Answer: The chainless platform is a brand new platform, and a new language is used for basic development. This language is Greatfree, a general-purpose distributed language written in JAVA language. Its advantage lies in Professor Li Bing, who devoted ten years of hard work to building it. When Bitcoin was created, the development method adopted […]
7. Platform operation and management
Answer: The security of DW20 can be understood from two perspectives. One is financial security: the chainless system airdrops DW20 coins and issues them as foundation funds. The function of the foundation funds is similar to the capital of a bank, providing system financial security and solving the problem of issues of system resilience and
89. If DW20 develops well in the future, competitors are likely to plagiarize it in the market. How should we prevent it?
Answer: In cryptocurrency and web 3.0 projects, the industry most recognizes the value of first-of-its-kind projects. The value of non-first-of-its-kind projects is generally much lower than that of first-of-its-kind projects. This is manifested as the 2:8 phenomenon; 20% of the leading projects own about 80% of the market value, which is mostly the case for
Answer: Chainless systems will begin applying for invention patents in 2022. Currently, chainless systems are related to general ledgers (Patent name: point-to-point-based data processing methods, systems, computing devices and storage media; Patent number: 202210046337.0) and wallets (Patent name: A Wallet system and transaction method; Patent number: 202210541275.0), and three invention patents for digital asset management
Answer: DW20 decentralized currency is a brand-new and meaningful invention, but DW20 has not applied for a patent.
Answer: Use multiple signatures and multiple backup wallets. Take control of your assets. For chainless external transfers, the chainless system provides verified multi-signatures for personal transfers.
Answer: If the old mobile phone is lost, the private key will also be lost, but the mobile phone password and user name are not lost. The user can reload the APP and open the backup file using the recovery program. This file can be opened with the multi-signature of the non-lost mobile phone and
Answer: The inheritance program has automatic triggering and manual triggering. It is introduced in detail as a function in chainless APP.
Answer: 1. Inheritance of not losing the mobile phone The multi-signature multi-backup wallet APP has an inheritance button. Press the button to start the inheritance process. The content of the inheritance program is the same in any backup phone, and online backup is also possible. 2. Inheritance if all equipment is lost Theoretically, it cannot