Tendermint

A Great Explanation of Tendermint and Cosmos!

We have transcribed the really exciting speech of Gautier Marin-Dagannaud, product engineer at Tendermint, during the CryptoMondaysParis from 23/07/18 at Station F in Patis! Gautier: So, hello everyone, my name is Gautier, I'm an engineer...
ethereum-casper

Vitalik Buterin Explains Casper’s last developments in a ‘Tweet Storm’

This Tweet thread can be found on Vitalik Buterin’s Twitter page. We have transcripted it here for convenience. “ Today I am going to make a tweet storm explaining the history and state of Ethereum’s...
Algorithme des Généraux Byzantins

Byzantin Fault Tolerance: The Private Blockchains Consensus Mechanism

With the question of the Byzantine default, we touch one of the main problems that face decentralized networks relying on a blockchain. When computers are organized in networks, there are mainly two types of defaults:...

Decentralized Applications Stack

The current development of public blockchains (as private ones) is very similar to what happened to the Internet at its beginning. The Internet was only constituted of intranets, i.e private networks attached to an...
Clé privé clé publique

Asymmetric key Encryption: how your public key and private keys are created?

The encryption of asymmetric key is a central mechanism in bitcoin operations and cryptocurrencies in general. Almost all of the existing tokens are exchanged through this mechanism. The name may sound scary at first,...

Lightning Network: Enemy or Ally of the Bitcoin?

It is getting every day more evident that the bitcoin presents many limitations as a means of payment. Limitations on the size of the blocks (1MB maximum) and the speed of adding blocks to...
Blockchain privée

Private Blockchain vs Public Blockchain

You cannot be a crypto investor or entrepreneur without having a real understanding of the differences between these types of blockchains as well as their implications. Even if they are based on similar principles,...

Hashing Algorithm: the complete guide to understand

A hashING algorithm organizes the implementation of a hash function as a set of digital values. This introduction may seem difficult to understand, yet the concept is not difficult to get. Of course we are...
Proof of Work

A simple explanation of “Proof of Work”

PROOF OF WORK did not appear with the Bitcoin. Its main purpose is to secure the network while it membres find an agreement on the order of the transactions that will be added to...
internet of things

Internet of Things: Blockchain, Lightning Network and Tangle

Internet of things is already a reality. You have of course heard about connected objects that are invading every day a little more our life. These are all the sensors installed in our cars,...
Proof of work

Proof of Work vs Proof of Stake

The goal of consensus system in a decentralized network relying on a blockchain is to allow the members of the network to find an agreement among these members on the current state of the...
Delegated Proof of Stake

Delegated Proof of Stake: the crypto-democracy

The main difficulty in a decentralised network is to make all the membres agree on the validity and the order of the transactions realised among these members. The purpose of the conensus systems is precisely...

Follow me on Social media