Conceal Wiki

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
about [2019/12/09 15:47] boot2thrillabout [2019/12/14 11:22] boot2thrill
Line 22: Line 22:
 | Conceal uses ring signatures and one-time addresses for truly anonymous payments | Conceal's transactions can't be linked between the sender and the recipient. | | Conceal uses ring signatures and one-time addresses for truly anonymous payments | Conceal's transactions can't be linked between the sender and the recipient. |
 | **Protected Proof Of Work** | **Adaptive Limits** | | **Protected Proof Of Work** | **Adaptive Limits** |
-| PoW hash function is designed for egalitarian CPU & GPU mining and ASIC Resistance. | Conceal intelligently adjusts its parameters based on the historical data. |+| PoW hash function is designed for egalitarian CPU & GPU mining and ASIC resistance. | Conceal intelligently adjusts its parameters based on the historical data. |
 | **Fungible** | **Scalable** | | **Fungible** | **Scalable** |
 | Conceal is truly fungible, thanks to built-in privacy features. Just like cash, all coins are equal, changeable. It is extremely unlikely that a coin will ever be blacklisted by any party due to its association in previous transactions. | Future scalability initiatives will include a modular sidechain. | | Conceal is truly fungible, thanks to built-in privacy features. Just like cash, all coins are equal, changeable. It is extremely unlikely that a coin will ever be blacklisted by any party due to its association in previous transactions. | Future scalability initiatives will include a modular sidechain. |