4/10/2023 0 Comments Turning on windows defenderThe security circles (See Pi FAQ: What are security circles?) from Pi mobile miners aggregate into a global trust graph that enables Pi Nodes to form quorum slices to determine who can and cannot validate transactions on the shared ledger. ![]() In SCP, nodes form trusted groups (quorum slices) and only agree to transactions that those trusted nodes agree to. Unlike nodes that use proof of work such as Bitcoin or Ethereum, Pi Node uses a different consensus algorithm based on the Stellar Consensus Protocol (SCP). Similar to other blockchains, Pi Nodes will be responsible for validating transactions on a distributed ledger and resolving the challenges in maintaining a distributed currency by having all nodes come to a “consensus” on the order of new transactions that are being recorded. Nodes are the fourth role in the Pi ecosystem and run on laptops and desktops instead of mobile phones.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |