Cuando esta transacción recibe las suficientes confirmaciones, se manda una notificación a la otra cadena de bloques (la que tú quieres utilizar) en el que se adjunta la prueba de que las monedas han sido enviadas por ti a esa dirección especial de la red. Tras ello, en la sidechain se creará, de forma automática, el mismo número exacto de activos que bitcoins se mandaron, dándote a ti el control de los mismos. Es decir, replica en el nuevo activo la cuantía que has enviado de la cadena principal a la sidechain. ¡Muy importante! Recordar que no se han creado o destruido nuevos bitcoins. Simplemente se han movido hasta que no estén usándose en la sidechain.
What Bitcoin’s development team is essentially doing through feature-creep is forcing everyone in the non-tech world to use Bitcoin through commercial proxies to avoid all this complexity (crypto-what? security? sidechain?), which effectively results in the loss of security, relative anonymity and decentralized properties that helped to make it interesting in the first place.
Zestminds is an IT consulting and services provider, providing end-to-end consulting for global clients. Zestminds has partnered with several start-ups to SME in building their next generation information infrastructure for competitive advantage. The Zestminds portfolio of services includes legacy application maintenance, large application development, e-strategy consulting and solutions. The offshore Model of the company leverages talent and inf ... Read more
Always there is a balance in nature, even in blockchains. If you want to have extra features, you need to make a sacrifice from your current features. For example to have high speed and volume; you need to give some from your security & immutability by doing consensus with smaller groups or you need to use different methods in consensus like POS / PBFT. (Proof of Stake / Practical Byzantine Fault Tolerance)
Miners are needed to ensure the safety of the sidechains. This makes the formation of new sidechains a costly venture. Hefty amounts of investments have to be made before any new sidechain can be created. Another downside to sidechains is the requirement of a federation. The extra layer formed by the federation could prove to be a weak point for attackers.
A consortium blockchain is part public, part private. This split works at the level of the consensus process: on a consortium chain, a pre-selected group of nodes control the consensus process, but other nodes may be allowed to participate in creating new transactions and/or reviewing it. The specific configuration of each consortium chain (i.e., which nodes have the power to authorize transactions via the consensus process, which can review the history of the chain, which can create new transactions, and more) is the decision of each individual consortium.
@gendal, good question. Think of the identity hash as a bitcoin address, it is indeed public. So to assert anything with this identity you need to sign the object you are creating or changing with the identity’s private key. Specifically it is a private key that corresponds to a public key that you published in your identity’s object (json). The signature is not placed on the bitcoin transaction, as OP_RETURN has only 40 bytes. The signature is added to a [json] object that is modified with this identity. If you see any fault with this, please let me know.
bitcoin and blockchain blockchain blockchain and enterprise blockchain and finance blockchain and healthcare blockchain network Consensus consensus protocol digital identity Hyperledger hyperledger fabric IBM Blockchain permissioned network Praveen Jayachandran private blockchain public and private blockchain public blockchain public vs private blockchain supply chain the linux foundation