Why is defi on the ETH public chain (which currencies are defi)

<img src='https://img.doulai.com/pic/enpic.php?k=defi Why are you on the eth public chain? Imgalt=defi Why are you on the eth public chain Why is defi on the ETH public chain? Because the concept of decentralized finance (DeFi) has become popular, and these applications, also known as "lending agreements," have become a core part of many DeFi platforms and projects. This article will focus on introducing what ETH protocols (interoperable blockchain) are, ETH v3, and which applications will use ETH as the base currency to issue tokens Technically speaking, eth-protocol is a public chain based on the PoW consensus algorithm, which provides developers with the technical support needed to build a smart contract environment and can be used to develop other types of applications. But if you want to expand to a wider range of use cases, you need to consider two core factors:

1, security. At present, almost all Almost all is deployed on an independent security system 2. Flexibility. At present, the ETH network processes over 3000 transactions per second, most of which are completed through a single transaction 3. Throughput. There are already multiple DApps that can achieve this goal. So why? The reason is that the solution adopts a dual authentication mechanism. Users can authenticate their identity through double signatures. For example, ETH wallet addresses store a large number of private keys and cannot access their private keys; Alternatively, the ETH address may contain a large number of assets, such as ETH. In order to ensure the security of user accounts and prevent financial losses, ETH network has chosen Eth Proof (sharding). When a new Ethereum block appears, it will be added to the Ethereum Virtual Machine (EVM). However, since EVM does not specifically create contracts for different categories, we understand this method as a multi-layered validation pattern, where each epoch can perform one validation to ensure that the entire process does not rely on external debugging or the involvement of attackers. Although this resulted in many conflicts between the validation node and the miner, the final result still changed Based on the current network conditions, the main impact of the EIP-1 proposal may be on the validator itself, rather than any third party. For the EIP-1 proposal, the most crucial thing is that its design purpose is to prevent malicious actors from exploiting vulnerabilities on EthLedger, allowing them to receive more rewards and earn higher prices on it. Moreover, once the code is upgraded, it can fully restore its normal state. However, this does not mean a health issue for the Ethereum ecosystem, but rather a clear goal – to remove intermediaries or control risks

Defi which currencies

According to the monitoring data of the third party Big data rating agency RatingToken, which currencies are the top three in the market? The top ranked one is Compound; The second ranked company is Uniswap (UNI), with an increase of 12.48%. DeFi, also known as decentralized finance, refers to the process of converting traditional currencies into virtual digital assets through a distributed ledger technology for bookkeeping and transfer. Generally speaking, in the traditional banking business, users can use Fiat money to purchase various encryption products, tokens, securities and other assets, and can also use blockchain technology to complete the conversion between capital and goods, just like investing in stocks or bonds The RatingToken team believes that the concept of “disintermediated asset management” has been widely recognized in the market, but there are also many problems that need to be solved, such as the project team not establishing a transparent and trustworthy data model, which cannot control risks.

This article and pictures are from the Internet and do not represent qiAiAi's position. If you infringe, please contact us to delete:https://www.qiaiai.com/daily/21825.html

It is strongly recommended that you study, review, analyze and verify the content independently, use the relevant data and content carefully, and bear all risks arising therefrom.