Binance Square
LIVE
Digipear数梨
@digipear_web3
创造专注研究和科普Web3的兴趣社区,学习和分享web3的一切。我们希望在即将到来的新数字时代寻找确定性的α,为创造价值而努力。为什么要这样做:希望通过分享与传播,让更多人了解和进入Web3,共建一个更公平、更高效、更安全的数字世界。
Following
Followers
Liked
Shared
All Content
LIVE
--
See original
https://rewards.illuvium.io/ Those who have played ilv games can check if there is any https://zklink.io/novadrop zklink query. Those who hold nft and have crossed nft can check it airdrop.orderly.network Those who have done galaxy tasks can check it https://claims.aethir.com/ Those who have done aethir tasks, run nodes, hold red beans or Solana madlab can check it #Airdrop‬ #ath #ILV #zkLink
https://rewards.illuvium.io/
Those who have played ilv games can check if there is any
https://zklink.io/novadrop zklink query. Those who hold nft and have crossed nft can check it
airdrop.orderly.network
Those who have done galaxy tasks can check it
https://claims.aethir.com/
Those who have done aethir tasks, run nodes, hold red beans or Solana madlab can check it
#Airdrop‬ #ath #ILV #zkLink
See original
Zks Layer 2 has been held back for too long Congratulations to each other The query link address is as follows https://claim.zknation.io/ #ZKS以太坊空投 #zkSync #Airdrop‬ The interaction standard requirements are still relatively high, requiring interaction and lp contribution. Those who have not yet boarded can refer to the leading standards and bring the boutique account for operation next time
Zks Layer 2 has been held back for too long
Congratulations to each other
The query link address is as follows
https://claim.zknation.io/
#ZKS以太坊空投 #zkSync #Airdrop‬

The interaction standard requirements are still relatively high, requiring interaction and lp contribution. Those who have not yet boarded can refer to the leading standards and bring the boutique account for operation next time
LIVE
--
Bullish
See original
See original
The rise and fall of traditional finance and the rise of SaaB staking services: a game of value reshaping“Have you ever seen a way to generate income by pledging the business model of an enterprise?” 01 Reshaping business models and opening a new era of digitalization Recently, P2P.org has launched the Staking-as-a-Business (SaaB) network staking service. What is staking? In a blockchain network, staking refers to the process of holding and locking a certain amount of cryptocurrency to receive rewards. Imagine you put your money in a bank time deposit. The bank will use your deposit to invest or lend to others, and give you a certain interest in return. Staking works similarly, you "deposit" your cryptocurrency into the blockchain network, help the network verify transactions and maintain security, and receive new cryptocurrency as "interest."

The rise and fall of traditional finance and the rise of SaaB staking services: a game of value reshaping

“Have you ever seen a way to generate income by pledging the business model of an enterprise?”
01
Reshaping business models and opening a new era of digitalization
Recently, P2P.org has launched the Staking-as-a-Business (SaaB) network staking service.
What is staking? In a blockchain network, staking refers to the process of holding and locking a certain amount of cryptocurrency to receive rewards.
Imagine you put your money in a bank time deposit. The bank will use your deposit to invest or lend to others, and give you a certain interest in return. Staking works similarly, you "deposit" your cryptocurrency into the blockchain network, help the network verify transactions and maintain security, and receive new cryptocurrency as "interest."
See original
The core of level two is waiting, just like a hunter waiting for prey on the grassland The core of level one is searching, like a gold prospector searching for gold in the river bed The essence of learning is to enhance cognition. Wealth beyond cognition cannot be obtained, easily tolerated, or retained. If you want to make all the money in the market, you will end up making no money at all. You can’t have your cake and eat it too, just try to achieve the ultimate in one direction #axl #sol #Portal
The core of level two is waiting, just like a hunter waiting for prey on the grassland
The core of level one is searching, like a gold prospector searching for gold in the river bed

The essence of learning is to enhance cognition. Wealth beyond cognition cannot be obtained, easily tolerated, or retained.

If you want to make all the money in the market, you will end up making no money at all.
You can’t have your cake and eat it too, just try to achieve the ultimate in one direction
#axl #sol #Portal
See original
[A Web3 concept every day] Distributed computing and Web3 A typical distributed computing is cloud computing. For example, Google Drive will save user data on multiple remote servers. Users can access files anytime and anywhere. If one server goes down, another one will be replaced. Another example is Amazon Cloud and Alibaba Cloud. Providing distributed servers for enterprises, enterprises no longer need to purchase large server groups, but rent them as needed to meet different needs. In short, distributed computing is to spread computing tasks across multiple nodes to achieve higher performance and security. So what is the connection between distributed computing and Web3? The purpose of Web3 is to allow users to own and control their own data and digital assets, so using distributed computing to provide decentralized storage and computing for Web3 is the proper meaning of the question. When we say blockchain, we actually refer to a distributed ledger maintained by multiple nodes. The content of the ledger is stored in each node, which is essentially distributed storage. The verification process of the ledger is performed by each node, which is essentially distributed computing. So it can be said that distributed storage and distributed planning together constitute Web3.
[A Web3 concept every day] Distributed computing and Web3
A typical distributed computing is cloud computing. For example, Google Drive will save user data on multiple remote servers. Users can access files anytime and anywhere. If one server goes down, another one will be replaced. Another example is Amazon Cloud and Alibaba Cloud. Providing distributed servers for enterprises, enterprises no longer need to purchase large server groups, but rent them as needed to meet different needs.

In short, distributed computing is to spread computing tasks across multiple nodes to achieve higher performance and security. So what is the connection between distributed computing and Web3?

The purpose of Web3 is to allow users to own and control their own data and digital assets, so using distributed computing to provide decentralized storage and computing for Web3 is the proper meaning of the question.

When we say blockchain, we actually refer to a distributed ledger maintained by multiple nodes. The content of the ledger is stored in each node, which is essentially distributed storage. The verification process of the ledger is performed by each node, which is essentially distributed computing. So it can be said that distributed storage and distributed planning together constitute Web3.
See original
Once there is a big airdrop, a group of people will share that they have played thousands or hundreds of numbers, and then win as many as they can. After sharing, I will probably also talk about my experience at the end. Over and over again, the core is: try to be like a real user. nothing more than 1. Independent IP 2. The withdrawal time and amount of coins from the exchange are random. 3. Divide accounts into several groups as much as possible, and randomly interact with different projects every day. You don’t need to use synchronizers for all of them, first brush project A, and then brush project B, but completely randomly. 4. Leave a gas balance of 10-20u 5. There are some large transfer records to make the wallet authentic I found that many people who have never mentioned the project will jump out when the project is released. I don’t understand the meaning of pursuing such people. Let’s not discuss whether it is what he said. Let’s talk about a simple logic: why he didn’t share it when he masturbated before. The reason was simply because he was afraid of too much competition. The real situation is: there are fewer people who don’t have an invitation code, and those who have an invitation code are especially lucky. Most of the people who airdrop will make money as long as the project is airdropped, but those who have never released any junk projects that occasionally appear are evenly divided. Lu Mao Party Profit ——from chess game Telling the truth is worth it, continue to learn every day and grow regularly. Be familiar with how the project works and not be controlled by emotions #空投项目 #撸毛
Once there is a big airdrop, a group of people will share that they have played thousands or hundreds of numbers, and then win as many as they can.
After sharing, I will probably also talk about my experience at the end. Over and over again, the core is: try to be like a real user.
nothing more than
1. Independent IP
2. The withdrawal time and amount of coins from the exchange are random.
3. Divide accounts into several groups as much as possible, and randomly interact with different projects every day. You don’t need to use synchronizers for all of them, first brush project A, and then brush project B, but completely randomly.
4. Leave a gas balance of 10-20u
5. There are some large transfer records to make the wallet authentic

I found that many people who have never mentioned the project will jump out when the project is released. I don’t understand the meaning of pursuing such people.

