BitCherry the world's first scalable blockchain infrastructure based on IPv8 Technology for business is committed to building a commercial thoroughfare linking blockchain technology with real society, and helping traditional enterprises build a trusted distributed business ecological environment.
On 24 December 2020, Singapore (GMT+8), BitCherry Testnet v1.0.1 officially started testing. BitCherry has realized nine major functions this time, and the subversive innovation of commercial level blockchain ecology has started from now on and is moving towards the future of "blockchain + commerce".
Disruptive Power Drives Redefinition of Business Model
In the era of distributed business ecology, new technology will comprehensively reshape the traditional economy, and human society will enter a new era in which the trust system is fully established, and the ecological vitality is fully activated. With the completion of BitCherryβs high-quality blockchain infrastructure platform, the distributed business ecosystem will grow on the infrastructure platform provided by BitCherry. As a leading project of distributed business ecology, BitCherry will continue to solve the problems of transaction security, management norms, ecological benefit distribution, etc., and eventually become an engine driving global industrial migration and shaping the new economy of licensee. With the help of BitCherry, global commerce will usher in a subversive blockchain revolution and productivity leap. The successful launch of BitCherry testnet has taken a milestone for this exciting business future. Based on the support of deep technical strength, large and complex business nodes will be linked by BitCherry blockchain infrastructure platform, and a more reliable business ecological network will be formed, which will usher in the evolution of business ecology.
Customized Solutions to Boost the Competitiveness of Business Enterprises
In 2020, the economy will be impacted by the epidemic. How to carry out business innovation transformation in the epidemic period? The growing maturity of blockchain technology has become the beginning of business innovation. As a technology pioneer in the field of blockchain, BitCherry supports customized blockchain applications in different business scenarios. BitCherry will build the underlying infrastructure and commercial applications of blockchain that can truly meet different business scenarios by condensing technology, community and ecological resources; solve the expandable pain points of blockchain through multi chain structure and physical fragmentation technology, provide fully customized services, and support completely private side chains, and each side chain is a complete commercial level blockchain solution, product traceability, supply chain finance, e-commerce platform, asset digital deposit, distributed cloud computing and social platform and other business areas to achieve disruptive innovation.
Autonomous Community to Achieve the Ultimate Efficiency of Collaboration
In the era of token economy, BitCherry has taken the lead in the world, and has constantly broken through the better community consensus and community autonomy model. With the stable development of the project, BitCherry gradually has a global team, global investors, and global community. BitCherry is committed to continuously improving the network experience of community users. With the continuous growth of ecology, BitCherry will provide more perfect incentive system, and provide contribution-based token incentive for mining, ecological construction, start-up teams and foundations. BitCherry focuses on community autonomy and improves the collaborative efficiency of all members in BitCherry ecology to an unprecedented level with a perfect consensus mechanism of blockchain. In the business ecological chain composed of material flow, information flow, capital flow and business flow, BitCherry uses consensus mechanism to gather complex nodes in the industry. Under the concept of co-construction and co-governance, the platform and business nodes cooperate with each other. Consumers, developers, and investors share the huge business value created together to realize the whole ecological profit.
Global distributed business ecology means massive trade opportunities, high-dimensional business model and extreme collaborative efficiency. The formal test of the v1.0.1 version of BitCherry testnet marks that the infrastructure of BitCherry network has begun to take shape, and BitCherry has started a new journey. In the future, BitCherry will have a blockchain infrastructure that can fully support all kinds of businesses. It will become a high-performance, high security and high availability provider and supporter of the underlying public chain for distributed business applications on the chain and build and drive the sustainable prosperity of the distributed business ecosystem. BitCherry deeply grasps the trend of technology and the pulse of business and is becoming a leader in the era of distributed business with the strength of disruptive innovation.
How can blockchain change the current banking landscape?
Banks often act as middlemen within the global economy by managing and coordinating the financial system through their internal ledgers. Since these ledgers arenβt available for the public to inspect, it forces trust in banks and their often outdated infrastructure.
Blockchain technology has the potential to disrupt not only the worldβs currency market, but also the banking industry as a whole by cutting out these middlemen and replacing them with a trustless, borderless, and transparent system that is easy to access by anyone.
Blockchain will potentially help facilitate faster and cheaper transactions, increase access to capital, create higher data security, enforce trustless agreements through smart contracts, make compliance smoother, and more.
Additionally, thanks to the innovative nature of blockchain, the ways that the newly available financial building blocks can interact with each other can potentially lead to entirely new types of financial services.
What are the main benefits of blockchain for banking and finance?
Contracts exist to protect people and businesses when they enter into agreements, but that protection comes at a high cost. Due to the complicated nature of contracts, the process of creating one requires a lot of manual work from legal experts.
Smart contracts enable the automation of agreements through tamper-proof, deterministic code that is running on the blockchain. Money can safely stay in escrow and is only released when certain conditions of the agreement are fulfilled.
Smart contracts substantially reduce the element of trust needed to reach an agreement, minimizing the risks of financial agreements and the odds of ending up in court.
BitCherry of P2Plus network protocols how to provide a safer service for traditional banking business
P2Plus Network Protocol Security
Different from the traditional P2P network protocol, in order to ensure the privacy of the network transmission and to prevent the gateway nodes from doing evil, the P2Plus network protocol implements point-to-point encryption. To put it simply, Bitcoin and Ethereum are transmitted in plain text during the network transmission process, and other network nodes passing through can be parsed. Although digital signature technology is used to ensure that the transmission content will not be tampered , but dont ensure confidentiality andprivacy protection. The P2Plus network protocol uses a point-to-point private key encryption technology. The transmission content is encrypted and only the receiving node can decrypt it, ensuring the confidentiality of transmission content and node privacy. The public-private key mechanism can be used not only to encrypt the communication process, but also to authorize access through signatures. Unlike the SSL certificate system and account / password method adopted by OpenSSN, P2Plus authorizes network read / write of 8-bit virtual IP addresses and identifies them by the public key signature of the virtual IP address to prevent false IP address attacks.
Because the underlying link layer and IP layer are transparent to the upper TCP application layer, a large number of traditional application layer services can be seamlessly migrated to the P2Plus network, thereby automatically implementing decentralized, point-to-point encrypted mail, chat, WEB service. Due to the point-to-point encrypted communication and signature authorization mechanism, the P2Plus protocol can also prevent DNS and DDOS attacks.
How can blockchain change the current banking landscape?
Banks often act as middlemen within the global economy by managing and coordinating the financial system through their internal ledgers. Since these ledgers arenβt available for the public to inspect, it forces trust in banks and their often outdated infrastructure.
Blockchain technology has the potential to disrupt not only the worldβs currency market, but also the banking industry as a whole by cutting out these middlemen and replacing them with a trustless, borderless, and transparent system that is easy to access by anyone.
Blockchain will potentially help facilitate faster and cheaper transactions, increase access to capital, create higher data security, enforce trustless agreements through smart contracts, make compliance smoother, and more.
Additionally, thanks to the innovative nature of blockchain, the ways that the newly available financial building blocks can interact with each other can potentially lead to entirely new types of financial services.
What are the main benefits of blockchain for banking and finance?
Contracts exist to protect people and businesses when they enter into agreements, but that protection comes at a high cost. Due to the complicated nature of contracts, the process of creating one requires a lot of manual work from legal experts.
Smart contracts enable the automation of agreements through tamper-proof, deterministic code that is running on the blockchain. Money can safely stay in escrow and is only released when certain conditions of the agreement are fulfilled.
Smart contracts substantially reduce the element of trust needed to reach an agreement, minimizing the risks of financial agreements and the odds of ending up in court.
BitCherry of P2Plus network protocols how to provide a safer service for traditional banking business
P2Plus Network Protocol Security
Different from the traditional P2P network protocol, in order to ensure the privacy of the network transmission and to prevent the gateway nodes from doing evil, the P2Plus network protocol implements point-to-point encryption. To put it simply, Bitcoin and Ethereum are transmitted in plain text during the network transmission process, and other network nodes passing through can be parsed. Although digital signature technology is used to ensure that the transmission content will not be tampered , but dont ensure confidentiality andprivacy protection. The P2Plus network protocol uses a point-to-point private key encryption technology. The transmission content is encrypted and only the receiving node can decrypt it, ensuring the confidentiality of transmission content and node privacy. The public-private key mechanism can be used not only to encrypt the communication process, but also to authorize access through signatures. Unlike the SSL certificate system and account / password method adopted by OpenSSN, P2Plus authorizes network read / write of 8-bit virtual IP addresses and identifies them by the public key signature of the virtual IP address to prevent false IP address attacks.
Because the underlying link layer and IP layer are transparent to the upper TCP application layer, a large number of traditional application layer services can be seamlessly migrated to the P2Plus network, thereby automatically implementing decentralized, point-to-point encrypted mail, chat, WEB service. Due to the point-to-point encrypted communication and signature authorization mechanism, the P2Plus protocol can also prevent DNS and DDOS attacks.
BitCherry the World's First Commercial Scalable Blockchain Infrastructure Based on IPv8 Technology has the potential solution to resolve many of the issues facing ad networks, including the rampant fraud scam and malicious that is quickly, and unfortunately, becoming a central point of contention within the industry.
So many different scams have transpired over the past year that it can be hard to keep up with new ones. The COVID-19 pandemic has opened up new ways for cybercriminals to target people on the web. Think about all the COVID-related scams weβve seen over the past few months alone. There have been tons of vaccine scams, stimulus check scams and even disinformation campaigns targeting people looking for vaccine information. This COVID vaccine scam is particularly nasty.
Hereβs how this fraud scam works: Victims enter the term βhome depotβ in Google search, and the results return a malicious ad. The ad is placed at the top of the search results, adding to the likelihood that users will click on it.
This ad looks like a legitimate campaign for Home Depot, down to the standard URL β homedepot.com, which appears when you hover over the link.
If you click on the ad, you will be redirected via several different ad services and eventually land on a tech support scam, which theyβll try to convince you to buy your way out of via expensive and unnecessary software programs. Itβs the oldest trick in the book. The problem isοΌthis type of scam can be super effective and can cause lots of issues if you fall for it.
How decentralized ads could avoid this kind of fraud scam ad? Centralization by itself is not an inherently bad thing. It can improve the efficiency of networks by reducing the distance information needs to travel, and it makes management of the full network much easier. Regardless, centralization in practice tends to have some unforeseen and unexpected side effects. First among these is a reduction in transparency across the network that invites dishonest, profit-taking, and even potentially fraudulent activity that can go unchecked due to a lack of accountability. Because managers of centralized ad networks arenβt obligated to reveal their inner workings to advertisers, there is no way to guarantee that traffic, views, and click-throughs are real and not bots. At a certain point, there has to be an implicit trust on the side of advertisers that publishers are working in their best interests, something that is not always given. This murkiness has led to instances where an ad networkβs traffic is 60% fraudulent in many cases, and 100% in a few more.
