Bitcoin Forum
November 03, 2024, 07:01:19 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 4 »  All
  Print  
Author Topic: AELF BLOCKCHAIN ($ELF) | Aelf Will Launch Mainnet on 10th  (Read 950 times)
aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 14, 2020, 02:42:02 PM
 #21

BinanceTurns3 Panel Discussion Part 1:

Our COO Zhuling Chen shared his idea about blockchain adoption and how aelf made it in Binance's panel discussion. Check out the highlights:








aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 15, 2020, 10:25:49 AM
 #22

BinanceTurns3 Panel Discussion Part 2:

Our COO Zhuling Chen shared his idea about blockchain adoption and how aelf made it in Binance's panel discussion. Check out the highlights:








aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 15, 2020, 06:16:00 PM
 #23

➡️ aelf Enterprise Weekly #Update!

We would like to let you guys know that we've been working hard to give developers a better user experience.

aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 16, 2020, 10:16:38 AM
 #24

➡️ aelf Mainnet's R&D Team Weekly #Update!

Our goal: Making the infrastructure of the aelf network easier to use.

Click the picture below and check out the updates ⬇️

aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 16, 2020, 10:25:18 AM
 #25

aelf’s Hacker Bounty Phase 2 Kicks Off



On May 29th, aelf launched phase 1 of the Hacker Bounty with a reward of 88,888 ELF based on the Cross-Chain Transfer Protocol (CCTP). Phase 1 concluded on June 5th, with no successful attempts at hacking the CCTP, leaving the bounty unclaimed.

Phase 2 of the Hacker Bounty will go live on July 16th. The bounty for phase 2 has been increased to 1,000,000 ELF. The program is co-hosted by aelf and CertiK, a blockchain security company. The co-organizers are DVP, a decentralized vulnerability platform, and SlowMist Technology, a blockchain security company. PeckShield, another blockchain security company, will be the vulnerability assessment partner. The event will be covered by dozens of leading media outlets around the world and is expected to draw white hat hackers and cyber-security enthusiasts from all over the world.

During the program, users who retweet the event will also have the opportunity to share out 8,888 ELF and win 52 ELF every day. Hackers participating in the program are required to find vulnerabilities in the underlying technology based on the logic implementation method of ELF token locking and swap. Sign up now and take on the challenge!
The aelf Foundation is hosting this program to show how secure aelf’s lock-in contract and Cross-Chain Transfer Protocol (CCTP) are while also enabling users to have a better understanding of the CCTP, which was launched in May 2020. The event will be posted as a Bounty Program on the aelf DAO to ensure transparency throughout. The draft of the program has been discussed in the saelf governed Telegram community and the bounty was set at 1 million ELF by the community members.

Date
July 16th 2020 20:00 — August 5th 2020 12:00 (GMT +8)

Rules
- Participants can sign up as individuals or teams — there’s no limit on the team size.
- The Bounty Program is about finding vulnerabilities in the Cross-Chain Transfer Protocol (CCTP), so those on the Ethereum Network or aelf will not count.
- At 12:00 pm (GMT +8) on July 16th, the aelf Foundation will lock 1 million ELF in the lock-in contract.
- At 12:00 pm (GMT +8) on July 27th, a Merkle tree will be generated.
- At 12:00 pm (GMT +8) on August 5th, 1 million ELF test tokens will be swapped to the aelf testnet via the Cross-Chain Transfer Protocol (CCTP).
- Participants who are able to hack the CCTP and swap the ELF test tokens to their own account addresses during the event will be rewarded with the equivalent amount of ERC20 ELF tokens.
- The aelf Foundation will retrieve the bounty if no hackers managed to breach aelf’s CCTP by the end of the event.

