RONIN (@ronintvmedia) • Hey
RONIN (@ronintvmedia) • Hey
Publications
- Enable lens protocols and farcaster in post visibility this means you are sharing one post with @lens/phaver, lens and farcaster but if you want you post within @lens/phaver only you should enable community only post that way only your @lens/phaver audience sees your posts.
- Mint this asap🔥
- The hustle💯
- Toh😅
- Nehn
- Real🔥
- Alpha!!!
Join this testnet waitlist
https://cfh.xyz/?ref_id=EODUMN9SZ
- Sometimes I feel like I’m not trying my best
- Notcoin will cook🔥
- What a useless team🤦🏽
- Gm @club/bonsai community 💯🔥
- I would miss the next bonsai airdrop 🙂
- Missed the bonsai airdrop😭
- Just claimed my airdrop from Velar✨🔥
- Airdrop Allocation worth almost $ 2k
Massive win to holders
Happy New Month💯
- Don't fade this🔥
https://forge.gg/signup?referralcode=c05393d7-6734-45b8-8235-8d8072ebc933
Complete the new $MOJO tasks on Forge.
simple x tasks
- Back in lv3💯
- Futures trading rekt me🥲
- Trading💯
- Clam
- $BONSAI listing on Coinstats! 🥳 🚀
https://coinstats.app/coins/bonsai-token/
Collecting: 100 $BONSAI - 30 days - 100% to mirrors
#RainBonsai #PowerOfLens
- $BONSAI to $ 100M MARKET CAP🔥🔥🔥
- Bloodloop @BloodLoopGAME
Sign up for the Play-to-Airdrop
/ Claim your username:
bloodloop.com/onboard?ref=ronintvmedia
Mint Daily Energy every 24 hours
Wait for the Play-to-Airdrop campaign
Holding/staking Energy Manipulator or S.E.M
Capsule NFTs might be a multiplier
- GM everyone
- GM everyone
- $BONSAI to the moon 🔥
- Just Seen my airdrop from being active on Phaver/Lens, LFG🔥
- A lot has changed since resuming phaver
- I'm +1 today🎗️❤️🩹
- TOP 5 FEATURES OF TFSC
Decentralization has had a backdrop in recent years due to its inability to handle large amounts of transactions due to the increasing number of daily onboarding of persons into the space and this is why Transformers Chain is here.
A super-efficient, global network that can handle countless transactions concurrently, bringing together the best of decentralization and incentivized participation. Welcome to Transformers Chain, a revolutionary blockchain network poised to reshape the future of the internet, Web 3.0.
In this article, we’ll embark on a journey to understand what Transformers Chain is, and explore its essential features.
WHAT IS TRANSFORMERS CHAIN?
Transformers Chain, often referred to as TFSC Chain, is a cutting-edge distributed network designed for processing a multitude of transactions simultaneously. It stands out for its scalability, decentralization, and innovative incentive layer protocol, which encourages active participation.
TOP 5 FEATURES OF TFSC- NO ONE IS TALKING ABOUT
Transformers chain has so many features that can transform the future of web3 however, we shall focus more on the most interesting features no one is talking about.
1. EVM Compatible
Transformers Chain is compatible with the Ethereum Virtual Machine (EVM). This compatibility with the Ethereum Virtual Machine allows it to inherit the extensive ecosystem and smart contract capabilities of Ethereum.
This means that developers can seamlessly migrate their existing applications to TFSC Chain without the need for extensive code overhauls. It’s like moving your favourite furniture into a new and more spacious house without having to buy all new furnishings.
2. Dual VRF Algorithm for Enhanced Efficiency
The Dual VRF Algorithm is the secret sauce behind Transformers Chain’s incredible transaction processing speed. VRF simply means Verifiable Random Function and it enables the network to handle multiple transactions at the same time, as if several chefs were cooking in the same kitchen, ensuring that your food gets ready much faster. Just think of it as a masterful multitasker.
3. Affordable Low Fees
One of the most appealing aspects of Transformers Chain is its incredibly low transaction fees. It’s like having a world-class service at a fraction of the price. This affordability makes it an excellent choice for individuals and developers alike, as it ensures that users can engage with the network without breaking the bank.
4. Multi-Block Coexistence for Reliability
In Transformers Chain, multiple blocks exist in harmony at each network height. It’s like having multiple guardians watch over the city to ensure everything runs smoothly. This multi-block coexistence ensures the network’s reliability and efficient management of a substantial volume of transactions.
5. Raindrop Consensus Protocol (RDCP) for Security
RDCP, the Raindrop Consensus Protocol, is the security fortress of Transformers Chain. It’s like having a bank vault with an impenetrable security system. RDCP’s lottery mechanism for selecting block producers ensures that attackers face an uphill battle when trying to compromise the network’s integrity.
- Synchronization In TFSCChain (2)
Byzantine
Before we get to know synchronization, let's take a look at the Byzantine algorithms that are crucial to synchronization.
The Byzantine Generals Problem is a distributed peer-to-peer network communication fault-tolerant problem proposed by Leslie Lambert and others in their paper 《The Byzantine Generals or equal to f, the loyal generals can achieve consistent commands, that is, the number of traitors is less than half of the number of loyal generals.
The algorithm complexity is O (n ^ (f+1)).The fault-tolerant algorithm for the Byzantine general problem solves the problem of consistency when the network communication is reliable but the node may fail.Therefore, this algorithm can hardly be applied in actual distributed systems.
Byzantine fault-tolerant algorithm is a system attribute that can resist a series of faults caused by the Byzantine General problem. In other words, the Byzantine fault-tolerant system can continue to operate even if some nodes fail to communicate or have malicious behavior.There are many ways to create a Byzantine fault-tolerant blockchain, which relates to different types of consensus algorithms.
The Application of Byzantine
In transformers chain, according to the set time interval of one round and the callback calculation of the height synchronized from other nodes, the overall network height (the height with the highest proportion) is compared with its own height.
If it is lower than the height of the whole network, synchronization will start. First, multiple staked nodes are obtained, and then their node block header hashes are retrieved. After verification,the actual block data is requested, and a randomly selected block is added to its own chain. When the difference in height is below a certain level, the block needs to be verified.
That's all for now, stay tunned
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
- Synchronization In TFSCChain
Synchronization means the mechanism used to maintain consistency between the contents of two or more databases,files,modules,or threads.Consensus and synchronization are essential sectors in the blockchain.
The synchronization process enables all nodes in the entire blockchain network to achieve data consistency, ensuring that the data can be verified throughout the network. At the same time,while not affecting the consensus,it prepares the data required for the consensus in advance,so that the data throughout the network reaches an agreement, and increases the success rate of transactions
The Concept of Synchronization
Synchronization is to enable transactions on the blockchain to reach as many nodes as possible, providing the basis for consensus to package transactions into blocks.Fast and reliable synchronization is the basis for transformers’s ultra-high throughput.
Synchronize contains blocks with a large number of transactions,and each block contains more than one transaction. To achieve such efficient and high-quality synchronization requires excellent technical support, such as reliable node discovery, fork management, UTXO verification.
Transformers is a completely decentralized public chain, and uses Byzantine synchronization to achieve data consistency across the network. Generating a block on transformers is a passive behavior,and blocks are only generated when transaction occur,rather than through a scheduled block generation mechanism. Any user can synchronize all data blocks on the main network. Before synchronizing blocks, you need to get preparations as follows: a reliable node connected to the main network.
Why is synchronization used
When running, it will regularly broadcast its highest block height to other nodes.When a node receives the broadcasted block height from another node, it compares it with its own block height. If its block height is behind, the block download process will be started.The download of blocks is completed through a request/response mechanism. The nodes entering the download process will randomly select the nodes that meet the requirements and send the requested block height range to download.The node receiving the download request will respond with the corresponding block according to the request content.
The synchronization of transformers ensures the consistency of data across the network, provides a security basis for consensus, and ensures the security and robustness of transformers network.
- DAG structure On TFSCC (2)
DAG in blockchain
After having an intuitive understanding of the DAG structure, let's take a look at why blockchain is regarded as a special DAG structure?