To resolve this, BitCherry Blockchain Technology are looking to blockchain to help alleviate the issue of bots and fraud scam on ad networks. BitCherry Blockchain Technology could create a system that improves accountability with blockchainβs open ledger technology, which allows buyers to see where their dollars are being placed. The ability to verify transactions and see how each dollar spent translated into ad buys can reduce the waste caused by fraud scam. BitCherry Blockchain Technology will enhance the transparency to an industry that due to automation and centralization has become embroiled in a crisis of trust.
The costs of a centralized system are prohibitive More than fraud scam, though, is the problem of cost-effectiveness. Ad networks represented a straightforward way to simplify the process of finding and placing ads in the right website, but they have since morphed into a system that extracts significant value at all points across the chain without adding real value. The core issue is that the system is set up with gatekeepers at every point between advertisers and publishers, increasing costs and pressure to show results in measurable terms.
This pressure means marketers and advertisers have little incentive to fix ad networks as fraud scam and bot traffic makes their centralized systems seem highly successful. In this case, BitCherry blockchain companies are taking a different tack. BitCherry Blockchain ad platform is looking to solve this issue and more. BitCherry Blockchain is busily building a decentralized ad network that seeks to remove the influence of middlemen and the costs they place on all transactions. However, it is also concerned with user experience, implementing less intrusive and irritating ads. To that end, the BitCherryβs BCHC Token can also be used to reward sites that are known to be βgood trafficβ as well as create more integrated ad strategies. This additional focus by BitCherry makes it a likely top contender to unseat some of the entrenched ad networks.
Removing the barriers to openness The ad industry remains slightly paradoxical. There is a strong need for robust ad networks that abridge the job of marketers and advertisers looking to place their companies in highly visible locations. There is also a strong incentive on the part of networks to engage in dishonest practices to boost their metrics and appear more successful. This dynamic does not lend itself to honesty or even efficient interaction.
BitCherry the World's First Commercial Scalable Blockchain Infrastructure Based on IPv8 has the potential to resolve many of the issues, including the rampant fraud scam that is quickly, and unfortunately, becoming a central point of contention within the industry. By embracing the technologyβs propensity to disintermediate and democratize, companies can create models that let ad networks continue generate revenues but balance the scales to offer advertisers a better shake alongside a more accountable and equitable return on their own investments.
To know more about BitCherry Blockchain Infrastructure Based on IPv8, kindly refer to BitCherry Official Website at : bitcherry.io
The benefits of using blockchain in healthcare Some of the features that allow cryptocurrency blockchains to act as a secure record of financial transactions are also applicable to storing medical data. Since most blockchains are designed as distributed systems that record and protect files through the use of cryptography, it is extremely difficult for someone to disrupt or change the data without having the approval of all other participants of the network. Therefore, immutability is one of the features that enable the creation of incorruptible databases for medical records.
Moreover, the peer-to-peer architecture used in blockchains allows all copies of a patient's record to be synchronized with one another as updates are made, even though they are stored in different computers. In fact, each network node holds a copy of the entire blockchain, and they communicate regularly to ensure data is up to date and authentic. Thus, decentralization and data distribution are also important aspects.
It is worth mentioning that blockchains are distributed but not always decentralized (in terms of governance). Decentralization is not a binary thing, so depending on how nodes are distributed and on the overall architecture, distributed systems may present variable degrees of decentralization. In the context of healthcare, blockchains are usually built as a private network, as opposed to the public ones that are typically used as cryptocurrency ledgers. While anyone can join and contribute to the development of a public blockchain, private versions require permission and are managed by a smaller number of nodes.
Increased security As mentioned, one of the most important use cases of blockchains in the healthcare industry is leveraging the technology to create a secure and unified peer-to-peer (distributed) database. Thanks to blockchains' immutability, data corruption should no longer be a concern. The blockchain technology can be used to effectively register and track the medical data of thousands of patients. Unlike traditional databases that rely on a centralized server, the use of a distributed system allows for data exchange with higher levels of security, while also cutting down on the administrative costs that the current system imposes. The decentralized nature of blockchains also makes them less vulnerable to technical failures and external attacks that often compromise valuable information. The security provided by blockchain networks can be particularly useful for hospitals, which are often dealing with hacker invasion and ransomware attacks.
Interoperability Another advantage of blockchain-based medical records is their ability to enhance interoperability among clinics, hospitals, and other health service providers. Technological differences in data storage systems often make it difficult for organizations to share documents. Blockchains, however, can solve this problem by allowing authorized parties to access a unified database of patient files or even medicine distribution records. So rather than attempting to interface with each others' internal storage, service providers can work together on a single one.
Distributed business public blockchain BitCherryβ-βDistributed Cloud Computing Cloud computing is a type of distributed computing, which refers to the process of decomposing massive data computing processing programs into countless small programs through the network "cloud", and then processing and analyzing these small programs through a system composed of multiple servers to obtain results and Return to the user. In the early days of cloud computing, it was simple distributed computing, which solved task distribution and merged the calculation results. Therefore, cloud computing is also called grid computing.
As the world's first technology-based services to IPv8 distributed business expansion can enhance blockchain infrastructure, BitCherry innovative physical layer built P2Plus-end encryption network protocol that provides a high-performance, high security for the medical field, increased availability of the underlying technical support, Through cloud computing technology, it can complete the processing of tens of thousands of data in a short time (a few seconds), thereby providing robust network services for the medical field. The application scenarios of cloud computing technology in the medical industry are wealthy. Effective use of cloud computing technology can solve many problems in the medical industry in data management, telemedicine, etc. Still, at present, it is limited by the unique business model restrictions of the medical sector, BitCherry also requires constant exploration and development, but precisely because of this step by step exploration, BitCherry to allow better integration of cloud computing technology integrated with the medical profession to serve the community.
2020 December 24, BitCherry released the highly anticipated Testnet v1.0.1 on the market. We have launched a series of activities and have gained the number of developers and users to join it.
The browser wallet has made significant progress, and the number of blocks has more than a million.
More Updates Coming Soon This is just the beginning of the function; BitCherry team will continue to optimize the Testnet. At the same time, we invite more to join BitCherry blockchain development team to join the test network, build your blockchain.
Bug Bounty (January 1, 2021, to February 15, 2021)
BitCherry is the worldβs first commercial scalable blockchain infrastructure based on IPv8 technology. BitCherry public chain mainnet was officially launched, user will experience: token issue, DApp deploys and operation, pledge to vote, digital asset transfer and so on. Since the blockchain runs in a decentralized network environment, and the creation and storage of data is not dependent on by cryptography, thus BitCherry public chain is considered to be one of the most secure public chain systems. At the same time, thanks to good architecture design and programming skills, operational efficiency and stability, BitCherry public chain is far ahead of other public chains.
BitCherry public chain using the highly abstract idea of modular design, the system is divided based network, database storage, consensus algorithms, network protocols, transaction processors, virtual machines, application layer interfaces, and several core modules.
P2Plus Protocol In terms of technical implementation, one of the core technologies of the P2Plus protocol is the virtual network card technology. The virtual network card is the host computer that simulates a network card driver at the operating system level. It can be configured like other physical network cards or can be configured in the service program. The application layer sends and receives data to the virtual network card. For this reason, P2Plus can implement a virtual network card driver in the Windows/macOS/Linux operating system on the host side, thereby achieving cross-platform access on the host side. At the network protocol level, P2Plus refers to mainstream VPN technologies such as PPP, PPTP, L2TP, IPSec, and SSLVPN, especially OpenVPN technology. OpenVPN is inherently equipped with many security features. It runs in userspace and does not need to modify the kernel and network protocol stack. After the initial completion, it runs in chroot mode, giving up root permissions and using mlockall to prevent sensitive data from being exchanged to disk.
HashRelationshipSpectrum DAG represented by IOTA, with the name "Directed Acyclic Graph", can achieve 100,000+ TPS from the start, and the transaction cost can be meagre. "Directed" refers to a direction, and to be precise, it should be the same direction. "Acyclic" does not constitute a closed-loop. In DAG, there is no concept of a block. Its constituent unit is a transaction, and each company records the trade of a single user, which saves the time for packing and generating blocks. The verification method relies on the verification of the previous transaction by the next marketing. In other words, if you want to make a transaction, you must verify the prior transaction, and verify several transactions in detail, according to different rules. This verification method allows DAG to write many transactions asynchronously and concurrently, and finally constitute a topological tree structure, which can significantly improve scalability. But its shortcomings are: the transaction duration is uncontrollable and does not support strong consistency.
Hashgraph HashGraph is a DAG with a unique structure. The current transaction of each node must rely on its last trade, and the previous commerce synchronized by other nodes. The consensus synchronization between nodes is through the GossipofGossip protocol so that each node maintains the communication history between all nodes and other nodes. When each node completes the Byzantine protocol, it does not need to go through multiple rounds of network communication. The Byzantine agreement can be simulated directly. Besides, unlike DAG, which does not provide consistency, Hashgraph guarantees final consistency through a virtual voting mechanism.
Consensuses Algorithm aBFT Hashgraph uses the Byzantine fault-tolerant algorithm in a peer-to-peer distributed network, and the rights and interests of nodes are entirely equal. Therefore, there is no large amount of energy waste caused by PoW proof of work, and no evil node, excessive centralization and forerunner Matthew effect caused by PoS/DPoS rights and interests. It inherits the aBFT distributed consensus algorithm in solving fault tolerance and Advantages of malicious nodes.
Fully asynchronous Byzantine fault-tolerant aBFT, which means that it does not make any assumptions about how fast the message is transmitted on the Internet, thus solving the problem of the traffic multiplier effect caused by the traditional synchronous aBFT algorithm network broadcast, and it also eliminates the impact of the PBFT algorithm. The number of nodes is limited, and it can also resist DDoS attacks, botnets and firewalls.
Consensus mechanism aBFT+PoUc The disadvantage of the aBFT algorithm is that it does not achieve the complete certainty of the consensus. It just becomes less and less likely to be tampered with over time, forming absolute certainty. Therefore, the time for consensus determination is also related to the number of nodes; All nodes participating in the transaction experience in the consensus, which also limits the TPS of the hash graph from both the network bandwidth and CPU/GPU computing power.
Thus, the consensus mechanism, BitCherry data structure based on the hash map, the blockchain pioneering technology with six degrees of separation theory, demonstrated the value of PoUc user, selection of consensus nodes, the network propagation consensus process optimization, combined with BitCherry original P2Plus network protocols, and BitCherry applications side-chain:
Different from DPoS, all users can participate in the PoUc consensus. The algorithm automatically selects neighbouring nodes and non-neighbouring nodes according to the relationship graph algorithm and refers to their weights for virtual voting. The selected node will receive an accounting reward.
