Author: Eden Block

EOS Review

Headshot

Eden Block

• Categories:

Ask the Eden Labs team questions on our Telegram and receive updates, analysis, and research insights. When analyzing a project, the Eden Labs team looks for projects that do something unique or do it much better than its competition. Quality projects should be able to explain complex ideas simplified to their audience. In addition, projects that rely […]

Read More

Partition Sizes

Headshot

Eden Block

• Categories:

Partitions in decentralized networks Introduction Distributed ledger technology connects computers (nodes) throughout a decentralized network. Ideally, this collection of nodes is always cohesive in their vision of the network and in their communication efforts. Networks need effective communication for a variety of reasons. First, communication allows the network to effectively evolve. New transactions come through, […]

Read More

Hash Functions

Headshot

Eden Block

• Categories:

Introduction to Hash Functions Instead of using public and private keys for encryption and decryption (as with ECC and RSA), a hash function can be used to secure data. A hash function processes plaintext of any size and creates a unique, fixed-length identifier. In other words, hash functions take the generic text (like this article) and turn […]

Read More

Privacy Coins Comparison Review

Headshot

Eden Block

This article is part four of a four-part Eden Labs series on privacy tokens. Ask the Eden Labs team questions on our Telegram and receive updates, analysis, and research insights. Part 1: Zcash Part 2: Monero Part 3: Dash Part 4: Comparison Review The difference between coins and tokens is that coins act as a simple method of value […]

Read More

Design Trade-Offs

Headshot

Eden Block

• Categories:

The design of blockchain networks is guided by several tradeoffs. Overall, any blockchain will be able to achieve, at most, two of the following: Decentralisation, Security, or Scalability. However, the design of blockchains can be divided into further trade-offs to enhance different aspects of its functionality. The additional trade-offs blockchains face are outlined in the […]

Read More

Privacy Tokens, Part Three: Dash

Headshot

Eden Block

• Categories:

This article is part three of a four-part Eden Labs series on privacy tokens. Ask the Eden Labs team questions on our Telegram and receive updates, analysis, and research insights. Part 1: Zcash Part 2: Monero Part 3: Dash Part 4: Comparison Review When analyzing a project, the Eden Labs team looks for projects that do something unique […]

Read More

The Concept of Synchrony

Headshot

Eden Block

• Categories:

Depending on how messages are received, decentralized networks can be in several different communication states. Depending on the network design and architecture, we can differentiate between asynchronous, synchronous, and semi-synchronous models. As outlined in this article, synchronous models are generally not possible within a decentralised environment. These models regulate the dynamics between participants and guide […]

Read More

Privacy Tokens, Part 2: Monero

Headshot

Eden Block

• Categories:

This article is part two of a four-part Eden Labs series on privacy tokens. Ask the Eden Labs team questions on our Telegram and receive updates, analysis, and research insights. Part 1: Zcash Part 2: Monero Part 3: Dash Part 4: Comparison Review   Summary Monero (XMR) is a DLT project lauded as the world’s most privacy-centric coin. […]

Read More

Eden Block’s ICO Analysis Handbook

Headshot

Eden Block

• Categories:

CEO and Co-founder of Eden Block. EdenBlock.com FOLLOW me on Twitter: @noamlevenson It’s the Wild West in the world of ICOs. It’s shoot-outs-in-the-streets, I-can’t-believe-this-is-legal pandemonium. People get scammed. People get ripped off. And it makes sense. Any scammer or con artist with half a brain is targeting the ICO market right now. This means that those investing […]

Read More

Introduction to Cryptography

Headshot

Eden Block

• Categories:

The importance of cryptography in blockchain An understanding of blockchain encryption methods is fundamental to understanding how blockchain works, how security is maintained, and how users interact with other users in a decentralized environment.   Encryption is a set of mathematical computations that secure information against third party interception. Cryptography isn’t a new concept. Long […]

Read More