0
views

Delegated Proof of Stake Explained

Delegated Proof of Stake Explained
The Delegated Proof of Stake (DPoS) consensus algorithm is considered by many as a more efficient and democratic version of the preceding PoS mechanism. Both PoS and DPoS are used as an alternative to the Proof of Work consensus algorithm, since a PoW system requires, by design, lots of external resources. The Proof of Work algorithm makes use of a large amount of computational work in order to secure an immutable, decentralized and transparent distributed ledger. Contrarily, PoS and DPoS require fewer resources and are, by design, more sustainable and eco-friendly. To understand how Delegated Proof of Stake works, one must first grasp the basics of the Proof of Work and Proof of Stake algorithms that preceded it.
Show in full...
0
views

Proof of Burn Explained

Proof of Burn Explained
While most blockchain systems either make use of a Proof of Work (PoW) or a Proof of Stake (PoS) consensus algorithm, the Proof of Burn (PoB) is being tested as a possible alternative to those.
Show in full...
0
views

Proof of Authority Explained

Proof of Authority Explained
The cryptocurrency space has changed a lot since the first blockchain transaction on the Bitcoin network. Along with the well-known Proof of Work and Proof of Stake algorithms, other consensus mechanisms were proposed, with alternative methods for reaching consensus within a blockchain system.
Show in full...
0
views

What Is a DoS Attack?

What Is a DoS Attack?
In short, a DoS attack (or Denial-of-Service attack) is a method used to disrupt legitimate users' access to a target network or web resource. Typically, this is accomplished by overloading the target (often a web server) with a massive amount of traffic - or by sending malicious requests that cause the target resource to malfunction or crash entirely.
Show in full...
0
views

What Is a 51% Attack?

What Is a 51% Attack?
Before diving into the 51% attack, it is crucial to have a good understanding of mining and blockchain-based systems. One of the key strengths of Bitcoin and its underlying blockchain technology is the distributed nature of building and verifying data. The decentralized work of the nodes ensures that the protocol rules are being followed and that all network participants agree on the current state of the blockchain. This means that the majority of nodes need to regularly reach consensus in regards to the process of mining, to the version of the software being used, to the validity of transactions, and so forth.
Show in full...
0
views

Delayed Proof of Work Explained

Delayed Proof of Work Explained
Delayed Proof of Work (dPoW) is a security mechanism designed by the Komodo project. It is basically a modified version of the Proof of Work (PoW) consensus algorithm that makes use of Bitcoin blockchain’s hashpower as a way to enhance network security. By using dPoW, Komodo developers are able to secure not only their own network but also any third-party chain that ends up joining the Komodo ecosystem in the future. In fact, dPoW can be implemented for any project that develops an independent blockchain using a UTXO model.
Show in full...