Security Token Offering seems to be the next hype to utilize BlockChain concepts and transform the current security instruments (Equity, Debt, Derivatives etc) into digitized security. STOs have gained popularity and momentum in recent times due to lack of regulations in the ICO world with a lot of outliers for most of the ICOs in […]
When ERC-20 Standards came into existence, it eased down the ICO token interoperability across wallets & crypto exchanges for all ERC-20 compliant tokens. Having standards for any process not only helps to have bigger acceptance but also improves interoperability to build up an ecosystem. Being a technology obsessed firm, we’ve always encouraged standards to be […]
The original promise of blockchain technology was security. However they might not be as invulnerable as initially thought. Smart contracts, the protocols which govern blockchain transactions, have yielded under targeted attacks in the past. The intricacies of these protocols lets programmers implement anything that the core system allows, which includes inserting loops in the […]
We’ve come a long way since the Dutch issued the first initial public offerings (IPOs) in the seventeenth century. With the advent of crypto-currency, companies and corporations have new channels to access capital from markets and investors. Crowd-funding, for instance, is now a viable option for companies seeking capital across sectors. Crypto-currency in itself has […]
In blockchain technology, cryptography is primarily used for two purposes: To secure the identity of the sender for any transactions. To ensure the past/historical records cannot be tampered with. Blockchain technology widely uses cryptography as a means of protecting the identities of users, ensuring transactions are done safely and securing all information and storages of value. This […]
What is Cryptography? In simple layman’s term Cryptography is an art of secret writing. It is necessary when communication in over untrusted network Major functions of cryptography can be classified in following Privacy & confidentiality: To ensure that no one can read or access the message except for the intended receiver Authentication: The process of […]
What is Merkle Tree? Merkle Tree is also called as a Binary Hash tree, a type of data structure used for the large set of data. Merkle tree is used where the data required being efficiently summarized and verification of data integrity. It provides critical features necessary for Blockchain Network. Compress large data set, it removes […]
BFT as the name suggest stands for “Byzantine fault tolerance”. It is a popular protocol in distributed computing. It has been a very popular model for consensus algorithm where it aims to reduce the scalability issues