According to the article "From Blockchain to DAG (I) - The Ledger Structure and Consensus Mechanism of Blockchain", whether the blockchain forks or not is related to the speed of generating blocks and broadcast speed. When the block generationspeed exceeds the broadcast speed, multiple blocks will be broadcast simultaneously, resulting in forks.
The more forks there are, the lower the security is.In order to reduce forking,Bitcoin found a balance between performance and security by generating a block every ten minutes to reduce forks.Now let's assume that the block generation time is long enough to prevent a new block from being generated before the previous block has finished broadcasting.Then the structure of this blockchain is a single chain.
In fact, due to network latency and other reasons, forking is inevitable in blockchain, so the actual blockchain structure will be as shown in the figure, and only one valid main chain (yellow) will be selected through ledger consensus, and the transaction information in the remaining block (red) is invalid and will not be adopted.
Transformers uses DAG structure to avoid the inability to concurrently execute block packaging in traditional blockchains. If you change the chained storage structure of blocks into a DAG mesh topology, you can achieve concurrent writing.
In the case where the block packaging time remains unchanged, N blocks can be concurrently packaged in the network, and the transactions in the network can be increased by N times. The combination of DAG and blockchain is to solve the efficiency problem. After the transaction is initiated, the network confirmation is broadcast directly.
From the perspective of the topology model above, the evolution from single chain to tree and mesh, from the granularity of blocks to the granularity of transactions, and from single point transitions to concurrent writing all enable transformers to make a qualitative leap in efficiency.
That's all for now, stay tuned
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
- DAG structure On TFSCC
DAG (Directed Acyclic Graph), is proposed again as a new underlying ledger structure. "Directed" refers to directional, "Acyclic" refers tonot cyclic,no return.
DAG model
It’s obvious that the Merkle tree belongs to a type of directed tree structure, where each vertex in the tree can only point to one previous vertex, and the entire data has an obvious flow direction.DAG structure allows each vertex to point to multiple previous vertices, and the entire data flow has an obvious direction.
Another data structure is directed graph, which is different from a DAG in that a directed graph allows data to flow back, and the data flow in the entire structure is not very clear. The differences among the three are shown in the figure.
Advantages of DAG structure
In DAG, there is no concept of block. Its constituent unit is a single transaction, which records the transaction of a single user. This eliminates the time needed to package blocks.The verification method depends on the verification of the previous transaction by the next transaction. In other words, to make a transaction, and the number of transactions to be verified depends on different rules.
This verification method enables DAG to write many transactions asynchronously and concurrently, and ultimately forms a topological tree structure, which can greatly improve scalability.
In the context of blockchain, it is difficult to significantly improve scalability while ensuring decentralization and security, making it difficult to commercialize. DAG is decentralized in theory.
If the network is powerful enough, the security can also be guaranteed, and more importantly, the scalability can be greatly improved.Distributed database with DAG technology can greatly improve transaction throughput and reduce transaction fees to a minimum.
That's all for now, stay tunned
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
- Raindrop Protocol features
Security: Raindrop Protocol prevents issues such as dual payment and 51% attacks, and has the ability to protect the network from attacks and malicious behavior while ensuring decentralization and distribution.
Scalability: As the number of system users and transaction volume increases, the Raindrop Protocol can support higher throughput and more participants, without compromising security during the expansion process.
Fairness: Raindrop Protocol adopts discrete random numbers to ensure that every participant has an equal chance of receiving rewards and encourages nodes to comply with rules.
Verifiability: Anyone can use verifiable random numbers to verify whether a new block is legal and whether the transactions within it are valid.
Economic efficiency: Raindrop Protocol does not require a large amount of computing power to calculate. Due to the low energy consumption of nodes, it saves more energy and resources. This can improve the economic efficiency of the entire system, allowing more nodes to participate in the system and receive corresponding rewards.
Algorithm & Security
In order to protect the security of assets on the chain, Transformers has adopted algorithms and security mechanisms that are currently widely used and tested through extensive practice. It mainly includes two aspects: the ED25519 elliptic curve signature algorithm and the Verifiable Random Function (VRF).
