Ethereum, a provider of decentralized platform and programming language that helps running smart contracts and allows developers to publish distributed applications. Factom, a provider of records management, record business process for business and governments. Blockstream, a provider of sidechain technology, focused on extending capabilities of Bitcoin. The company has started experimenting on providing accounting (considered a function to be done on private blockchain) with the use of public blockchain technology.
Lisk es una plataforma open source en la que se pueden desarrollar y ejecutar smart contracts en forma de aplicaciones descentralizadas o DAPPS multiplataforma. Éstas, y como uno de los puntos fuertes de Lisk, son desarrolladas con, posiblemente, el lenguaje de programación más famoso y usado, Javascript. Aunque con un enfoque genérico, ya han empezado a aparecer algunas soluciones e interés en sectores concretos, como es el caso del Internet de las cosas que, junto a Chain of Things, están empezando a explotar.
Blockstream believes that to be secure, blockchain systems must be built with open source technology. Towards that goal, we've created the Elements Project, a community of people extending and improving the Bitcoin codebase. As open source, protocol-level technology, developers can use Elements to extend the functionality of Bitcoin and explore new applications of the blockchain. Join the expanding group of individual and corporate developers using Elements to build robust, advanced, and innovative blockchains.

By definition, blockchain is a ledger of all transactions that have been executed and could be seen as a write-only platform, wherein transactions once executed cannot be modified later. This platform has been further divided into Public and Private blockchain. Is there a third one? a hybrid mode such as a ‘Consortium blockchain’ as represented by Vitalik Buterin, founder of Ethereum, a decentralized web 3.0 publishing platform.

@tetsu – not sure what you mean. My reading of the sidechains paper is that the worst case scenario is that an attacker manages to “reanimate” Bitcoins on the main blockchain that had been sent to the sidechain… but that would be the attacker stealing the coins from the rightful owner on the sidechain. From Bitcoin’s perspective, the coins were always going to be reanimated…. so the risk is entirely borne by the holder(s) on the sidechain. Am I missing something?


A diferencia con la, hasta ahora, plataforma estrella de smart contracts Ethereum, otra de las diferencias más importantes de Lisk es que, en Lisk, cada aplicación corre sobre su propia sidechain y no sobre una única cadena, cómo es el caso de Ethereum. Por lo tanto, un entorno propio e independiente que podrá exprimir cada desarrollador para cada DAPP desarrollada con un backend en JS/NodeJS y un frontend HTML/CSS/JS.
The differences between these types of blockchains are based on the levels of trust existing among the members of the network and the resulting level of security. Indeed, the higher the level of trust between the members of the network, the lighter the consensus mechanism (which aims to add the blocks to the blockchain securely). As we will see, there is no trust between the members of a public blockchain since it is open to everyone and inversely the confidence is much stronger on the private blockchain since members are pre-selected. In networks based on a blockchain, the level of trust among the members therefore directly impacts the structure and mechanisms of the network.
Parangat Technologies stands tall amongst mobile app development giants. Parangat team of top iPad developers pays special attention to communication and requirement analysis in order to understand project complexity which leads to the foundation of a great application/game and helps in creating long term value for the iPad app user as well as our clients. It has the satisfaction of being one of the leading names in enterprise-level apps devel ... Read more
– The transactions added to the blockchain are public: the whole world (Member of the network as non-members) can access transactions that are added to the blockchain. The information of the transactions is made public for the miners who do not know the other members, to check the conformity (for example that the person who has created a transaction holds enough bitcoins). These transactions are obviously not nominative, only your public key appears, but if someone knows your public key, he will be able to find all the transactions that you have created.

Given all of this, it may seem like private blockchains are unquestionably a better choice for institutions. However, even in an institutional context, public blockchains still have a lot of value, and in fact this value lies to a substantial degree in the philosophical virtues that advocates of public blockchains have been promoting all along, among the chief of which are freedom, neutrality and openness. The advantages of public blockchains generally fall into two major categories:


And now for the second clever part. The logic above is symmetric. So, at any point, whoever is holding these coins on the sidechain can send them back to the Bitcoin network by creating a special transaction on the sidechain that immobilises the bitcoins on the sidechain. They’ll disappear from the sidechain and become available again on the Bitcoin network, under the control of whoever last owned them on the sidechain.
Thus Tradle set out to build a meta-protocol that saves the data in the overlay network, and only puts minimal referencing data on the blockchain. There is a general grumpy consensus among bitcoin core devs and mining pool operators on allowing one small data chunk, a hash, per transaction. Many devs say it is not possible to secure this second overlay network. I agree, unless we use the blockchain to help with the task. We have a partial solution working, and are preparing a new design to improve it (partial, as it can not yet handle all known attacks). We are actively sharing the designs at various meetups (and on the github) and are inviting devs to find attack vectors and propose solutions. Tradle’s protocol not only relieves the pressure on bitcoin’s blockchain but is also able to handle larger transaction sizes than Counterparty and Mastercoin, so it can be used for complex identity, supply chain management and many other applications. It is also capable of handling attachment files, needed in the healthcare and financial industries.
A private blockchain network requires an invitation and must be validated by either the network starter or by a set of rules put in place by the network starter. Businesses who set up a private blockchain, will generally set up a permissioned network. This places restrictions on who is allowed to participate in the network, and only in certain transactions. Participants need to obtain an invitation or permission to join. The access control mechanism could vary: existing participants could decide future entrants; a regulatory authority could issue licenses for participation; or a consortium could make the decisions instead. Once an entity has joined the network, it will play a role in maintaining the blockchain in a decentralized manner.
×