Lock-in Contract Information
Ethereum Mainnet:
- Ethereum mainnet lock-in contract address: 0x91517330816d4727edc7c3f5ae4cc5bef02ec70f
- Merkle Tree generation contract address: 0x76562bD67452359b68fACbfa2d0cc9c1999F566C
aelf Testnet:
- Side-chain token mapping contract address: RXcxgSXuagn8RrvhQAV81Z652EEYSwR6JLnqHYJ5UVpEptW8Y
- Contract Explorer: https://explorer-test-side01.aelf.io/contract?#https%3A%2F%2Fexplorer-test-side01.aelf.io%2Fviewer%2Faddress.html%23%2Fcontract%2FRXcxgSXuagn8RrvhQAV81Z652EEYSwR6JLnqHYJ5UVpEptW8Y (https://explorer-test-side01.aelf.io/contract?#https%3A%2F%2Fexplorer-test-side01.aelf.io%2Fviewer%2Faddress.html%23%2Fcontract%2FRXcxgSXuagn8RrvhQAV81Z652EEYSwR6JLnqHYJ5UVpEptW8Y)
- Contract code on GitHub:https://github.com/AElfProject/aelf-boilerplate/tree/token-swap/chain/contract/AElf.Contracts.TokenSwapContract (https://github.com/AElfProject/aelf-boilerplate/tree/token-swap/chain/contract/AElf.Contracts.TokenSwapContract)

How to Collect the Bounty
- For Chinese users: contact DaYuTongXue (WeChat ID: a439714) on WeChat
- For English users: contact Itsu Ace (@Itsu_Ace) on Telegram

Hacking Proof
Participants need to show their hacking proof to the aelf team after they have hacked the Cross-Chain Transfer Protocol (CCTP).
The following information needs to be provided as the hacking proof:
- Code for the hacking process
- A document which explains the hacking process
- Self-introduction
- ELF wallet address

Retweet to Win ELF
- Simply retweet the event and you will have the opportunity to share out 8,888 ELF.
- If no one is able to hack the CCTP before the deadline (August 5th), then all the retweeters (keep the retweet until the end of the event) will share out the 8,888 ELF!

We’d like to invite white hats, technology enthusiasts, and master hackers to participate in the Hacker Bounty Program and we hope the program will give you an in-depth understanding of the Cross-Chain Transfer Protocol (CCTP). Any feedback or suggestions on how to improve the aelf ecosystem are also welcomed!




aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 20, 2020, 09:17:41 AM
 #26

#MondayMotivation

Guess what Zhuling is doing now?

💬Tip: He might be promoting aelf and blockchain with a big tech company.

aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 20, 2020, 01:27:05 PM
 #27

Aelf advocate Itsu Ace was invited by Alibaba Cloud to attend the Meeting for 'blockchain development'. 🎉

They discussed how to ensure blockchain nodes run stably and how to deal with attacks by the black industry to protect user interests.





aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 21, 2020, 01:28:39 PM
 #28

How did aelf Enterprise help businesses run more efficiently amid the COVID19 pandemic?

Click below 👇 index to start reading!

https://medium.com/predict/the-remote-economy-is-now-thriving-see-how-blockchain-is-leading-the-way-8d3186347741
aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 22, 2020, 06:53:44 AM
 #29

🔊Our COO Chen Zhuling gave a talk on "Emerging Applications of Blockchain and Crypto" at #Binance 'Off the Charts' Live Panel!

If you didn't watch it live, watch it here! https://youtube.com/watch?v=AdlVPcKRGIQ
aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 22, 2020, 02:43:59 PM
 #30

aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 23, 2020, 12:40:42 PM
 #31

😄A Surprise for all #aelfers

▶️This is not even 1% of the it!

🔜Please Stay Tuned! #aelf & #Huawei
 
https://twitter.com/aelfblockchain/status/1286273571107479552
aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 28, 2020, 04:43:35 AM
Last edit: July 28, 2020, 04:57:19 AM by aelf blockchain
 #32

aelf will hold an AMA with Itsu Ace on Twitter

5 winners will be selected to share out the rewards!

⏰ 31 July, 5pm-6pm(GMT +8)

Tasks:

1️⃣ Watch the video https://youtu.be/2alA6mIAVHA
2️⃣ Like&Retweet https://twitter.com/aelfblockchain/status/1287935951730126855
3️⃣ Comment with your questions, tag @3 friends, include the hashtag #aelfHackerAMA

aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 28, 2020, 10:15:57 AM
 #33

Mark your calendar 📅 👉July 29!

