Dusk Network vs Hyperion vs Skycoin
What problem does this service solve?
Dusk's goal is to create a blockchain infrastructure for issuing securities with enhanced privacy features. | Hyperion's goal is to create a decentralized marketplace for map data that will be generated by users. | Skycoin aims to decentralize the internet and provide a platform to build DApps. |
Token Stats
Company Description
The Dusk Network is a privacy-oriented blockchain protocol that is designed for creating programmable and confidential securities. Dusk places a strong focus on privacy and aims to make it easier for developers to create digital securities and zero-knowledge DApps. The network is currently powered by the Ethereum based DUSK token. | Hyperion is developing a decentralized mapping platform that will ensure user privacy and provide map services for DApps. The platform will give users incentives to contribute location data and will have a community governance model. The Hyperion network is powered by the Ethereum-based HYN token. | Skycoin began as an ambitious infrastructure project aimed at replacing the Proof-of-Work (PoW) and Proof-of-Stake (PoS) consensus algorithms that dominate current blockchain platforms. It has since evolved into a project focused on creating a decentralized mesh-Internet and a platform for other blockchain-based projects. Skycoin is developing an ecosystem with a variety of goals, including: the elimination of mining rewards, development of energy-efficient custom hardware, advancing security and privacy, and achieving transaction speeds that rival current digital payment systems. The ecosystem consists of the native SKY coin, Skywire (decentralized mesh-Internet), Skyminer (hardware and access point for Skywire), Skyledger (decentralized open blockchain network), and a suite of DApps. The consensus algorithm is called Obelisk. The network's nodes agree based on a Web-of-Trust consensus. The ability to influence transaction verification is distributed over the network creating a web of trust. To eliminate mining completely each node on the network connects to a list of nodes that it sees as trustworthy. |