A public blockchain is a platform where anyone on the platform would be able to read or write to the platform, provided they are able to show the proof of work for the same. There has been a lot of activity in this space as the number of potential users that any technology in this space could generate is high. Also, a public blockchain is considered to be a fully decentralized blockchain. Some of the examples are:
The Bitcoin White Paper was published by Satoshi Nakamoto in 2008; the first Bitcoin block got mined in 2009. Since the Bitcoin protocol is open source, anyone could take the protocol, fork it (modify the code), and start their own version of P2P money. Many so-called altcoins emerged and tried to be a better, faster or more anonymous than Bitcoin. Soon the code was not only altered to create better cryptocurrencies, but some projects also tried to alter the idea of blockchain beyond the use case of P2P money.
Our services are designed to take your business to the next level, reducing the gap between you and the heights of success you wish to achieve. Empowered by 12+ years of experience in the field of IT, CIS has the right expertise to help you with all your technology needs. We have consistently delivered optimal solutions for our wide-ranging global client base. Leverage our rich experience for your unique IT requirements. CIS has established ... Read more
“A private blockchain is hardly different from a traditional database. The term is synonymous with glorified databases. But the advantage is that if they are to ever start adding public nodes to it then it becomes so much more. An open blockchain is the best method for having a trustless ledger. The broader the range of decentralized adoption the better. The Bitcoin blockchain hits all those points.
Public blockchains provide a way to protect the users of an application from the developers, establishing that there are certain things that even the developers of an application have no authority to do. From a naive standpoint, it may be hard to understand why an application developer would want to voluntarily give up power and hamstring themselves. However, more advanced economic analysis provides two reasons why, in Thomas Schelling's words, weakness can be a strength. First, if you explicitly make it harder or impossible for yourself to do certain things, then others will be more likely to trust you and engage in interactions with you, as they are confident that those things are less likely to happen to them. Second, if you personally are being coerced or pressured by another entity, then saying "I have no power to do this even if I wanted to" is an important bargaining chip, as it discourages that entity from trying to compel you to do it. A major category of pressure or coercion that application developers are at risk of is that by governments, so "censorship resistance" ties strongly into this kind of argument.
Cohen said Walmart also has a patent on drone delivery systems that facilitate orders in a cleaner way, track package contents, environmental conditions and location. Walmart supplier Coca-Cola is starting a pilot to use blockchain to identify inhumane labor conditions in its sugar supply chains. Coca-Cola plans to create a secure decentralized registry for workers and their contracts to help securely record their workers’ identities while providing a trail in case employers abuse their power.
Because decentralization has been viewed by many as intrinsic to the revolutionary potential of blockchain, the point of private blockchains might be called into question. However, blockchains offer much more than a structure that accommodates decentralization. Among other features, their strong cryptography and auditability offers them more security than traditional protocols (although not bulletproof, as noted), and they allow for the development of new cryptocurrencies. Furthermore, voting platforms, accounting systems, and any type of data archive can arguably be optimized with blockchain technology. We are still in the early days of blockchain technology, and the power it has to reshape older systems has yet to be seen.
By contrast, the Bitcoin blockchain is not Turing complete since it has little to no ability for data manipulation. It has no ability for a user to deploy if else or goto statements. This is a bit of a simplification but anytime you hear someone say something is “Turing complete” you can do a quick check to see if there is functionality for data changes, memory changes and if/else statements. If there is, that’s usually what they mean.
Security issues. Like the blockchain, the sidechain needs the work of miners to stay safe from attacks. Without sufficient power, the sidechain is vulnerable for assault. If hacked, only the sidechain will be damaged, while the main chain remains untouched and ready to continue work. If the main chain comes under the attack, the sidechain still operates, but without the value of the peg.
Put simply, sidechaining is any mechanism that allows tokens from one blockchain to be securely used within a completely separate blockchain but still moved back to the original chain if necessary. By convention the original chain is normally referred to as the "main chain", while any additional blockchains which allow users to transact within them in the tokens of the main chain are referred to as "sidechains". For example, a private Ethereum-based network that had a linkage allowing ether to be securely moved from the public Ethereum main chain onto it and back would be considered to be a sidechain of the public network.
Note: This is also a pioneering effort towards increased adoption of smart contracts because while the traditional contracts have been around for a long time, smart contracts are relatively new, and there are gaps in how they are structured. If the smart contracts have the necessary legal expressions then that could serve as a template to bridge this gap in future.
Instead, what if the game was played in its own “channel”? Each time a player made a move, the state of the game is signed by each player. After an epic battle where the Protoss player takes out the remaining Zerg forces and forces a gg, the final state of the game (Protoss wins) is sent to a smart contract on the main chain. This neutral smart contract, known as a Judge, waits a while to see if the Zerg player disputes the outcome. If the Zerg player doesn’t, the Protoss player is paid the 1 ETH.
2) Yes – I had to keep things short/simple in this intro article in order to get across the key ideas. But you’re right: the sidechains need to be secured. But how that happens is a matter for the sidechain. If somebody can produce a false “proof” that the locked Bitcoins should be released on the Bitcoin side then that’s a problem for the sidechain, of course (somebody presumably just had their coins stolen!) but it’s irrelevant (at a macro level) on the Bitcoin side.
The immense promise and accelerated development of permissioned blockchain technology, combined with intense business interest from a wide range of industries, is acting as a perfect stimulant for more and more enterprises to start rolling out blockchain networks into production. I envision these permissioned networks will soon directly or indirectly influence every facet of human enterprise.