@mowliv I think a good way to think about it is by looking at our economy. The Federal Reserve prints US dollars for the US Government (the main blockchain) to boost the US economy. However, US dollars can be exported to other countries (a side chain) that could have a completely independent economy but still use a currency backed by the US government. – Olshansk May 30 '17 at 0:56
The NPD report noted IBM is partnering with nine retailers and food companies (Walmart, Unilever, Nestle, Dole, Tyson Foods, Golden State Foods, McCormick & Co., McLane Co., and Driscoll’s) to revamp data management processes with blockchain. Walmart uses blockchain in China to source its pork all the way from the pig to the customer. This enables the retailers to provide transparency to all the players along the supply chain.
– The transactions added to the blockchain are public: the whole world (Member of the network as non-members) can access transactions that are added to the blockchain. The information of the transactions is made public for the miners who do not know the other members, to check the conformity (for example that the person who has created a transaction holds enough bitcoins). These transactions are obviously not nominative, only your public key appears, but if someone knows your public key, he will be able to find all the transactions that you have created.
2) Yes – I had to keep things short/simple in this intro article in order to get across the key ideas. But you’re right: the sidechains need to be secured. But how that happens is a matter for the sidechain. If somebody can produce a false “proof” that the locked Bitcoins should be released on the Bitcoin side then that’s a problem for the sidechain, of course (somebody presumably just had their coins stolen!) but it’s irrelevant (at a macro level) on the Bitcoin side.
Private and Public Blockchain occurs when the financial enterprises start to explore the various blocks of the Blockchain technology. These two Blockchains are coming up with business oriented models as to obtain the difference between the two. The private blockchain generates at a lower cost and faster speed than the public blockchain. In the previous years, the blockchain has grown to become an interesting subject globally. It is becoming an integrated part in the financial sectors all over the digital world.

Space-O is one stop solution for all your mobile software development needs. From concept to development to marketing to ongoing maintenance, Space-O delivers. We are now one of the top mobile app development companies in India by following the success mantra of “Design-led-Engineering”. We work with best-of-the-best fine art grads from top design institutes such as NID and best-of-the-best engineers. Space-O's ability ... Read more


Blockchain, trust, decentralization, Bitcoin, transparency, anonymity, blockchain, blockchain, blockchain. These words seem to appear randomly on the Web regardless the theme of an article you read. Don’t you know how to implement blockchain in art? There’s definitely someone who can tell you. Do you wonder how banking can benefit from blockchain? No worries, some projects already do it – just search for the use cases.
2. Ardor’s Blockchain as a service platform for business: Ardor uses the Proof of Stake consensus mechanism. Ardor calls its sidechains ‘childchains’, and they are tightly integrated into the main chain. Security is enhanced because all transactions are processed and secured by parent chain forgers. Most transactions are pushed down to the childchain level, as the parent mainchain retains minimal features. Global entities such as assets and currencies across chains can be accessed through childchains.
The witnesses who put more funds in escrow have a greater chance of mining (or minting) the next block. The incentives line up nicely here. There are only a few witnesses and they get paid to be witnesses, so they are incentivized to not cheat. If they do cheat and get caught, they not only get voted out in favor of the next eagerly awaiting witness, they lose all the funds they had in escrow.
Zestminds is an IT consulting and services provider, providing end-to-end consulting for global clients. Zestminds has partnered with several start-ups to SME in building their next generation information infrastructure for competitive advantage. The Zestminds portfolio of services includes legacy application maintenance, large application development, e-strategy consulting and solutions. The offshore Model of the company leverages talent and inf ... Read more
Decentralized web. The sidechain technology holds premises to expand one of the main values of the blockchains – the decentralization of confidence. There is no need for central structure behind the transactions - the holders of cryptocurrencies are free to use their assets the way they want. The sidechains make their deals even more protected and reliable.
Alpha functions as a sidechain to Bitcoins testnet. The peg mechanism currently works through a centralized protocol adapter, as stated in the sidechains whitepaper. An auditable federation of signers manages Testnet coins transferred to the sidechain. The federation is also relied upon to produce blocks through the signed blocks element. This creates the possibility of exploring the possibilities of the new chain using different security trade-offs.
Perhaps blocks are created faster on that sidechain. Perhaps transaction scripts are “turing complete”. Perhaps you have to pay fees to incent those securing that sidechain. Who knows. The rules can be whatever those running that sidechain want them to be. The only rule that matters is that the sidechain agrees to follow the convention that if you can prove you put some Bitcoins out of reach on the Bitcoin network, the same number will pop into existence on the sidechain.
Thus Tradle set out to build a meta-protocol that saves the data in the overlay network, and only puts minimal referencing data on the blockchain. There is a general grumpy consensus among bitcoin core devs and mining pool operators on allowing one small data chunk, a hash, per transaction. Many devs say it is not possible to secure this second overlay network. I agree, unless we use the blockchain to help with the task. We have a partial solution working, and are preparing a new design to improve it (partial, as it can not yet handle all known attacks). We are actively sharing the designs at various meetups (and on the github) and are inviting devs to find attack vectors and propose solutions. Tradle’s protocol not only relieves the pressure on bitcoin’s blockchain but is also able to handle larger transaction sizes than Counterparty and Mastercoin, so it can be used for complex identity, supply chain management and many other applications. It is also capable of handling attachment files, needed in the healthcare and financial industries.
@tradles – thanks for taking the time to explain this. OK – so I get the debate around blockchain bloat and the (grudging) inclusion of OP_RETURN, etc., but what I’m missing is that I can only really see one scenario where embedding any identity data into the blockchain makes sense…. and that’s when I want to *associate* an identity with a transaction I’m performing.