The selection rule of the neighbouring endorsed nodes is based on the node network bandwidth/delay, the relative centrality of the primary/side chain relationship map and the nodeβs Bit-U value. The node network connection and relationship map are only calculated by level. The Bit-U value of the node is selected first; the selection rule of the large V node is to give priority to the Bit-U value of the node when the node bandwidth/delay threshold is met. In the node selection process, the degree of deduplication and randomness between rounds are specified. The nodes that are repeated between two adjacent games do not exceed 1/3 and are selected randomly. The newly chosen nodes are chosen randomly according to 1/3 of the number of candidate nodes. From this algorithm, it can be seen that almost all large V nodes that meet the network conditions can participate in the PoUc process of the entire network, and practically all nodes in the circle of friends will also participate in the PoUc consensus process of a friend.
Incentive Mechanism Bit-U BitCherry using Bit-U incentives to reward contribution to the entire user base set up and blockchain through economic and ecological certificate
Bit-U is composed of 4 dimensions superimposed, and users will be motivated if they have any size. The more dimensions, the greater the incentive:
β Time activity T is determined by the length of time the user holds the token, and a logarithmic formula is used to avoid the Matthew effect of first-mover advantage (FMA);
β‘ User relevance R is determined by the user relationship circle and related activity. The relationship map includes: social relationship, e-commerce relationship, knowledge sharing relationship, and resource sharing relationship;
β’ User activity A consists of user online duration/frequency, social action, transaction activity, and sharing activity;
β£ User contribution C is divided into two categories: cloud computing mining machine resources Cm and external interface resources Cb. In addition to mining participation consensus, cloud computing mining machine resources Cm also includes IPFS storage resources, gateway bandwidth resources, and CPU/GPU computing resources, external resources Cb mainly refers to the provision of external resources including BitCherry: advertising/sale of other commercial intermediary services, arbitration/mantra services, mostly for BitCherry open up the outer physical world, the traditional Internet, the information of things, money, equipment, goods available service.
Hash Ring (sharding) BitCherry fragmentation is achieved by dividing the map of the relationship between the range of slicing hash rings if the external lateral side chain is a blockchain extension. The fragment is the inner longitudinal sections of the blockchain. Commonly used fragmentation techniques include storage fragmentation, transaction fragmentation, and state fragmentation. The biggest problem with fragmentation is cross-shard transactions. Since cross-shard synchronous transactions will lose performance, asynchronous transactions will harm security. Therefore, even for ETH2.0, there are currently restrictions on cross-shard transactions, that is, the transaction must specify the shard in which it is located, so the actual application scenarios are minimal.
The BitCherry is based on a hash map showing the relationship; therefore, by six degrees of separation theory, the same type of relationship usually concentrated in a small circle around in a similar process of friends, both large and small fragments form a relationship Hash circle, cross Fragmentation transactions will be significantly reduced.
Hash body (side chain) Technical hashing is divided by the type of side chain DApp technology, a side chain for improving the technique originally TPS, and in BitCherry, the transaction is based on the actual underlying data hash to the neighbour node for the associated structure of FIG. The traditional side chain technology has multiple side chains anchoring the main chain, which is a numerous one-way linked list structure with intersection points in the unit of block. DAG is a directed acyclic graph structure with the transaction as the unit. DAG is a structure limited by adjacent nodes. The hash body is a three-dimensional structure that is sliced by DApp type, and the interface is a hash graph.
Zero-knowledge proof ZKP Zero-knowledge proof means that it can fully prove that oneself is the legal owner of an absolute right, but also does not disclose relevant information, which means that the "knowledge" to the outside world is "zero". For example: If A wants to prove to B that he has the key to a particular room, suppose that the room can only be opened with the resolution, and cannot be opened by any other method. There are two methods:
Method one: A shows the key to B, and B uses this key to unlock the room to prove that A has the correct access to the room.
Method Two: B confirms that there is an object in the room, and A uses the key he owns to open the door of the room, and then takes the item out and shows it to B, thereby proving that he does have the key to the room.
Cross-chain Although BitCherry backbone + pendant + fragmentation, it has been able to provide high performance. But BitCherry other public chain and chain technology alliances, uphold openness, cooperation and healthy competition posture, build eco-development, information sharing, and high-performance relationship map TPS external output BitCherry, so BitCherry support standard protocols and inter-chain cross-chain Technology, such as IBC, etc.
BitCherry (BCHC) Blockchain technology has the potential to create a new era of gaming and drive true adoption in the industry.
Blockchain technology has recently become a phenomenon in various areas of the economy, driving innovation, fostering growth, and bringing added value. Among the most noteworthy of these sectors is the gaming industry. Gaming is a use case that drives true adoption of blockchain technology by taking the incentive for the user from pure speculation to transactions on a blockchain platform. This drives innovation in development as well as consumer adoption.
According to Newzooβs Global Games Market Report says the global gaming market will generate $159.3 billion in revenue in 2020.That would be 9.3 percent year-over-year growth. Whatβs more, the industry to surpass $200 billion in revenue in 2023.
BitCherry (BCHC) is the world's first scalable blockchain infrastructure based on IPv6 technology to serve distributed commerce. BitCherry blockchain technology is committed to building the connection between business Avenue blockchain technology and real society, helping traditional enterprises build a trusted distributed business environment. BitCherry BCHC Blockchain Technologies can unlock immense benefits for the gaming entrepreneur and developers by preventing fraud activities and offering a secure environment to develop, launch games or monetize them. There are many popular games that need to be purchased before using them. In such situations, BitCherry can help in buying and selling in-game assets easier with the help of cryptocurrencies in a safe way.
BitCherry (BCHC) transactional technology can be a great way to build and manage in-game currency accounts. This will help in managing the rewards the players get on winning various stages, levels, competitions, etc.
The usage of BitCherry (BCHC) blockchain development solution in gaming enables players to purchase game assets without depending on third-party payment providers to process the currency transactions.
Speculation on platforms that may find blockchain applications and tokens useful in gaming is on the rise, and the platforms are often listed on top exchanges shortly after being released. With the continued development of easy-to-use user interfaces, standards for BitCherry blockchain applications using aBFT+PoUc Consensus Mechanism to offering greater transaction speeds, and the release of items capturing the attention of audiences β acceptance by the mainstream is only a matter of time.
BitCherry (BCHC) Blockchain technology is especially suited for gaming, and gaming can directly benefit from blockchain technology, both technically as well as in unlocking value from in-game items, tournaments, character development and gamer recognition. This paves way for esports being a leader in the sports and entertainment sector, much like the internet is now.
Today, traditional media is mostly run on the internet, so perhaps through blockchain technology, all sports could one day contain elements of esports.
Safer than a traditional P2P network protocol BitCherry P2Plus how to improve the security of electronic identity?
Among the many emerging use cases of blockchain technology, digital identity management and verification is perhaps one of the most promising. In 2018 alone, billions of people were affected by personal data breaches, all around the world. There is an undeniable need for more secure methods of storing, transferring, and verifying sensitive information. In this context, blockchain systems may bring valuable solutions to some of the difficulties faced by most centralized databases.
The implementation of cryptography and blockchain in digital identity may provide at least two major benefits. The first is that users can have better control over how and when their personal information is used. This would greatly reduce the dangers associated with storing sensitive data in centralized databases. Also, blockchain networks can provide higher levels of privacy through the use of cryptographic systems. As mentioned, zero-knowledge proof protocols allow users to prove the validity of their documents without the need to share details about them.
The second advantage is the fact that blockchain-based digital ID systems can be more reliable than the traditional ones. For instance, the use of digital signatures could make it relatively easy to verify the source of a claim made about a user. Other than that, blockchain systems would make it harder for a person to falsify a piece of information, and could effectively protect all sorts of data against frauds.
How can blockchain apply to digital identity systems?
P2Plus Network Protocol Security Different from the traditional P2P network protocol, in order to ensure the privacy of the network transmission and to prevent the gateway nodes from doing evil, the P2Plus network protocol implements point-to-point encryption. To put it simply, Bitcoin and Ethereum are transmitted in plain text during the network transmission process, and other network nodes passing through can 14 be parsed. Although digital signature technology is used to ensure that the transmission content will not be tampered, but don't ensure confidentiality and privacy protection. The P2Plus network protocol uses a point-to-point private key encryption technology. The transmission content is encrypted and only the receiving node can decrypt it, ensuring the confidentiality of transmission content and node privacy. The public-private key mechanism can be used not only to encrypt the communication process but also to authorize access through signatures. Unlike the SSL certificate system and account/password method adopted by OpenSSL, P2Plus authorizes network read/write of 8-bit virtual IP addresses and identifies them by the public key signature of the virtual IP address to prevent false IP address attacks.
BitCherry to P2Plus network protocols plus HashGraph algorithm as the core, I believe BitCherry blockchain technology based on electronic identity would be an efficient and safe technical support.
Blockchain technology has great potential to change the way digital data is verified, stored, and shared. While many companies and startups are already exploring the possibilities, there is a lot to be done. Still, weβll certainly see more services focused on digital ID management in the coming years. And most likely, blockchain will be a central part of it.
The DeFi world is changing rapidly and new gameplay is updating everyday. As the most popular and fastest-developing trading product in the DeFi field, DEX obviously will not miss the fastest-growing derivatives market in the cryptocurrency trading market. In the field of cryptocurrency derivatives, the distinctive perpetual contract has naturally become a high ground for competition in the new battlefield of DEX derivatives.
It is understood that since 2020, at least seven DEX platforms including YFX, DerivaDEX, dYdX, Futureswap, Injective Protocol, MCDEX, and Strike Protocol have announced the launch (or will launch this year) of the decentralized perpetual contract trading market and every of the platforms has adopted different designs in terms of transaction mode, contract mechanism, product specifications and infrastructure, which means all have its own characteristics and strengths.
Compared with several other DEXs, YFX's advantages are particularly obvious and the trading process is more convenient.
YFX is the world's first and only decentralized derivatives trading platform that supports 100x leverage trading.
YFX is the first platform that launched on the TRON mainnet and the handling fee during transfer and transaction is the lowest among all DEXs.
YFX only supports decentralized derivatives trading and the products are more professional and convenient.
YFX is the world's first cross-chain decentralized derivatives trading platform that supports the four public chains of ETH, TRON, BSC, and Heco.
All funds of YFX are managed by smart contracts. The platform cannot operate any funds of users. All smart contract codes are open source and have been audited and verified by professional institutions. Through smart contracts, users can deposit and withdraw their funds at any time.
YFX is the world's first decentralized contract trading platform that supports USDTγcoin and hybrid swap.
YFXβs current trading method adopts an isolated margin trading method, each order is independent of each other, profit and loss are independently settled.
