Blockchain-based smart contracts are proposed contracts that could be partially or fully executed or enforced without human interaction.[55] One of the main objectives of a smart contract is automated escrow. An IMF staff discussion reported that smart contracts based on blockchain technology might reduce moral hazards and optimize the use of contracts in general. But "no viable smart contract systems have yet emerged." Due to the lack of widespread use their legal status is unclear.[56]
Sidechains interactuando con blockchain. Blockstream explica en su paper como, a las sidechains, se les añade una nueva pieza llamada two-way peg. Two-way peg es “el conector” entre ambas cadenas y se encarga de hacer la “magia” para que los bitcoins “salten” a la otra cadena. Juntando ambas cosas obtenemos las pegged sidechain: cadenas laterales conectadas en todo momento. En la imagen puedes observar como, incluso, las sidechain pueden interactuar entre ellas. ¿Llegaremos a un escenario de blockchains interactuando con aspecto fractal?
Start mining on node 1 by using the function miner.start(1), where 1 refers to the number of threads. Note that the miner.start(n) function will always return "null." Unless you have many CPU cores, keep the thread number low to avoid high CPU usage. Note that mining without any pending transaction can still earn your default account incentive (ETH). It creates empty blocks, thus strengthening the integrity of the blockchain tree.

However, the Lightning Network would, again, require a change to the existing Bitcoin protocol. (Though again it would be a “soft fork,” i.e. the existing blockchain would remain fully valid.) And/or — you guessed it — a Lightning sidechain. What’s more, one of the changes it requires, the elimination of transaction malleability, is handled by the Segregated Witness work in Sidechain Elements. (correction: all of of the changes required are incorporated into Elements Alpha — it’s Lightning-ready out of the box.)
A public blockchain is a platform where anyone on the platform would be able to read or write to the platform, provided they are able to show the proof of work for the same. There has been a lot of activity in this space as the number of potential users that any technology in this space could generate is high.  Also, a public blockchain is considered to be a fully decentralized blockchain. Some of the examples are:

^ Jump up to: a b c d Bhaskar, Nirupama Devi; Chuen, David Lee Kuo (2015). "3 – Bitcoin Mining Technology". In Cheun, David Lee Kuo. Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data. Academic Press. pp. 47–51. ISBN 978-0-12-802117-0. Archived from the original on 25 October 2016. Retrieved 2 December 2016 – via ScienceDirect.


However, even this would have its own separate value and wouldn't necessarily solve any issue especially if a market is deemed to be, well, worthless. The two-way peg isn't perfect however. Especially since SPV can theoretically be tricked into crediting more coins than were originally deposited. If the attack will then transfer those coins back onto the parent it would take coins from another user on the Sidechain to fund the imbalance. And in the process create a permanent dissilience between the two chains. In order to strengthen the security of a Sidechain beyond just SPV, it would require the parent to soft fork and upgrade its core wallet software so that both chains can then validate transfers between them.


An important distinction to be made about sidechains that needs to be understood is that sidechains themselves help to fuel innovation through experimentation. Rather than providing scalability directly, they allow for trivial experimentation on sidechains with various scalability mechanisms. Using sidechains, one can avoid the problems of initial distribution, market volatility, and barriers to entry when experimenting with altcoins due to the inherent derivation of their scarcity and supply from Bitcoin. That being said, each sidechain is independent and flexible to tool around with various features.
A private blockchain network requires an invitation and must be validated by either the network starter or by a set of rules put in place by the network starter. Businesses who set up a private blockchain, will generally set up a permissioned network. This places restrictions on who is allowed to participate in the network, and only in certain transactions. Participants need to obtain an invitation or permission to join. The access control mechanism could vary: existing participants could decide future entrants; a regulatory authority could issue licenses for participation; or a consortium could make the decisions instead. Once an entity has joined the network, it will play a role in maintaining the blockchain in a decentralized manner.
×