codatta
  • Overview
    • Use Cases
    • Features
  • About XnY
  • Data Contribution with Confidence
    • Account Annotation: Data Contribution Flow
      • Submission
      • Validation
      • Public Voting
      • Data Acceptance
      • Incentive Rules
    • User Demographic Annotation (WIP)
  • Protocol Information
    • Reputation
      • What is Reputation? (WIP)
      • How to improve your reputation?
  • Product Documentation
    • Registration and Login
    • Account Settings
    • Referral
    • Bounty Program
      • How to Participate in the Bounty Program
      • How to Improve Your Bounty Acceptance Rate
    • Quest and Explorer
      • Quest
      • Explorer
  • Data Collection Tutorial
    • Address Collection
      • Cryptocurrency Service
      • NFT
      • DeFi
      • Smart Contract
      • Wallet and Storage
      • Compliance and Regulation
      • Technology and Infrastructure
      • Financial Service
      • Identity
      • Risk and Security
      • Entertainment
      • E-Commerce
      • Other
    • Task with Known Address
  • FAQs
  • Community Guidelines
  • Risk Disclaimer
Powered by GitBook
On this page

Was this helpful?

  1. Overview

Features

Data Confidence: Codatta ensures high data quality through a blend of AI, human intelligence, and economic systems. AI mechanisms continuously analyze and verify data for accuracy, while community members contribute to data validation, enhancing integrity. Economic incentives like reputation scores and gas burning encourage accurate data submissions and penalize fraud, ensuring reliable and trustworthy data.

Extensibility: Designed for flexibility, Codatta can easily expand its data scope. The protocol's infrastructure, including validation, sourcing, incentivization, and governance, is adaptable to new data categories. This ensures Codatta evolves with the Web3 landscape, providing a scalable solution for diverse data needs without compromising performance or security.

Public Accessibility: Codatta is built to be permissionless, allowing developers, individuals, and protocols to access data freely. To prevent malicious use, minimal conditions restrict access to certain risky data sets. This approach promotes innovation and collaboration while ensuring data security.

PreviousUse CasesNextAbout XnY

Last updated 5 months ago

Was this helpful?