There is one notable security flaw in bitcoin and other blockchains: if more than half of the computers working as nodes to service the network tell a lie, the lie will become the truth. This is called a ‘51% attack’ and was highlighted by Satoshi Nakamoto when he launched bitcoin.
For this reason, bitcoin mining pools are monitored closely by the community, ensuring no one unknowingly gains such network influence. Security attacks will naturally occur if there is a delay in the transactions and the wise thing to do is to speed up transactions but that’s not an easy thing to do with current clogged platforms. Now comes RIFT Protocol.
Rift-Protocol is fundamentally based on the Command Chain Protocol (C2P). Even though these two technologies are not exclusively interconnected, the defensive system of the C2P still provides additional security for the utilization of the RIFT Protocol.
C2P is a certification-based defense mechanism implemented to thwart attackers on the platform. By employing this mechanism, no matter how a block is forged, the block becomes invalid due to its lack of certification. This certificate is impossible to replicate because it uses references from previous blocks as well as random data from the computers themselves.
The name Command Chain Protocol indicates a set of rules and policies carved into the source code which allow or block different types of activities. This helps prevent any blockchain corruption like the double-spending issue and prepares the chain for having safer and more stable smart contracts. Three different, unique layouts of nodes make the ILCoin network very secure.
The long-term strategic concepts of the ILCoin Development Team are based on the C2P which is a step in a development process that aims to provide users with the possibility to use one of the world’s most secure, most efficient blockchain systems.
Security ensured with RIFT-protocol
An attacker would encounter several challenges in an ILCoin platform. For one, if a majority of CPU power is controlled by honest nodes, the honest chain will grow the fastest and outpace any competing chains.
To modify a past block, an attacker would have to redo the Proof-of-Work of the block and all blocks after it, then catch up with and surpass the work of the honest nodes.
The probability of a slower attacker catching up diminishes exponentially as subsequent blocks are added. To compensate for increasing hardware speed and varying interest in running nodes over time, the Proof-of-Work difficulty is determined by a moving average targeting an average number of blocks per hour. If they’re generated too fast, the difficulty increases.
Problem of fan-out solved
It should be noted that fan-out (where a transaction depends on several transactions and those transactions depend on many more) is not a problem here. There is no need to extract a complete stand-alone copy of a transaction’s history.
Nodes always consider the longest chain to be the correct one and will keep working on extending it. If two nodes broadcast different versions of the next block simultaneously, some nodes may receive one or the other first. In that case, they work on the first one they received, but save the other branch in case it becomes longer.
New transaction broadcasts do not necessarily need to reach all nodes. As long as they reach many nodes, they will get into a block before long. Block broadcasts are also tolerant of dropped messages. If a node does not receive a block, it will request it when it receives the next block and realizes it missed one.
Beauty of the RIFT Architecture
The RIFT Protocol will have blocks synchronizing even if there are other blocks that are still being synchronized. The Blocks and Mini-Blocks sync asynchronously. Even if a Block is syncing, the transactions will already be confirmed.
However, the transactions will take some time to update and arrive at nodes other than the Master RIFT nodes. This time-lapse is no different than the Bitcoin network as there is also a delay for many of the nodes to have the updated blockchain information.
One important thing to mention: one mined block will have an enormous capacity for large amounts of data. They have thoroughly tested the technology and have a stable block size of 1.5 GB with RIFT Protocol.
TheBitcoinNews.com – Bitcoin News source since 2012
Virtual currency is not legal tender, is not backed by the government, and accounts and value balances are not subject to consumer protections. TheBitcoinNews.com holds several Cryptocurrencies, and this information does NOT constitute investment advice or an offer to invest.
Everything on this website can be seen as Advertisment and most comes from Press Releases, TheBitcoinNews.com is is not responsible for any of the content of or from external sites and feeds. Sponsored or guest posts, articles and PRs are NOT always flagged as this. Expert opinions and Price predictions are not supported by us and comes up from 3th part websites.
Advertise with us : Advertise