Dusk Network

by Dusk Network B.V.

(0)
View Profile

Scatter

by GetScatter, Ltd

(0)
View Profile

Solana Blockchain

by Solana Labs

(0)
View Profile

Dusk Network

by Dusk Network B.V.

(0)
View Profile

Scatter

by GetScatter, Ltd

(0)
View Profile

Solana Blockchain

by Solana Labs

(0)
View Profile

What problem does this service solve?

Dusk's goal is to create a blockchain infrastructure for issuing securities with enhanced privacy features.Scatter allows users to interact with EOS-based web DApps.Solana allows developers to create DApps with faster performance by separating the consensus process from the recording of transactions.

Token Stats

Not Relevant

Company Description

The Dusk Network is a privacy-oriented blockchain protocol that is designed for creating programmable and confidential securities. Dusk places a strong focus on privacy and aims to make it easier for developers to create digital securities and zero-knowledge DApps. The network is currently powered by the Ethereum based DUSK token.

Scatter is a browser extension for the EOS blockchain that enables users to sign transactions on the EOS blockchain. Users are able to sign transactions with their private keys from web applications without having to expose their personal information. The founders of Scatter are also developing the Reputation and Identity Layer (RIDL), which will provide a reputation system that will add trust and transparency to the DApp ecosystem.

The Solana blockchain uses an innovative Proof of History mechanism to confirm transactions that are recorded on the network. Solana is designed to separate the consensus process from the flow of transactions. This is done with a recursive, verifiable delay function that hashes incoming transactions, and recording information as a function of time. Every node on the Solana blockchain is assigned a cryptographic clock that enables the network to determine the time and ordering of transactions, without having to wait for consensus from other nodes. By separating the process of transaction verification from their recording, a higher throughput is achieved without sacrificing network security.

Ratings

(0)

(0)

(0)