YFX applies the QIC-AMM market maker pool trading method to provide users with extremely high liquidity and extremely low trading slippage. Traders directly trade with QIC-AMM to open and close their position. The depth is a function of the available balance of the LP pool, there is no impermanence loss in the LP pool.
Since the development of the Internet, the ownership of the code has always been monopolized by the centralized institutions using patent barriers. Unilateral network protocols inevitably have some security risks. With the rise of the concept of blockchain, open-source code is expected to replace traditional network protocols and become the core infrastructure of the Internet. In recent years, many decentralized solutions have been proposed for various blockchain projects, and the network decentralization and security have been significantly improved. However, the incentive mechanism for developers of many projects is still in the early stage of development. Developers cannot obtain continuous incentive in open-source projects, which means that the project will face the problems that the developer community cannot be expanded, the number of core developers will stagnate, and the project will not be able to repair loopholes and upgrade iteratively. Therefore, how to encourage developers to make long-term contributions to open-source projects is the key to the iterative development of projects.
Recently, the v1.0.1 version of the testnet of BitCherry, a distributed commercial public chain, officially started testing. BitCherry also used a 10 million reward to recruit developers for the test network. The advantage of reward incentive is that developers get corresponding rewards according to their contributions, which is fairer than other ways, and can encourage competent developers to join the community. It is also helpful for project expansion and suitable for solving the security related problems of the project. But on the other side, the bounty model also has some disadvantages. First of all, it will produce reverse incentive to the project. Simple tasks are popular, and difficult tasks are easy to be ignored, which is not conducive to the long-term development of the project. Moreover, the release of reward tasks is usually unsustainable, and developers passively accept tasks to get paid, which cannot motivate developers to actively contribute.
BitCherry, as a distributed commercial public chain, pays more attention to commercial ease of use and security, and relies more on the contribution of developers to the project. Both core developers and application layer DAPP need to have a reasonable incentive mechanism for funding, so the traditional way of motivating developers cannot be the main incentive mode of BitCherry. As the world's first scalable blockchain infrastructure based on IPv8 technology to serve distributed commerce, BitCherry designed the aBFT+PoUc consensus mechanism. Based on the asynchronous Byzantine fault-tolerant algorithm (aBFT), any node that meets the conditions (selects the neighbor node according to the unique bit-u value first) can participate in the whole network PoUc consensus process, while almost all the important nodes in the circle of friends can participate in the process. Important nodes will also participate in a friend's PoUc consensus process to maximize decentralization. Mainly uses the unique Bit-U incentive mechanism, which is composed of four dimensions, including time activity, user relevance, user activity, user contribution, etc. Developers with any dimension will be motivated, and the more dimensions, the greater the incentive.
The development of a project is inseparable from the developers and is closely related to the incentive mode of the project. Therefore, the combination of governance mechanism and incentive mode will become the key to the development of BitCherry developer community. It can be predicted that in the future ecological development of BitCherry, BitCherry will set up a special incubation fund for developers to cooperate with the incentive mechanism to further improve the sustainability of the project.
Since the dawn of democracy, elections have been accused of the lack of transparency and security. As societies all over the world are rapidly adopting technology across all aspects of society, a digitalized democratic system of voting might just be the next evolutionary step towards a transparent and trusted electoral system. The potential next conceptual step in the path towards a digitalized democracy is a utilization of a transparent and trustworthy system. Taking this step implies guaranteed anonymity and protection of individuals privacy, and more importantly, assuring correctness of the voting results. As we discover that certain types of technologies can be vulnerable, we must be aware of potential unfair elections. A decentralized election system requires that all the involved information must go public. The core focus is therefore security and transparency. Each vote must be correct and anonymous.
BitCherry Decentralized Voting System BitCherry builds a decentralized voting system based on the consensus mechanism of aBFT+PoUc that accommodates correctness and is transparent, anonymous, and secure. Field of focus lies therefore in blockchain technology which has its roots in data structures and cryptography. The output of the BitCherry project is uses a decentralized blockchain system; the consensus algorithm running environment which is similar to the execution environment of decentralized systems. It ensures the safety and reliability of the consensus algorithm. aBFT is the basis of consensus algorithm which is fully asynchronous by BitCherry. It does not have to waste a lot of energy for PoW problems caused by nor node PoS / DPoS bugs. The system has also inherited the advantages of aBFT distributed consensus algorithm in solving the problem of fault tolerance and malicious nodes.
Safe and Efficient Consensus Algorithm: aBFT+PoUc Consensus Mechanism On a consensus algorithm, BitCherryβs data structure is based on the hash map. It is the block chain pioneering technology with six degrees of separation theory, which demonstrates the value of PoUc user, selects consensus nodes, optimizes the network propagation consensus process. Current system is combined with BitCherry original P2Plus network protocols, and multiple types of applications BitCherry side chains which allows to create a unique aBFT + PoUc consensus.
It is different from the DPoS method; all users can participate in the PoUc consensus. The algorithm automatically selects neighbouring nodes and non-neighbouring nodes to virtual voting according to the relationship graph algorithm and refers to their weights for virtual voting. The selected nodes will receive accounting rewards. The selection rule of the neighbouring endorsed nodes is based on the node network bandwidth/delay, the close centrality of the main/side chain relationship map and the nodeβs Bit-U value. The node network connection and relationship map are only calculated by level.
In simple terms, BitCherry consensus algorithm is based on aBFT, so any node that satisfy the condition (based on the unique value of Bit-U prefers the neighbour node) can participate in the process of the whole PoUc consensus and almost all important nodes in the circle will also participate in the PoUc consensus process. In conclusion, BitCherry Decentralized Voting System takes advantage of aBFT+PoUc consensus mechanism to allow all voters to participate in both the recording and verification of ballots. It enhances the votersβ confidence and reduced the cost of election and provided convenience to some extent as compared to the traditional approach of pen and paper.
10 Million Prize to be Reward | An Invitation to Global Developer to join BitCherry Testnet
BitCherry Testnet v1.0.1 will start testing soon, and now we are recruiting well-performing developers from all over the world. By the time, developers and users can participate in the BitCherry Testnet environment and win the reward up to 10000000 BCHC through our subsequent developer missions. We encourage all blockchain developers to participate in the testnet with us and bring us more valuable opinions.
BitCherry Testnet is about to Online, Countdown: 1 Day
BitCherry Testnet v1.0.1 will start testing at 12:00 PM on December 24, 2020 (GMT+8). As a scalable blockchain infrastructure based on IPv8 technology and serving for commerce, BitCherry has been focusing on defining and providing the most basic and critical system components. By improving the existing technology pain points of blockchain, BitCherry can create a scalable IPv8 blockchain infrastructure platform with high performance, high security and high availability that can serve all types of commerce.
December 17, BitCherry officially start the testnet v1.0.1 closed beta test and is expected to launch test net version v1.0.1 next week. Before BitCherry mainnet is formally launched, test net will be conducted multi-stage iterations, functions updates according to a fixed stage, will achieve transaction, smart contract interfaces, create/ node election, electoral consensus/verification, cross-chain interaction, and peripheral tools, perfect developer system, etc. As the worldβs first commercial, scalable blockchain infrastructure based on IPv8 technology, is committed to building commercial thoroughfare blockchain technology and the reality of social links to help traditional enterprises constructed trusted distributed business environment, it can serve to create all types of commercial high-performance, high-security, and high-availability expandable IPv8 blockchain infrastructure platform.
Behind the Amazon server downtime: how does blockchain technology IPv8 protect data from leaks.
Nov 26, 2020, According to AWS, the outage only affected one of Amazonβs 23 geographic AWS regions. Still, the problem has been severe enough to affect many Internet companiesβ services.
Many companies tweeted about how the AWS outage affected them.
Including 1Password, Acorns, Adobe Spark, Anchor, Autodesk, Capital Gazette, Coinbase, DataCamp, Getaround, Glassdoor, Flick, iRobot, The Philadelphia Inquirer, Pocket, RadioLab, Roku, RSS Podcast, Tampa Bay Times, Vonage, The Washington Post, and New York Public Radio (WNYC). Downdetector.com, a website specializing in monitoring network conditions, also shows that many users throughout the day have reported that many Amazon services have problems.
It is worth mentioning that on the eve of βBlack Fridayβ in North America, AWS downtime may affect Amazonβs e-commerce business. Some sellers said that their order data on Amazon suddenly dropped sharply, and even advertising costs were abnormal.
With the advent of the digital age, the generation and storage of massive amounts of data have prompted technology giants in various industries to develop and deploy their centralized cloud servers gradually. Although it has solved the storage and calculation of data to a certain extent, the drawbacks of centralized cloud servers have been criticized.
Companies such as Google, Facebook, Sony, etc., control massive amounts of user data. Even their business models revolve around profiting from user data stored on their centralized cloud servers. In the event of a downtime event, enterprises and ordinary users have to bear the resulting losses and face the risk of data leakage.
BitCherryβs future is to provide high-performance, secure enterprise technical support blockchain.
BitCherry is the worldβs first technology-based services to IPv8 distributed business expansion can provide blockchain infrastructure, with efficient performance, data security, governance, consensus three characteristics. Building a βP2Plusβ Encryption Protocol with new thinking of innovative physical layer, BitCherry is a general blockchain infrastructure that meets commerceβs demand. BitCherry provides the operational mechanism such as smart contract & cross-chain consensus to achieve highly scalable data architecture by the hash map, which is improved by the relationship atlas. This blockchain infrastructure dramatically reduces development costs, provides a high-performance, high-secure, and high-available underlying public chain support for distributed commerce on the chain.
Compared with the downtime of a centralized server that will cause the paralysis of large-scale Internet applications and information leakage, the rest of the individual cloud servers in the decentralized cloud server system will not affect the user experience at all, let alone cause data leakage and other problems. At the same time, decentralized cloud servers also have the characteristics of low cost, fast response speed, and too high information security.
BitCherry IPv8 use as the primary technique, coupled with the chain and cross-binding fragment technology, improves the transmission speed while building a network protocol P2Plus end encryption high performance, high safety, high availability support blockchains.
Public welfare is the abbreviation of " common benefit of public and society ", it refers to those non-governmental social organizations that do not take profit maximization as their primary goal, and whose main pursuit is social welfare undertakings. Earlier non-profit organizations were mainly engaged in humanitarian relief and poverty relief activities, and many non-profit organizations originated from charities.
However, there have been many incidents of "public welfare fraud & money scam" in the history. Some illegal organizations initiate public welfare fraud activities in the name of charity to seek for personal interests from individuals or enterprises and use the raised funds for some improper activities. In this context, many people feel uncomfortable when they hear about charity and public welfare. We do not know whether our money has been handed over to the people in need when we are choosing to donate. But when we choose not to donate, we will feel heartache when we look at the children who cannot afford to eat, educate, or get sick because of poverty. The behavior of public welfare fraud is not only the desecration of charity, but also causes great psychological harm to the people who offer love.
