Home New energy Business model Financial community News Live IT Technology More

How Polkadot and BitChed against the malicious attacks and protect chain security?rry coul

2020-11-25 blockchainbb.medium.com

Polkadot maintains every chain around Polkadot by randomly selecting verifier nodes. The larger the pool of verifiers that can be randomly selected, the fairer and safer it will be. The probability that a group of people who want to do evil will be divided together will decrease. Therefore, Polkadot Official hope to have 1000 nodes to maintain the Polkadot chain, At the same time, fisherman, as a police officer in the system, can further strengthen the security of the system by finding out the evil operations and getting rewards.


BitCherry constructs the network protocol of P2Plus in the physical layer through the technology of IPv8. The P2Plus network protocol adopts the point-to-point high-strength private key encryption technology. Only the receiving node can decrypt the transmission content after encryption, which ensures the confidentiality of the transmission content and the privacy of the node. The operation of the whole node is attached to the structure of hashgraph, which can ensure the decentralization without heavy workload proof. At the same time, it can realize the point-to-point encryption of information and ensure the privacy and security of user data in the interaction process.


Although the two projects are different in terms of network architecture, consensus algorithm and privacy security, it is undeniable that Polkadot and BitCherry both project are beginning focus on security and make enough efforts to protect the privacy security on the chain, which is very important for users of blockchain projects.


pvumcvjxrvcatncg4bez.jpg


Disclaimer: This article is reproduced from other media. The purpose of reprinting is to convey more information. It does not mean that this website agrees with its views and is responsible for its authenticity, and does not bear any legal responsibility. All resources on this site are collected on the Internet. The purpose of sharing is for everyone's learning and reference only. If there is copyright or intellectual property infringement, please leave us a message.
© Copyright thekenyadaily.com    Contact Us SiteMap