Changes

Jump to navigation Jump to search
no edit summary
Line 4: Line 4:  
Users are incentivised to host and secure the database through a process known as 'mining', whereby a node is rewarded for a proof of work with a portion of cryptographically signed unique data. This may be performed by solving a cryptographic puzzle, showing proof of bandwidth or proof of storage. The proof of bandwidth model is similar to that of the popular [https://en.wikipedia.org/wiki/BitTorrent BitTorrent] protocol, which forces users to upload sufficient data to be eligible to download data.
 
Users are incentivised to host and secure the database through a process known as 'mining', whereby a node is rewarded for a proof of work with a portion of cryptographically signed unique data. This may be performed by solving a cryptographic puzzle, showing proof of bandwidth or proof of storage. The proof of bandwidth model is similar to that of the popular [https://en.wikipedia.org/wiki/BitTorrent BitTorrent] protocol, which forces users to upload sufficient data to be eligible to download data.
   −
Ownership of arbitrary 'blocks' of the chain can be cryptographically transferred to different addresses across the network, requiring ultimately at the entire network reaches a consensus over who-owns-what within the network.
+
Ownership of arbitrary 'blocks' of the chain can be cryptographically transferred to different addresses across the network, requiring ultimately the entire network reaches a consensus over who-owns-what within the network.
    
== Applications ==
 
== Applications ==

Navigation menu