The information on every public blockchain is subsequently replicated to sometimes thousands of nodes on the network. No one power administers it centrally, hence, hackers can’t destroy the network by crippling one central server. Read this article “What is Blockchain technology? A step-by-step Guide For Beginners”, for a more detailed description of the technology.

Side chains have two main advantages. Their first advantage they have is that they are permanent. You do not have to create a new sidechain every time you need to use one. Once a side chain is built, it is maintained and can be used by anyone doing a specified task off the main chain. The other advantage of sidechains is that they allow interaction between different cryptocurrencies. Developers get the opportunity to test software upgrades as well as beta coin releases before they are released on the main chain.


The differences between these types of blockchains are based on the levels of trust existing among the members of the network and the resulting level of security. Indeed, the higher the level of trust between the members of the network, the lighter the consensus mechanism (which aims to add the blocks to the blockchain securely). As we will see, there is no trust between the members of a public blockchain since it is open to everyone and inversely the confidence is much stronger on the private blockchain since members are pre-selected. In networks based on a blockchain, the level of trust among the members therefore directly impacts the structure and mechanisms of the network.
Blockchain technology can be used to create a permanent, public, transparent ledger system for compiling data on sales, tracking digital use and payments to content creators, such as wireless users [65] or musicians.[66] In 2017, IBM partnered with ASCAP and PRS for Music to adopt blockchain technology in music distribution.[67] Imogen Heap's Mycelia service has also been proposed as blockchain-based alternative "that gives artists more control over how their songs and associated data circulate among fans and other musicians."[68][69] Everledger is one of the inaugural clients of IBM's blockchain-based tracking service.[70]
ELEKS helps clients transform their businesses digitally by providing expert software engineering and consultancy services. We deliver high tech innovations to Fortune 500 companies, big enterprises and technology challengers, improving the ways they work and boosting the value they create for the modern world.   Our 1,100+ professionals located in the Delivery Centers across Eastern Europe and sales offices in Europe, the US and Japan ... Read more

@gendal I am discussing private chains with prospects, so my interest is not superficial and theoretical. I see the benefits for the organization in using the private chain as another form of internal database, with better security properties. It can also be used where a service bus product would be today, to facilitate integration, conformance, monitoring, audit. Private chain can also, via a two way peg, be connected to the main chain, achieving a form of public/private network divide that routers created for us in the early stages of the Internet development. Anything else on the benefits side that I missed?

This segment is where we have seen the most rapid metamorphosis in the past year, mostly in financial services. These solutions are industry-specific, and they are based on private blockchain or ledger infrastructures. A caveat here is that some of these are not full blockchains. Rather, they are distributed ledgers, which are a subset of blockchain capabilities. And some don’t even include a consensus element, which takes the implementation another level down from distributed ledger tech.
A side-chain is a secondary blockchain layer designed to facilitate lower-cost and/or higher-speed transactions between two or more parties. One case in which they're often deployed is between parties who make many transactions amongst each other. Committing all of those transactions to the public blockchain would may undesirable for cost or other reasons, so the side-chain's job in this example would be to aggregate the activity into the least transactional activity necessary to reflect the final state of the side-chain's ledger.
@mowliv I think a good way to think about it is by looking at our economy. The Federal Reserve prints US dollars for the US Government (the main blockchain) to boost the US economy. However, US dollars can be exported to other countries (a side chain) that could have a completely independent economy but still use a currency backed by the US government. – Olshansk May 30 '17 at 0:56