The inducement of "public welfare fraud" is mainly due to the opacity of information and the difficulty of supervision. The openness, transparency and unforgeability of capital flow data are the just needs of public welfare. At present, it seems that the use of blockchain technology can effectively put an end to the "public welfare fraud". In an environment where all data cannot be tampered with and all data are open and transparent, which criminals cannot take advantage of it.
As the world's first scalable blockchain infrastructure based on ipv8 technology for distributed commerce, BitCherry has proposed feasible blockchain solutions for public welfare problems. The first is the transparency and trust of public welfare funds. By using advantage of the unique advantages of BitCherry IPv8 point-to-point public chain, BitCherry able to records every donation data in real-time on the BitCherry data link, donors can trace the each of the donation and donation records are open, transparent and non-tamperable. At the same time, it can realize the visualization of donation with smart contract and eliminate the needs of donors for third parties, which means that donors can donate money to the people they want to help without relying on charity organization, and ensure that these donations can reach the donors.
As the world's first scalable blockchain infrastructure based on ipv8 technology for distributed commerce, BitCherry has proposed feasible blockchain solutions for public welfare problems. The first is the transparency and trust of public welfare funds. By using advantage of the unique advantages of BitCherry IPv8 point-to-point public chain, BitCherry able to records every donation data in real-time on the BitCherry data link, donors can trace the each of the donation and donation records are open, transparent and non-tamperable. At the same time, it can realize the visualization of donation with smart contract and eliminate the needs of donors for third parties, which means that donors can donate money to the people they want to help without relying on charity organization, and ensure that these donations can reach the donors.
A smart TV, also known as a connected TV, is a traditional television set with integrated Internet and interactive Web 2.0 features, which allows users to stream music and videos, browse the internet, and view photos. Smart TV is a technological convergence of computers, television sets, and set-top boxes. To easily understand it, Smart TVs are a television just like your phone and laptop, and they are vulnerable to the same kind of threats. If security holes exist in a smart TV, it is only a matter of time before hackers find a way to break in and control it.
According to the news by James Gelinas, KOMANDO.COM. Last year, the FBI warned that hackers could use unsecured smart TVs as a backdoor into your network. In 2020, the risks are even more obvious. One of the most popular smart TV brands has a critical flaw in its operating system that gives a hacker full access to the systemβs back end. All they need to know is the TVβs IP address.
White-hat hacker finds a critical flaw in TCL smart TVs
Millions of TCL Android smart TVs are at risk for hacking thanks to a flaw found by a security researcher from Sick.Codes. The flaw involves open networking ports in the smart TVβs back-end, which hackers can scan to gain access without you knowing. If a hacker scans the ports, they can learn the TVβs IP addresses and see its hidden files with an ordinary web browser.
After testing different IP addresses, the researcher came upon http://10.0.0.117:7989/sdcard. This page let him see critical system files stored on the TVβs memory card, and none of them had any form of protection. With enough of time, a hacker could rewrite code on the smart TV, inject malicious files or disable it altogether. The researcher forwarded his findings to TCL, and it took 13 days for the company to get back to him.
TCL responded and claimed to have fixed the issue, but the researcher decided to dig even further. He found that while TCL did alter some of the TVβs most critical files, all of them could still be edited by any user with access to the file system.
TCL is the worldβs third-largest TV manufacturer. Millions of the companyβs smart TVs could be at risk for hacking or intrusion with no way to protect against it. There is no word whether or not a new security update will be released for the bug.
BitCherry IPv8 Technology redefined IP Security & Privacy
To address these issues, the blockchain project BitCherry was the one who first proposed, the blockchain network protocol built on top of IPv8 Technology and defines it as P2P + to enhance the IP security & privacy. BitCherry IPv8 works in the lower IP network layer and data link layer, which it can work at the host and router at the same time, because IPv8 uses 8-byte network address for addressing and works on the protocol layer which is lower and closer to the hardware device compare to IPv4 and IPv6, 4 and 6 bytes. Therefore, IPv8 can easily penetrate any network, firewall, network wall etc. To easily understand it, with the implementation of IPv8, virtual private network (VPN), proxy server and so on are no longer needed, and IPv8 can express more abundant network target address information.
The additional 2 bytes from IPv8 compare to IPv6 we can easily to understand are one byte is mainly used to express the shortest network path gateway service information between source address to target address to realize decentralized and other one byte will use to the high-speed interconnection and interworking between different networks.
Different from the traditional P2P network protocol. To ensure the security & privacy of network transmission and prevent the gateway node from doing evil things, BitCherryβs P2P plus network protocol implements point-to-point encryption. Although digital signature technology is used to ensure that the transmission content will be unalterable with, but it does not have the function of confidentiality and privacy protection.
In conclusion, we believe there will be more new secure technologies that will build with BitCherry IPv8 for a most secure and privacy environment. The release of IPv8 and BitCherry will work together to implement the upgrade of the security and privacy of Internet. Let us look forward a whole new safety internet to the arrival of IPv8 together!
Do You Know IPv6? IPv6 is slowly but irresistibly making its way into the Internet and into our networks. In industrial countries, the average user adoption rate is around 30%, Belgium being the leader with over 50%. Over 25% of the Top Alexa 1000 websites are dual-stack, which means, they are reachable over IPv4 and IPv6.
π Blockchain Will Change It
Blockchain is a new architecture, that revolutionizes the Internet and replaces the common centralized client-server design. Blockchain stores data on a chain of nodes. It is a shared public ledger on which the entire decentralized distributed peer-to-peer network relies.
IPv4 / IPv6 are all IP layer protocols, the point of difference is the number of bytes of the network source address and the destination.IPv4 supports more than 4 billion addresses, but you at home or office are sharing a floating IP address to connect the internet with everyone because the number of IP addresses is not enough. When you be home is using the temporary IP address to connect the internet; only the data center computer room and private network have has a fixed IP address.
In order to solve the problem of insufficient IP addresses, the IPv6 protocol was upgraded. The essence of the protocol is almost exactly the same as IPv4, but upgrading the address to 6 bytes can express 262 trillion addresses, which exceeds the number of each grain of sand in the world. Therefore, it is sufficient for all Internet-connected computers and IoT devices now and in the future.
The IPv8 address is based on the IPv4 / IPv6 address, adding 2 bytes to express the topological relationship of the network and the double-layer P2Plus gateway node. P2Plus will establish a decentralized fast, safe, and private point-to-point on the IP layer Communications network.
For example, IPv4 / IPv6 are regular roads, and all the villages have the roads; IPv8 builds a highway, and all the cities have the highway entrances and exits, while IPv8 addresses build a highway entrance link the regular road.
In 2020, up to 82% of IP traffic will come from video, and 2/3 of network traffic will come from wireless networks and mobile devices. With the continuous evolution of video services, such as the provision of ultra high definition of 4K-8K video, virtual (VR)/augmented reality (AR), it will also promote the design of future 5G networks to better meet the needs of mobile application development. It has ultra high bandwidth and ultra low delay. At the same time, video consumption is also undergoing a series of changes: the consumption of people watching videos on TV is decreasing, the consumption of watching videos on mobile devices is increasing, the number of broadcast videos is decreasing, and the number of live videos is increasing at the same time. These changes will have a direct impact on the end-to-end network output.
Of course, all factors will put pressure on the future of 5G network performance. Whether the traditional IP network architecture can support the future 5G network performance has also become a topic of concern. Therefore, with the applying of 5G network, the innovation of IP network architecture became very imperative. As we all know, network protocol is the basis of network program, therefore, the security and connection speed of network protocol directly affect the security and performance of blockchain. However, all existing P2P protocols work above the TCP transport layer of the host side of the IPv4/IPv6 wide area network, which leads to network security gradually becoming a potentially huge problem, because the TCP/IP protocol was not fully considered when it was originally formulated. Because of its security, there are types of attacks such as IP address spoofing, source of routing attacks, and network eavesdropping in actual applications. Secondly, the IPv4/IPv6 network architecture is prone to data loss and incomplete during data transmission.
BitCherry redefined IP
To address these issues, the block chain project BitCherry was the one who firstly proposed, the block chain network protocol built on top of IPv8 technology, and defines it as P2P +.
P2P+ avoids monopoly caused by centralization
As we all know, a high degree of centralization leads to very low network security and a high degree of monopoly. While high degree of monopoly makes the entire Internet lack of vitality and the development speed will gradually decrease. In P2P+, each node is both a client and a server. In this way, you can download data from other nodes or let other nodes download data. The work provided by the large server in the original professional computer room is scattered and transferred to countless on ordinary nodes. In this case, each node only undertakes a small part of the work that originally belonged to the server. Even if a node has a problem, it can work automatically connected by other nodes. Therefore, a server problem may cause a relatively large impact (for example, the service operator has a downtime event). Once P2P+ is used, even if a few nodes or even hundreds of nodes have problems, it will not affect the operation of the network.
P2P+ saves bandwidth costs
The current Internet TCP/IP protocol will obtain content from the central data center. This method causes network congestion and low file access efficiency. However, in P2P+, the protocol works in the lower-level of IP network layer and data link layer (which can work on the host and router at the same time); because it works at the lower level and is closer to the protocol layer of the hardware device, so P2P+ It can easily penetrate any network, firewall, and network fence, greatly improving the accessibility of data transmission.
P2P has a high secure system
In today's Internet, communication between nodes relies on intermediate servers. Therefore, once the server is attacked by hackers, data privacy can easily be stolen, traded, or even made public, directly causing huge harm to users. In order to ensure the privacy of network transmission and the gateway node to make some harm, the P2P+ network protocol uses a point-to-point high-strength private key encryption technology. The transmission content is encrypted and only the receiving node can decrypt it, ensuring the confidentiality of the transmission content and node privacy. The public and private key mechanism can be used not only to encrypt the communication process, but also to authorize access through signatures. Different from the SSL certificate system and account/password method adopted by OpenSSN, P2P+ authorizes the network read/write of an 8-bit virtual IP address and recognizes it through the public key signature of the virtual IP address to prevent false IP address attacks.
The pace of commercialization of 5G is gradual, and it is now in the initial stage of development. In the future, there will be a broader imagination for the application of IP. The BitCherry as a practitioner of innovative technologies, adhering to the "innovation is king" concept, pays close attention to the development trend of the global industry, through P2P + let IPv8 applied to the broader scene to make people happy and enjoy the technology brings Extraordinary experience.
As mankind is about to move towards an intelligent, fully-connected world of Internet, Internet of Everything, is an integration of virtual and real, is to face new generations, new services, and new needs, traditional IP networks have long been unable to handle it. How to make IP networks inherit the genes of success to make it to continue the development on the basis of meeting the new needs of the future industrial Internet, and promote the digitization of the entire industry, this issue has become a common concern of the industry.
