Pi will continue to adhere to the methodology of progressive decentralization as it develops its Testnet. Through this computer application, Pioneers can switch the node software on/off to make their devices available/unavailable for serving as a node. Instead of requiring deep technical knowledge to set up a node, everyday people will be able to do that by installing a desktop application on their computers. Unlike most other crypto projects, the Pi Node will continue to follow the philosophy of user-centric design. The security circles (See Pi FAQ: What are security circles?) from Pi mobile miners aggregate into a global trust graph that enables Pi Nodes to form quorum slices to determine who can and cannot validate transactions on the shared ledger. In SCP, nodes form trusted groups (quorum slices) and only agree to transactions that those trusted nodes agree to. Unlike nodes that use proof of work such as Bitcoin or Ethereum, Pi Node uses a different consensus algorithm based on the Stellar Consensus Protocol (SCP). Similar to other blockchains, Pi Nodes will be responsible for validating transactions on a distributed ledger and resolving the challenges in maintaining a distributed currency by having all nodes come to a “consensus” on the order of new transactions that are being recorded. Nodes are the fourth role in the Pi ecosystem and run on laptops and desktops instead of mobile phones.
0 Comments
Leave a Reply. |