Let’s not discuss whether it is what he said. Let’s talk about a simple logic: why he didn’t share it when he masturbated before. The reason was simply because he was afraid of too much competition.
The real situation is: there are fewer people who don’t have an invitation code, and those who have an invitation code are especially lucky. Most of the people who airdrop will make money as long as the project is airdropped, but those who have never released any junk projects that occasionally appear are evenly divided. Lu Mao Party Profit
——from chess game

Telling the truth is worth it, continue to learn every day and grow regularly. Be familiar with how the project works and not be controlled by emotions
#空投项目 #撸毛
See original
[A web3 concept every day] Must-know cryptography Encryption algorithms are the most commonly heard concepts in public chains, wallets and other fields. But how to ensure the security of the wallet and how to ensure the link of the block? This all requires the help of cryptography. Cryptographic technology is the underlying technology for the security of blockchain systems. Hash functions and public-private key pairs commonly used in web3 are representatives of them. Hash Function: Also called hash function, or hash for short, it can realize input of any length and convert it into a fixed-length output: h=H(m), which means that whatever you input will be hashed Algorithm, what is finally obtained is a string of fixed-length characters, one input corresponds to one output, and its security is based on its collision resistance (Collision-Resistant), that is, it is difficult to find two inputs with the same output. In the blockchain, hash functions are used in two places, one is the Merkle tree root hash, and the other is the block pointer connecting the blocks. The Merkle tree root hash is to hash all transactions, then form a new value and then hash it. Finally, only one hash value is found, which is the Merkle tree root hash. Because it is impossible to find two inputs with the same output, this means that as long as the content of the transaction changes, the Merkle tree root hash will also change, so as long as the root hash does not change, the transaction is correct. In the same way, find a hash for the entire block data, and put the entire hash value into the next block header. As long as the hash value remains unchanged, it means that all previous blocks have not been tampered with. , are all correct. Public-private key pair: It is the famous public key cryptography algorithm. Public key cryptography uses a pair of related keys for encryption and decryption: a public "public key" and a secret "private key." The "public key" can be disclosed to anyone and used to encrypt data. The "private key" must be kept secret and known only to the owner. It is used to decrypt data encrypted by the corresponding public key. Public key cryptography algorithms are based on the complexity of certain mathematical problems. For example, the security of the RSA algorithm (a popular example of asymmetric encryption) is based on the difficulty of factoring large numbers. In other words, you can think of this process as a "black box" for encryption and decryption. #每日学习 #eth #BTC!
[A web3 concept every day] Must-know cryptography
Encryption algorithms are the most commonly heard concepts in public chains, wallets and other fields. But how to ensure the security of the wallet and how to ensure the link of the block? This all requires the help of cryptography. Cryptographic technology is the underlying technology for the security of blockchain systems. Hash functions and public-private key pairs commonly used in web3 are representatives of them.

Hash Function: Also called hash function, or hash for short, it can realize input of any length and convert it into a fixed-length output: h=H(m), which means that whatever you input will be hashed Algorithm, what is finally obtained is a string of fixed-length characters, one input corresponds to one output, and its security is based on its collision resistance (Collision-Resistant), that is, it is difficult to find two inputs with the same output.
In the blockchain, hash functions are used in two places, one is the Merkle tree root hash, and the other is the block pointer connecting the blocks. The Merkle tree root hash is to hash all transactions, then form a new value and then hash it. Finally, only one hash value is found, which is the Merkle tree root hash. Because it is impossible to find two inputs with the same output, this means that as long as the content of the transaction changes, the Merkle tree root hash will also change, so as long as the root hash does not change, the transaction is correct. In the same way, find a hash for the entire block data, and put the entire hash value into the next block header. As long as the hash value remains unchanged, it means that all previous blocks have not been tampered with. , are all correct.