📖Learn how BLOCKCHAIN fit into your business

Digitalization Journey with Huawei Cloud

Also find us at the https://rebrand.ly/partnerpage
aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 29, 2020, 07:13:27 AM
 #34

HUAWEI CLOUD ☁️ X #AELF

Premir on Cloud-Powered Blockchain Solutions available now! 🎬

Learn how blockchain fits into your business digitalization Journey.👣

More stories from here onwards! Let's go! 👫

https://www.youtube.com/watch?v=zQSWeXbiOqs&feature=youtu.be
aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
July 30, 2020, 10:14:03 AM
 #35

aelf Officially Partners up with DVP



The hacker bounty phase 2 was officially launched on July 16 with a bounty of up to 1,000,000 ELF. Now halfway through the competition, the bounty is still unclaimed.

The hacker bounty program is co-hosted by aelf and CertiK, a blockchain security company. The co-organizers are DVP, a decentralized vulnerability platform, and SlowMist Technology, a blockchain security company. PeckShield, another blockchain security company, is the vulnerability assessment partner. The event is covered by dozens of leading media outlets around the world.

Currently, security is the lifeblood of blockchain companies, whether it is Smart Contract Code Auditing, Node Hardening, or Penetration Testing. In particular, given the “tamper-proof” feature of smart contracts, the bugs that are inevitable in the codes are easily exploited by hackers. Since the blockchain network is decentralized, a single security vulnerability on a blockchain node may cause thousands of nodes to be attacked.

In recent years, there have been quite a few security incidents in the news, causing huge asset losses and extremely negative impact. These incidents concern all aspects of the blockchain industry, including exchanges, mining pools, wallets, smart contracts, etc. Among them, exchanges, investment wallets and other platforms which are close to users have become a focal point with frequent security incidents. It is obvious that the vulnerabilities are undermining the safety of hundreds of millions of digital assets, posing a daunting threat and challenge to the entire blockchain security ecosystem.

The decentralized vulnerability platform (DVP) was developed to solve this issue. Connecting blockchain companies, security companies and white hat hackers from all over the world, the platform aims to use blockchain technology to create anonymized security community scenarios and the consensus that decentralization and vulnerability are mining. Decentralization means that white hats and security engineers around the world can get involved in finding vulnerabilities, and this service is accessible to every blockchain company on the planet. Vulnerability mining represents an automated reward payment system for blockchain companies and white hats. Companies are required to specify the assets converge to be audited and the reward criteria, and stake the deposits into the contract. White hats can submit information about blockchain-related vulnerabilities and threats, and check the vulnerability review and claim progress at any time. They will be rewarded accordingly once their information are adopted.

aelf has officially entered into partnership with DVP. As the co-organizer of the aelf hacker bounty phase 2, DVP will continue to ensure aelf’s security and help it build a better blockchain ecosystem. This hacker bounty has also drawn the attention of many hackers, white hats, and security enthusiasts.

aelf invited hackers and white hats worldwide to participate in the bounty program is to verify the security of the Cross-Chain Transfer Protocol (CCTP) and lock-in contracts, thus ensuring the security of users’ information and assets, and enhancing vulnerability early warning and emergency response mechanisms. At the same time, the program helps users fully understand the mechanism of cross-chain transfer and helps us receive feedback from the community, so that we can continue to optimize the underlying technology, and build a more secure blockchain network ecosystem.

On July 27, aelf has generated the Merkle Tree according to the Merkle Proof process. Now users can obtain the required data on Merkle Proof and enable the swapping function after recording the Merkle tree root data (the root hash value of the Merkle tree) on the aelf network, the swapping feature can be start. At present, there is nearly a week before the end of hacker bounty program. Do not miss it, hackers!
aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
August 05, 2020, 10:13:29 AM
 #36

Hacker Bounty AMA Recap



Last Friday ( July 31, 2020), aelf hosted an AMA about hacker bounty and CCTP on Twitter, featuring aelf’s dev advocate, Ace. Below is a transcript of the questions and answers.

