Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
about [2019/12/09 15:47] – boot2thrill | about [2019/12/14 11:22] – boot2thrill | ||
---|---|---|---|
Line 22: | Line 22: | ||
| Conceal uses ring signatures and one-time addresses for truly anonymous payments | Conceal' | | Conceal uses ring signatures and one-time addresses for truly anonymous payments | Conceal' | ||
| **Protected Proof Of Work** | **Adaptive Limits** | | | **Protected Proof Of Work** | **Adaptive Limits** | | ||
- | | PoW hash function is designed for egalitarian CPU & GPU mining and ASIC Resistance. | Conceal intelligently adjusts its parameters based on the historical data. | | + | | PoW hash function is designed for egalitarian CPU & GPU mining and ASIC resistance. | Conceal intelligently adjusts its parameters based on the historical data. | |
| **Fungible** | **Scalable** | | | **Fungible** | **Scalable** | | ||
| Conceal is truly fungible, thanks to built-in privacy features. Just like cash, all coins are equal, changeable. It is extremely unlikely that a coin will ever be blacklisted by any party due to its association in previous transactions. | Future scalability initiatives will include a modular sidechain. | | | Conceal is truly fungible, thanks to built-in privacy features. Just like cash, all coins are equal, changeable. It is extremely unlikely that a coin will ever be blacklisted by any party due to its association in previous transactions. | Future scalability initiatives will include a modular sidechain. | |