Changes

Jump to navigation Jump to search
no edit summary
Line 2: Line 2:     
== Network ==
 
== Network ==
Users are incentivised to host and secure the database through a process known as 'mining', whereby a node is rewarded for a proof of work with a portion of cryptographically signed unique data. This may be performed by solving a cryptographic puzzle, showing proof of bandwidth or proof of storage. The proof of bandwidth model is similar to that of the popular [https://en.wikipedia.org/wiki/BitTorrent BitTorrent] protocol, which forces users to sufficient data to be eligible to download data.
+
Users are incentivised to host and secure the database through a process known as 'mining', whereby a node is rewarded for a proof of work with a portion of cryptographically signed unique data. This may be performed by solving a cryptographic puzzle, showing proof of bandwidth or proof of storage. The proof of bandwidth model is similar to that of the popular [https://en.wikipedia.org/wiki/BitTorrent BitTorrent] protocol, which forces users to upload sufficient data to be eligible to download data.
    
Ownership of arbitrary 'blocks' of the chain can be cryptographically transferred to different addresses across the network, requiring ultimately at the entire network reaches a consensus over who-owns-what within the network.
 
Ownership of arbitrary 'blocks' of the chain can be cryptographically transferred to different addresses across the network, requiring ultimately at the entire network reaches a consensus over who-owns-what within the network.

Navigation menu