Categories
Cryptocurrencies

Introducing Fantom Coin 

Blockchain has facilitated a new era of finance that eliminates centralized entities from the equation. Now, peer-to-peer and highly secure (thanks to cryptographic encryption) transactions are possible. As is a more inclusive global financial system. 

The problem, however, is that the current blockchain faces issues such as slow confirmation time and lack of scalability. These two factors render blockchain – with all its merits, unfit to compete with traditional financial systems or for deployment in industries. 

To address these issues, Fantom, a third-generation blockchain employs a Directed Acyclic Graph (DAG) model. It distinguishes itself from existing DAG protocols by deploying its innovative ‘Lachesis Protocol’ to achieve consensus. This protocol will be integrated into Fantom’s OPERA chain which supports real-time and low-cost transactions. 

In this article, we’ll explore Fantom’s offerings as well as its native token, FTM.

Breaking Down Fantom

Fantom wants to deploy DAG technology to create a transactions’ infrastructure that’s scalable, reliable, and supports instant transactions. It intends to finally be applied on a large scale across many industries such as telecommunications, supply chain, public utilities, smart homes, and so on. The Fantom system will also support smart contracts and the creation of decentralized applications (DApps).

In Fantom’s words, “the mission of Fantom is to provide compatibility between all transaction bodies around the world, and to create an ecosystem with real-time data sharing and low costs.” 

How the Fantom system works. 

#1. A 3-blockchain System

The Fantom blockchain consists of 3 blockchains: the Node Service (NS) blockchain, the OPERA chain, and the Mainchain (MC) blockchain. The NS blockchain is in charge of handling node identifiers. OPERA Chain is the distributed chain comprising transaction blocks. OPERA Chain uses Fantom’s new Lachesis protocol, which is far more scalable and faster than both Classical and Nakamoto consensus. The Main Chain stores validated blocks and hence the transaction history.

#2. Elliptic Curve Encryption 

Fantom wants to achieve the highest level of security by utilizing elliptic curve cryptosystem (ECC) tech. ECC ensures a high level of security with a relatively short key. Thanks to its shorter size, ECC is way faster and consumes less computing power than earlier models. Also, ECC is easier to implement. Fantom intends to utilize ECC in both online-based and offline-based wallets for the best security. 

Proof of Stake

Fantom will implement a Proof of Stake consensus algorithm in which users with at least 3, 175, 000 FTM tokens can participate in. Users that run a node and secure the network will be known as “validator nodes” and will be rewarded in either of two ways: 

  • Block rewards: In the first four years, validators will earn block rewards based on how many transaction blocks they process
  • Transaction fees: For every processed block, the validator nodes responsible will receive a fraction of the transaction fee inherent to that block

There are other factors that will determine how much block rewards a validator earns. These factors make up the Proof of Importance of score and include the following:

  • Validation Performance: Block finality is achieved when a transaction block is validated by at least 2/3 of validating nodes. A good validator will consistently contribute to this two-thirds of validating power. If not, their block rewards will be slashed and they will ultimately be removed from the network
  • Originating transactions: This involves accepting new transactions that are submitted to the network. An efficient validator must be a consistent originator of transactions. Failure to do that will get their earnings reduced and they’ll be ultimately edged out of the network
  • Processing power: A good validator should be a consistent contributor of processing power to the network. Each validator’s contribution will be regularly measured

Nodes that are a part of the network but not actively involved in validating blocks are known as ‘non-validating’ or ‘listening’ nodes. These nodes can partake in a range of activities – including syncing with the network and receiving and submitting transactions. But since they are not part of the consensus, they do not receive block rewards. 

Planned Use Cases of Fantom Network

  • Some of the use cases Fantom hopes to support include the following: 
  • Peer-to-peer payments and transactions, eliminating the need for intermediaries such as banks
  • “Sharing economy” apps such as online marketplaces for booking extra spaces (think Airbnb), ride-sharing and so on
  • Logistics and supply chain – track every step of the supply chain and record it in a transparent and immutable ledger
  • Supports organizations and entities with transparent and immutable communications

FTM’s Distribution and Monetary Policy

The Fantom network’s native token is called FANTOM (FTM). FTM has a hard cap supply of 3.175 billion. Fantom will utilize an inflationary model in which 20% of the inflation will go to block rewards. The rest of the inflation amount will be used to incentivize users, e.g. with very minimal transaction fees and as rewards to overall network participants who help maintain the health of the network. 

