The decentralized peer-to-peer network has a different security logic from the centralized systems. Currently, there have been several consensus mechanics in place to maintain the validity and security of peer-to-peer network transactions. The most popular include proof of work, proof of stake and proof of capacity. Yet, these three consensus mechanics have limitations and are context-specific (for instance, only suitable for the decentralized finance realm). Now, for different functionalities like document and supply chain management, there is a new consensus mechanics called the proof of participation. This security system works by measuring the validity of peer-to-peer network activities in order to sustain authentic transactions and detect suspicious ones. Our colleague Adela Negara will explain how the proof of participation differs from the three most popular consensus mechanics in this video.
Host: Julia Martinez
Speaker: Adela Negara
Videographer: Putu Christian Welly Robin
Stylist: Winarsih Tohir
Expert reviewer: Jaspal Singh
For more information, head to [ Ссылка ] and be sure to download the first volume of the "the journey toward decentralization" series here: [ Ссылка ] (if you want buy the physical book, or the Kindle edition, you can find it at [ Ссылка ]-... ).
Ещё видео!