ED25519 elliptic curve has been widely recognized for its security from both mathematical and practical perspectives.It also has extremely fast generation and verification speeds, and improves the verification speed of transactions while ensuring security. For more information about ED25519 elliptic curve, please refer to relevant literature:http://ed25519.cr.yp.to/
Transformers chain uses a large number of random number algorithms to ensure its fairness in the transaction process. However, ordinary random number algorithms cannot prevent the malicious behavior generated by modifying the source code. So the transformers chain introduces VRF to verify the randomness of the results. The related principles can also be found in relevant documents.
That's all for now, stay tunned
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
- Consensus algorithm In TFSCChain
Transformers chain is a completely decentralized public chain that utilizes the independently developed Raindrop Protocol to solve various shortcomings of traditional consensus mechanisms.
POW requires a large amount of energy to solve mathematical problems, which can lead to energy and resource waste. Miners with stronger computing power have a higher probability of success, which may lead to the concentration of computing power in several large mining pools, thereby increasing the risk of centralization.
POS requires holding a certain number of tokens, and those with more tokens also have a higher probability of success, which may lead to wealth inequality and centralization risks.
The Raindrop Protocol solves the problems of energy waste, resource waste, and suspicion of centralization while ensuring safety.
Concept of Consensus Mechanism
Digital currency and blockchain complement are complementary to each other. Blockchain, as the underlying technology of digital currencies, relies on consensus mechanisms.As an Internet-based decentralized accounting system,without strong centralized role control all nodes participating in the blockchain need to reach a consensus and establish mutual trust relationships.
Raindrop Protocol
Transformers uses Raindrop Protocol as consensus mechanism at the consensus layer. At present, the mainstream consensus mechanism cannot balance efficiency and decentralization. Compared with traditional POW, Raindrop Protocol is more efficient and will not generate competition for computing power. Each node in the network has its own unique node ID , and each node in the main network is selected and verified through discrete random numbers.
VRF validates the random number selection of block packers, ensuring the fairness and transparency of the election process. The entire network nodes verify whether the verification nodes selected by the block packers are randomly selected through VRF.
The use of VRF (Verifiable Random Function) has the following characteristics:
Fairness and Transparency: Random numbers generated through VRF have fairness and transparency, and anyone can verify the correctness and authenticity of random numbers.
Unpredictability and unforgeability: Due to the unpredictability and unforgeability of the VRF generation algorithm, the generated random numbers have high security and trust.
Cost saving: Using VRF can avoid the additional overhead and risks that may exist in traditional random number generation methods, thereby effectively saving costs.
- Different Transaction Types In TFSCChain (2)
Unstaking transaction
The staked coins can be unstaked after 30 days. To unstake, enter the hash of the staking transaction.
Investment Transaction
As we all know, there is a reward mechanism in the blockchain, which is different from the mining algorithm.Transformers does not use proof of work,but creatively uses the application mechanism algorithm. Users can participate and share out bonus with a minimum investment of 35 TTOS. The more you invest, the more you earn.
Disinvestment Transactions
Investors can withdraw their investment from others, and the rewards applied by others will not be shared to this account. Disinvestment requires input disinvestment account, the investor account, and the UTXO of the investment.
Why Staking and Investment are Necessary
TTOS will stake and invest a certain amount as a signature condition to join the consensus in the transformers network. Only when the node stakes and invests to obtain the corresponding qualifications can it dividends and rewards.
Claiming Mechanism
When the user meets the network entry requirements and is in by other nodes for a total of 10,000 or more, they can sign the transaction of the node. In addition to getting a transaction fee immediately, you can also apply for an additional reward based on the number of signatures on the next day. an additional reward based on the number of signatures on the next day. For the specific claiming formula. The specific application formula is as follows.
Reward rules
Yield rate(ER) ER = IR / SR
Staking rate (SR)
Current Circulating Supply = Total Circulating Amount of the Network - Total Network Claimed Amount on the Day
Current Staked Supply = Total Staked Amount of the Network - Total Network Staked Amount on the Day
Staking Rate (SR) = current total staking / current total circulation
NOTE:
The maximum value of SR is 0.90. If it is greater than 0.90, it is calculated as 0.90
The minimum value of SR is 0.35. If it is less than 0.35, it is calculated as 0.35
The minimum value of IR is 0.02. If it is less than 0.02, it is calculated as 0.02
The initial value of inflation rate (IR) is 0.077, and the staking rate (SR) is multiplied by 0.9865 for every 1% increase in inflation rate (IR),
The minimum inflation rate is 0.02 when the cumulative annual inflation rate is multiplied by 0.88 and so on.
