Ticker Price
The ticker prices are derived from cryptocurrencies and various other factors that contribute to significant volatility in the investment market. These values are not static and fluctuate based on market sentiment. At TriadFi, we offer a sophisticated way to invest in the Solana ecosystem. We recommend that you carefully assess the aforementioned risks and remain fully aware of them.
We do not use the token price in the protocol as the main parameter. Each piece of data available on the blockchain serves as a parameter for calculating the ticker price.
The ticker price is updated every 5 minutes.
Tickers
Here are the ticker identifiers used by Oracle V1:
tDRIFT: "61sVpvF5X5SMAx1k7nkAPSnc5RnwsYjr5dzuMy7Geb7h",
tJUPITER: "6APY6oGjapqMtfW3kvU9AB4osP6pnsQwEMHq4BdmPJXk",
tPYTH: "7ysuK85P65zBuNiNwPEVgQ3h4FS8CDsxK5TstScgNiZ4"
Data Integrity Verification Protocol (DIVP)
The Data Integrity Verification Protocol (DIVP) is a set of procedures and mechanisms designed to ensure that the data provided for price determination in Solana protocols is authentic, accurate, and reliable before being used for critical calculations, such as determining new token prices. This protocol includes the following steps:
Reception of Data from Multiple Sources
- Collect data from various on-chain metrics and liquidity pools to ensure redundancy and mitigate individual failures.
Digital Signature Verification
- Validate the digital signatures of the received data to ensure it originates from legitimate sources and has not been altered during transmission.
Data Aggregation and Comparison
- Aggregate data received from different sources.
- Compare the aggregated data with independent external sources to detect discrepancies.
Trust Policies Application
- Define and apply trust policies to determine the reliability of the data. This may include weighting data based on the reputation of the source, eliminating outliers, etc.
Monitoring and Anomaly Detection
- Implement real-time monitoring systems to detect anomalies or unusual patterns in the received data.
Logging and Auditing
- Maintain detailed logs of all verification operations and data sources to allow for subsequent audits and ensure transparency.
Incident Response
- Establish procedures for responding to security incidents, such as compromised data or detection of malicious sources.
By following this protocol, we aim to provide robust and reliable price determinations for Solana-based protocols, leveraging on-chain metrics.