Q1: Why aelf Committed to Establishing a Unified Cross-Chain Protocol? And what does it take for increased use-cases and value of your Cross-Chain protocol?
Ace: The protocol is a standard for various user cases, business and scenarios, and with it, aelf can build the whole ecosystem based on the standard, mitigating the cost of designing different cross-chain methods in face of different type of scenarios. We will try to develop more and more popular and real-problem solving dapps on aelf blockchain, better develop many dapps of different type of scenarios.

Q2: What is the uniqueness and what is the purpose of the CCTP protocol, what problems does it solve and what is it applicable to?
Ace: It can support any kind of cross-chain asset transferring services whether the chains are mutually compatible or not. It can be used to transfer money value between different chains, transfer asset between these chains, and prove if an asset’s ownership exists. We can use it to any scenarios described above, for example some financial business

Q3: How does protocol achieves cross-chain transfers between independent blockchain systems?
Ace:: aelf use merkle proof to ensure the elf erc20 token is really locked and transfer equal value of elf token to the same user on aelf blockchain.

Q4: Whether the standard protocol of cross chain transfer of aelf has been attacked and destroyed in this hacker reward offering activity, and will it also be used in the main network mapping? I’m still looking forward to it.
Ace: Till now no one could ever do that, and the CCTP is absolute used for mainnet, otherwise all we have done would make no sense.

Q5: What is the main difference between aelf’s CCTP and other projects multi-chain protocol?
Ace: We use purely smart contracts to achieve this, all of these are on smart contract level. and in these contracts, we use index and merkle proof to relate contracts on two chains

Q6: What blockchains will CCTP first support?
Ace: As you see, we have supported the ETH, and any developer can use any other blockchain projects’s code to create more cross-chain functions with aelf.

Q7: Does team any partnerships or collaborations with other blockchains to use CCTP?
Ace: We don’t need such cooperation. CCTP, as a open-source protocol,is implemented by smart contracts, if another blockchain projects support smart contracts, they are all in CCTP’s territory.

Q8: BTC Relay belongs to the early side chain technology. Link the ETH network to the BTC network to enable users to verify BTC transactions on the ETH. When will ELF be able to conduct ETH and BTC network cross-chain transactions?
Ace: We will do this in nearly future.

Q9: Polkadot USES relay-chain technology, but at present it is mainly ETH. How is THE CCTP of aelf different from it?
Ace: We don’t need any relay-chain, we use smart contract to do cross-chain transferring.

Q10: What are the advantages?
Ace: We have own parallel execution mechanism, so we don’t need some parachain. Then we don’t need additional middle-layer chain. And we can do cross-chain with any other blockchain not only ETH.

Q11: When will a true AELF network cross chain be achieved without the ETH network?
Ace: We will always communicate with ETH to make data in both chains flowing between each other, we are not dependent on Ether. So at the very beginning aelf can operate normally without other chain’s aid.

Q12: Other public chain projects also have cross chain technology. What are the advantages of aelf wide face transfer standard protocol?
Ace: There are lots of projects using a middle man, which is centralized or partially centralized, but aelf cross-chain designation don’t rely on any middle-man of this type, we just need to build smart contracts on both chains and can easily achieve that, phew!

Q13: What applications will aelf cross chain technology have in the future?
Ace: Any application concerning about trust and decentralized need, because aelf is a fundamental platform and infrastructure.

Q14: Can you only transfer assets across chains?
Ace: We can transfer assets both cross-chain and in our own chain.

Q15: When will the Demo of aelf cross-chain asset trading be landed and announced to the community?
Ace: We are still planning and will broadcast the release date in the future.

Q16: Have you currently formed alliances with other projects to start implementing the CCTP protocol? If yes, in which projects is this protocol currently being used?
A16: We don’t need such cooperation. CCTP, as a open-source protocol, is implemented by smart contracts, if another blockchain projects support smart contracts, they are all in CCTP’s territory.