Public-private key pair: It is the famous public key cryptography algorithm.
Public key cryptography uses a pair of related keys for encryption and decryption: a public "public key" and a secret "private key." The "public key" can be disclosed to anyone and used to encrypt data. The "private key" must be kept secret and known only to the owner. It is used to decrypt data encrypted by the corresponding public key.
Public key cryptography algorithms are based on the complexity of certain mathematical problems. For example, the security of the RSA algorithm (a popular example of asymmetric encryption) is based on the difficulty of factoring large numbers. In other words, you can think of this process as a "black box" for encryption and decryption.
#每日学习 #eth #BTC!
See original
[A web3 concept every day] Quickly understand PAXOS PAXOS is a typical strongly consistent non-Byzantine consensus algorithm. It is different from the PoW and PoS we talked about earlier. Strong consistency means that all nodes in the system receive consistent results at the same point in time. Non-strong consistency means that it takes a certain amount of time for all data in the system to reach consensus, such as PoW and PoS. So what is non-Byzantium? Byzantine refers to the "traitor" problem, which is a problem with extremely destructive, unpredictable, and random characteristics, such as hacker attacks. Non-Byzantine refers to problems such as downtime, network delay, and information loss. The Paxos algorithm sets up three nodes: proposer, acceptor and learner. How it works is that the proposer sends a uniquely numbered proposal to the acceptor during the Prepare phase to request a commitment. When the acceptor responds, if they have previously accepted other proposals, they will return the values ​​and numbers of those proposals to the proposer. If the proposer obtains the commitment of more than half of the acceptors, it will enter the Accept phase and send the specific value of the proposal. Once this value is accepted by more than half of the acceptors, consensus is reached on the proposal. The learner is then informed of this decision, which is to ensure that other parts of the system know which proposals were accepted, thus maintaining data consistency across the network. According to the famous CAP theorem, a distributed system cannot guarantee consistency, availability, and partition tolerance at the same time. All consensus algorithms are based on actual conditions to achieve a balance among the three. The purpose of PAXOS is to ensure strong consistency, which results in sacrificing a certain amount of availability. Different from PoW, PoW achieves eventual consistency, which means that short-term forks can be allowed, while PAXOS will not have forks, because only consistent results can allow the system to continue running. At the same time, its focus is on solving non-Byzantine faults, which will also cause the system to fail to operate normally when it is attacked by malicious attacks. For example, if a malicious proposer keeps issuing new proposals, the entire system will come to a standstill. #Paxos #热门话题 #每日解析
[A web3 concept every day] Quickly understand PAXOS

PAXOS is a typical strongly consistent non-Byzantine consensus algorithm. It is different from the PoW and PoS we talked about earlier. Strong consistency means that all nodes in the system receive consistent results at the same point in time. Non-strong consistency means that it takes a certain amount of time for all data in the system to reach consensus, such as PoW and PoS.

So what is non-Byzantium? Byzantine refers to the "traitor" problem, which is a problem with extremely destructive, unpredictable, and random characteristics, such as hacker attacks. Non-Byzantine refers to problems such as downtime, network delay, and information loss. The Paxos algorithm sets up three nodes: proposer, acceptor and learner. How it works is that the proposer sends a uniquely numbered proposal to the acceptor during the Prepare phase to request a commitment. When the acceptor responds, if they have previously accepted other proposals, they will return the values ​​and numbers of those proposals to the proposer. If the proposer obtains the commitment of more than half of the acceptors, it will enter the Accept phase and send the specific value of the proposal. Once this value is accepted by more than half of the acceptors, consensus is reached on the proposal. The learner is then informed of this decision, which is to ensure that other parts of the system know which proposals were accepted, thus maintaining data consistency across the network.

According to the famous CAP theorem, a distributed system cannot guarantee consistency, availability, and partition tolerance at the same time. All consensus algorithms are based on actual conditions to achieve a balance among the three. The purpose of PAXOS is to ensure strong consistency, which results in sacrificing a certain amount of availability. Different from PoW, PoW achieves eventual consistency, which means that short-term forks can be allowed, while PAXOS will not have forks, because only consistent results can allow the system to continue running. At the same time, its focus is on solving non-Byzantine faults, which will also cause the system to fail to operate normally when it is attacked by malicious attacks. For example, if a malicious proposer keeps issuing new proposals, the entire system will come to a standstill. #Paxos #热门话题 #每日解析
See original
[A web3 concept every day] What is DePin? DePIN (Decentralized Physical Infrastructure) uses incentives to encourage individuals to share resources such as networks, thereby achieving a decentralized physical infrastructure network. This resource sharing covers storage, communication traffic, cloud computing, energy, etc. DePIN's model can transform the provider unit that provides basic cloud resources from an enterprise into a crowdsourcing model for individual users. DePIN uses incentives to encourage users to provide network resources that can be shared, including GPU computing power, hotspots, storage space, etc. However, early DePIN incentives had no practical use. How can DePIN now use a more complete incentive mechanism and a more complete related ecology to enable personal resource providers to obtain more practical incentives, bringing positive feedback development to providers and consumers as well as the development of the DePIN ecosystem. Yes, it's very abstract. DePIN Web3 emerged to address key challenges in the Web3 ecosystem, specifically bottlenecks associated with centralized infrastructure. This decentralized model reduces the stress of any single point of failure and provides a better infrastructure for decentralized applications. #depin #MOBILE #eth #sol🔥🔥🔥
[A web3 concept every day] What is DePin?
DePIN (Decentralized Physical Infrastructure) uses incentives to encourage individuals to share resources such as networks, thereby achieving a decentralized physical infrastructure network. This resource sharing covers storage, communication traffic, cloud computing, energy, etc. DePIN's model can transform the provider unit that provides basic cloud resources from an enterprise into a crowdsourcing model for individual users.