The current IP technology started in 1969 and the protocol was finalized in 1978, it nearly operated for 50 years and has achieved great success. It turned out that IP technology focused on connecting computers around the world before, mainly in the office field; later it extended to mobile internet, so all mobile phones connected by later IP technology; but for so many years, traditional IP technology has been unable to meet the rapid development of industrial internet which has a series of requirements such as low latency and security.
According to a report in the βFinancial Timesβ, Huawei, in conjunction with the Chinese Trade Union, China Telecom, and the Ministry of Industry and Information Technology, submitted a proposal called "New IP" to the International Telecommunication Union (ITU).
Huawei distributed an impressive article (titled "New IP framework and Protocol for Future Applications"). The article explains that new IP is a new Internet protocol framework which can better support emerging network applications, such as multi-network and holographic communication, etc., The new IP will fundamentally support the variable length of the network layer, multiple semantic addresses, and user-defined networks.
It is not difficult to observe that the innovation of IP network architecture has become the top priority in the current network society. The emerging technology of blockchain, relies on the Internet, whether or not will launch its own journey of βIP revolutionβ.
As we all know, the network protocol is the basis of the network program, and the peer-to-peer network is also the basis of the blockchain operation. Therefore, the security and connectivity speed of the network protocol directly affects the security and performance of the blockchain. However, all existing public P2P protocols work above the TCP transport layer of the host side of the IPv4/IPv6 wide area network, which leads to have a network security issue which is gradually becoming a potentially huge problem, because the TCP/IP protocol was not formulated with a full consideration of security at all. We should fully consider its security, so in the actual application process there wonβt be attacks such as IP address spoofing, source routing attacks, network eavesdropping and so on. Secondly, the IPv4/IPv6 network architecture is prone to data loss and incomplete transmission during data transmission.
In order to solve these issues, BitCherry firstly proposed, the block chain network protocol built on IPv8 technology. In order to ensure privacy of data transmission and malicious nodes, different with the traditional P2P network protocols, The P2P+ network protocol uses a point-to-point high-strength private key encryption technology. The transmitted content is encrypted, and only the receiving node can decrypt it, ensuring the confidentiality of the transmitted content and node privacy. The public-private key mechanism can be used not only to encrypt the communication process, but also to authorize access through signatures. Unlike the SSL certificate system and account/password method adopted by OpenSSN, P2P+ authorizes network reads/writes of 8-bit virtual IP addresses and identifies them by the public key signature of the virtual IP addresses to prevent false IP address attacks.
BitCherry P2Plus work on more underlying IP network layer and the data link layer (which can work simultaneously in Host and router), so P2Plus can easily penetrate any network, firewall, and network fence, greatly improving the accessibility of data transmission.
As it can be seen above, Huawei New IP and BitCherry IPv8 have some similarities like:
1. Background: Both are based on the disadvantages of the traditional Internet, which exist in the background that the traditional Internet is unable to support the connection of massive networked subjects, has low transmission efficiency, instability, and is prone to attacks.
2. Objective: Both are committed to build a more secure, efficient, and open internet, supporting the interconnection of all networks, the interconnection of all things, and precise transmission. It has the characteristics of flexible addressing, efficient operation, safety, and efficiency.
When the reality of traditional internet increasingly becoming unstable, we believe there will be more new technologies that will build with BitCherry for a better future, we also believe, this technology of BitCherry, will become the most dazzling star. The release of new IP, will also have a more active role in the development of BitCherry, the two will work together to accelerate the upgrade of the Internet. Let us look forward to the arrival of web3.0 together!
Nowadays Blockchain has become an important technology which promotes business development. So whoever can manage well core technologies may become the leader in this field. However, while using blockchain technology we still can experience some shortcomings. For example, most blockchain systems still adopt a single linked list structure and on chain commercial applications. The privacy and security of the company might be limited because of the performance of a single chain. So for this issue some public chain projects proposed a multi chain system structure. Unfortunately a multi chain system structure has the low efficiency between cross chain interoperability and the simple multi-chain structure. The commercial demand of monetary valued enterprises indirectly leads to some issues like: ineffective connection of traditional user groups and commercial institutions, the problem of weak liquidity, the low user trust caused by the lack of effective supervision methods in the existing blockchain. All of the problems mentioned above deeply limit the desire of enterprises in various fields to use blockchain technology.
As the worldβs first scalable blockchain infrastructure based on IPv8 technology, BitCherry has built an innovative physical layer network protocol which is P2Plus end-to-end encryption. Current innovative network protocol has already achieved some improvements like: an improved spectrum from the high scalable hash map data architecture, improved smart contracts, cross chain consensus and other operating mechanisms. The innovative network protocol can provide global businesses with a high performance, high security, and high underlying technical support. Current services might be involved in different fields like: finance, product traceability, asset digitization, commercial consumption, e-commerce, cloud computing and also in many other fields.
The article above gives a quick introduction of project- BitCherry. The detailed explanation about aBFT+PoUc consensus algorithm will be explained on the following text content.
1. aBFT+PoUc consensus mechanism
Basic consensus algorithm of aBFT
BitCherry uses a distributed blockchain system; the consensus algorithm running environment is similar to the execution environment of distributed systems. It ensures the safety and reliability of the consensus algorithm. aBFT is the basis of consensus algorithm which is fully asynchronous by BitCherry. It does not have to waste a lot of energy for PoW problems caused by nor node PoS / DPoS bugs. The system has also inherited the advantages of aBFT distributed consensus algorithm in solving the problem of fault tolerance and malicious nodes. But it also has the following shortcomings:
1. There is no complete certainty of consensus. It is just operates by timing, the probability of tampering becomes smaller and smaller, forming final certainty, so the time for consensus determination is also related to the number of nodes;
2. All nodes participating in the transaction participate in the consensus as well, this also limits the TPS of the hash graph from both the network bandwidth and the CPU/GPU computing power.
Safe and efficient consensus algorithm: aBFT+PoUc consensus mechanism
On a consensus algorithm, BitCherryβs data structure is based on the hash map. It is the block chain pioneering technology with six degrees of separation theory, which demonstrates the value of PoUc user, selects consensus nodes, optimizes the network propagation consensus process. Current system is combined with BitCherry original P2Plus network protocols, and multiple types of applications BitCherry side chains which allows to create a unique aBFT + PoUc consensus.
It is different from the DPoS method; all users can participate in the PoUc consensus. The algorithm automatically selects neighboring nodes and non-neighboring nodes to virtual voting according to the relationship graph algorithm, and refers to their weights for virtual voting. The selected nodes will receive accounting rewards. The selection rule of the neighboring endorsed nodes is based on the node network bandwidth/delay, the close centrality of the main/side chain relationship map and the nodeβs Bit-U value. The node network connection and relationship map are only calculated by level. The Bit-U value of the node is selected first; the selection rule for the large V node gives priority to the Bit-U value of the node when the node bandwidth/delay threshold is met. In the node selection process, the degree of deduplication and randomness between rounds are specified. The nodes that are repeated between two adjacent rounds do not exceed 1/3 and are randomly selected. Newly selected nodes are randomly selected according to 1/3 of the number of candidate nodes.
In simple terms, BitCherry consensus algorithm is based on aBFT, so any node that satisfy the condition (based on the unique value of Bit-U prefers the neighbor node) can participate in the process of the whole PoUc consensus and almost all important nodes in the circle will also participate in the PoUc consensus process.
2. Incentive Mechanism Bit-U
Although Hashgraph is based on the aBFT algorithm and treats all nodes equally and can be decentralized to the greatest extent, it also lacks incentives for the entire economic system. Thus, BitCherry uses Bit-U incentives, Bit-U formed by the superposition of four dimensions, the user will have any dimension obtained for excitation, the excitation multidimensional is greater. T is the time dynamics, R for the user relevance, A is for user activeness and C is for userβs contribution.
Time Dynamics T: Determined by the length of time the user holds to pass. This indicator is mainly determined by the time the user holds the pass. We believe that long-term pass holders are more credible than non-holders and have less motivation for evil.
User relevance R: It is determined by the user relationship circle and relationship activity. The relationship map includes: social relationship, e-commerce relationship, knowledge sharing relationship, and resource sharing relationship;
User Activeness A: It is composed of user online time/frequency, social activeness, transaction activeness, and sharing activeness;
User contribution C is divided into two categories:
Cloud computing mining machine resource Cm: In addition to mining participation, cloud computing mining machine resource Cm also includes: IPFS storage resources, gateway bandwidth resources, and CPU/GPU computing resources;
External interface resource Cb: External resource Cb mainly refers to the provision of external resources for the public chain, including: advertising/sales and other commercial intermediary services, arbitration/mantra services, etc., mainly for the public chain to open up information about the external physical world, the traditional Internet, and the Internet of Things , Funds, equipment, and services that goods to provide.
Since when, Cyberpunk (Cyberpunk) has become a buzzword, many young and creative workers who expressed their fond, the Cyberpunk words began to frequent appearance in the major social media, When it comes to cyberpunk, people will automatically flash brilliant blue and magenta neon lights in their minds, and electronic music singing in their ears.
Cyberpunk, as a niche subject under the category of science fiction works, originated from the concept of science fiction in cyberspace. The term Cyberspace was coined by science fiction writer William Gibson in the 1980s. It refers to virtual reality in computers and computer networks. Its original meaning also refers to computer technology, modern communication network technology, and even virtual reality. Based on the comprehensive application of technology and other information technologies, a new type of space with knowledge and information as the content. This is a virtual space created by humans for knowledge exchange. In this virtual space, humans do not have to consider race, economic privilege or prejudice brought by force, force, birthplace. In fact, I see here, I am sure you have thought of this combination "freedom + equality", it is also the block chain technology and to the center of the block chain network advocated.
In the history of mankind, the economy is an old and new eternal theme, whether in the agricultural economy and society, or in the industrial economy and society, economic development is a key factor in the healthy society can achieve sustainable development. In October 2008, an anonymous person (or organization) named Satoshi Nakamoto published a paper "Bitcoin: P2P Electronic Cash System" to the metzdowd.com mailing list. At this point, Bitcoin and the decentralized blockchain network represented by Bitcoin have been on the stage of history. The emergence of Bitcoin and decentralized blockchain networks has accelerated the digital production, distribution, and use of information. Economic development also seems to have opened a new gap in the giant door of the Internet business era.
In 2014, after Satoshi Nakamoto, another representative of the blockchain (Vitalik) discovered that Bitcoin has unsolvable limitations in its design and proposed to explore the "next generation of cryptocurrency and decentralized application platform" Ethereum for the goal. After the advent of Ethereum, its smart contracts with high versatility and flexibility have been sought after by many geeks. The transaction processing speed of Ethereum once surpassed the transaction speed of Bitcoin by 3 to 7 times. However, due to technology and insufficient, Ethernet still unable analogy with the existing centralized system on the performance, people are expecting web 2.0 to change the existing business structure, greatly enhance the productivity of the situation, after all, it is also without beginning and end.
In the "blockchain 3.0 era", too many falsehoods. The concept of blockchain technology has become a new round of opportunities for capitalists. Many public chain projects with the concept of "Blockchain 3.0" have followed the Ethereum structure, but they have not succeeded at all. Many projects in the "blockchain 3.0" era have insufficient scalability, poor security, slow implementation of the roadmap, and failure to meet expectations after the main net is launched.
Looking back at the development of the blockchain for more than ten years, there are still many difficulties in the development and application of blockchain technology and various industries, such as whether the security of the blockchain is safe, the key technology of the blockchain needs to be broken, and the blockchain and the entity industry to be the depth of integration. Based on this, BitCherry the distributed business public chain carrying its own new technology, new ideas, in order to better promote the block chain technology and industry healthy and orderly development, added to the road block chain technology development.
BitCherry based IPv8 as technology development and services in the distributed business expansion can blockchain infrastructure, innovative proposed "Blockchain Plus" advanced technology concepts, use BitCherry Blockchain Plus to improve the executable, inadequate performance governance structure and security issues. Its global community is then covered in just one year as many as 1 million + users, the technical concept in over 10 countries including China, the United States, Russia, Britain, France, Japan, Turkey, Dubai and Singapore. And more than a year of development, BitCherry also welcomed the latest progress of the project development, it is learned, BitCherry test network function has been fully developed, will soon formally launched the test network.
As we all know, can prop up a large-scale network effect is a severe test of all current public face of the chain, according to the technical white paper describing the BitCherry, high network efficiency BitCherry, and run a full node attached to the HashGraph structure to ensure there is no need to carry out heavy workload certification, which can achieve tens of thousands of transactions per second.
While providing basic blockchain services for enterprises, it can also create smart contracts and DApps according to different businesses.
It is foreseeable that this will accelerate the development, governance and operation of multi-agency business networks, as well as the smooth development of decentralized applications, and deliver value to the business exchanges between different entities in the future.
Blockchain technology development achievements mainly in supplement or extend the existing business model, BitCherry think of industrial innovation is needed is an open ecology, equality, freedom, cooperation, integration of one of the world's top resources from the capital, technology, and commerce, we will build a global ecology, promote the transformation and development of global business, and promote the transformation of the business society.
Blockchain technology is not a tool for capital solidification, but should be the key to rationally improve and enhance the space of human life scenarios. In the βcyberpunkβ setting, the urban landscape often has a large number of neon signs comparable to light pollution. This is actually an anti-human living environment for the over-development of urbanization under the capital environment. This is not what we are longing for. The real "cyberspace" should be as stated in the "Declaration of Cyber Independence":
βCyberspace consists of transactions, relationships, and thought itself, arrayed like a standing wave in the web of our communications.β
βWe are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth.β
Blockchain technology is leading a new round of global technological development and industrial transformation and has become an important technical technique for global technological innovation and model innovation. Many countries regard blockchain technology as the main national development strategy. In simple terms, blockchain technology Is the future.
2020 is a year for the development of public chain projects. Now the blockchain has entered a period of contention. Many public chain projects have appeared and developed, but there are good and bad situations. Under such circumstances, this article will introduce two value of investment, growth, and practicality blockchain project, and cited compare their technology. Both projects are similar to Polkadot and BitCherry, two projects are decentralized blockchain platform, with multi-chain fragmentation and network architecture, which will share the following technical advantages of the two projects, we welcome the discussion.
The structural design of the multi-chain fragment difference between Polkadot and BitCherry
Polkadot is a heterogeneous multichain with shared security and interoperability, composed of "relay chain + parachains", based on a multi-chain and heterogeneous sharding design based on nominated proof of stake (NPoS). There will be many different consensuses and parachains of different structures in the network. Each parachains has its unique data, P2P network architecture, and shares security by linking to the relay chain. The Availability and Validity (AnV) protocol of Polkadot is what allows for the network to be efficiently shared among parachains while maintaining strong security guarantees.
BitCherry is based on technology created IPv8 expandable blockchain infrastructure, according to the actual needs of different application scenarios do segmentation data, according to different types of content to provide the appropriate side chain, the main chain is only responsible for a consensus with the main transaction of Token, The number of side chains can increase with the increase of business volume and data. Nodes of different sub-chains handle their respective businesses and based on the design of a multi-layer systematic security assurance mechanism, to resist various attacks.
Sharding is based on the hashgraph division of the relationship graph. According to the six-degree split theory, the same type of relationship is usually concentrated in the surrounding small circles, and the relationship fragments from large to small form a hash circle, so the final 96% The above transactions are carried out in the same shard, cross-shard transactions will be greatly reduced, reducing a lot of unnecessary losses.
The Consensus algorithm difference between Polkadot and BitCherry
Polkadot adopts the NPoS consensus mechanism, that is, the "nominated equity proof mechanism". Simply put, all the holders of the project pass are the nominators of the Polka Ecology, and they have the right to nominate a certain node as a validator. The validator needs to pledge a certain amount of project tokens. Once successfully nominated as an active validator, it has the right to participate in the network block production. Besides, there is another feature at the consensus level that all shard networks share security, that is, the blockchain of the shard network shares the set of validators.
BitCherry using original aBFT + PoUc consensus mechanism, namely "user value of proof", and NPoS of different ways, all users can participate PoUc consensus algorithm according to the relationship map algorithm automatically selects the neighbor node and non-contiguous node, and concerning the weight Perform virtual voting, and the selected node will receive an accounting reward.
In simple terms, the BitCherry consensus algorithm is based on an asynchronous Byzantine fault-tolerant algorithm (aBFT), so any node that satisfies the condition (based on the unique value of Bit-U prefers the neighbor node) can participate in the process of the whole network PoUc consensus And almost all important nodes will also participate in the PoUc consensus.
How Polkadot and BitCherry could against the malicious attacks and protect chain security?
Polkadot maintains every chain around Polkadot by randomly selecting verifier nodes. The larger the pool of verifiers that can be randomly selected, the fairer and safer it will be. The probability that a group of people who want to do evil will be divided together will decrease. Therefore, Polkadot Official hope to have 1000 nodes to maintain the Polkadot chain, At the same time, fisherman, as a police officer in the system, can further strengthen the security of the system by finding out the evil operations and getting rewards.
BitCherry constructs the network protocol of P2Plus in the physical layer through the technology of IPv8. The P2Plus network protocol adopts the point-to-point high-strength private key encryption technology. Only the receiving node can decrypt the transmission content after encryption, which ensures the confidentiality of the transmission content and the privacy of the node. The operation of the whole node is attached to the structure of hashgraph, which can ensure the decentralization without heavy workload proof. At the same time, it can realize the point-to-point encryption of information and ensure the privacy and security of user data in the interaction process.
Although the two projects are different in terms of network architecture, consensus algorithm and privacy security, it is undeniable that Polkadot and BitCherry both project are beginning focus on security and make enough efforts to protect the privacy security on the chain, which is very important for users of blockchain projects.
Different application scenarios targeted by Polkadot and BitCherry
Polkadot focuses on the interoperability of the blockchain network and the flow of the whole information. The final consensus of other parallel chainsοΌParachainοΌ is provided by Polkadot, which makes it easier for the relay chain of Polkadot to record all the information of the whole network. Polkadot can directly call the intelligent contracts on other chains.
BitCherry focuses on providing customized commercial applications for different business scenarios. It solves the problem of blockchain network scalability through multi chain structure and physical fragmentation technology, by provides fully customized services and supports completely private side chains. Each side chain is a complete commercial level blockchain solution.
Polkadot's model snatches the function and value of the security protection of the native token of other chains. The chain established on Polkadot only has its own business scenario to support the market value of the currency. So, I guess a chain that wants to have autonomy may choose to build on the BitCherry network architecture. However, BitCherry is still in the early stage of technology research and development, and its main network has not been launched yet. There is no actual case in the market to verify the practical applicability of its technical concept.
Polkadot and BitCherry are both outstanding blockchain project representatives in the market at present. Both projects have distinct technical characteristics, and their different characteristics will attract different developers and users with different needs.This article only shares two blockchain projects that the author believes are forward-looking, growing, and practical. Nowadays, more potential public chain projects are springing up in the market. In the future, we will see who the winner of this public chain empire is.
IPv6 is slowly but irresistibly making its way into the Internet and into our networks. In industrial countries, the average user adoption rate is around 30%, Belgium being the leader with over 50%. Over 25% of the Top Alexa 1000 websites are dual-stack, which means, they are reachable over IPv4 and IPv6.
π Blockchain Will Change It
Blockchain is a new architecture, that revolutionizes the Internet and replaces the common centralized client-server design. Blockchain stores data on a chain of nodes. It is a shared public ledger on which the entire decentralized distributed peer-to-peer network relies.
IPv4 / IPv6 are all IP layer protocols, the point of difference is the number of bytes of the network source address and the destination.IPv4 supports more than 4 billion addresses, but you at home or office are sharing a floating IP address to connect the internet with everyone because the number of IP addresses is not enough. When you be home is using the temporary IP address to connect the internet; only the data center computer room and private network have has a fixed IP address.
In order to solve the problem of insufficient IP addresses, the IPv6 protocol was upgraded. The essence of the protocol is almost exactly the same as IPv4, but upgrading the address to 6 bytes can express 262 trillion addresses, which exceeds the number of each grain of sand in the world. Therefore, it is sufficient for all Internet-connected computers and IoT devices now and in the future.
The IPv8 address is based on the IPv4 / IPv6 address, adding 2 bytes to express the topological relationship of the network and the double-layer P2Plus gateway node. P2Plus will establish a decentralized fast, safe, and private point-to-point on the IP layer Communications network.
For example, IPv4 / IPv6 are regular roads, and all the villages have the roads; IPv8 builds a highway, and all the cities have the highway entrances and exits, while IPv8 addresses build a highway entrance link the regular road.
Nowadays Blockchain has become an important technology which promotes business development. So whoever can manage well core technologies may become the leader in this field. However, while using blockchain technology we still can experience some shortcomings. For example, most blockchain systems still adopt a single linked list structure and on chain commercial applications. The privacy and security of the company might be limited because of the performance of a single chain. So for this issue some public chain projects proposed a multi chain system structure. Unfortunately a multi chain system structure has the low efficiency between cross chain interoperability and the simple multi-chain structure. The commercial demand of monetary valued enterprises indirectly leads to some issues like: ineffective connection of traditional user groups and commercial institutions, the problem of weak liquidity, the low user trust caused by the lack of effective supervision methods in the existing blockchain. All of the problems mentioned above deeply limit the desire of enterprises in various fields to use blockchain technology.