Q17: How will you handle the waiting times for confirmation of each transfer, is it possible that with the cross chain it will be faster or on the contrary it will be slower but safer?
Ace: That is partially related to the confirmation duration on other blockchain interoperate with aelf, say, Ether, if Ether do not accelerate its confirmation time, we could not be much faster although we optimize the speed of this on aelf blockchain, but of course, it is much safer.

Q18: Will the cross-chain you want to work with allow for effective cross-platform transactions or is there a risk that user assets will be lost?
Ace: As long as the counterpart chain support smart contract, especially token contract, the CCTP is really effective and extremely secure once the ownership is relayed on aelf chain.

Q19: Is any more powerful security system better then CCTP in the present blockchain system?
Ace: Our focus and understanding are different. We are exploring for this industry, and our technology is already the top of the industry.

Q20: What is the difference between CCTP and PoW or PoS? Why is the CCTP protocol so much more secure?
Ace: They have no correlation with each other, the CCTP are in essence smart contracts working together, and PoS and PoW are economically incentivising consensus to keep the whole distribution system behave the same.
aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
August 05, 2020, 09:03:07 PM
 #37

One Year after the Public Chain Takeoff, the New Era of Blockchain 3.0 has Arrived



Everyone said that 2019 is the year public blockchains took off, and 2020 will be the first year blockchain began to achieve business adoption. Although the coronavirus pandemic continues to wreak havoc on all walks of life worldwide, the blockchain industry is making great strides forward.

In just a few years, the blockchain sector has developed from 1.0 to 3.0, and each upgrade has brought about some changes in the world. As we all know, blockchain 1.0 generally refers to cryptocurrency centered around Bitcoin. Blockchain 2.0 is public chains represented by Ethereum, which can develop smart contracts. In the era of blockchain 3.0, people think that thousands of blockchains can coexist and interoperate.

In the past two years, people have had high expectations of many public chains. However, some of the so-called “blockchain 3.0” projects have either shown slow progress or failed to live up to the expectations after their mainnet went live. People then began to expect to see a killer DApp achieving wide adoption of blockchain. At the same time, as the underlying technology for blockchain connectivity, multi-chain structure and cross-chain technology have become an important part of ‘blockchain 3.0’.

aelf and other Web 3.0 projects can be seen as the underlying technology providers for the Internet of Value. On the aelf blockchain, whether it is valuable information or digital currency, everything can be connected and shared, which is where the magic of cross-chain technology lies.

If the consensus mechanism is the core competitiveness of blockchain, then the cross-chain technology is the key to realizing the Internet of Value for blockchain, particularly for alliance chains and private chains. It is the key to preventing different blockchains from being isolated islands and serves as a bridge connecting blockchain and the outside world.

Cross-chain technology is designed to prevent blockchain from being isolated islands of data

At present, although these public chain projects have seen their performance improved, none of them is able to build the much-anticipated “underlying blockchain highway’ singlehandedly. In particular, driven by the prevailing view that each public chain should be an independent ecosystem, public chains today have become isolated islands of data with different architectures incompatible systems, which poses real difficulty to DApp developers.

The cross-chain technology, as the name suggests, is aimed to realize asset circulation, information exchange and application collaboration between different blockchain platforms. It can be likened to a bridge linking different public chains, which can help realize data transmission between different blockchain networks and greatly reduce transmission costs.

It is obvious that the demand for cross-chain technology is very urgent in today’s blockchain world.

