Changes

Jump to navigation Jump to search
Line 3: Line 3:  
== Network ==
 
== Network ==
 
Users are incentivised to host and secure the database through a process known as 'mining', whereby a node is rewarded for a proof of work with a portion of cryptographically signed unique data. This may be performed by solving a cryptographic puzzle, showing proof of bandwidth or proof of storage. The proof of bandwidth model is similar to that of the popular [https://en.wikipedia.org/wiki/BitTorrent BitTorrent] protocol, which forces users to sufficient data to be eligible to download data.
 
Users are incentivised to host and secure the database through a process known as 'mining', whereby a node is rewarded for a proof of work with a portion of cryptographically signed unique data. This may be performed by solving a cryptographic puzzle, showing proof of bandwidth or proof of storage. The proof of bandwidth model is similar to that of the popular [https://en.wikipedia.org/wiki/BitTorrent BitTorrent] protocol, which forces users to sufficient data to be eligible to download data.
 +
 +
Ownership of arbitrary 'blocks' of the chain can be cryptographically transferred to different addresses across the network, requiring ultimately at the entire network reaches a consensus over who-owns-what within the network.
    
== Applications ==
 
== Applications ==

Navigation menu