1 / 1

How to measure the security of JaxNet ecosystem

Jax.Network. Discover how reducing the likelihood of the blockchain getting compromised by a single shard attack or a 51% attack is made possible on Jax.Network.<br><br>A Scalable, Decentralized Stablecoin for DeFi. Join the Jax.Network.

JAXNetwork
Download Presentation

How to measure the security of JaxNet ecosystem

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How secure is Jax.Network against cyber attacks? In preparation against cyber attacks, Jax.Network developers followed two ways to measure the security of the blockchain: as a percentage of the blockchain hashrate and using factors that limit the 51% attacks. The most common method is by measuring the security as a percentage of the blockchain hashrate. To further prevent malicious cyberattacks, Jax.Network implemented sharding and merged mining techniques. • • The Jax.Network security solution Sharding 1. • Jax.Network uses sharding to improve the scalability of the network. A shard is essentially a horizontal data partition that contains a subset of the total data set to serve a portion of the overall workload. The idea is to distribute workload or data that cannot ft into a single node onto a cluster of database nodes. These nodes participate in unlimited transactions simultaneously, as long as they have sufcient storage and hashrate to manage the trades. The peer-to-peer permission system of Jax.Network allows the system to remain completely decentralized. • • Merged Mining 2. • The system can protect all shards from takeover threats through merged mining and the development of a proprietary merged mining tree. Furthermore, by leveraging the hashing power of Bitcoin to which it is anchored, the possibility of 51% attacks is potentially reduced. The merged mining process on Jax.Network does not lead to centralization because it leverages a unique Merkle tree. When used, the Merkle tree optimizes the efciency of encoding the data in the blocks. • • 3. Security risk assessment Jax.Network maintains high security by allocating a high-security budget; this does not imply the system is less secure. The security on Jax.Network is determined by the equation: security factor = (security budget/capitalization) If you denominate the cost of an attack as a percentage of the hashrate, you will discover that Jax.Network has a higher level of security than other blockchains. • • • Conclusion Jax.Network ofers a higher level of security than other blockchains because it leverages a higher security budget. It also optimizes its scalability and decentralization while not compromising security. In the end, the security of Jax.Network is at least as strong as the security of other blockchain networks with similar or higher hashrates. Are you ready to join the Jax.Network? Join Now jax.network

More Related