10Clouds is a team of 100+ experienced developers and designers based in Poland, ready to help you build your web and mobile applications. Since 2009 we have built and designed software for more than 90 businesses worldwide, mainly in the United States, Western Europe, and Australia. We partner with companies of all sizes to design, develop, and grow their digital products. Our expertise in web and mobile technologies, including Agile and L ... Read more
Sidechains allow cryptocurrencies to interact with one another. They add flexibility and allow developers to experiment with Beta releases of Altcoins or software updates before pushing them on to the main chain. Traditional banking functions like issuing and tracking ownership of shares can be tested on sidechains before moving them onto main chains. If the security mechanisms for sidechains can be bolstered, sidechain technology holds promise for massive blockchain scalability.
Public blockchains are open, and therefore are likely to be used by very many entities and gain some network effects. To give a particular example, consider the case of domain name escrow. Currently, if A wants to sell a domain to B, there is the standard counterparty risk problem that needs to be resolved: if A sends first, B may not send the money, and if B sends first then A might not send the domain. To solve this problem, we have centralized escrow intermediaries, but these charge fees of three to six percent. However, if we have a domain name system on a blockchain, and a currency on the same blockchain, then we can cut costs to near-zero with a smart contract: A can send the domain to a program which immediately sends it to the first person to send the program money, and the program is trusted because it runs on a public blockchain. Note that in order for this to work efficiently, two completely heterogeneous asset classes from completely different industries must be on the same database - not a situation which can easily happen with private ledgers. Another similar example in this category is land registries and title insurance, although it is important to note that another route to interoperability is to have a private chain that the public chain can verify, btcrelay-style, and perform transactions cross-chain.
Sidechains are responsible for their own security. If there isn’t enough mining power to secure a sidechain, it could be hacked. Since each sidechain is independent, if it is hacked or compromised, the damage will be contained within that chain and won’t affect the main chain. Conversely, should the main chain become compromised, the sidechain can still operate, but the peg will lose most of its value.
@quinn – thanks for the comment. I probably didn’t write clearly enough… I was trying to point out that none of the higher-level concepts we’re familiar with (addresses, bitcoins, the “ledger”, etc) actually exist at the protocol level…. it’s just transactions, transaction outputs, unspent transaction outputs, etc… they combine to create the illusion we’re all familiar with.
Recordemos, como hemos mencionado anteriormente, que actualmente son cientos los proyectos y monedas alternativas que trabajan con su propia cadena de bloques, totalmente desconectadas de la de Bitcoin. Todas con su cotización volatil. El problema de estas monedas es que ninguna de ellas dispone del efecto red ni de la seguridad que sí tiene Bitcoin. De hecho muchas, pese a haber implementado propuestas interesantes, se quedan en nada, con miles de horas y esfuerzo “tirado a la basura”. Incluso algunas de ellas han replicado el codigo de Bitcoin, pero también los fallos que en ese momento pudiera tener y mientras que en Bitcoin si se han solucionado, en esa Altcoin no.
AppTrait Solutions, are not just a mobile app development company but a full-fledged network in itself that is well-versed with the latest market trends and technological advancements. We are also a home to skilled techs that connect with customers and their businesses like you to make change happen. We offer all latest solutions in terms of mobile application development. Our team is well-versed in iOS and Android operating systems and ... Read more
Perhaps blocks are created faster on that sidechain. Perhaps transaction scripts are “turing complete”. Perhaps you have to pay fees to incent those securing that sidechain. Who knows. The rules can be whatever those running that sidechain want them to be. The only rule that matters is that the sidechain agrees to follow the convention that if you can prove you put some Bitcoins out of reach on the Bitcoin network, the same number will pop into existence on the sidechain.

Performance at scale: It is not uncommon for large businesses to process 100,000’s of transactions per second (TPS). Therefore, enterprise blockchains need to scale so that they can deliver performance accordingly. To achieve this, they can compartmentalize processes using containers or similar approaches. Read more about this requirement in this article “Enterprise blockchain ready to go live”.
Side-chain is another blockchain for one blockchain. To use side-chain of Bitcoin, for instance, you need to move BTC from the original chain to the side-chain. Then, BTC on the original chain is locked and the same amount of BTC on the side-chain appears. This is how BTC can be used/tested on another chain where we use some features different from the original ones.
Congratulations! You’ve just educated yourself on the most common advanced topics in blockchain that you’ll hear about. By understanding these concepts, you have a firmer grasp on the fundamental tradeoffs and latest research on the blockchain than most industry “experts”! Better yet, next time you hear your colleagues around the water cooler talking about state channels, the Lightning Network and Byzantine fault tolerance, not only will you know what they’re talking about but you might be able to teach them a thing or two!

WebClues InfoTech is a one-stop IT solutions provider that specializes in creating wonderful websites and applications for various industries. Our team of brilliant individuals combines years of experience with an eye for beautiful designs to create robust, user-friendly websites and mobile applications that help businesses attract customers.  We've served many clients across the globe including enterprises.  Some of our key ente ... Read more
However, even this would have its own separate value and wouldn't necessarily solve any issue especially if a market is deemed to be, well, worthless. The two-way peg isn't perfect however. Especially since SPV can theoretically be tricked into crediting more coins than were originally deposited. If the attack will then transfer those coins back onto the parent it would take coins from another user on the Sidechain to fund the imbalance. And in the process create a permanent dissilience between the two chains. In order to strengthen the security of a Sidechain beyond just SPV, it would require the parent to soft fork and upgrade its core wallet software so that both chains can then validate transfers between them.
The good thing about sidechains is that they are independent of their main chain. Sidechains take care of their own security. Problems occurring on the sidechain can, therefore, be controlled without affecting the main chain. Likewise, a security problem on the main chain does not affect the sidechain although the value of the peg is greatly reduced.
Consortium blockchains: a consortium blockchain is a blockchain where the consensus process is controlled by a pre-selected set of nodes; for example, one might imagine a consortium of 15 financial institutions, each of which operates a node and of which 10 must sign every block in order for the block to be valid. The right to read the blockchain may be public, or restricted to the participants, and there are also hybrid routes such as the root hashes of the blocks being public together with an API that allows members of the public to make a limited number of queries and get back cryptographic proofs of some parts of the blockchain state. These blockchains may be considered "partially decentralized".
Bitdeal is a bitcoin cryptocurrency exchange software & Blockchain development company. The main focus of the firm is to reduce the risks in bitcoin trading and to encourage new bitcoin exchange startups by providing a well-developed bitcoin exchange script or a cryptocurrency exchange software.  Being a cryptocurrency exchange software solution, bitdeal has covered around 50+ countries around the world, and have collected more than 200+ ... Read more
What Bitcoin’s development team is essentially doing through feature-creep is forcing everyone in the non-tech world to use Bitcoin through commercial proxies to avoid all this complexity (crypto-what? security? sidechain?), which effectively results in the loss of security, relative anonymity and decentralized properties that helped to make it interesting in the first place.
LeewayHertz provides end to end solution to build enterprise-grade blockchain applications.  Experienced in developing multiple blockchain applications for Global Supply Chain, Identity Solution on blockchain and utility bill generation using blockchain.  LeewayHertz has experience working with distributed ledger technology including Hyperledger, Ethereum, R3Corda, and Hashgraph. The team also includes Hedera Hashgraph ambassadors ... Read more
The sidechains vision of the future is of a vast globe-spanning decentralized network of many blockchains, an intertwined cable rather than a single strand, each with its own protocol, rules, and features — but all of them backed by Bitcoin, and protected by the Bitcoin mining network, as the US dollar was once backed by gold. Sidechains can also be used to prototype changes to the fundamental Bitcoin blockchain. One catch, though: this will require a small tweak to the existing Bitcoin protocol.
Imagine there is a Bitcoin-like system out there that you’d like to use. Perhaps it’s litecoin or ethereum or perhaps it’s something brand new.   Maybe it has a faster block confirmation interval and a richer scripting language. It doesn’t matter.   The point is: you’d like to use it but would rather not have to go through the risk and effort of buying the native tokens for that platform. You have Bitcoins already. Why can’t you use them?
Congratulations! You’ve just educated yourself on the most common advanced topics in blockchain that you’ll hear about. By understanding these concepts, you have a firmer grasp on the fundamental tradeoffs and latest research on the blockchain than most industry “experts”! Better yet, next time you hear your colleagues around the water cooler talking about state channels, the Lightning Network and Byzantine fault tolerance, not only will you know what they’re talking about but you might be able to teach them a thing or two!

Security: RSK´s blockchain is secured by merge-mining, which means that they can achieve the same security as Bitcoin in terms of double-spend prevention and settlement finality. The 2way peg security will first rely in a federation holding custody of bitcoins, and later switch to an automatic peg, when the community accepts the security trade-offs of the automatic peg.