Fantom tokens were distributed this way: 

  • 3.15% for the seed sale
  • 37.04 for the private token sale
  • 1.57% for the public sale
  • 7.49% for the Fantom team (24-months vesting period)
  • 12% to advisors (3 months lockup)
  • 6% for the token reserve
  • 32.75 for block rewards

Role of FTM

FTM is an essential part of the Fantom ecosystem, in which it will play the following roles: 

Staking: For validators to participate in block confirmation and earn rewards, they have to first stake in FTM tokens. 

Block rewards: Validator nodes will be rewarded in FTM tokens. The faster a node confirms transactions, the more rewards they stand to earn

Payment for transaction fees: network users will pay in FTM

Voting: FTM holders will have voting rights for various governance proposals. Such proposals could include changing the number of block rewards, electing moderators, and so on

Key Metrics

As of August 11, 2020, Fantom traded at 0.016173, with a market cap of $34, 274, 063 which placed it at #179 in the market. The coin has a circulating supply of 2, 119, 152, 922, a total supply of 2, 132, 239, 133, and a maximum supply of 3, 175, 000, 000. It has an all-time high of $0.039562 (Jun 11, 2019) and an all-time low of $0.001935 (Mar 13, 2020). 

Buying and Storing FTM

You can exchange BTC, BNB, ETH, USDT, and BSC on Binance, KuCoin, MXC, OKEx, Probit Exchange, HotBit Bibox, Gate.io, and more. 

For storage, Fantom provides an official wallet available for mobile, Mac OS and Windows. 

Final Thoughts 

Fantom brings something new to the blockchain space. By going a different route than most other distributed ledger systems, it hopes to solve the persistent issues faced by those systems. Its invention of the faster and more scalable Lachesis protocol is a smart move that will go a long way in this endeavor. 

Categories
Cryptocurrencies

What is IOTA All About? 

Technology makes our lives easier. And as it is now, we might be at the cusp of a new age as far as technological advancements are concerned. In the very near future, it’s highly probable that the mundane devices around us will be interconnected with each other and to the internet. Think of your fridge, car, oven, car, shower, coffee maker, etc.

These devices will be able to work without needing human intervention. In other words, we’ll be able to derive more value from the things around us, thanks to them being connected to the internet. This phenomenon is called the Internet of Things (IoT). 

It would be ideal if we could actualize IoT without any of the current impediments that face it – with two of the major ones being security and scalability. There is a valid concern that an IoT network would be a security disaster as far as information security, data privacy, and cyber safety are concerned. 

IOTA is a distributed ledger platform that seeks to address the issue of scalability and security for the Internet of Things. What exactly is IOTA, and what does it offer the IoT economy and the distributed ledger space?

What is IOTA?

IOTA is a cryptocurrency project created and optimized for the Internet-of-Things (IoT). The IOTA team envisioned an IoT – already a bold vision by itself – that is powered, secured, and driven by blockchain. David Sostebo, the co-founder of IOTA, wrote that ” IOTA was initiated with a very clear and focused vision of enabling the paradigm shift of the Internet of Things… through establishing a de facto standardized ‘Ledger of Everything.’ 

IOTA diverts from the traditional blockchain model adopted by the majority of cryptocurrencies. Instead, it uses a dedicated distributed ledger platform called Tangle – itself an implementation of a computer science and mathematical concept known as Directed Acyclic Graphs(DAG). Tangle’s consensus mechanism works this way: for new transactions to be valid and before it’s added on the public ledger, it must be validated by the two lastly entered transactions.

This removes the dependence on miners to validate transactions, thus allowing for more scalable transactions (by reducing network congestion and network delays) as compared with traditional blockchains such as Bitcoin’s and Ethereum’s. 

How Does IOTA Work? 

The idea behind IOTA is to integrate blockchain solutions to the Internet of Things. IoT is not a complicated concept or a fantastical idea belonging to sci-fi movies. As a matter of fact, it’s already part of the world’s economy – think devices that monitor factory conditions, driverless cars, smart homes, smart lighting, smart pet care, etc. Research indicates that in 2017, IoT devices had grown up to 8.4 billion, with an even more aggressive growth projected for the future. 

How IOTA Works | Forex Academy

IOTA’s founders believe that for IoT to realize its highest potential, network devices should share and utilize resources more efficiently. The idea is for devices to acquire more resources, such as internet bandwidth, power, storage – only when they need them, and to sell excess or unwanted power at any given time. 