That's all for now, stay tunned
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
- Different Transaction Types In TFSCChain
A transaction refers to the exchange of value between two parties using currency and services as a medium. In the blockchain, a transaction is a digital record that broadcasts transaction data in the entire network through the blockchain network, announcing the transfer of ownership of encrypted currency, and confirming and verifying the transaction through the consensus mechanism in the entire network, making the transaction irreversible and preventing tampering.
In common currency, the main types of transactions are sending currency units or tokens to others, while in other systems, such as domain name registration, offering, and completing the offer,and contracts establishment are also valid types of transactions.
Transaction conditions
In the transaction, the required conditions are different, such as the sender's Base58 account, the receiver's Base58 account, the transaction amount, the staked amount, the account for unlocking the staked amount, tand the transaction for unlocking the staked amount, etc. Our transaction process is very simple for external users and is suitable for user operations. The specific details are as follows:
Types of transactions
Transaction is the only way to interact withthe blockchain network, including the release of assets, transfer, deploying smart contracts, contract invocation, etc.,are all operations based on transactions.
Ordinary transaction
Like a real-life transaction, using blockchain transactions to transfer funds is not much different. Once a transfer is sent successfully, a transaction is completed. It is worth noting that to enable users to sign for others actively and increase the speed of blockchain transactions, a handling fee will be charged, but the gas fee will be directly destroyed and deposited into an address that can never be retrieved.
After the transaction, part of the utxo of the account will be transferred to the recipient's account. Generally, when making a transaction, you need to enter the Base58 of the sender, the Base58 of the recipient, and the transaction amount.
Staking transaction
In the blockchain, we need to stakea certain amount of coins to join the network,in order to avoid user volatility and ensure stability. The staked coins can be unstaked after a certain period of time. The staked amount is 1000 TTOS, and the staked amount will be transferred to a special account. When staking, you simply need to enter the staking amount.
That's all for now, stay tunned
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
- Transformers Chain Network Explained (5)
VRF(Verifiable Random Function)
VRF was proposed by Silvio Micali et al. in 1999 as a verifiable pseudo random function. VRF accepts an input and generates a random output based on the holder's private key. At the same time, VRF can also generate a proof that allows others to verify the correctness of the output using the corresponding public key without knowing the private key.
Characteristics of VRF
Verifiability: The core advantage of VRF is its verifiability. The random numbers generated by VRF can be accompanied by a proof, and anyone can use the public key to quickly verify the validity of the proof, ensuring the authenticity and correctness of the random numbers.
Security: VRF has high security, and its random number generation process depends on the private key and cannot be predicted or tampered with by external attackers. Meanwhile, the implementation of VRF is usually based on elliptic curve cryptography, which has strong cryptographic security.
Decentralization: VRF can be applied to decentralized scenarios, such as blockchain consensus algorithms. By using VRF to select leaders or validators, it can ensure that the entire process does not rely on centralized authoritative institutions, and improve the degree of decentralization of the system.
Difficult to tamper with: The random numbers generated by VRF and their proofs are unique for the given input and private key, making the output of VRF difficult to tamper with. Even the holder of the private key cannot generate different valid random numbers to deceive other participants.
Fairness: VRF can ensure that the generated random numbers have fairness, as it is not affected by any external factors. This makes VRF fair in scenarios such as lottery and blockchain consensus, preventing manipulation and cheating.
Scalability: VRF has good scalability and can be applied to large-scale distributed systems. Due to the relatively efficient validation process of VRF, it can support a large number of participants to perform random numbers.
In summary, Ed25519 is a high-performance digital signature algorithm based on elliptic curve encryption. It provides high security and performance, as well as shorter signatures and public keys, making it an ideal choice for modern cryptography applications. VRF, as a cryptographic random number generation method with verifiability, uniqueness, and unpredictability, is widely used in scenarios such as blockchain consensus algorithms, privacy protection, and random lottery.
With the continuous development and optimization of VRF technology, its applications in real life will become more diverse, providing reliable randomness and security guarantees for various scenarios. Transformers chain integrates these two excellent algorithms, laying a solid foundation for the security of transformers.
- Transformers Chain Network Explained (4)
Elliptic curve encryption
Elliptic curve encryption technology is a public key cryptography method based on the discrete logarithm problem between points on the elliptic curve and integers. Compared to traditional RSA and DSA algorithms, elliptic curve encryption has higher security and lower computational complexity.
Ed25519 algorithm
Ed25519 is a high-performance digital signature algorithm based on elliptic curve encryption (ECC) technology in the field of cryptography. It was jointly designed by Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe and Bo Yin Yang in 2011. Ed25519 aims to provide shorter signatures and public keys while maintaining high security and performance. Ed25519 is widely used in many scenarios, such as SSH keys, TLS certificates, cryptocurrencies, etc. It plays an important role in internet security, blockchain technology, and various encryption applications.
The safety of ED25519 conic curve has been widely recognized in both mathematics and practice, and it also has extremely fast generation and verification speed, improving the verification speed of transactions while ensuring security.
Features of Ed25519
1. High performance: Ed25519 performs excellently in terms of signature and verification speed. Compared to other signature algorithms such as RSA, DSA, and ECDSA, Ed25519 can provide faster signature and verification speeds in most scenarios. This makes Ed25519 perform well in blockchain systems with high throughput and low latency.
2. Short Key and Signature Length: Ed25519 uses efficient elliptic curve cryptography, with relatively short key and signature lengths. Shorter key and signature lengths mean lower storage and transmission costs, which are crucial for blockchain systems as they require broadcasting a large number of transactions on the network.
3. High Security: Ed25519 is based on the Edwards curve Digital Signature Algorithm (EdDSA), which has high security. Compared to other signature algorithms, Ed25519 is competitive in terms of cryptographic strength and has strong resistance to quantum computing attacks.
4. Anti side channel attacks: Ed25519 has taken into account the characteristics of anti side channel attacks in its design. Side channel attacks refer to attacks that recover keys by analyzing information leaks (such as time, power consumption, etc.) in hardware or software implementations. The anti side channel attack feature of Ed25519 helps to improve the security of blockchain systems.
4. Simple and easy to implement: The design of Ed25519 is relatively simple, easy to implement and review. This helps to reduce implementation errors and potential security vulnerabilities. In addition, Ed25519 has been widely used in many open source libraries and projects, making it highly available and interoperable in practical applications
That's all for part three, stay tuned for part four
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
- Transformers Chain Network Explained (3)
Heartbeat mechanism
If a node goes offline and does not reconnect within the specified time , the heartbeat number will change to 0, and the node information will be deleted
Steps:
The node reduces the heartbeat countof all known nodes by 1 and sends a ping request.
When the receiving node successfully receives the ping request, it resets the heartbeat of the sending node’s heartbeat count and sends a pong request.
When the sending node successfully receives the pong request, it resets the receiving node's heartbeat count and updates its node information.
Block height change notification
Step:
When the node height changes, it sends its own node height to other connected nodes. The receiving node processes the change request and updates the block height of the corresponding node.
Transformers uses the various mechanisms introduced above to ensure that the network status of each node in the network is good, ensuring the consistency of the data status of each node, and providing guarantee for the security and success rate of Transformers's continuous and rapid transactions.
Transformers Secure
Transformers adopts algorithms and security mechanisms that are widely used and have been widely tested in practice to protect the security of assets on the chain. Mainly including: ED25519 Conic Curve Signature Algorithm and Verifiable Random Function (VRF)
RSA(Rivest-Shamir-Adleman)
The RSA algorithm is an asymmetric encryption algorithm proposed by Ron Rivest, Adi Shamir, and Leonard Adleman in 1978. It is widely used in the field of public key cryptography due to the difficulty of factorization of large numbers. The RSA algorithm is mainly used in scenarios such as encryption, decryption, digital signature, and signature verification.
However, the RSA algorithm involves modular exponentiation of large integers and has a high computational complexity, resulting in relatively slow encryption and decryption speeds. To ensure security, RSA algorithms typically require longer keys (such as 2048 bits or longer), which can result in significant overhead in key management and transmission.
That's all for part three, stay tuned for part three
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
https://www.tfsc.io/
- I did not enjoy this Christmas 🥲
- Bull run is back baby😌❤️
Merry Christmas 🎄🎁
- Transformers Chain Network Explained (2)
Network communication process
Transformers uses relatively stable TCP point-to-point communication.When using TCP communication, messages are first stored in the cache, then distributed by the transaction distributor, and finally processed by various processing functions.
Communication implementation
Node list: In other P2P networks, each node saves the information about other nodes.
When requesting one of the nodes, you only need to quickly find the corresponding node in your own node list. The current problem shared by some blockchain projects is that when the number of network nodes continues to expand, it is impossible to store the information about all other nodes on each node.
With the increase of the number of digits, the number of layers is also increasing, and the higher the layer, the more information will be stored. This will cause great difficulty in quickly reading subsequent data and will reduce the timeliness of network data. Transformers is designed to solve this problem.
At the application level, Transformers network sacrifices the number of nodes to improve network node, and can quickly complete full network communication within the service quantity level. Which can quickly complete the whole network communication within the service quantity level. If the quantity exceeds the tolerance value, it will slow down transactions, and Transformers chain will kick out some unstaked nodes to solve this problem.
When a node receives a request message, the sender's node information is used to update the corresponding node list.The specific steps are as follows:
Record the IP, block height and other information of the sending node.
• If Sender B already exists in the node list, update the node list information.
• If node B is not in the node list, add node B information to the node list.
• Broadcast this node information to other nodes.
• The node list is the node
The node list is the node information recorded by the current node, mainly used to view node information, judge whether the communication method between nodes is direct sending or forwarding and exercising routing functions, and the node information includes Base58 address, IP, name, identification, etc. Nodes will save information about all connected nodes.
Network Function Module
TCP registration steps
• The sending node sends a registration request to other registered node. If two nodes are not connected, they will establish a connection first. If the connection fails, the registration request will be resent.
• The registered node processes the registration request and returns specific node information.
• The sending node processes the registration response from the registered node and records the corresponding node information.
That's all for part two, stay tuned for part three
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
https://www.tfsc.io/
- Transformers Chain Network Explained (1)
Transformers chain adopts a fully connected decentralized and distributed P2P network structure. Transformers chain is connected to the blockchain network through P2P. In the blockchain network, all nodes are equal, acting as both clients and servers.
Network Structure
In transformers chain, all nodes are equal and possess all the characteristics of a node.
Archiving : Preserve the historical state of all blocks, with the world state corresponding to any block in history saved on the node.
Validation : Directly validate the validity of the transaction data locally.
Broadcast : Participate in the whole network broadcast of block information and transaction information.
Synchronization Node : After the new node joins the block, it will be discovered and connected to broadcast other nodes.
Heartbeat : Verify the robustness of the connection status of nodes in the network.
Interface : Open query interface to provide accurate basic current information.
How to identify and authenticate each node
Each verification node is marked with a unique ID through the node list to ensure the authenticity of the verification node in the network. By validating the node list data, the verification nodes meeting the conditions are gathered into the verification pool. A discrete random function is used for the random selection of block verification nodes to ensure the smoothness and fairness of node selection,thus avoiding the unfairness caused by continuous functions due to network speed and other reasons. The core purpose is to ensure the randomness and security of the verification nodes and block generation, thereby confirming the tolerance interval for malicious nodes. All nodes participating in the validation of block legality can get the corresponding reward.
Why Use Fully Connected & Quantity Limit
Transformers chain uses a fully connected approach in its design, which has the characteristics of high throughput, high reliability and low latency. To maintain these advantages, Transformers can maintain the best performance and security when the number of network nodes is kept between500-1000. According to its unique mechanism, the computational capacity of a single node in the network will be designed. If the high pressure causes the performance bottleneck of public network nodes, the network nodes that cannot participate in transactions will be temporarily unavailable. Due to the strong liquidity of the process in which nodes participate in the network, the availability of the transformers network layer is stable in the long term.
