Author

Topic: [ANN][ICO]CREDITS - New Blockchain for financial industry [HARDCAP REACHED!] - page 193. (Read 37729 times)

full member
Activity: 392
Merit: 100
Will it be possible to pay a commission with tokens when exchanging different currencies?
member
Activity: 294
Merit: 10
How many recent operations will be stored in the CREDITS’s system storage?
member
Activity: 392
Merit: 10
How did you solve the problem of duplication of transactions in one block?
full member
Activity: 378
Merit: 101
Will CREDTIS platform always have a relevant registry of transactions related to all the trust hosts for the current validator host?
Yes. The developers managed to achieve this due to conducting permanent synchronization of all the new transactions in the registries of all the hosts.
Won’t it reduce the speed of proceeding information?
No, it won’t, because there’ll be a special port for synchronization on the system
What will be the priority in allocation of loading of RAM and CPU?
member
Activity: 406
Merit: 31
Will CREDTIS platform always have a relevant registry of transactions related to all the trust hosts for the current validator host?
Yes. The developers managed to achieve this due to conducting permanent synchronization of all the new transactions in the registries of all the hosts.
Won’t it reduce the speed of proceeding information?
No, it won’t, because there’ll be a special port for synchronization on the system
full member
Activity: 378
Merit: 101
Will CREDTIS platform always have a relevant registry of transactions related to all the trust hosts for the current validator host?
Yes. The developers managed to achieve this due to conducting permanent synchronization of all the new transactions in the registries of all the hosts.
Won’t it reduce the speed of proceeding information?
member
Activity: 406
Merit: 31
Will CREDTIS platform always have a relevant registry of transactions related to all the trust hosts for the current validator host?
Yes. The developers managed to achieve this due to conducting permanent synchronization of all the new transactions in the registries of all the hosts.
full member
Activity: 378
Merit: 101
Will CREDTIS platform always have a relevant registry of transactions related to all the trust hosts for the current validator host?
full member
Activity: 252
Merit: 100
Good afternoon. Will all the activities carried out on the platform be linked to time stamps and user’s login?
full member
Activity: 280
Merit: 100
What will the code used on the CREDITS platform for data encryption include? 

newbie
Activity: 10
Merit: 0
Is data transferred via the channel being encrypted or not? Does anybody have access to them?
Yes, data will be transferred being encrypted that’s why nobody will have access to it.
Don’t you know which encryption algorithm will be used in CREDITS?

Encrypt - homomorfic (you can read about it on our tech paper)
member
Activity: 574
Merit: 12
What connection will be provided for each connection between hosts?
Each channel of communication between the main network node and the common node of the
CREDITS network is a separate thread (multithreading), within which data is sent in encrypted form
when the transaction is executed
member
Activity: 574
Merit: 12
Is data transferred via the channel being encrypted or not? Does anybody have access to them?
Yes, data will be transferred being encrypted that’s why nobody will have access to it.
Don’t you know which encryption algorithm will be used in CREDITS?
Each channel of communication between the main network node and the common node of the
CREDITS network is a separate thread (multithreading), within which data is sent in encrypted form
when the transaction is executed.
To ensure network security, all data between the validator nodes is transmitted in an encrypted
form, and each connection between nodes is low-level based on the network library. If the data transfer
occurs with an error, the thread should be automatically interrupted, the corresponding entry is placed
for writing to the logging system, and then to the log file. Data is transmitted through typified variables.
Transmitted data are encrypted using the symmetric RC4 algorithm. Since this algorithm works under a
common secret key, this key is transferred when a connection is created between nodes and is
transmitted in an encrypted form in accordance with the Diffie-Hellman algorithm.
The RC4 algorithm, like any stream cipher, is built on the basis of a pseudo-random bit
generator. The key is written to the generator input, and pseudo-random bits are read at the output. The
key length can be from 40 to 2048 bits. Generated bits have a uniform distribution.
The Diffie-Hellman algorithm allows two parties to receive a common secret key using a
channel unprotected from listening through but protected from communication channel change. The
received key can be used to exchange messages using symmetric encryption. The algorithm is based on
the complexity of computing discrete logarithms. In it, as in many other algorithms with a public key,
the calculations are performed modulo to a certain large prime number P.
First, a certain natural number A, smaller than P, is selected in a special way. If we want to
encrypt value X, then we calculate
Y = AX mod P.
And it is easy to calculate Y having X. The inverse problem of calculating X from Y is rather
complicated. Exponent X is exactly called the discrete logarithm Y. Thus, knowing the complexity of
calculating the discrete logarithm, the number Y can be publicly transmitted on any communication
channel, since with a large modulus P the initial value X will be almost impossible to pick. The
Diffie-Hellman algorithm to generate a key is based on this mathematical fact.
Any actions in the system are tied to the timestamp, the number of the previous block, the user’s
login, and the smart contract ID. This allows finding duplicates when executing. If a duplicate is found,
then we take the first transaction from the pool, the rest are considered illegitimate.
member
Activity: 574
Merit: 12
Hello. Tell me please, what is considered as a time unit in service’s operation?
As far as I know, developers consider a cycle of searching for the main and trust hosts as a time unit
How long does one cycle last? Or isn’t this a fixed value?
It names "round" and it's not a fixed
full member
Activity: 280
Merit: 100
What connection will be provided for each connection between hosts?
member
Activity: 238
Merit: 10
What channel of communication will be used to connect the main and a regular host?
full member
Activity: 364
Merit: 100
Is data transferred via the channel being encrypted or not? Does anybody have access to them?
Yes, data will be transferred being encrypted that’s why nobody will have access to it.
Don’t you know which encryption algorithm will be used in CREDITS?
full member
Activity: 252
Merit: 100
Is data transferred via the channel being encrypted or not? Does anybody have access to them?
Yes, data will be transferred being encrypted that’s why nobody will have access to it.
full member
Activity: 364
Merit: 100
Is data transferred via the channel being encrypted or not? Does anybody have access to them?
member
Activity: 238
Merit: 10
Hi everybody. What structure will peer network of CREDITS have?
Jump to: