STASH | DIGITAL OPEN SOURCE CURRENCY OF THE NEXT GENERATION

Meet again with us on this occasion. For this meeting we will discuss about the development of the world Cryptocurrencies which has continued to increase very significantly in recent years, with various types of Crypto in circulation, one of which is STASH. In other words for investors is very appropriate to make investment in the world of Crypto in recent times. Because antusian in Crypto world is very promising.



In this first opportunity let us first discuss what is STASH. tash is an open source cryptographic currency that combines many of the innovative protocol features of Bitcoin, Dash and Zcash while solving the problems currently encountered by various digital currencies. While different cryptoes have diverse and valuable attributes, each also has its own problems. These issues include slow transaction speed, high transaction costs, poor scalability, fair launches, strong privacy, a practical governance framework, sustainable funding structures and the right user incentives. And Tim Stash will always try to evolve and adapt to friction, openness and flexibility to new opportunities that may arise. The ultimate goal of Stash is simple, being the most useful and easy to use crypto currency for end users every day and international transactions. The goal of Stash is to unify many of the most advanced crypto currential features and build upon blockade technology that proves to solve or eliminate this problem. This in turn should create crypto which is increasingly useful and desirable for end users and long-term holders.

In order for the digital currency to operate, a full node is required. This node operates on a P2P network, and sends updates to colleagues after the events that occur on the network. However, to be effective, the knot requires a high volume of traffic, as well as support from additional sources, resulting in significant cost. This can cause a full drop of nodes, as seen in the Bitcoin network. Stash combats this through a network level 2 layer that serves as a kind of safety net, which ensures high performance for longer. This is a highly available incentivized node network node and must provide certain service standards if eligible for the Incident Imaging Incident Program.

Then for further discussion we will provide information about STASH. With the discussion as follows:

1.TECHNOLOGY SYSTEM NETWORK STASH

The Incentivizednode Reward Program works to provide incentives on the network, growing the number of full nodes that operate at a time. Without such a program, network operators must pay full node fees due to increased traffic on the network, which can not be maintained. It is important for system security that is not owned by a single person or entity for control Of the entire Incentivizednodes network. To achieve this, the guarantee system has been implemented. Implemented, whereby anyone who wants to control Active Incentivizednode should place 10,000 Stash as a deposit. To gain control over the significant parts of Incentivizednodes in the network, individuals need to purchase a large number of Stash units from the open market.

This allows the entire Stash network to take advantage of the Incentivizednode 2nd level network to perform sensitive tasks. No whole trust or responsibility is given to a single node or group of nodes, and no one can control the network for their own purposes because Incentivizednodes are randomly selected to perform the same task simultaneously. While on Incentivizednode network using Quorom; Two quorums are selected for each block, and Quorum A assesses the service level of Quorum B. The quorum A consists of the node closest to the hash of the current block. Quorum B, on the other hand, consists of the furthest vertex of this hash. In this way the system is guarded without trust by selecting nodes randomly through a quorum system that makes the network access itself.

Later in this process, the information required to spend Stash coins is attached to the transaction by creating a new and encrypted zk-SNARK using a recipient public key that can only be used by the recipient of the transaction. In order for the access crypto network to work properly, there must be an existing structure; Transactions must undergo certain evidence before it can be verified. Stash will use a form of evidence of zero knowledge known as zk-SNARKs. When each transaction is validated, there is also a zk-SNARK which can be used to indicate that Stash coins are present and not yet exhausted, the sender has the authority to send Stash coins, the amount of Stash coins sent equals the sum of the stash money received.

2.Mining Supply

Stash implements a direct connection between the supply for each block and the number of active miners in the network. If the number of miners decreases, the remuneration received from each approved block increases accordingly and manifestly. Continuous cryptocurrency production is expected to continue until about the middle of the next century, where bonus blocks will be close to zero and miners and Incentivizednodes will receive incentives from transaction costs.

3.Token Supply

Stash Token and Stash Cryptocurrency Supply 500 million Token Stash will be allocated in Token Sale. The sales proceeds will be used to coat the cryptography of zero knowledge into Cryptocurrency Stash and create a Stash Wallet. After this privacy feature has been completed the Token Stash owner will be able to use them buy one for one base Stash Cryptocurrency. Maximum 997.8million Stash Cryptocurrency will be created including Stash Cryptocurrency which will be purchased with Stash Tokens and Stash Cryptocurrency which will be produced from the mine for about 100 years.

So far our discussion for this time, we have provided some links below that you can visit to get more information

WEBSITE | WHITEPAPER | FACEBOOK | TWITTER | ANN | SLACK

Terima kasih telah mengunjungi situs kami.


Alamat ETH : 0x158CAd0e2dc87435a5BbE5eC2F0bd7aA6d352B1B