That's all for part one, stay tuned for part two
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
https://www.tfsc.io/
- TFSC Node Incentive Program
Dear TFSC community members, we are thrilled to announce the TFSC Node Incentive Program that will help you realize more benefits in the TFSC ecosystem. Whether it’s node upgrades, claim bonuses, or an early incentive program for going live on the mainnet, we’ve got you covered for a more vibrant TFSC community.
Now, let’s dive into all three parts of this exciting incentive!
1, Node Upgrade Incentive
We have built an incentive mechanism to upgrade nodes within 24 hours of each upgrade. The first 300 upgraded nodes will get 5TTOS node upgrade incentive each time! Join the TFSC network now, spots are limited!
2, Receive Bonus Node Incentive
From August 23rd to December 9th, nodes that have claimed Bonus on that day will receive a 5TTOS incentive for each collection.
From December 10th until the mainnet goes live, this incentive will be doubled to 10TTOS for each Bonus collection. This is an incentive for nodes to contribute, and we appreciate your contribution!
3, Early Incentive Program for 300 nodes after the main network goes online
After the mainnet goes live, the first 300 nodes that meet the stake conditions will have a chance to get early incentives. This part of the incentive program will be based on the node’s participation history and time. The proceeds of the delegated(10,000 TTOS) nodes will go to the nodes, while the proceeds of the delegated fund from the TFSC will be destroyed after a certain period of time.
FAQs:
1. Node information registration process
-Please click https://forms.gle/TbmFtpNPGUF2ir548 to fill in key node information, including node address and operator email address.
The email address is crucial for important upgrade notifications of the node program and incentive verification during the test network.
After the nodes are synchronized, please click https://forms.gle/pzCu6pQ3unk1MyZs8 to fill in the information of testing token claim, including address and email address.
2. Node Setup Documentation
-Please refer to https://www.tfsc.io/doc/learn/run-rpc-node to learn the operation requirements of the node, environment settings and related transaction processes.
3. Node Operation and Maintenance Communication Groups
-Welcome to join our Discord: https://discord.gg/transfomerschain
-
4. Node Stake, Delegate, and Collect Bonus Procedure
-Stake: According to the node construction document, when the node completes synchronization and receives 1001 TTOS assets, it can be pledged for 1000.
Delegation: It is carried out by the third party, only 1000TTOS is needed to complete the stake, and the third party will delegate according to the node status in the TFSC explorer.
Claim Bonus: After completing the stake of 1000TTOS and the second 24 hours of delegating 10000TTOS, you can claim the Node Bonus through the node building document.
5. Node Synchronization and Desynchronization
-Stake, delegation and trades can only be performed if they are synchronized.
Unsynchronization may be due to node performance not meeting TFSC network conditions or network instability.
6. Tools for checking node status
-Node Explorer: https://explorer.tfsc.io/#/pc/TopValidators
View node synchronization status, online status, workload, staked and delegated assets, etc.
7. Notes on node workload values
-The Workload value is dynamic and is provided by the TFSC Explorer with a target value: the Workload benchmark.
When the validator reaches this standard, it indicates that it is in good working condition and is eligible for a reward. An increase in transaction volume may cause the Workload value to change.
8. Who is eligible to run nodes
-Anyone who wants to join the TFSC network is welcome to do so!
Every node is an important part of the TFSC world. Join us and let’s build the Life Tree for the Web3 world!
Join us:
OS: https://www.tfsc.io/
X (Twitter): https://twitter.com/TFSCChain
Discord: https://discord.com/invite/transfomerschain
Telegram: https://t.me/transformerschain
- BTC breaks above $ 40k
Road to $ 100k🔥
- $RPK Reminder
To be eligible for your Community $RPK Rewards:
1. You will have to hold at least a bronze badge.
2. You will have to log into the #RepubliK App between Nov 27, 12pm to Nov 28, 12pm (UTC) - so we know you're still active!
*Your $RPK will be automatically credited to your in-app wallet within 24 hours.
- 😂
- Fate Zero Series ❤️