How does DSFR work?
Last Update 3 mesi fa
As a new user, you can get started with DSFR without understanding the technical details. Once you've installed a DSFR wallet on your computer or mobile phone, it will generate your first DSFR address and you can create more whenever you need one. You can disclose your addresses to your friends so that they can pay you or vice versa. In fact, this is pretty similar to how email works, except that DSFR addresses should be used only once.
DSFR uses peer-to-peer technology to operate with no central authority or banks; managing transactions and the issuing of DSFRs is carried out collectively by the network. DSFR is open-source; its design is public, nobody owns or controls DSFR and everyone can take part. Through many of its unique properties, DSFR allows exciting uses that could not be covered by any previous payment system.
The blockchain is a shared public ledger on which the entire DSFR network relies. All confirmed transactions are included in the blockchain. It allows DSFR wallets to calculate their spendable balance so that new transactions can be verified thereby ensuring they're actually owned by the spender.
The integrity and the chronological order of the blockchain are enforced with cryptography.
A transaction is a transfer of value between DSFR wallets that gets included in the blockchain. DSFR wallets keep a secret piece of data called a private key or seed, which is used to sign transactions, providing mathematical proof that they have come from the owner of the wallet. The signature also prevents the transaction from being altered by anybody once it has been issued. All transactions are broadcast to the network and usually begin to be confirmed within 10-20 minutes, through a process called mining.
Mining is a distributed consensus system that is used to confirm pending transactions by including them in the blockchain. It enforces a chronological order in the blockchain, protects the neutrality of the network, and allows different computers to agree on the state of the system. To be confirmed, transactions must be packed in a block that fits very strict cryptographic rules that will be verified by the network. These rules prevent previous blocks from being modified because doing so would invalidate all the subsequent blocks.
Mining also creates the equivalent of a competitive lottery that prevents any individual from easily adding new blocks consecutively to the blockchain. In this way, no group or individuals can control what is included in the blockchain or replace parts of the blockchain to roll back their own spends.