Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
about [2019/12/09 08:41] – boot2thrill | about [2019/12/14 06:22] – boot2thrill | ||
---|---|---|---|
Line 1: | Line 1: | ||
==== What is Conceal? ==== | ==== What is Conceal? ==== | ||
- | Conceal.Network is a decentralized blockchain bank, with deposits and investments paying interest | + | Conceal.Network is a decentralized blockchain bank, with deposits and investments paying interest, without |
- | Conceal.Network enables untraceable and anonymous messaging, and a secure way to transfer funds. Using a distributed public ledger, the sender and receiver are kept anonymous, a key concern in a post Snowden world. Hackers cannot trace money or messages when the messages | + | Conceal.Network enables untraceable and anonymous messaging, and a secure way to transfer funds. Using a distributed public ledger, the sender and receiver are kept anonymous, a key concern in a post Snowden world. Hackers cannot trace funds or messages when they are sent across public networks. |
- | Conceal Cryptocurrency | + | (₡CCX), the native coin of Conceal.Network, |
- | Conceal is accessible | + | Conceal.Network |
- | Conceal avoids many concerns, e.g. technological, | + | Conceal.Network |
- | + | ||
- | Conceal | + | |
- | + | ||
- | No one owns Conceal, everyone can take part. | + | |
- | + | ||
- | + | ||
- | This is the main source | + | |
=== Privacy Oriented Cryptocurrency === | === Privacy Oriented Cryptocurrency === | ||
Line 29: | Line 22: | ||
| Conceal uses ring signatures and one-time addresses for truly anonymous payments | Conceal' | | Conceal uses ring signatures and one-time addresses for truly anonymous payments | Conceal' | ||
| **Protected Proof Of Work** | **Adaptive Limits** | | | **Protected Proof Of Work** | **Adaptive Limits** | | ||
- | | PoW hash function is designed for egalitarian CPU & GPU mining and ASIC Resistance. | Conceal intelligently adjusts its parameters based on the historical data. | | + | | PoW hash function is designed for egalitarian CPU & GPU mining and ASIC resistance. | Conceal intelligently adjusts its parameters based on the historical data. | |
| **Fungible** | **Scalable** | | | **Fungible** | **Scalable** | | ||
| Conceal is truly fungible, thanks to built-in privacy features. Just like cash, all coins are equal, changeable. It is extremely unlikely that a coin will ever be blacklisted by any party due to its association in previous transactions. | Future scalability initiatives will include a modular sidechain. | | | Conceal is truly fungible, thanks to built-in privacy features. Just like cash, all coins are equal, changeable. It is extremely unlikely that a coin will ever be blacklisted by any party due to its association in previous transactions. | Future scalability initiatives will include a modular sidechain. | |