How To Guarantee That The Nodes Of The Trias Network Are Secure And Creditable?

5 min readFeb 21, 2019


At present, the system of the Trias network has basically formed and many friends who have newly joined the Trias Community have become extremely curious about the nodes of the Trias network. This article aims to briefly describe the generation and development of the nodes of the Trias network so that all of you can have an intuitive understanding of the nodes.

Most public blockchain projects cannot ensure the security of the operating environment of each node. Therefore, they need to improve the security by arranging for a lot of nodes to reach a consensus. However, the number of the nodes is obviously inversely proportional to the performance and it brings the public blockchain a performance bottleneck.

The Enterprise Operation System (EOS) improves its efficiency by using the DPOS consensus. It has 21 super nodes and each super node is elected through voting. However, the Trias network selects high-quality nodes through some calculation based on the credibility technology. It successfully prevents the DPOS from being affected by any artificial interference while it achieves an efficient consensus, which enhances the transparency and fairness of the system. If a node wants to join the Trias network and become a super node, it needs to undergo the four stages: generation, spreading, ladder and change.


According to the plan of Trias, the operating environment of any node that wants to join the Trias network must be established based on the TEE such as SGX, TrustZone and TXT. After a corresponding environment is installed for a node that is going to join the Trias network and the node joins the network, a minigame called ‘God plays dice’ will automatically start.

The playing method of the game is to randomly create a distribution according to Bayes’ Theorem, then constantly produce mass for the weight random numbers of the six sides of the die by using a random method based on the mantissa until all the mass distributions of the six sides belong to the same Bayes distribution interval, i.e. all the sides of the die become perfectly balanced.


Why should this game be played? In fact, the game is somewhat like the dark forest rule of The Three-Body Problem.

No civilization is willing to expose its coordinates in the universe. Once the coordinates of a civilization are discovered by any other civilization, only one party can survive or no party can survive.

However, the Trias network does exactly the opposite. If you want to become a super node in our network, you must be the strongest. You should be able to withstand the challenges from all the challengers acting like a great master in a faction of the martial art circles.

The game ‘God plays dice’ has solved the proof initiation problem of the consensus network. A challenger mode is used in the game and it represents a “challenge” of requesting other nodes to prove its state.

After the network state of a node spreads out through the Gossip Protocol and a small-world P2P network, other nodes will gather and integrate the information on the credible states of other adjacent nodes and further spread it out.

Ladder (the Trias Node Ranking List)

The Gossip (A gossip means a chatty talk or a rumor) Protocol is a miraculous protocol. It can be understood that the protocol has been created by simulating the human rumor spreading behavior. It is a method used to synchronize the states of all the nodes in a distributed system with non-strong consistency. Its characteristic is that every node randomly communicates with other nodes in a bounded network and finally the states of all the nodes will reach a consensus after all the nodes randomly communicate for some time.

A transmissible trust relationship can be established through the Gossip Protocol, which makes each consensus node form a credit relationship network and the consensus nodes endorse their proof for each other. The process is repeated for many times and then the nodes where it is most difficult to tell lies gradually come out in the whole network. The Trias network will periodically and sequentially select the top nodes from the Trias node ranking list as the super nodes.


In the network, each node will possibly be maliciously attacked. If the administrator right and all the passwords of a super node are maliciously gained by some person and the person uses the above-mentioned right to write malicious scripts, the abnormal state will be immediately found and recorded by the other nodes that have participated in the proof. The nodes will remove it from the super nodes and automatically select the best candidates as the new TEE super consensus nodes according to the Trias node ranking list.

It is worth mentioning that the network has a zero tolerance policy on this mistake. No matter how many times a node has acted before, for example, it has acted correctly for ten years and made no mistakes in the past ten years, as long as any of its hash values calculated at some time point is suspicious, we will immediately remove it from the super nodes.


This is a brief re-arrangement of the work that the Trias team has done in the recent several months. We have separately described all the technologies in detail before. I am sure that the friends who have been paying their attention to Trias will not be unfamiliar with the contents we discussed about today.

In this year, the Trias team will continue to carry out its technology-centered policy and take “making people trust machines” as its vision. It will strive to accelerate the project progress and provide blockchain support for more Internet projects and traditional projects.




Trustworthy and Reliable Intelligent Autonomous Systems