Cross-chain communication can be divided into homogeneous and heterogeneous cross-chain according to different underlying blockchain technology platforms. Cross-chain interaction between homogeneous chains is simple, since their security mechanisms, consensus algorithms, network topology, block generation verification logic are consistent. Cross-chain interaction between heterogeneous chains is quite different. For example, Bitcoin uses PoW algorithm while the alliance chain Fabric uses traditional deterministic consensus algorithm, and its block form and deterministic guarantee mechanism are very different. Since designing a direct cross-chain communication mechanism is not easy, cross-chain interaction between heterogeneous chains generally requires third-party services.


aelf is doubling down on heterogeneous cross-chain research


At present, cross-chain technology mainly includes notary schemes, hash-locking, side chains or relays, and distributed private key control. aelf uses the side chain or relay scheme.
aelf’s cross-chain logic is ‘main chain + side chain’, with an emphasis on ‘one chain, one scenario’, where each side chain can be a scenario, such as a DApp, or a DeFi app. aelf’s cross-chain architecture is centered around the main chain.

In the cross-chain process, aelf achieves intercommunication between different chains via indexing. An index is the transfer of data from one chain to another in a defined structure. The cross-chain index has two steps: parent chain indexing child chain and child chain indexing parent chain.



* The parent chain requests data from the child-chain and the data are then sent from the child chain to the parent chain.
* The parent chain processes all the child chain’s index data, generating a Merkle tree, and stores it on the chain. The child chain block has been indexed by the parent chain, and must wait for the data to be confirmed by the network.

The above steps include the whole process of the parent chain indexing the child chain’s block and the child chain re-indexing the parent chain’s block. It’s worth noting that only irreversible blocks can be indexed by other chains.



As a result, aelf does not need a Hub or a relay chain and is more of a decentralized cross-chain model. This is because communication between different chains does not necessarily require the permission of the aelf’s only main chain each time. The multi-layer child chains under the side chain can also communicate with each other with the index of the upper-layer parent chain and without the main chain getting involved.

On the premise of decentralization, aelf established that only confirmed blocks can be indexed, because only irreversible data can be trusted to ensure the network’s security. aelf also has its own solution for communicating with the Ethereum ecosystem, which can be interfaced with the Ethereum and other blockchain systems via adapters, making it compatible with existing mainstream ecosystems.

It can be seen that aelf has done a great job in homogeneous cross-chain technology, whereas some public chain projects have yet to pull it off. aelf has also begun to develop heterogeneous cross-chain technology, which will allow external chains such as Bitcoin and Ethereum to lock tokens into smart contracts and generate ccorresponding tokens on the aelf chain through contracts to achieve cross-chain communication. It is clear that aelf has taken the lead in cross-chain development.

While it’s still too early to talk about blockchain 3.0 and most projects are still trying to figure out where the underlying technologies are heading, solving the scalability issue public chains are facing today through the cross-chain technology has become the general trend. Cross-chain technology can realize communication between different chains, greatly improve blockchain’s ability to transfer value, and promote the development of IoT and cloud computing. On the other hand, without cross-chain technology, all kinds of blockchain platforms information will just be isolated islands of data, putting a significant limit on the applications of blockchain platforms.

We believe that the cross-chain mechanisms will greatly increase the value of blockchain and usher in a new era of blockchain development. With strong technical prowess and the ability to achieve commercial application, aelf will continue to explore the cross chain technology and provide strong technical support for the rapid and steady development of the industry!
aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
August 06, 2020, 11:17:32 AM
 #38

aelf is proud to play a leading role in the review of IEEEorg 's Digital Asset Identification standards for blockchain, with our CEO Haobo Ma being Chair of the DAIWG (Digital Asset Identification Working Group).



aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
August 06, 2020, 10:08:01 PM
 #39

aelf Hacker Bounty phase 2 has concluded and no one was able to hack CCTP! The security of the CCTP (Cross-Chain Transfer Protocol) has been proven impenetrable. 💪💪





aelf blockchain (OP)
Jr. Member
*
Offline Offline

Activity: 159
Merit: 1


View Profile
August 07, 2020, 09:03:08 AM
 #40

What is the CCTP?

CCTP is Cross-Chain Transfer Protocol.

☑️Solve cross-chain issues, such as usability, scalability & security.
☑️Realize cross-chain transfer between incompatible & independent blockchain systems.
☑️Support asset transfer between different blockchain systems.

Pages: « 1 [2] 3 4 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!