A bug bounty program is used to inspect protocol code and rewards inspectors if bugs are found successfully. Code and product quality can be increased significantly by such swarm intelligence. […]

...(more)

It is no secret, Ethereum, the by market cap and adoption most successful smart contract blockchain, is at its limit. Various DeFi apps, like Uniswap, Aave, games, like Axie Infinity, […]

...(more)

People in the blockchain space often throw around the words Byzantine Fault Tolerant (BFT) as though it was self-explanatory. Additionally, BFT often pops up in discussions about consensus mechanisms.  If […]

...(more)

Self-Sovereign Identity (SSI) is increasingly mentioned in connection with innovations and digital identities. Even in the context of the coronavirus crisis, SSI finds possible applications, such as the possible use […]

...(more)

Proof-of-Stake is an energy-efficient way of coming to a conclusion on the accurate state of a distributed system.

...(more)

In casual discussions about blockchain and DLT it’s easy to mix up anonymity with pseudonymity.  People often use the one term when they mean the other. There is a small […]

...(more)

People often ask us if our our blockchain solutions are energy efficient. There’s a lot of articles and good research out there indicating that the most famous blockchain, Bitcoin, uses as […]

...(more)