DePIN uses incentives to encourage users to provide network resources that can be shared, including GPU computing power, hotspots, storage space, etc. However, early DePIN incentives had no practical use. How can DePIN now use a more complete incentive mechanism and a more complete related ecology to enable personal resource providers to obtain more practical incentives, bringing positive feedback development to providers and consumers as well as the development of the DePIN ecosystem. Yes, it's very abstract.

DePIN Web3 emerged to address key challenges in the Web3 ecosystem, specifically bottlenecks associated with centralized infrastructure. This decentralized model reduces the stress of any single point of failure and provides a better infrastructure for decentralized applications.
#depin #MOBILE #eth #sol🔥🔥🔥
See original
Small tips @JupiterExchange will remove the $JUP official pool at 11pm tonight Additional background: In order to prevent airdrop selling pressure, the official set up a pool of 0.4-0.7 for a total of 7 days, so it has been trading sideways in this range recently. What is the next step? Let the market tell you #sol #jup
Small tips

@JupiterExchange will remove the $JUP official pool at 11pm tonight

Additional background: In order to prevent airdrop selling pressure, the official set up a pool of 0.4-0.7 for a total of 7 days, so it has been trading sideways in this range recently. What is the next step? Let the market tell you #sol #jup
See original
Following yesterday’s delisting of XMR, let’s share knowledge about the privacy track. Monero was officially launched in April 2014, so it has been 10 years. It was the earliest attempt to add privacy attributes. Since Layer 1 currently does not support privacy on its public network, since all records are recorded on the blockchain, anyone can read its contents. This creates privacy concerns due to the possibility of linking distributed ledger addresses to real identities. The open and transparent nature of the blockchain allows users' transaction transfer records and on-chain activity records to be viewed by anyone. Users' sensitive information may be easily obtained, and users face the dilemma of "streaking" in the Web3 world. The privacy public chain provides users with privacy protection solutions. Through technologies such as zero-knowledge proof and secure multi-party computation, users can selectively hide sensitive information. In layman's terms, every operation on the chain will be packaged and sent to a smart contract. The user's transaction records can be queried through the blockchain browser. The data includes the sent data object, time, quantity, etc. Users who have used privacy products will find that when you deposit a fund into a privacy account, the funds will be subcontracted to dozens or even hundreds of contract accounts for two-way interaction, and then executed from the thread. , and then the total amount of your funds, transfer time, and return address cannot be tracked. This solved a lot of "passage" issues at certain times. Some people ask, since Monero is so popular in the privacy world and the dark web world, why does the currency price not rise? You can understand by giving a simple phenomenon: Monero exists as an anonymous value carrier in these worlds. Legal currency goes in and becomes Monero. Monero transactions obtain demand goods. Sellers sell Monero and get legal currency. They are free and easy in the real world. comfortable. So you see, Monero is just a carrier at this time. The carrier is not too dependent on price but focuses on usage scenarios. It is convenient and can be calculated with legal currency on the same day. Basically, it will be replaced when it is used up. There is another thing that must be mentioned. Is there still room for Monroe in the future? Value determines price, butt determines head. When demand exceeds supply, rising prices are inevitable #xmr #XMR將被幣安下架 #隐私赛道 #zen
Following yesterday’s delisting of XMR, let’s share knowledge about the privacy track.