Even the smallest IoT network’s implications would be tens of transactions every second, as devices relay info between and across each other. Such volumes of transactions are beyond the capability of the current blockchain model. For instance, the Ethereum blockchain can handle 15 transactions per second, while the Bitcoin blockchain can handle 7. This results in high transaction fees for priority transactions, while the rest of the transactions can take hours to be completed. As such, the blockchain, as it is, is simply not scalable enough to support the IoT economy. 

IOTA and Scalability

Upon completion, IOTA anticipates having billions of interconnected nodes on its network. To this end, its processing power is designed to expand as more nodes join the network. Tangle’s consensus mechanism dictates that each transaction is linked to two other transactions – in the end, creating a web of transactions based on a verification history. As time goes on, every transaction becomes linked to the ones that verified it. This simple model removes the need for a blockchain. 

In terms of computing power and securing the network, each time a new device submits a transaction – it contributes to the network in this way. Again, this removes the need for block miners. 

IOTA and Transaction Fees

IOTA is also fee-free. As new devices contribute computing power when they submit transactions, the only cost they expend is the electricity they use to confirm the two previous transactions. This essentially makes IOTA free to use. 

This absence of fees is intentional. The IoT network will comprise devices transacting with each other at fractional costs and a very high frequency. Levying charges on such transactions would render micropayments impractical. To serve as the backbone of the IoT economy, IOTA has to be a free network. 

34% Attacks

As you already know, the blockchain is vulnerable to what is known as “the majority attack.” This describes the event when a party manages to control more than 50% of the network (51% attack). In such an event, the attacker can perform malicious transactions, stop miners, and so on. For its part, Tangle will be vulnerable if an entity were to control 34% (over ⅓) of the network’s computing power. 

The IOTA network would be particularly vulnerable to such an attack when it’s still a small network with fewer nodes (i.e., now). It’s easier for a bad actor to gain control of 34% of the network at this time. To curb such an attack, the network is utilizing a Coordinator that synchronizes data across all nodes – cushioning the network against an attack. 

The coordinator node is necessary to protect the early Tangle, and the network plans to get rid of it when it becomes robust and resilient enough. But that also means that the platform is not exactly decentralized right now.

In May 2019, IOTA announced the plan to kill the coordinator and implement ‘Coordicide’ – a new procedure that would make the network decentralized. The protocol, however, is yet to be implemented. 

Who is behind IOTA? 

The IOTA platform was launched in 2015 by David Sønstebø, Dominik Schiener, Sergey Ivancheglo, and Serguei Popov. Sønstebø and Schiener both serve as co-chairman of the board of directors. Ivancheglo departed from the organization’s foundation in June last year in seemingly amicable terms, but as the IOTA community came to discover, there was a ton of intrigue going on behind the scenes. See the full team here

Concerns About IOTA 

IOTA has faced criticism for its use of several new technologies instead of tested and tried technologies. Technology experts question if IOTA will really work to scale and if it will stand up to attacks even after more nodes join the network. 

Michigan University’s Digital Currency Initiative published a paper outlining serious flaws in Curl, the network’s hashing function. After testing the hash function, they discovered it produced the same output when fed with two different inputs – a situation known as Collision and one that denotes a faulty hash code. The team added that a malicious actor could have manipulated the flaw to bring down Tangle or steal user funds. The IOTA team has since addressed the loophole.

Ethereum’s core developer Nick Johnson published a scathing article in which he delineated why he thought IOTA’s platform lacked “good technical judgment,” disregarded “cryptographic best practices,” is “a bad actor in the open-source community,” and that its integrity guarantees lack rigor.”

Tokenomics of IOTA

As of May 27, 2020, IOTA was trading at $0. 195231, at a market position of #24 and with a market cap of $542, 649, 121. The coin had a 24-hour volume of $14,089, 509. IOTA’s circulating supply is 2, 779, 530, 283, with a total and maximum supply of the same value. The currency’s all-time high was $5.69 (December 19, 2017), while its all-time high was $0.079620 (March 13, 2020). 

Conclusion

The IOTA project takes the progressive idea of IoT and proposes to make it even better with distributed ledger solutions. For now, the project is far from perfect, or even near full-blown implementation. If everything goes as planned, IOTA will be an unstoppable idea, not just in the distributed ledger space, but in the world.