Popular Posts
What is WebAssembly (WASM)?
Originating as a collaborative effort among major browser vendors, WASM is an open standard that enhances web applications' performance and capabilities. It's a low-level, assembly-like language with
popular
Understanding WebAuthn: The Future of Secure Online Authentication
Born out of a collaboration between the World Wide Web Consortium (W3C) and the FIDO Alliance, WebAuthn is a specification of a JavaScript API. This innovation allows for secure, passwordless authenti
popular
What are Testnet and Mainnet in Blockchain?
In this article, we will examine these terms and explain their significance in the blockchain ecosystem.
Introduction to Mainnet and Testnet in Blockchain
Simply put, a mainnet is the primary network
popular
The Merkle Patricia Trie: A Deep Dive into Cryptographic Data Structures
These structures, often cryptographic in nature, form the backbone of many blockchain systems, ensuring that data remains tamper-proof and verifiable. Among these, the Merkle Patricia Trie stands out
popular
The Ultimate Guide to Payment Channels and Payment Channel Networks
As things currently stand, most (micro) payments in the traditional financial system are settled via specialized payment processing companies like Visa and Mastercard, essentially Layer 2 networks bui
popular
What's the Difference Between Block Subsidy and Block Reward?
Among the many terminologies and concepts inherent to this world, two terms that often arise are "block subsidy" and "block reward." These two concepts, while seemingly interchangeable, have distinct
popular
Schnorr Signatures and Their Use in Crypto
Among the myriad of digital signature schemes, Schnorr signatures are a pivotal cryptographic innovation, blending theoretical soundness with practical utility. This article ventures into the intricac
popular
What’s the Difference Between Crypto Miners and Validators?
As we delve into the nuances of these mechanisms, we'll unravel the roles, operations, and distinctions between miners and validators, paving the way toward a deeper understanding of the cryptographic
popular
What is Block Time in Blockchain?
An important concept within this technology is “block time”, which plays a vital role in the operation and efficiency of blockchain networks. This article aims to unravel the concept of block time, it
popular
What is Slashing in Proof-of-Stake (PoS)?
PoS offers a greener, more efficient solution to the problem of achieving consensus in a decentralized network. At the heart of PoS lies a mechanism known as slashing, which ensures the network's inte
popular
Bitcoin Script: A Comprehensive Guide
This article delves deep into the intricacies of Bitcoin Script, shedding light on its significance, technical aspects, historical evolution, and much more.
Technical Dive into Bitcoin Script
Bitcoin
popular
What is Secp256r1?
The Secp256r1 curve is a common elliptic curve used in cryptographic applications for digital signatures. It is based on the mathematical properties of elliptic curves and operates in a finite field o
popular
Bitcoin vs. CKB: Two Approaches to Achieving Sustainable Security
Every four years, typically in the six months preceding the halving, the debate around the sustainability of Bitcoin's security model gets reignited.
The discussion can be summed up in two opposing ar
popular
What is Transaction Confirmation in Blockchain?
When a transaction is initiated, it is broadcasted to the network, where it awaits confirmation. During this process, network participants, known as miners in Proof-of-Work-based cryptocurrencies like
popular
What is RISC-V? A Revolution in Processor Architecture
As an open-source hardware instruction set architecture (ISA), RISC-V is changing the rules of the game, offering a level of customization and flexibility previously unseen in the processor market. Th
popular
The Ultimate Guide to Blockchain Light Clients
While decentralization may be the fundamental property of blockchains, it isn't an end goal in itself. Instead, it's pursued—often at the expense of other desirable properties like scalability—for the
popular
What is a Light Client in Blockchain Technology?
At the heart of this technology are blockchain clients, which play a crucial role in maintaining the integrity and functionality of the blockchain network. Among these clients, light clients have emer
popular
How to Optimize Layer 1 Blockchains for Modularity
One strand of thinking that has become popular in crypto land recently is that the only way for blockchains to solve the Scalability Trilemma—or obtain the trifecta of high security, decentralization,
popular
Zero-Knowledge Proofs: An In-Depth Exploration in Cryptography
Cryptography plays a critical role in the world of cryptocurrencies and blockchain technology, providing security, privacy, and integrity to digital transactions. Among the various cryptographic techn
popular
Surprisingly, Secondary Issuance is not Inflationary
Normally, when we analyze the emission model of a coin such as CKB, we usually only consider the theoretical total number of coins issued over time, i.e., the emission curve. However, this does not fu
popular
A Deep Dive Into the Tokenomics of Nervos Network
The unique tokenomics of Nervos have been specially designed to ensure platform sustainability
popular
Where we're going, we don't need Accounts: the Future of Onboarding
In the 14 years since the inception of Bitcoin, blockchain development shifted through multiple stages, each reflecting the evolving needs and challenges faced by the industry at the respective times.
popular
Understanding the Nervos CKB Issuance Model
Bitcoin’s most important value proposition in the economic sphere is its fixed issuance policy, since it is not subject to any change, and at the same time predictable, as long as we know how much and
popular
Common Knowledge Base (CKB): a Blockchain Developer’s Dream
Any prospective blockchain developer that has tried building decentralized applications has quickly realized that the current blockchains offer rather inflexible development environments. Building app
popular
Pi400 Ubuntu Node Setup Guide
How to run a CKB node on a RaspberryPi 400 with Ubuntu desktop 22.04
Running a node on a RaspberryPi can be a fun, efficient way of helping to decentralise the Nervos Network. Old pro's have probably
popular
Nervos DAO — Withdrawal Process Explained
To understand how Nervos DAO works, you must first know that it works through cycles, and that each of these cycles are 180 epochs. On the Nervos network, each epoch has an estimated time of 4 hours.
popular
Quantum Resistance in Blockchains: Preparing for a Post-Quantum Computing World
As the field of quantum computing rapidly advances, concerns are growing about the potential impact of these powerful machines on the security of blockchain networks. Quantum computers, with their abi
popular
Nervos: An In-Depth Overview of a Blockchain Network Built for Modularity
This article seeks to be the be-all and end-all resource for the underlying architecture and value proposition of the Nervos network.
Nervos is a modular blockchain network built from the ground up to
nervos
ASIC-Resistance, is it possible?
ASIC-Resistance describes the ability of a blockchain's mining algorithm to resist implementation of specialized hardware called ASICs (Application-Specific Integrated Circuits). ASICs are specificall
pow
What are Payment Channels?
Payment channels are a unique solution to the scalability problems decentralized blockchains face; they allow for faster and more efficient transactions.
What are Payment Channels?
Payment channels ar
popular
Blockchain Trilemma: The Ultimate Guide
What is the Blockchain Trilemma?
The Blockchain Trilemma is a theory, proposed by Ethereum founder Vitalik Buterin, stating that blockchain networks can’t be secure, decentralized, and scalable all a
popular
Common Knowledge Base: Understanding Our Ethos
An essay on time preference and building future-proof blockchains.
The remarkable speed of change in the blockchain industry has increasingly been steering the space toward high time preference thinki
nervos
Layer 1 vs. Layer 2 Blockchain Networks: What is the Difference?
Layer 1, in the context of blockchain networks, refers to the base layer chain where transactions are settled with finality. On the other hand, Layer 2 networks are scaling solutions built on top of
blockchain
What Are Optimistic Rollups? Everything You Need to Know
Optimistic rollups are Layer 2 scaling solutions designed to offload some of the transaction processing from the underlying Layer 1 blockchains they're built on to increase their transaction throughpu
scaling
ZK-Rollups vs. Optimistic Rollups: What’s The Difference?
Rollups are powerful blockchain scaling solutions that have become very popular over the last two years. There are two types of rollups: zero-knowledge rollups (ZK-rollups) and Optimistic rollups, whi
popular
Sort by:
What is the Difference Between a Miner and a Full Node?
What is a Miner?
In the cryptocurrency world, miners are akin to gold miners in the real world, sifting through the void in search of extremely rare valuable nuggets - in this case, a proof of work th
mining
What is a Hard Fork and a Soft Fork in Cryptocurrencies?
This article will dissect these two concepts, shedding light on their meanings, characteristics, significance, and real-world examples.
What is a Fork in Cryptocurrencies?
In the realm of cryptocurren
blockchain
Crypto Mining Hardware: Exploring CPU’s, GPU’s, and ASIC’s
In simple terms, crypto mining refers to the computational process through which new cryptocurrencies are introduced into circulation and transactions are confirmed on the blockchain. It forms the bac
mining
Understanding Cryptocurrency Mining Pools: Advantages and Drawbacks
A cryptocurrency mining pool is a collective of miners who consolidate their computational resources over a network to enhance the probability of receiving block rewards from mining. The rewards are s
pow
What is a Seed Phrase and Why Is It Crucial for Cryptocurrency Wallets?