Monero was officially launched in April 2014, so it has been 10 years. It was the earliest attempt to add privacy attributes. Since Layer 1 currently does not support privacy on its public network, since all records are recorded on the blockchain, anyone can read its contents. This creates privacy concerns due to the possibility of linking distributed ledger addresses to real identities.

The open and transparent nature of the blockchain allows users' transaction transfer records and on-chain activity records to be viewed by anyone. Users' sensitive information may be easily obtained, and users face the dilemma of "streaking" in the Web3 world.

The privacy public chain provides users with privacy protection solutions. Through technologies such as zero-knowledge proof and secure multi-party computation, users can selectively hide sensitive information.

In layman's terms, every operation on the chain will be packaged and sent to a smart contract. The user's transaction records can be queried through the blockchain browser. The data includes the sent data object, time, quantity, etc. Users who have used privacy products will find that when you deposit a fund into a privacy account, the funds will be subcontracted to dozens or even hundreds of contract accounts for two-way interaction, and then executed from the thread. , and then the total amount of your funds, transfer time, and return address cannot be tracked. This solved a lot of "passage" issues at certain times.

Some people ask, since Monero is so popular in the privacy world and the dark web world, why does the currency price not rise? You can understand by giving a simple phenomenon: Monero exists as an anonymous value carrier in these worlds. Legal currency goes in and becomes Monero. Monero transactions obtain demand goods. Sellers sell Monero and get legal currency. They are free and easy in the real world. comfortable. So you see, Monero is just a carrier at this time. The carrier is not too dependent on price but focuses on usage scenarios. It is convenient and can be calculated with legal currency on the same day. Basically, it will be replaced when it is used up. There is another thing that must be mentioned. Is there still room for Monroe in the future? Value determines price, butt determines head. When demand exceeds supply, rising prices are inevitable
#xmr #XMR將被幣安下架 #隐私赛道 #zen
See original
[A web3 concept every day] Classification of consensus mechanisms People who don’t understand the consensus mechanism must have this question: Why are there so many consensus mechanisms? As mentioned earlier, the consensus mechanism is to solve the "trust problem", that is, to make everyone believe that something really happened. Returning to technology, it is actually to allow the distributed system to reach a consistent state, but this is not the only characteristic of the distributed system. Generally speaking, distributed systems have several most important characteristics: consistency, availability, partition tolerance, liveness, scalability, etc. However, according to the FLP theorem and the CAP theorem, there is no way for a distributed system to have consistency and high availability at the same time, which means that the design of all consensus mechanisms must make a trade-off. Therefore, current projects will basically make some innovations at the consensus mechanism level to better adapt to actual needs and application scenarios. But generally speaking, there are standards for the classification of consensus mechanisms. The simplest one is classified based on participation rights. Consensus mechanisms that require authorization to participate are often used in private chains and consortium chains, such as PBFT; consensus mechanisms that everyone can participate without authorization are used in public chains, such as PoW. Secondly, it can be classified according to resource types, such as computing resources such as PoW, pledged assets such as PoS, storage space such as PoC (Proof of Space/Storage), etc. This is also the consensus mechanism type most commonly used in public chains. Of course, it can also be classified according to the strength of consistency. Strong consistency such as Paxos, Raft, PBFT, and non-strong consistency such as PoW, PoS, etc. It can also be classified according to the fault tolerance types we talked about before, such as those that can tolerate crash failures but cannot tolerate Byzantine faults, such as Paxos, VR, etc.; there are also those that can tolerate malicious nodes and malicious behaviors, such as PBFT, PoW, PoS, etc. Finally, it can also be classified according to finality. The mechanism that is irreversible after the decision is executed is represented by PBFT; the mechanism that is reversible within a certain period of time after the decision is executed, but as time goes by, the possibility of reversibility becomes smaller and smaller, is represented by PoW. Consensus mechanism is a large subject. We always hear about endless innovations, but it remains the same. As long as you understand the characteristics of distributed systems, consensus mechanism is not mysterious. #共识机制 #热门话题
[A web3 concept every day] Classification of consensus mechanisms
People who don’t understand the consensus mechanism must have this question: Why are there so many consensus mechanisms?

