You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Duke Leto
b7cf67c383
|
4 years ago | |
---|---|---|
crypto555 | 4 years ago | |
doc | 4 years ago | |
dragon | 4 years ago | |
includes | 4 years ago | |
.gitignore | 4 years ago | |
AUTHORS | 4 years ago | |
COPYING | 4 years ago | |
DEVELOPER-AGREEMENT | 4 years ago | |
JL777_DISGRACED_THE_VILLAGE_OF_SUPERNET_HACKERS | 4 years ago | |
LICENSE | 4 years ago | |
Makefile | 4 years ago | |
README.md | 4 years ago | |
pnacl.pem | 4 years ago | |
pnacl_main.h | 4 years ago |
README.md
Hush Delayed Proof Of Work
The software which performs the actual action of injecting data into blockchains is called Dragon.
It's not a silent Dragon, it's quite talkative and likes to talk about blockhash data across chains. You could say it spits DPoW fire cross-chain.
Dragon is an evolved form of a previous software called iguana. Dragons are bigger and better than iguanas, as everybody knows.
Installing Dragon
Build instructions for NN operations:
cd dragon
Build dragon for notary operations
./m_notary_build
Start main-net notarizations:
./m_notary_HUSH
Start 3rd party notarizations:
./m_notary_3rdparty
To build and launch in one step
Run
./m_notary
License
GNU Public License Version 3
Copyright
See [AUTHORS] for details.