A blockchain is a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that the record cannot be altered retroactively without the alteration of all subsequent blocks and the consensus of the network.[1][18] This allows the participants to verify and audit transactions inexpensively.[19] A blockchain database is managed autonomously using a peer-to-peer network and a distributed timestamping server. They are authenticated by mass collaboration powered by collective self-interests.[20] The result is a robust workflow where participants' uncertainty regarding data security is marginal. The use of a blockchain removes the characteristic of infinite reproducibility from a digital asset. It confirms that each unit of value was transferred only once, solving the long-standing problem of double spending. Blockchains have been described as a value-exchange protocol.[13] This blockchain-based exchange of value can be completed quicker, safer and cheaper than with traditional systems.[21] A blockchain can assign title rights because, when properly set up to detail the exchange agreement, it provides a record that compels offer and acceptance.
Sidechains interactuando con blockchain. Blockstream explica en su paper como, a las sidechains, se les añade una nueva pieza llamada two-way peg. Two-way peg es “el conector” entre ambas cadenas y se encarga de hacer la “magia” para que los bitcoins “salten” a la otra cadena. Juntando ambas cosas obtenemos las pegged sidechain: cadenas laterales conectadas en todo momento. En la imagen puedes observar como, incluso, las sidechain pueden interactuar entre ellas. ¿Llegaremos a un escenario de blockchains interactuando con aspecto fractal?
Focaloid is a digital solutions providing company that focuses on developing value-adding technology solutions with user-engaging designs. Broadly, our services include Enterprise, Mobile & Web Platform Solutions, Design and Animation Solutions.  We engage in creating customer-centric applications on multiple platforms in mobile and web. Our web and mobile application development span across platforms such as Android, iOS, Java, Ruby ... Read more

Quest Global Technologies is a leading software development organization that works on Blockchain, customized ERP, Mobile Apps, Salesforce and Web Development. Quest Global Technologies has been rated as TOP mobile application developers by Appfutura and is covered by Entrepreneur Magazine. Quest Global Technologies has the vision to make its clients successful by leveraging technology to increase sales, automation and reduce wastage. www.cryp ... Read more
S-PRO offers custom cross-platform mobile app development services and Blockchain development. We provide full cycle development solutions for Startups and small businesses. During years of MVP development we create our own flow how to turn idea into a valuable product. React Native is a core technology that we use in mobile development. Also our team know how to use Blockchain technology on your prolect. We use blockchain-based ledgers, ident ... Read more

Plasma is a proposed framework for incentivized and enforced execution of smart contracts which is scalable to a significant amount of state updates per second (potentially billions) enabling the blockchain to be able to represent a significant amount of decentralized financial applications worldwide. These smart contracts are incentivized to continue operation autonomously via network transaction fees, which is ultimately reliant upon the underlying blockchain (e.g. Ethereum) to enforce transactional state transitions.
Federated Blockchains operate under the leadership of a group. As opposed to public Blockchains, they don’t allow any person with access to the Internet to participate in the process of verifying transactions. Federated Blockchains are faster (higher scalability) and provide more transaction privacy. Consortium blockchains are mostly used in the banking sector. The consensus process is controlled by a pre-selected set of nodes; for example, one might imagine a consortium of 15 financial institutions, each of which operates a node and of which 10 must sign every block in order for the block to be valid. The right to read the blockchain may be public, or restricted to the participants.
@gendal, good question. Think of the identity hash as a bitcoin address, it is indeed public. So to assert anything with this identity you need to sign the object you are creating or changing with the identity’s private key. Specifically it is a private key that corresponds to a public key that you published in your identity’s object (json). The signature is not placed on the bitcoin transaction, as OP_RETURN has only 40 bytes. The signature is added to a [json] object that is modified with this identity. If you see any fault with this, please let me know.
In general, so far there has been little emphasis on the distinction between consortium blockchains and fully private blockchains, although it is important: the former provides a hybrid between the “low-trust” provided by public blockchains and the “single highly-trusted entity” model of private blockchains, whereas the latter can be more accurately described as a traditional centralized system with a degree of cryptographic auditability attached. However, to some degree there is good reason for the focus on consortium over private: the fundamental value of blockchains in a fully private context, aside from the replicated state machine functionality, is cryptographic authentication, and there is no reason to believe that the optimal format of such authentication provision should consist of a series of hash-linked data packets containing Merkle tree roots; generalized zero knowledge proof technology provides a much broader array of exciting possibilities about the kinds of cryptographic assurances that applications can provide their users. In general, I would even argue that generalized zero-knowledge-proofs are, in the corporate financial world, greatly underhyped compared to private blockchains.
×