Knowledgebase
Knowledgebase: EN
How UCOM is protected?
Posted by B S on 12 June 2018 03:57 PM

Security is based on a chained hashing algorithm X11 that is uses 11 different algorithms, consistently participating in calculations. This fact increases the number of miners in the network, what consequently makes attacks to intercept mining blocks impossible.

(0 vote(s))
Helpful
Not helpful

Comments (0)
Post a new comment
 
 
Full Name:
Email:
Comments: