
illustrative purposes only.
This white paper may be translated into languages other than Chinese,
and if there is any conflict or ambiguity between the Chinese version and the
translated version of this white paper, the Chinese version shall prevail. You
acknowledge that you have read and understood the Chinese version of this white
paper. No part of this white paper may be reproduced, reproduced, distributed or
disseminated in any way without the prior written permission of the Foundation.
43