About AusCash
Australiacash is a free open source peer-to-peer electronic cash system that is completely decentralized, without the need for a central server or trusted parties. Users hold the crypto keys to their own money and transact directly with each other, with the help of a P2P network to check for double-spending.
Our goal is to share the technology of blockchain with the entire Australian community and supply an easy to use money system that everyone can contribute and get involved in.
- Completely Decentralized and Open Source Windows, MacOS and Linux Wallets Mobile Wallets
How It Works
Blockchain
The AustraliaCash blockchain is capable of high transaction speeds and short block generation times which help the network to support many transactions, large or small. Wallet encryption secures your wallet via password. The wallet. dat file can also be stored offline on a usb device. Wallet data is also stored within the blockchain using private keys and those keys is all that is needed to retrieve your funds from the blockchain.
- Open source code actively being developed Trustless peer to peer technology Secure and Decentralized
Cryptography
In World War II cryptography was used alot. It converted radio messages into code that nobody could read. To read it, you would need to convert back to the original message. To do that, you needed a key. It was possible through mathematical formulas! Australia Cash uses cryptography in the same way. Instead of converting radio messages, Australia Cash converts transaction data. Australia Cash does this using the blockchain.
- Cryptographic Technology Private Key Security
Proof of Work
A Proof-of-Work (PoW) system (or protocol, or function) is an economic measure to deter denial of service attacks and other service abuses such as spam on a network by requiring some work from the service requester, meaning processing time by a computer. AustraliaCash uses the Scrypt Algorithm to secure the blockchain. The algorithm was specifically designed to make it costly to perform large-scale custom hardware attacks by requiring large amounts of memory.
- Algorithm - Scrypt Calculated Block Adjustment
Brandon Sharp
Lorem ipsum dolor sit amet consectetur adipisicing elit. Nisi at consequatur unde molestiae quidem provident voluptatum deleniti quo iste error eos est praesentium distinctio cupiditate tempore suscipit inventore deserunt tenetur.
Connor Hodson
Lorem ipsum dolor sit amet consectetur adipisicing elit. Nisi at consequatur unde molestiae quidem provident voluptatum deleniti quo iste error eos est praesentium distinctio cupiditate tempore suscipit inventore deserunt tenetur.
Комментарии
Отправить комментарий