Hermes: A Large-Scale Model for Cryptocurrency

1 Industry Application Challenges

a) Cognitive Limitations

Many basic applications of large models rely on the general cognition of the model, supplemented by custom knowledge bases, internet searches, and other external information as sources for problem-solving. Only a few applications build specialized information and indicator databases for comprehensive interpretation of market events. Moreover, these applications often struggle to handle massive volumes of public opinion data, limited by their ability to extract the core information that truly resolves current issues for users.

b) Limitations in Domain Understanding

If you were to feed a common large model with project-related introductions, trading indicators, on-chain data, public sentiment information, and technical charts, could it provide satisfactory answers?

The answer is no. Although many large models appear to "know everything," they typically can only "take one step," meaning they provide the most direct answer based on the information given, without a deeper interpretation.

However, the core ability and value of large models do not lie in the breadth of knowledge but in the depth of cognition. Just as a person's capability in a field depends on their depth of understanding and internalization of knowledge in that area. As we progress, the breadth of knowledge can largely be addressed through the use of tools.

c) Limitations in Problem-Solving Capability

What is the standard for evaluating whether an application is good or bad? — "solve it."

The fundamental value of an application lies in its ability to elegantly solve a problem. Although the cross-modal capabilities of large models have become a standard feature, there is still a gap in solving complex problems. Identifying workflows, defining them, and implementing them in each industry and scenario may be the key steps for large models to achieve "solve it."

d) Reliability and Security

Would you completely trust the conclusions provided by a large model? The issue of hallucinations makes it difficult for users to let large models perform precise tasks unsupervised, limiting their applications to assistant-like, textual, and creative work.

Would you be willing to give your privacy and financial information to a large model without reservations? Even with large models deployed privately, providing one's privacy and property information to a model product does not guarantee its long-term encryption, security, or privacy, let alone commercially applied models.

The issues mentioned above are not without solutions; addressing them requires sufficient industry experience, profound technical expertise, and relentless exploration and experimentation.

Hermes is the culmination of all these efforts.

2 How does Hermes work?

a) Everything can be done through conversation

Since its development began in 2021, Hermes has been dedicated to creating a "Jarvis"-like super-entity. The advent of large models has significantly accelerated this process. Now, you can interact with Hermes via IM chat to accomplish anything you wish within Insight. You can ask it to buy a Bitcoin for you, send an ETH candlestick chart for technical analysis, or even have it monitor Elon Musk's Twitter to buy DOGE immediately the next time he signals it. Hermes is your dedicated cryptocurrency trading butler.

Hermes will continue to be upgraded. In the future, it will have target systems, planning systems, and scheduling systems, potentially becoming the most effective member of your team.

b) A Thorough Professional Analyst

Through the Insight market indicator system and data warehouse, Hermes can access real-time and precise information about the fundamentals, technicals, informational aspects, and public sentiment of projects.

Using the text2sql executor, it can convert your requirements into query commands for the data warehouse.

With the market analysis executor, it can generate professional project analysis reports from data and information.

Through the adversarial validation executor, it can cyclically verify and correct the reliability of data queries and analysis conclusions.

It is always efficient, professional, and tirelessly dedicated.

c) Workflows to Free Your Hands

Hermes is well-versed in the habits and needs of cryptocurrency users. It understands that not every user is familiar with the trading rules and methods on various blockchains, that each user has regrets about missed trading opportunities, and that everyone has moments of inspiration limited by validation thresholds. Hermes has meticulously crafted a set of professional workflows:

  • Trading Workflow: Whether on-chain or on an exchange, simply set up your trading strategy, and the trading workflow will execute transactions automatically when conditions are met. It can also intelligently select the best trading route and platform using a trading aggregator.

  • Monitoring Workflow: Users can set specific monitoring conditions, such as price breakouts, abnormal trading volumes, and shifts in market sentiment. Once these conditions are triggered, Hermes will immediately notify the user and carry out the corresponding trading actions.

  • Strategy Workflow: The strategy workflow supports users in customizing complex trading strategies, including technical analysis, fundamental analysis, and sentiment analysis. Users can set strategy rules via natural language or a graphical interface and validate the effectiveness of these strategies using Hermes' backtesting function. This workflow can automatically execute trades and dynamically adjust strategy parameters according to market changes, ensuring the stability and profitability of the strategy under various market conditions.

  • etc.

Users can also customize their own workflows, discovering and unleashing the infinite possibilities of Hermes.

d) Ensuring Crypto Security the Crypto Way

Hermes utilizes advanced encryption technologies and multilayered security mechanisms to comprehensively protect user transactions, personal privacy, and wallet security.

  • Transaction Security: Hermes ensures that each transaction is rigorously encrypted. All transaction commands are encrypted using AES-256 during transmission to prevent any form of eavesdropping or tampering. Additionally, Hermes uses the transparency and immutability of blockchain to record and verify each transaction, ensuring their authenticity and completeness.

  • Personal Privacy Protection: Hermes employs advanced privacy protection mechanisms to encrypt and securely store users' personal data. All personal information, including transaction records and account details, is independently encrypted, ensuring it cannot be accessed by unauthorized third parties under any circumstances.

  • Wallet Security: Hermes independently encrypts and stores user wallet information (including sensitive data such as keys), ensuring absolute security. Hermes employs multi-factor authentication mechanisms to prevent any unauthorized access or operations, thus safeguarding user assets.

  • Transparency and Auditability: To ensure the system's transparency and trustworthiness, all related codes and contracts of Hermes are publicly auditable. Anyone can review and verify the security and reliability of Hermes, ensuring transparent and fair system operations.

Last updated