Dissecting the EOS Technical Whitepaper Part 2

in #eos7 years ago (edited)

Dissecting the EOS.IO Technical Whitepaper Part 2

(https://github.com/EOSIO/Documentation/blob/master/TechnicalWhitePaper.md)

Link to Part 1: https://steemit.com/eos/@dcryptonight/dissecting-the-eos-io-technical-whitepaper-part-1

Hey guys! I'm new to EOS and I'm just getting up to speed with it. Part of my study of it is to dissect it section by section. I thought it might be helpful to other newcomers so they know where to look for the facts they're looking for. So here, I'm dissecting the whitepaper and posting it in this subreddit. I only read it an hour per day. I'll post my dissections here everyday I read about it, then compile everything when I've read it completely.

I hope this helps! :)

4. Accounts

- A brief overview of the guidelines in creating an account in eos
- Fees of account creation of new users for application developers

4.1 Message & Handlers

- Account and message handling information

4.2 Role Based Permission Management

- What permission management is
- How permission management works in eos
- The importance of standardizing and separating authentication and permission management from the business logic of the application
- Multi-user control for accounts
- Feature of allowing accounts to define the information transfer between accounts and applications

4.2.1 Named Permission Levels

- What named permission levels is
- Steem blockchain example of named permission

4.2.2 Named message Handler Groups

- How accounts can manage messages by message handlers

4.2.3 Permission Mapping

- Permission mapping as a way to track activity of messages posted on behalf of another account

4.2.4 Evaluating Permissions

- Example on how permissions are evaluated

  • Default Permission Groups
    - Enumerates the default permission groups
  • Parallel Evaluation of Permissions
    - Explains how permission evaluation is done
4.3 Messages with Mandatory Delay

- Explains how to use time as a security measure
- Information on account recovery after a mandator-delayed message has been sent
- Examples of application of time-delayed message

4.4 Recovery from Stolen Keys

- Account recovery using keys with the help of a designated recovery partner
- How a hacker does not benefit if he goes thru the recovery process
- The process of multi-signature transaction and one of its benefits