Among the key tools to secure digital assets, seed phrases play a critical role. This article aims to unravel the concept of seed phrases and their crucial role in safeguarding cryptocurrency wallets.
wallet
What is Cryptocurrency Mining Difficulty and How Is It Adjusted?
Mining, in the cryptocurrency context, is the process by which new digital currency coins are generated, and transactions are confirmed and added to the blockchain public ledger. However, mining is no
pow
The Ultimate Guide to Blockchain Light Clients
While decentralization may be the fundamental property of blockchains, it isn't an end goal in itself. Instead, it's pursued—often at the expense of other desirable properties like scalability—for the
popular
What is a Multi-Signature (Multisig) Wallet in Cryptocurrency?
As digital currencies continue to gain traction, the need for secure transactions and storage solutions has become more pronounced than ever. One such solution that has emerged in response to this nee
wallet
What are Blockchain/Cross-Chain Bridges?
While these networks have brought about significant innovation, their fragmentation has also created siloed environments, hindering their collaboration and interoperability. Blockchain bridges, also k
interoperability
What is a Cold Wallet and Why is It Important for Cryptocurrency Security?
Cryptocurrency, a form of digital or virtual currency, operates independently of a central bank and uses encryption techniques to regulate the generation of units and verify transactions. This innovat
wallet
A Primer on BFT Consensus Mechanisms in Blockchain
A blockchain is a decentralized, distributed ledger that records transactions across a multitude of computers in a manner that prevents the retroactive alteration of confirmed transactions. This techn
consensus
What is a Light Client in Blockchain Technology?
At the heart of this technology are blockchain clients, which play a crucial role in maintaining the integrity and functionality of the blockchain network. Among these clients, light clients have emer
popular
What is a Non-Custodial Crypto Wallet?
Among these types of wallets, self-custody or non-custodial wallets stand out for their emphasis on user control and privacy. This article will delve into self-custody crypto wallets, how they work, a
wallet
A Deep Dive into Decentralized Storage Systems
The digital age has ushered in an era of unprecedented data generation, with individuals, businesses, and institutions producing and consuming vast amounts of information every day. Traditional centra
blockchain
SHA256: The Most Used Hash Function in Cryptocurrencies
It plays a crucial role in data integrity, digital signatures, and secure communication protocols. In this article, we will delve into the world of hash functions, explore the history of SHA256, and e
cryptography
What is Keccak256? Exploring the Cryptographic Hash Function and Its Use in Cryptocurrencies
Developed as part of the Keccak family of hash functions, Keccak256 was selected as the NIST hash function competition winner and later standardized as SHA-3 (Secure Hash Algorithm 3).
A Brief History
cryptography
Understanding ECDSA: The Backbone of Digital Signature Security
ECDSA provides secure and efficient signing and verification processes, ensuring data integrity and authentication. This article will explore the fundamentals of ECDSA, its underlying mathematical con
hash function
How to Optimize Layer 1 Blockchains for Modularity
One strand of thinking that has become popular in crypto land recently is that the only way for blockchains to solve the Scalability Trilemma—or obtain the trifecta of high security, decentralization,
popular
Secp256k1: A Key Algorithm in Cryptocurrencies
The curve is defined by the Standards for Efficient Cryptography Group (SECG) and represents a specific instance of an elliptic curve over a finite field. This article will explore the significance of
cryptography
Decentralized Identifiers (DIDs): Creating User-Friendly, Secure, and Interoperable Blockchain Identities
DIDs enable decentralized applications and services by providing unique, user-friendly, and secure identifiers. This article will explore two prominent DID solutions built on different blockchain plat
did
Zero-Knowledge Proofs: An In-Depth Exploration in Cryptography
Cryptography plays a critical role in the world of cryptocurrencies and blockchain technology, providing security, privacy, and integrity to digital transactions. Among the various cryptographic techn
popular
What is Blockchain Interoperability?
Exploring the importance of cross-chain communication in the blockchain ecosystem.
blockchain
Surprisingly, Secondary Issuance is not Inflationary
Normally, when we analyze the emission model of a coin such as CKB, we usually only consider the theoretical total number of coins issued over time, i.e., the emission curve. However, this does not fu
popular
A Deep Dive Into the Tokenomics of Nervos Network
The unique tokenomics of Nervos have been specially designed to ensure platform sustainability
popular