elective-stereophonic
elective-stereophonic
Show Posts - priyanka002050
Please login or register.

Login with username, password and session length
Advanced search  

News:

Latest Nxt Client: Nxt 1.11.15

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - priyanka002050

Pages: [1]
1
Forked Chain's Bear Pit / Re: bla bla bla supernet bla bla bla
« on: February 10, 2017, 06:12:25 am »
if they trust the sender they can simply leave the signed-transaction un-cloned until they need it.When using clonesmear, a telepod can be cloned at any time within a specified range of time.Most crypto-currencies feature near infinitely divisibility, thus users can send tiny & arbitrary amounts of value to anyone. The problem with this from a privacy perspective is that unique transaction amounts represent a possible information leak. This is called a Mantissa Attack.If say, Bob mentions through email that he will send $300 USD to Amy worth of BTC, and this email gets hacked. Than the time the email was sent reveals the possible price of BTC at the time in USD, -say- 0.66783 BTC. An attacker would only need to search for amounts close to the current conversion rate of $300 USD to BTC to have a good correlation between a blockchain transaction & Bob's deal with Amy.Teleport solves this problem by sending all crypto-currency amounts through a filter of standard denominations, such as 1, 5, 10, 50, 100 coins, and so on. The 0.66783 BTC would thus be divided into an optimal amount of portions and sent as separate telepods. Each telepod can benefit from clonesmear and the rest of Teleport's toolkit. By doing this, the uniqueness of each transaction amount ends and becomes standardized, protecting Bob from the attacker.All of these funds are by default sent to a freshly generated public address, so that no association can be drawn between users as suggested by Satoshi Nakamoto .Nxt is considered a second-generation cryptocurrency . With all the altcoins coming out that only change things such as hashing mechanism, time between blocks, starting difficulty, and so on, Nxt brings much much more to the table and was designed this way from the ground up.It is not an "alt coin" like litecoin, peercoin, and other variants whose code is based on Bitcoin's source code. It is written from.

 scratch, in all-new source code.It provides built-in support for robust features such as a decentralized peer-to-peer exchange, voting system, messaging/chat, decentralized DNS, and options for instant transactions. Many Bitcoin-based currencies implement one or two of these features on top of the existing Bitcoin network. Nxt implements all of them on an improved network model that is built for speed and scale.It is 100% proof of stake (PoS), versus the proof of work (PoW) mechanism the vast majority of other coins are based on. Instead of using powerful computers to "mine" new coins, Nxt leverages the balances of existing accounts to "forge" blocks, rewarding forgers with transaction fees. The Proof-of-Stake algorithm is efficient enough to run on smartphones and small devices like the Raspberry Pi platform. In addition, this method effectively removes a large security risk inherent in most other coins: the issue of a 51% attack and many of the other vulnerabilities inherent to Proof-of-Work coins are gone.

Pages: [1]
elective-stereophonic
elective-stereophonic
assembly
assembly