What blockchain security is based on - English https://ariancoin.io/forum/base-de-conocimientos-english/what-blockchain-security-is-based-on/ The Arian Forum is the place where the best conversations surrounding our community take place. Do you have a question? Take a look at the discussions your answers may be here. en-US Wed, 27 May 2020 05:22:11 +0000 wpForo 60 RE: What blockchain security is based on https://ariancoin.io/forum/base-de-conocimientos-english/what-blockchain-security-is-based-on/#post-179 Fri, 20 Mar 2020 17:12:30 +0000 @kirab

Hi Kira!
We are happy to read your comment and that you are interested in our project.Please send us your number WhatsApp and email so that an agent can contact you.
Have a wonderful weekend. 
]]>
English Arian https://ariancoin.io/forum/base-de-conocimientos-english/what-blockchain-security-is-based-on/#post-179
RE: What blockchain security is based on https://ariancoin.io/forum/base-de-conocimientos-english/what-blockchain-security-is-based-on/#post-173 Wed, 11 Dec 2019 16:04:56 +0000 Great post! Thanks for sharing! There are many security details every crypto user should pay attention to. Having surfed the Internet, I was lucky to find a source where the independent crypto community members share their thoughts not only on Blockchain security, but also on various crypto projects, wallets, cards and exchanges https://revain.org. Why aren't there reviews about your project?

]]>
English KiraB https://ariancoin.io/forum/base-de-conocimientos-english/what-blockchain-security-is-based-on/#post-173
What blockchain security is based on https://ariancoin.io/forum/base-de-conocimientos-english/what-blockchain-security-is-based-on/#post-143 Thu, 15 Aug 2019 16:32:45 +0000
The security of a Blockchain is a serious matter for developers and users of these technologies, especially when the implementation of this technology is increasingly bigger and security is of vital importance. 
 
To determine the security of a blockchain, developers use several mechanisms, some of them are advanced cryptography techniques, behavior models, mathematical decision making and crypto-economy analysis. 
 
Maintaining the security of a blockchain isn’t as simple as it seems, especially when the greatest percentage of its application refers to the generation of cryptocurrencies, digital assets with a considerable power of transaction and acquisition, which makes them prone to cyber-attacks and infiltration of malicious codes. 
 
Two of the most important features of Blockchain are the consensus and immutability, which, combined, provide the basis for the data security in a blockchain. While the consensus algorithms make sure that the rules of the system are respected, the immutability guarantees the integrity of the data records and transactions, after each new block is confirmed as valid. 
 
In a Blockchain, cryptography is basic for security, both for securing the confidentiality of the information and for the main processes of operating in the network. The composition of basic elements for the validation of the blocks of a chain derive from cryptography, the hash is one of these basic elements, which also plays a vital role in the security and immutability of a blockchain. 
 
Additionally, a blockchain can add cryptographic algorithms to its protocol, which have been verified in their security, as it’s the case of the known Rijndael algorithms classified as AES-128, AES-192, and AES-256, the most popular algorithms used in symmetric cryptography to guarantee the security of information.
 
The concept of crypto-economy in the security of a blockchain is related to the so-called game theory that creates the mathematical method of making decisions by rational actors, in systems with rules and arranged rewards, which shapes and describes specifically the behavior of the nodes that are part of a blockchain. 
 
This security system analyses the economic aspects of the blockchain protocols regarding the behavior of the participants, focusing on the general notion that the blockchain systems generate greater incentives than the nodes that have an honest behavior, which is shown in the PoW protocol of Bitcoin. 
 
Likewise, this system shows that in protocols such as Bitcoin’s, the possibilities of a malicious behavior decreases due to the great amount of time investment and energetic consumption that a node needs to validate the block, which is an unnecessary expense because the dishonest miner runs the risk of being identified as malicious and losing all the work invested. 
 
In Arian we have put special attention to the security guarantees for the information handled inside our blockchain, implementing the cryptographic algorithm AES-256, considered as one of the most secure in the world and praised by the U.S. National Security Agency (NSA).
 
Join our channels to know more about the Arian blockchain and its specific features. 
 
Facebook: https://www.facebook.com/ariancoin/
Twitter: https://twitter.com/ArianCoin
Instagram: https://www.instagram.com/ariancoin/
 
Any questions? Talk with us:
Telegram: https://t.me/joinchat/K7oCWRTzNzZi-_mZDIjmRQ
Email: info@ariancoin.io 
Bitcointalk: https://bitcointalk.org/index.php?act
 
Check out our website: https://ariancoin.io/en/
Download the Interactive Node: https://ariancoin.io/download-interactive-node/
Blackpaper: https://ariancoin.io/wp-content/uploads/2018/05/Blackpaper-Arian-en.pdf
]]>
English Arian https://ariancoin.io/forum/base-de-conocimientos-english/what-blockchain-security-is-based-on/#post-143