As mentioned earlier, the consensus mechanism is to solve the "trust problem", that is, to make everyone believe that something really happened. Returning to technology, it is actually to allow the distributed system to reach a consistent state, but this is not the only characteristic of the distributed system. Generally speaking, distributed systems have several most important characteristics: consistency, availability, partition tolerance, liveness, scalability, etc. However, according to the FLP theorem and the CAP theorem, there is no way for a distributed system to have consistency and high availability at the same time, which means that the design of all consensus mechanisms must make a trade-off.

Therefore, current projects will basically make some innovations at the consensus mechanism level to better adapt to actual needs and application scenarios. But generally speaking, there are standards for the classification of consensus mechanisms.

The simplest one is classified based on participation rights. Consensus mechanisms that require authorization to participate are often used in private chains and consortium chains, such as PBFT; consensus mechanisms that everyone can participate without authorization are used in public chains, such as PoW.

Secondly, it can be classified according to resource types, such as computing resources such as PoW, pledged assets such as PoS, storage space such as PoC (Proof of Space/Storage), etc. This is also the consensus mechanism type most commonly used in public chains.

Of course, it can also be classified according to the strength of consistency. Strong consistency such as Paxos, Raft, PBFT, and non-strong consistency such as PoW, PoS, etc.

It can also be classified according to the fault tolerance types we talked about before, such as those that can tolerate crash failures but cannot tolerate Byzantine faults, such as Paxos, VR, etc.; there are also those that can tolerate malicious nodes and malicious behaviors, such as PBFT, PoW, PoS, etc.

Finally, it can also be classified according to finality. The mechanism that is irreversible after the decision is executed is represented by PBFT; the mechanism that is reversible within a certain period of time after the decision is executed, but as time goes by, the possibility of reversibility becomes smaller and smaller, is represented by PoW.

Consensus mechanism is a large subject. We always hear about endless innovations, but it remains the same. As long as you understand the characteristics of distributed systems, consensus mechanism is not mysterious.

#共识机制 #热门话题
See original
The delisting of Monero has been causing a stir since the end of last year. There are still people running with faith on the track How much role privacy plays in the development of distributed technology still needs to be understood dialectically, but without exception, the emergence and withdrawal of any technology have their own significance. As long as you are willing to research, your knowledge will always be pushed forward. In the near future, I will share my knowledge about the privacy track for everyone to learn from. #xmr #门罗币 #Zen #隐私
The delisting of Monero has been causing a stir since the end of last year.
There are still people running with faith on the track
How much role privacy plays in the development of distributed technology still needs to be understood dialectically, but without exception, the emergence and withdrawal of any technology have their own significance. As long as you are willing to research, your knowledge will always be pushed forward.
In the near future, I will share my knowledge about the privacy track for everyone to learn from.
#xmr #门罗币 #Zen #隐私
See original
[A web3 concept every day] Quickly understand DPoS DPoS (Delegated Proof of Stake), the full name is Delegated Proof of Stake. We have talked about PoW and PoS before. Their shortcomings are obvious. PoW will consume a lot of resources, while PoS will not consume resources, but they can easily lead to the rich getting richer, leading to the centralization of the blockchain system. In order to deal with these two problems, DPoS emerged. In DPoS, currency holders can vote for a small number of nodes to serve as representatives. These representatives are responsible for verifying transactions and creating new blocks. They are called witnesses (Witnesses). Only the top N with the total number of consent votes (different chains will have different standards) can be selected as witnesses. This batch of witnesses will randomly verify and package the data in the next 1-2 days, and the next batch of witnesses will be replaced as soon as the time is up. At the same time, currency holders can also vote for Delegates. Representatives have more rights. They can change network parameters, including transaction fees, block size, witness fees, block intervals, etc. Since only a few elected representatives participate in the consensus process, DPOS is usually faster and more efficient than other mechanisms, while also avoiding centralization issues because currency holders will choose less centralized nodes to be witnesses. People and representatives. #dpos #DCA #避免中心化 #Tao #restaking
[A web3 concept every day] Quickly understand DPoS
DPoS (Delegated Proof of Stake), the full name is Delegated Proof of Stake.