As the worldβs first scalable blockchain infrastructure based on IPv8 technology, , BitCherry has built an innovative physical layer network protocol which is built P2Plus end-to-end encryption. Current innovative network protocol has already achieved some improvements like: an improved spectrum from the high scalable hash map data architecture, improved smart contracts, cross chain consensus and other operating mechanisms. The innovative network protocol can provide global businesses with a high performance, high security, and high underlying technical support. Current services might be involved in different fields like: finance, product traceability, asset digitization, commercial consumption, e-commerce, cloud computing and also in many other fields.
The article above gives a quick introduction of project- BitCherry. The detailed explanation about the technical framework and innovative technologies will be explained on the following text content.
1γ BitCherry Technology Concept
BitCherry is the worldβs first scalable blockchain infrastructure based on IPv8 technology. It has three major characteristics: they are high performance, data security and consensus governance. The company aims to build a commercial level blockchain infrastructure with an innovative physical layer which will be able to provide a high-performance, high security, high availability public chain support for distributed business applications on the chain.
BitCherry Key Technologies are:
IPv8, P2Plus Network ProtocolοΌBlockChain PlusοΌ, Sharding technology (Hash Ring Sharding Technology based on dividing the Related Hashgraph), aBFT+PoUc consensus algorithm, Bit-U incentive mechanism, smart contracts, and Cross Chain interoperability.
2γ Main technology innovations and their advantages
P2Plus Network ProtocolοΌBlockChain PlusοΌ
The existing P2P public chain protocols work above the TCP transport layer on the host side of the IPv4 / IPv6 wide area network, while the IPv8 protocol of BitCherry works in the lower layer of IP network and data has a link layer (which can work at the host side of routers and other machines at the same time). In other words, BitCherry starts to build the protocol which operates from the lowest physical layer, because it works at a lower level and located closer to the hardware. On the protocol layer of the device, P2Plus can easily penetrate any network, banning wall or network wall. Shortly, VPN, proxy server others are no longer needed. The P2Plus Network Protocol advantages are as follows:
High Performance: The transaction performance is improved by the horizontal fragmentation and vertical side chain of HashRelationGraph Algorithm. The consensus layer of the whole network is expanded to more than 100 000 nodes. The nodes participating in consensus in each transaction are controlled within hundreds nodes. In this way, BitCherry network can be completely decentralized, and the TPS of the network can reach for more than one million. Even if there are tens of thousands of BCHC transactions per second, the security and stability of BitCherry network will not be affected.
Scalability: Based on the aBFT Asynchronous Algorithm and relying on the expansion design of vertical side chain and horizontal fragmentation, the problem of block congestion is solved, which means that the resource occupation of phenomenal pop up applications will not affect other chain applications.
Privacy Security: The operation of the whole node is attached to the structure of hashgraph, which ensures the decentralization without heavy workload. It can realize the point-to-point encryption of information at the same time it can obtain a value high-speed interconnection, ensure the privacy and security of userβs data in the interaction process.
2. Sharding technology
The biggest problem of existing shard technology is cross chain transaction. Cross chain synchronous transaction in most of the time lose performance and asynchronous transaction damages security, the transaction is also occurring under some restrictions, the transaction must specify the partition in which it is located, so because of the issues mentioned above the actual application scenario will be greatly limited. As the solving way of the issues BitCherry uses Hashgraph partition based on the Relationship Graph. According to the six degree segmentation theory, the same type of relationship is usually concentrated in the surrounding small ring (similar to WeChat circle of friends), and it will form a Hash Ring from large to small relationships, such as the ring of friends or people who may know. Therefore, more than 96% of the final transactions are carried out in the same segment, and unnecessary cross segment transactions will be greatly reduced.
3. aBFT + PoUc Consensus Algorithm
In terms of consensus algorithm, BitCherry creatively combines blockchain technology with six degree segmentation theory on the basis of hash graph data structure which. It is proved that the value of PoUc would benefit in selection of consensus nodes and optimize the communication process of network consensus propagation process, and create a unique aBFT + PoUc consensus. Different from DPoS, all users can participate in the PoUc consensus. The algorithm automatically selects adjacent nodes and non-adjacent nodes according to the relationship graph algorithm, it conducts virtual voting with reference to their weights, and the selected nodes will get bookkeeping rewards.
4. Smart contract
BitCherry smart contract is a fully functional Docker containerized smart contract that supports multiple programming languages and supports external resource isolated by sandbox. In terms of programming language, it supports solidness, C + +, Java, go, typescript and other mainstream programming languages. The smart contract supports IPFs and the network upper layer protocol based on P2Plus point-to-point encryption. Its services involve supply chain finance, asset digitization, commercial consumption, e-commerce, distributed cloud computing and many other commercial fields.
5. Digital token
The main role of projectβs BCHC token in the BitCherry ecology is to confirm the rights and price. It is the digital carrier of assets and the value support of BitCherry ecology. Its existence facilitates the flow of value in the form of digitization in the BitCherry ecology, realizing the mapping from the physical world to the digital world.
In the near future, we will give you a detailed introduction to the technology, consensus, product, ecology, and value of the distributed commercial public chain BitCherry.
Former MemberHi, Ziad Boutros Tannous , Thank you for your interested in BitCherry. For more information, please refer to our offcial website at https://www.bitcherry.io/ . Do PM me for any assist. [ more ]
Ziad Boutros TannousVery interesting crypto / blockchain project and seems promising. May I know more about the team background behind this? Curious to find out more. Thanks! [ more ]
As mankind is about to move towards an intelligent, fully-connected world of Internet, Internet of Everything, is an integration of virtual and real, is to face new generations, new services, and new needs, traditional IP networks have long been unable to handle it. How to make IP networks inherit the genes of success to make it to continue the development on the basis of meeting the new needs of the future industrial Internet, and promote the digitization of the entire industry, this issue has become a common concern of the industry.
The current IP technology started in 1969 and the protocol was finalized in 1978, it nearly operated for 50 years and has achieved great success. It turned out that IP technology focused on connecting computers around the world before, mainly in the office field; later it extended to mobile internet, so all mobile phones connected by later IP technology; but for so many years, traditional IP technology has been unable to meet the rapid development of industrial internet which has a series of requirements such as low latency and security.
According to a report in the βFinancial Timesβ, Huawei, in conjunction with the Chinese Trade Union, China Telecom, and the Ministry of Industry and Information Technology, submitted a proposal called "New IP" to the International Telecommunication Union (ITU).
Huawei distributed an impressive article (titled "New IP framework and Protocol for Future Applications"). The article explains that new IP is a new Internet protocol framework which can better support emerging network applications, such as multi-network and holographic communication, etc., The new IP will fundamentally support the variable length of the network layer, multiple semantic addresses, and user-defined networks.
It is not difficult to observe that the innovation of IP network architecture has become the top priority in the current network society. The emerging technology of blockchain, relies on the Internet, whether or not will launch its own journey of βIP revolutionβ.
As we all know, the network protocol is the basis of the network program, and the peer-to-peer network is also the basis of the blockchain operation. Therefore, the security and connectivity speed of the network protocol directly affects the security and performance of the blockchain. However, all existing public P2P protocols work above the TCP transport layer of the host side of the IPv4/IPv6 wide area network, which leads to have a network security issue which is gradually becoming a potentially huge problem, because the TCP/IP protocol was not formulated with a full consideration of security at all. We should fully consider its security, so in the actual application process there wonβt be attacks such as IP address spoofing, source routing attacks, network eavesdropping and so on. Secondly, the IPv4/IPv6 network architecture is prone to data loss and incomplete transmission during data transmission.
In order to solve these issues, BitCherry firstly proposed, the block chain network protocol built on IPv8 technology. In order to ensure privacy of data transmission and malicious nodes, different with the traditional P2P network protocols, The P2P+ network protocol uses a point-to-point high-strength private key encryption technology. The transmitted content is encrypted, and only the receiving node can decrypt it, ensuring the confidentiality of the transmitted content and node privacy. The public-private key mechanism can be used not only to encrypt the communication process, but also to authorize access through signatures. Unlike the SSL certificate system and account/password method adopted by OpenSSN, P2P+ authorizes network reads/writes of 8-bit virtual IP addresses and identifies them by the public key signature of the virtual IP addresses to prevent false IP address attacks.
BitCherry P2Plus work on more underlying IP network layer and the data link layer (which can work simultaneously in Host and router), so P2Plus can easily penetrate any network, firewall, and network fence, greatly improving the accessibility of data transmission.
As it can be seen above, Huawei New IP and BitCherry IPv8 have some similarities like:
1. Background: Both are based on the disadvantages of the traditional Internet, which exist in the background that the traditional Internet is unable to support the connection of massive networked subjects, has low transmission efficiency, instability, and is prone to attacks.
2. Objective: Both are committed to build a more secure, efficient, and open internet, supporting the interconnection of all networks, the interconnection of all things, and precise transmission. It has the characteristics of flexible addressing, efficient operation, safety, and efficiency.
When the reality of traditional internet increasingly becoming unstable, we believe there will be more new technologies that will build with BitCherry for a better future, we also believe, this technology of BitCherry, will become the most dazzling star. The release of new IP, will also have a more active role in the development of BitCherry, the two will work together to accelerate the upgrade of the Internet. Let us look forward to the arrival of web3.0 together!
Cryptocurrency Hub is an online community platform that covers a plethora of topics related to cryptocurrency and blockchain technology.
We have specialized discussions board related to Bitcoin (BTC) and to the best altcoins currently being traded in the crypto space such as Ethereum (ETH), Ripple (XRP), Litecoin (LTC), Cardano (ADA) and many others!
This is in addition to boasting a variety of other crypto related subjects such as blockchain tech, decentralization, crypto trading and mining, technical analysis, jobs in the fintech space, etc.
We would love to welcome you as an active member of our ever growing online community of crypto enthusiasts, investors, traders, entrepreneurs, businesses and influencers and we genuinely hope you will enjoy your time with us and contribute positively to cryptocurrency and blockchain mass awareness and adoption!
When you block a person, they can no longer invite you to a private message or post to your profile wall. Replies and comments they make will be collapsed/hidden by default. Finally, you'll never receive email notifications about content they create or likes they designate for your content.
Note: if you proceed, you will no longer be following .
Cryptocurrency Hub is an online community platform that covers a plethora of topics related to cryptocurrency and blockchain technology.
We have specialized discussions board related to Bitcoin (BTC) and to the best altcoins currently being traded in the crypto space such as Ethereum (ETH), Ripple (XRP), Litecoin (LTC), Cardano (ADA) and many others!
This is in addition to boasting a variety of other crypto related subjects such as blockchain tech, decentralization, crypto trading and mining, technical analysis, jobs in the fintech space, etc.
We would love to welcome you as an active member of our ever growing online community of crypto enthusiasts, investors, traders, entrepreneurs, businesses and influencers and we genuinely hope you will enjoy your time with us and contribute positively to cryptocurrency and blockchain mass awareness and adoption!