We have talked about PoW and PoS before. Their shortcomings are obvious. PoW will consume a lot of resources, while PoS will not consume resources, but they can easily lead to the rich getting richer, leading to the centralization of the blockchain system.

In order to deal with these two problems, DPoS emerged. In DPoS, currency holders can vote for a small number of nodes to serve as representatives. These representatives are responsible for verifying transactions and creating new blocks. They are called witnesses (Witnesses). Only the top N with the total number of consent votes (different chains will have different standards) can be selected as witnesses. This batch of witnesses will randomly verify and package the data in the next 1-2 days, and the next batch of witnesses will be replaced as soon as the time is up.

At the same time, currency holders can also vote for Delegates. Representatives have more rights. They can change network parameters, including transaction fees, block size, witness fees, block intervals, etc.

Since only a few elected representatives participate in the consensus process, DPOS is usually faster and more efficient than other mechanisms, while also avoiding centralization issues because currency holders will choose less centralized nodes to be witnesses. People and representatives.
#dpos #DCA #避免中心化
#Tao #restaking
See original
[One web3 concept every day] Quickly understand POS The flaw of POW is that everyone consumes a lot of energy, so it has been criticized by many people. If you want to achieve universal trust (a coined word, universal trust), there are also some other algorithms that can achieve it. One of them is POS. POS (Proof of Stake), also called proof of equity. What are rights and interests? It is the assets owned by users in the blockchain system. So what is proof of stake? It is easy to understand by taking an example from "Fengshen". Nodes pledge their rights and interests to the chain as "protons" and become "verifiers". When a block is to be produced, the system will randomly select a verifier to package the transaction. If this verifier is a "traitor" and has malicious behavior , then the system will confiscate his "protons" as punishment. Although the mechanism is different from that of POW, the principles are the same. They all assume that there are traitors in the blockchain system, and that traitors will pay huge costs for doing evil. POW chooses to let participants answer questions, which requires a lot of computing resources and is extremely costly to control the network. POS, on the other hand, chooses to let all participants take hostages. If the traitor does evil, then his hostages will be killed. In many PoS systems, a participant's chance of becoming a validator is directly proportional to the "stake" he holds. This means that validators who stake more assets have a higher chance of being selected as the creator of the next block. At the same time, validators are rewarded for their verification work, perhaps in the form of newly issued currency or network transaction fees. Finally, in some POS mechanisms, the rights and interests are not only tokens, but also the time of holding the currency, reputation, points, etc., which can be counted as rights and interests. Therefore, broadly speaking, POS does not necessarily require pledging tokens. #pos #pow #MAV
[One web3 concept every day] Quickly understand POS
The flaw of POW is that everyone consumes a lot of energy, so it has been criticized by many people. If you want to achieve universal trust (a coined word, universal trust), there are also some other algorithms that can achieve it. One of them is POS.

POS (Proof of Stake), also called proof of equity. What are rights and interests? It is the assets owned by users in the blockchain system. So what is proof of stake? It is easy to understand by taking an example from "Fengshen". Nodes pledge their rights and interests to the chain as "protons" and become "verifiers". When a block is to be produced, the system will randomly select a verifier to package the transaction. If this verifier is a "traitor" and has malicious behavior , then the system will confiscate his "protons" as punishment.

Although the mechanism is different from that of POW, the principles are the same. They all assume that there are traitors in the blockchain system, and that traitors will pay huge costs for doing evil. POW chooses to let participants answer questions, which requires a lot of computing resources and is extremely costly to control the network. POS, on the other hand, chooses to let all participants take hostages. If the traitor does evil, then his hostages will be killed.

In many PoS systems, a participant's chance of becoming a validator is directly proportional to the "stake" he holds. This means that validators who stake more assets have a higher chance of being selected as the creator of the next block. At the same time, validators are rewarded for their verification work, perhaps in the form of newly issued currency or network transaction fees.

Finally, in some POS mechanisms, the rights and interests are not only tokens, but also the time of holding the currency, reputation, points, etc., which can be counted as rights and interests. Therefore, broadly speaking, POS does not necessarily require pledging tokens.
#pos #pow #MAV
Explore the lastest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number

Latest News

--
View More

Trending Articles

View More
Sitemap
Cookie Preferences
Platform T&Cs